17,757 research outputs found

    Developing an Efficient DMCIS with Next-Generation Wireless Networks

    Get PDF
    The impact of extreme events across the globe is extraordinary which continues to handicap the advancement of the struggling developing societies and threatens most of the industrialized countries in the globe. Various fields of Information and Communication Technology have widely been used for efficient disaster management; but only to a limited extent though, there is a tremendous potential for increasing efficiency and effectiveness in coping with disasters with the utilization of emerging wireless network technologies. Early warning, response to the particular situation and proper recovery are among the main focuses of an efficient disaster management system today. Considering these aspects, in this paper we propose a framework for developing an efficient Disaster Management Communications and Information System (DMCIS) which is basically benefited by the exploitation of the emerging wireless network technologies combined with other networking and data processing technologies.Comment: 6 page

    A Secure Lightweight Approach of Node Membership Verification in Dense HDSN

    Full text link
    In this paper, we consider a particular type of deployment scenario of a distributed sensor network (DSN), where sensors of different types and categories are densely deployed in the same target area. In this network, the sensors are associated with different groups, based on their functional types and after deployment they collaborate with one another in the same group for doing any assigned task for that particular group. We term this sort of DSN as a heterogeneous distributed sensor network (HDSN). Considering this scenario, we propose a secure membership verification mechanism using one-way accumulator (OWA) which ensures that, before collaborating for a particular task, any pair of nodes in the same deployment group can verify each other-s legitimacy of membership. Our scheme also supports addition and deletion of members (nodes) in a particular group in the HDSN. Our analysis shows that, the proposed scheme could work well in conjunction with other security mechanisms for sensor networks and is very effective to resist any adversary-s attempt to be included in a legitimate group in the network.Comment: 6 page

    Comparative analysis of spring flood risk reduction measures in Alaska, United States and the Sakha Republic, Russia

    Get PDF
    Thesis (Ph.D.) University of Alaska Fairbanks, 2017River ice thaw and breakup are an annual springtime phenomena in the North. Depending on regional weather patterns and river morphology, breakups can result in catastrophic floods in exposed and vulnerable communities. Breakup flood risk is especially high in rural and remote northern communities, where flood relief and recovery are complicated by unique geographical and climatological features, and limited physical and communication infrastructure. Proactive spring flood management would significantly minimize the adverse impacts of spring floods. Proactive flood management entails flood risk reduction through advances in ice jam and flood prevention, forecasting and mitigation, and community preparedness. With the goal to identify best practices in spring flood risk reduction, I conducted a comparative case study between two flood-prone communities, Galena in Alaska, United States and Edeytsy in the Sakha Republic, Russia. Within a week from each other, Galena and Edeytsy sustained major floods in May 2013. Methods included focus groups with the representatives from flood managing agencies, surveys of families impacted by the 2013 floods, observations on site, and archival review. Comparative parameters of the study included natural and human causes of spring floods, effectiveness of spring flood mitigation and preparedness strategies, and the role of interagency communication and cooperation in flood risk reduction. The analysis revealed that spring flood risk in Galena and Edeytsy results from complex interactions among a series of natural processes and human actions that generate conditions of hazard, exposure, and vulnerability. Therefore, flood risk in Galena and Edeytsy can be reduced by managing conditions of ice-jam floods, and decreasing exposure and vulnerability of the at-risk populations. Implementing the Pressure and Release model to analyze the vulnerability progression of Edeytsy and Galena points to common root causes at the two research sites, including colonial heritage, unequal distribution of resources and power, top-down governance, and limited inclusion of local communities in the decision-making process. To construct an appropriate flood risk reduction framework it is important to establish a dialogue among the diverse stakeholders on potential solutions, arriving at a range of top-down and bottom-up initiatives and in conjunction selecting the appropriate strategies. Both communities have progressed in terms of greater awareness of the hazard, reduction in vulnerabilities, and a shift to more reliance on shelter-in-place. However, in neither community have needed improvements in levee protection been completed. Dialogue between outside authorities and the community begins earlier and is more intensive for Edeytsy, perhaps accounting for Edeytsy's more favorable rating of risk management and response than Galena's

    INTERFACE MODE ASSIGNMENT METHOD FOR SELF-RECONSTRUCTION OF WIRELESS MESH NETWORKS

    Get PDF
    The key features of computer networks available for disaster situation is reliable, fault tolerance and self-configurable. Therefore, using wireless mesh network for disaster prevention and recover system has gain much attention from the research community in last decades. In addition, from the practical aspects of the network infrastructures of the disaster system, we should assume the core capabilities such as wireless connectivity in wide range, ease of use, and low cost so on. In this paper, we propose an interface mode assignment method for reconstructing a route from an isolated router to a gateway (GW) router in a wireless mesh network based on IEEE 802.11 infrastructure mode after a disaster occurrance. The proposed method assigns an adequate mode to each interface in an isolated router to recover the network reachability in distributed manner. Simulation results show the effectiveness of the proposed method via two different scenarios

    Physics-Based Swarm Intelligence for Disaster Relief Communications

    Get PDF
    This study explores how a swarm of aerial mobile vehicles can provide network connectivity and meet the stringent requirements of public protection and disaster relief operations. In this context, we design a physics-based controlled mobility strategy, which we name the extended Virtual Force Protocol (VFPe), allowing self-propelled nodes, and in particular here unmanned aerial vehicles, to fly autonomously and cooperatively. In this way, ground devices scattered on the operation site may establish communications through the wireless multi-hop communication routes formed by the network of aerial nodes. We further investigate through simulations the behavior of the VFPe protocol, notably focusing on the way node location information is disseminated into the network as well as on the impact of the number of exploration nodes on the overall network performance.Comment: in International Conference on Ad Hoc Networks and Wireless, Jul 2016, Lille, Franc

    An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applications

    Full text link
    Mobile Ad Hoc Network (MANET) is a collection of two or more devices or nodes or terminals with wireless communications and networking capability that communicate with each other without the aid of any centralized administrator also the wireless nodes that can dynamically form a network to exchange information without using any existing fixed network infrastructure. And it's an autonomous system in which mobile hosts connected by wireless links are free to be dynamically and some time act as routers at the same time, and we discuss in this paper the distinct characteristics of traditional wired networks, including network configuration may change at any time, there is no direction or limit the movement and so on, and thus needed a new optional path Agreement (Routing Protocol) to identify nodes for these actions communicate with each other path, An ideal choice way the agreement should not only be able to find the right path, and the Ad Hoc Network must be able to adapt to changing network of this type at any time. and we talk in details in this paper all the information of Mobile Ad Hoc Network which include the History of ad hoc, wireless ad hoc, wireless mobile approaches and types of mobile ad Hoc networks, and then we present more than 13 types of the routing Ad Hoc Networks protocols have been proposed. In this paper, the more representative of routing protocols, analysis of individual characteristics and advantages and disadvantages to collate and compare, and present the all applications or the Possible Service of Ad Hoc Networks.Comment: 24 Pages, JGraph-Hoc Journa

    Managing post-disaster reconstruction finance -- international experience in public financial management

    Get PDF
    In recent years, natural and man-made disasters have confronted the international community with its most demanding reconstruction challenges since the aftermath of World War II. Managing the inflow of resources and spending those resources well have proven to be two of the main difficulties in such reconstruction projects, particularly after large-scale disasters. A central dilemma of the public financial management of reconstruction is the need for very high levels of accountability to demonstrate fiduciary credibility, while at the same time ensuring the rapid implementation of recovery programs. This paper identifies options and lessons for managing post-disaster reconstruction finance in three key areas: (i) the establishment of special institutions to manage the reconstruction process; (ii) the selection of public financial management systems with respect to the application of country systems, special fiduciary arrangements, or donor/NGO execution; and (iii) monitoring and evaluation systems. The authors synthesize the phasing of assistance and approaches in eight recent post-natural disaster reconstruction efforts (Aceh-Indonesia, Yogyakarta-Indonesia, Sri Lanka, Maldives, Pakistan, Colombia, Grenada, and Honduras) to help guide the priorities and options for future instances of public financial management for disaster reconstruction. The paper also compares the challenges posed by post-conflict versus post-natural disaster public financial management.Natural Disasters,Disaster Management,Post Conflict Reconstruction,Social Accountability,Post Conflict Reintegration

    Working on Faith: A Faithful Response to Worker Abuse in New_Orleans

    Get PDF
    When Hurricane Katrina battered New Orleans in August of 2005 and thousands were left stranded in the city, the winds exposed New Orleans' twin plagues of poverty and racism.New Orleans is the face of preventable exploitation. As this report illustrates, the DOL has been ill-equipped to deal with the scale and spread of employer lawlessness that has overtaken the Gulf Coast. Therefore, IWJ is creating the Interfaith Worker Justice Center of New Orleans (IWJ-NOLA) with the mission to respect work, rebuild community and restore hope. In tandem with the religious community and allies from organized labor, IWJ calls on the DOL to collaborate with IWJ-NOLA to empower workers, promote fair and legal labor practices, and work for good jobs for all workers, including those who have not been able to return to their city
    corecore