Advertisement

A cloud Computation Architecture for Unconventional Emergency Management

  • Jianhui Li
  • Yuanchun Zhou
  • Wei Shang
  • Cungen Cao
  • Zhihong Shen
  • Fenglei Yang
  • Xiao Xiao
  • Danhuai Guo
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7901)

Abstract

With the development of technologies and the deterioration of natural environment, unconventional emergencies outbreak more unexpectedly and diffuse more quickly and broadly. Secondary and derived disasters increase, and the impacts tend to be indirect and tremendous. Emergency management decisions are facing great challenges, and have attracted great concerns from government departments, academia and industries. In recent years, as a service-oriented computing mode, the cloud computing technology brings advantage in information sharing, resource allocating, and distributed high-performance computing, which makes it a feasible solution to unconventional emergency management, research, quick response and decision support. In this paper, we propose a cloud computation architecture for unconventional emergency management, which involves the key technologies including computation resource pooling, scalable extension of computation resource and services and user-centroid service management. The proposed architecture supports multilevel demand in computation and storage resource by providing services such as virtual machine, big data storage, web information detection and spatio-temporal data visualization. Three experimental scenarios are designed to validate the improvement of decision support capabilities and emergency response speed.

Keywords

Unconventional emergency Cloud computing Emergency management 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Han, Z., W.W, Yang, L., Zhang, W.: Backgrounds,Targets, and Organization of the Major Research Plan “Study on Unconventional Emergencies Management”. Bulletin of National Natural Science Foundation of China 23 (2009)Google Scholar
  2. 2.
    Li, Q., Zhen, X.: A Survey on Cloud Computing. Computer Sciences 38, 32–37 (2011)Google Scholar
  3. 3.
    De-yi, L.: Cloud computing supports sociality, intensiveness and specialization of information service. Journal of Chongqing University of Posts and Telecommunications (Natural Science Edition) 22, 698–702 (2010)Google Scholar
  4. 4.
    Ji, X., Weng, W., Ni, S., Fan, W.: Warning classification model for public emergencies. Journal of Tsinghua University (Science and Technology) 8, 006 (2008)Google Scholar
  5. 5.
    Kaplan, R.M., Berry-Rogghe, G.: Knowledge-based acquisition of causal relationships in text. Knowledge Acquisition 3, 317–337 (1991)CrossRefGoogle Scholar
  6. 6.
    Weichen Fan, Y.L.: Analysis of Urban Public Safety System Structure. Municipal Administration and Technology 5, 38–41 (2009)Google Scholar
  7. 7.
    Huifang, C.L.Z.Q.W.Y.X.: Research Review of Unconventional Emergency’s Theory Method Based on Context. Journal of Intelligence 30, 40–45 (2011)Google Scholar
  8. 8.
    Liu, T.: Design of the emergency plan system’s concept. Journal of Safety Science and Technology 7, 5–13 (2011)Google Scholar
  9. 9.
    Zong-chen, W.F.-y.Q.X.-g.Z.D.-j.C.Z.-d.F.: A Computational Experimental Platform for Emergency Response Based on Parallel Systems. Complex Systems and Complexity Science 7, 1–10 (2010)Google Scholar
  10. 10.
    Da-jun, D.W.C.Z.-d.Q.X.-g.W.F.-y.Z.: Semantic modeling for artificial society in parallel emergency management system. Systems Engineering —Theory & Practice 32, 1010–1017 (2012)Google Scholar
  11. 11.
    Fan, W.: Advisement and Suggestion to Scientific Problems of Emergency Management for Public Incidents. Bulletin of National Natural Science Foundation of China 2, r3 (2007)Google Scholar
  12. 12.
    Zhidong, Z.D.W.F.C.: Open Source Information in Emergency Response. Science & Technology Review 26, 27–33 (2008)Google Scholar
  13. 13.
    Fan, W., Yuan, H.: Status analysis and countermeasures for emergencies platform construction. Informatization Construction 9, 14–17 (2006)Google Scholar
  14. 14.
    Soderland, S.: Learning information extraction rules for semi-structured and free text. Machine Learning 34, 233–272 (1999)zbMATHCrossRefGoogle Scholar
  15. 15.
    Wang, H., Cao, C., Gao, Y.: Design and Implementation of a System for Ontology-Mediated Knowledge Acquisition from Semi-Structured Text. Chinese Journal of Computers 28, 2010–2018 (2005)Google Scholar
  16. 16.
    Anselin, L., Sridharan, S., Gholston, S.: Using Exploratory Spatial Data Analysis to Leverage Social Indicator Databases: The Discovery of Interesting Patterns. Social Indicators Research 82, 287–309 (2007)CrossRefGoogle Scholar
  17. 17.
    Guo, D., Wu, K., Zhang, Z., Xiang, W.: WMS-based Flow Mapping Services. In: IEEE Services 2012. IEEE, Hawaii (2012)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Jianhui Li
    • 1
  • Yuanchun Zhou
    • 1
  • Wei Shang
    • 2
  • Cungen Cao
    • 3
  • Zhihong Shen
    • 1
  • Fenglei Yang
    • 1
  • Xiao Xiao
    • 1
  • Danhuai Guo
    • 1
  1. 1.Computer Network Information CenterChinese Academy of SciencesBeijingChina
  2. 2.Academy of Mathematics and System ScienceChinese Academy of SciencesBeijingChina
  3. 3.Institute of Computing TechnologyChinese Academy of SciencesBeijingChina

Personalised recommendations