Greg Madey Albert-László Barabási David Hachen Tim Schoenharl Gabor Szabo Brett Lantz University of Notre Dame Integrated Wireless Phone Based Emergency.

Slides:



Advertisements
Similar presentations
April 10, 2002 Aelix, Inc Corbin Avenue Northridge, CA Tel Fax OmniReach sm Capabilities & Opportunities.
Advertisements

Say NO to Multi-hop Wireless Networks Suresh Singh.
Understanding individual human mobility patterns Marta C. Gonzalez1, Cesar A. Hidalgo1,2 & Albert-Laszlo Barabasi Presenter: Manish Maheshwari.
Location Based Service Aloizio P. Silva Researcher at Federal University Of Minas Gerais, Brazil Copyright © 2003 Aloizio Silva, All rights reserved. School.
MOTOROLA and the Stylized M Logo are registered in the US Patent and Trademark Office. All other product or service names are the property of their respective.
Continua’s Mission “…to establish an eco- system of interoperable personal health systems that empower people & organizations to better manage their health.
Anomaly Detection in the WIPER System using A Markov Modulated Poisson Distribution Ping Yan Tim Schoenharl Alec Pawling Greg Madey.
Kick-off Meeting Athens 05/10/2004 The project ’POMPEI - P2p, location and presence mobile services for managing crisis and disaster situations’
Arsitektur Jaringan Terkini
SWARMFEST An Agent-Based Simulation For Emergency Response Management Timothy Schoenharl, R. Ryan McCune, Greg Madey of the University of Notre Dame.
Mobile and Ubiquitous Computing. Overview Attributes Discussion.
Giga-Mining Corinna Cortes and Daryl Pregibon AT&T Labs-Research Presented by: Kevin R. Gee 28 October 1999.
A Survey of Wireless Sensor Network Data Collection Schemes by Brett Wilson.
Session 131 Hazard Mapping and Modeling Supporting Emergency Response Operations using GIS and Modeling.
Community Detection in a Large Real-World Social Network Karsten Steinhaeuser Nitesh V. Chawla DIAL Research Group University of Notre.
Grand Challenges Robert Moorhead Mississippi State University Mississippi State, MS 39762
Quantifying Social Group Evolution Gergely Palla, Albert-Laszlo Barabasi, and Tamas Vicsek Nature Vol 446 April 2007 Presented by: Liang Ding Finance Department,
FI-WARE – Future Internet Core Platform FI-WARE Security July 2011 High-level Description.
A Data Resolver Architecture for Discovering Pervasive Data Sources Matthew Denny Database Group U.C. Berkeley.
Designing Context-Sensitive User Interfaces. Overview Introduction Context Architectures DynaMo-AID: designing context-aware user interfaces  Design.
0 September, Market Institutional Presentation Agenda World Mobile Market Brazilian Mobile Market.
Distribution of Telecom Revenue by Services in 2014 Note 1: Total revenue of telecom services reached NTD377 billion in Note 2: 4G service has been.
Self-Organizing Adaptive Networks Hari Balakrishnan MIT Laboratory for Computer Science
Analysis and Modeling of the Open Source Software Community Yongqin Gao, Greg Madey Computer Science & Engineering University of Notre Dame Vincent Freeh.
 ====!"§==Systems= IPonAir T-Systems Nova Content Project goals Reference architecture Reference scenarios Terminology and definition Design principles.
Relevance of Simulation Models for Assessments of LivingLabs Activity University of Maribor Faculty of Organizational Sciences www
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
1 Distributed Big Data & Analytics University of Cincinnati –- Computational Fluid Dynamics Research - Aerospace Project/Research Title: Study of Active.
UNIVERSITY of NOTRE DAME COLLEGE of ENGINEERING Preserving Location Privacy on the Release of Large-scale Mobility Data Xueheng Hu, Aaron D. Striegel Department.
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S
1 Networks The Internet may be described as part technology and part human interaction. To describe it as one or the other is not quite accurate. Unlike.
Incident Management in Central Arkansas: Current Settings and Proposed Extensions Weihua Xiao Yupo Chan University of Arkansas at Little Rock.
COMP 410 Update. The Problems Story Time! Describe the Hurricane Problem Do this with pictures, lots of people, a hurricane, trucks, medicine all disconnected.
 Privacy in Social Networks. Facebook Background  Biggest social network with 1 billion users  Most information defaults to public.
Service Oriented Architectures Presentation By: Clifton Sweeney November 3 rd 2008.
Parallel and Distributed Simulation Introduction and Motivation.
Risk Management. What we offer? We provide IP video monitoring solutions for safety and security through our systems integration capabilities.
Topology and Evolution of the Open Source Software Community Advisors: Dr. Vincent W. Freeh Dr. Kevin Bowyer Supported in part by the National Science.
IT – som værktøj Bent Thomsen Institut for Datalogi Aalborg Universitet.
1 Wireless Networks and Services 10 Years Down the Road Ross Murch Professor, Electronic and Computer Engineering Director, Centre for Wireless Information.
AD-HOC NETWORK SUBMITTED BY:- MIHIR GARG A B.TECH(E&T)/SEC-A.
1 Number of Telecom Subscribers by Services Notes : 1.”Internet users” refers to individuals who accessed the internet during the year ( figures released.
1 Evolving System Architecture to Meet Changing Business Goals An Agent and Goal-Oriented Approach Daniel Gross & Eric Yu Faculty of Information Studies.
REU 2004 Computer Science and Engineering Department The University of Texas at Arlington Research Experiences for Undergraduates in Distributed Rational.
1 Note: Total revenue of telecom services in 2013 (NTD 377 billion) showed an increase of 114% in comparison with revenue in 1997 (NTD 176.2billion) Source:
1. Nortel Confidential Information BUSINESS MADE SIMPLE 2 The Future of Telecommunications John A. Phillips Nortel, ETSI General Assembly Chairman 2007.
The Problem of Location Determination and Tracking in Networked Systems Weikuan Yu, Hui Cao, and Vineet Mittal The Ohio State University.
Confidential and Proprietary. Do not distribute without written permission from Clearwire. The M2M Puzzle …putting the pieces together. Michael Murphy.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
CS 551, FALL 2001 DISTRIBUTED UNIVERSITY SERVICES ANKIT AGARWAL CHINTAN SHAH RAKESH PUNJABI.
Access Control for Dynamic Virtual Organisations Duncan Russell, Peter Dew & Karim Djemame University of Leeds.
Situational Awareness, Delivered. 3 Market Strategy Focused on government, law enforcement and education Centralized management of mobile video Team oriented.
Sensor Network and Smart Environment Research (SeNSER) Manohar Mareboyana Bo Yang.
Motivating Scenario 1: Networking 1M interacting people for 1,000 hours using at least 1 Gb/s for each user “Tele*, collaborative spaces, and reality TV.
Computer Science and Engineering Department The University of Texas at Arlington MavHome: An Intelligent Home Environment.
DOMAIN DRIVEN DESIGN Dave 12 May WHAT IS DDD? Set of principles to aid in building complex systems Enables us to focus on core problem domain NOT.
Lake Arrowhead 2005Scott Christley, Understanding Open Source Understanding the Open Source Software Community Presented by Scott Christley Dept. of Computer.
Jun-Ki Min KUT.  Data & Information ◦ Data: facts or values obtained by observation or measurement ◦ Information: interpretation or relationship to help.
Clustering In Mobile Networks Presented By: Assaf Mizrachi Shimrit Artzi Tutor: Dr. Michael Segal.
Mobility Trajectory Mining Human Mobility Modeling at Metropolitan Scales Sibren Isaacman 2012 Mobisys Jie Feng 2016 THU FIBLab.
REU 2007-Real Time Path Prediction
Postdoctoral Research Assoc. University of Notre Dame
Data Warehousing CIS 4301 Lecture Notes 4/20/2006.
Pervasive Data Access (PDA) Research Group
Hurricane Katrina Aziz.
Pier Giorgio Marchetti, Philippe Mougnaud European Space Agency
Hurricane Katrina Aziz.
Evacuation Simulator Project
Hurricane Katrina Aziz.
Substation Automation IT Needs
Presentation transcript:

Greg Madey Albert-László Barabási David Hachen Tim Schoenharl Gabor Szabo Brett Lantz University of Notre Dame Integrated Wireless Phone Based Emergency Response System (WIPER - DDDAS)

Mobile Phone Database Real phone call records –7 million users –2004 April  today (1.5 years) –Who calls whom/Call duration –Services (SMS, WAP, images) –Time resolved data (1 month) –Social data (sex, age, zip, phone) –Several billion phone call records –Attributes of the calls, not the calls themselves Cell phones are an ad hoc distributed sensor net Location of all cell phones (that are powered-on) during an emergency can be determined Abnormal call patterns during an emergency or incident Focus on aggregate properties

WIPER - DDDAS Three Layer Architecture Data Source and Measurement Detection, Simulation, and Prediction Decision Support System (DSS)

Katrina Evacuation DDDAS SERVICE ORIENTED ARCHITECTURE

WIPER - DDAS will Detect abnormal patterns in mobile call activity and locations Initiate dynamic data driven simulations to predict the evolution of the abnormality Initiate higher resolution data collection in localities of interest Interface with emergency response Decision Support Systems Hurricane Rita I45N Freeway Gridlock