YunTech EOS Lab Crowdsourcing Support System for Disaster Surveillance and Response Edward T.-H Chu, Yi-Lung Chen, Jyun-You Lin National Yunlin University.

Slides:



Advertisements
Similar presentations
1 The TSP : Approximation and Hardness of Approximation All exact science is dominated by the idea of approximation. -- Bertrand Russell ( )
Advertisements

Chapter 15 Graph Theory © 2008 Pearson Addison-Wesley. All rights reserved.
Source-Location Privacy Protection in Wireless Sensor Network Presented by: Yufei Xu Xin Wu Da Teng.
Delay-Minimized Route Design for Wireless Sensor-Actuator Networks Edith C.-H. Ngai 1, Jiangchuan Liu 2, and Michael R. Lyu 1 1 Department of Computer.
1 Discrete Structures & Algorithms Graphs and Trees: II EECE 320.
Localized Techniques for Power Minimization and Information Gathering in Sensor Networks EE249 Final Presentation David Tong Nguyen Abhijit Davare Mentor:
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
A traveling salesman has customers in 5 cities which we will call A, B, C, D, and E. The salesman needs to travel to all 5 cities with his trip starting.
Online Data Gathering for Maximizing Network Lifetime in Sensor Networks IEEE transactions on Mobile Computing Weifa Liang, YuZhen Liu.
Wireless Video Sensor Networks Vijaya S Malla Harish Reddy Kottam Kirankumar Srilanka.
Call for Posters You are cordially invited to submit a poster for the 2015 International Workshop on Disaster Reduction & Risk Management Original research.
Ant Colony Optimization: an introduction
Ralph Toyama Hawaii Library Association Annual Conference December 6, 2014.
1 Shortest Path Calculations in Graphs Prof. S. M. Lee Department of Computer Science.
Energy Saving In Sensor Network Using Specialized Nodes Shahab Salehi EE 695.
This document contains Booz Allen Hamilton Inc. proprietary and confidential business information. Social Media Success Factors for Improving National.
Real-Time Human Posture Reconstruction in Wireless Smart Camera Networks Chen Wu, Hamid Aghajan Wireless Sensor Network Lab, Stanford University, USA IPSN.
SOS: A Safe, Ordered, and Speedy Emergency Navigation Algorithm in Wireless Sensor Networks Andong Zhan ∗ †, Fan Wu ∗, Guihai Chen ∗ ∗ Shanghai Key Laboratory.
救災資訊輔助系統 (Disaster Information Aid System) 學生 : 白繕維、林俊佑、陳以龍 Reference Acknowledgement [1] ]
SPANNING TREES Lecture 21 CS2110 – Spring
Lyon, June 26th 2006 ICPS'06: IEEE International Conference on Pervasive Services 2006 Routing and Localization Services in Self-Organizing Wireless Ad-Hoc.
Graph Theory Hamilton Paths and Hamilton Circuits.
IEEE Globecom 2010 Tan Le Yong Liu Department of Electrical and Computer Engineering Polytechnic Institute of NYU Opportunistic Overlay Multicast in Wireless.
Boundary Recognition in Sensor Networks by Topology Methods Yue Wang, Jie Gao Dept. of Computer Science Stony Brook University Stony Brook, NY Joseph S.B.
Prediction-based Object Tracking and Coverage in Visual Sensor Networks Tzung-Shi Chen Jiun-Jie Peng,De-Wei Lee Hua-Wen Tsai Dept. of Com. Sci. and Info.
Spring 2015 Mathematics in Management Science Traveling Salesman Problem Approximate solutions for TSP NNA, RNN, SEA Greedy Heuristic Algorithms.
Presentation of Wireless sensor network A New Energy Aware Routing Protocol for Wireless Multimedia Sensor Networks Supporting QoS 王 文 毅
Mobile Agent Migration Problem Yingyue Xu. Energy efficiency requirement of sensor networks Mobile agent computing paradigm Data fusion, distributed processing.
The Colorful Traveling Salesman Problem Yupei Xiong, Goldman, Sachs & Co. Bruce Golden, University of Maryland Edward Wasil, American University Presented.
Bounded relay hop mobile data gathering in wireless sensor networks
A LOCALIZED SELF-HEALING ALGORITHM FOR NETWORKS OF MOVEABLE SENSOR NODES Mohamed Younis, Sookyoung Lee, Sheetal Gupta and Kevin Fisher Department of Computer.
Speaker: Li-Wen Chen Date: FAULT-TOLERANCE MECHANISMS FOR ZIGBEE WIRELESS SENSOR NETWORKS Skender Ben Attia, André Cunha, Anis Koubâa, M ário.
Copyright © 2011, Scalable and Energy-Efficient Broadcasting in Multi-hop Cluster-Based Wireless Sensor Networks Long Cheng ∗ †, Sajal K. Das†,
SNU OOPSLA Lab. 1 Great Ideas of CS with Java Part 1 WWW & Computer programming in the language Java Ch 1: The World Wide Web Ch 2: Watch out: Here comes.
The Travelling Salesperson Problem A salesperson needs to visit London, Nottingham, Manchester and Leeds, he lives in Birmingham. Find the shortest route.
CIRCUITS, PATHS, AND SCHEDULES Euler and Königsberg.
SPANNING TREES Lecture 20 CS2110 – Fall Spanning Trees  Definitions  Minimum spanning trees  3 greedy algorithms (incl. Kruskal’s & Prim’s)
Cooperative Location- Sensing for Wireless Networks Authors : Haris Fretzagias Maria Papadopouli Presented by cychen IEEE International Conference on Pervasive.
“Controlled Straight Mobility and Energy-Aware Routing in Robotic Wireless Sensor Networks ” Rafael Falcon, Hai Liu, Amiya Nayak and Ivan Stojmenovic
1 30 November 2006 An Efficient Nearest Neighbor (NN) Algorithm for Peer-to-Peer (P2P) Settings Ahmed Sabbir Arif Graduate Student, York University.
Data Transmission Mechanism for Multiple Gateway System Xuan He, Yuanchen Ma and Mika Mizutani, 6th International Conference on New Trends in Information.
Euler Paths and Circuits. The original problem A resident of Konigsberg wrote to Leonard Euler saying that a popular pastime for couples was to try.
SPANNING TREES Lecture 21 CS2110 – Fall Nate Foster is out of town. NO 3-4pm office hours today!
Hole Detection and Boundary Recognition in Wireless Sensor Networks Kun-Ying Hsieh ( 謝坤穎 ) Dept. of Computer Science and Information Engineering National.
NPC.
Coverage Problems in Wireless Ad-hoc Sensor Networks Seapahn Meguerdichian 1 Farinaz Koushanfar 2 Miodrag Potkonjak 1 Mani Srivastava 2 University of California,
An Energy-Efficient Approach for Real-Time Tracking of Moving Objects in Multi-Level Sensor Networks Vincent S. Tseng, Eric H. C. Lu, & Kawuu W. Lin Institute.
Distributed, Self-stabilizing Placement of Replicated Resources in Emerging Networks Bong-Jun Ko, Dan Rubenstein Presented by Jason Waddle.
An Asynchronous Message Delivery Service for iGaDs (intelligent Guards against Disasters) esIoT-2013 Taichung,Taiwan July 3-5th Yi-Zong Ou Institute of.
Euro-Par, HASTE: An Adaptive Middleware for Supporting Time-Critical Event Handling in Distributed Environments ICAC 2008 Conference June 2 nd,
1 Multipath Routing in WSN with multiple Sink nodes YUEQUAN CHEN, Edward Chan and Song Han Department of Computer Science City University of HongKong.
Chapter 14 Section 3 - Slide 1 Copyright © 2009 Pearson Education, Inc. AND.
Unit 2 Hamiltonian Circuits. Hamiltonian Circuit: A tour that starts at a vertex of a graph and visits each vertex once and only once, returning to where.
Wireless Access and Networking Technology (WANT) Lab. An Efficient Data Aggregation Approach for Large Scale Wireless Sensor Networks Globecom 2010 Lutful.
Copyright © 2008 Pearson Education, Inc. Slide 13-1 Unit 13B The Traveling Salesman Problem.
Grade 11 AP Mathematics Graph Theory Definition: A graph, G, is a set of vertices v(G) = {v 1, v 2, v 3, …, v n } and edges e(G) = {v i v j where 1 ≤ i,
Crowdsourcing Information for Enhanced Disaster Situation Awareness and Emergency Preparedness and Response Edward T.-H Chu*, S. W. Chen** and Jane W.
Ubiquitous Smart Devices and Applications for Disaster Preparedness Presenter: Edward Chu YunTech University, Taiwan Co-Authors: W. P Liao, Y. Z. Ou, C.
Virtual Disaster Management Information Repository Based on Linked Open Data Yi-Lung Chen 1, Jyun-You Lin 1, Tsung-Hsien Chu 1, Jane Win-Shih Liu 2, IEEE.
Mathematical modeling To describe or represent a real-world situation quantitatively, in mathematical language.
Jane W. S. Liu Institute of Information Science, Academia Sinica Fusion of Human Sensor Data and Physical Sensor Data.
MAT 110 Workshop Created by Michael Brown, Haden McDonald & Myra Bentley for use by the Center for Academic Support.
Hamilton Paths and Hamilton Circuits
DRBoaST ICT for Disaster management:
International Collaboration Project on Information Security
Dhruv Gupta EEC 273 class project Prof. Chen-Nee Chuah
Chapter 15 Graph Theory © 2008 Pearson Addison-Wesley.
Chapter 15 Graph Theory © 2008 Pearson Addison-Wesley.
Spanning Trees Lecture 20 CS2110 – Spring 2015.
Presentation transcript:

YunTech EOS Lab Crowdsourcing Support System for Disaster Surveillance and Response Edward T.-H Chu, Yi-Lung Chen, Jyun-You Lin National Yunlin University of Science and Technology Jane W. S. Liu, IEEE Fellow Academia Sinica 1 The 15 th International Symposium on Wireless Personal Multimedia Communications(WPMC), Taiwan

YunTech EOS Lab Motivation System Architecture Multiple Volunteer Routing Problem Demo Video Conclusion Outline 2

YunTech EOS Lab 3 Disaster Surveillance System Functionalities of disaster surveillance system  Collect real-time information  Estimate boundaries of threatened areas Sensor networks play an important role in collecting data  Camera surveillance network  Wireless sensor network

YunTech EOS Lab 4 Limitation of Sensor Networks In a major disaster  Sensors can be easily damaged  Official rescue resources are limited Collecting information in major disasters is difficult ?

YunTech EOS Lab 5 Social network services have been playing an role in colleting disaster information  Ushahidi, Sahana, Facebook, Twitter, Google Map Growing Trend in Disaster Management

YunTech EOS Lab 6 Limitations Existing social network based disaster management systems are limited in  coordinating volunteers efficiently Some places may be visited repeatedly while others may not be visited at all  Cannot provide a comprehensive view  Prolong the response time of exploring the whole disaster area

YunTech EOS Lab Contributions A crowdsourcing support system for disaster surveillance (CROSS) Cross plans routes for the volunteers to explore threatened areas A prototype including an emergency APP and sever services 7

YunTech EOS Lab CROSS System 8 Crowd Command Center Path Threaten Area Location

YunTech EOS Lab Major components of CROSS Broadcast manager  Post a volunteer requirement Path planning manager  Determine a route for each volunteer Crowdsourced map manager  Integrate the messages received from volunteers and display it on a map 9

YunTech EOS Lab Broadcast Manager 10 (Broadcast volunteering opportunities)

YunTech EOS Lab Broadcast Manager (cont.) 11 (Report volunteer identity) (The locations of volunteers)

YunTech EOS Lab Path Planning Manager 12 (The route of a volunteer - smartphone view ) (The routes of volunteers - server view)

YunTech EOS Lab Crowdsourced Map Manager 13 (The crowdsourced map ) (Emergency call)

YunTech EOS Lab Motivation System Architecture Multiple Volunteer Routing Problem Prototype Demo Conclusion Outline 14

YunTech EOS Lab Graph Model of Threatened Area CROSS uses a graph to characterize the threatened area 15

YunTech EOS Lab Multiple Volunteer Routing Problem Find routes for volunteers such that the number of visited nodes is maximized Constraints  Go back to the starting point  Cannot exceed traveling limit Similar to multiple traveling salesman problem (NP-Hard) 16

YunTech EOS Lab Multiple Volunteer Routing Algorithm (MVR) Step 1: finds a smallest Hamilton cycle containing the starting node with three nodes Step 2: based on the initial solution, MVR includes one of nearest nodes to form a new Hamiltonian cycle Step 3: if more than two new Hamiltonian cycles are found, MVR selects the one with the minimum total traveling time Step 4: stop until no more Hamilton cycle is found Step 5: repeat the process to find a route for the next volunteer 17

YunTech EOS Lab Multiple Volunteer Routing Algorithm An example  The starting node = B, the traveling distance = 30  The final route of MVR: B->A->C->E->D->B 18

YunTech EOS Lab Demo video Prototype demo  19

YunTech EOS Lab Conclusion We developed a strategy of crowdsourcing disaster information We designed a heuristic algorithm to d etermine a route for each volunteer to explore threatened areas We built up a prototype to demonstrate the applicability 20

YunTech EOS Lab Publications 1.Jane W. S. Liu, C. S. Shih, Edward T.-H. Chu, “Cyber-Physical Elements of Disaster Prepared Smart Environment,” accepted for publication in IEEE Computer Magazine Edward T.-H. Chu, Yi-Lung Chen, Jyun-You Lin and Jane W. S. Liu,"Crowdsourcing Support System for Disaster Surveillance and Response," In the 15th International Symposium on Wireless Personal Multimedia Communications (WPMC), (Invited paper) 3.W. P. Liao, Y. Z. Ou, Edward T.-H. Chu, C. S. Shih, J. W. S. Liu,"Ubiquitous Smart Devices and Applicaftions for Disaster Preparedness", In the 2012 International Symposium on UbiCom Frontiers - Innovative Research, Systems and Technologies (UFirst 2012), Japan, (Invited paper) 4.Edward T.-H. Chu, Y.-L. Chen, J. W. S. Liu and J. K. Zao, “Strategies for Crowdsourcing for Disaster Situation Information,” In the 2nd International Conference on Disaster Management and Human Health: Reducing Risk, Improving Outcomes, Orlando, Florida, USA, May,

YunTech EOS Lab Opinions on newspaper (Chinese) 朱宗賢,聯合報 ,「警政 APP 獨漏緊急治安簡訊」  警政署公開回應 : 「警政 App 加治安簡訊 恐涉隱私權 」 朱宗賢,中國時 ,「災難資訊 勿忘來台旅人」  新北市消防局來電回應 : 「納入參考」 朱宗賢,聯合報 , 「預約警報 防颱有效率」 方祺瑋,聯合報 , 「預約氣象 何不改傳簡訊?」  氣象局公開回應 : 「推緊急氣象簡訊?納入參考」 朱宗賢,聯合報民意論壇 - 「善用社群 擴大救災能量」 22

YunTech EOS Lab RITMAN Workshop 2012 – Call for paper Workshop on Resilient ICT for Management of Mega Disasters (RITMAN), Taipei, Taiwan, December 17, 2012 (In conjunction with IEEE International Conference on SOCA 2012) Paper Submission Due: October 5, 2012 (extended) Acceptance Notification: October 22, 2012 Camera Ready Submission: November 2, 2012 Workshop: December 19, 2012 Accepted papers will be included in the IEEE Digital Library 23

YunTech EOS Lab Topics (not limited) Virtual repository for disaster information Security and privacy for rescue/emergency information Humanitarians issues in disaster management Assessment and Reduction of Uncertainty in Disaster information Crowdsourcing technologies (social sensing ) Case studies in disaster situation analysis and information fusion Resilient communication protocol and infrastructure recovery Configuration and management of faults and failures during big disasters Networking issues in disaster recovery Disaster risk assessment and management Business service continuity management 24 Welcome to RITMAN 2012!

YunTech EOS Lab 25 Assistant Prof. Edward Chu at Yuntech University ( 國立雲林科技大學資工系 朱宗賢 助理教授 ) OpenISDM project at SINICA ( 中央研究院 OpenISDM 主題研究計畫,張韻詩教授 )

YunTech EOS Lab Case Study: Typhoon Morkot in Yunlin We compare MVR algorithm with three commonly-used route planning algorithms:  Greedy  NN (Nearest Neighbor)  HBF(Exhaustive search) 26

YunTech EOS Lab Effect of Starting Locations 27 Experiment Setup: Traveling distance (time) limit at 2 hours and consider only one volunteer

YunTech EOS Lab Effect of Traveling Distance - Single Volunteer 28 Experiment Setup: Varying the maximum traveling hours from 120 minutes to 200 minutes

YunTech EOS Lab Effect of Traveling Distance - Multiple Volunteers Experiment Setup: 3 volunteers come from three major cities in Yunlin County: Douliu, Huwei and Beigang. We varied the traveling time from 120 min to 200 min 29

YunTech EOS Lab Multiple Volunteer Routing Problem Goal:  We aim to s olve the multiple volunteer routing problem (mVoRP) to find routes for m responded volunteers such that the number of visited nodes by all of them is maximized Constraints (Given Parameters)  A directed graph  The number of participant  The traveling distance  Start points – Back to starting point  Similar to multiple traveling salesman problem Hamilton cycle  A path in an undirected graph that visits each vertex exactly once and the start node is the same as the end node 30

YunTech EOS Lab Hamilton Brute Force Algorithm Step 1: Search the one of connection node of start node and search the all Hamilton cycle that the path start from the start node and end in the connection node Step 2: Repeat Step 1 until all connection nodes of start node is chosen and calculation Step 3: Choose the most visited nodes of Hamilton cycle to set the path of volunteer Step 4: Update the visited nodes Step 5: Repeat Step 2 to 4 until each volunteer’s path is determined or all nodes are visited 31

YunTech EOS Lab Hamilton Brute Force Algorithm An example  The start node: B, The traveling distance:30  The final route of HBF: B->A->C->E->F->G->D->B 32