Gaps and challenges for addressing security threats in urban
Transcription
Gaps and challenges for addressing security threats in urban
Deliverable D2.1 Gaps and challenges for addressing security threats in urban environments Editors A. Belesiotis (ATH), D. Skoutas (ATH) Contributors N. Bakalos (ICCS), A. Belesiotis (ATH), J. Hellriegel (FRAUNHOFER), F. Fuchs-Kittowski (FRAUNHOFER), A. Litke (INF), N. Papadakis (INF), N. Papadakis (SPH), S. Pfennigschmidt (FRAUNHOFER), S. Ruscher (SYN), E. Sauli (SYN), D. Skoutas (ATH) Version 1.4 Date September 28, 2015 Distribution PUBLIC (PU) City.Risks Deliverable D2.1 Executive Summary This document surveys the state-of-the-art in the areas related to the City.Risks project. Our analysis starts by reviewing relevant complete and integrated solutions in the urban security landscape. A total of 22 projects and 46 software and hardware solutions have been analyzed. Most of these solutions constitute results of completed and ongoing research projects. The survey focuses on the use cases, target audience, solution types, software platforms and data sources employed in the analyzed solutions. Then, we look into individual areas of research that are of relevance to City.Risks. This analysis focuses on highlighting the current advances and identifying relevant research that can be exploited or extended within the scope of the project. For every research area of focus, we outline the most important recent advances in relation to the City.Risks tasks. Furthermore, based on identified gaps and challenges in the state-of-the-art, we present research directions that can be exploited within the scope of the project. The first relevant area of research we review is Emergency Response and Risk Management. More, specifically, we present the recent advances in emergency alerting and response, augmented reality, and risks management for decision support within the operation center. Then, we outline the most important work related to Data Management that is of relevance to City.Risks. We focus on data acquisition and mining, query processing, privacy and anonymization, data analytics and route planning. Our analysis continues with the areas of Mobile Sensors and Sensor Communication. We overview recent advances on sensor technologies and communications, we present current work in ground monitoring and theft detection, and we discuss relevant approaches for theft detection. Finally, we outline the stateof-the-art in software development methodologies, platform architectures, design process models and theories, and we overview platform architectures for emergency management systems. This report is the first deliverable of WP2. The results of this study will serve as the foundation for the research and development tasks in WPs 3, 4 and 5. © City.Risks Consortium 2 City.Risks Deliverable D2.1 Table of Contents 1. INTRODUCTION ............................................................................................. 6 2. URBAN SECURITY LANDSCAPE .......................................................................... 8 2.1. Gaps and Challenges ........................................................................................... 8 2.1.1. Use cases................................................................................................................. 8 2.1.2. Target audience ...................................................................................................... 8 2.1.3. Solution type ........................................................................................................... 9 2.1.4. Platforms................................................................................................................. 9 2.1.5. Data sources ........................................................................................................... 9 2.1.6. Features provided ................................................................................................. 10 2.1.7. Dedication to standards........................................................................................ 10 2.1.8. Gaps and challenges identified ............................................................................. 11 2.2. Solutions Overview ........................................................................................... 11 2.2.1. Research fields ...................................................................................................... 11 2.2.2. Rolled out applications ......................................................................................... 12 2.2.3. Ongoing projects’ development ........................................................................... 14 2.2.4. Solutions in focus .................................................................................................. 16 3. EMERGENCY RESPONSE AND RISKS MANAGEMENT.............................................. 27 3.1. Emergency Alerting and Response ................................................................... 27 3.1.1. Alerting ................................................................................................................. 27 3.1.2. Response ............................................................................................................... 30 3.1.3. Research directions .............................................................................................. 31 3.2. Mobile Augmented Reality (mAR) .................................................................... 31 3.2.1. User interaction with mAR data ........................................................................... 32 3.2.2. mAR content models ............................................................................................ 32 3.2.3. Generation, provision and rendering of mAR data .............................................. 33 3.2.4. Research directions .............................................................................................. 33 3.3. Risks Management and Operation Center ....................................................... 34 3.3.1. Risk management ................................................................................................. 34 3.3.2. Operation center .................................................................................................. 35 3.3.3. Simulation and visualization of crime and risks.................................................... 36 3.3.4. Research directions .............................................................................................. 37 4. DATA MANAGEMENT ................................................................................... 38 4.1. Data Acquisition and Mining ............................................................................. 38 © City.Risks Consortium 3 City.Risks Deliverable D2.1 4.1.1. Mining the social media ........................................................................................ 38 4.1.2. Sentiment analysis ................................................................................................ 39 4.1.3. Event detection..................................................................................................... 39 4.1.4. Event summarization ............................................................................................ 40 4.1.5. Geocoding ............................................................................................................. 41 4.1.6. Research directions .............................................................................................. 41 4.2. Query Processing .............................................................................................. 42 4.2.1. Identifying and ranking locations and areas of interest ....................................... 42 4.2.2. Queries with spatial, temporal and textual filtering ............................................ 44 4.2.3. Research directions .............................................................................................. 47 4.3. Privacy and Anonymization .............................................................................. 47 4.3.1. Privacy issues and anonymization techniques ..................................................... 47 4.3.2. Research directions .............................................................................................. 49 4.4. Data Analytics ................................................................................................... 49 4.4.1. Mapping crime ...................................................................................................... 50 4.4.2. Predicting crime .................................................................................................... 51 4.4.3. Crime analytics using the social media ................................................................. 51 4.4.4. Crime analysis software ........................................................................................ 52 4.4.5. Research directions .............................................................................................. 52 4.5. Route Planning .................................................................................................. 53 4.5.1. Shortest path queries in road networks ............................................................... 53 4.5.2. Generalised path queries...................................................................................... 55 4.5.3. Generalised routing problems .............................................................................. 57 4.5.4. Research directions .............................................................................................. 58 5. MOBILE SENSORS AND COMMUNICATIONS ........................................................ 60 5.1. Sensors and Communication ............................................................................ 60 5.1.1. Communication technologies for wireless sensor networks ................................ 60 5.1.2. Network topologies and operational modes ........................................................ 61 5.1.3. Mobile wireless sensor networks ......................................................................... 62 5.1.4. Coverage issues for MWSNs ................................................................................. 63 5.1.5. Data management issues for MWSNs .................................................................. 64 5.1.6. Research directions .............................................................................................. 65 5.2. Ground Monitoring and Theft Detection .......................................................... 65 5.2.1. Location finding .................................................................................................... 65 5.2.2. Existing monitor systems ...................................................................................... 65 5.2.3. Collaborative target detection with decision fusion ............................................ 66 5.2.4. Public safety and surveillance networks in cities ................................................. 67 © City.Risks Consortium 4 City.Risks Deliverable D2.1 5.2.5. Research directions .............................................................................................. 68 5.3. Mobile Sensing in City.Risks .............................................................................. 68 5.3.1. BLE relevant technologies..................................................................................... 68 5.3.2. Bluetooth low energy technology overview ......................................................... 69 5.3.3. BLE fundamental characteristics .......................................................................... 70 5.3.4. Beacons ................................................................................................................. 72 5.3.5. Theft detection sensor technical consideration ................................................... 74 5.3.6. Research directions .............................................................................................. 78 5.4. Existing Solutions and integrated projects related to City.Risks BLE theft detection sensor ...................................................................................................... 78 5.4.1. BluVision/CycleLeash concept .............................................................................. 78 5.4.2. Bike Track concept ................................................................................................ 80 5.4.3. BikeTrack fundamental principles ........................................................................ 80 5.4.4. BikeTrack platform components .......................................................................... 81 5.4.5. Customized Bluetooth tag installed on bicycle..................................................... 81 5.4.6. Implementation of client app on mobile phone................................................... 82 5.4.7. Back-end software ................................................................................................ 82 5.4.8. Research directions .............................................................................................. 82 6. SOFTWARE DEVELOPMENT METHODOLOGIES AND PLATFORM ARCHITECTURES .......... 84 6.1. Software Development Methodologies............................................................ 84 6.1.1. Design process models and theories .................................................................... 84 6.2. Platform Architectures for Emergency Management Systems ........................ 88 6.3. Research directions ........................................................................................... 91 7. CONCLUSIONS............................................................................................. 92 APPENDIX I. ROLLED OUT APPLICATIONS ............................................................... 93 APPENDIX II. ONGOING PROJECTS’ DEVELOPMENT .................................................. 99 BIBLIOGRAPHY ............................................................................................. 102 © City.Risks Consortium 5 City.Risks Deliverable D2.1 1. Introduction The City.Risks project aims at increasing the perception of security of citizens in urban environments. This will be achieved by placing information sharing at the center of addressing security challenges in large urban environments. Citizens will serve both as targets and sources of information. Information flow will be bidirectional between citizens and authorities or among citizens themselves, forming trusted networks and communities. Smart phones and mobile devices will be utilized as the enabling technologies for the visualization and acquisition of information. The City.Risks platform will analyze and integrate diverse information including historical crime data, statistics, victimization reports, demographic data, maps of transportation networks, physical sensory data, news feeds and information mined from the Web. The City.Risks project will have to address multiple challenges from different research areas. To do so effectively, we must exploit current research advances and extend the state-of-the-art to effectively complete the project tasks. The first step towards this direction is provided by this document, which overviews the most important work that is relevant to City.Risks. The analysis is conducted both at a project level and at the level of individual areas of research that are relevant to the City.Risks project. The first part of this analysis focuses on the Urban Security Landscape and provides a structured analysis of complete projects and integrated solutions. In particular, a total of 22 projects and 46 software and hardware solutions are investigated. Most of these solutions are the result of relevant research projects. These are analyzed across a number of relevant dimensions. Depending on the use cases they serve, these solutions focus on different fields of crisis management. Depending on their target audience, they may cater for general public, governmental bodies, control center staff and public safety forces. Depending on their role, these systems may be designed to provide information, enable communication or collaborations. The study follows additional distinctions such as the platforms, data sources and the features offered by the analyzed solutions. The second part of our analysis presents the state-of-the-art in the areas of research that are relevant to the City.Risks platform. For every identified relevant area, we outline the most important recent advances in relation to the tasks that must be completed during the duration of City.Risks. Furthermore, we present research directions that will be exploited based on gaps and challenges in the current work. Emergency Response and Risks Management is a research area directly related to the project. Of particular significance are the topics of Emergency Alerting and Response, Mobile Augmented Reality for emergency response and Risk Management. To that end, we analyze the technology-driven, psychological, sociological and organizational aspects of alerting. Emergency response is broken down and analyzed in the levels of response creation, monitoring and organization. With respect to Mobile Augmented Reality, we focus on user interaction with mobile augmented reality data, content models, and the generation, provision and © City.Risks Consortium 6 City.Risks Deliverable D2.1 rendering of mobile augmented reality data. Finally, we overview important work associated with Risks Management, the Operation Centre, and the Simulation and Visualization of crime information and risks. Another important area of research to the project is Data Management. Gathering information from various sources is vital to City.Risks, and to this end we outline the most important relevant work in Data Acquisition and Mining. We focus on mining information from the social media, performing sentiment analysis, detecting and summarizing events, and geocoding web documents. Query processing is also a very important topic with respect to City.Risks. We present the state-of-the-art in query processing, and particularly focus on query processing with data with spatial, temporal and textual characteristics, which are related to the types of data that must be efficiently managed by the City.Risks platform. Moreover, as some of the data City.Risks may deal with include potentially private information, we study the aspects of privacy and anonymization. In addition, we discuss data analytics methods for mapping and predicting crime, crime analytics using information from the social media, and we overview the state-of-the-art software used for crime analysis. Finally, we present work in route planning queries, which constitutes another key area of focus for the services we plan to develop in the course of the project. The third research area of focus relates to the theft detection requirements of the City.Risks platform. This is the area of Mobile Sensors and Sensor Communication. We overview recent sensor communication advances and we discuss important aspects for Mobile Wireless Sensor Networks, such as network topologies, operational modes, network coverage and data management. Particular attention is given to the topics of ground monitoring and theft. We focus on the problems of location finding, collaborative target detection and public safety surveillance networks. Our analysis continues with the mobile sensing technologies that will be employed in the City.Risks project. In addition, we discuss important technical considerations for theft detection sensors, and we analyze relevant solutions related to the sensors that will be employed in City.Risks. The final research area of focus is Software Engineering. Our analysis reviews current Software Development Methodologies and Platform Architectures that have been employed for the development of Emergency Management Systems. This document is structured as follows. Section 2 overviews the Urban Security Landscape. Section 3 presents current work in Emergency Response and Risks Management. Recent advances in Data Management are provided in Section 4. Section 5 focuses on Mobile Sensors and Communication. Relevant Software Development considerations are discussed in Section 6. Finally, Section 7 summarizes and concludes the report. © City.Risks Consortium 7 City.Risks Deliverable D2.1 2. Urban Security Landscape 2.1. Gaps and Challenges For initial research in the City.Risks project, a total of 22 projects as well as 46 software and hardware solutions, partly results from aforementioned projects, were analyzed and structured in a catalogue for further investigation. This survey of existing works in this area emphasized on use cases, target audience, solution type, platform, data sources and addressed features of the solutions analyzed. Due to lack of available demonstrators provided by the developers, no qualified statement could be given concerning usability and conformity with standards of the examined hardware and software. It is also noted, that many products sold are not more than mere video cameras streamed to a command and control center of some kind. These were not included into the deeper analysis, as they would not have created any added value for the results. 2.1.1. Use cases As expected, the majority of solutions are set out to tackle public safety and security threats. Nevertheless, different fields of crisis management are addressed by the solutions analyzed. These different emphases will be displayed in more detail. A broad number of the use cases presented is set out to inform citizens or collect data from their end user devices, employing sensors in the devices or social media used. Descriptions of solutions, which focus on data collection and information distribution, state, that during the development a central focus of the research and development activities was oriented towards ethical, privacy and legal aspects. Nevertheless, no extensive statements on legal aspects or standardization activities taken into account are provided by the solution developers. Other aspects of the development tasks for the solutions analyzed were, on the one hand, to guarantee mobility of the end users by directing and coordinating them through centralized communication headquarters, and, on the other hand, to support policy makers and their strategic decision making. 2.1.2. Target audience The main target audience of the solutions can be divided into four major categories: the general public, governmental bodies, control center staff and public safety forces. The functionalities provided to them are described subsequently. The general public is primarily addressed by information services and sometimes included into collaborative actions. Most solutions offer a communication channel to © City.Risks Consortium 8 City.Risks Deliverable D2.1 deliver actions to be taken in accordance with the current emergency situation. When citizens have the chance to participate i.e. by reporting as a first responder, they are provided with established social media contact points (most commonly a Twitter Channel). Governmental bodies and policy makers are normally provided with analysis and steering methods. An outstanding feature of the ISAR+ project prototype (http://isar.i112.eu/) is providing users with well-documented strategic planning tools. Communication on various channels and real time information retrieval are the key selling proposition for control center solutions that were analyzed throughout the initial research. Common data sources for these solutions are social media or video data provided by first responders on site. Public security and safety, especially police forces, are commonly addressed by ways to monitor suspicious behavior or to track down persons and objects. These solutions are most commonly based on video surveillance. 2.1.3. Solution type The majority of solutions analyzed are proprietary systems, requiring special hardware to be installed (i.e. control center equipment). Those systems, which are set out to integrate citizen actions into the risk assessment and reduction, are built to be used on mobile devices, especially cell phones. The mobile solutions can be subdivided into three main solution types. First, using social media channels for interaction with citizens is suggested. Secondly, collection of mobile phone sensor data is employed. Thirdly, information is provided through proprietary web portals that can be accessed by mobile browsers. 2.1.4. Platforms As stated before, most systems are proprietary solutions, requiring special hardware and platforms. Those products and services built for common electronic devices like desktop computers, tablets and smart phones are equally spread among operating systems. For desktop computers, this is primarily enabled by using web technologies, providing online solution to the end users, enabling independence from Windows, Mac OS or Linux based operating systems. If mobile applications are developed, they are at least built for Android and iOS. Only few solutions provide further apps for Windows Mobile and Blackberry operating systems. 2.1.5. Data sources Public security and safety solutions show three primary sources of input data, being generated by end device users, being collected by the devices automatically or being based on statistical data. User generated data is most commonly collected using © City.Risks Consortium 9 City.Risks Deliverable D2.1 social media data aggregation, but also through user reporting tools and knowledge wikis or encyclopedias, which allow citizens participation and expansion. Automatically collected data includes mobility, traffic, text, audio and video data, either collected by the mobile devices of the end users or by sensors developed for specific purposes. Besides the aforementioned solutions, which provide real time data, some solutions are built on previous results only. The sources included into these products and services are statistical data, maps, infrastructural information and counter measures definitions. When analyzing data sources and usage, also the option of reuse of the data was investigated. Nevertheless, most solutions do not provide any of their data sets. Only few implementers offer partially access to data or knowledge generated. Those offers consist either of wikis that were setup during projects and deliverable documents, which were made publicly accessible, or an API to open data, that was used for the solution developed. 2.1.6. Features provided Building on the data collected, the safety and security solutions analyzed provide diverse features to the end users. Those products and services built on automated data collection most commonly serve as surveillance and tracking tools, but also sometimes enable coordination or policy actions through data filtering, visualization and statistics. Other solutions, which build on research result and/or end user generated data, are set out to observe crisis events, to communicate with persons affected and to steer public safety and security forces. They are built around a command and control center solution that connects to mobile clients, enabling the required communication in unidirectional or bidirectional ways. Unidirectional services are either gathering information from public reports and user data for deeper insight or communicate information to the persons in the field for coordination. Bidirectional on the other hand enable collaboration between the command and control center staff and the essential end users at the crisis hotspot, allowing interactive resolution through all affected players. 2.1.7. Dedication to standards Even though a broad spectrum of solutions is analyzed throughout this initial research, there are hardly any standards addressed or incorporated in the descriptions of the products and services provided. Nevertheless, some research projects like ISAR+ (http://isar.i112.eu/) and INDECT (http://www.indect-project.eu/) report on implementation of their methods with respect to the European Convention on Human Rights, the European Union Charter of Fundamental Freedoms, the UN Convention on the Rights of the Child or the Finnish Personal Data Act. © City.Risks Consortium 10 City.Risks Deliverable D2.1 Considering the fields of application of the solutions analyzed, some technical standards, like mobile communication, could be expected to be met by the systems, but in general they are not explicitly stated by the product and service providers. Only the two UK based solutions Crime Data Repository and Crime Map dedicate themselves to usage of data based on JSON standard. 2.1.8. Gaps and challenges identified When considering the results of this initial research, some gaps in the development could be identified, which are closely related to the challenges to be faced during future development of the City.Risks environment. Collection of social and end user generated data should on one hand side be available to others generating leverage effects. On the other hand side, collection of personal data has to respect data security laws and privacy rights, with respect to the legal situation in the country of application. Furthermore, a strong dedication to standards, especially communication and encryption should be considered in further research and development, preventing potential abuse and misuse of data collected and processed by the City.Risks solutions. This might contradict with the requirements for availability and desirable platform independency of the software to be developed. Thus, one of the challenges of further research and development will be to find a balance between the aforementioned interest conflicts. Establishing the desired harmony between them will be part of further steps throughout the City.Risks project. 2.2. Solutions Overview A research has been conducted in order to find related practices which will shed some light on the previous and ongoing work in the field. In the following sections an overview of the current applications found is projected in various fields. Fields include status of the project, funded by any European program, business analysis and technical specifications. The following content is aggregated from the URLs attached to each solution found. 2.2.1. Research fields For every project highlighted, basic information provided covers the name, a web link, the funding reference, the type of the developed solution, the platform it is built for and the role of the solution. Role describes the type of communication that is enabled through the solution. The Information role therefore represents unidirectional communication from organization to public, while Communication represents the inverse direction, from public to organization. As a bidirectional form of communication, Collaboration enables cooperation of public and organization based on reaction of the respective partner. © City.Risks Consortium 11 City.Risks Deliverable D2.1 The developed solutions are then presented with a screenshot and a short description, followed by details on target audience, use cases, features and countries the solution was piloted in. In a further step, possible transferrable content is analysed with regard to the City.Risks needs. This covers mapping to the City.Risks use cases and description of data used as well as data reusability and currently available access to the application. User and terms of use explains the user access to the solution, differentiating between active users, using the application as a tool to gather data and communicate, and passive users, who are restricted to viewing (limited) content. Furthermore, it is indicated, whether licences are granted by the provider. In a final section of the analysis, further information is provided. This covers the international scale and scalability of the solution, the availability of support documents, like guidebooks or manuals, and indications towards international standards that are respected by the solution. 2.2.2. Rolled out applications Furthermore, the following finished projects, products and services that are built not only for mobile usage, but also to work on other hardware systems, were explored during the initial research phase. For more detailed information refer to Appendix I. NGHOOD CITIZENS CROWD THEFT Collaboration Communication Name Information Table 2.1: Rolled out solutions mapped into communication directions and City.Risks use cases Urban Securipedia PEP COMPOSITE PACT Alert4All SUBITO INDECT SECUR-ED THALES Integrated and scalable © City.Risks Consortium 12 City.Risks Deliverable D2.1 urban security solutions SAMSUNG Urban Security Systems SAAB SAFE Emergency Response Selex ES Urban Security Video Surveillance Selex ES CITIESvisor TAS-AGT Urban Security LL Tech International Urban Security ISS SecurOS ARMOR Emexis Fuel Tracker CrimeReports UKCrimeStats Crime Map Vienna - Kriminalität in Wien Durham Crime map iSAR+ Opti-Alert VirtualGuard BluCop HappstoR iHound GadgetTrak Prey Comodo Anti Theft SafeCity Legend: THEFT: Theft of personal items CROWD: Criminal activity in crowded areas CITIZENS: Assisting and engaging citizens NGHOOD: Neighbourhood safety The solutions found are analysed through the communication direction (grey) and the pre-elementary use cases (blue) defined so far from the City.Risks project. The description of Information, Communication and Collaboration fields is given in the © City.Risks Consortium 13 City.Risks Deliverable D2.1 previous section (Section 2.2.1). In addition, we map the analysed solutions with respect to the use cases that we plan to investigate within the City.Risks project. The complete specification of these use cases will the result of Task 2.4 and will be reported in the Deliverable D2.4. This mapping provides a deeper insight on the feasibility of future adaption of elements of the proposed solution into City.Risks components. 2.2.3. Ongoing projects’ development Projects, that were of interest during initial research, but not finished before the delivery date of the current document, are listed below. Their results will be monitored throughout the further research and development processes of the City.Risks project. For detailed information refer to Appendix II. Table 2.2: Ongoing projects in the field of urban security Name URL Short description Target Audience Roles Use case(s) ATHENA http://www.projectathena.eu/ Target Audience first responders, citizens Role Collaboration Use cases Crisis management, Social media in crisis management eVACUATE http://www.evacuate.eu Target Audience general public Role Information, Communication Use cases Safety/Security TACTICS http://fp7-tactics.eu/ Target Audience: Threat Manager (TM), Threat Decomposition Manager (TDM) and Capabilities Manager (CM) Role Information Use cases Legal, Safety/Security © City.Risks Consortium 14 City.Risks Deliverable D2.1 HARMONISE http://harmonise.eu/ Target Audience: Mechanisms/Tools for Delivery of Improved Urban Security and Resilience Role Information Use cases Safety/Security Urban Security eGuide (Inspirational Plattform) http://www.besecureproject.eu/dynamics//modules/ SFIL0100/view.php?fil_Id=56 Target Audience: Education, community, general public Role Information Use cases Safety/Security Policy platform http://www.besecureproject.eu/dynamics//modules/ SFIL0100/view.php?fil_Id=57 Target Audience: Policy makers Role Collaboration Use cases Safety/Security, Policy Urban security Early warning system http://www.besecureproject.eu/dynamics//modules/ SFIL0100/view.php?fil_Id=58 Target Audience: Policy makers Role Information Use cases Safety/Security, Policy iRISK Urban Vulnerability Measure http://create.usc.edu/sites/defa ult/files/projects/sow/1045/kur bancreateyear8annualreportkur banhudoc.pdf Target Audience: NC state policy makers, Howard University students Role Information Use cases Economic, Social, Safety/Security RAW Risk Assessment Workbench http://create.usc.edu/sites/defa ult/files/projects/sow/850/hall2 005riskanalysisworkbenchpart1.pdf Target Audience: classified, “official use only” or public environment Role Information Use cases © City.Risks Consortium 15 City.Risks Deliverable D2.1 Safety/Security DPS Deploy http://create.usc.edu/researche r/michaelorosz/projects/dpsdeploy-uscdepartment-public-safety-riskassessment-and Target Audience: USC Department of Public Safety Role Information Use cases Safety/Security MobEyes Target Audience: http://lia.deis.unibo.it/Research urban monitoring /Mobeyes/ Role Information Use cases Safety/Security, Mobility 2.2.4. Solutions in focus 1. iSAR+ Online and Mobile Communications for Crisis Response and Search and Rescue URL http://isar.i112.eu/ Project reference FP7, Agreement no 312850 Solution type Document | Web | Mobile | Other Platform Compatible with all mobile OS Role Information | Communication | Collaboration Application snapshots © City.Risks Consortium 16 City.Risks Deliverable D2.1 Short Description iSAR+ is a research and development project aiming to definene the guidelines that, in crisis situations, enable citizens using new online and mobile technologies to actively participate in response efforts, through the provision, dissemination, sharing and retrieval of information for the critical intervention of Public Protection and Disaster Relief (PPDR) organisations, in search and rescue, law enforcement and medical assistance operations. From 2013 to 2015, the FP7 iSAR+ project addresses Theme SEC-2012.6.1-3: Use of new communication/social media in crisis situations. Results iSAR+ Guidelines - recommendations for citizens and PPDRs for an effective and efficient use of social media and mobile technology in crisis situations. iSAR+ Technological Platform - platform integrating ICT tools, including mobile and social media applications, that provide added-value services for citizens and PPDRs in crisis situations. Based on the citizens’ and PPDRs’ recommendations, the platform is a validation tool for the iSAR+ Guidelines. Application technical details Business analysis Target audience Public Protection and Disaster Relief, search and rescue, law enforcement, medical assistance, general public Use case(s) 1) Unattended baggage, 2) Metro Station Fire, 3) Toxic Gas Accident, 4) Plane Crash, 5) Thunderstorm Feature(s) Social media and mobile data aggregation and presentation, information channels. Pilot(s) France, Finland, Ireland, Norway, Poland, Portugal, United Kingdom City.Risks Use Cases Theft of personal items | Criminal activity in crowded areas | Assisting and engaging citizens |. Neighbourhood safety Data usage Source(s) of data Social Media and Mobile Data Data reusable Yes | No Access to application End product published © City.Risks Consortium Yes | No 17 City.Risks Deliverable D2.1 User and terms of use User entrance Registered | Open access | Free | Commercial User passive Registered | Open User active Registered | Open License None Additional information Scale International Supporting documents Yes | No Deliverables Indication to standards Yes | No | Not clear Finnish Personal Data Act 2. Opti-Alert Enhancing the efficiency of alerting systems through personalized, culturally sensitive multi-channel communication URL http://www.opti-alert.eu/ Project reference FP 7, Agreement no. 261699 Solution type Document | Web | Mobile | Other Platform Compatible with all mobile OS Role Information | Communication | Collaboration Application snapshots Short Description © City.Risks Consortium 18 City.Risks Deliverable D2.1 The Opti-Alert project is aimed at raising the efficiency of alerting systems through personalized, culturally sensitive multi-channel communication. Funded by the European Commission, Opti-Alert involves research institutes, universities, enterprises, and end-users from six European countries. The goal of the project is to create an adaptive alerting system that allows intuitive, ad-hoc adaptation of alerting strategies to specific alerting contexts. Opti-Alert will also facilitate improved regionalization and personalization of warning messages, as well as a closer cooperation and integration of industry-funded alerting systems with state-funded alerting tools. The project objectives will be pursued by the following key research activities: In-depth analysis of the effect of social, cultural and regional factors on risk perception and risk communication Analysis of the influence of the observed socio-cultural differences on regional alerting strategies Analysis of the impact of individualized alerting (by SMS, e-mail etc.) and alerting through broadcast media Identification of best practices in alerting through broadcast media Definition of algorithms to simulate alert propagation in the population, both at large and inside critical infrastructures such as metro stations, as a function of interpersonal communication patterns and the selected mix of alerting channels. Results The main results of this projects are: an Alerting Strategy Simulation, Channel and Broadcast Suggestion, and Media Broadcasting Application technical details Business analysis Target audience General public Use case(s) Safety and Security Feature(s) Alerting Strategy Simulation, Channel and Broadcast Suggestion, Media Broadcasting Pilot(s) Austria (Eastern Tyrol), Germany (Berlin), Italy (Eastern Sicily), Germany (Lippe) City.Risks Use Cases Theft of personal items | Criminal activity in crowded areas | Assisting and engaging citizens | Neighbourhood safety Data usage Source(s) of data Data reusable © City.Risks Consortium Current emergencies from national authorities responsible for alerting, weather alerts, disaster alerts, commercial alert through service providers Yes | No 19 City.Risks Deliverable D2.1 Access to application End product published Yes | No User and terms of use User entrance Registered | Open access | Free | Commercial User passive Registered | Open User active Registered | Open License Not known Additional information Scale International Supporting documents Yes | No Deliverables Indication to standards Yes | No | Not clear 3. iHound iHound Phone & Family Tracking Platform URL https://www.ihoundsoftware.com/ Project reference No reference Solution type Document | Web | Mobile | Other Platform IOs, Android Role Information | Communication | Collaboration Application snapshots © City.Risks Consortium 20 City.Risks Deliverable D2.1 Short Description iHound uses the GPS and WiFi, 3G, or Edge signals built into your devices to determine its location. Using the app and iHound Software's unique tracking website, you can Track the location of your device, Remotely Lock Your Phone, Remotely Wipe Private Information, Directly Instant Message Your Phone, Set up Geofencing Location Alerts, Manage your account using iHound's Mobile Web Site. With iHound Geofencing automatically one can: Get alerts when your child arrives at or leaves school. Broadcast your arrival at the bar to your adoring Facebook and Twitter followers. Check-in with Foursquare to help you compete more effectively and become Mayor. Receive reviews of local restaurants when you arrive at your vacation destination. Have your shopping list delivered in an email when you get to the store. Know where your loved ones are all the time, any time. Application technical details Business analysis Target audience General public Use case(s) Safety, Security, and Mobility Feature(s) Geofencing, Location Tracking, Location Sharing, Push Alert with Sirens Pilot(s) Not known City.Risks Use Cases Theft of personal items | Criminal activity in crowded areas | Assisting and engaging citizens |. © City.Risks Consortium 21 City.Risks Deliverable D2.1 Neighbourhood safety Data usage Source(s) of data User data, location based information Data reusable Yes | No Access to application End product published Yes | No User and terms of use User entrance Registered | Open access | Free | Commercial User passive Registered | Open User active Registered | Open License Commercial licence Additional information Scale International Supporting documents Yes | No Indication to standards Yes | No | Not clear 4. GadgetTrak Leading innovator of theft recovery and data protection solutions for mobile devices URL http://www.gadgettrak.com/ Project reference No reference Solution type Document | Web | Mobile | Other Platform iOS, Android, Win Role Information | Communication | Collaboration Application snapshots © City.Risks Consortium 22 City.Risks Deliverable D2.1 Short Description GadgetTrak Laptop Security Think about the things you have on your laptop right now: Countless photos, financial records, software, music, videos, etc. The hefty price tag on your laptop is probably dwarfed by the value of the information on it. The really scary part is that according to the FBI, 1 in 10 laptops purchased today will be stolen within the next 12 months. Sadly, only 3% will be returned. GadgetTrak dramatically increases the likelihood of finding your laptop, by pinpointing its location, and even sending a photo of thief. GadgetTrak Mobile & iOS Security What if your device was lost or stolen, what would it mean to your or your business? Not only is it the loss of an expensive device, but also your data, which can be priceless. GadgetTrak Mobile Security helps mitigate the risk of mobile device loss or theft, empowering you to track its location, back up data, even wipe the device. Results GadgetTrak is offering 3 types of security products laptop security, Mobile Security and iOS. Application technical details Business analysis Target audience General Use case(s) Laptop security, Mobile security for data loss and antitheft Feature(s) Tracking, Memory Erasure, Wi-Fi positioning, Integrate police reports, webcam support, privacy safe, Advanced hybrid positioning, device alarm, Secure encrypted backup, Remote data wipe, Tamper proof © City.Risks Consortium 23 City.Risks Deliverable D2.1 Pilot(s) Not known City.Risks Use Cases Theft of personal items | Criminal activity in crowded areas | Assisting and engaging citizens |. Neighbourhood safety Data usage Source(s) of data User data, location based information Data reusable Yes | No Access to application End product published Yes | No User and terms of use User entrance Registered | Open access | Free | Commercial User passive Registered | Open User active Registered | Open License Commercial license Additional information Scale International Supporting documents Yes | No Wiki, FAQ and Knowledge Base Indication to standards Yes | No | Not clear 5. SafeCity Handy tool to geographically mark and report a safety issue faced by women and children URL Project reference https://play.google.com/store/apps/details?id=com. phonethics.safecity No reference Solution type Document | Web | Mobile | Other Platform iOS, Android Role Information | Communication | Collaboration © City.Risks Consortium 24 City.Risks Deliverable D2.1 Application snapshots Short Description Safe City is a handy tool to geographically mark and report a safety issue faced by women and children. You can quickly locate, identify and pin the issue on the map of your city. It is aimed at creating a social response system where this information is actively pursued in reaching out to the person in need and bring to the notice the issues and their causes so they can be addressed and monitored. Application technical details Business analysis Target audience General public Use case(s) Safety, Security, and Mobility Feature(s) Location, Danger Spotting, Search Pilot(s) Not Known City.Risks Use Cases Theft of personal items | Criminal activity in crowded areas | Assisting and engaging citizens |. Neighbourhood safety © City.Risks Consortium 25 City.Risks Deliverable D2.1 Data usage Source(s) of data User data, location based information Data reusable Yes | No Access to application End product published Yes | No User and terms of use User entrance Registered | Open access | Free | Commercial User passive Registered | Open User active Registered | Open License None Additional information Scale International Supporting documents Yes | No Indication to standards Yes | No | Not clear © City.Risks Consortium 26 City.Risks Deliverable D2.1 3. Emergency Response and Risks Management This section summarizes the most important work from the literature that is related to emergency response and risk management services and applications envisaged for the City.Risks platform. We describe recent advances in emergency alerting and response, augmented reality, and operation center and risks management. Furthermore, we pinpoint gaps and challenges in current work to outline specific research directions that will be explored within the scope of the City.Risks project. 3.1. Emergency Alerting and Response City.Risks uses different means of information sharing to address security challenges in large urban environments. The main goals of the project are to improve handling of safety and security challenges by integrating the public through mechanisms of participatory urbanism, and making safety-related information more transparent in order to reduce fear of crime of citizens. Targeted emergency alerting and response play a major role in this context. Within this scope, the following sections focus on communication between authorities and the public. Alerting and response communication used by professional has not been considered here. 3.1.1. Alerting After the end of the "cold war", investments in alerting systems for the general public were reduced in many European countries. As a consequence, the previously existing alerting infrastructure (sirens in particular) was either dismantled, or its coverage and / or availability decreased due to lack of maintenance. In the meantime, authorities mainly relied on mass media (TV, radio) to close the gap on the last mile when alerting the public. More recently, however, attempts have been made to use other technologies to communicate with citizens in emergency situations. This relates both to single-channel approaches (like cell broadcasting (Jagtman et al. 2010), which is currently the preferred solution in the Netherlands), or multi-channel alerting systems which combine, for example, SMS, e-mail, and RSS feeds (Klafft et al. 2008). Efficient alerting encompasses aspects of the following categories. - technology-related aspects psychological and sociological aspects organizational aspects Many of these aspects are interrelated; technology influences how we perceive alerts, and organizational aspects influence whether we trust emergency information received. © City.Risks Consortium 27 City.Risks Deliverable D2.1 Technology-driven aspects. According to Klafft (Klafft 2013) a lot of research has been conducted to analyze the first two steps of the alerting process, namely, sending and receiving messages. The following technologies are being used. - cell broadcasting SMS and pagers push infrastructures for mobile phones twitter rss feeds, email, fax others, e.g., tv or radio broadcasts, sirens, sound trucks (not considered) Cell broadcasting. All available mobile communication standards (GSM, UMTS, LTE) define broadcast or multicast services. Broadcast services have the advantage of reaching an affected public without the need of a subscription service. On the other hand, messages are not explicitly called for and cannot be personalized, which reduces acceptance. While GSM cell broadcast is actually available and being used for distributing emergency information in some countries (e.g., US, Japan, or the Netherlands) usage of these broadcast services is limited, due to the lack of the necessary infrastructure. Beyond emergency alerting there are currently no real business cases, and mobile communication providers shy away from investing into these technologies. SMS and pagers. SMS and pager technology have been used as a means for efficient personal alerting, since the advent of mobile communication networks. Pager communication requires specific devices and separate infrastructures, which limits its usefulness for alerting the public. In contrast, SMS can be used by (almost) any mobile phone, and is one of the most widespread technologies used for public alerts. However, both technologies offer limited information capabilities as they support only short messages, which is, why they are being more and more replaced by IPbased push infrastructures for smartphones. Push infrastructures. One of the main technologies currently used for alerting are smartphone Apps providing push notifications. All major smartphone platforms provide a push service infrastructure (e.g., Apple Push Notification Service (APN), Google Cloud Messaging (GCM), Windows Notification Service (WNS)). Push notifications have the advantage over SMS that they are bound to a smartphone App that can directly load additional information related to an alert, thus giving a user details on what happened where, and on how to react. Another advantage of alerting Apps is that alerts can be subscribed to in a very dynamical manner, using, for instance, location information. Twitter. In 2013 Twitter launched the service Twitter Alerts. Tweets that are marked as an alert are being actively pushed to all users subscribed to alerts of the issuer of a tweet. That means, subscriptions are based entirely on the who is providing an alert. Twitter-based alerts cannot be personalized or targeted to specific needs or user groups. The service is being used, for instance, by the Federal Emergency Management Agency FEMA in the US (fema.org) or the WHO Regional Office for Europe (euro.who.int). © City.Risks Consortium 28 City.Risks Deliverable D2.1 RSS feeds, email, fax. All of these technologies have more or less been replaced by other means. Today, RSS feeds are no longer being used for actual alerting but for reporting emergency cases, e.g., for earth quake information. Also today, email and fax are playing only minor roles in alerting the public. Others. TV or especially radio broadcasts have long been the only means to distribute detailed emergency information. Also these technologies lack the ability to target and personalize alerts. New digital broadcast standards (e.g. DAB+), however, provide means to distribute alerts similar to GCM cell broadcasts. Devices to receive and display such alerts are available but not actually widely used. In recent years, socalled smart TVs are being more and more available, which means that Apps and push notifications can be used with this medium, too. Psychological and sociological aspects. Psychological and sociological aspects (as addressed, e.g., by EU project OptiAlert (http://www.opti-alert.eu) are a more or less disregarded topic in existing alerting systems. These aspects address the following questions. - was an alert read was an alert understood was an alert reacted upon (see Sec. 3.1.2) None of these questions can be easily answered by just using the right technology. Even actually displaying alert information on a device does not mean a user has read it much less understood its impact. Often, understanding problems arise from the information being delivered in a single language. Since responsible parties most often require an alerting system to be generic, alerts are not always built from predefined pre-translated building blocks but using free text input. Automatic translation can help that information is roughly understandable, but is not good enough to ensure that the information is being trusted. Trust, however, is the main point in bringing a recipient to react upon an alert. Trust builds itself on different components. The source itself needs to be trusted. It must be clear to the user that the message actually comes from that source and has not been tampered with. The contents of the message need to be verifiable, preferably using secondary sources (e.g., social media, online news, radio or TV broadcasts). Last, not least, users need to have the sense, that they are actually affected and need to react. Individualized and situation-related alerting is of major importance. Organizational aspects. Emergency alerting for the public, usually, encompass information about different types of hazards (e.g., weather, floods, civil protection, crime, or defense). In most cases responsibilities for alerting the public about such hazards are distributed between different authorities. On the other side, emergency situations often arise from a series of interconnected and dependent severe events. Alerting the public in such a situation requires a consistent voice which in turn requires a distributed incident management. Also emergency situations do not stop at political boundaries, so coordination of cross border alerting strategies (see OptiAlert (http://www.opti-alert.eu)) is of major importance. © City.Risks Consortium 29 City.Risks Deliverable D2.1 These problems are much more pronounced in federal environments, e.g., in Germany (where the responsibility for civil protection is divided between ca. 400 individual counties). 3.1.2. Response Appropriate response is the ultimate goal of all alerting systems, be it that people look for a safe place, secure their property, help others, inform others, or just stay informed themselves about their situation. The following section focusses on collaboration and organizing response between authorities, professional emergency relief organizations, and the public. Three main categories or levels can be used to distinguish approaches to emergency response with focus on the public. - creating response monitoring response organizing response Creating Response. Creating response encompass all measures taken to ensure an alerted public actually takes action. This overlaps with the issues on psychological and sociological aspects of alerting presented above. Monitoring Response. Monitoring tries to observe behaviour of the affected public and to verify users respond (correctly). In this case sentiment analysis techniques play a major role. Social media content streams the data items of which are tagged with temporal, spatial or keyword-based metadata is processed in order to get information how an emergency situation is perceived and reacted upon. The role of social media (read twitter) in effectiveness of warning response (with focus on extreme events) has been studied in (Tyshchuk 2012). Twitter users seem to engage in all six stages of the warning response process (receiving, understanding, trusting, personalizing, obtaining confirmation, taking action). Enhancing situational awareness through the use of microblogging (read twitter) has also been the focus of (Vieweg et al. 2010) and (Starbird and Palen 2011). Organizing Response. Organizing response takes additional steps to facilitate collaboration between authorities, emergency relief organizations, and the public, through direct or indirect communication. Effective response and recovery operations through collaborations and trust between government agencies at all levels and between the public and nonprofit sectors has been studied by (Kapucu 2005) and (Kapucu 2008). Key aspects of the relationship between volunteers and formal response organisations in disasters are presented by (Barsky et al. 2007). (Chen et al. 2008) proposes a framework to analyze coordination patterns along the emergency response life cycle. Several systems have been developed to help coordinate responder communication and response efforts in order to minimize the threat to human life and damage to property. Examples include the ENSURE (http://ensure-projekt.de/) project and © City.Risks Consortium 30 City.Risks Deliverable D2.1 (Yuan and Detlor 2005). Another flavour of systems around cooperatively responding to "threats" is community-based neighborhood watch systems. One measure that sticks out of this category is running disaster exercises. Disaster exercises can also be seen as a means to create the right response in an emergency situation, it, however, needs a complete other level of organization and direct collaboration between authorities and citizens then the measures addressed above. The role of such exercises to improve effectiveness in emergency management and in creation of community disaster preparedness, has been laid out by (Perry 2004). Exercises result in increased knowledge of the participants (what to do in an emergency) as well as increased confidence in abilities of others and in the ability to work as a team. 3.1.3. Research directions In contrast to broadcasting, targeted alerting requires information about the situation of the group or individuals to target. One of the challenges is to preserve the privacy of the users. There are different techniques that can be used to achieve this. Pseudonymization of data records, using random device identifications instead of personal user ids, like, email addresses Encryption of data records, e.g., using Bloom filters to guard against unauthorized access while maintaining searchability of data sets Decentralized storing of data records, e.g., using personal or on device space to hold sensitive data Since City.Risks tries to target a wide spectrum of use cases, alerting and – in particular – response functionalities require a lot of flexibility. In most cases, great flexibility leads to losses in scalability and overall performance of systems. To prepare City.Risks platform components to be used in real products, these flexibility/performance trade-offs has to be taken into account, to be able to serve huge number of users simultaneously as a smart city environment requires. 3.2. Mobile Augmented Reality (mAR) The City.Risks mobile application offers new visualization methods for communicating (individual) risks as an effective innovation for better action advices by integrating and developing mobile augmented reality (mAR) technologies. This mobile application with augmented reality features will allow citizens to use their smart phones or tables to visualize security-related information regarding their surroundings (e.g. historical crime statistics or any ongoing criminal activity), being also able to interact with the augmented objects (e.g., for tagging them). This will enable better situation-awareness and response support. © City.Risks Consortium 31 City.Risks Deliverable D2.1 3.2.1. User interaction with mAR data Mobile augmented reality (mAR) is an innovative user interface for providing individual risk information and warnings as well as action advices on mobile devices (e.g. smartphones). Individual risks and defence action alternatives can be presented more realistic, e.g. by presenting the virtual water level of flood (risk map) or potential danger defence actions (alternative kinds of level) directly in reality, which improves the individual recognition and analysis of a hazard situation as well as possible action possibilities. The data presented as augmented reality can include information about visible objects (e.g. the statics of a building), not visible objects (e.g. a below-ground infrastructure like electricity or sewage system) or not yet visible objects (e.g. a flooding). For example, users can see information about their surrounding location regarding history of criminal activity (crime maps by type and seasonality), as well as any ongoing criminal activity or a coming criminal activity in the near future (e.g. a group of terrorists moving to the users location). Today, mAR applications only present information (often 3D objects) to the user. But in case of an ongoing or future criminal activity (like in City.Risks), the communication should turn to a bidirectional channel, with the users (witnesses) sending back feeds to the authorities. The challenge is to provide users the possibility to interact with the augmented objects, e.g. to add information, to update objects or to create new objects. Similarly, methods and tools for capturing of new content by the users (crowd sourcing, in-situ authoring) are not available (research is focused on authoring tools for expert authors, e.g. DART, arToolkit, Layar Creator) (Chun et al. 2013) (Rumiński et al. 2013); thus, research will be conducted in the field of design of interaction with spatial mAR content. 3.2.2. mAR content models Traditionally, only a single risk is presented as AR in a mobile application. An additional challenge that will be addressed in the City.Risks project is to visualize a set of (all) risks (historical as well as current as well as future) in a single mobile app. Different data sources (data bases, web services, GIS etc.) with different data types and formats will be integrated and mapped to a common content model (Rumiński et al. 2014). Unfortunately, no standard AR data format currently exists. Current mAR content standardization (OGC ARML 2.0 (Lechner 2013), AR Standards (Perey 2014), AREL (Metaio 2014) and X3D AR (SRC WG 2013)) do not address the problem of a common content model for a consistent mapping and management of heterogeneous content from different data sources, because they only focus on a data format for visual presentation of mAR content. Therefore, research for such a common data exchange format is necessary and different available data formats have to be investigated to develop such a common data exchange format. Another challenge is the integration of spatial data, its combination with additional data, and the subsequent generation of appropriate 3D structures. Most promising is the XML-based OGC standard CityGML as such a mAR data exchange format. Hereby, © City.Risks Consortium 32 City.Risks Deliverable D2.1 the spatial data objects (as connecting elements of the real environment as well as the augmentation) could be mapped with its structure, geometry and semantic in appropriate structures of the standard CityGML (Gröger et al. 2012) which could be transformed in an appropriate 3D structure: mapping of the actual geometry (e.g. for building); representation be (realistic) symbols (e.g. vegetation); approximation by extrusions. These information can be combined with other spatial data (e.g. aerophoto for texturing), so that from the existing spatial data sets result comprehensive descriptions for the mAR Scenes. The use of the standards CityGML probably enables – besides the mapping of the geometries – also the preservation of the structure of the objects and the mapping of the semantic, which can be used as a basis for the subsequent scene authoring. The building of the 3D structures will take place rule-based, c.f. to the greatest possible extent automatically. 3.2.3. Generation, provision and rendering of mAR data The information provided to the citizen about the individual risk at a certain location can be static (maps, crime statistics) or dynamic/real-time (current events, conditions). As relevant data (e.g. real-time crime maps, flood risk maps) can be complex geometries, existing approaches of web services for data generation, provision and rendering for mAR on mobile devices (Belimpasakis et al. 2010) are made for static data and are based on caching (e.g. tile map services, TMS), which are too inflexible in dynamic danger situations (storage use, performance, user experience UX). A challenge is to provide dynamic complex mAR data in real-time. The main approach will be to develop a dynamic, cloud-based, OGC conform Web Processing Service (WPS) within the existing holgAR content platform (Fuchs-Kittowski et al. 2012), (Fuchs-Kittowski et al. 2014) for providing data necessary, that uses clipping to reduce the complexity of a polygon (e.g. risk map). By clipping, a specific area is cut out of a risk map to create a smaller map (a less complex geometry with less data to process). This way, the generated geometry is small enough to be rendered on demand dynamically. In addition, outsourcing resource intensive tasks to the cloud (e.g. Google App Engine) (Huang et al. 2014), (Manweiler 2014) will be used to ensure a high performance, reliable and robust system in case of a disaster, where a large number of requests are expected. 3.2.4. Research directions During the design of the City.Risks mobile application, we direct our research to new and vibrant topics related to the use of augmented reality in security solutions. Development of a mAR data description language (mAR content model): As a basis for a consistent, neutral representation of spatial content from different data sources in different formats a mAR content description language will be developed. This consistent data model also enables the generation of different export formats © City.Risks Consortium 33 City.Risks Deliverable D2.1 ranging from simple formats (e.g. points of interest) to complex objects (2D area, 3D structures etc.), e.g. AREL for presentation in AR browsers. The technical basis will be the XML-based standard CityGML, which is well established in the world of spatial data and will be investigated and probably used in the project. Particularly, CityGML provides a good basis for the description of geometries and semantic and is – as a generic language – extensible, e.g. for flood, crime and other risks. Development of mAR dynamic, cloud-based WPS: Development of a dynamic, highperformance, cloud-based, OGC conform Web Processing Service (WPS) for the generation and provision of dynamic mAR representations in real-time. It will use techniques like clipping to render a complex geometry (e.g. a risk map) on demand dynamically, and will be implemented as a cloud service to ensure a high performance, reliable and robust system in case of a risk, where a large number of requests are expected. Development of an user interaction concept for spatial mAR content: An interaction concept for spatial mAR content will be developed and implemented to present actual risk information as mAR in the camera view of the mobile device in the context of reality and allow the users to interact with it. It will provide users of the mobile app the possibility to interact with the virtual, augmented objects presented as AR, e.g. add information, update objects or create new objects. 3.3. Risks Management and Operation Center In the City.Risks project, the risk management and operation center form the command and control center. These systems are triggered when citizens transmit information from a scene or the sensor–based theft detection module reports stolen objects. Further they are used for monitoring of crime incidents and visualization of information from “ground reporters”. Further data simulations and evacuation models are made based on the incoming data. An operation manager will have access to all the combined components in order to manage and control the processes. 3.3.1. Risk management Risk management can be seen as the super ordinate term behind crisis management, disaster management, emergency management, conflict management, and incident management. Risk management provides the broadest context of warning systems. (UN-ISDR, 2009) defines risk management as “managing the uncertainty to minimize potential harm and loss”. The main goal of risk management is to develop a strategy as a measure for reducing risk. Important aspects of risk management such as risk and vulnerability analysis could be found as constituting elements of crisis warning systems. The use of the term warning system in the context of risk management is to monitor indicators and alerting within smaller scale systems such as for road safety (Banks et al. 2009), business logistics, or IT systems thus on risks that cannot be assigned to more specific management domains. © City.Risks Consortium 34 City.Risks Deliverable D2.1 The risk management system reacts when sensors or citizens transmit new data. The different information like pictures, videos, notes and theft detection messages are analyzed. An alarm manager will then react on the data. (Hollifield and Habibi 2010) developed seven steps to alarm management. Further, risk assessment is done to identify in advance what could happen and how to react. The Urban Risk Assessment (URA) is a study done by (Dickson et al. 2012) and analyses disaster and climate risks in cities. They present a flexible approach to assess the risks. (Shi et al. 2006) looked at the urban risks especially in China. Recent research in the field of risk, disaster and emergency management has proposed reference architectures for the open composition of risk management systems based on Software as a service (SOA) principles and proven concepts (e.g., the concepts from the projects ORCHESTRA, OASIS and WIN (Sassen et al. 2005), SANY (Havlik et al. 2006) or INSPIRE (Florczyk et al. 2009). Often the operation center is seen as a part of the risk management, but it could also be seen as separate part working together with the risk management. 3.3.2. Operation center The operation center and risk management system is a physical or virtual facility site from which response teams exercise reaction and control in an emergency case, disaster or security incident. In a city, different providers take care of the security of the citizens such as the fire brigade, police department or health care services. Further there exist operation centers for critical infrastructures, like energy suppliers or transport services. All in common monitoring, coordination and managing are the main tasks for an operation center. They work for daily threats, natural disasters, in case of defense or civil protection. Current research is clearly directed to an operation center that offers situation awareness over the whole city and all related aspects. This direction is driven by the smart city concept. Smart City Operation Centers: With more and more people living in a city, new requirements arise to respond also to crime situations. For example, New York City reduced crime by 27% with a centralized location of information and a 911 real-time dashboard providing emergency needs and its resources (Washburn et. al 2009). The Cisco Smart+Connected City Operations Center also offers Integrated Control, Input collection, transmission and distribution as well as multi-display operation (Cisco, 2015). The IBM Intelligent Operation Centre is built for cities and communities to integrate systems and information sources, tools for communication and co-working and analysis and visualization (IBM, 2012). (Naphade et al. 2011) describe the smart cities and their future challenges. Public safety is one key factor besides education, healthcare, transportation and others. The operation center of Rio is described as an example of an integrated information space. As seen in Figure 3.1, they include dynamic information from weather sensors, video surveillance and others and combine them with GIS data to support the crisis and transportation management. For the future, more services should be connected to the system in order to have a closed-loop system. © City.Risks Consortium 35 City.Risks Deliverable D2.1 Figure 3.1: Rio de Janeiro’s Operations Center after (Naphade et al. 2011) 3.3.3. Simulation and visualization of crime and risks A key requirement of the operation center is to quickly get an overview about all incidents and information. This is supported by simulation and visualization. To visualize crime and risks, crime mapping is done. On the basis of Geographic Information Systems (GIS) and temporal aspects, it is possible to localize and analyze all incidents. Originally used by criminologists to combine all available data to one case, it could also be used to map specific information from different cases. Hot spots of crime could be visualized in order to identify areas of risk. Two different aspects have to be considered for the visualization, the geographic areas looked at and the color used. (Harries 1999) suggested the usage of point, lines or polygons. Points represent exact places with addresses or street corners, lines represent streets and paths, which could be straight, bent or curved and polygons represent neighborhoods as a bigger area in a city. To visualize the density of incidents (Eck et al. 2005) presented the usage of graduated dots so that the size represents the number of crimes. Further they proposed to use color gradient dots to visualize nuances for example a coloring from red to yellow. (Boulos et al. 2011) use crowdsourced data from Twitter and Wikipedia to compose a 3D visualization or outdoor surveillance data in real-time. Sensor data and citizens reports are combined for the team of professionals to react in the operation center. In Figure 3.2, the architecture using the data for the visualization is shown. © City.Risks Consortium 36 City.Risks Deliverable D2.1 Figure 3.2: Common Scents technical architecture after (Boulos et al. 2011) 3.3.4. Research directions The City.Risks platform will follow the resent research directions and integrate different components, usually built as autonomous parts to work as one system. Important parts are the communication between the single functions, data messaging as well as data formats and protocols have to correspond. The operation center will allow the operator to have an overview of all incidents and threats in order to respond to them. A visualization tool will provide all the information on a map in order to comprehend them quickly and calculate the situation. Also the usage of social media and the possibility of the communication between the operator and the citizen is a new field. The participation is essential for the operator to get details of the situation. The decision making process is enhanced by the risk management and the simulation platform. © City.Risks Consortium 37 City.Risks Deliverable D2.1 4. Data Management This section overviews the most important work from the literature that is related to the Data Management layer of the City.Risks platform. We describe recent advances in data acquisition and mining, query processing, privacy and anonymization, data analytics and route planning. Furthermore, we pinpoint gaps and challenges in current work, and outline specific research directions that will be explored within the scope of the City.Risks project. 4.1. Data Acquisition and Mining The City.Risks platform must facilitate decision support and data analytics tasks with the focus on security and the reduction of the fear of crime. In order to effectively complete this task, the exploitation of data from multiple sources that describe the urban setting is necessary. To that end, City.Risks will not only utilize standard datasets, such as official demographic data or police crime reports, but will also focus on the integration of data from additional sources, such as the web or the social media, in order to enhance our understanding of crime related information in urban environments. 4.1.1. Mining the social media Social networks have gained significant attention over the past few years. They have attracted a worldwide user base that exchanges vast amounts of information while communicating, sharing thoughts and describing real world happenings. Twitter (Kwak et al., 2010) in particular has been in the forefront of such activity, attracting also significant research interest. The open access to Twitter data and its real-time nature makes information sharing instant. These characteristics have directed a large part of the research in mining the social media to focus primarily on Twitter data. Most of these approaches can be utilized with respect to similar data from different sources. Effectively mining Twitter data (Bontcheva et al., 2012) can lead to valuable information about real-world phenomena, such as real-world emergencies. Recent works include the usage of Twitter for crisis management (Cameron et al., 2012) and analysis of information diffusion in the case of natural disasters (Mendoza et al., 2010). Mining Twitter data is more challenging compared to extracting meaningful information from extensive, structured text usually found in news reports. Tweets have limited size, restricted to 140 characters. Such user-generated content is usually noisy, and has no imposed structure, often characterized by informal language and syntax, as well as extensive use of abbreviations, special characters and emoticons. In addition, its worldwide user base results in multilingual content. To overcome these issues, multiple methods have been proposed (Bontcheva et al., 2012). Natural Language Processing (NLP) and Machine Learning (ML) methods have © City.Risks Consortium 38 City.Risks Deliverable D2.1 been employed to analyze the content, ontologies have been developed to represent semantics, and graph theoretic methods have been used to analyze the structure of the network formed by the Twitter users and their relations. 4.1.2. Sentiment analysis Sentiment Analysis and Opinion Mining (Dave et al., 2003) is the process of identifying and extracting subjective information. Using sentiment analysis, one can monitor what people have in mind in terms of sentiment (“good”, “bad” or “neutral”) when they refer to a specific subject. This is commonly achieved by analyzing text and measuring the sentiment for the given text snippet using NLP techniques. One interesting ongoing research direction is the enhancement of sentiment analysis techniques in order to detect moods and emotions in tweet content. For example, (Bollen et al., 2011) mines the public sentiment (positive / negative) and mood (calm, alert, sure, vital, kind, happy) from tweet feeds, and investigates the effectiveness of such information towards predicting stock market valuations. Another recent work (Lansdall-Welfare et al., 2012) applies standard mood detection methods from (Strapparava and Valitutti, 2004) to detect sentiments (joy, fear, anger, sadness), and correlates public mood patterns in the UK to detect periodic events such as Christmas and Halloween, and public events such as riots and the announcement of cuts in public spending. 4.1.3. Event detection As mentioned above, the real-time nature of Twitter allows the instant propagation of information about real-world events as they happen. This characteristic allows Twitter users to be more responsive in diffusing information about real-world happenings than curated news feeds or other social media. Event detection from Twitter data has attracted attention recently. One of the most influential works is that of Takaki et. al (2010), which focuses on the detection of earthquakes. Twitter users are considered as sensors, and tweets as sensory information, reducing the event detection problem to object detection and location estimation. By using machine learning techniques, tweets that are relevant to earthquake events are identified. Then, the content of tweets, as well as geolocation information is employed to detect and locate events. Twitter data have been also employed in order to detect crime and disaster related events. In (Rui et al., 2012), a classifier determines if a tweet is related to such an event. The approach is based on a set of rules that outline crawling strategies for the detection of relevant tweets, which are refined iteratively. Apart from the text of a tweet, other features, such as links in the content, serve as input to a classifier. Location prediction is based on the fusion of information extracted from the Twitter graph, as well as the knowledge gathered from past tweets and re-tweets. © City.Risks Consortium 39 City.Risks Deliverable D2.1 Gerber (2014) utilizes twitter data and kernel density estimation in order to predict crime. The output of twitter-specific linguistic analysis in combination with statistical topic modeling is used to generate additional inputs for a crime prediction model. The author presents experimental results indicating that, for 19 out of the 25 types of crime, the addition of the Twitter data input increased the performance of the crime predicting method compared to a standard kernel density estimation based method. Weng and Lee (2012) construct signals for individual words by applying wavelet analysis. Trivial words are filtered out according to their corresponding signal autocorrelations. Events are detected by clustering the remaining words using a modularity-based graph partitioning technique. Becker et al. (2011) analyze the stream of Twitter messages with the purpose of detecting which messages refer to real-world events, and do not refer to Twittercentric trending topics. Their approach relies on clustering of tweets that are topically similar. Contrary to most works on event detection that focus on large scale public events, Agarwal et al. (2012) investigate the detection of events of local importance that are usually sparsely reported. Their approach is based on a two-step process, where supervised classification is employed to detect relevant tweets, and NLP is applied to analyze tweet content. Recent work by Nathan Kallus (2014) investigates the quality of Twitter data towards the prediction of events. Off-the-shelf NLP tools are used for the processes of event, entity and time extraction. A case study of this approach is the prediction of protests in a country and city level. Precision is evaluated against event extraction performed by workers on Amazon Mechanical Turk. 4.1.4. Event summarization Apart from the detection of events, other works are focused on the summarization of known events based on data mined from Twitter. Chakrabarti and Punera use tweets to summarize sporting events. They formalize the problem of summarizing events using tweets, and propose a solution based on learning the underlying hidden state representation of events using Hidden Markov Models. In order to utilize information from a plethora of sources to better detect and summarize real-world events, recent works focus on the fusion of data retrieved from multiple social media. This requires the aggregation of different types of content, such as text, images and video. (Becker et al., 2012) combines precisionoriented and recall-oriented query generation techniques to associate content from different social media with events, and as a result utilize content extracted from one social media site in order to enhance the detection of events in other social media sites. Their methods have been applied to detect information from Twitter, Flickr and Youtube. © City.Risks Consortium 40 City.Risks Deliverable D2.1 4.1.5. Geocoding Spatial location is an important aspect of real-world events, which may be crucial in the decision support process. To that end, multimedia geotagging is an important for a variety of applications (Luo et al., 2011). With respect to the City.Risks domain, the detection of crime events is incomplete in the absence of information about the spatial location that the criminal activities took place. Usually web documents are not associated with spatial coordinates. Even with respect to platforms that allow the geolocation of documents on creation using GPS coordinates, only a small fraction of the users utilize this feature. For instance, only 0.77 percent of public tweets include GPS coordinates (Semiocast, 2012). The task of automatic document geolocation involves the resolution of spatial locations described within textual descriptions. This process is usually achieved by extracting spatial named entities from a document and assigning spatial coordinates to these entities using a gazetteer. Domain specific applications utilize additional heuristics in order to increase the process effectiveness. NewsStand (Teitler et al., 2008) monitors, collects and displays news stories in a map interface. A custom geotagger is used in order to obtain location coordinates associated with the articles, which are clustered in an online manner. TwitterStand (Sankaranarayanan et al., 2009) collects tweets related to breaking news, cluster them and distribute them to offer an online news delivery service. One of the tasks performed by TwitterStand is geotaggins tweets. For this task, tweet text, combined with any articles linked from the tweet, is used, in conjunction with tweet metadata, such as the location of the user that created the tweet. Serdyukov et al (2009) present a method for the automatic placing of Flickr photos on the world map. Their approach estimates a language model by analysing the textual annotations that are commonly used to describe images taken at particular locations. An external database of locations is also used in order to improve efficiency. Recent works research how supervised learning techniques can be used to increase the geolocation effectiveness. Wing, B. P., & Baldridge (2011) predict document locations in the context of geodesic grids of different degrees of resolution. Lieberman and Samet (2012) propose a method method based on adaptive context features, which takes into consider a window of context around toponyms to increase the effectiveness of the toponym resolution task. 4.1.6. Research directions Twitter data have been utilized for event detection and summarization from different domains such as sporting events, earthquakes, elections, etc. However, there is limited work on the detection and information gathering regarding crime related incidents. © City.Risks Consortium 41 City.Risks Deliverable D2.1 Most of the works focusing on event detection have been investigating the use of Twitter data for the detection and summarization of large-scale events of global significance. Such events are usually related to a large number of relevant tweets. On the contrary, there has been limited attention to localized events, which may only be significant to a small subset of the overall Twitter user base. An open challenge remains the application of prominent event detection approaches to detect, gather information and summarize localized events, such as events related to criminal activity. The lack of structure in tweets does not always allow the efficient extraction of semantic information. State-of-the-art approaches may be augmented with domain specific and ontological knowledge in order to accomplish better extraction of semantic knowledge related to the detection and summarization of criminal and anomalous activity. To this end, advanced sentiment analysis methods can be employed, in order to increase criminal and anomalous event detection accuracy by analyzing the mood of Twitter users, implicitly entailed within tweets. Data aggregation relies heavily on the specific domain and data. Towards this end, information mining for crime related incidents and anomalous events must aggregate information retrieved from Twitter feeds with information that has been the product of public reporting obtained through other sources, such as relevant mobile applications. An open question is how techniques for mining text and Twitter content can be adapted to accommodate public reporting. Finally, another important issue is the fusion of event-related information from multiple information formats. Event-related information can be found not only in Tweets, but also in images and videos. Techniques for the aggregation of social media content in different formats must be adapted for the purposes of crime and anomalous event detection. 4.2. Query Processing This section reviews recent literature on spatial, temporal and textual query processing and related problems that can be employed or extended within the scope of City.Risks. Our analysis focuses on techniques from the literature that will provide the necessary foundation for the data analytics tasks that will be offered by the platform. 4.2.1. Identifying and ranking locations and areas of interest One of the core functionalities and services of the City.Risks platform is to collect and analyse crime related data, in conjunction with other available data (maps, demographics, etc.), in order to identify, characterise and rank crime “hotspots”. These refer to locations that are characterised by high rates of one or more types of criminal activity. From a geographical perspective, they may come in the form of different shapes, i.e. points (e.g., a single location, such as an ATM), lines (e.g., a dark alley) or polygons (e.g., a park or a neighbourhood). The system can then use this © City.Risks Consortium 42 City.Risks Deliverable D2.1 information to increase the feeling of safety of citizens by allowing them, for example, to be informed about and to avoid high risk spots nearby their location or within an area they wish to visit. To that end, it is possible to exploit and adapt methods for extracting and ranking points and areas of interest. The latter is a research direction that has attracted a lot of interest in the recent years, due to the increasing importance and demand for location-based services and the widespread use of location-based social networks. Although studied in a typically different context, e.g. finding attractive places for tourists or ranking locations offering certain services, the underlying concepts and techniques can be adapted and extended for extracting and analysing crime hotspots. Thus, in what follows, we review related work in the topic of identifying and ranking points of interest (POI) and areas of interest (AOI). Facing the increasing demand for services providing location search and recommendations, numerous works have focused on discovering and ranking points or areas of interest. Various definitions and criteria have been used for this purpose. The main differences involve the following aspects: (a) whether the focus is on single POIs or whole areas; (b) whether the problem involves nearby search around a given query location or rather browsing and exploration within a whole area; (c) whether the aim is to maximize the number or the total score (e.g. relevance or importance) of the POIs enclosed in the discovered area or to minimize some cost function (e.g. distance or travel time) on a set of POIs that suffice for covering the query keywords. The majority of existing works focus on the ranking of single POIs. In particular, location-aware top-k text retrieval queries have been studied by Cong et al. (2009). Given the user location and a set of keywords, this query returns the top-k POIs ranked according to both their spatial proximity and their textual relevance to the query. For the efficient evaluation of such queries, a hybrid indexing approach was proposed, integrating the inverted file for text retrieval and the R-tree for spatial proximity querying. Further variations of spatio-textual queries and indexes have been extensively studied (see Chen et al. (2013) for a comprehensive survey). Top-k spatial keyword queries have also been studied by Rocha-Junior and Nørvåg (2012), but with distances being calculated on the road network instead of the Euclidean space. In our case, the keywords appearing in the query could correspond to certain crime types or other terms found within the description associated to crime incidents, thus allowing to search for high risk locations with respect to certain types of crime incidents. A different perspective for ranking POIs was followed by Cao et al. (2010). In that setting, the importance of a POI takes into account the presence of other relevant nearby POIs. Still, the result set of the query is a ranked list of single POIs. This is particularly useful in our scenarios, since the presence of many nearby crime hotspots is certainly a factor indicating higher risk. A different type of queries, involving sets of spatio-textual objects, has been investigated by Cao et al. (2011) and Zhang et al. (2009). In this setting, the query specifies a set of keywords, and optionally a user location, and the goal is to identify sets of POIs that collectively satisfy the query keywords while minimizing the maximum distance or the sum of distances between each other and to the query. © City.Risks Consortium 43 City.Risks Deliverable D2.1 This type of queries can be used, for example, to find nearby locations that combine different types of crime incidents, thus identifying potentially interesting patterns and correlations. More recently, other works have focused on discovering regions of interest with respect to a specified category or set of keywords, where the importance of a region is determined based on the number or the total weight of relevant POIs it contains. Lamprianidis et al. (2014) have presented a workflow for collecting and integrating POIs from several Web sources, and then applying density-based clustering to identify regions with high concentration of POIs of certain categories. A method for extracting scenic routes from geotagged photos uploaded on sites such as Flickr and Panoramio has been presented by Alivand and Hochmair (2013). Discovering and recommending regions of interest based on user-generated data has also been addressed by Laptev et al. (2014). The quality of a recommended area is determined based on the portion of the contained POIs that can be visited within a given time budget. Other variations of queries for discovering interesting regions include the subject-oriented top-k hot region query, proposed by Liu et al. (2011), and the maximizing range sum query, proposed by Choi et al. (2014). In these settings, the region is defined by a rectangle or circle with a maximum size constraint, and the goal is to maximize the score of the relevant POIs contained in it. Furthermore, Cao et al. (2014) proposed the length-constrained maximum-sum region query. Given a set of POIs in an area and a set of keywords, this query computes a region that does not exceed a given size constraint and that maximizes the score of the contained POIs that match the query keywords. The query assumes an underlying road network, in which the POIs are included as additional vertices, and the returned region has the form of a connected subgraph of this network with arbitrary shape. The problem is shown to be NP-hard, and approximation algorithms are proposed. The above works extend and generalise the problem of extracting and ranking POIs to the case of AOIs. Thus, these techniques can be exploited and adapted for mining regions (e.g. neighbourhoods) that are characterised by high density of certain types of crime incidents. Finally, in a different line of research, other works have applied probabilistic topic modelling on user-generated spatio-textual data and events to associate urban areas with topics and patterns of user mobility and behaviour (see Kling and Pozdnoukhov (2012) and Ferrari et al., 2011). This is an interesting and promising direction towards relating crime hotspots with information about user mobility, topics and patterns. 4.2.2. Queries with spatial, temporal and textual filtering One of the main functionalities of the data management layer of the City.Risks platform is the efficient evaluation of queries that include spatial, temporal and/or textual filtering. Several specialized indexes have been proposed in the literature for such types of queries, typically involving complex, hybrid data structures for combining two or even all three of the aforementioned dimensions. Next, we review related work in this area, addressing each case separately. © City.Risks Consortium 44 City.Risks Deliverable D2.1 4.2.2.1. Spatio-temporal queries Several approaches have been proposed for efficient indexing and querying of moving objects. A comprehensive survey of spatio-temporal access methods is provided by Mokbel et al. (2003) and Nguyen-Dinh et al. (2010). Existing indexes are categorized according to whether they index past, current or future positions of moving objects (or combining all three). Here, we mainly focus on the first category, namely, indexing the past positions of moving objects. In the City.Risks platform this can be used, for example, to find theft detection sensors that have been located within a certain area during a specified time interval. One of the main approaches in this category is SETI (Chakka et al. (2003)). SETI employs a two-level index structure to handle the spatial and the temporal dimensions. The spatial dimension is partitioned into static, non-overlapping partitions. Then, for each partition, a sparse index is built on the temporal dimension. Thus, one main advantage of SETI is that it can be built on top of an existing spatial index, such as an R-tree. Furthermore, an in-memory structure is used to speed up insertions. Queries are evaluated by first performing spatial filtering and then temporal filtering. That is, first, the candidate cells, i.e. those overlapping with the spatial range in the query, are selected. Then, for each cell, the temporal index is used to retrieve those disk pages whose timespans overlap with the temporal range in the query. Query execution concludes with a refinement step, to filter out candidates, and (if trajectories are desired as the output) a duplicate elimination step, to filter out segments that belong to the same trajectory. A similar approach is followed also by the MTSB-tree (Zhou et al. (2005)) and the CSE-tree (Wang et al. (2008)), which, as in SETI, partition the space into disjoint cells but differ in the type of temporal index maintained for each cell. An alternative approach is followed by the PA-tree (Ni and Ravishankar (2005)), which instead divides first the temporal dimension into disjoint time intervals. Then, the trajectory of each object is split into a series of segments, according to these time intervals. Each segment is approximated with a single continuous Chebyshev polynomial and a two-level index is used to index these approximated trajectory segments within each time interval. In a different direction, spatio-temporal indexes have also been proposed for indexing objects moving in a fixed network (Frentzos (2003), de Almeida and Güting (2005) and Le and Nickerson (2008)) or in symbolic indoor spaces (Jensen et al., 2009). 4.2.2.2. Spatio-textual queries Spatio-textual queries have received a lot of attention over the past years due to the increasing interest and use of location-based services and social networks. These involve keyword-based search for points of interest and retrieval of geotagged documents, web pages, photos, microblogs, news, etc. The main focus has been on combining spatial and text indexes to efficiently support queries involving both © City.Risks Consortium 45 City.Risks Deliverable D2.1 criteria. A comprehensive survey and comparison of existing approaches is provided by Chen et al. (2013). Essentially, the indexes proposed by these approaches are hybrid structures comprising a spatial indexing part and a text indexing part. The former is typically based on an R-tree, grid or space filling curve, while the latter can be an inverted file or a bitmap. Thus, several indexes have been proposed employing different combinations of these options. A main difference is also whether the combination follows a text-first or a spatial-first approach, as investigated by Christoforaki et al. (2011). In the first case, for example, the top-level index can be an inverted file, in which the postings in each inverted list are indexed by an R-tree; instead, in the second case, the top-level index can be an R-tree, with inverted files attached to each leaf node. Characteristic examples are the IF-R*-tree and the R*-tree-IF (Zhou et al. (2005)). A further difference is how loosely or tightly the two structures are combined. For example, another index structure that is based on the R-tree and inverted files, but combines them more tightly, is the KR*-tree (Hariharan et al. (2007)). The KR*-tree maintains an inverted index-like structure, called KR*-tree List, that, for each keyword, keeps a list of nodes in the R*-tree that have the keyword. Each leaf node additionally contains inverted lists that index the keywords appearing in the objects under the node. Several similar variants exist (e.g. the IR-tree by Wu et al. (2008)). Inverted files have also been combined with grid (Vaid et al. (2005)) and space filling curves (Chen et al. (2006) and Christoforaki et al. (2011)). In the City.Risks platform, investigating such types of hybrid index structures is an interesting direction for efficiently evaluating queries that involve, for example, finding nearby locations where crime incidents of certain types or characterized by certain terms have occurred. 4.2.2.3. Spatio-temporal-textual queries Finally, driven by the growing amount of Web data containing both timestamps and spatial footprints, the need for combining keyword search with spatial and temporal filtering has been recognized. Nepomnyachiy et al. (2014) have proposed an index that is based on a shallow R-tree, combined with an inverted index at each leaf node to index the terms of the contained documents. In addition, to deal with the temporal dimension, the original document ids are replaced with new ids that are assigned to documents chronologically, thus facilitating the retrieval of documents within a given temporal range. Keyword search on trajectories has been studied by Cong et al. (2012). Each trajectory consists of a sequence of geospatial locations associated with textual descriptions. Then, given a location and a set of keywords, the goal is to find the topk trajectories whose text descriptions cover the given keywords and have the minimum distance to the given location. The proposed method is based on a hybrid index, called cell-keyword conscious B+-tree, which enables simultaneous application of both spatial proximity and keyword matching. © City.Risks Consortium 46 City.Risks Deliverable D2.1 In a different direction, the problem of continuously moving top-k queries over spatio-textual data has been addressed by Wu et al. (2013). The focus is on computing safe zones that guarantee correct results at any time and that aim to optimize the server-side computation as well as the communication between the server and the client. Finally, the query studied by Skovsgaard et al. (2014) returns the top-k most frequent terms in a given spatio-temporal range. The proposed technique is based on extending existing frequent item counting techniques to adaptively maintain the most frequent items at various spatial and temporal granularities. 4.2.3. Research directions In the City.Risks platform, it is an interesting and challenging research direction to exploit, adapt and extend such index structures to efficiently manage, search and analyse crime related data and other information involving spatial, temporal and textual attributes. The aim of this process is on the one hand to efficiently utilise state-of-the-art indexes in order to allow the efficient treatment of complex queries on crime data that will be useful to the scope of the City.Risks project, while on the other hand to effectively adopt these methods based on the particular structure of crime related data and queries in order to further increase their efficiency in answering these particular queries. 4.3. Privacy and Anonymization 4.3.1. Privacy issues and anonymization techniques With the increasingly widespread use of GPS enabled devices and other positioning technologies, it has become possible for a variety of applications to track the movement of various types of objects, including vehicles, animals and humans. This opens up new capabilities and opportunities for analysing the behaviour of those entities and extracting useful knowledge and patters. In City.Risks, tracking the location/and or movement of users is relevant for several envisaged services of the platform, such as providing warnings and alerts about nearby crime hotspots or incidents, recommending safe routes, finding witnesses for an ongoing or past event, etc. However, at the same time, significant privacy concerns are raised, since movement tracking may reveal sensitive information about individuals. In what follows, we describe the problem and we provide an overview of the state-of-the-art in anonymization techniques for movement tracking data. This will offer a basis for addressing any privacy issues concerning such kind of data to be used in the City.Risks platform. The issue of data privacy is not specific to location tracking data; in fact, it comes up and has been investigated in several domains that involve publishing microdata, such as customer data or health records. On the one hand, publishing such data is desired and highly valuable since it offers the potential to extract valuable knowledge; on © City.Risks Consortium 47 City.Risks Deliverable D2.1 the other hand, it entails the risk of privacy breach by accidentally revealing sensitive information. Simply removing explicit identifiers, such as names and social security numbers, is not sufficient. A characteristic example was presented by Sweeney (2002), where the medical records of the governor of Massachusetts were revealed by combining gender, date of birth, and 5-digit zip code information from voter registration records and a previously de-identified dataset with medical records published by an insurance company. This shows that combining a set of attributes, referred to as “quasi-identifiers”, from a de-identified dataset with other publicly available data can still reveal sensitive personal information which was initially to be protected. To address this problem, the concept of k-anonymity has been proposed (Samarati, 2001; Sweeney, 2002). This is a data privacy guarantee, requiring that for each individual there exist at least k-1 other individuals having the same values for the attributes recognised as quasi-identifiers. In other words, this guarantees that each individual is “hidden” among k-1 others. Nevertheless, a privacy breach still exists if all k individuals within such a group have the same value for the sensitive attribute (e.g. the same disease). In that case, the sensitive information is still disclosed, even though the exact individual cannot be identified. To deal with this, a further guarantee, referred to as l-diversity, has been proposed (Machanavajjhala et al, 2007; Xiao et al. 2010). This guarantee requires that within the same group of individuals there should be at least l different values for the sensitive attribute. Although these concepts and techniques are also relevant when dealing with location and movement data, they are not sufficient to protect privacy. When a series of locations is available for a user, exploiting spatial and temporal correlations may still reveal sensitive information, even though partial anonymity guarantees may have been applied. Thus, a specific part of research has focused on privacy protection for this specific type of data. In particular, two broad scenarios can be identified. The first involves continuous location-based services, where a mobile user reports its location –periodically or ondemand– in order to receive certain information or services. The second involves privacy protection for historical trajectories. Next, we briefly present the main techniques that have been proposed for each case (for a more detailed survey, see Chow and Mokbel, 2011). For the first category, the main techniques that have been proposed in the literature include spatial cloaking (Mokbel et al, 2006), mix zones (Beresford and Stajano, 2003), path confusion (Hoh et al., 2010) and dummy trajectories (Kido et al., 2005). Spatial cloaking is a technique that was also proposed for snapshot location-based services. The main idea in this approach is to “hide” each user in a “cloaked” spatial region that guarantees k-anonymity. The approach is extended in the case of continuous location-based services, where two main techniques can be further distinguished, namely group-based and distortion-based. The basic idea is that, before issuing a query, a user forms a group with k-1 other nearby users, and the spatial region containing this group is used instead of the specific location of that user; then, at subsequent queries, the cloaked regions is updated to still include the group members. The distortion-based approach improves upon the group-based one © City.Risks Consortium 48 City.Risks Deliverable D2.1 by considering also movement direction and velocity in order to optimise the selection of the cloaked spatial regions. Mix zones are spatial regions, for which the following apply: (a) when a user enters a mix zone, it is assigned a new identifier, and (b) while the user remains in the mix zone, it does not send any location information. By appropriately selecting the mix zones, it is guaranteed that a user that exits from a mix zone cannot be distinguished from any other user that was also within the same mix zone at that time. Path confusion is a technique aimed at avoiding the linking of consecutive locations to individual users by attacks referred to as target tracking (Gruteser and Hoh, 2005). Finally, in the dummy trajectories approach, the idea is to generate and include some fake location trajectories in order to hide the real trajectory of the user. For the second category, involving privacy protection in historical trajectories, two main types of techniques can be identified, clustering-based (Abul et al., 2008) and generalisation-based (Nergiz et al., 2009). Compared to the case of continuous location-based services described above, the main difference here is that the complete trajectory of each individual user or object is known in advance. In the clustering-based approach, the basic idea is to cluster together k trajectories that are both spatially and temporally close in order to form an anonymized aggregate trajectory. In the generalization-based approach, the algorithm works in two steps. In the first step (anonymization), each initial trajectory is anonymized as a sequence of k-anonymized regions. Then, in the second step (reconstruction), new trajectories are reconstructed from the generalized ones by uniformly selecting k points for each anonymized region and then using one of them to form a trajectory linking the respective regions. 4.3.2. Research directions During the design of the City.Risks platform and services, we will investigate how such techniques can be exploited and adapted to provide privacy protection when dealing with location and movement data. Nevertheless, our topmost priority will be to alleviate, as much as possible, such issues. To that end, we will leverage the increased capabilities of modern smart phones in order to perform –whenever possible- location-aware processing tasks on the mobile device instead of sending location data for processing on the server. Moreover, emphasis will be given on such issues when designing the mobile applications and services, making sure that the user is explicitly informed and can choose which information is disclosed, when and with whom. For example, it may be possible for many scenarios to not transmit and store the location of a user to the operation centre, but instead share it directly only within a specified trusted network of other users, such as family or friends. 4.4. Data Analytics The City.Risks platform involves the collection and management of large volumes of data related to crime incidents and more general purpose information describing the © City.Risks Consortium 49 City.Risks Deliverable D2.1 urban areas of focus. All this information is crucial to support the decision making tasks that must be supported by the City.Risks platform. In order to make informed decisions, the City.Risks platform must promote the efficient communication of the information maintained within the City.Risks databases. To achieve this, the platform must be able to export selected descriptive statistics summarising the data, thus allowing the decision makers to exploit this information. On top of this, the City.Risks data may be exploited for predictive analysis. Such a data-drive approach will allow the exploitation of historical data, in order to identify hidden patterns, which will provide insights about future events. 4.4.1. Mapping crime Spatial location is highlighted as an important characteristic related to crime incidents (Chainey et al., 2008, Chainey and Ratcliffe, 2013). Concentration of crime incidents to certain locations is usually related to particular characteristics and opportunities associated with these spatial locations. Areas with high concentration of crime incidents are referred to as crime hotspots (Chainey and Ratcliffe, 2013). Mapping crime incident clusters is a vital operation for a variety of tasks executed by law enforcement agencies. Decision making on the placement of patrols for instance is a crucial task that is considered to benefit from crime hotspot mapping. The advancement of GIS software has provided important tools for crime mapping techniques (Chainey et al., 2008). The simplest form of crime mapping involves point-mapping, where crime incidents are visualized in the form of points on a map. Another early example of crime mapping methods is the Spatial and Temporal Analysis of Crime applications, which identifies crime clusters that are then fit to a standard deviational ellipse. Choropleth Mapping aggregates and visualizes crime incidents, with respect to a predefined space partitioning. Usually, space partitioning is based on administrative area boundaries. For instance, the different areas may represent wards or districts. In this case, different shades of color describe the crime rate in different administrative regions. An alternative is to divide space in cells of equal size. In this case, a spatial grid is utilized in order to divide the area, and represent aggregated crime volume by different shades of the cells of the grid. According to (Eck et al., 2005, Chainey et al., 2008, Chainey and Ratcliffe, 2013), one of the most suitable techniques for crime mapping is Kernel Density Estimation (KDE). KDE is considered to offer high accuracy hotspot detection in conjunction with high quality aesthetics. KDE fits a spatial probability density function to historical crime incident records. KDE hotspot mapping results in the visualization of smooth surfaces describing crime densities. © City.Risks Consortium 50 City.Risks Deliverable D2.1 According to Ratcliffe (2010), spatio-temporal crime patterns constitute an area of criminology that remains under-researched. The importance of the temporal elements of crime is indicated by repeat and near repeat victimization phenomena. For instance, after a burglary, not only the same but also nearby houses have a higher risk of been targeted, for a time period ranging from several weeks to months. 4.4.2. Predicting crime (Chainey et al., 2008) investigates the predictive capabilities offered by the aforementioned techniques. More specifically, their work researches whether, apart from mapping and aggregating historical crime incidents, the discussed techniques have additional predictive capabilities. The results show that KDE produced superior results compared to other evaluated techniques in predicting future spatial patterns of crime. Another outcome of this work is that crime type is an important factor in the prediction of spatial patterns. In particular the predictions for street level crime were superior to those for any other crime type. This was attributed to the robustness of street level crime opportunities. Mohler et al. (2012) employs self-exciting point processes to model space-time clustering of crime data. This work is influenced by the use of self-exciting point processes to model clustering patterns in earthquakes by seismologists, and the perceived similarity with criminal events in terms of local and contagious spread. The proposed method is implemented with respect to residential burglary data. Hotspot maps describe locally relevant information. Inferences made using these maps are only relevant with respect to areas associated with historical information. As a result, the knowledge displayed in these maps is local, and cannot be exploited for different areas. Xue and Brown (2006) employ multiple spatial and demographic features to train a predictive model that can be used both in areas with no historical data. Their approach, instead of using exclusively the spatial coordinates, utilises features such as distances from local landmarks, such as nearest business, or demographic information such as the number of divorced individuals in the region. 4.4.3. Crime analytics using the social media Recent work has focused on using the social media as a source of information that can be exploited to provide enhanced data analysis related to crime incidents. The social media offer a source of large volumes of information, which in many cases can be exploited in a real time fashion. As a result, this alternative feed of information may be used in conjunction with historical data in order increase the prediction accuracy of a system. Wang et al. (2012) investigate the use of Twitter messages as a source for prediction of criminal incidents. Their approach is based on automated analysis of tweets, in conjunction with dimensionality reduction based on latent Dirichlet allocation, and prediction based on linear modelling. The proposed methods are evaluated on the © City.Risks Consortium 51 City.Risks Deliverable D2.1 prediction of hit-and-run crimes. The results show that their method outperforms a baseline method that uniformly distributes incidents across days. As already mentioned earlier, Gerber (2014) examines the exploitation of tweets with spatio-temporal attributes for the purposes of crime prediction. The proposed method performs topic modelling in order to identify trending topics in a major urban area. These topics are used in conjunction with twitter-derived features in order to predict crime incidents. 25 crime types were studies. For 19 of these crime types, the proposed methods achieved higher predictive performance than a standard KDE approach. 4.4.4. Crime analysis software While there is a plethora of algorithms for specific crime related data analysis tasks, it is important to review the capabilities offered by a comprehensive system used by crime analysts. This is of great relevance to City.Risks, since it is vital that the core usability that is related to the tasks at hand is reproduced or extended. CrimeStat (Levine 2015) is a free, widely-used, comprehensive spatial statistics software system for analysis of crime related incidents. CrimeStat includes a plethora of statistical methods for the analysis of crime data. Spatial description algorithms that are supported by the system include statistics for describing the spatial distribution of incidents, spatial autocorrelation and distance analysis. CrimeStat also includes methods for hotspot analysis based on nearest neighbours, STAC and k-means, and hotspot analysis of zones. CrimeStat also includes a series of spatial modeling algorithms. Interpolation is performed by a single-variable kernel density estimation method and a head Bang routine for smoothing zonal date. Space-time clustering and analysis is also supported. In addition, CrimeStat supports journey to crime analysis, which uses crime incidents data to estimate the likely location of a serial offender. The software additionally offers multiple modules for regression modeling and discrete choice modeling. CrimeStat also provides a time series module for crime forecasting. Finally, CrimeStat includes methods for Crime Time Demand Modelling. 4.4.5. Research directions The City.Risks platform must offer a comprehensive analytics module that allows the level of analysis described in previous sections. In order to do so, this module must rely on the different information sources that will be exploited by City.Risks. As a result, we will investigate how information from diverse sources such as police, demographics, road network data, news articles, and social media can be fused and analysed in order to produce actionable information. In addition, we will focus on the further utilisation of real time and noisy sources of information, such as Twitter, in conjunction with historical data, for predictive © City.Risks Consortium 52 City.Risks Deliverable D2.1 analytics tasks related to safety and the fear of crime. For instance, one direction is a classifier able to predict the type of an incompletely reported crime. Depending on the size of the data sets obtained for City.Risks, traditional methods may not be applicable. To this end, we will investigate alternative implementations of the necessary crime data analytics algorithms that can leverage the state-of-theart distributed programming models and frameworks (Dean and Ghemawat, 2008, Zaharia et al., 2010). 4.5. Route Planning One of the requirements that must be satisfied by the City.Risks platform is the efficient treatment of routing queries in road networks. Such queries are the foundation of multiple operations of the system, such as organising evacuation routes, aiding decisions on patrols and identifying reporters near areas of interest. There have been important recent advances for the efficient treatment of routing queries in road networks. Particular attention has been paid to the problem of identifying shortest paths, which is the core operation behind every route planning task. In addition, there is a plethora of works focusing on more practical transportation problems introducing additional constraints and goals that must be satisfied. The City.Risks platform operates in an urban environment, and involves actors, such as operational units or reporters, that must be positioned and operate in order to alleviate potential threats. An efficient routing module is crucial for the treatment of such operations. This module, apart from providing the routing mechanism, must be capable of responding to domain specific queries related to City.Risks. This section reviews the literature on route planning and related problems and discusses gaps and challenges and research directions of relevance to City.Risks. 4.5.1. Shortest path queries in road networks The core focus of route planning research is centred around the efficient treatment of shortest path queries. Such queries are the core operations behind transportation problems in road networks. Modern techniques achieve significant speedups in calculation times, and to do so they rely on the exploitation of the fundamental structure of road networks in combination with advanced pre-processing techniques. A detailed overview of the state-of-the-art can be found in (Bast et al., 2014). The road network is usually maintained in the form of a directed graph. Vertices represent junctions, whereas arcs represent road segments. Arcs are associated with metric weights that represent some form of traversal cost. These weights can be static or dynamic. They usually correspond to traversal times, arc distances, energy costs, or the combination of multiple metrics. © City.Risks Consortium 53 City.Risks Deliverable D2.1 Given a graph representation of a road network, route planning is performed by computing the shortest path between a source and a target node in the given graph. This task can be achieved by classical search algorithms, such as the well-known Dijkstra algorithm. Alternatively, directed A* search can be employed using the spatial distance between a vertex and the source vertex in order to compute a bound on the actual shortest path distance. Classical search algorithms can accurately identify shortest paths in graphs, but do not scale to real-world route planning settings. Route planning is not a trivial problem, especially due to the size of real-word transportation networks. Consider for instance that the road network for Western Europe consists of 18,000,000 vertices. Modern techniques build on top of classical search algorithms in two directions. First of all, they rely on heavy preprocessing in order to shift parts of the computation offline, thus allowing better on-line response times. Secondly, the algorithms utilize the inherent structure (hierarchical and almost planar) of road networks in order to direct the search. The preprocessing stage usually relies on assumptions on the dynamicity of the road network. As a result, depending on the particular problem at hand, a different technique may be preferable, since the different methods have different capabilities with respect to changes in the road network connectivity or the arcs. In addition, the size of the network and the storage constraints impose additional requirements on the level of preprocessing. Usually, the best case falls between a purely on-line search and the complete pre-computation of the shortest path distance between all vertices and its storage in the form of a distance matrix. The use of spatial coordinates to direct the A* search has not proven to yield efficient results. A better alternative is ALT (Goldberg and Harrelson, 2005), an algorithm based on A*, Landmarks and the Triangle Inequality. During preprocessing, a small subset of vertices is selected as Landmarks (usually 20 vertices distributed among the graph are selected), and the distances between Landmarks and every vertex in the graph is calculated. At query time, the triangle inequality and the landmark distances are used to calculate a lower bound on the distance between a vertex reached by the A* search and the target vertex. Another approach is the Arc Flags (Hilger et al., 2009) algorithm, which precomputes information that can be used at query time in order to filter the amount of edges that need to be considered during the search. More specifically, in the preprocessing phase, the algorithm labels every arc with the vertices that are part of a shortest path starting from this arc. At query time, only edges that are labelled with the target vertex in the relevant flag set need to be examined. In order to reduce pre-computation time and the required space to store the flags, a graph partitioning approach is followed. The partitioning process breaks the graph in k subsets, while minimizing the number of border nodes between partitions. Then, arcs are labelled with a partition if this partition contains at least one vertex that lies in a shortest path starting from this arc. © City.Risks Consortium 54 City.Risks Deliverable D2.1 One of the most efficient modern approaches is the Contraction Hierarchies algorithm (Geisberger et al., 2012), which leverages the hierarchical structure of the road networks. The pre-processing step initially orders the vertices in the graph according to their significance. This is a heuristic metric that usually combines multiple criteria that offer insight on the importance of a vertex with respect to routing on the given graph. Then, according to this ordering the nodes of the graph are contracted. Every contraction step is followed by the addition of the necessary shortcuts. Shortcuts are the arcs that need to be introduced in order to maintain all shortest path distances after a contraction has taken place. The pre-processing phase results in the vertex ordering and a set of shortcuts. These are used at query time to speed up the search for a shortest path. A bidirectional version of the Dijkstra algorithm is used to search a graph that contains the original arcs and the shortcuts. The addition of shortcuts asserts that both strands of the bi-directional Dijkstra search need to focus exclusively on traversal of vertices with increasing significance. The two search strands intersect at the most significant vertex in the path. An alternative approach is based on the observation that most distant enough shortest paths pass through the same limited set of vertices. Transit-Node Routing (Bast et al., 2007) identifies such Transit Nodes and pre-processes the distances among these vertices and every other vertex in the graph. Using this information, a “distant enough” shortest path query is computed by identifying the transit nodes that minimize the total distance source-tsource-ttarget-target, where tsource, ttarget are transit nodes for source and target vertices respectively. Hub Labelling (Abraham et al., 2012, Akiba et al., 2013) is one of the most prominent modern approaches. This method selects, for every vertex in the graph, a set of vertices called its hubs. The distances between a vertex and its hub vertices are precomputed. Hub selection must obey the cover property. The intersection of the hubs of every pair of vertices u, v must contain at least one vertex that falls on the shortest path from u to v. The shortest path distance between u and v is found as the minimum distance u-h and h-v, for any common hub h of u and v. Even though, in the worst case, hub label sizes are impractical, the inherent structure of road networks in combination with efficient heuristics allow significant reductions on the size of the hub label sets. Most of the methods discussed so far can be combined in order to achieve even higher speedups compared to the standard Dijkstra algorithm. For instance Arc Flags have been used in conjunction with contraction hierarchies or Transit-Node Routing. 4.5.2. Generalised path queries Shortest path queries are the basis for route planning in road networks. However, real-world problems usually impose additional constraints that exceed the computation of the shortest path distance between vertices in a graph. Current research investigates how relaxations on the assumptions of the standard problem and the introduction of additional constraints modify the shortest path problem, and © City.Risks Consortium 55 City.Risks Deliverable D2.1 examines how proven shortest path algorithms can be used or extended in order to efficiently treat generalised queries. Therefore, given a novel generalised shortest path problem, such as the problems that need to be addressed within the City.Risks platform, the questions that need to be addressed are (i) what are the additional constraints that need to be addressed, (ii) which are the most suitable state-of-the-art methods for the given problems, and (iii) which modifications must be made to the selected techniques in order to efficiently treat these problems. One scenario that has been studied in the literature involves the efficient computation of shortest path queries in mobile or GPS devices. This is vital in situation in which mobile communication is impossible or interrupted. The main constraint in these cases is the lack of storage space and the limited computational capabilities of such devices. Research has shown that algorithms based on ALT (Goldberg and Werneck, 2005) or Contraction Hierarchies (Sanders et al., 2008) can be successfully adapted to suit this scenario. In many real-world scenarios the shortest path is not necessarily the best. Depending on the scenario, the quality of a route may be measured by multiple criteria. The different criteria may or may not be completely independent, and it may or may not be possible to combine them to form a single cost function. For instance, with respect to the City.Risks domain, the estimated traversal time may be less important factor than a safety factor, calculated with respect to the crime events that have been observed in an area. Depending onthe task at hand, we may seek to provide the route with the minimum risk, or combine the two factors in a metric that is both time and risk aware. In general, a flexible objective function makes the task of preprocessing harder. TREADS (Fu et al., 2014) is a route planning recommender system that combines three different metrics: path length, safety and the number of points-of-interest traversed by the path. The three metrics are used independently or combined by a weighted linear function in order to provide an aggregated metric. Safety related incidents are mined from transportation related topic models from Twitter. These are then used to calculate the safety score of a path. In order to account for tasks that involve different metrics that cannot be combined in a single function, route skyline queries (Kriegel et al. 2010) have been proposed. Such queries seek routes that are optimal with respect to an arbitrary combination of multiple criteria. For instance, given the criteria of safety and traversal time, the skyline operator computes all routes are optimal with respect to a combination of these criteria. In particular, a route is in the result set of the operator if there does not exist an alternative that is better with respect to both criteria. Many real-world scenarios involve dynamic information that is updated constantly. On standard route planning scenarios a source of dynamicity is traffic. The City.Risks domain involves a series of dynamic scenarios, especially with respect to large-scale crime related events. In such cases, it may be unreasonable to expect that the information regarding how safe an area is, or the time it would take to traverse a © City.Risks Consortium 56 City.Risks Deliverable D2.1 path is static. On the contrary, such information should be updated in order to reflect the latest information that has been shared by the ground reporters. The presented state-of-the-art route planning methods shift a significant amount of computation to the pre-processing step. This is not always effective in dynamic domains, since a large portion of the pre-processed information may no longer reflect the environment. In addition, the pre-processing step is usually time consuming and cannot be repeated at run time whenever new information comes to light. In order to tackle this problem several approaches have been proposed. On approach is to modify the pre-processed data in order to reflect the changes in the actual domain. Examples of this approach have been proposed for most of the techniques presented above (Delling et al. 2007). An alternative approach is to shift the burden of dealing with the new information that is not reflected by the preprocessed data to the search methods. This approach has been used for A* search (D’Angelo et al., 2012) with Landmarks and Contraction Hierarchies (Geisberger et al., 2012). Finally, a different way to deal with dynamic information is to divide preprocessing into two stages. The first operates on the graph topology, and the second on the cost metric. This allows the re-use of the results of the first step when information updates involve the cost function associated with the graph. This approach has been followed in combination with multiple techniques such as ALT (Delling et al. 2007) Contraction Hierarchies (Geisberger et al., 2012). 4.5.3. Generalised routing problems The City.Risks domain involves scenarios that exceed the assumptions of the problems discussed so far. Many interesting situations do not simply involve a single source and a single target vertex. For example, consider a scenario involving multiple ground reporters situated in different locations of a city, and a number of events that are taking place simultaneously in the urban area for which information is required. The task of assigning each reporter with a set of places that they need to provide information for exceeds a shortest path calculation query. This problem requires multiple such operations in order to compute the best assignment. Such problems usually involve combinatorial optimisation. One of the most common relevant problems is the Travelling Salesman Problem (TSP). TSP requires the calculation of the shortest path that traverses though a number of predefined locations, and returns to a predefined source vertex. The Travelling Salesman Problem has found a plethora of applications in real-world scenarios. This problem has been thoroughly researched both with respect to finding exact solutions (such as algorithms based on branch and bound techniques) and approximations (such as meta-heuristic approaches). Recently, TSP has been extended to deal with satisfying a number of categorical locations in road networks. In this case, instead of searching for paths that traverse a number of predefined locations, the search seeks optimal paths that contain vertices that satisfy a number of given location classes (Rice and Tsotras, 2012, Rice and Tsotras, 2013) or textual descriptions (Yao et al., 2011). For example, this process involves the search for a path, given a source and a destination vertex, which passes © City.Risks Consortium 57 City.Risks Deliverable D2.1 through any bank and gas station facility. These approaches operate on road networks and utilise state-of-the art techniques, such as Contraction Hierarchies and ALT, in order to efficiently compute search for optimal paths. The Orienteering Problem, is somehow similar to TSP, but seeks the path that maximizes the total utility provided by the traversed vertices and at the same time does not exceed a predefined cost budget. With respect to the City.Risks domain, a relevant application would be the computation of a path that traverses the maximal amount of areas that need to be reported. A recent survey on the orienteering problem is provided by Vansteenwegen et al. (2010). Vehicle-Routing Problem (VRP) is a generalisation of TSP. This problem involves multiple vehicles and seeks the optimal paths that allow these vehicles to service a set of customers in predefined locations. Several extensions to the problem have been proposed including capacity constraints, heterogeneous fleet and dynamic information. Pillac et al. (2013) survey the most important recent approaches in dynamic vehicle routing. A different set of problems that are also relevant for City.Risks are the problems that deals with optimal positioning of facilities or mobile objects on a map, in order to allow to better service an area or achieve better response times to emergencies. Instances of such problems are the Location Set Covering Problem and the Maximal Covering Location Problem. Surveys of the most important works can be found in (Li et al., 2011, Farahani et al., 2012). Evacuation transportation modeling (Murray-Tuite and Wolshon, 2013) is a heavily studied research field. The goal of this research is to provide efficient systems that can aid the management of natural disasters and other emergencies. Evacuation Route Planning is a particular direction of this work that is relevant with respect to the City.Risks platform. Hamacher and Tjandra (2001) divide research in macroscopic and microscopic evacuation models. Macroscopic evacuation models (Kim et al., 2007, Lim et al., 2012) are based on dynamic network flow models representing the aggregated behaviors of the evacuees. On the contrary microscopic models (Richter et al., 2013) operate on the level of individual behaviors of evacuees and their interactions. Dynamic Ride-Sharing seeks to match users with similar itineraries in order to minimize the overall transportation costs. As a result, such systems allow users to optimize the utilisation of the available seat capacity, and ultimately improve the efficiency of the overall transportation system. (Agatz et al., 2012, Furuhata et al. 2013) provide overviews of work in dynamic ride-sharing. City.Risks can adopt such methods and apply them towards matching user itineraries, and facilitating group transportation in unsafe areas, in order to increase the overall sense of safety of the users. 4.5.4. Research directions The City.Risks platform needs to tackle a series of problems related to route planning in road networks. In the previous sections, we discussed the state-of-the-art for © City.Risks Consortium 58 City.Risks Deliverable D2.1 these tasks. The research conducted within the City.Risks project will be based on these works in order to create efficient methods, tailor-made to particular problems of the project. First of all, more focus is needed on the development of efficient, safety-aware routing algorithms. To this end, efficient state-of-the-art techniques need to be adapted and extended by introducing additional cost metrics and constraints associated with the crime data that will be available within the City.Risks platform. Second, the algorithms that will be constructed for the computation of safety-aware paths will be the basis for generalised safety-aware routing algorithms. A concrete example of such methods is an algorithm able to solve the safety-aware routesharing task. This task would allow users of the City.Risks platform to come together while traversing unsafe urban areas. Finally, the City.Risks platform must provide tools for the management of ground reporters in light of security events. This component will be based on the adaptation of problems related to location allocation. © City.Risks Consortium 59 City.Risks Deliverable D2.1 5. Mobile Sensors and Communications An important part of the City.Risks project is based on the efficient use of sensors and radio-based technologies to transparently identify and locate stolen objects in an urban environment based on a network of citizens. This section presents the state-of-the-art research in mobile sensors and communications and outlines important research directions that will be exploited within the scope of City.Risks. 5.1. Sensors and Communication The technology assisted physical and social interactions have given birth to the idea of ubiquitous computing (Yeon, 2007). This vision has been accelerated by the developments in computing power, prolonged battery life, open software architectures and cost-effective wireless network technologies. Wireless Sensor Networks (WSN) is an essential part of this form of computing (Garcia et al, 2007; Yick, Mukherjee and Ghosal, 2008; Kuorilehto, Hännikäinen, and Hämäläinen, 2005; Sharifi and Okhovvat, 2012). WSN usually consists of a plethora of nodes (small sensors) with sensing and communicating capabilities. These sensors have limited processing or memory capacity due to economic and self-power constraints. Wireless Sensor Networks are used for monitoring in various areas (Bae et al, 2011; ITU, 2005) by constructing wireless networks with cooperation and self-organizing features. Structural health monitoring, intrusion detection, and critical environment surveillance were some of the first fields to incorporate the use of WSNs. However, one of the novel areas of focus has been the monitoring systems and convergence technologies so as to ensure social and national security and natural disaster surveillance. Modern WSN monitoring systems have low power and short range nodes with self-developed or standard communication technologies (Wheeler, 2007; Ergen and ZigBee/IEEE, 2004; Texas Instruments, 2007; ZigBee Alliance). Finally, scientific efforts focus on global network communication technologies such as IPWSN (IP-based wireless sensor network) (Ha et al, 2010; Hong et al, 2010). 5.1.1. Communication technologies for wireless sensor networks WSN generally consists of sensor fields with sensor nodes and a sink node. To achieve WSN, sensor nodes communicate among themselves into a sensor field and with the sink node. Their communication technologies mainly adopt WiFi, HSDPA, Wibro, TRS, ZigBee, UWB, Bluetooth, and 6LoWPAN. Their features are briefly described as follows (more details can be found on Kim et al. (2013)). • • WiFi is a wireless LAN standard (IEEE 802.11b), offering high-speed wireless Internet using Access Points. High Speed Downlink Packet Access (HSDPA) is an asynchronous communication protocol for mobile telephone data transmissions. It offers theoretical data transmission speeds reaching 14 Mbps, but which in practice to 2~3 Mbps. © City.Risks Consortium 60 City.Risks • • • • • • Deliverable D2.1 Moving devises may operate on speeds over 100km/h. The head count per base station is limited. Wibro (wireless broadband Internet) is IEEE 802.16e standard. It corresponds to 3.5G wireless communication technology, and Wibro-Advanced to 4G technology. Wibro has the advantages of ubiquitousness. Base stations offer collected data throughput of 30~50 Mbit/s per carrier. Also, they cover a radius of 1~5 km. Finally, moving devices may operate on high speeds up to 120 km/h. TRS (trunked radio system) combines mobility and two-way radio. In addition, it allows multiple users to operate on a single frequency. TRS has been heavily used in police and fire operations. ZigBee is a low-cost and low-power wireless mesh network standard built upon PHY and MAC layers defined in IEEE 802.15.4. ZigBee uses a communication frequency of 800 MHz~2.4 GHz and achieves a date rate of 20 Kbps~250 Kbps. ZigBee does not directly support IP connectivity. UWB is employed for communication and for radar based applications. Frequencies can be shared without interference. UWB achieves high-speed communication of low power across very large areas reaching speeds over 100 Mbps (3.1~10.6 GHz). However, due to partial pulse phase, communication requires intensive time synchronization. Bluetooth offers low power, low price, short distance wireless communication. Its disadvantages are slow transfer rate and small communication radius is short (10 m). 6LoWPAN adopts IEEE 802.15.4 and links sensor networks and IPv6 networks. Its application domains include global monitoring and cloud computing. IP-enabled sensors allow the decoding and analysis of information between different networks and communication protocols. 5.1.2. Network topologies and operational modes Due to the constraints in transmission range, multi-hop self-organizing topologies are essential in sensor networks, such as the IEEE 802.15.4. Devices are classified with respect to their operation: • The Full Function Device (FFD) that contains a complete set of MAC services and operates either as a simple network device or as PAN coordinator. • The Reduced Function Device (RFD) that contains reduced MAC services and operates only as a network device. The star topology is constructed around an FFD that acts as a PAN coordinator. The FFD node is the only one that initiates links with more than one device. The peer-topeer topology is the second one allowed. Here, each device creates direct links to other devices, thus generating redundant available paths. An example of both the IEEE 802.15.4-compliant network topologies is displayed in Figure 5.1 below. © City.Risks Consortium 61 City.Risks Deliverable D2.1 Figure 5.1: The two IEEE 802.15.4-compliant network topologies: star and peer-topeer topology (Buratti et al, 2009). The Star topology is preferred for covering a limited area and where small latency is essential to the application. The communication is controlled by an FFD that acts as a network master. Other network devices are allowed to communicate only with that FFD. The predefined network policies establish which FFD can act as a network master (PAN Coordinator) and form its own network. In the case of covering large areas and when latency is not a critical issue, the peerto-peer topology is preferred. This topology forms more complex networks, where any FFD can communicate with other FFDs inside its range via multi-hop. In this topology, network devices are required to proactively search for neighboring devices. When two devices are coupled they can exchange parameters to clarify the type of services and features each one supports. A set-back for this topology is the requirement for additional device memory for routing tables that is caused by the multi-hop operation. Other network topologies that are supported by IEEE 802.15.4 are cluster, mesh, and tree. These last network topology options are described in the ZigBee Alliance specifications (ZigBee Alliance, 2008). All devices belonging to a particular network, regardless of the type of topology, use their unique IEEE 64-bit addresses and a short 16-bit address is allocated by the PAN coordinator to uniquely identify the network. 5.1.3. Mobile wireless sensor networks Mobile Wireless Sensor Networks (MWSNs) are a new type of WSNs where the sensors move. There are four possible entities types of entities in MWSNs, mobile base stations, mobile relay nodes and mobile cluster heads (Shu et. al., 2012). © City.Risks Consortium 62 City.Risks Deliverable D2.1 Moreover the movement of the sensors falls into three categories as well (Shu et. al., 2012): 1. Controllable Movement, where the type of movement from the network component is known and predetermined. 2. Predictable Movement, where the mobile sensor has a clear direction. 3. Unpredictable or Random Movement. MWSNs usually display specific characteristics that include a dynamic topology, increased energy requirements, unreliable communication links, and more accurate localization. The mobility of sensors offers a number of advantages as well as MWSNs display: 1. Long network lifetime, which is achieved via the dispersed transmission and efficient energy consumption throughout the network. In classic WSNs the nearest neighbor sensor of the gateway or sink usually is depleted faster. That is not the case in MWSNs. 2. Increased Channel Capacity. Experimental studies suggest 3-5 times more capacity gains than static WSNs, when the number of sinks increase linearly with the number of sensors. 3. Enhanced Targeting since the sensors are not on static points but are deployed randomly and are usually required to move for better sight or for close proximity. 4. Enhanced Data Fidelity due to the limited number of hops. A comparison of coverage methods is given in the table below. Table 5.1: Coverage Methods Comparison (Zhu, Hara, Wang, 2014) 5.1.4. Coverage issues for MWSNs Coverage is probably the most important parameter of MWSNs. It displays the total area of network coverage, has a fundamental effect in the quality of service that the network can provide and affects the application’s performance. Sensor coverage is usually weakened due to disadvantageous initial deployments, sensor failures and tough application environments and hardware limitations of sensors (e.g. limited © City.Risks Consortium 63 City.Risks Deliverable D2.1 battery life). To tackle these disadvantages the sensors must have the ability to keep coverage. This is achieved by two methods: 1. Self-deployment, where a sensor autonomously adapts its position to improve coverage. 2. Relocation, where redundant sensors are moved to increase coverage. 5.1.5. Data management issues for MWSNs Data collection is an essential task for any network. Different mobile devices have different methods for collecting data. There are limited studies about data collection using MWSNs, however three methods are the most prominent. 5.1.5.1. Mobile base station method Using a Mobile Base Station with predictable mobility can result in significant power savings (Chakrabarti, Sabharwal, Aazhang, 2003). However, the movement pattern fo the base station is critical to maximize the efficiency. Linear programming approaches (Wang et. al., 2005) have been adopted for finding an optimal pattern. Other strategies conclude that the optimal movement follows the boundaries of the network if the sensors are deployed in a circle (Luo, Hubaux, 2005). Finally, a mobile base station with constraints in its route can perform data collection in a two-step approach by firstly finding the minimum path in a discover phase (Gao, Zhang, Das, 2011) 5.1.5.2. Mobile relay nodes method Mobile Relay Nodes Method utilizes relay nodes that store data from close range sensors and act as buffers. The data are then dropped to access points or base stations (Shah et al., 2003; Jain et al., 2006). 5.1.5.3. Mobile sensor nodes method Two movement methods aim at improving the data collection (Shinjo et al. 2008): 1. In the Moving distance-based Static Topology the sensing node moves to a predetermined position to join a gathering network and then communicate with the base station. 2. In the Shortest Route with Negotiation utilizes a broadcast that informs the sensing node about the position of other sensors that have already connected to the base station. © City.Risks Consortium 64 City.Risks Deliverable D2.1 5.1.6. Research directions City.Risks will come face to face with a number of problems in the area of Sensor Communications. Firstly, the protocols and frameworks under which the sensors will communicate will be addressed in order to ensure the quality of service of the overall system. Since the City.Risks sensor will be mobile the solutions adopted will address the issues of coverage, for the «wake-up» signal of the sensor. Secondly, the data management will also be addressed to enhance the possibility of finding the stolen item even with limited data collected by other City.Risks devices (Smartphones). Those choices will be made in a manner consistent with the above methods. 5.2. Ground Monitoring and Theft Detection 5.2.1. Location finding The generic portable communication device consists of a transceiver, an acceleration sensor and a processor coupled to the acceleration sensor. The processor monitors the acceleration profile of the portable device and compares it to at least one predetermined acceleration profile. Location finding includes steps that include the monitoring of the device’s acceleration profile and entering a secure mode that limits the access when a predetermined profile matches that of the device. The method can also include a step where location is transmitted to an a-priori selected target (e.g. voicemail, e-mail address, remote requestor with access code). The location can be determined via GPS, time of arrival techniques or last known location. The location data can also include a timestamp An alternative method includes steps where a visual, audio or mechanical alert can be sent to a cellular phone, hoping that the user will notice their misplaced phone 5.2.2. Existing monitor systems WSN applications include structural health monitoring (bridges, buildings, etc.), home security, intrusion detection, etc. The most common system architecture installs stationary sensors at critical points and collects data that is transmitted to the central computer for processing. Figure 5.2 illustrates a WSN based real-time landslide monitoring system (Chen et. al., 2008). This system was designed to predict dangerous geological phenomena such as landslides, rock falls, and soil flow. The prediction is achieved by the constant collection of data by different types of sensors such as inclinometers, tachymetry and GPS. The data visualization is done through WebGIS, a web based geographical information system. The data processing offers warnings through the web interface and by using SMS if an indicative parameter gets below a specified threshold. © City.Risks Consortium 65 City.Risks Deliverable D2.1 Figure 5.2: WSN based real-time landslide monitoring system (Chen et. al., 2008). 5.2.3. Collaborative target detection with decision fusion Target Detection, tracking objects and surveillance are among the novel application fields of WSN. One of the main challenges of these applications is meeting the Quality of Service in regards to increased detection probability, low number of wrong warnings and low latency. To meet the demands it is often required to use large networks of sensors as the conditions of application, and the spatiotemporal parameters are unpredictable and dynamic. The loss of nodes due to sensor damage, or battery depletion is also usual. The WSN consists of static and mobile sensors as targets appear to pre-determined «surveillance locations» following a certain probability. The network pinpoints the «surveillance locations» after the deployment. Nodes in the network self-organize into clusters around the surveillance spots by running a clustering protocol (Chen, Hou, Cha, 2004), such that each cluster monitors a surveillance spot. Mobile sensors can be part of multiple clusters, while a static node belongs to only a single cluster. The detection is implemented in two phases. 1. Phase 1: All sensors measure energy in sync. Local decisions are made by comparing measurements to predetermined thresholds. The cluster head receives reports from every sensor. A majority rule helps the cluster head to make a system decision. Phase 2 is initiated after a positive decision. 2. Phase 2: Every mobile sensor moves towards the surveillance location. The movement is consistent to a set of predetermined move list. The move parameters are only the distance traveled and the instance the move begins. Every sensor measures energy at a sampling interval. A sequential fusion-like procedure is adopted. If the energy measured exceeds the predetermined threshold at a specific sensor then a local positive decision is reported to the cluster head. If the measurements are below the threshold, the mobile sensor continues to move according its move-list and take measurements. This described detection model offers the following benefits: (1) Unnecessary movement of mobile sensors is avoided, as mobile sensors start to move only after the first-phase detection produces a positive decision; © City.Risks Consortium 66 City.Risks Deliverable D2.1 (2) The sequential fusion strategy allows each mobile sensor to locally control its sensing and moving according to its movement schedule, which avoids internode coordination overhead. Moreover, a mobile sensor may terminate its detection once it has enough evidence to make a positive decision. As a result, the delay of reaching a consensus in the cluster can be reduced. 5.2.4. Public safety and surveillance networks in cities Figure 5.3: Siklu’s EtherHaul-600T V-band 60 GHz radio and the EtherHaul-1200 Eband 70/80 GHz radio (Next Generation Wireless Security Application Note, 2015). WSNs for the public safety and surveillance are expanding and provide more applications. Moreover, the client-base for these applications is also increasing as first-responders, law enforcement agencies and other public and private authorities are rapidly adopting the enhanced capabilities of these services. The use of optic fibers or leasing seems too costly. The same goes for microwave solutions due to licensing. For these applications, the millimeter wave spectrum offers distinct advantages in regards to the other costly solutions as well as the typically used sub-6 GHz, which lacks in throughput when compared with the Gigabit capabilities of 60/70/80 GHz bands. In urban areas it is also easier to deploy radios in the 60/70/80 GHz bands due to low interference, and in the 60Ghz unlicensed band is suitable for deploying radios optimized for street level. As a result, the typically used sub-6GHz band is limited and an expansion into 60/70/80 GHz will be needed to provide high-capacity and cost efficient alternative. © City.Risks Consortium 67 City.Risks Deliverable D2.1 LTE technology for security applications will require additional networking resources. LTE will increase the capabilities of first responders. This new capacity will be built on a Gigabit backhaul network with carrier grade capabilities. Any future investment in LTE security networks including FirstNet should address specifications for networking and synchronization as implemented at carriers’ networks. • Fast and reliable deployment enabled by cascade and ring topologies. • Extended traffic monitoring and troubleshooting thanks to advanced signalling (OAM). • High reliability and availability. 5.2.5. Research directions The City.Risks project is expected to tackle a number of challenges in the area of target detection. These problems will address the frequency of the «wake up» signal for the theft sensor as well as target detection from a limited set of data. The choices of the consortium will be made in consistency with the above described methods. 5.3. Mobile Sensing in City.Risks The project intends to develop a prototype identification sensor. City.Risks will design and implement an innovative, small and discrete sensor coupling Bluetooth Low Energy (BLE) and radio-based technologies to transparently identify and locate stolen objects within a specific urban range through the usage of the City.Risks network of citizens. In particular, development process involves the following activities: • Design and development of new BLE beacon device and enabling its communication with a City.Risks mobile application. • Integration of a Radio controlled Wake-Up mechanism to be used to trigger a remote interrupt at a ‘sleeping’ beacon device, which can then fire up its BLE to report its position to a nearby Mobile Application. • Design and Development of Server Side Platform Components to communicate with the BLE beacon devices and generate the Wake Up Signals. 5.3.1. BLE relevant technologies Apart from BLE, other technologies have been considered and assessed as core theft detection technology, including the use of ZigBee and RFID. ZigBee is a more mature wireless standard of the same class as BLE. Its Rx and Tx power are comparable to BLE, and it also has very flexible topology in terms of ad hoc mesh networking capabilities. © City.Risks Consortium 68 City.Risks Deliverable D2.1 However, ZigBee suffers from high power consumption during idle listening and the lack of direct compatibility with smartphones (smartphone or tablet). The only way for ZigBee to reduce idle-listening cost is to duty cycle its Rx by software control, but the average power is 10- 100 times that of BLE. To use ZigBee, the operator must use either a custom-made ZigBee user-interface device to connect to the smart containers, or use a smartphone to connect through a WiFi-ZigBee or BluetoothZigBee gateway node. The former is one additional device for the operator to carry, while the latter would not work when the stolen item moves outside the range of the gateway. Although a third option involving the use of a ZigBee dongle on the smartphone is also possible, customers in general find dongles inconvenient, fragile, and a burden. Besides, wireless technologies may also be passive. Passive ones such as RFID allow the tags to operate without batteries, since power is emitted by the RFID reader. However, RFID readers can be relatively expensive and cannot support smarter protocols in case of obstruction of RF signals by other containers. Therefore it can be concluded that BLE has the necessary properties needed for our application. 5.3.2. Bluetooth low energy technology overview Wireless solutions are used in a variety of demanding industrial applications. Technologies such as Wireless LAN, Classic Bluetooth, IEEE 802.15.4/ZigBee all provide specific characteristics and are therefore suitable for different applications and specific demands. However, none of these technologies offer an optimal solution for a wireless connection for sensors and actuators in manufacturing automation. In these types of applications, the existing technologies are too expensive, too slow or consume too much energy. The solution lacks a fast, robust, low energy transmission for wireless sensors and actuators. This is where Bluetooth low energy technology comes into play. Bluetooth low energy (BLE) technology becomes particularly interesting as a wireless technology option due to its ultra-low power consumption. Moreover it has the advantage of being directly compatible with smartphones and tablets. Bluetooth low energy is substantially different from Classic Bluetooth technology which is ideal for continuous, streaming data applications including voice. Classic Bluetooth has successfully eliminated wires in many consumer as well as industrial and medical applications. Bluetooth low energy technology is ideal for applications requiring episodic or periodic transfer of small amounts of data. Bluetooth low energy has unique characteristics and new features that that are not practical with Classic Bluetooth. For instance, coin cell battery-operated sensors and actuators can now smoothly connect to Bluetooth low energy enabled smartphones, tablets or gateways. BLE represents one of the fastest-growing wireless technologies for the Internet of Things (IoT). One reason for its popularity is its very long battery life: a slave can last for one year on a CR2032 coin-cell battery while maintaining a logical connection © City.Risks Consortium 69 City.Risks Deliverable D2.1 with a master. Second, it is directly compatible with smartphone devices (smartphones and tablets) without requiring infrastructure or dongles. In the past year, many BLE devices in the form of proximity tags, and low-power wearable devices have been introduced to the market. Power consumption is kept to a minimum as a Bluetooth low energy device is kept in sleep mode most of the time and only wakes up when a connection is initiated. The actual connection times are a few ms only, the maximum/peak power consumption is less than 15 mA and the average power consumption is as low as 1 uA. It is possible to power a small device with a coin cell battery – such as a CR2032 battery – for several years. (Artem Dementyev 2013) In order to achieve low power consumption, Bluetooth low energy uses a lower data rate. In theory, this data rate is 1 Mbps but in practice the transfer rates for Bluetooth low energy technology are less than 100 kbps. The following table illustrates the basic features of classic Bluetooth and BLE. Table 5.2. Classic Bluetooth and BLE basic characteristics Data payload throughput (net) Robustness Range Local system density Large scale network Low latency Connection set-up speed Power consumption Cost Classic Bluetooth technology 2 Mbps Bluetooth low energy technology ~100 kbps Strong Up to 1000m Strong Weak Strong Weak Strong Up to 250m Strong Good Strong Strong Good Good Very strong Strong For instance, Bluetooth low energy technology is new in having an efficient discovery and connection setup, very short packets, asymmetrical design for small peripheral devices and a client - server architecture. 5.3.3. BLE fundamental characteristics This section summarizes the fundamental features of BLE technology. 5.3.3.1. Power consumption Bluetooth low energy technology has been designed from the beginning to use the lowest possible power consumption. For instance, the Bluetooth low energy unit can be put in sleep mode where it is only used at an event of sending active files to a © City.Risks Consortium 70 City.Risks Deliverable D2.1 gateway, PC or mobile phone. Further, the maximum/peak power consumption is set to less than 15 mA and the average power consumption is at about 1 uA. A foundation for the low energy consumption is the very fast connection set-up and the short messages. Therefore, the energy consumption is reduced to a tenth of a Classic Bluetooth unit. 5.3.3.2. Cost and backwards compatible In order to be backwards compatible with Classic Bluetooth and to be able to offer an affordable solution for very inexpensive devices, BLE chipsets are available in the following two versions: Dualmode:Bluetooth low energy technology as well as Classic Bluetooth functionality. Stand-alone: Bluetooth low energy technology only for optimizing cost, power consumption and size, factors particularly useful for light discrete battery powered devices. 5.3.3.3. Ease of use and integration The technology uses a simple star topology, which simplifies the implementation work significantly. This topology fits very well with common used system architecture with a number of smaller devices connected to a master in a production island. In most cases, an Infrastructure / Ethernet network is available and there is no need for mesh networks to extend the geographical coverage. A unit is always either a master or a slave, but never both. The slave usually acts as an advertiser which keeps on advertising itself periodically until a connection is established. The advertiser’s messages are generally destined for a master that is listening to any advertising device in order to connect to it. The communication between the master and the slave relies on the protocol stack, which describes service group, roles and general behaviors. Services are collection of characteristics and relationships to other services that encapsulate the behavior or the device including hierarchy of services, characteristics and attributes used in the attributes server. 5.3.3.4. Software structure All parameters in Bluetooth low energy technology have a state that is accessed using the so called Attribute Protocol. All attributes are represented as characteristics that describe parameter value, presentation format, client configuration, etc. Through these attributes, it is possible to build numerous basic services and profiles. Some examples of basic services and profiles include the following: Proximity, Automation I/O, Building Automation (Temperatures, Thermostat, Humidity) Lighting (On/Off Switch, Dimmer), Remote Controllers, Medical Devices (Pressure Meters, Scale Instruments etc.) © City.Risks Consortium 71 City.Risks Deliverable D2.1 Connection and latency Bluetooth low energy technology only uses three channels to build connections and to discover other devices; this allows faster connection in only few msec and lower power consumption. With Bluetooth low energy technology, the latency periods are dependent on how often the master sends messages to the slaves and how often it receives data from the slaves. The latency period for one slave only is 7.5 ms and then increases slowly for each additional slave. 5.3.3.5. Range Thanks to the modulation scheme, Bluetooth low energy has an approximately 3 dB better link budget compared to Classic Bluetooth. A Bluetooth low energy unit can thereby offer a range of 100 meters in line of site without the need of an additional power amplifier. 5.3.4. Beacons 5.3.4.1. What is a Beacon Beacons are small, wireless hardware devices that transmit BLE signals via radio waves to a personal device to enable a call-to-action which is customized for each user. Since Bluetooth’s launch, several companies have looked at the possibility of using Bluetooth for advertising – pushing information to phones when the phone comes within range of a fixed transmitter. Although many companies exist within this area, it is an awkward experience that leverages classic Bluetooth technology and it is poorly supported across phones. A major drawback is that classic Bluetooth cannot broadcast messages to unpaired phones – instead it needs to identify the presence of each individual phone and then send a targeted message. To prevent multiple messages appearing, the transmitter needs to keep a log of which phones it has previously sent messages to, incurring a considerable level of complexity and cost. BLE changes this by including a range of broadcast advertising modes. These are fundamental to the technology and used for the discovery and pairing process, essentially creating a much better user experience when pairing & connecting. However, they can also be used for general, unacknowledged advertisements that can be detected by any phone with its Bluetooth receiver turned on. It is this which makes low cost Beacons possible. The transmitted data is typically static but can also be dynamic and change over time. With the use of Bluetooth low energy, beacons can be designed to run for years on a single coin cell battery. © City.Risks Consortium 72 City.Risks Deliverable D2.1 5.3.4.2. Device modes A Bluetooth low energy device can operate in four different device roles. Depending on the role, the devices behave differently. The first two roles are connection-based a Peripheral device, which is assumed to be a low power device that exposes state or information, and a Central device. A Central is usually either a powered device, or one with significantly greater processing capability and a rechargeable battery, e.g. a phone or tablet. Unlike classic Bluetooth, the Peripheral and Central are very asymmetric in their resource needs, with the standard being designed to minimize the complexity, power requirements and costs of the Peripheral. In most cases, a Peripheral device spends the majority of its life asleep, only waking when it needs to send data. The other two device roles are used for one-directional communication: • A Broadcaster is a non-connectable advertiser, for example, a temperature sensor that broadcasts the current temperature, or an electronic tag for asset tracking. • An Observer scans for advertisements, but cannot initiate connections. This could be a remote display that receives the temperature data and presents it, or tracking the electronic tag. The two obvious device roles for beacon applications are Peripheral and Broadcaster. Both of them send the same type of advertisements with the exception of one specific flag that indicates if it is connectable or non-connectable. A Peripheral device that implements a GATT Server (GATT is an architecture for how data is stored and exchanged between two or more devices) can be branded as a Bluetooth Smart device. So a Bluetooth Smart branding indicates that the device is a connectable Peripheral device that has data, which could be interacted with. A Bluetooth low energy solution is ideal for beacons not only due to low power consumption but also due to direct compatibility with smartphones while supporting security features. The low-power consumption is accomplished by keeping the transmission time short allowing the device to go into sleep mode between the transmissions. 5.3.4.3. Non-connectable beacons The non-connectable beacon is a Bluetooth low energy device in broadcasting mode. It simply transmits information that is stored internally. Because the nonconnectable broadcasting does not activate any receiving capabilities, it achieves the lowest possible power consumption by simply waking up, transmit data and going back to sleep. This comes with the drawback of dynamic data being restricted to what is only known to the device, or data being available through external input © City.Risks Consortium 73 City.Risks Deliverable D2.1 from example serial protocols (universal asynchronous receiver/transmitter (UART), serial peripheral interface (SPI), universal serial bus (USB), and so forth). 5.3.4.4. Connectable beacons The connectable beacon is a Bluetooth low energy device in peripheral mode, which means that it cannot only transmit, but also receive as well. This allows a central device (for example, a smartphone) to connect and interact with services implemented on the beacon device. Services provide one or more characteristics that could be modified by a peer device. One example of these characteristic could be a string of data that represents the broadcasted information. 5.3.5. Theft detection sensor technical consideration From the previous description it is clear that BLE consumes much less energy than its predecessors. Not only does it significantly extend the battery life of traditional Bluetooth devices, but it also enables wireless communication for a class of lowpower devices that run on as little as coin-cell batteries. Besides, lower energy consumption leads to a more robust, efficient product. Because BLE is super energy-efficient, manufacturers have been aggressively building BLE capability into modern devices such as phones, and tablets. On the supply chain side, major manufacturers make BLE modules and chips widely available and in large quantities. A wide and growing range of applications that communicate with BLEsupported devices are now available in both business and consumer markets. However the most challenging issue as emerged from the project development process is the Radio-Link mechanism (RLM) to be used for triggering a remote interrupt at a ‘sleeping’ beacon device. The basic thing here is to combine BLE module with an RF chipset operating in 2.4GHz or other frequency band. Normally the radio network should be used to convey the Wake up signal from the Web platform to theft detection sensor so as to wake up the BLE and then it should broadcast the alarm signal. Of course radio network shall provide a local coverage within a reasonable range of signal reception. 5.3.5.1. Sensor use case The sensor shall be used in the following use case as described below: A citizen attaches a theft detection sensor, a small and discrete sensor coupling Bluetooth and radio-based technologies, to a personal item, e.g. mobile phone or bicycle. He / She registers the sensor with the authorities. Once the item is stolen the citizen informs the authorities about the theft. © City.Risks Consortium 74 City.Risks Deliverable D2.1 The responsible authority remotely activates the sensor from its hibernation mode by multicasting a short-range signal that triggers the sensor to periodically broadcast signals to mobile devices in proximity. The signal broadcasted by the sensor is picked up by a mobile device with the City.Risks mobile application installed and the authorities are notified by the application that the stolen item has been located. 5.3.5.2. Operational scenario and working modes BLE module should work in peripheral mode and in beacon mode. It shall simply transmit information that is stored internally. Because the beacon device does not activate any receiving capabilities, it achieves the lowest possible power consumption by simply waking up, transmit data and going back to sleep. Once an item (bicycle, motorbike, mobile asset) with such a module installed is stolen, the owner shall inform the authorities which in turn shall send through an application a broadcasting signal via Internet to certain local RF base station infrastructure. RF chipset –co-existing with BLE module on the same board-should be able to receive a notification message from a nearby base station antenna within a certain range of coverage. Then through the interface between RF chipset and BLE the BLE module shall turn from sleep mode to wake up mode and it will start transmitting the alerting signal to the nearby mobile applications allowing for Detection of a stolen item in the area. The amount of information that is going to be forwarded from RLM to BLE is not that big, i.e. a wake up signal, therefore the interface should be quite simple and mostly reliable. Radio chipset should normally work in receiver-only mode. BLE should normally be in sleep/wake up mode as peripheral and should turn to beacon mode only upon receiving alert message from the RF chipset. Again RF chipset can also be put to sleep mode and then periodically wake up to be on "listening-for-alert" mode. The last two working conditions shall be followed to preserve module's battery. 5.3.5.3. Radio link mechanism approach City.Risks shall define the required functions that the Radio-Link mechanism (RLM) should encompass to trigger the ‘sleeping’ beacon device. The radio link mechanism is an add-on that is included to the sensor in order to formulate a compact, discrete battery-powered application. Under this context, the development of such a prototype combining BLE module and RF chipset must take into deep consideration that the integrated board should be small-enough so as to be easily installed as a theft detection sensor. © City.Risks Consortium 75 City.Risks Deliverable D2.1 RLM must be integrated in a chipset consuming as less energy as possible. Since the power consumption is a key factor in sensor design, global RF networks such as GSM, TETRA, UHF etc. although they might be suitable for functional prototyping they are still too large as a deployment platform for our application, and are considered as high energy -consuming devices. A key point is the coverage distance that the RF network can cover. This certainly means that if the user perceives the theft of his/her item by the time it has left the coverage area then the broadcast signal originated by the authorities shall never reach the module RF chipset as it will be out of coverage zone. A fine-grained analysis is required so as to examine what could be the most suitable radio link mechanism that can be coupled together with the BLE kit thus turning a complete end-to-end powerful kit to powerful sophisticated theft detection sensor. Under development process the most important aspects needed to be taken into account are the following: Integration of RLM with the BLE board Definition of RLM and BLE inter-operational modes Protocol handling. The above aspects involve technologically-based subtasks. In particular the development of the board is based on: Schematics - How to wire things together Layout - How to organize parts on a board Manufacturing - How to get boards assembled in bulk Code - How to establish communication from the BLE chip to RF chipset and so forth. The average power consumption of the RF chipset should also be kept very low enabling quite a long time range operation. The power consumption is strongly related to the operational logic and to the time periods where the radio mechanism is “listening” for alarm broadcasting message and the BLE module is awake for transmitting the alarm message to smartphones in proximity. The use of Wi-Fi™ as an RLM is considered as a first choice option for our application extending wireless connectivity to enable sensor’s communication with cloud services and backend server, thus improving usability and reducing maintenance needs. Besides,2.4GHz unlicensed band and Wi-Fi™ are wireless standards with either a specific focus on–or recent additions addressing–simpler but low power or ultra low power wireless technologies. These are the main technologies that have been examined as RF candidate mechanisms for the theft detection sensor implementation. The different technologies can roughly be split into the following categories: Low power (average current consumption in a node 5-50+ mA): • Wi-Fi™ direct, 2.4GHz chipsets © City.Risks Consortium 76 City.Risks Deliverable D2.1 • Bluetooth® versions prior to v4.0. Ultra low power (average current consumption <1 mA) • ANT+™ • Bluetooth® v4.0 (which includes Bluetooth® low energy as a hallmark feature). This segmentation also roughly corresponds to the applications that can use the different standards. Due to the limited data transfer capacity, ultra low power standards are mainly used in applications where the data throughput demand is low (< 100 kbps) such as in sensor & actuator networks, user control input and for limited size file transfers. This also applies to our specific application. Lithium coin cell batteries, traditionally used for low power applications, are the battery technology of choice for most of ultra low power wireless applications today. These batteries are simple to fit in small enclosures and replacements are easily accessible for the end user. To this respect, as our application involves ultra low power wireless solution it is absolutely imperative that the average current consumption shall be as low as possible. But, focusing only on the average current assumes that the battery capacity found in a battery data sheet is fixed for all conditions. Even in sleep mode WiFi based RLM consumes much more power than BLE technology resulting in sooner battery drainage. Besides once wake up, WiFi needs to associate Access Point - this procedure might can take several seconds even to minutes. By examining all possible wireless candidate solutions that are available, it was clear that critical point of sensor design involved the state when the radio circuitry is activated. By that time it can draw large amount of current depending on technology, vendor and implementation. This drain could far exceed the rated drain current condition (~200 uA for a CR2032) for which the battery capacity is foreseen to provide, according to the battery specifications. 5.3.5.4. Assessment of key parameters There are specific key parameters which should carefully be taken into account: Overall Size The total size of the sensor must be kept very small since it is supposed to be placed and attached to bikes, bicycles, hand-bags etc. Total Power Consumption Perhaps the most challenging issue here, since we must accommodate RLM kit along with BLE kit, therefore a fine-grained analysis of power consumption is required.BLE module should work as a peripheral device which is assumed to be a low power device that exposes short piece of information. Despite of the peak current during transmission can reach relatively high values the user should take into account that these values are present only for small periods of time. © City.Risks Consortium 77 City.Risks Deliverable D2.1 In most cases a peripheral device spends the majority of its life asleep only waking up when it needs to send data. This is a good perspective though since the operation of the BLE device is limited in only short time intervals. Modular Scalable and easily customizable open platform Application Logic structure should be scalable, expandable and allow for easy configuration and over the air firmware download. 5.3.6. Research directions City.Risks theft detection sensor technical examination is currently in progress and key findings have been already presented in previous paragraphs. In its current phase, the on-going analysis of the state of the art includes the identification of commercially available BLE hardware platforms that should be suitable for our application development. The evaluation of characteristics, the consideration of coupling mode between BLE and wake up radio mechanism, the design of functionality and operational mode as well as the definition of application structural logic have also been examined and addressed. Planned future work include further hardware platforms performance characterization, in-depth exploration of candidate wake up radio integration and interoperability with BLE stack, and optimization of the implementation bottlenecks. 5.4. Existing Solutions and integrated projects related to City.Risks BLE theft detection sensor Under Task2.1 a survey of the state of the art has been performed in order to pinpoint, analyze and evaluate existing projects, tools, applications, solutions and case studies related to our project so as to identify gaps and challenges and address new research directions. In this section we summarize two existing complete and integrated solutions which are related to City.Risks technical activities. The basic components and architecture as well as a brief overview of each solution are described below pointing out the fundamental features of each one. 5.4.1. BluVision/CycleLeash concept With bicycle theft increasing at a rapid pace, CycleLeash (CycleLeash Case Study, 2014) developed a security system focused on bicycle anti-theft approach. BluVision’s Bluetooth beacons are integrated into this solution. The innovative sensor system communicates beacon reporting data whether a person has left the desired area to a central cloud server. The solution utilizes BluFi, a Bluetooth to WiFi gateway that are placed in several public locations enabling detection/alerting upon a stolen bicycle in the area. © City.Risks Consortium 78 City.Risks Deliverable D2.1 CycleLeash developed this project aiming at advanced bicycle tracking. The solution incorporates end user smart phones and tablet devices, utilizing Bluetooth lowenergy sensors and mobile phone applications to provide bike tracking in real-time environment. The advanced Bluetooth beacon sensor includes functionality that allows cyclists to locate their bicycles in real-time through a smartphone application or a cloud based web application. The application leverages information from Bluetooth beacons, which detect the presence of bicycles. CycleLeash utilizing BluVision’s beacons offers a reliable, cost effective solution for accomplishing these activities. The CycleLeash is small, hidden and an effective solution to combat the rise in thefts. It can safely be installed on a bike and with a long lasting battery life, eliminating the need for recharging or replacing batteries. Each CycleLeash has a beacon embedded into it with each Beacon having a unique identifier that reports if the person has left the specified area. Through the interactive Mobile Application the bicycle can be traced or help others locate theirs. Figure 5.4: CycleLeash System Overview The other component of the solution consists of a Bluetooth to WiFi Gateway. It can transmit and receive data, provide remote OTA updates for entire deployments and ensures that enterprise implementations are easy to manage by always collecting available Bluetooth low energy data. This Bluetooth low energy (BLE)-to-WiFi (BluFi) device eliminates the need for a smartphone or tablet application to be actively running in proximity to scan and discover beacons. The device is a part of a hub and can be managed to listen for any Bluetooth beacon ID and report discovery within proximity ranges of the BluFi sensor. One or more BluFi sensors listen for Bluetooth beacon data and connect to a cloud-based server platform to receive notifications. ID data enables the discovery of any enabled beacon within BluFi range. BluFi delivers rapid development and seamless adoption with existing mobile beacon applications and nearby WiFi routers. © City.Risks Consortium 79 City.Risks Deliverable D2.1 BluFi features simple A/C plug-in to bridge any brand of beacon into existing WiFi networks to receive and transmit Bluetooth beacons payload data over WiFi. Software application provides set-up and receive beacon advertisements from BLE beacons, transmitting them over WiFi to the backend software. 5.4.2. Bike Track concept Due to their low cost and convenience, bicycles are a common means of transportation in many countries. Bicycles have recently gained in popularity as an environmentally friendly and healthy alternative to vehicles. Based on the increasing number of bicycles, cyclists face the problem of not being able to find their bikes and having their bikes stolen. Scientific research has examined several technologies to cope with this critical problem of stolen bicycles. RFID tags and GPS units are among the most important projects for market exploitation. Those technologies have been widely used; however, both of them involve high development cost or not adequate battery autonomy. To address this challenging approach, Dept of Computer Science and Information Engineering, National Taiwan University presented BikeTrack (Tsung-Te Lai et al., 2011) a participatory sensing system that uses everyday smartphones and low-cost beacons to detect stolen bikes. Each bicycle is equipped with a customized Bluetooth tag that actively sends beacons. To discover the bicycle with a Bluetooth tag, participants use their mobile phones to scan Bluetooth tags through an appropriate client application and report the location of bicycle to a BackEnd Server application, so that bike owners can locate their stolen bicycles. 5.4.3. BikeTrack fundamental principles This section describes the basic design principles and choices: Easy to deploy: BikeTrack project is challenging and easy to deploy. The system is based on a smart phone application downloaded from a mobile app download center (currently only at Android Market) and customizable Bluetooth tags. Users act voluntarily for the scanning of bikes. The system does not require any of authorities or agents involvement. Accurate: the most important achievement is the accuracy of the reported location when bike users cannot find their bikes. This project chose Bluetooth technology because it offers a 10-20 meter range, which is sufficient to help users locate their bikes. As for data reporting frequency, BikeTrack reports periodically to ensure good coverage. This reporting frequency is based on the mobility model of bike owners. For example, students often use their bikes to commute between classes held in several large teaching buildings on campus. © City.Risks Consortium 80 City.Risks Deliverable D2.1 Minimal user overhead: To facilitate users to participate, BikeTrack project has few advantages. For example, (1) the tags for bike owners do not require care or battery recharge for 3–4 months, and (2) the client application has minimal power consumption, CPU utilization, and network bandwidth to avoid interfering with other. 5.4.4. BikeTrack platform components Figure 5.5 illustrates an overview of BikeTrack system. The three main solution components are (1) a bicycle equipped with a customized Bluetooth tag that broadcasts a unique beacon ID, (2) mobile phones that run a BikeTrack client app to scan the Bluetooth beacon from the bicycles, and (3) BikeTrack centralized server. When a beacon is traced, the phone application logs the location, beacon ID, and timestamp and sends the information back to the server. The BikeTrack server logs user data to a database and provides a web interface that allows users to inquire their bicycle locations on Google map. The following sections analytically describe each component. Figure 5.5: Bike Track system architecture 5.4.5. Customized Bluetooth tag installed on bicycle Many types of radio channels, including RFID, Wi-Fi, Zigbee, or Bluetooth, can potentially be deployed in bike tracking system. This study chooses Bluetooth because (1) almost all mobile phones have a built-in Bluetooth technology, (2) the © City.Risks Consortium 81 City.Risks Deliverable D2.1 radio range is up to 10-20 meters, and (3) the power consumption is low when it operates only in discoverable mode. Figure 5.6 (a) shows the actual class 2 Bluetooth device customized for this study by a vendor. The main feature embedded in this Bluetooth device is that it runs only in discoverable mode. Therefore no pairing is activated and only device name and MAC address are continuously broadcasted. The Bluetooth device has a 40 to 50-day lifetime on average. Figure 5.6 (b) shows how the device can be mounted on the bicycle. The installation place has been chosen to be hidden to protect the device from getting wet or being seen. Figure 5.6: (a) Bluetooth tag, (b) mounted to a bicycle 5.4.6. Implementation of client app on mobile phone The phone program in this study was designed on Android 2.x. The phone models used in this study include HTC Hero, HTC Desire, HTC Legend, and Samsung Nexus 1. When the user activates the application it scans nearby Bluetooth devices every 20 seconds. The client application only logs authorized Bluetooth tag by comparing the MAC ID. If it finds a Bluetooth device, it logs the location (longitude and latitude), timestamp, Bluetooth device name, MAC ID, and the user ID. Besides, phone battery level and Bluetooth RSSI (receive signal strength indication) values are stored for further optimization processing on battery consumption reduction and location accuracy. The client application is designed to periodically upload relevant data to a remote server. The battery lifetime is measured to be 22 hours for a client application that scans for Bluetooth tags every 20 seconds on an HTC Desire HD. 5.4.7. Back-end software The server runs an Apache HTTP server and MySQL database on a Linux machine. This enhances data uploading and storage. A simple web interface is provided for users to log in and pinpoint their stolen bicycle on Google Maps. Due to strict privacy policy issues incorporated on the application, users are authorized to only view their own assets. 5.4.8. Research directions The current tags can operate for 40-50 days. There has been a considerable endeavor to extend tag lifetime so as to eliminate battery recharge during the deployment period. One option is to increase the battery size from 800mA to © City.Risks Consortium 82 City.Risks Deliverable D2.1 3000mA. This would result in lifetime extension from approximately 40 days to 150 days. Among other alternative options is Bluetooth duty cycle modification, or energy induction from a small solar plane or even the motion of bike pedals. Bluetooth Low Energy (BLE) technology is also a promising option, incorporating many compelling features in terms of energy efficiency. The reason of its popularity is its very long battery life : a slave can last for almost one year on a CR2032 coin cell battery while maintaining a logical connection with a master, Second, it can provide even longer radio transmission range (up to 50m to 100m) than the current Bluetooth 2.0 standard. Therefore, BLE technology is a considered a more appropriate replacement of the Bluetooth 2.0 that BikeTrack is currently implementing. © City.Risks Consortium 83 City.Risks Deliverable D2.1 6. Software Development Methodologies and Platform Architectures This section overviews the state-of-the-art in software development methodologies and discusses system architectures relevant to software development tasks that need to be completed in the City.Risks project. 6.1. Software Development Methodologies The framework that plans and manages the development of an information system is called a System Development Methodology. The specific technical needs of projects have given birth over the years to a variety of frameworks, each with its advantages and disadvantages. Several software development Life Cycle Models have been formed and deployed to provide this framework for planning and managing the development or modification of a software product. 6.1.1. Design process models and theories The most widespread design process models and theories are mentioned below. 6.1.1.1. Waterfall model The “Waterfall Model” is a collection of Software Development Models (SDMs) that breaks down the development of software into a sequence of phases. The sequence includes: 1. 2. 3. 4. The Analysis phase The Design phase The Coding phase The Testing phase Figure 6.1: Generalized Waterfall Model (Royce, 1970). © City.Risks Consortium 84 City.Risks Deliverable D2.1 Variations of the “Waterfall Model” consist of different number of phases and different interactions between each phase. Figure 5.1 displays three different variations where solid arrows show forward-only version, solid and dashed lines display variations that allow backtracking and solid, dashed and dotted lines indicate a variation where the transition between any two phases is allowed. The focus is on planning, scheduling, target dates and budgets for the implementation of an entire system. Through the life-cycle of the project, formal reviews and approvals/signoff by the beginning of the next phase create an extensive written documentation. 6.1.1.2. The problem-design exploration model The Problem-Design Exploration Model models the design as two interacting evolutionary systems – the problem space P and the solution space S. Figure 6.2: Problem-Design Exploration Model. P(t)=problem at time t; S(t)= situation at a time t; dashed line indicates situation refocusing problem; diagonal downward movement indicates a search process (Maher, Poon and Boulanger, 1995). The advantages of Problem-Design Exploration Model are the simplicity and the clear elucidation of the coevolution phenomenon that have been noticed in field studies of designers (Cross, 1992). This SDM was created to display the application of Genetic Algorithms to the systems design, and does not show clearly how this is translated to human design practice 6.1.1.3. Alexander’s design process models The “Unselfconscious Process”, the “Selfconscious Process” and the “Formal Process” were three SDM that were proposed by C. Alexander. In the “Unselfconscious Process”, the designer eliminates oddities between form and context by shaping the design object and other items directly. © City.Risks Consortium 85 City.Risks Deliverable D2.1 In the “Formal Process”, the designer constructs a formal model using set theory and exploits divide and conquer strategies to solve problems. In the “Selfconscious Process”, the designer works by iterating between the conceptual picture of the context and ideas and diagrams and drawings which stand for forms”. This process fits the case where an independent agent pursues a goal by taking actions in a self-determined sequence and monitors progress (Van de Ven and Poole, 1995). Figure 6.3: The Selfconscious Design Process. Arrows indicate interactions, not sequence; Alexander does not specify the exact nature of these interactions (Alexander, 1964). 6.1.1.4. Sensemaking-Coevolution-Implementation theory In the Sensemaking-Coevolution-Implementation (SCI) SDM an agent develops a complex software system with three basic processes, Sensemaking, Coevolution and Implementation. © City.Risks Consortium 86 City.Risks Deliverable D2.1 Figure 6.4: Sensemaking-Coevolution-Implementation Theory. Arrows indicate relationships as shown, not a sequence of activities (Ralph, 2015). Figure 6.5: Concepts and Relationships of SCI, Defined (Ralph, 2015) 6.1.1.5. Agile software development methodologies - an up-to-date approach The increasing software complexity and dynamic user requirements have shifted the focus of the software industry from the traditional SDMs to an agile based development. The characteristics of agile methods are: 1. Shorter development cycles 2. Higher Customer Interaction © City.Risks Consortium 87 City.Risks Deliverable D2.1 3. Incremental delivery 4. Frequent re-design necessitated by the changing in user requirements This is unlike traditional software development approaches where there is focus in extensive and thorough planning, process orientation, heavy documentation and predictive approaches. This can be viewed in a number conducted of surveys (Versionone, 2013). The following table displays the differences between traditional methods and agile methods. Parameter Traditional Methods Agile Methods Adaptability to Change Change Sustainability Change Adaptability Development Approach Predictive Adaptive Development Orientation Process-Oriented People- Oriented Project Size Large Small/Medium Planning Scale Long-term Short-term Management Style Command-and-control Leadership-andcollaboration Learning Continuous Learning while Learning is secondary to Development Development Documentation High Low Agile based SDM result in better quality of software products as well as improved productivity, flexibility, enhanced customer engagement and swiftness in changing user requirements. Due to the above, the software development industry has rapidly embraced agile approaches. Extreme Programming, Scrum, Kanban, Lean, FDD (Feature-Driven Development), Crystal, DSDM (Dynamic Systems Development Method), are some of the methodologies that adopt the agile approach. 6.2. Platform Architectures for Emergency Management Systems In modern advanced emergency management systems, many solutions have been provided as attempts to support humans to take important decisions for very fast recovery of critical situations through the consideration of various parameters and events that occur concurrently. Critical situation detection is a very complex procedure that involves both human and machine activities. The result of this © City.Risks Consortium 88 City.Risks Deliverable D2.1 process is decision making for management and situation recovery purposes. Various approaches have been studied in the literature. For instance (Itria et al., 2014) studies a situation detection process that uses event correlation technologies performing online analysis of real events through a Complex Event Processing architecture. Such architectures are a suitable paradigm for the City.Risks platform, since City.Risks will have to detect and analyze events that lead to decision support procedures for further reactive measures. Event correlation is used to relate events gathered from various sources, including crowdsensing and crowdsourcing, for detecting patterns and situations of interest in the emergency management context. The proliferation of modern mobile devices, such as smartphones and tablets, has given a boost to the experimentation in the context of emergency management systems allowing the integration of crowdsourcing and crowdsensing technologies (Ganti et al. 2011). Crowdsourcing is the process of getting information online, from a crowd of people, while crowdsensing refers to the involvement of a large, diffuse group of participants in the task of retrieving reliable data from a specific field. By means of the possibility to easily link persons, facts, events and places through a large quantity of online geo-referenced data, users are the real holders of the “living information” and the producers of current information about social phenomena and dangerous events. This approach is also followed in the case of City.Risks where users are considered as real “human sensors” providing qualitative and quantitative information to the platform. The integration of information retrieved from mobile devices, from social media and from several types of sensors deployed in the infrastructure, allows the online analysis of a large amount of data used to detect and identify dangerous events. Such online approach enables the detection of critical situations as soon as they happen, so that a corresponding reaction can be successfully performed. This mechanism aims to timely recognize critical situations, usually called Real-time Situational Awareness (RTSA) (Beringer and Hancock, 1989). The main goal of RTSA is to recognize the critical situations in the given application domain as soon as possible in order to be able to take a decision for the necessary measures to address them properly. Decision-making is the first step of the reaction, and it should be made by humans using a Decision Support System (DSS) that helps them decide how to face the emergency. This process starts from data extraction and leads to the detection of the situation in progress. Several challenges are introduced: (i) high efficiency, in order to handle a huge amount of data and detect the situation as soon as possible in order to allow time for a successful reaction (Cinque et al., 2013); (ii) it should be able to detect critical situations before they happen (early warning) in order to prepare a preventive action; (iii) it should be also tolerant to different types of noise, meaning that the process should acknowledge only trusted information from trusted sources, otherwise it could lead to wrong scenario definitions and consequently wrong decisions; and (iv) it should be reliable to trust the logged events, including architecture resilience and trustworthy data collection (Bondavalli et al., 2007; Bondavalli et al., 2010), possibly allowing forensic analysis (Afzaal et al., 2012). Complex Event Processing (CEP, (Beringer and Hancock, 1989)) technology aims to resolve these challenges allowing an efficient management of the pattern detection process in the huge and dynamic data streams and as such it is very suitable for © City.Risks Consortium 89 City.Risks Deliverable D2.1 recognizing complex events and situations online. In (Beringer and Hancock, 1989), the term event is defined as “an occurrence within a particular system or domain; it is something that has happened, or is contemplated as having happened in that domain”. This definition places the event concept into two different contexts: (i) the real world in which events happens and (ii) the world of Information Technology event processing, where the word event is used to mean a programming entity that represents this occurrence. In the sphere of the Emergency Support Systems (ESS) we consider events that happen in the real world and are represented in computing systems through information entities. Event processing allows the detection of critical situations in order to respond timely to the emergency. For the purpose of our work, that is managing events constituted by textual description of facts and involved entities (person or object), we define micro-events and complex-events. Micro-events belong to a basic event taxonomy and represent simple real events involving only one entity for example: people detection, fire presence, impulsive sound recognition, object detection. Complex-events are the aggregation result of the information contained in a set of micro-events, which are correlated by spatial, temporal and causal relations defined by correlation rules. City.Risks will deploy principles of the Complex Event Processing Theory and Practice in order to deploy best practices for handling large data sets from various heterogeneous sources and be able to detect early enough critical events for taking the appropriate measures. Emergency response involves many people: rescue teams on the field, decisionmakers at different levels of government, citizens, press (Winter et al., 2005; Zlatanova 2005). Their data needs vary accordingly but generally they are inline with the big challenges of emergency response in urban context. Emergency response should facilitate excellent coordination between different rescue groups/actors, provide appropriate geo-referenced information and allow intelligence in communicating orders and information to different participants. In general, we consider three major types of system architecture that can be applied in such emergency response systems. These are distinguished in: centralized (where all data are processed and stored within the emergency center), federated (where the data are maintained in a distributed fashion but under a common schema) and finally, dynamic collaboration (meaning that data are stored in their original location and format maintaining their original representation and relationships). A system for an emergency center in urban areas requires among others i) the discovery and effective use of various information sources (text, imagery, 2D and 3D graphics, video) for monitoring and decision making, ii) the ability to provide updated information to rescue units, decision makers and citizens fast, almost realtime, communication to transfer on-site information, iii) rapid determination of safe evacuation routes considering dynamic factors such as current availability of exits, stairs, etc. iv) the ability to alert communities at risk and provide information to the general public, and others. A system architecture for emergency response built on dynamic collaboration principles is presented in (Zlatanova and Holweg, 2005). The system consists of three levels: users, middleware and data on distributed servers. Some geospatial data (such a topographic map, satellite images, cadastral maps and sewage network) might be still maintained centrally, but most of the data will be distributed. Users are © City.Risks Consortium 90 City.Risks Deliverable D2.1 grouped based on the type of equipment they would use to access information: mobile, Virtual Reality centers and desktop users. All users access the system via a given profile used to specify privileges, search for appropriate information and adapt the delivered outputs. The major components of this set up are 'positioning and communication middleware' (responsible for the contact with the users) and 'data middleware' (responsible for information delivery). The two kinds of middleware mentioned previously will be the connecting (integrating) components between the different systems. City.Risks will offer as well a middleware layer upon which various other components (for instance already existing software components in the premises of the participating organizations) will be able to get integrated and interoperated efficiently. However, its main principle of architectural design will rely on a service oriented approach that will enable the communication with the actors and the information delivery in a seamless way, agnostic of the underlying technologies. A number of modeling and simulation applications exist for studying individual aspects of emergency response scenarios. There are solutions (Jain and McLean, 2004) that propose architectures for integrating geographically dispersed modeling and simulation applications and repositories of data. The types of simulations envisioned for emergency response as presented there, are multi-facetted, realtime, and synchronized, meaning that no single simulation model or software system is capable of representing all aspects of the emergency response problem. Key technical elements of the proposed solution are among others: Simulators, Scenario Emulator, Data access and management components, Human interface modules and Tools for identification, detection and learning. The interesting thing in this approach is the positioning of the simulators which cover specific functionalities related to simulating disaster events, impact, information flow etc. As far as it concerns the data management framework a number of databases and libraries are used including terrain and city street maps, land and building use databases, commuting pattern databases, utility network databases, weather forecasts, etc. Real time data may be generated by a number of automated sensors and from the inputs by various first responders at the scene. Such data are also used for updating the simulators using appropriate data processors (in their case XML) while they can be used for training exercises and response to actual events. City.Risks architectural concepts have similarities to the aforementioned approach. Simulator components will be deployed in the Command Center that can simulate events that rarely occur (e.g. bombing or terrorist attacks) familiarizing thus the personnel with managing the information flows and the workflow orchestration for responding to the event effectively. 6.3. Research directions The City.Risks software development task aims at developing the Operation Center and its Core platform. In this context, one of the above methodologies will be adopted to structure, plan, design and implement the software solutions of City.Risks keeping in mind the user-centric vision of the consortium and fullfill its goals for increasing the citizens' perception of security and safety in urban environments. © City.Risks Consortium 91 City.Risks Deliverable D2.1 7. Conclusions We have surveyed the state-of-the-art in the research areas related to the City.Risks project. Our analysis was conducted in two parts. First, complete and integrated solutions that are relevant to City.Risks were described and analyzed. This analysis overviewed a total of 22 projects and 46 software and hardware solutions. In the second part, we focused on individual areas of research related to the project. In particular we overviewed current research in the following areas: Emergency Response and Risks Management Data Management and Analytics Mobile Sensors and Communications Software Development Methodologies and Platform Architectures. For each area of relevance, we outlined the most interesting current work with respect to the goals of the City.Risks project, and proposed directions for future work to be investigated within the scope of the project. More specifically, the results of this analysis will be used to guide the project tasks responsible for the implementation of the City.Risks platform and its components. These tasks include WP3, Tasks 3.1-3.4, WP4, Tasks 4.1-4.4 and WP5, Task 5.1. © City.Risks Consortium 92 City.Risks Deliverable D2.1 Appendix I. Rolled out applications Name URL Short Description Target Audience Roles Use case(s) Urban Securipedia http://securipedia.eu Urban Securipedia is an urban security (and connected safety) knowledge base which forms part of a complimentary tool with the objective of assisting and supporting the urban planner to make more informed deliberations and decisions on the proper planning and sustainable development of the urban area, from a security (and connected safety) perspective. Urban Securipedia assists the urban planner in making more informed decisions in the first (concept level) of three distinguished levels of urban planning. It is part of a complete tool set to support each of these levels, including concept level tools, plan level tools and detail level tools. Target Audience Urban planners Role Information Features Search by subjec, search by urban object type, Text free search, knowhow PEP http://crisiscommunication.fi/pep The project Public Empowerment Policies for Crisis management (PEP, 2012–2014) identifies best practices in a community approach to crisis resilience, and gives directions for future research and implementation, including the use of social media and mobile services. The input of experts in the field of crisis management and communication is a key element in pursuing the goals of this project. Target Audience policy makers, Decision makers, researchers, and crisis management and communication experts Role Information Features Score card audit, Search by subject COMPOSITE http://www.composite-project.eu COMPOSITE – short for “Comparative Police Studies in the EU” – is a research project that looks into large scale change processes in police forces all over Europe. New types of crime, open borders, new technologies, changing public expectations and tighter financial resources are directly or indirectly affecting police forces in most European countries. These new demands require modern police forces that are managed efficiently, are capable of acting flexibly and have the means to cooperate with forces in other countries. Many police forces respond by introducing ambitious change programmes, aiming at modernising and rationalising the way policing is conducted. As such the face of European policing is slowly changing. Target Audience Policy Makers Role Information Features Not found PACT http://www.projectpact.eu/ Public perception of security and privacy: Assessing knowledge, Target Audience general public Role © City.Risks Consortium 93 City.Risks Deliverable D2.1 Collecting evidence, Translating research into action Information Features Assessment of Risk Alert4All http://cordis.europa.eu/project/rcn/98427_en.html Alert4All focuses on improving the effectiveness of one element of the People-Centred Early Warning Systems paradigm, namely alert and communication towards the population in crises management. This improvement shall be measurable in terms of cost-benefit ratio, number of affected citizens timely reached by alerts, trust of citizens on alerts and intended vs. actual impact of alert strategies. Target Audience Public Protection, general public Role Communication Features Information Management Portal, New Media Screening, Alert Simulation, Communication System SUBITO http://cordis.europa.eu/project/rcn/89391_en.html The SUBITO programme has been developed to address Theme Detection of Unattended Goods and of Owner. It will focus on the automated real time detection of abandoned luggage or goods and the fast identification of the individual who left them and their subsequent path. Target Audience Public Place Control Center Role Communication Features Alarm System, Person Tracking INDECT http://www.indect-project.eu/ The purpose of the INDECT project is to involve European scientists and researchers in the development of solutions to and tools for automatic threat detection. The primary objective is to develop advanced and innovative algorithms for human decision support in combating terrorism and other criminal activities, such as human trafficking, child pornography, detection of dangerous situations (e.g. robberies) and the use of dangerous objects (e.g. knives or guns) in public spaces. Efficient tools for dealing with such situations are crucial to ensuring the safety of citizens. Target Audience Police Forces Role Information Features Thread Detection Monitor, Computer Network Thread Detection. Data and Privacy Thread Detection SECUR-ED http://www.secur-ed.eu/ The SECUR-ED Project was a demonstration project with an objective to provide a set of tools to improve urban transport security. Participants included all the major stakeholders from across Europe. Based on best practices, SECUR-ED integrated a consistent, interoperable mix of technologies and processes, covering all aspects; from risk assessment to complete training packages. These solutions also reflected the very diverse environment of mass transportation and also considered societal and legacy concerns. Target Audience Passengers, Front-line and Security employees, Operators in control centres, Security managers, decision makers Role Information, communication Features packaged modular solutions for mass transport security THALES Integrated and scalable urban security solutions https://www.thalesgroup.com/en/worldwide/security/integratedand-scalable-urban-security-solutions Thales solutions include conventional architectures incorporating legacy assets, secure cloud architectures relying on the latest Target Audience City Authorities and Agencies Role Information, Communication, Collaboration © City.Risks Consortium 94 City.Risks Deliverable D2.1 virtualisation technologies, and platform maintenance and cyber protection to support customer-operated services. Many of Thales’s operational services are also now available through new delivery models (e.g. video surveillance as a service) Features Emergency Management, Dispatch and management of security forces, Mobile Command & Control, Apps for intervention forces, Video surveillance and sensor systems, Video analytics, Citizen applications, Leverage Big Data SAMSUNG Urban Security Systems http://www.samsungsecurity.com/_img/menu4/Urban_security_Sol ution_bro_eng_0326F.pdf As cities grow and become more complex, accidents and various threats are on the rise. To protect human life and facilities from these threats and to create a more secure and comfortable environment, Samsung Techwin provides cutting-edge security solutions.The TSM integrated platform can analyze numerous types of data to help make a quick decision and immediate response, to any incident in and outside the city this contributes to enhanced security for the entire city while reducing costs. Target Audience Public Security Role Information Features Data Collection, Control Center, Response Measures SAAB SAFE Emergency Response http://saab.com/security/land-transport-and-urban-security/urbansecurity-solutions/safe-security-management-system/ Saab Security and Safety Management is offering you a solution that will improve workflows and create more efficient processes while increasing security and safety. It will provide employees with a brand new user experience and deliver the powerful resource management your operations need. We have identified current and future demands, and we are taking care of them for you, today.The core of the Saab Security and Safety Management Solution is SAFE, a flexible platform for building next generation security systems. One system managing all areas of your operations Target Audience Missioncritical operations Role Information Features Workflow management, Infrastructures, Operator client, Maps, Resource Management, Sensors, Video, Communication, Mobile, Business Intelligence, Integration Selex ES Urban Security Video Surveillance http://www.selexelsag.com/internet/localization/IPC/media/docs/Vi deosorveglianza_SelexES.pdf The security of sensitive areas (government offices, industrial sites, military zones, prisons, stadiums, banks, critical urban areas, ports, airports, railway stations, metro stations) is vital to safeguard personal safety and protect environments, systems, information and data inside these areas. Recent history teaches us that electronic protection systems aren’t only a precautionary measure, but an effective tool for preventing and deterring criminal acts. Target Audience Public Security Role Information Features Surveillance Selex ES CITIESvisor http://www.selexelsag.com/internet/localization/IPC/media/docs/CI TIESvisor.pdf Public transport companies are increasingly warning of the need to improve safety on their vehicles to combat vandalism and crimes Target Audience Public Transport Organizations Role Information Features © City.Risks Consortium 95 City.Risks Deliverable D2.1 against passengers and drivers. An effective way of preventing this kind of behaviour is using on-board television cameras which are dual purpose: a deterrent for the criminal and an investigative tool for any inquiries Surveillance TAS-AGT Urban Security http://www.tas-agt.com/urban-security/ Our Urban Security platform supports multi-agency collaboration and information sharing, generating a comprehensive Unified Situation Awareness Picture (USAP) that empowers law enforcement and counter-terrorism officials to take effective and timely action. By utilizing visual sensors equipped with advanced video analytics, dedicated CBRNE (chemical, biological, radiological, nuclear, explosives) detectors, as well as data from participating citizens who deliver real-time information via tools such as smart phones, our solution enables authorities to provide city residents with a safe and secure urban environment. Target Audience City Authorities and Agencies Role Collaboration Features Surveillance, Intelligence System, Citizen Data Collection, Visualisation, Investigation, Threat Identification LL Tech International Urban Security http://www.lltechinternational.com/our-solutions/urban-security/ The Safe City is a concept for returning security, safety and quality of life to today’s complex cities through the use of technology, infrastructure, personnel and processes. The Safe City concept can be applied to cities, towns, industrial parks, college campuses, or any other physical environment where people require a safe, comfortable environment. Target Audience municipal and national decision-makers Role Information Features Detection of irregular activities, response and reaction measures ISS SecurOS http://isscctv.com/ The ISS SecurOS solution set powers the most advanced video management and video analytics deployed anywhere in the world. From the warning and aversion of threats, to the prevention of terrorism and the provision for safety of people and economic wellbeing of businesses. ISS is the proven technology partner of the world’s largest integrators in the video security and surveillance marketplace. ISS has a very wide range of deployments, in areas such as transportation, retail, banking, colleges, government, industry, and urban surveillance, and with a true open platform that allows one to expand their solutions at their own pace. Target Audience Public Security Role Information Features Video Management System, License Plate Recognition (LPR/ANPR), Container Recognition, Face Capture and Recognition, Carriage Recognition for Rail, Traffic Monitoring ARMOR http://create.usc.edu/sites/default/files/projects/sow/797/tambeor donez2008-assistantforrandomizedmonitoringoverroutesarmor.pdf The ARMOR project is focused on developing methods for creating randomized plans and processes for monitoring, inspection, patrolling, and security in general – so that even if an attacker observes the plans, he/she cannot predict its progression – thus providing risk reduction while guaranteeing a certain level of protection quality. Target Audience LAWA Police Role Information Features model patrols of an agent/team of agents Emexis Fuel Tracker Target Audience © City.Risks Consortium 96 City.Risks Deliverable D2.1 http://www.emixis.com/technology-for-telematics-serviceproviders/fuel-tracker-fuel-theft-detection-and-fuel-levelmeasurement/ EMIXIS’ Fuel Tracker module allows measurement, both remotely and in real time, fuel levels, as well as detection of theft by siphoning. This very simple to install universal module can be mounted on all types of vehicles, it requires no special calibration or connection other than to the vehicle tank gauge. Its theft detection function is based on a unique self-learning mechanism and allows local action (activation of the horn or headlights, for example). In addition, it can be connected to any market GPS beacon which features an analog input in order to transmit the level of fuel of the vehicle. Businesses Role Information Features Fuel Tracking, Position Tracking CrimeReports https://www.crimereports.com/ Crime Map and Visualizaiton Target Audience general public Role Information Features Location Selection UKCrimeStats http://ukcrimestats.com Crime Data Repository Target Audience general public Role Information Features Different Data Filters Crime Map Vienna - Kriminalität in Wien http://www.vienna.at/features/crime-map Crime Map and Visualizaiton Target Audience general public Role Information Features Location Selection, Crime Type Selcetion Durham Crime map https://www.police.uk/durham/39/crime/ Crime Map and Visualizaiton Target Audience general public Role Information Features Location Selection VirtualGuard http://www.virtualguard.com/ Virtual guard security company can offer you reliable security solutions that will protect your premises and give you peace of mind. With our advanced video surveillance technology and our world class Control and Command system, we can provide you with security services that are faster and more reliable than those of other security companies. Our security services can help you to: Prevent theft and vandalism, Prevent crime before it happens, Prevent Target Audience general public Role Information Features Video Surveillance, Audio Warning, Command & Control Center © City.Risks Consortium 97 City.Risks Deliverable D2.1 intruders from entering the premises & Monitor everything that goes on in the premises at all times BluCop HappstoR http://blucop.happstor.com BluCop uses the communication cost free Bluetooth technology to periodically check the availability of previously selected Bluetooth devices - so called markers - in the surrounding area. BluCop raises the alarm if it does not receive a life sign response of the currently checked marker within a configurable time. As Bluetooth is a short range communication technology, the alert is issued whenever the checked marker gets too far from BluCop. Target Audience general public Role Information Features Device Monitoring Prey https://preyproject.com/ Prey is an all-in-one cross-platform security solution for laptops, tablets, and phones used to protect millions of devices, all around the world. Its solid tracking and reporting technology helps people and organizations keep track of their assets 24/7, and proves to be crucial in the recovery of stolen devices every day Target Audience general public Role Information Features Tracking, Locking, Memory Erasure Comodo Anti Theft https://play.google.com/store/apps/details?id=com.comodo.mobile. comodoantitheft Where is my Phone? – Don’t worry about your phone even if it’s lost or stolen. You can control your devices remotely from any place, any time. Target Audience general public Role Information Features Activity Log, Uninstall Protection, Localization, Remote Lock, Alarm, Memory Erasure, Remote Take a Picture © City.Risks Consortium 98 City.Risks Deliverable D2.1 Appendix II. Ongoing projects’ development Name URL Short description Target Audience Roles Use case(s) ATHENA http://www.projectathena.eu/ Athena is a system that harnesses social media and high-tech mobile devices to crowd-source information during a crisis. It combines this information with the domain knowledge of the emergency services and novel analytical techniques to provide the public and first responders actionable intelligence and map-based visualisations to help safeguard and rescue citizens caught up in crisis situations. Information from the ‘crowd’ is processed, enhanced and retuned back to the crowd – ‘collective intelligence’ that can transform disorganised individuals into organised pre-first responders. Target Audience first responders, citizens Role Collaboration Use cases Crisis management, Social media in crisis management eVACUATE http://www.evacuate.eu A holistic, scenario-independent, situation-awareness and guidance system for sustaining the Active Evacuation Route for large crowds. Target Audience general public Role Information, Communication Use cases Safety/Security TACTICS http://fp7-tactics.eu/ Tactical Approach to Counter Terrorists in Cities Target Audience: Threat Manager (TM), Threat Decomposition Manager (TDM) and Capabilities Manager (CM) Role Information Use cases Legal, Safety/Security HARMONISE http://harmonise.eu/ A Holistic Approach to Resilience and SysteMatic ActiOns to Make Large Scale UrbaN Built Infrastructure Secure Target Audience: Mechanisms/Tools for Delivery of Improved Urban Security and Resilience Role Information Use cases Safety/Security Urban Security eGuide (Inspirational Plattform) http://www.besecureproject.eu/dynamics//modules/SFIL0100/view.php?fil_Id=56 The main objective of the Inspirational Platform (IP) is to provide a capability to browse efficiently BESECURE data resources (case study best practices, urban security related literature reviews) to gain additional knowledge. Target Audience: Education, community, general public Role Information Use cases Safety/Security © City.Risks Consortium 99 City.Risks Deliverable D2.1 Policy platform http://www.besecureproject.eu/dynamics//modules/SFIL0100/view.php?fil_Id=57 One of the main objectives for the Policy Platform is to provide a capability to create so called “One Page Policies (OPP)” being an executive summary of the emerging evidence-based urban security policies. Such OPPs can together with attached more detailed evidences be used as a proposals for hanges for high-level authorities with a possibility to have an insight to the whole policy development process whenever needed. Target Audience: Policy makers Role Collaboration Use cases Safety/Security, Policy Urban security Early warning system http://www.besecureproject.eu/dynamics//modules/SFIL0100/view.php?fil_Id=58 The purpose of D4.3 is to provide a prototype of an Early Warning System that provides an overview of the security situation in an urban area, and that supports the monitoring of various factors characterising urban zones. The system can provide alerts of certain factors change, so that policy makers can carry out timely countermeasures against undesirable scenarios. Target Audience: Policy makers Role Information Use cases Safety/Security, Policy iRISK Urban Vulnerability Measure http://create.usc.edu/sites/default/files/projects/sow/1045/kurbanc reateyear8annualreportkurbanhudoc.pdf Prototype web-based application of Personal Vulnerability Index for pilot counties in North Carolina is currently under development. The PI has completed the PVI module for IHRM Loss Estimation project in Raleigh North Carolina. The intended users are general public and local and state stake holders. The user will enter information on household characteristics, housing type and disaster strength and estimate uncovered structure losses both in terms of dollars and lossrates. Target Audience: NC state policy makers, Howard University students Role Information Use cases Economic, Social, Safety/Security RAW Risk Assessment Workbench http://create.usc.edu/sites/default/files/projects/sow/850/hall2005riskanalysisworkbenchpart1.pdf The Risk Analyst Workbench (RAW) is a software tool that provides modeling and analysis capabilities for the risk analysis and decision analysis steps of CTMS (CREATE Terrorism Modeling System). RAW also provides a mechanism for extracting data from external sources, building libraries of data for internal use and linking models to support other modeling steps. RAW guides the risk analyst through the steps of threat and counter-measure characterization, probability estimation, outcome definition, and scenario creation. It also provides tools for rating outcomes of threats, effectiveness of counter-measures, and prioritizing investments. Target Audience: classified, “official use only” or public environment Role Information Use cases Safety/Security DPS Deploy Target Audience: http://create.usc.edu/researcher/michael-orosz/projects/dpsdeploy- USC Department of Public Safety usc-department-public-safety-risk-assessment-and Role This project will develop risk-based crime prediction and Information countermeasure allocation models and tools to be used by the USC Use cases © City.Risks Consortium 100 City.Risks Deliverable D2.1 DPS to facilitate decision making process. In addition, the team will focus on generalizing the technology for use in other physical infrastructure environments such as maritime port (i.e., update PortSec analytics), stadium and other physical infrastructure operations. Safety/Security MobEyes http://lia.deis.unibo.it/Research/Mobeyes/ MobEyes exploits wireless-enabled vehicles equipped with video cameras and a variety of sensors to perform event sensing, processing/filtering of sensed data, and ad hoc message routing to other vehicles. Since the sheer amount of data will be generated from those sensors, directly reporting raw data to the authority is infeasible. Thus, MobEyes proposes that: sensed data stay with monitoring mobile nodes (i.e., mobile storage); vehicle-local processing capabilities are used to extract features of interest, e.g., license plates from traffic monitoring images; mobile nodes periodically generate data summaries with extracted features and context information such as timestamps and positioning coordinates; mobile agents, such as police patrolling cars, move and opportunistically harvest summaries from neighbor vehicles. The harvesting agents are interested in the following data: where was a certain vehicle at a certain time; which vehicles were at a given time in a given place, and: what data/video did the vehicle(s) collect? To access the data later, one needs to get to the actual vehicles (based on summary reports) and pump out the data. Target Audience: urban monitoring Role Information Use cases Safety/Security, Mobility © City.Risks Consortium 101 City.Risks Deliverable D2.1 Bibliography Abraham, I., Delling, D., Goldberg, A. V., Werneck, R. F. (2011). A hub-based labeling algorithm for shortest paths in road networks. In Experimental Algorithms (pp. 230241). Springer Berlin Heidelberg. Abul, O., Bonchi, F., Nanni, M. (2008). Never walk alone: Uncertainty for anonymity in moving objects databases. In Data Engineering, 2008. ICDE 2008. IEEE 24th International Conference on (pp. 376-385). Afzaal, M., Sarno, C. D., Coppolino, L., D'Antonio, S., Romano, L. (2012). A resilient architecture for forensic storage of events in critical infrastructures. In HighAssurance Systems Engineering (HASE), 2012 IEEE 14th International Symposium on (pp. 48-55). IEEE. Agarwal, P., Vaithiyanathan, R., Sharma, S., Shroff, G. (2012). Catching the Long-Tail: Extracting Local News Events from Twitter. In ICWSM. Agatz, N., Erera, A., Savelsbergh, M., Wang, X. (2012). Optimization for dynamic ride-sharing: A review. European Journal of Operational Research, 223(2), 295-303. Akiba, T., Iwata, Y., Yoshida, Y. (2013). Fast exact shortest-path distance queries on large networks by pruned landmark labeling. In Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data (pp. 349-360). ACM. Alexander, C.W. (1964). Notes on the Synthesis of Form. Harvard University Press. Aliance, Z. Zigbee Specifications (2008). Zigbee Standard Organisation, San Ramon, CA, USA, 2008. Alivand, M., Hochmair, H. (2013). Extracting scenic routes from VGI data sources. In Proceedings of the Second ACM SIGSPATIAL International Workshop on Crowdsourced and Volunteered Geographic Information (pp. 23-30). ACM. Anderson, D.J. (2010). Kanban: Successful Evolutionary Change for Your Technology Business, Blue Hole Press, Ed.1. Bae, S., Kim, D., Ha, M., and Kim, S. H. (2011). “Browsing architecture with presentation metadata for the internet of things,” in Proceedings of the 17th IEEE International Conference on Parallel and Distributed Systems (ICPADS 11), pp. 721– 728. Banks, B., Harms, T., Sarvestani, S.S., Bastianini, F. (2009) A low-cost wireless system for autonomous generation of road safety alerts, in: SPIE Smart Structures and Materials+ Nondestructive Evaluation and Health Monitoring. International Society for Optics and Photonics, p. 72920E–72920E. Barsky, L. E., Trainor, J. E., Torres, M. R. and Aguirre, Benigno. E. (2007). Managing volunteers: FEMA's Urban Search and Rescue programme and interactions with unaffiliated responders in disaster response. , Disasters, 31: 495–507. © City.Risks Consortium 102 City.Risks Deliverable D2.1 –Hannemann, M., Pajor, T., Sanders, P., Wagner, D., Werneck, R. (2014) Route planning in transportation networks. Technical Report MSR-TR-2014- 4, Microsoft Research. Bast, H., Funke, S., Sanders, P., Schultes, D. (2007). Fast routing in road networks with transit nodes. Science, 316(5824), 566-566. Beck, K., et al. (2001)., http://Agilemanifesto.org/ Manifesto for Agile Software Development. Becker, H., Iter, D., Naaman, M., Gravano, L. (2012). Identifying content for planned events across social media sites. In Proceedings of the fifth ACM international conference on Web search and data mining (pp. 533-542). ACM. Becker, H., Naaman, M., Gravano, L. (2011). Beyond Trending Topics: Real-World Event Identification on Twitter. ICWSM, 11, 438-441. Belimpasakis, P., You, Y., Selonen, P. (2010). Enabling rapid creation of content for consumption in mobile augmented reality. In: Next Generation Mobile Applications, Services and Technologies, 2010 Fourth International Conference on, IEEE, 1-6. Beresford, A. R., Stajano, F. (2003). Location privacy in pervasive computing. IEEE Pervasive computing, (1), 46-55. Beringer, D., Hancock, P. (1989). Exploring situational awareness: A review and the effects of stress on rectilinear normalization((aircraft pilot performance)). In International Symposium on Aviation Psychology, OH (pp. 646-651). BluVision (2015). Bluetooth to WiFi Gateway, http://bluvision.com/blufi-wifi-sensor Bollen, J., Mao, H., Zeng, X. (2011). Twitter mood predicts the stock market. Journal of Computational Science, 2(1), 1-8. Bondavalli, A., Ceccarelli, A., Falai, L., Vadursi, M. (2007). Foundations of measurement theory applied to the evaluation of dependability attributes. In Dependable Systems and Networks, 2007. DSN'07. 37th Annual IEEE/IFIP International Conference on (pp. 522-533). IEEE. Bondavalli, A., Ceccarelli, A., Falai, L., Vadursi, M. (2010). A new approach and a related tool for dependability measurements on distributed systems. Instrumentation and Measurement, IEEE Transactions on, 59(4), 820-831. Bontcheva, K., Rout, D. (2012). Making sense of social media streams through semantics: a survey. Semantic Web, 1, 1-31. Boulos, M.N.K., Resch, B., Crowley, D.N., Breslin, J.G., Sohn, G., Burtner, R., Pike, W.A., Jezierski, E., Chuang, K.-Y.S., 2011. Crowdsourcing, citizen sensing and sensor web technologies for public and environmental health surveillance and crisis management: trends, OGC standards and application examples. International journal of health geographics 10, 67. Buratti, C., Conti, A., Dardari, D., Verdone, R. (2009). An overview on wireless sensor networks technology and evolution. Sensors, 9(9), 6869-6896. © City.Risks Consortium 103 City.Risks Deliverable D2.1 Cameron, M. A., Power, R., Robinson, B., Yin, J. (2012). Emergency situation awareness from twitter for crisis management. In Proceedings of the 21st international conference companion on World Wide Web (pp. 695-698). ACM. Cao, L., Jiang, W. and Zhang, Z. (2009). Automatic Meter Reading System Based on Wireless Mesh Networks and SOPC Technology’, Intelligent Networks and Intelligent Systems. Cao, X., Cong, G., Jensen, C. S. (2010). Retrieving top-k prestige-based relevant spatial web objects. Proceedings of the VLDB Endowment, 3(1-2), 373-384. Cao, X., Cong, G., Jensen, C. S., Ooi, B. C. (2011). Collective spatial keyword querying. In Proceedings of the 2011 ACM SIGMOD International Conference on Management of data (pp. 373-384). ACM. Cao, X., Cong, G., Jensen, C. S., Yiu, M. L. (2014). Retrieving regions of interest for user exploration. Proceedings of the VLDB Endowment, 7(9), 733-744. Cardei, M., Thai, M. T., Li, Y., Wu, W. (2005, March). Energy-efficient target coverage in wireless sensor networks. In INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE (Vol. 3, pp. 19761984). IEEE. Cha, K. (2001). Wireless remote monitoring system for reservoir management. Proc. of Industry-University Collaboration, 4, 99-106. Chainey, S., Ratcliffe, J. (2013). GIS and crime mapping. John Wiley Sons. Chainey, S., Tompson, L., Uhlig, S. (2008). The utility of hotspot mapping for predicting spatial patterns of crime. Security Journal, 21(1), 4-28. Chakka, V. P., Everspaugh, A. C., Patel, J. M. (2003). Indexing large trajectory data sets with SETI. Ann Arbor, 1001, 48109-2122. Chakrabarti, D., Punera, K. (2011). Event Summarization Using Tweets. ICWSM, 11, 66-73. Chen, L., Cong, G., Jensen, C. S., Wu, D. (2013). Spatial keyword query processing: An experimental evaluation. In Proceedings of the VLDB Endowment (Vol. 6, No. 3, pp. 217-228). VLDB Endowment. Chen, Rui, Raj Sharman, H. Raghav Rao, and Shambhu J. Upadhyaya (2008). Coordination in emergency response management. Commun. ACM 51, 5 (May 2008), 66-73. Chen, W. P., Hou, J. C., Sha, L. (2004). Dynamic clustering for acoustic target tracking in wireless sensor networks. Mobile Computing, IEEE Transactions on, 3(3), 258-271. Chen, Y. Y., Suel, T., Markowetz, A. (2006). Efficient query processing in geographic web search engines. In Proceedings of the 2006 ACM SIGMOD international conference on Management of data (pp. 277-288). ACM. Chen, Z., Zhang, J., Li, Z., Wu, F., Ho, K. (2008). The technical concept within the Integrative landslide early warning system. In Proc. of Int’l. Symposium on Landslides and Engineered Slopes (pp. 1083-1088). © City.Risks Consortium 104 City.Risks Deliverable D2.1 Choi, D. W., Chung, C. W., Tao, Y. (2014). Maximizing Range Sum in External Memory. ACM Transactions on Database Systems (TODS), 39(3), 21. Chow, C. Y., Mokbel, M. F. (2011). Trajectory privacy in location-based services and data publication. ACM SIGKDD Explorations Newsletter, 13(1), 19-29. Christoforaki, M., He, J., Dimopoulos, C., Markowetz, A., Suel, T. (2011). Text vs. space: efficient geo-search query processing. In Proceedings of the 20th ACM international conference on Information and knowledge management (pp. 423-432). ACM. Chun, Wendy H., Höllerer, Tobias (2013). Real-time hand interaction for augmented reality on mobile phones. In: Proceedings of the 2013 international conference on Intelligent user interfaces (IUI '13). ACM, New York, NY, USA, 307-314. Cinque, M., Cotroneo, D., Pecchia, A. (2013). Event logs for the analysis of software failures: A rule-based approach. Software Engineering, IEEE Transactions on, 39(6), 806-821. Cisco (2015), Cisco Smart+Connected City Operations http://www.cisco.com/web/strategy/smart_connected_communities/cityoperations-center.html (Accessed: 20. July 2015). Center Cong, G., Jensen, C. S., Wu, D. (2009). Efficient retrieval of the top-k most relevant spatial web objects. Proceedings of the VLDB Endowment, 2(1), 337-348. Cong, G., Lu, H., Ooi, B. C., Zhang, D., Zhang, M. (2012). Efficient spatial keyword search in trajectory databases. arXiv preprint arXiv:1205.2880. Cross, N. (1992). Research in Design Thinking, in Research in Design Thinking, N. Cross, K. Dorst and N. Roozenburg (eds.). Delft, Netherlands: Delft University Press. CycleLeash (2014). Case Study, content/uploads/2014/12/CycleLeash-Case-Study.pdf http://bluvision.com/wp- Dave, K., Lawrence, S., Pennock, D. M. (2003). Mining the peanut gallery: Opinion extraction and semantic classification of product reviews. In Proceedings of the 12th international conference on World Wide Web (pp. 519-528). ACM. De Almeida, V. T., Güting, R. H. (2005). Indexing the trajectories of moving objects in networks. GeoInformatica, 9(1), 33-60. Dean, J., , S. (2008). MapReduce: simplified data processing on large clusters. Communications of the ACM, 51(1), 107-113. Delling, D., Wagner, D. (2007). Landmark-based routing in dynamic graphs. In Experimental algorithms (pp. 52-65). Springer Berlin Heidelberg. Dementyev, A., Hodges, S., Taylor, S., Smith, J. (2013, April). Power consumption analysis of Bluetooth Low Energy, ZigBee and ANT sensor nodes in a cyclic sleep scenario. In Wireless Symposium (IWS), 2013 IEEE International (pp. 1-4). IEEE. Dickson, E. (2012) Urban risk assessments: understanding disaster and climate risk in cities. World Bank Publications. © City.Risks Consortium 105 City.Risks Deliverable D2.1 Dong, Q., Yu, L., Lu, H., Hong, Z., Chen, Y. (2010). Design of building monitoring systems based on wireless sensor networks. Wireless Sensor Network, 2(09), 703. D’Angelo, G., D’Emidio, M., Frigioni, D., Vitale, C. (2012). Fully dynamic maintenance of arc-flags in road networks. In Experimental Algorithms (pp. 135-147). Springer Berlin Heidelberg. Eck, J., Chainey, S., Cameron, J., Wilson, R. (2005) Mapping crime: Understanding hotspots. Ergen, S. ZigBee/IEEE (2004). 802.15.4 Summary, UC, Berkeley, Calif, USA. Etzion, O., Niblett, P. (2010). Event processing in action. Manning Publications Co.. Farahani, R. Z., Asgari, N., Heidari, N., Hosseininia, M., Goh, M. (2012). Covering problems in facility location: A review. Computers Industrial Engineering, 62(1), 368407. Ferrari, L., Rosi, A., Mamei, M., Zambonelli, F. (2011). Extracting urban patterns from location-based social networks. In Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Location-Based Social Networks (pp. 9-16). ACM. Florczyk, A. J, F. J López-Pellicer, J. Valino, R. Béjar and P. R. Muro-Medrano. (200). INSPIRE-able Services. In: 12th AGILE International Conference on Geographic Information Science. Hannover, Germany. French Scrum User Group (2009). A National Survey on Agile Methods in France. www.frenchsug.org Frentzos, E. (2003). Indexing objects moving on fixed networks. In Advances in spatial and temporal databases (pp. 289-305). Springer Berlin Heidelberg. Fu, K., Lu, Y. C., Lu, C. T. (2014). TREADS: a safe route recommender using social media mining and text summarization. In Proceedings of the 22nd ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems (pp. 557560). ACM. Fuchs-Kittowski, F., Simroth, S.; Pfützner, B., Trosien, F. (2012). Mobile Augmented Maps und Aug-mented Reality für den präventiven Hochwasserschutz. In: Knetsch, G. (Hrsg.): Umweltinformati-onssysteme – Frühwarn- und Informationssysteme für den Hochwasserschutz. UBA-Texte Nr. 41/2012, Dessau: Umweltbundesamt, 19-32. Fuchs-Kittowski, Frank, Faust, Daniel (2014). Architecture of Mobile Crowdsourcing Systems. In: Pro-ceedings of the 20th International Conference on Collaboration and Technology (CRIWG 2014), Santiago, Chile, September 7th-10th 2014, Springer International Publishing, Berlin, Heidelberg, New York, 129-144. Furuhata, M., Dessouky, M., Ordóñez, F., Brunet, M. E., Wang, X., Koenig, S. (2013). Ridesharing: The state-of-the-art and future directions. Transportation Research Part B: Methodological, 57, 28-46. Ganti, R. K., Ye, F., Lei, H. (2011). Mobile crowdsensing: current state and future challenges. Communications Magazine, IEEE, 49(11), 32-39. © City.Risks Consortium 106 City.Risks Deliverable D2.1 Garcia, C., Ibarguengoytia-Gonzalez, P., Garcia-Hernandez, J., and Perez-Diaz, J. (2007). Wireless sensor networks and applications: a survey, International Journal of Computer Science and Network Security, vol. 7, no. 3, pp. 264–273. García-Hernández, C. F., Ibarguengoytia-Gonzalez, P. H., García-Hernández, J., PérezDíaz, J. A. (2007). Wireless sensor networks and applications: a survey. IJCSNS International Journal of Computer Science and Network Security, 7(3), 264-273. Geisberger, R., Sanders, P., Schultes, D., Vetter, C. (2012). Exact routing in large road networks using contraction hierarchies. Transportation Science, 46(3), 388-404. Gerber, M. S. (2014). Predicting crime using Twitter and kernel density estimation. Decision Support Systems, 61, 115-125. Goldberg, A. V., Harrelson, C. (2005). Computing the shortest path: A search meets graph theory. In Proceedings of the sixteenth annual ACM-SIAM symposium on Discrete algorithms (pp. 156-165). Society for Industrial and Applied Mathematics. Goldberg, A. V., Werneck, R. F. F. (2005). Computing Point-to-Point Shortest Paths from External Memory. In ALENEX/ANALCO (pp. 26-40). Gruteser, M., Hoh, B. (2005). On the anonymity of periodic location samples. In Security in Pervasive Computing (pp. 179-192). Springer Berlin Heidelberg. Gröger, Gerhard, Kolbe, Thomas H., Nagel, Claus, Häfele, Karl-Heinz (2012). CityGML 2.0 - OGC City Geography Markup Language (CityGML). Open Geospatial Consortium (OGC 12-019), http://www.opengis.net/spec/citygml/2.0. Gurpreet Singh Matharu, Anju Mishra, “Empirical Study of Agile Software Development Methodologies: A Comparative Analysis”, ACM SIGSOFT Software Engineering Notes, January 2015 Volume 40 Number 1 Ha, M., Kim, D., Kim, S. H. and Hong, S. (2010). Inter-MARIO: a fast and seamless mobility protocol to support inter-PAN handover in 6LoWPAN’, in Proceedings of the 53rd IEEE Global Communications Conference (GLOBECOM 10). Hamacher, H. W., Tjandra, S. A. (2001). Mathematical modelling of evacuation problems: A state of art. Fraunhofer-Institut für Techno-und Wirtschaftsmathematik, Fraunhofer (ITWM). Hariharan, R., Hore, B., Li, C., Mehrotra, S. (2007). Processing spatial-keyword (SK) queries in geographic information retrieval (GIR) systems. In Scientific and Statistical Database Management, 2007. SSBDM'07. 19th International Conference on (pp. 1616). IEEE. Harries, K.A. (1999) Mapping crime: Principle and practice. Havlik, D., G. Schimak, R. Denzer and B. Stevenot. (2006) Introduction to SANY (sensors anywhere) integrated project. Shaker, Graz, Austria: 541–546. He, T., Krishnamurthy, S., Stankovic, J. A., Abdelzaher, T., Luo, L., Stoleru, R., ... Krogh, B. (2004, June). Energy-efficient surveillance system using wireless sensor networks. In Proceedings of the 2nd international conference on Mobile systems, applications, and services (pp. 270-283). ACM. © City.Risks Consortium 107 City.Risks Deliverable D2.1 Hilger, M., Köhler, E., Möhring, R. H., Schilling, H. (2009). Fast point-to-point shortest path computations with arc-flags. The Shortest Path Problem: Ninth DIMACS Implementation Challenge, 74, 41-72. Hoh, B., Gruteser, M., Xiong, H., Alrabady, A. (2010). Achieving guaranteed anonymity in gps traces via uncertainty-aware path cloaking. Mobile Computing, IEEE Transactions on, 9(8), 1089-1107. Hollifield, B.R., Habibi, E. (2006) The Alarm Management Handbook: A Comprehensive Guide: Practical and Proven Methods to Optimize the Performance of Any Alarm Management System. Pas. Holma, H. and Toskala, A. (2006). HSDPA/HSUPA for UMTS: High Speed Radio Access for Mobile Communications, John Wiley Sons, Chichester, England. Hong, S., Kim, D., Ha, M. et al (2010). SNAIL: an IP-based wireless sensor network approach to the Internet of things’, IEEE Wireless Communications, vol. 17, no. 6, pp. 34–42. Huang, Zhanpeng, Li, Weikai, Hui, Pan, Peylo, Christoph (2014). CloudRidAR - a cloudbased architecture for mobile augmented reality. In: Proceedings of the 2014 workshop on Mobile augmented reality and robotic technology-based systems (MARS '14). ACM, New York, NY, USA, 29-34. IBM (2012) Intelligent Operations Center for Smarter Cities Administration Guide. IBM Corporation, International Technical Support Organization http://www.redbooks.ibm.com/redbooks/pdfs/sg248061.pdf (Accessed: 20. July 2015). ITU Internet Report (2005). The internet of things’. Itria, M. L., Daidone, A., Ceccarelli, A. (2014). A Complex Event Processing Approach for Crisis-Management Systems. arXiv preprint arXiv:1404.7551. Jagtman, H. M. (2010). Cell broadcast trials in the Netherlands: Using mobile phone technology for citizens alarming, Reliability Engineering and System Safety, vol. 95 no. 1, pp. 18-28, 2010. Jain, S., McLean, C. R. (2004). An architecture for integrated modeling and simulation for emergency response. In Proceedings of the institute of industrial engineers annual conference (pp. 1503-1508). Jensen, C. S., Lu, H., Yang, B. (2009). Indexing the trajectories of moving objects in symbolic indoor space. In Advances in Spatial and Temporal Databases (pp. 208-227). Springer Berlin Heidelberg. Kallus, N. (2014). Predicting crowd behavior with big public data. In Proceedings of the companion publication of the 23rd international conference on World wide web companion (pp. 625-630). International World Wide Web Conferences Steering Committee. Kapucu, Naim (2005). Interorganizational coordination in dynamic context: Networks in emergency response management. Connections 26.2 (2005): 33-48. © City.Risks Consortium 108 City.Risks Deliverable D2.1 Kapucu, Naim. (2008). Collaborative emergency management: better community organising, better public preparedness and response. Disasters, 32: 239–262 Kido, H., Yanagisawa, Y., Satoh, T. (2005). An anonymous communication technique using dummies for location-based services. In Pervasive Services, 2005. ICPS'05. Proceedings. International Conference on (pp. 88-97). IEEE. Kim, M.-K. and Jee, K.-Y. (2006). Characteristics of individuals influencing adoption intentions for portable internet service’, ETRI Journal, vol. 28, no. 1, pp. 67–76. Kim, S., George, B., Shekhar, S. (2007). Evacuation route planning: scalable heuristics. In Proceedings of the 15th annual ACM international symposium on Advances in geographic information systems (p. 20). ACM. Kim, Y. J., Hong, S., Lee, J. U., Song, S., Kim, D. (2013). An integration avenue of ground monitoring based on wireless sensor networks. International Journal of Distributed Sensor Networks, 2013. - Actuatorbased Early Warning System for Extreme Weather Conditions. In: Pebesma, E.; Bishr, M.; Bartoschek, T. (eds.): Proceedings of the International 6th Geographic Information Da -330, 2008. Klafft, Michael (2013). Diffusion of emergency warnings via multi-channel communication systems an empirical analysis, Autonomous Decentralized Systems (ISADS), 2013 IEEE Eleventh International Symposium on , vol., no., pp.1,5, 6-8 March 2013 Kling, F., Pozdnoukhov, A. (2012). When a city tells a story: urban topic analysis. In Proceedings of the 20th International Conference on Advances in Geographic Information Systems (pp. 482-485). ACM. Kriegel, H. P., Renz, M., Schubert, M. (2010). Route skyline queries: A multipreference path planning approach. In Data Engineering (ICDE), 2010 IEEE 26th International Conference on (pp. 261-272). IEEE. Kuorilehto, M., Hännikäinen, M., Hämäläinen, T. D. (2005). A survey of application distribution in wireless sensor networks. EURASIP Journal on Wireless Communications and Networking, 2005(5), 774-788. Kwak, H., Lee, C., Park, H., Moon, S. (2010). What is Twitter, a social network or a news media?. In Proceedings of the 19th international conference on World wide web (pp. 591-600). ACM. Lai, T. K., Wang, A., Chang, C. M., Tseng, H. M., Huang, K., Li, J. P., ... Chou, P. H. (2014, April). Demonstration abstract: an 8x8 mm 2 bluetooth low energy wireless motion-sensing platform. In Proceedings of the 13th international symposium on Information processing in sensor networks (pp. 341-342). IEEE Press. Lai, T., Lin, C., Su, Y., Chu, H. (2011). BikeTrack: Tracking stolen bikes through everyday mobile phones and participatory sensing. ACM PhoneSense. Lamprianidis, G., Skoutas, D., Papatheodorou, G., Pfoser, D. (2014). Extraction, integration and analysis of crowdsourced points of interest from multiple web © City.Risks Consortium 109 City.Risks Deliverable D2.1 sources. In Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Crowdsourced and Volunteered Geographic Information (pp. 16-23). ACM. Lansdall-Welfare, T., Lampos, V., Cristianini, N. (2012). Effects of the Recession on Public Mood in the UK. In Proceedings of the 21st international conference companion on World Wide Web (pp. 1221-1226). ACM. Laptev, D., Tikhonov, A., Serdyukov, P., Gusev, G. (2014). Parameter-free discovery and recommendation of areas-of-interest. In Proceedings of the 22nd ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems (pp. 113-122). ACM. Le, T. T. T., Nickerson, B. G. (2008). Efficient search of moving objects on a planar graph. In Proceedings of the 16th ACM SIGSPATIAL international conference on Advances in geographic information systems (p. 41). ACM. LeanKit (2014). Maximize Your Time, Improve Efficiency with the Kanban System. http://leankit.com/kanban/kanban-system/ Lechner, Martin (2013). OGC Augmented Reality Markup Language 2.0 (ARML 2.0). OGC Draft Implementation Specification (OGC 12-132r2), Open Geospatial Consortium (OGC), http://www.opengis.net/doc/arml2x0/2.0. Li, D., Wong, K. D., Hu, Y. H., Sayeed, A. M. (2002). Detection, classification, and tracking of targets. Signal Processing Magazine, IEEE, 19(2), 17-29. Li, L., Halpern, J. Y., Bahl, P., Wang, Y.-M. and Wattenhofer, R. (2001). Analysis of a cone-based distributed topology control algorithm for wireless multi-hop networks’, In Proceedings of the ACM Symposium on Principles of Distributed Computing (PODC), pp. 264–273. Li, N. and Hou, J. C. (2004). FLSS: A fault-tolerant topology control algorithm for wireless networks’, In Proceedings of the ACM International Conference on Mobile Computing and Networking (MobiCom), Philadelphia, Pennsylvania. Li, N., Hou, J. C. and Sha, L. (2003). Design and analysis of an MST-based topology control algorithm’, In Proce of IEEE INFOCOM. Li, R., Lei, K. H., Khadiwala, R., Chang, K. C. C. (2012). Tedas: A twitter-based event detection and analysis system. In Data engineering (icde), 2012 ieee 28th international conference on (pp. 1273-1276). IEEE. Li, X., Stojmenovic, I. and Wang, Y. (2004). Partial Delaunay triangulation and degree limited localized Bluetooth scatternet formation’, IEEE Transactions on Parallel and Distributed Systems, vol. 15, no. 4, pp. 350–361. Li, X., Zhao, Z., Zhu, X., Wyatt, T. (2011). Covering models and optimization techniques for emergency response facility location and planning: a review. Mathematical Methods of Operations Research, 74(3), 281-310. Lieberman, M. D., Samet, H. (2012). Adaptive context features for toponym resolution in streaming news. In Proceedings of the 35th international ACM SIGIR conference on Research and development in information retrieval (pp. 731-740). ACM. © City.Risks Consortium 110 City.Risks Deliverable D2.1 Lim, G. J., Zangeneh, S., Baharnemati, M. R., Assavapokee, T. (2012). A capacitated network flow optimization approach for short notice evacuation planning. European Journal of Operational Research, 223(1), 234-245. Lindh, Joakim (2015) SWRA475, TI-Application report, Bluetooth Low Energy beacons Liu, H., Jia, X., Wan, P. J., Yi, C. W., Makki, S. K., Pissinou, N. (2007). Maximizing lifetime of sensor surveillance systems. Networking, IEEE/ACM Transactions on, 15(2), 334-345. Liu, J., Yu, G., Sun, H. (2011). Subject-oriented top-k hot region queries in spatial dataset. In Proceedings of the 20th ACM international conference on Information and knowledge management (pp. 2409-2412). ACM. Luo, J., Joshi, D., Yu, J., Gallagher, A. (2011). Geotagging in multimedia and computer vision—a survey. Multimedia Tools and Applications, 51(1), 187-211. Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M. (2007). ldiversity: Privacy beyond k-anonymity. ACM Transactions on Knowledge Discovery from Data (TKDD), 1(1), 3. Maher, M., Poon, J., and Boulanger, S. (1995). Formalizing Design Exploration as CoEvolution: A Combined Gene Approach, in: Preprints of the Second IFIP WG5.2 Workshop on Advances in Formal Design Methods for CAD, J.S.G.F. Sudweeks (ed.). Key Centre of Design Computing: pp. 1-28. Manweiler, Justin (2014). Cloud-based mobile augmented reality, pitfalls and strategies in a realtime deployment. In: Proceedings of the 2014 workshop on Mobile augmented reality and robotic technology-based systems (MARS '14). ACM, New York, NY, USA, 21-21. Mendoza, M., Poblete, B., Castillo, C. (2010). Twitter Under Crisis: Can we trust what we RT?. In Proceedings of the first workshop on social media analytics (pp. 71-79). ACM. Metaio (2014). AREL - Augmented http://dev.metaio.com/arel/overview/. Reality Experience Language. Mohler, G. O., Short, M. B., Brantingham, P. J., Schoenberg, F. P., Tita, G. E. (2012). Self-exciting point process modeling of crime. Journal of the American Statistical Association. Mokbel, M. F., Chow, C. Y., Aref, W. G. (2006). The new Casper: query processing for location services without compromising privacy. In Proceedings of the 32nd international conference on Very large data bases (pp. 763-774). VLDB Endowment. Mokbel, M. F., Ghanem, T. M., Aref, W. G. (2003). Spatio-temporal access methods. IEEE Data Eng. Bull., 26(2), 40-49. Murphy, B., et al.. (2013). Have Agile Techniques been the Silver Bullet for Software Development at Microsoft?, Empirical Software Engineering and Measurement, ACM / IEEE International Symposium,(2013), 75-84. DOI=10.1109/ESEM.2013.21. © City.Risks Consortium 111 City.Risks Deliverable D2.1 Murray-Tuite, P., Wolshon, B. (2013). Evacuation transportation modeling: An overview of research, development, and practice. Transportation Research Part C: Emerging Technologies, 27, 25-45. Naphade, M., Banavar, G., Harrison, C., Paraszczak, J., Morris, R., (2011) Smarter Cities and Their Innovation Challenges. Computer 44, 32–39. Levine, Ned (2015). CrimeStat: A Spatial Statistics Program for the Analysis of Crime Incident Locations (v 4.02). Ned Levine Associates, Houston, Texas, and the National Institute of Justice, Washington, D.C. August. Nepomnyachiy, S., Gelley, B., Jiang, W., Minkus, T. (2014). What, where, and when: keyword search with spatio-temporal ranges. In Proceedings of the 8th Workshop on Geographic Information Retrieval (p. 2). ACM. Nergiz, M. E., Atzori, M., Saygin, Y. Güç, B. 2009. Towards trajectory anonymization: A generalization-based approach. Trans. Data Privacy, 2(1), 47-75. Next Generation Wireless Security Application Note (2015). March 2015, Siklu Nguyen-Dinh, L. V., Aref, W. G., methods: Part 2 (2003-2010). Mokbel, M. (2010). Spatio-temporal access Ni, J., Ravishankar, C. V. (2005). PA-tree: A parametric indexing scheme for spatiotemporal trajectories. In Advances in Spatial and Temporal Databases (pp. 254-272). Springer Berlin Heidelberg. Nilsson, Rolf (2015) Shaping the Wireless Future with Low Energy Applications and Systems, ConnectBlue Onodera, K. and Miyazaki, T. (2008). An Autonomous Algorithm for Construction of Energy-conscious Communication Tree in Wireless Sensor Networks’, in Advanced Information Networking and Applications - Workshops. Perey, Christine (2014). AR Standards - AR Community for Open and Interoperable Augmented Reality Experiences. http://www.perey.com/ARStandards/. Perry, R. W. (2004). Disaster Exercise Outcomes for Professional Emergency Personnel and Citizen Volunteers. Journal of Contingencies and Crisis Management, 12: 64–75. Pillac, V., Gendreau, M., Guéret, C., Medaglia, A. L. (2013). A review of dynamic vehicle routing problems. European Journal of Operational Research, 225(1), 1-11. Ralph, P. (2015). The Sensemaking-Coevolution-Implementation Theory of Software Design. Science of Computer Programming, 101, 21-41. Ratcliffe, J. (2010). Crime mapping: spatial and temporal challenges. In Handbook of quantitative criminology (pp. 5-24). Springer New York. Rice, M. N., Tsotras, V. J. (2012). Exact graph search algorithms for generalized traveling salesman path problems. In Experimental Algorithms (pp. 344-355). Springer Berlin Heidelberg. Rice, M. N., Tsotras, V. J. (2013). Parameterized algorithms for generalized traveling salesman problems in road networks. In Proceedings of the 21st ACM SIGSPATIAL © City.Risks Consortium 112 City.Risks Deliverable D2.1 International Conference on Advances in Geographic Information Systems (pp. 114123). ACM. Richter, K. F., Shi, M., Gan, H. S., Winter, S. (2013). Decentralized evacuation management. Transportation Research Part C: Emerging Technologies, 31, 1-17. Rocha-Junior, J. B., Nørvåg, K. (2012). Top-k spatial keyword queries on road networks. In Proceedings of the 15th international conference on extending database technology (pp. 168-179). ACM. Royce, W.W. (1970). Managing the Development of Large Software Systems: Concepts and Techniques, Proceedings of Wescon. Rumiński, Dariusz, Walczak, Krzysztof (2013). Creation of Interactive AR Content on Mobile Devices , In: Wil van der Aalst, John Mylopoulos, Michael Rosemann, M. J. Shaw, and C. Szyperski (eds.), International Conference on Business Information Systems, Poznań, Poland, 19 - 20 June, 2013 , Lecture Notes in Business Information Processing, vol. 160, ed., Springer, Berlin-Heidelberg, 258-269. Rumiński, Dariusz, Walczak, Krzysztof (2014). CARL - A Language for Modelling Contextual Augmented Reality Environments. In: Camarinha-Matos, L. M., N. S. Barrento, and R. Mendonça (eds.): Technological Innovation for Collective Awareness Systems, Springer, Berlin-Heidelberg, 183-190. SRC WG (2013). X3D AR Proposal (Public Review). Augmented Reality Continuum Working Group (ARC WG), Web3D Consortium, http://www.web3d.org/wiki/index.php?title=AR_Proposal_Public_Review. Sakaki, T., Okazaki, M., Matsuo, Y. (2010). Earthquake shakes Twitter users: realtime event detection by social sensors. In Proceedings of the 19th international conference on World wide web (pp. 851-860). ACM. Salo, O. and Abrahamsson, P. (2008). Agile Methods in European Embedded Development Organizations: a survey study of Extreme Programming and Scrum, IET Software, vol. 2 (February, 2008), 58-64. DOI = 10.1049/iet-sen:20070038 Samarati, P. (2001). Protecting respondents identities in microdata release. Knowledge and Data Engineering, IEEE Transactions on, 13(6), 1010-1027. Sanders, P., Schultes, D., Vetter, C. (2008). Mobile route planning. In Algorithms-ESA 2008 (pp. 732-743). Springer Berlin Heidelberg. Sankaranarayanan, J., Samet, H., Teitler, B. E., Lieberman, M. D., Sperling, J. (2009). Twitterstand: news in tweets. In Proceedings of the 17th acm sigspatial international conference on advances in geographic information systems (pp. 42-51). ACM. Sassen, A.-M., Annoni, A., Millot, M., Denzer, R., Hecht, L., Pichler, G., Couturier, M., Alegre, C., (2005) Towards an Open Risk Management Service Architecture, in: Proceedings of the Second International ISCRAM Conference. Schach, S. (2007). Software Engineering, Tata McGraw Hill, Ed. 7, 4-6. Semiocast, (2012). Twitter reaches half a billion accounts. More than 140 millions in the U.S., http://semiocast.com/publications/2012_07_30_Twitter_reaches_half_a_ billion_accounts_140m_in_the_US, October 21, 2013. © City.Risks Consortium 113 City.Risks Deliverable D2.1 Serdyukov, P., Murdock, V., Van Zwol, R. (2009). Placing flickr photos on a map. In Proceedings of the 32nd international ACM SIGIR conference on Research and development in information retrieval (pp. 484-491). ACM. Sharifi, M., Okhovvat, M. (2012). Scate: A scalable time and energy aware actor task allocation algorithm in wireless sensor and actor networks. ETRI Journal, 34(3), 330340. Shi, P.J., Du, J., Ji, M., Liu, J., Wang, J. (2006) Urban risk assessment research of major natural disasters in China. Advances in Earth Science 21, 170–177. Skovsgaard, A., Sidlauskas, D., Jensen, C. S. (2014). Scalable top-k spatio-temporal term querying. In Data Engineering (ICDE), 2014 IEEE 30th International Conference on (pp. 148-159). IEEE. Starbird, Kate and Leysia Palen (2011). Voluntweeters: self-organizing by digital volunteers in times of crisis. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '11). ACM, New York, NY, USA, 1071-1080. Stojmenovic, I. (2005). Handbook of Sensor Networks: Algorithms and Architectures, John Wiley Sons, Chichester, England. Strapparava, C., Valitutti, A. (2004). WordNet Affect: an Affective Extension of WordNet. In LREC (Vol. 4, pp. 1083-1086). Sweeney, L. (2002). k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(05), 557-570. Tan, R., Xing, G., Wang, J., So, H. C. (2008, June). Collaborative target detection in wireless sensor networks with reactive mobility. In Quality of Service, 2008. IWQoS 2008. 16th International Workshop on (pp. 150-159). IEEE. Teitler, B. E., Lieberman, M. D., Panozzo, D., Sankaranarayanan, J., Samet, H., Sperling, J. (2008). NewsStand: A new view on news. In Proceedings of the 16th ACM SIGSPATIAL international conference on Advances in geographic information systems (p. 18). ACM. Texas Instruments (2007). 2.4 GHz IEEE 802.15.4 / ZigBee-Ready RF Transceiver, http://focus.ti.com/lit/ds/symlink/cc2420.pdf. Tozlu, S., Senel, M., Mao, W., Keshavarzian, A. (2012). Wi-Fi enabled sensors for internet of things: A practical approach. Communications Magazine, IEEE, 50(6), 134143. Tyshchuk, Y., Hui, C., Grabowski, M., Wallace, W.A. (2012). Social Media and Warning Response Impacts in Extreme Events: Results from a Naturally Occurring Experiment, System Science (HICSS), 2012 45th Hawaii International Conference on, vol., no., pp.818,827, 4-7 Jan. 2012 United Nations (2009). UN-ISDR Terminology on Disaster Risk Reduction, International Strategy for Disaster Reduction (ISDR), UN-ISDR Secretariat, Geneva. http://www.unisdr.org/files/7817_UNISDRTerminologyEnglish.pdf (Accessed: 20. July 2015). © City.Risks Consortium 114 City.Risks Deliverable D2.1 Vaid, S., Jones, C. B., Joho, H., Sanderson, M. (2005). Spatio-textual indexing for geographical search on the web. In Advances in Spatial and Temporal Databases (pp. 218-235). Springer Berlin Heidelberg. Van de Ven, A.H., and Poole, M.S. (1995). Explaining Development and Change in Organizations, The Academy of Management Review (20:3), July, pp. 510-540. Vansteenwegen, P., Souffriau, W., Van Oudheusden, D. (2011). The orienteering problem: A survey. European Journal of Operational Research, 209(1), 1-10. Versionone (2013). 8th Annual State of http://www.versionone.com/pdf/2013-state-of-agile-survey.pdf Agile Survey, Vieweg, Sarah, Amanda L. Hughes, Kate Starbird, and Leysia Palen (2010). Microblogging during two natural hazards events: what twitter may contribute to situational awareness. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '10). ACM, New York, NY, USA, 1079-1088. Vlugt, Erik (2013) Bluetooth Low Energy, Beacons and Retail, Verifone 2013 Wang, L., Zheng, Y., Xie, X., Ma, W. Y. (2008). A flexible spatio-temporal indexing scheme for large-scale GPS track retrieval. In Mobile Data Management, 2008. MDM'08. 9th International Conference on (pp. 1-8). IEEE. Wang, X., Gerber, M. S., Brown, D. E. (2012). Automatic crime prediction using events extracted from twitter posts. In Social Computing, Behavioral-Cultural Modeling and Prediction (pp. 231-238). Springer Berlin Heidelberg. Wang,X. S., Zhan, Y. Z. and Wang, L. (2008). STCP: Secure Topology Control Protocol for WSNs Based on Hexagonal Mesh’, Wireless Comm, Networking and Mobile Computing. Washburn, D., Sindhu, U., Balaouras, S., Dines, R. A., Hayes, N., Nelson, L. E. (2009). Helping CIOs understand “smart city” initiatives. Growth, 17. Weng, J., Lee, B. S. (2011). Event Detection in Twitter. ICWSM, 11, 401-408. Wheeler, A. (2007). Commercial applications of wireless sensor networks using ZigBee’, IEEE Communications Magazine, vol. 45, no. 4, pp. 70–77. Wing, B. P., Baldridge, J. (2011). Simple supervised document geolocation with geodesic grids. In Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies-Volume 1 (pp. 955-964). Association for Computational Linguistics. Winter, S., Iglesias, G., Zlatanova, S., Kuhn, W. (2005). GI for the public: the terrorist attack in London. Geoinformatics Magazine, (7), 18-21. Wu, D., Cong, G., Jensen, C. S. (2012). A framework for efficient spatial web object retrieval. The VLDB Journal—The International Journal on Very Large Data Bases, 21(6), 797-822. Wu, D., Yiu, M. L., Jensen, C. S. (2013). Moving spatial keyword queries: Formulation, methods, and analysis. ACM Transactions on Database Systems (TODS), 38(1), 7. © City.Risks Consortium 115 City.Risks Deliverable D2.1 Xiao, X., Yi, K., Tao, Y. (2010). The hardness and approximation algorithms for ldiversity. In Proceedings of the 13th International Conference on Extending Database Technology (pp. 135-146). ACM. Xue, Y., Brown, D. E. (2006). Spatial analysis with preference specification of latent decision makers for criminal event prediction. Decision support systems, 41(3), 560573. Yao, B., Tang, M., Li, F. (2011). Multi-approximate-keyword routing in gis data. In Proceedings of the 19th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems (pp. 201-210). ACM. Yeon, S. J. (2007). A strategic grid for implementing ubiquitous computing. ETRI journal, 29(2), 252-254. Yick, J., Mukherjee, B., Ghosal, D. (2008). Wireless sensor network survey. Computer networks, 52(12), 2292-2330. Yuan, Yufei and Brian Detlor (2005). Intelligent mobile crisis response systems. Commun. ACM 48, 2 (February 2005), 95-98. Zaharia, M., Chowdhury, M., Franklin, M. J., Shenker, S., Stoica, I. (2010, June). Spark: cluster computing with working sets. In Proceedings of the 2nd USENIX conference on Hot topics in cloud computing (Vol. 10, p. 10). Zhang, D., Chee, Y. M., Mondal, A., Tung, A. K., Kitsuregawa, M. (2009). Keyword search in spatial databases: Towards searching by document. In Data Engineering, 2009. ICDE'09. IEEE 25th International Conference on (pp. 688-699). IEEE. Zhao, C., Zhou, Z. and Kwak, K. (2010). Novel UWB transceiver for WBAN networks: a study on AWGN channels’, ETRI Journal, vol. 32, no. 1, pp. 11–21. Zhao, F., Shin, J., Reich, J. (2002). Information-driven dynamic sensor collaboration for tracking applications,[IEEE Signal Process. Zhou, P., Zhang, D., Salzberg, B., Cooperman, G., Kollios, G. (2005). Close pair queries in moving object databases. In Proceedings of the 13th annual ACM international workshop on Geographic information systems (pp. 2-11). ACM. Zhou, Y., Xie, X., Wang, C., Gong, Y., Ma, W. Y. (2005). Hybrid index structures for location-based web search. In Proceedings of the 14th ACM international conference on Information and knowledge management (pp. 155-162). ACM. ZigBee Alliance, http://www.zigbee.org/. Zlatanova, S. (2005). Crisis designs. Geospatial Today, 4(1), 30-36. Zlatanova, S., Holweg, D. (2004). 3D Geo-information in emergency response: a framework. In Proceedings of the Fourth International Symposium on Mobile Mapping Technology, Kunming, China (pp. 29-31). © City.Risks Consortium 116