Advertisement

Accommodating Information Priority Model in Cloudlet Environment

  • Teuku Aulia GeumpanaEmail author
  • Fethi Rabhi
  • Liming Zhu
Conference paper
Part of the Lecture Notes in Business Information Processing book series (LNBIP, volume 234)

Abstract

Massive amounts of data during disaster situations require timely collection and analysis for the emergency team to mitigate the impact of the disaster under challenging social-technical conditions. The absence of Internet or its intermittent and bandwidth-constraint connection in disaster areas may exacerbate and disrupt the data collection process which may prevent some vital information to reach the control room in time for immediate response. Regardless the rare connection in the disaster area, there is a need to group information acquired during the response into a specific information model which accommodates different information priority levels. This is to establish a proper mechanism in transmitting higher prioritized information to the control room before other information. The purpose of this paper is to propose an information priority model and system architectures for data collection under challenging conditions in disaster areas.

Keywords

Information priority model Adaption mechanism  Disaster response Disaster Management Metamodel 

Notes

Acknowledgements

We would like to thank the anonymous reviewers for their comments and suggestions that help us improve the paper. Special thanks to Architecture & Analytics Platforms (AAP) team of Data61 | CSIRO for helping us shape up the initial direction of this research. This work is partly funded through top up scholarships from Data61 | CSIRO and the Australia’s Cooperative Research Centre Program for Spatial Information (CRCSI).

References

  1. 1.
    Smith, M.: NSW RFS Communication Model, March 2016. Geumpana, T. (ed.)Google Scholar
  2. 2.
    Truong, H.-L., Manzoor, A., Dustdar, S.: On modeling, collecting and utilizing context information for disaster responses in pervasive environments. In: Proceedings of the First International Workshop on Context-Aware Software Technology and Applications, pp. 25–28. ACM, Amsterdam (2009)Google Scholar
  3. 3.
    Lu, Y., Yang, D.: Information exchange in virtual communities under extreme disaster conditions. Decis. Support Syst. 50(2), 529–538 (2011)CrossRefGoogle Scholar
  4. 4.
    Cheng, E.W.L., Li, H.: Information priority-setting for better resource allocation using analytic hierarchy process (AHP). Inf. Manage. Comput. Secur. 9(2), 61–70 (2001)CrossRefGoogle Scholar
  5. 5.
    Zuo, P., et al.: BEES: bandwidth-and energy-efficient image sharing for real-time situation awareness. In: 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS). IEEE (2017)Google Scholar
  6. 6.
    Turoff, M., et al.: The design of a dynamic emergency response management information system (DERMIS). JITTA: J. Inf. Technol. Theory Appl. 5(4), 1 (2004)Google Scholar
  7. 7.
    Chen, R., et al.: Coordination in emergency response management. Commun. ACM 51(5), 66–73 (2008)CrossRefGoogle Scholar
  8. 8.
    Zhang, Z., et al.: Modelling the information flows during emergency response. In: 2011 19th International Conference on Geoinformatics. IEEE (2011)Google Scholar
  9. 9.
    Inan, D.I., Beydoun, G., Opper, S.: Agent-based knowledge analysis framework in disaster management. Inf. Syst. Frontiers, 1–20 (2017)Google Scholar
  10. 10.
    Barrantes, S.A., Rodriguez, M., Pérez, R.: Information Management and Communication in Emergencies and Disasters. Pan American Health Organization (2009)Google Scholar
  11. 11.
    Kusumasari, W., et al.: Technical guidelines for health crisis responses on disaster. In: Guidelines for Health Workers Involved in Health Crisis Responses on Disaster in Indonesia, p. 228. The Ministry of Health of Republic of Indonesia, Jakarta (2011)Google Scholar
  12. 12.
    Othman, S.H., Beydoun, G., Sugumaran, V.: Development and validation of a Disaster Management Metamodel (DMM). Inf. Process. Manage. 50(2), 235–271 (2014)CrossRefGoogle Scholar
  13. 13.
    Shaukat, U., et al.: Cloudlet deployment in local wireless networks: motivation, architectures, applications, and open challenges. J. Network Comput. Appl. 62, 18–40 (2016)CrossRefGoogle Scholar
  14. 14.
    Chen, M., et al.: On the computation offloading at ad hoc cloudlet: architecture and service modes. IEEE Commun. Mag. 53(6), 18–24 (2015)CrossRefGoogle Scholar
  15. 15.
    Bahtovski, A., Gusev, M.: Cloudlet Challenges. Procedia Eng. 69, 704–711 (2014)CrossRefGoogle Scholar
  16. 16.
    Simanta, S., Ha, K., Lewis, G., Morris, E., Satyanarayanan, M.: A reference architecture for mobile code offload in hostile environments. In: Uhler, D., Mehta, K., Wong, J.L. (eds.) MobiCASE 2012. LNICST, vol. 110, pp. 274–293. Springer, Heidelberg (2013).  https://doi.org/10.1007/978-3-642-36632-1_16CrossRefGoogle Scholar
  17. 17.
    Mahadev, S., et al.: The case for VM-based cloudlets in mobile computing. IEEE Pervasive Comput. 8(4), 14–23 (2009)CrossRefGoogle Scholar
  18. 18.
    Li, J., et al.: Capacity of ad hoc wireless networks. In: Proceedings of the 7th Annual International Conference on Mobile Computing and Networking. ACM (2001)Google Scholar
  19. 19.
    Reynisson, J.Á.: Performance of mobile GIS in conjunction with internet bandwidth in rural areas (2015)Google Scholar

Copyright information

© Springer International Publishing AG 2018

Authors and Affiliations

  • Teuku Aulia Geumpana
    • 1
    Email author
  • Fethi Rabhi
    • 1
  • Liming Zhu
    • 2
  1. 1.School of Computer Science and EngineeringThe University of New South WalesSydneyAustralia
  2. 2.Data61 | CSIRO, Software and Computational SystemsSydneyAustralia

Personalised recommendations