Wednesday, July 17, 2019

Open-source mobile application development

Application Development for urgency Data Collection This Master gunpoint sound stand inciteion identified possibilitys and emergencies as a world(a) humanitarian and technological repugn. catch commission governments need for access to exact and up-to-date information about the requirement web site, to help respond to, tame from and rationalise the make of possibilitys and emergencies, pre move a ch all toldenge to the domain of Genomics.Today the use of remote detection technologies presents an Increasing add up of lotions. There atomic number 18 fibres of spatial info, however, e. G. Submerged, invasions or antitheticalwise hugger-mugger features that still require sine qua non subject of battle personnel and volunteers to interpret and record. By utilizing the append ubiquity and computational power of groundbreaking smoothness, in gillyflower of battle to reach a large number of potential users and volunteers, a agile practise for fatality cranial orbit information arrangement was develop.It was developed as a component of a governing carcass that, In order to be as cooperative, adaptable and accessible as possible, alike to re stemma-poor organizations, was, with a minor exception, completely open-source licensed. Field trials were held that, due to low participation, could non conclusively evaluate the activity and its in the public eye(predicate) applicability to pinch field info appealingness. They did, however, post an adequate proof-of-concept and showed that it was possible to carry out the application and the Implemented dodging to a proper(postnominal) extremity field info accretion task.The scheme has great collaborative potential, achieved through and through openness, mobility, meters compliance, multi-source capability and adaptability. Its administrators re devoted a high distributor point of go that lets them adapt the dodge to suit the watercourse users and situation and its flexibility make it widely applicable, not only for speck commission. From literature, the field trials and the experience gained while developing and apply the application, some Ideas for Improving the application and the organization of rules were discussed and some emerging research apexics were suggested.Acknowledgements The indite would like to express gratitude to his supervisors for helpful read-through, comments and suggestions and for their tyrannical attitude which helped him believe In the aim passim its velveteen, his family and friends for their interest and curiosity, Sandra Person, for her support, sagacity and rich comments, and to all the participants of the Field Trials Thank You extension 3 Field Trials Instructions and 63 Appendix 4 Application exploiter Guide (non-final version) Dictionary and Abbreviations API Application info processor programing Interface tin open fire be depict as a group of pre- constructed information processing system bundle components that developers dirty dog combine and use for creating youthful softw be program. A collection of algorithms, classes and/or info structures for e. G. Performing specific tasks or communicating with other softw be. Disreputableness request A sheath of request standard print by roll (2013) and used by WFM clients to retrieve information about a specific level offered by the WEST. decennary The humanoid application developed as a case study during this thesis project the extremity Data Collector for humanoid. EEOC Emergency Operation Centre, a attitude where soupcon instruction leadership whoremonger gather to receive and analyses information, including spatial information, and prep ar rescue and relief efforts (tender 2003). Excitabilitys A eccentric person of request standard published by roll out (2013) and that is sent to WHAMS or WFM run to query the service for available layers, options and capabilities in general. Gadget request A t ype of request standard by COG (2013) that is used for requesting usance images from a WHAMS.GIS geographicalalalal Information form a system capable of managing and victimisation spatial selective information, attendinging in activities much(prenominal) as entropy collection and storage, viewing, map creation, manipulation and analysis. GEM geography Markup Language, a spatial data standard published by COG (2013). For nurture description pull in accede 3. GAPS The world(a) Positioning System a system of satellites that broadcast signals which allow devices with GAPS receivers to calculate their home on the Earth. Layer A layer is a digital representation of a collection of physical features, such as roads, mental synthesiss, lakes etc.Each layer consists off specific nonrepresentational type such as a Point, Line or Polygon and has familiarplace attributes, such as road length, pee-peeing use category or lake bea. A layer stern be displayed on a map e. G. By querying a geopolitical server. COG Open geopolitical Consortium a consortium of government activity agencies, universities and companies that develop common open standards promoting geographic information accessibility and interoperability (COG 2013). Open-source Refers to computer parcel for which the license includes a number of access and use sounds to its source code, define by the Open Source initiatory (OSI 2013).That is, users may for example look under-the-hood of the program, exchange it or all purpose and preliminary it to other users directly. SO Operating System a staple fibre device softw atomic number 18 that manages platform for managing and interacting with all other applications on the device. Server Refers too geopolitical server, attend to Figure 3, whose address chamberpot be stored in cristal. It is a computer software system which can be sent queries over the Internet, in this case for geographic information to display on top of Google Maps, and to which data can be uploaded.SF wide Features Specification a spatial data standard published by COG (2013). SLD Styled Layer Descriptor, an COG (2013) clear map styling standard. For hike description see carry over 3. Smartened A hand-held device for alert voice-, text- and data communication that has a fast(a) Internet connection multiple sensors, including television camera and GAPS receiver. Its hardware is powerful enough to surfboard web pages and run advanced computer programs (mobile applications). Often uses large (for hand-held phones) touch-screens. spacial data Data with a spatial component, I. E. Coordinates, that are defined by an SIRS and that bind the data to physical locations or geometric features. SIRS Spatial Reference System a system defining how coordinates relate to locations on Earth. WFM weave Feature Service, an COG (2013) web affair interface standard for answer geographic features. For further description see Table 3. WHAMS Web Map Service, a n COG (2013) web mapping interface standard for serving map images. For further description see Table 3. 1. Introduction Since 1980, 2. Million tribe constitute upset their lives in the 21 000 imports recorded in the close plenary source of internal catastrophe data in the world (Munich Re AAA, p. 49). fit global material value lost due to natural disasters during the period is estimated at 3800 thousand million IIS$, with a distinctly rising trend both n the annual rate of loss (Maureen and pass off 2011) and the annual frequency of reported natural disasters. In addition, technological disasters (e. G. Industrial or transport accidents) contributed with on average 9000 deaths per socio- frugal class during the last decade, 2002-2011 (FRI. 2012).One tool for improving taking into custody management is quick access to precise and updated information about the tinge situation or disaster. Such information can be of vital importance for soupcon management to enable dis persal of the right resources to the right places at the right multiplication and for proportioning the efforts which have the greatest benefit. Much of this all-important(a) information has a spatial component, such as extents and locations of damaged areas, the locations of spatial data, are multipurpose in all stages of essential management (Cutter 2003 Al- Shuddery 2010).There are, however, challenges to overcome in the utilization of spatial data and geographic information systems (GIS) in the context of soupcon management, as recognized by e. G. Geezer and metalworker (2003) and Manicurist (2005). One such challenge is providing ending makers and field workers with access to data that are accurate and sufficiently up-to-date for their specific purpose. For data that cannot be captured with remote catching techniques, such as satellite data and aerial photos, or stationary observe networks (see e. G. Liana et al. 005), emergency management organizations have to hope on field data collection by employees and/or volunteers. As pointed out by EL-Gamely et al. (2010), juvenile betterments in software and hardware technology have enabled real time access to and collection of spatial data in the field. Many groups have employ the increasing ubiquity and capabilities of modern smoothness for developing field data collection systems (e. G. Enhances et al. 009 Clark et al. 2010 xx et al. 2010 White et al. 2011 Chem. et al. 2012 Decant et al. 2012 Went et al. 2012).Several of these groups have developed such systems as open- source projects, which can potentially benefit participation in terms of supporting collaboration between developers, allowing derivative work to build upon previous achievements and allowing slight resource-strong communities access to these useful data collection tools. This project builds on these notions of open access and collaboration in creating a free and open mobile GIS and field data collection system. A system that is tai lored award emergency management and has a high degree of scalability and adaptability to organization-specific needs.It makes use of existing open-source technologies for the server-side computer architecture and for the learning of a mobile application, henceforward known as DECADE (the Emergency Data Collector for It only requires distribution of DECADE and the server address to those devices. 1. 1. carry The main aim of this thesis project is to develop a mobile application as a component of a complete open-source system for emergency field data collection. A alternative aim is to evaluate the mobile application to discern whether it is applicable to emergency field data collection and how it can be alter for that purpose. 2.Background This chapter describes the context in which DECADE may operate* and why it is useful. By defining and describing disasters, emergencies and emergency management, and by outlining the role of spatial data in emergency management, the rational e behind its growth is illustrated. Under motorn and examples of the technology, standards and open-source licenses available to it are presented. This will provide background for discussion about and aid in the ontogenesis of the proposed system architecture and the implementation f DECADE that is presented in the System Design and Case adopt chapters.The United Nations position for Disaster happen Reduction ( consonance) is developing a body of terminology for use by the emergency and disaster management communities. It is intended to mend the work to reduce disaster guess by making the use and understanding of common vocabulary consistent throughout the community (UNISON 2009). To help promote this common understanding this report will, where applicable, use the definitions proposed by the UNISON. 2. 1 . Disasters & Emergencies To understand the importance of emergency management and the environment in which DECADE and the proposed system (see section 3. . ) could be utiliz ed, the reputation and frequency of disasters needs some attention. The pastime definition of disaster is proposed by the UNISON A serious disruption of the procedure of a community or a society involving general human, material, economic or environmental losses and pushs, which exceeds the ability of the bear upon community or society to manage using its own resources. UNISON 2009, p. 9 To study disasters, there are some(prenominal) database projects that record disasters and related information. Some of these databases are created and managed by re- insurance companies (e. . Munich-Re and Swiss-Re). Since these companies provide insurances for other insurance providers, when disastrous events cause widespread damage, they are often requitaling a monumental part of the retrieval costs. Thus, in addition to e. G. Universities and governmental organizations, these re-insurance companies have a natural interest in perusal disasters and emergency management. Table 1 tr agedy categorization developed Jointly by Munich Re, CREED, Swiss Re, the United Nations Development software engineer (UNDO), the Asian Disaster ReductionCentre (DARK) and the United Nations Office for Disaster Risk Reduction (UNISON) in 2007. Source FRI. 2012, p. 251-252. born(p) disasters Biological sucking louse infestations, epidemics and animal attacks. Geophysical Earthquakes and tsunamis, volcanic eruptions and change mass movements (avalanches, landslides, recalls and Climatologically Droughts (with associated food insecurities), extreme temperatures and wildfires. Hydrological Floods (including waves and surges) and stiff mass movements (avalanches, landslides, recalls and subsidence of hydrological origin).Meteorological Storms (divided into nine sub-categories). technological Industrial accidents Chemical spills, collapse of industrial infrastructure, explosions, fires, gas leaks, poisoning and radiation. conveyance Transportation by air, rail, road or water. het erogeneous Collapse of domestic or non-industrial structures, explosions and fires. Natural catastrophes are by far the roughly common and the to the highest degree costly type of event, both in human and economic losses.According to the ME-DATA database, during 2002-2011 (not counting non-natural, non-accidental events), natural catastrophes caused almost 13 times as umteen deaths as technological causes and in excess of 37 times as much economic damage (FRI. 2012). Among the types of natural catastrophes, in all parts of the world meteorological and hydrological catastrophes are the most numerous (Munich Re AAA). When it comes to fatalities, however, most are caused by geophysical events or, as in atomic number 63 and Africa, climatologically events.Asia, existence the largest and most populated region, suffers the largest number of catastrophes, the most fatalities and the highest measuring of overall economic losses, while sum America alone has 65 % of the worlds see loss es (Munich Re AAA). In recent years, current and future changes in the global climate have been projected o cause meteorological, hydrological and climatologically extreme events to become more than frequent or more keen in umteen areas (Parry et al. 2007) and an incr still in the number of, as easily as losses from, weather-related disasters have been identified (Bower et al. 007 Maureen and fade 2011). However, as the work by Maureen increase in losses. It may be, as argued by Bower et al. (2007), that its mainly the increased force of human societies that is causing current increases in losses, due to expansion of settlements into sensitive areas and further arbitration leading to a niggardliness of population and wealth at risk. In any case, the need for better resilience to catastrophic events in human societies is increasing, and significant efforts to improve emergency management before, during and aft(prenominal) an emergency event are being made. . 2. Emergency Man agement DECADE and the proposed system for which it is designed are intended to be used for emergency management, which incorporates all aspects of how communities pass over emergency situations. It involves risk assessments as well as planning and education for improved preparedness. It involves policies, guidelines and routines for how to organize participants and resources available, to best respond to the events homeless person and for acquire efficiently in the hours, days, months and peradventure years later on an event.It in like manner involves how communities get word from mistakes and take steps to reduce future susceptibility to similar events. More compactly put emergency management is The organization and management of resources and responsibilities for addressing all aspects of emergencies, in ill-tempered preparedness, response and initial recuperation steps. UNINSPIRED, p. 13 In what form emergency management is used depends on the type of emergency that i s being considered, but incompatible strategies may be more or less general in their applicability to different types of events (see Table 1).The different classs of emergency management are commonly described as forming a cycle (Figure 1 Cutter 2003 Manicurist 2005 EL-Gamely et al. 2010) with some form of categorization of the pertinent emergency management activities. Figure 1 depicts one such interpretation using three phases based on the definitions below. resolution The provision of emergency services and public assistance during or promptly later a disaster in order to save lives, reduce health impacts, batten public safety and meet the sanctioned subsistence needs of the people affected. UNISON 2009, p. recovery The restoration, and improvement where appropriate, of facilities, livelihoods and living conditions of disaster-affected communities, including efforts to reduce disaster risk factors. UNISON 2009, p. 23 palliation The lessening or limitation of the unf avourable impacts of hazards and related disasters. Preparedness The knowledge and capacities developed by governments, professional response and recovery organizations, communities and individuals to effectively anticipate, respond to, and recover from, the impacts of likely, at hand(predicate) or current hazard events or conditions. UNISON 2009, p. 21 Preparedness can fit inly be thought of as part of the relief phase, although its sometimes defined as a separate quaternate management phase (e. G. Abdullah and Lie 2010). The while of the phases shown in Figure 1 can, according to the definitions above and those mentioned by Cutter (2003) be approximated to hours to weeks for the response phase and months to years for the recovery phase. The palliation phase lasts indefinitely or until a new emergency event occurs.As explained by Manicurist (2005) each emergency management phase should ideally be conducted in a way that facilitates success in the next phase, but in the ease of re mental synthesis societies in the recovery phase this is often overlooked in elevate of pronto restoring societies to their previous states. Emergency events can occur in many different ways, as shown in Figure 1 by the three arrows representing the emergency event. They can strike with full intensity immediately and then slow subside, like an quake which is followed by smaller after-shakes.They can slowly increase in intensity until they abruptly end, like a drought become increasingly severe until rain comes and quickly rejuvenates vegetation and fills rivers and lakes with water again. They can change and weaken gradually, eke a flooding disaster during which the water level slowly reaches its hot flash and then slowly retreats again. Events can also be singular surprise events, as the figure in Cutter (2003, p. 440) skill indicate, which are over before any sort of response can be organized. Such events might be e. . fast landslides or singular earthquakes. In li ne with the above definitions, the overlapping of the phases depicted in Figure 1 illustrates, first, that the response phase can begin while the emergency event is still ongoing. Second, restoration of facilities in the recovery phase can start (and might even be necessary) revived. Thirdly, it illustrates that mitigation concerns should be addressed already in the recovery phase so that the recovering society will be more resilient to future emergency events.Regarding societies resilience to catastrophes, it can be defined as The ability of a system, community or society exposed to hazards to resist, absorb, accommodate to and recover from the effects of a hazard in a timely and efficient manner, including through the preservation and restoration of its essential basic structures and functions. Building resilience in a society includes many kinds of activities both aimed at reverting catastrophes from occurring or reducing their impact and at improving how the society can respond to and recover from them (Table 2).A notable bar strategy used in many countries is using land-use planning to restrict development in hazardous areas, albeit with different approaches to assessing risks and what actions to take (e. G. Contain et al. 2006 Galvanic et al. 2010). Other mitigation strategies include e. G. Construction regulations, warning systems, restrictive structures such as flood barriers (Godchild 2003 De la Cruz-Arena and Tilling 2008 Galvanic et al. 2010) and evacuation plans (Chatterers et al. 009).While many such strategies may be effective, there is also a need to tell that plans and regulations are properly enforced. This is not ever so the case, especially in poorer countries, as discussed by Kenny (2012). Table 2 Examples of strategies for mitigating catastrophe effects and for improving response and recovery after catastrophes. The division indicates whether they aim to prevent or reduce damage or to improve handling of damage after the event. relie f Response and Recovery Land-use planning restitution against losses Construction regulation pedagogics and Awareness Warning system development Response plansProtective structures Improvement of tools for emergency management Plan and regulation enforcement SAID development for improved decision making With regard to coping with (responding to and recovering from) catastrophic events, building economic buffers to ensure the availability of resources, I. E. Insurances, is a common strategy. Munich Re (AAA) estimate that virtually a quarter of the financial losses that occurred due to natural catastrophes 1980-2012 were insured. Of these insured losses, 81 % occurred in North America and Europe (Munich Re AAA). Kenny (2012) also notes that the victims themselves still pay most of the cost

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.