Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Edge-enabled Disaster Rescue: A Case Study of Searching for Missing People

Published: 06 December 2019 Publication History

Abstract

In the aftermath of earthquakes, floods, and other disasters, photos are increasingly playing more significant roles, such as finding missing people and assessing disasters, in rescue and recovery efforts. These disaster photos are taken in real time by the crowd, unmanned aerial vehicles, and wireless sensors. However, communications equipment is often damaged in disasters, and the very limited communication bandwidth restricts the upload of photos to the cloud center, seriously impeding disaster rescue endeavors. Based on edge computing, we propose Echo, a highly time-efficient disaster rescue framework. By utilizing the computing, storage, and communication abilities of edge servers, disaster photos are preprocessed and analyzed in real time, and more specific visuals are immensely helpful for conducting emergency response and rescue. This article takes the search for missing people as a case study to show that Echo can be more advantageous in terms of disaster rescue. To greatly conserve valuable communication bandwidth, only significantly associated images are extracted and uploaded to the cloud center for subsequent facial recognition. Furthermore, an adaptive photo detector is designed to utilize the precious and unstable communication bandwidth effectively, as well as ensure the photo detection precision and recall rate. The effectiveness and efficiency of the proposed method are demonstrated by simulation experiments.

References

[1]
Mohammad A. Alsmirat, Yaser Jararweh, Islam Obaidat, and Brij B. Gupta. 2017. Internet of surveillance: A cloud supported large-scale wireless surveillance system. J. Supercomput. 73, 3 (2017), 973--992.
[2]
Noriyuki Araki. 2013. Great East Japan Earthquake and research and development for network resilience and recovery. In Proceedings of the ITU Workshop on E-health Services in Low-resource Settings: Requirements and ITU Role.
[3]
Utsav Drolia, Katherine Guo, and Priya Narasimhan. 2017. Precog: Prefetching for image recognition applications at the edge. In Proceedings of the 2nd ACM/IEEE Symposium on Edge Computing. ACM, 17.
[4]
Andy Rosales Elias, Nevena Golubovic, Chandra Krintz, and Rich Wolski. 2017. Where’s the bear? Automating wildlife image processing using IoT and edge cloud systems. In Proceedings of the IEEE/ACM 2nd International Conference on Internet-of-Things Design and Implementation (IoTDI’17). IEEE, 247--258.
[5]
Face++. 2018. Face++ Cognitive Services. Retrieved from: https://www.faceplusplus.com.
[6]
Matthew Faulkner, Robert Clayton, Thomas Heaton, K. Mani Chandy, Monica Kohler, Julian Bunn, Richard Guy, Annie Liu, Michael Olson, MingHei Cheng et al. 2014. Community sense and response systems: Your phone as quake detector. Commun. ACM 57, 7 (2014), 66--75.
[7]
Angelo Genovese, R. Donida Labati, Vincenzo Piuri, and Fabio Scotti. 2011. Wildfire smoke detection using computational intelligence techniques. In Proceedings of the IEEE International Conference on Computational Intelligence for Measurement Systems and Applications (CIMSA’11). IEEE, 34--39.
[8]
Larry Greenemeier. 2017. Puerto Rico Looks to Alphabet’s X Project Loon Balloons to Restore Cell Service. Retrieved from: https://www.scientificamerican.com/article/puerto-rico-looks-to-alphabets-x-project-loon-balloons-to-restore-cell-service/.
[9]
Pengfei Hu, Huansheng Ning, Tie Qiu, Houbing Song, Yanna Wang, and Xuanxia Yao. 2017a. Security and privacy preservation scheme of face identification and resolution framework using fog computing in internet of things. IEEE Internet Things J. 4, 5 (2017), 1143--1155.
[10]
Pengfei Hu, Huansheng Ning, Tie Qiu, Yanfei Zhang, and Xiong Luo. 2017b. Fog computing based face identification and resolution scheme in internet of things. IEEE Trans. Industr. Inform. 13, 4 (2017), 1910--1920.
[11]
Shiji Kitagami, Vu Truong Thanh, Dang Hoai Bac, Yoshiyori Urano, Yohtaro Miyanishi, and Norio Shiratori. 2016. Proposal of a distributed cooperative IoT system for flood disaster prevention and its field trial evaluation. Int. J. Internet Things 5, 1 (2016), 9--16.
[12]
Lambros Lambrinos. 2015. On combining the Internet of Things with crowdsourcing in managing emergency situations. In Proceedings of the IEEE International Conference on Communications.
[13]
Dawei Li, Theodoros Salonidis, Nirmit V. Desai, and Mooi Choo Chuah. 2016b. DeepCham: Collaborative edge-mediated adaptive deep learning for mobile object recognition. In Proceedings of the IEEE/ACM Symposium on Edge Computing (SEC’16). IEEE, 64--76.
[14]
Yue Li, Pantelis A. Frangoudis, Yassine Hadjadj-Aoul, and Philippe Bertin. 2016a. A mobile edge computing-based architecture for improved adaptive HTTP video delivery. In Proceedings of the IEEE Conference on Standards for Communications and Networking (CSCN’16). IEEE, 1--6.
[15]
Shih-Chun Lin, Abdallah Awadh Alshehri, Pu Wang, and Ian F. Akyildiz. 2017. Magnetic induction-based localization in randomly deployed wireless underground sensor networks. IEEE Internet Things J. 4, 5 (2017), 1454--1465.
[16]
Yuying Liu. 2017. More than 250 communication base stations in Jiuzhaigou earthquake-stricken area were damaged and out of service. Retrieved from: http://www.chinanews.com/gn/2017/08-09/8299962.shtml.
[17]
Changchun Long, Yang Cao, Tao Jiang, and Qian Zhang. 2018. Edge computing framework for cooperative video processing in multimedia IoT systems. IEEE Trans. Multim. 20, 5 (2018), 1126--1139.
[18]
Huimin Lu, Yujie Li, Shenglin Mu, Dong Wang, Hyoungseop Kim, and Seiichi Serikawa. 2018. Motor anomaly detection for unmanned aerial vehicles using reinforcement learning. IEEE Internet Things J. 5, 4 (2018), 2315--2322.
[19]
Balakrishan S. Manoj and Alexandra Hubenko Baker. 2007. Communication challenges in emergency response. Commun. ACM 50, 3 (2007), 51--53.
[20]
Nathaniel Powers, Alexander Alling, Kiara Osolinsky, Tolga Soyata, Meng Zhu, Haoliang Wang, He Ba, Wendi Heinzelman, Jiye Shi, and Minseok Kwon. 2015. The cloudlet accelerator: Bringing mobile-cloud face recognition into real-time. In Proceedings of the IEEE Globecom Workshops (GC Wkshps’15). IEEE, 1--7.
[21]
Kai Qian, Dan Lo, Yi Pan, Yanqing Zhang, Xiaolin Hu, and Liang Hong. 2012. Real-world relevant learning with Android smartphones. In Proceedings of the IEEE 12th International Conference on Advanced Learning Technologies (ICALT’12). IEEE, 476--477.
[22]
Mahadev Satyanarayanan. 2013. The role of cloudlets in hostile environments. IEEE Perv. Comput. 12, 4 (2013), 40--49.
[23]
Tolga Soyata, Rajani Muraleedharan, Colin Funai, Minseok Kwon, and Wendi Heinzelman. 2012. Cloud-vision: Real-time face recognition using a mobile-cloudlet-cloud acceleration architecture. In Proceedings of the IEEE Symposium on Computers and Communications (ISCC’12). IEEE, 000059--000066.
[24]
Swagath Venkataramani, Victor Bahl, Xian-Sheng Hua, Jie Liu, Jin Li, Matthai Phillipose, Bodhi Priyantha, and Mohammed Shoaib. 2015. SAPPHIRE: An always-on context-aware computer vision system for portable devices. In Proceedings of the Design, Automation 8 Test in Europe Conference 8 Exhibition. EDA Consortium, 1491--1496.
[25]
Chen-Chi Wang, Zih-Ning Lin, Shun-Ren Yang, and Phone Lin. 2017. Mobile edge computing-enabled channel-aware video streaming for 4G LTE. In Proceedings of the 13th International Wireless Communications and Mobile Computing Conference (IWCMC’17). IEEE, 564--569.
[26]
Ruoxin Wang and Jiajing Yuan. 2017. The girl lost contact after the Jiuzhaigou earthquake, and her mother found her on TV news. Retrieved from: http://news.youth.cn/sh/201708/t20170811_10487731.htm.
[27]
Wondershaper. 2017. The Wonder Shaper. Retrieved from: http://lartc.org/wondershaper.
[28]
Shanhe Yi, Zijiang Hao, Qingyang Zhang, Quan Zhang, Weisong Shi, and Qun Li. 2017. LAVEA: Latency-aware video analytics on edge computing platform. In Proceedings of the 2nd ACM/IEEE Symposium on Edge Computing. ACM, 15.
[29]
Kaipeng Zhang, Zhanpeng Zhang, Zhifeng Li, and Yu Qiao. 2016. Joint face detection and alignment using multitask cascaded convolutional networks. IEEE Sig. Proc. Lett. 23, 10 (2016), 1499--1503.
[30]
Tan Zhang, Aakanksha Chowdhery, Paramvir Victor Bahl, Kyle Jamieson, and Suman Banerjee. 2015. The design and implementation of a wireless video surveillance system. In Proceedings of the 21st International Conference on Mobile Computing and Networking. ACM, 426--438.
[31]
Ziming Zhao, Fang Liu, Zhiping Cai, and Nong Xiao. 2017. Edge-based content-aware crowdsourcing approach for image sensing in disaster environment. In Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services. ACM, 225--231.
[32]
Pengfei Zuo, Yu Hua, Xue Liu, Dan Feng, Wen Xia, Shunde Cao, Jie Wu, Yuanyuan Sun, and Yuncheng Guo. 2017. BEES: Bandwidth-and energy-efficient image sharing for real-time situation awareness. In Proceedings of the IEEE 37th International Conference on Distributed Computing Systems (ICDCS’17). IEEE, 1510--1520.

Cited By

View all
  • (2024)Public Safety Campus Networks: Towards a Reference Architecture for Post-Disaster Edge-Computing and Crisis-Communication2024 IEEE World Forum on Public Safety Technology (WFPST)10.1109/WFPST58552.2024.00033(74-80)Online publication date: 14-May-2024
  • (2024)Moving Target Tracking by Unmanned Aerial Vehicle: A Survey and TaxonomyIEEE Transactions on Industrial Informatics10.1109/TII.2024.336308420:5(7056-7068)Online publication date: May-2024
  • (2023)The development of new remote technologies in disaster medicine education: A scoping reviewFrontiers in Public Health10.3389/fpubh.2023.102955811Online publication date: 24-Mar-2023
  • Show More Cited By

Index Terms

  1. Edge-enabled Disaster Rescue: A Case Study of Searching for Missing People

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Transactions on Intelligent Systems and Technology
      ACM Transactions on Intelligent Systems and Technology  Volume 10, Issue 6
      Special Section on Intelligent Edge Computing for Cyber Physical and Cloud Systems and Regular Papers
      November 2019
      267 pages
      ISSN:2157-6904
      EISSN:2157-6912
      DOI:10.1145/3368406
      Issue’s Table of Contents
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 06 December 2019
      Accepted: 01 May 2019
      Revised: 01 April 2019
      Received: 01 January 2019
      Published in TIST Volume 10, Issue 6

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Edge computing
      2. disaster rescue
      3. face recognition
      4. finding missing people
      5. time-efficient

      Qualifiers

      • Research-article
      • Research
      • Refereed

      Funding Sources

      • National Key Research and Development Program of China
      • National Natural Science Foundation of China

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)50
      • Downloads (Last 6 weeks)8
      Reflects downloads up to 09 Nov 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Public Safety Campus Networks: Towards a Reference Architecture for Post-Disaster Edge-Computing and Crisis-Communication2024 IEEE World Forum on Public Safety Technology (WFPST)10.1109/WFPST58552.2024.00033(74-80)Online publication date: 14-May-2024
      • (2024)Moving Target Tracking by Unmanned Aerial Vehicle: A Survey and TaxonomyIEEE Transactions on Industrial Informatics10.1109/TII.2024.336308420:5(7056-7068)Online publication date: May-2024
      • (2023)The development of new remote technologies in disaster medicine education: A scoping reviewFrontiers in Public Health10.3389/fpubh.2023.102955811Online publication date: 24-Mar-2023
      • (2023)Single or ensemble model ? A study on social media images classification in disaster responseProceedings of the 10th Multidisciplinary International Social Networks Conference10.1145/3624875.3624884(48-54)Online publication date: 4-Sep-2023
      • (2023)Crowdsourcing of Internet of Things: Applications, Trends in technology and the Future2023 International Conference on Power, Instrumentation, Control and Computing (PICC)10.1109/PICC57976.2023.10142617(1-6)Online publication date: 19-Apr-2023
      • (2023)Distributed processing framework for cooperative service among edge devices2023 IEEE International Conference on Consumer Electronics (ICCE)10.1109/ICCE56470.2023.10043588(1-6)Online publication date: 6-Jan-2023
      • (2023)Missing persons: a national survey approach assessing the predictors of case outcomesCriminal Justice Studies10.1080/1478601X.2023.218779136:2(112-132)Online publication date: 17-Mar-2023
      • (2023)Fog-inspired framework for emergency rescue operations in post-disaster scenarioThe Journal of Supercomputing10.1007/s11227-023-05475-x79:18(21057-21088)Online publication date: 18-Jun-2023
      • (2022)Towards Crowdsourcing Internet of Things (Crowd-IoT): Architectures, Security and ApplicationsFuture Internet10.3390/fi1402004914:2(49)Online publication date: 31-Jan-2022
      • (2022)Cybersecurity of Industrial Cyber-Physical Systems: A ReviewACM Computing Surveys10.1145/351041054:11s(1-35)Online publication date: 9-Sep-2022
      • Show More Cited By

      View Options

      Get Access

      Login options

      Full Access

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format.

      HTML Format

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media