Virtual Disaster Management Information Repository Based on Linked Open Data Yi-Lung Chen 1, Jyun-You Lin 1, Tsung-Hsien Chu 1, Jane Win-Shih Liu 2, IEEE.

Slides:



Advertisements
Similar presentations
Distributed Algorithms for Mobile Sensor Networks Chelsea Sanders Ben Tullis.
Advertisements

Guang Tan, Stephen A. Jarvis, and Anne-Marie Kermarrec IEEE Transactions on Mobile Computing, VOL. 8, NO.6, JUNE Yun-Jung Lu.
Yu Stephanie Sun 1, Lei Xie 1, Qi Alfred Chen 2, Sanglu Lu 1, Daoxu Chen 1 1 State Key Laboratory for Novel Software Technology, Nanjing University, China.
Generated Waypoint Efficiency: The efficiency considered here is defined as follows: As can be seen from the graph, for the obstruction radius values (200,
Haiming Jin, He Huang, Lu Su and Klara Nahrstedt University of Illinois at Urbana-Champaign State University of New York at Buffalo October 22, 2014 Cost-minimizing.
Tsunamis Detection The Mission  Tsunamis Detection can help to minimize loss of life and property from future tsunamis. Mission Introduction Mechanism.
Delay-Minimized Route Design for Wireless Sensor-Actuator Networks Edith C.-H. Ngai 1, Jiangchuan Liu 2, and Michael R. Lyu 1 1 Department of Computer.
A Beacon-Less Location Discovery Scheme for Wireless Sensor Networks Lei Fang (Syracuse) Wenliang (Kevin) Du (Syracuse) Peng Ning (North Carolina State)
1 Multicast Routing with Minimum Energy Cost in Ad hoc Wireless Networks Xiaohua Jia, Deying Li and Frankie Hung Dept of Computer Science, City Univ of.
Localized Techniques for Power Minimization and Information Gathering in Sensor Networks EE249 Final Presentation David Tong Nguyen Abhijit Davare Mentor:
On the Construction of Energy- Efficient Broadcast Tree with Hitch-hiking in Wireless Networks Source: 2004 International Performance Computing and Communications.
Dynamic Medial Axis Based Motion Planning in Sensor Networks Lan Lin and Hyunyoung Lee Department of Computer Science University of Denver
Online Data Gathering for Maximizing Network Lifetime in Sensor Networks IEEE transactions on Mobile Computing Weifa Liang, YuZhen Liu.
1 Efficient Placement and Dispatch of Sensors in a Wireless Sensor Network Prof. Yu-Chee Tseng Department of Computer Science National Chiao-Tung University.
Geographic Routing Without Location Information A. Rao, C. Papadimitriou, S. Shenker, and I. Stoica In Proceedings of the 9th Annual international Conference.
Exposure In Wireless Ad-Hoc Sensor Networks S. Megerian, F. Koushanfar, G. Qu, G. Veltri, M. Potkonjak ACM SIG MOBILE 2001 (Mobicom) Journal version: S.
Real-time Video Streaming from Mobile Underwater Sensors 1 Seongwon Han (UCLA) Roy Chen (UCLA) Youngtae Noh (Cisco Systems Inc.) Mario Gerla (UCLA)
1 Algorithms for Bandwidth Efficient Multicast Routing in Multi-channel Multi-radio Wireless Mesh Networks Hoang Lan Nguyen and Uyen Trang Nguyen Presenter:
1 The Orphan Problem in ZigBee- based Wireless Sensor Networks IEEE Trans. on Mobile Computing (also in MSWiM 2007) Meng-Shiuan Pan and Yu-Chee Tseng Department.
CS 712 | Fall 2007 Using Mobile Relays to Prolong the Lifetime of Wireless Sensor Networks Wei Wang, Vikram Srinivasan, Kee-Chaing Chua. National University.
Fault Tolerant and Mobility Aware Routing Protocol for Mobile Wireless Sensor Network Name : Tahani Abid Aladwani ID :
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 2007 (TPDS 2007)
Topology Design for Service Overlay Networks with Bandwidth Guarantees Sibelius Vieira* Jorg Liebeherr** *Department of Computer Science Catholic University.
Mobility Limited Flip-Based Sensor Networks Deployment Reporter: Po-Chung Shih Computer Science and Information Engineering Department Fu-Jen Catholic.
救災資訊輔助系統 (Disaster Information Aid System) 學生 : 白繕維、林俊佑、陳以龍 Reference Acknowledgement [1] ]
Lyon, June 26th 2006 ICPS'06: IEEE International Conference on Pervasive Services 2006 Routing and Localization Services in Self-Organizing Wireless Ad-Hoc.
Introduction Research in wireless sensor network (WSN) is receiving lot of attention from the academia, as well as from industries, because of the enormous.
Network Aware Resource Allocation in Distributed Clouds.
WMNL Sensors Deployment Enhancement by a Mobile Robot in Wireless Sensor Networks Ridha Soua, Leila Saidane, Pascale Minet 2010 IEEE Ninth International.
Rate-based Data Propagation in Sensor Networks Gurdip Singh and Sandeep Pujar Computing and Information Sciences Sanjoy Das Electrical and Computer Engineering.
Topology aggregation and Multi-constraint QoS routing Presented by Almas Ansari.
Tracking with Unreliable Node Sequences Ziguo Zhong, Ting Zhu, Dan Wang and Tian He Computer Science and Engineering, University of Minnesota Infocom 2009.
IEEE Globecom 2010 Tan Le Yong Liu Department of Electrical and Computer Engineering Polytechnic Institute of NYU Opportunistic Overlay Multicast in Wireless.
Energy-Aware Scheduling with Quality of Surveillance Guarantee in Wireless Sensor Networks Jaehoon Jeong, Sarah Sharafkandi and David H.C. Du Dept. of.
Boundary Recognition in Sensor Networks by Topology Methods Yue Wang, Jie Gao Dept. of Computer Science Stony Brook University Stony Brook, NY Joseph S.B.
Prediction-based Object Tracking and Coverage in Visual Sensor Networks Tzung-Shi Chen Jiun-Jie Peng,De-Wei Lee Hua-Wen Tsai Dept. of Com. Sci. and Info.
DARP: Distance-Aware Relay Placement in WiMAX Mesh Networks Weiyi Zhang *, Shi Bai *, Guoliang Xue §, Jian Tang †, Chonggang Wang ‡ * Department of Computer.
1 A Distributed Algorithm for Joint Sensing and Routing in Wireless Networks with Non-Steerable Directional Antennas Chun Zhang *, Jim Kurose +, Yong Liu.
Machine Learning Approach to Report Prioritization with an Application to Travel Time Dissemination Piotr Szczurek Bo Xu Jie Lin Ouri Wolfson.
Multi-hop-based Monte Carlo Localization for Mobile Sensor Networks
Maximum Lifetime Routing in Wireless Sensor Networks by Collins Adetu Nicole Powell Course: EEL 5784 Instructor: Dr. Ming Yu.
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
P-Percent Coverage Schedule in Wireless Sensor Networks Shan Gao, Xiaoming Wang, Yingshu Li Georgia State University and Shaanxi Normal University IEEE.
Mobile Agent Migration Problem Yingyue Xu. Energy efficiency requirement of sensor networks Mobile agent computing paradigm Data fusion, distributed processing.
Bounded relay hop mobile data gathering in wireless sensor networks
Efficient Computing k-Coverage Paths in Multihop Wireless Sensor Networks XuFei Mao, ShaoJie Tang, and Xiang-Yang Li Dept. of Computer Science, Illinois.
An Evaluation of Routing Reliability in Non-Collaborative Opportunistic Networks Ling-Jyh Chen, Che-Liang Chiou, and Yi-Chao Chen Institute of Information.
Covering Points of Interest with Mobile Sensors Milan Erdelj, Tahiry Razafindralambo and David Simplot-Ryl INRIA Lille - Nord Europe IEEE Transactions on.
Tung-Wei Kuo, Kate Ching-Ju Lin, and Ming-Jer Tsai Academia Sinica, Taiwan National Tsing Hua University, Taiwan Maximizing Submodular Set Function with.
Performance of Adaptive Beam Nulling in Multihop Ad Hoc Networks Under Jamming Suman Bhunia, Vahid Behzadan, Paulo Alexandre Regis, Shamik Sengupta.
“Controlled Straight Mobility and Energy-Aware Routing in Robotic Wireless Sensor Networks ” Rafael Falcon, Hai Liu, Amiya Nayak and Ivan Stojmenovic
Ching-Ju Lin Institute of Networking and Multimedia NTU
KAIS T Using Mobile Relays to Prolong the Lifetime of Wireless Sensor Networks Wei Wang, Vikram Srinivasan, Kee-Chaing Chua MobiCom ‘05 Presentation by.
1 Energy-Efficient Mobile Robot Exploration Yongguo Mei, Yung-Hsiang Lu Purdue University ICRA06.
A Reliability-oriented Transmission Service in Wireless Sensor Networks Yunhuai Liu, Yanmin Zhu and Lionel Ni Computer Science and Engineering Hong Kong.
Resource Allocation in Hospital Networks Based on Green Cognitive Radios 王冉茵
Data Gathering in Wireless Sensor Networks with Mobile Collectors Ming Ma and Yuanyuan Yang State University of New York, Stony Brook 1 IEEE Parallel and.
U of Minnesota DIWANS'061 Energy-Aware Scheduling with Quality of Surveillance Guarantee in Wireless Sensor Networks Jaehoon Jeong, Sarah Sharafkandi and.
An Energy-Efficient Approach for Real-Time Tracking of Moving Objects in Multi-Level Sensor Networks Vincent S. Tseng, Eric H. C. Lu, & Kawuu W. Lin Institute.
Efficient Placement and Dispatch of Sensors in a Wireless Sensor Network You-Chiun Wang, Chun-Chi Hu, and Yu-Chee Tseng IEEE Transactions on Mobile Computing.
ProgessFace: An Algorithm to Improve Routing Efficiency of GPSR-like Routing Protocols in Wireless Ad Hoc Networks Chia-Hung Lin, Shiao-An Yuan, Shih-Wei.
Construction of Optimal Data Aggregation Trees for Wireless Sensor Networks Deying Li, Jiannong Cao, Ming Liu, and Yuan Zheng Computer Communications and.
A Maximum Fair Bandwidth Approach for Channel Assignment in Wireless Mesh Networks Bahador Bakhshi and Siavash Khorsandi WCNC 2008.
YunTech EOS Lab Crowdsourcing Support System for Disaster Surveillance and Response Edward T.-H Chu, Yi-Lung Chen, Jyun-You Lin National Yunlin University.
Crowdsourcing Information for Enhanced Disaster Situation Awareness and Emergency Preparedness and Response Edward T.-H Chu*, S. W. Chen** and Jane W.
Cost Effective Mobile and Static Road Side Unit Deployment for Vehicular Adhoc Networks Presenter: Yesenia Velasco (Senior in Computer Science) Department.
Jane W. S. Liu Institute of Information Science, Academia Sinica Fusion of Human Sensor Data and Physical Sensor Data.
Prof. Yu-Chee Tseng Department of Computer Science
Barrier Coverage with Optimized Quality for Wireless Sensor Networks
Dhruv Gupta EEC 273 class project Prof. Chen-Nee Chuah
Presentation transcript:

Virtual Disaster Management Information Repository Based on Linked Open Data Yi-Lung Chen 1, Jyun-You Lin 1, Tsung-Hsien Chu 1, Jane Win-Shih Liu 2, IEEE Fellow National Yunlin University of Science and Technology 1, Academia Sinica 2 Experiment As stated in our paper on strategies for crowdsourcing sensor data [1], in-situ sensor networks and remote sensor systems used to collect data for this purpose may not always provide the system with sufficiently complete and detailed view of the threatened area. Remote sensors may be ineffective due to weather. The area coverage of sensor networks and density of sensors deployed are often limited by costs, and existing sensors may be damaged. This is the primary reason that Southern Taiwan region were not adequately monitored by surveillance cameras and other sensors during Typhoon Morakot Disaster Surveillance System Crowd Command Center Path Threaten Area A disaster surveillance and response system must estimate boundaries of threatened areas, assess the threat potential and acquire situation awareness to support decisions on what alerts and warnings to issue when a disaster seems imminent. Crowdsourcing of Data Collection Motivation We simulated the scenario of Typhoon Morkot 2009, which swept through Taiwan over two days and caused the worst flooding in 50 years. In our simulation, we broadcast the request for data collection of Yunlin County to volunteers from two major universities in Yunlin County: National Yunlin University of Science Technology and National Formosa University. All participants start from either Touliu or Huwei. The speed of each participant is set at 0.3 km/min. In order to demonstrate the effectiveness of our multiple rescuer route algorithm, we compare it with a greedy algorithm (GRA) which first uses half of traveling distance to find a route that can visit the most number of nodes. It then adopts the same route back to the original point. Scenario of Typhoon Morakot 2009 The Number of Visited Nodes The Exploration Time We investigated the number of visited nodes of each algorithm under the constraint of traveling distance. The starting point of all participant is Douliu, Huwei, Dounan or Mailiao. According to our simulation results, our algorithm can visit more nodes than GRA algorithm. The maximum improvement can reach 70%. We also found that the starting point of participants can greatly affect the number of visited nodes. To evaluate the exploration time of each algorithm under the resource and equipment constraints, we simulated a 24-hour relay exploration in which only one participant is assigned to explore the threatened area at one time. We fixed the number of visited nodes. The exploration time is shown in the following figures. According to our simulation results, the proposed method always consumes less time than GRA in exploring the threatened areas. We design a crowdsourcing strategy to collect eye- witness reports needed to acquire situation awareness in the shortest time for given number, quality and mobility of human sensors in the threaten area. According to our experimental results, the proposed method performs better than GRA algorithm in both the number of visited nodes and exploration time. Limitation of Surveillance System in Major Disasters A Video Surveillance System [2] Reference [2] The Natural Hazard of Southern Taiwan after Typhoon Morakot 2009 Experiences with past major disasters tell us that people with wireless devices and social network services can be effective mobile human sensors. Eye- witness reports taken at right locations can provide invaluable information and enable a disaster warning and response system to mend blind regions in surveillance sensor coverage. System Architecture Crowdsourcing Flow A sensor data collection crowdsourcing process carries out three steps. First, the command center broadcasts a data collection request to a crowd via popular social networks (e.g. facebook, twitter, MSN, etc.) Second, the command center plans an exploration path for each participant in the crowd. Third, the paths are sent to the crowd. Multiple Disaster Rescuer Problem Broadcast a data collection request to a crowd through Web 2.0 applications Collect the traveling distance and location of each participant Use a directed graph to represent the threatened areas and determine an exploration path for each participant Each volunteer follows the path determined by the command center to explore the threatened areas The communication between the system and the crowd repeats until the system has a complete view Multiple Rescuer Route Algorithm We use a directed graph to represent the threatened area. Our goal is to maximize the number of visited nodes while satisfying the constraints of the direct graph, the number of participants, the traveling distance, starting and end points. If the starting points of all participants are the same, we found that the multiple disaster rescuer problem can be reduced to the traditional multiple traveling salesman problem which is known to be NP-hard. For this reason, we develop an heuristic algorithm, named multiple rescuer route algorithm to obtain an approximate solution. [3] Web 2.0 Crowdsourcing [3] V i : the nodes of graph m : the number of participants n : the number of nodes S i : the starting point of the i th participant D : the maximum traveling distance R i : the route of the i th participant Initialize the weight of each node; Initialize each R i ; For i = 1 to m For j = 1 to n If S i and node v j are connected R = Hamiton (S i, v j, D ); If R is better than R i R i = R ; End if End for Update the weight of visited nodes; End for V i : the nodes of graph m : the number of participants n : the number of nodes S i : the starting point of the i th participant D : the maximum traveling distance R i : the route of the i th participant Initialize the weight of each node; Initialize each R i ; For i = 1 to m For j = 1 to n If S i and node v j are connected R = Hamiton (S i, v j, D ); If R is better than R i R i = R ; End if End for Update the weight of visited nodes; End for Step 1: Initialize the weight of each node Step 2: Search all Hamilton paths and select the one with highest value Step 3: Update the weight of visited nodes Step 4: Repeat Step 2 and 3 until each participant’s path is determined or all nodes are visited Route Acknowledgement Location [1] Edward T.-H. Chu, Y.-L. Chen, J. W. S. Liu and J. K. Zao, 「 Strategies for Crowdsourcing for Disaster Situation Information, 」 In the 2nd International Conference on Disaster Management and Human Health: Reducing Risk, Improving Outcomes, Orlando, Florida, USA, May, This work was supported in part by Academia Sinica Taiwan under Grant AS-101-TP2-A01. Determine a path for the i-th participant Conclusion (Douliu, Huwei)(Dounan, Mailiao) (Douliu, Huwei)(Dounan, Mailiao)

Path Planning for Volunteers to Construct Crowdsourced Maps in Mega Disasters Yi-Lung Chen 1, Jyun-You Lin 1, Tsung-Hsien Chu 1, Jane Win-Shih Liu 2, IEEE Fellow National Yunlin University of Science and Technology 1, Academia Sinica 2 Experiment As stated in our paper on strategies for crowdsourcing sensor data [1], in-situ sensor networks and remote sensor systems used to collect data for this purpose may not always provide the system with sufficiently complete and detailed view of the threatened area. Remote sensors may be ineffective due to weather. The area coverage of sensor networks and density of sensors deployed are often limited by costs, and existing sensors may be damaged. This is the primary reason that Southern Taiwan region were not adequately monitored by surveillance cameras and other sensors during Typhoon Morakot Disaster Surveillance System Crowd Command Center Path Threaten Area A disaster surveillance and response system must estimate boundaries of threatened areas, assess the threat potential and acquire situation awareness to support decisions on what alerts and warnings to issue when a disaster seems imminent. Crowdsourcing of Data Collection Motivation We simulated the scenario of Typhoon Morkot 2009, which swept through Taiwan over two days and caused the worst flooding in 50 years. In our simulation, we broadcast the request for data collection of Yunlin County to volunteers from two major universities in Yunlin County: National Yunlin University of Science Technology and National Formosa University. All participants start from either Touliu or Huwei. The speed of each participant is set at 0.3 km/min. In order to demonstrate the effectiveness of our multiple rescuer route algorithm, we compare it with a greedy algorithm (GRA) which first uses half of traveling distance to find a route that can visit the most number of nodes. It then adopts the same route back to the original point. Scenario of Typhoon Morakot 2009 The Number of Visited Nodes The Exploration Time We investigated the number of visited nodes of each algorithm under the constraint of traveling distance. The starting point of all participant is Douliu, Huwei, Dounan or Mailiao. According to our simulation results, our algorithm can visit more nodes than GRA algorithm. The maximum improvement can reach 70%. We also found that the starting point of participants can greatly affect the number of visited nodes. To evaluate the exploration time of each algorithm under the resource and equipment constraints, we simulated a 24-hour relay exploration in which only one participant is assigned to explore the threatened area at one time. We fixed the number of visited nodes. The exploration time is shown in the following figures. According to our simulation results, the proposed method always consumes less time than GRA in exploring the threatened areas. We design a crowdsourcing strategy to collect eye- witness reports needed to acquire situation awareness in the shortest time for given number, quality and mobility of human sensors in the threaten area. According to our experimental results, the proposed method performs better than GRA algorithm in both the number of visited nodes and exploration time. Limitation of Surveillance System in Major Disasters A Video Surveillance System [2] Reference [2] The Natural Hazard of Southern Taiwan after Typhoon Morakot 2009 Experiences with past major disasters tell us that people with wireless devices and social network services can be effective mobile human sensors. Eye- witness reports taken at right locations can provide invaluable information and enable a disaster warning and response system to mend blind regions in surveillance sensor coverage. System Architecture Crowdsourcing Flow A sensor data collection crowdsourcing process carries out three steps. First, the command center broadcasts a data collection request to a crowd via popular social networks (e.g. facebook, twitter, MSN, etc.) Second, the command center plans an exploration path for each participant in the crowd. Third, the paths are sent to the crowd. Multiple Disaster Rescuer Problem Broadcast a data collection request to a crowd through Web 2.0 applications Collect the traveling distance and location of each participant Use a directed graph to represent the threatened areas and determine an exploration path for each participant Each volunteer follows the path determined by the command center to explore the threatened areas The communication between the system and the crowd repeats until the system has a complete view Multiple Rescuer Route Algorithm We use a directed graph to represent the threatened area. Our goal is to maximize the number of visited nodes while satisfying the constraints of the direct graph, the number of participants, the traveling distance, starting and end points. If the starting points of all participants are the same, we found that the multiple disaster rescuer problem can be reduced to the traditional multiple traveling salesman problem which is known to be NP-hard. For this reason, we develop an heuristic algorithm, named multiple rescuer route algorithm to obtain an approximate solution. [3] Web 2.0 Crowdsourcing [3] V i : the nodes of graph m : the number of participants n : the number of nodes S i : the starting point of the i th participant D : the maximum traveling distance R i : the route of the i th participant Initialize the weight of each node; Initialize each R i ; For i = 1 to m For j = 1 to n If S i and node v j are connected R = Hamiton (S i, v j, D ); If R is better than R i R i = R ; End if End for Update the weight of visited nodes; End for V i : the nodes of graph m : the number of participants n : the number of nodes S i : the starting point of the i th participant D : the maximum traveling distance R i : the route of the i th participant Initialize the weight of each node; Initialize each R i ; For i = 1 to m For j = 1 to n If S i and node v j are connected R = Hamiton (S i, v j, D ); If R is better than R i R i = R ; End if End for Update the weight of visited nodes; End for Step 1: Initialize the weight of each node Step 2: Search all Hamilton paths and select the one with highest value Step 3: Update the weight of visited nodes Step 4: Repeat Step 2 and 3 until each participant’s path is determined or all nodes are visited Route Acknowledgement Location [1] Edward T.-H. Chu, Y.-L. Chen, J. W. S. Liu and J. K. Zao, 「 Strategies for Crowdsourcing for Disaster Situation Information, 」 In the 2nd International Conference on Disaster Management and Human Health: Reducing Risk, Improving Outcomes, Orlando, Florida, USA, May, This work was supported in part by Academia Sinica Taiwan under Grant AS-101-TP2-A01. Determine a path for the i-th participant Conclusion (Douliu, Huwei)(Dounan, Mailiao) (Douliu, Huwei)(Dounan, Mailiao)