• Keine Ergebnisse gefunden

1 Introduction of disaster risk management based on IoT and Big data

N/A
N/A
Protected

Academic year: 2022

Aktie "1 Introduction of disaster risk management based on IoT and Big data"

Copied!
13
0
0

Wird geladen.... (Jetzt Volltext ansehen)

Volltext

(1)

FOCUS

Design of Internet of Things and big data analytics-based disaster risk management

Li Zhou1Heqing Huang2Bala Anand Muthu3C. B. Sivaparthipan3

Accepted: 4 June 2021 / Published online: 29 July 2021

ÓThe Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature 2021

Abstract

Presently, the Internet of Things (IoT) and big data analytics technology offer enormous opportunities to disaster risk management services. Recent disaster risk management patterns involve disaster risk reduction to avoid future disaster risks, minimize current disastrous risks, resilience building, and disaster loss reduction. The main challenges in disaster management are communication within a disaster zone which is being disrupted. In this paper, the Internet of Things assisted disaster risk management framework (IOTDRMF) has been proposed for technical resources to communicate the emergency time and better visibility into reliable and prompt decision-making through observing, evaluating, and fore- casting natural disasters. This IOTDRMF utilizes big data analytics to analyze disaster risk management build a kind of spatial data communication network infrastructure, making it a priority to establish rules, protocols, and knowledge sharing. The experimental results show the IOTDRMF, and big data analytics compensate for a weak communication network infrastructure and better decision-making to handle disaster risk management.

Keywords Internet of Things (IoT) Internet of Things assisted disaster risk management framework (IOTDRMF) Big dataDisaster risk management

1 Introduction of disaster risk management based on IoT and Big data

A disaster is a sudden and catastrophic occurrence that is causing significant disruption to a community or society’s operation. Human, financial and environmental casualties beyond the organization’s capacity or society deal with its use of resources (Srivastava et al.2019). Disaster may have a human origin is sometimes triggered by nature (An- barasan et al.2020). Disaster management may be defined

as the coordination and control of humanitarian emergency responsibilities in planning, response, and recovery to mitigate the disaster’s consequences (Rhoades et al.2020).

Disaster recovery efforts will help remove individuals and assets from a distressed environment by encouraging timely and productive reconstruction, evacuation, and recovery at the disaster site, mitigating property damage, protecting communities, and reducing distress among the population (Shah et al. 2019). Disaster recovery is the re- starting phase after a disaster by restored access to data, hardware, applications, networking, and control (Srivas- tava2017). A contingency plan for the disaster will ensure the company quickly and safely that a failure is a small and temporary concern. Disaster Recovery (DR) is a security preparation area that prevents an organization from large adverse events (Kumar et al. 2020). A sustain or rapidly restart vital activities with a disaster management plan after a disturbance (Manogaran and Lopez 2018). Disaster response efforts aim to minimize or eliminate future dan- gerous casualties, ensure timely and sufficient assistance to disaster victims, and achieve an immediate and successful recovery. During and after crises, hospitals must stay vig- orous and functional (Pandey and Litoriya 2019). The Communicated by Vicente Garcia Diaz.

& Li Zhou

ameiok@126.com

1 School of Business and Administration, Chongqing Technology and Business University, Chongqing, People’s Republic of China

2 School of Electronical and Information Engineering, Chongqing Radio and TV University, Chongqing, People’s Republic of China

3 Department of Computer Science and Engineering, Adhiyamaan College of Engineering, Hosur, India https://doi.org/10.1007/s00500-021-05953-5(0123456789().,-volV)(0123456789().,- volV)

(2)

biggest problems in emergency management plans include the inability to enforce the legislation narrowly, lack of civic and personnel awareness on catastrophe threats, inadequate urban planning, unconfident security, citizens’

involvement, infrastructure, materials, and services (Manogaran et al.2018).

Decision-making is the process of making a decision based on data analysis and alternate resolution evaluation (Meechang et al.2020). A decision-making process step- by-step will help make more conscious and sensible choi- ces by arranging specific details and identifying alterna- tives (Hannan et al. 2018). Decision-making procedures will allow us to move backward and more critically eval- uate our condition (Sun and Scanlon 2019). Decision- making mechanisms often help define the steps required for deciding so that together make a rational decision. It plays a vital role in catastrophe management since it appears before, after, and during a disastrous occurrence in all management practices (Ahmed et al. 2017). Unfair deci- sions can cause big losses in tragic circumstances (infras- tructure destruction, human casualties, etc.) (Cumbane and Gido´falvi 2019). Communication infrastructure is the technology, possessions, and network links for delivering broad communication distances (Aggarwal et al. 2020).

The category is continually expanding from one-purpose networks to the emergence of multipurpose converged networks (Ulil et al. 2019). The communication infras- tructure is better understood as technology, goods, and network connections that enable communication to be transmitted over broad distances. When additional infras- tructure capability arises, it allows emerging technologies to accelerate developments in sectors (Wang et al.2019).

The use of networks is one of the best means of commu- nication used during disaster relief operations and is critical for collaboration in rescue and post-disaster restoration work (Ma et al.2019).

The IoT can be implemented to handle disaster situa- tions, which grows quickly into the Internet of Everything (Balamurugan et al.2020). For a proper disaster manage- ment approach, rescue events and connected through IoT.

For this purpose, systems for the emergency warning, evacuation methods, surveillance, and regulatory strategies may be merged (Malekloo et al.2020). IoT technologies cannot avoid disasters and help prepare disasters, including prediction systems and early warning systems (Al-Turjman 2019a). Thus, IoT offsets the poor infrastructure in an incredibly vulnerable position for developing and emerging countries (Al-Turjman2019b). Minimizing and preventing disaster risks: monitoring disaster opportunities via satellite and geographic information system (GIS), developing early warning systems, utilizing social media to create aware- ness. Response to an emergency: timely relief and response coordination in real-time. Big technology can improve

disaster relief by leveraging neighborhood information and linking victims with emergency personnel and relatives (Abdel-Basset et al.2020). When they have access to real- time information emphasizing the areas most affected, emergency personnel can reduce their search time and optimize their recovery time (Hu et al. 2021).

Disaster risk monitoring and early warning tasks are essential in emergency response, and preparedness is enhanced efficiently. However, IoT applications have included structures for such functions with more accurate and improved technical architecture. Hence, in this paper, IoTDRMF has been proposed to monitor and technical resources to reduce disaster risk. An integrated low-cost embedded system such as a wireless network device (WND) focused on big data boost response time, mini- mizes latency, and increases the crucial circumstances’

distribution performance ratio. WND has been commonly used to facilitate the intercommunication between the population affected by a disaster and rescue teams when conventional systems of communication in infrastructure collapse. The benefits of IoT include the capacity to reimburse a vulnerable population’s weak infrastructure, in particular in developed countries, and the use of IoT-en- abled networks, battery-powered wireless computers for data network stability during a crisis. It visited an unfa- miliar area during a disaster using mobile nodes and WND to extend the communication spectrum for human presence detection.

Fiona McDonald et al. (2020) suggest the ethical deci- sion-making framework (EDMF) and facemask use for community protection from air pollution disasters to guide agency decision-making. Disasters contributing to inci- dents of severe air emissions create an immediate public health crisis. In such emergencies as this, organizations may pressure organizations to have forms to defend dis- advantaged individuals and more. Facemask is a possible way to limit exposure in such emergencies. They argue that using this context, agencies’ transparency about decision- making will help improve confidence and unity in and within communities impacted by these disasters and agencies that foster or help public health during catastrophes.

Roger Shihjung Chen and Li (2020) discussed the col- laborative decision-making (CDM) in municipal disaster preparation to response identifying the multiplex network.

Multiple relationships impact actors in the real world, and therefore, web acts are often affected. When analyzing a system composed of different forms of partnership and coordination, it is essential to consider these various interconnected relationships. This paper aims to define and verify a multiplex network’s properties that outline col- lective decision-making in a municipal disaster manage- ment environment by applying social network analysis,

(3)

precisely a multiplexing network approach. The study concludes that a consistent picture of city decision-making in disaster preparedness and response requires to take into account the various aspects and interdependencies resulting from these dimensions of the agency’s partnership.

Abla Mimi Edjossan-Sossou et al. (2020) deliberated the Fuzzy Analytic Hierarchy Process (F-AHP) and Fuzzy Preference Ranking Organization Method for Enrichment Evaluations (F-PROMETHEE) for sustainable risk man- agement strategy selection. Two critical responses to uncertainties are discussed. Second, blurry AHP is used to estimate each of the appraisal criteria’s significance. Fuzzy weighted arithmetic mean or fluid PROMETEE are then used to prioritize techniques surrounding the parameters to achieve the final score, taking into account compensatory or non-compensatory justification.

Nespeca et al. (2020) introduced the actor-centered framework (ACF) to design disaster management infor- mation systems. Disastrous information systems have his- torically been structured to promote collaboration and teamwork by secure hierarchical positions. The method- ology is structured and validated to (1) examine the current reality of disaster management knowledge management and how improvements are achieved by self-organization and (2) research how information structures of disaster management facilitate teamwork and self-organization in current practice can be designed. Implementing disaster management information systems with an agent perspec- tive is central to their networking, planning, and centralization.

Er, Kara et al. (2020) initialized the data mining-based framework (DMF) for supply chain risk management. A rise in risk exposure, technical advances, and the increasing knowledge overload in supply chain networks are pushing companies in supply chain risk management (SCRM) to follow data-driven approaches. The paper seeks to establish a DM-based framework (DMF) to define, quantify, and minimize various risk forms in supply chains. An inte- grated strategy combines DM and risk management prac- tices into a single efficient risk management system.

Ashutosh Bhoi et al. (2020) explored the LSTM-CNN for disaster resource management and using a deep learn- ing-based social media text analysis framework. Social media has evolved into a useful instrument used in crises such as natural disasters and individuals’ manufactured knowledge. Real-time review of these large data will play a crucial role in disaster assessment and response and aid exercises. A modern supervised learning approach based upon word integration is implemented by the new hybrid model, LSTM, and CNN. A modern two-word sliding window system for the mapping assignment would create the combination of two neighboring words. The experi- mental findings indicate substantial efficiency gains.

Based on the survey, there are some challenges in the existing model. In this paper, the IoTDRMF model has been proposed to implement sensors to monitoring and alert the disaster region. Big data analytics can be used to overcome communication network issues. The rest of the paper is structured as follows: Sect. 1 introduces disaster management based on IoT and big data and the literature review. Section2 explores the IoTDRMF method to pre- dict weather conditions. Section3elaborates on the results and discussion based on an analysis in Sect.2. Section 4 concludes the research paper.

2 Internet of Things assisted disaster risk management framework (IOTDRMF)

This paper discussed disaster management based on IoT and big data. The effects of disasters on vulnerable areas are now seen as disasters. Dangers in low vulnerability zones should not contribute to a disaster. The effects of disasters are serious damage, loss, degradation of life, and property. One of the most important aspects that a disaster has impacted the population requires is communication.

People affected by disasters search for information on their safety problems and information about their needs in and after emergencies. Hence, this paper proposed the IOTDRMF to create decision-making to handle disaster and risk reduction. IoT and big data technology can be helpful for detection and early warning program. This will help IoT compensate for a weak infrastructure that is especially vulnerable to developed and emerging countries.

Figure1shows the proposed IOTDRMF. A disaster area is a zone or a site that is significantly impacted by natural, technical, or social threats. Disaster regions have a drastic effect on the community’s population by higher prices, electricity depletion, food and utilities, and increasingly growing residents’ disease risk. Two major helicopter basket types exist. Rescuers use the lighter, more common type to raise a human into a helicopter from the land or water. The helicopter hovers above the site and lands on the ground or another surface. The board of evacuees is then taken to a protected area. The critical functions of a fire truck are the transport of firefighters and water and fire appliances. Some fire engines have specialized roles, such as fire deterrence and rescue and firefighting of helicopters and may have technical rescue equipment. The opportunity to begin event management through the fire service, which includes additional responses to other departments, is one of the essential ties in every crisis. Firefighters will be encouraged to initiate triage and administering lifesaving assistance for any casualties. An appropriate emergency response policy for hospitals directs the implementation and delivery of mitigating, planning, coping, and

(4)

remediating events in situations that interrupt regular care provision. In case of a disaster or malware attack, accurate data operating device from it is a cloud platform, enabling a corporation to function seamlessly on it is a platform, even though servers are down. Treatment areas indicate particular locations where the treatment of noxious weeds is done. Base stations (BS) and access points (Aps) are the traditional contact model’s backbone networks. The con- tribution of this technology cannot be expected in a disaster recovery network. The WDs in the contact spectrum of the BS/Apps, therefore, allow two- and one-way communica- tion within this architecture. Hospital Emergency Response Principles are an adaptive, multidisciplinary method. In an emergency response, hospitals play an essential role and are often vulnerable to internal occurrences. Our approach to hospital emergency control and preparedness is streamlined and multicross-disciplinary. This paper fol- lows the separation of IOTDRMF approaches and splits the populations involved in a crisis to build a signalized intersection: incidence positions, recovery patients waiting,

casualty clearing stations, parking emergency vehicles, and technical operating order. Nodes will switch from one area to the next within these regions. These areas are essentially classified as points of interest (POIs). There is a different probability of entry to these POIs for any node group, e.g., ambulance, fire truck, volunteers. Ambulances may be very likely to fly between a disaster scene and a hospital area.

For the isolation of these domains, the probabilistic routing protocol is used past experiences and transitivity. Big data are used for determining the shortest distance to the des- tination from the present position.

Figure2 shows the disaster management based on the Internet. In developing regional capacity for emergency recovery, the ‘‘community’’ has played an important part.

In other cases, people use numerous regional communi- cation networks, such as news, radio and cable broadcast- ing, television and social media system (SNS), via the Internet to preserve the role of the ‘‘community.’’ These devices help collect and exchange information in larger fields. The explanation of why the media reaches into the living area is the expense of installations and repair costs for television services and other associated media. Here, the place where the elderly can go, or the range of school or children’s school (about a distance of 2–3 km) is the scale of the ‘‘Regional.’’ The potential danger concerns older adults and persons who are not good at data processing, such as vision impairment, hearing loss, and dementia. In addition, unnecessary information will be a danger for those individuals, and all Internet data will be rejected. As a product of the ‘‘digital divide’’ and ‘‘non-digital citi- zens,’’ the culture falls in society’s present information.

Figure3 shows the IoT-based alert system. The system comprises various elements that function integrally to classify the weather conditions that may be extreme and produce warnings if appropriate. Weather sensors for estimation and acquisition of weather parameters are rep- resented in Fig.3. The automated weather station center is the data logger used to collect and archive data from numerous sensors. The data logger administers remote server communication protocols. The various protocols for connectivity, including GSM, WiFi. The data collection server includes software for data collection, which collects and exports the data from data loggers as a text file.

Server database for reading, searching, and insertion into the text file database created from the data collection program. Data will be stored indefinitely in the storage units to re-use research using GIS servers, archiving, or future processing. The alert server uses the inputs of a database. It uses the suggested method to analyze and process data and generate and disseminate various alerts for extreme values in a module computer program. All of this depends on exact requirements as regulations because of the conditions obtained, and warnings may be required.

Fig. 1 Proposed IOTDRMF

(5)

Every specific warning form is necessary to update the alarm function parameters and add a new alert function protocol. The alarm server and the server for data collec- tion are linked to the Internet for remote monitoring of the weather sensors and remote access to an alert server by telephone. The GIS server is used to generate maps for weather parameters visualization data, which display the vulnerable coverage areas affected by the extreme weather.

Using the database server, it gets IoT calculated data. The first element is the application for weather warnings.

Electronic feedback, IoT data, or sensor measurements are loaded to the server. Big data thresholds evaluated by weather alerting, and the sensor analyzed values on the alert database. Text, SMS, and Facebook messages will be shown when the limit of execution time for weather warnings is exceeded.

The proposed communication reconstruction and net- work configuration process are divided into two phases:

(i) identification of service discovery state and (ii) neigh- bors assignment for service discovery.

(i) identification of service discovery state

The discovery process is allowed using wireless network devices (WND). The WND serves as temporary transmitting units in certain infrastruc- ture areas. The transmitting devices cannot take on the same stability and reliability as the networks.

The strength of the transmitting system is measured using calculations of time-to-live and efficiency.

The above metrics are determined byND‘s energy and flow rate.

LetEarepresents the available energy inWND.

The WND is not guaranteed a total energy catastrophe here. To calculate the time-to-live of WND(TWND) in Eq. (1):

TWND¼ Ea

ETP

Fr ð1Þ

As shown in Eq. (1), time-to-live of the wireless network device has been calculated, whereETis the necessary energy transmission, and Fr is the flow rate. The flow rate is estimated by the number of requests accepted by the WND for service dis- covery. In the same way, WND flow rate is cal- culated in Eq. (2):

Fr¼rstr ð2Þ

As derived in Eq. (2), the flow rate has been calculated. Wherersandtrare the size and time of the message contact services. The stable optimiza- tion condition is defined by the estimate ofTWND andFr as (3):

Fig. 2 Disaster management based on internet

(6)

maxTWND8FrLc

maxFr8FrLr&TWND6¼0 ð3Þ

As inferred in this Eq. (3), stable optimization has been estimated. Wheremris the number andLc

The request messages’ contact resource (3), time- to-live to manage multiple demands within linked capability is maximized, or flow rate is maximized before time-to-live expires.

The WND service initiates a broadcast to dis- cover neighbors available. WND recognizes it is existence using a reply transmission. The neighbor WND senses the identity of the sender, and the moment the message is sent live. In serving the broadcast message, the traditional reliability model is a specific optimization of the Fr factors in Eq. (3). The next WND then uses a joint opti- mization process, as discussed below.

The optimization function for energy and related capability is defined byF Eð ÞandF cð Þ. For the first transmission, the transmitter includes mr service discovery requests Let nty1;ty2;. . .tymy;o

represent the transmission collection to mr, the ideal nanF Eð ÞandF cð Þ. are shown as (4):

F cð Þ ¼maxLmC1þLm1C2 þL0Cm F Eð Þ ¼maxEmt1þEm1t2 þE0tm

ð4Þ As found in Eq. (4), the optimization function for energy and relation capability has been defined.

For descriptions of the classification protocol, the reference threshold vector for F Eð Þ and F cð Þ is represented as /c and, /E. The energy and power threshold comparison variable is determined using Eq. (5):

/c¼ max

j¼1;2;...m

FrjLctrj FrjmsjErj

" #

/E¼ min

j¼1;2;...m

EajETj EajmsjErj

" #

ð5Þ

As described in Eq. (5), the energy and power threshold have been determined. Where ms and is tsthe number of requests that are received at times ts. Where Erj is to receive the order for energy Fig. 3 IoT-based alert system

(7)

consumption via the gate in the service aircraft. The joint optimization is viewed as before classification in Eq. (6):

F Cð Þ [F Eð Þ ¼ðLc/cÞðET/EÞ ð6Þ As shown in Eq. (6), joint optimization has been calculated. Before service aircraft is found, all nominal and optimum optimization thresholds of multiple dimensions are analyzed. If my the service market is as follows the original optimiza- tion. This is attributable to a metric upgrade that does not fulfill after nty1;ty2;. . .tymy;o Eqs. (5), (3), and (6). Thus, modifications are modified for further request handling in the metric differences betweenty1 andtymy. For the metric (Lc, ET), represented with the use of linear opti- mization in Eq. (7):

DF Cð Þ ¼ Xm

j¼m¼y

/cjþd Xm

j¼m¼x

/2cj x

DF Eð Þ ¼ Xm

j¼m¼x

/Ej

þa Xm

j¼m¼y

lE EajETj

ETjErj

ð7Þ As described in Eq. (7), linear optimization has been represented. Wheredandaare the difference found in ’y.’a is the likelihood of ensuring prop- agation ofWND byE andWND. The forwarder shall be checked with modified linear optimization for Eq. (7) ifmris high or acceptable (8) ifEof the WND is lower.

This condition recognition method is remedially programmed to locate defective WND in the ser- vice direction. The original transmission andmy upgrade transmission cursive classification pro- cesses are shown in Fig.4.

Suppose aWNDis found to be\0 or to be\0 in the service find direction, the original broadcast is denied. NewWNDis being initiated to continue the process of exploration.

The system is listed through its active TWND phase as being able to receive and forward requests.

The change-over modifications are pursued to ensure that the system can forward requests for systems failing Eqs. (5) and (6). In addition, the energy and capacity-based efficiency of this instrument in the discovery direction are rediscov- ered to ensure that the fullmyis retained by ns from which the WND. At this point, the way is

sought by the viable substitution of WND, pro- viding higher performance. The chosenWNDcan serve any amount as F and TWND are accounted.

Similarly, the amount ofWNDcontained inty1to tym (or)tyy to tymy transmission is correct to accommodatemr with higher consumption rates.

(ii) Neighbors assignment for service discovery Let G be a time-based graph of the attributes (D;L; ;) whenDis a collection ofWNDdevice,L is a connectiond, andtis a time-based function. In anyL,D, andTties, the estimated time of service discovery is mutually linked. Let ts be the time at which the service plane addresses the request and the time of arrival (tt) be determined as in Eq. (8):

tr¼trþtWts ð8Þ As derived in Eq. (8), time of arrival has been determined. Where W is the time to wait in the direction of the order. In terms of choosing a nearby WNDin the context of the local decision-making phase. The request must wait until the contact route is re-constructed if the existing forwarder is replaced. A time-based feature is implemented for this purpose. The functionality is planned in Eq. (9):

m1X

j¼1

ljðC;EÞ ljðDC;DEÞ ttj

ð9Þ

Figure4 and Eq. (9) show the initial transmis- sion, and the time-based feature has been imple- mented. The probability of relation betweenðC;EÞ and (C;E) represents the original transmission and the change-over of transmission atyandlj. When the message is carried out toywill be reworded as Eq. (10):

ty¼Xmy

j¼1

trjtsj

ð10Þ

As discussed in Eq. (10), message transmission has been derived. Similarly, if the contact direction is over the propagation time, Eq. (11)

tm¼ Xm

j¼my

twþtrjþtsj

ð11Þ

As derived in Eq. (11), propagation time has been calculated. The transmitting time of a request can be calculated two times (i.e.) the path discov- ered is not modified, and the delay is minimized by ty or the path found is turned on using an alterna- tiveWND, the wait isty; tm. The local decision- making mechanism imposes a standardization

(8)

Fig. 4 Initial Transmission

Fig. 5 Reliability ratio

(9)

solution to balance the time between a request message and live in Eq. (12):

tt¼tyþtm ð12Þ

As found in Eq. (12), request message has derived. Time-spending normalization results in selecting a neighbor that follows tt\TTL and updating systems with tt\TTL. The service dis- covery time increases with tt, and if v is longer thanTTL, it cannot be expected that it will be dis- covered. Thettnormalization is connected toTTL by the equation with the evaluation of ty; and tm

in Eq. (13):

tt¼trtsþtwþtrts2ðtrtsÞ þtw ð13Þ As inferred in Eq. (13), time-spending normal- ization results have been evaluated. When tt¼ min tyD1

;tyðD2:Þ. . .::tyðDm:Þ

D Range (trans- mitter), thenDof minimumttsatisfying/cand,/E is used for the transmission of requests for direct transmission. The transmission will end with some–

y and the relaying phase will need to shift to tt¼mintyþtmðD1Þ; tyþtmðD2:Þ. . .::tyþ tmðDm:Þg. The proposed IoTDRMF improves the

communication network infrastructure with big data to achieve a high-reliability ratio, enhances decision- making ratio, data accuracy, disaster risk reduction, and improved execution time.

3 Numerical results and discussion

The proposed IoTDRMF is created to automatically sense the weather condition to monitor and alert the disaster region; the results have been performed based on reliability ratio, decision-making ratio, data accuracy, disaster risk reduction, and execution time.

(i) Reliability Ratio

This paper discussed disaster risk management based on IoT and big data. It is fundamentally emphasized that permitting remote access to data gathered from multiple sensors and defining situational information about sufferers and aid services are the main goals of those concepts.

Recognized the following emergency response program management problems, the multifaceted scenario determination, the distribution of Fig. 6 Decision-making ratio

(10)

benefits, personnel transparency and staff, and support for coordination. The research outcomes have been taken in case of disasters; activity should concentrate on people and the environ- ment; Second, redundancy is a core concept of architecture for enhancing connectivity efficiency and maintaining reliable security. Figure5shows the reliability ratio.

(ii) Decision-Making Ratio

Emergency response system’ decision-support mechanisms and emergency scenarios stressed the growth of emergent response information systems (EISs). To provide better relief preparation for initial respondents, the proposed IOTDRMF should be capable of delivering sufficient situa- tional awareness. The loss of integrity in situations and intelligent systems of decision support can be attributed to human beings’ decision-making dur- ing distressing accidents and emergency workers’

death. The role of big data support systems in the decision-making of emergencies is discussed. A development called the importance of improving understanding of the first respondent’s condition in

improving the respondent’s capacity to make effective decisions. This IOTDRMF is configured to track in an incredibly complex atmosphere and requires real-time knowledge of the disaster and rescue staff’s location and services. Figure6 shows the decision-making ratio.

(iii) Accuracy Ratio

The Internet of Things (IoT) offers a tremen- dous incentive for disaster response systems (emergency responders and police forces, the public health and fire services) to develop modern knowledge to expand effective disaster safety and medical expertise of reliable and timely decision- making. The purpose behind this investigation is to clear the way for effective use of the opportu- nities available for avoiding, recognizing, and tracking circumstances through big data and IoT collaboratively. Disaster recovery programs embrace several new data sources and technolo- gies to analyze big data in real-time and help decision-makers produce immediate and accurate performance. Figure7shows the accuracy ratio.

Fig. 7 Data accuracy ratio

(11)

(iv) Disaster Risk Reduction Ratio

IoT and big data are commonly recognized as the optimal approach for achieving a high-quality

collaborative digital provision. The cities are fitted with the new digital networking technology, sensors, and intelligent devices that produce vast Fig. 8 Disaster risk reduction

ratio

Fig. 9 Execution time analysis

(12)

quantities of data containing rich streams of contextual, spatial, and temporal knowledge. Big data and IoT benefits will significantly minimize casualties by presenting expertise and fresh per- spectives into emergencies in a resourceful man- ner. The traditional data collection method and management method are questioned by the dis- proportionate application of smartphones and other mobile technologies fitted by sensors (e.g., high definition cameras, GPS receivers, micro- phones, accelerometers). A technology built by integrating big data and IoT is presented in the integrated disaster management framework. The system proposed discusses large-scale spatial and temporal data sets and offers predictive risk assessments to optimize services and contingency preparations in the area of fire response. Figure8 shows the disaster risk reduction ratio.

(v) Execution Time Analysis

Big data sensed might provide various advan- tages, such as improving knowledge about cir- cumstances, better-distributing resources, and providing a better source of information for strategies for disaster risk reductions and assess- ments. After evaluating the activities involved, multiple data sources may produce large numbers of unstructured data to the remote station. Dis- covery, compilation, classification, search, and dissemination of real-time disaster information are the top priority for successful disaster manage- ment results. A new definition for the ultimate goals of disastrous regulation could be provided by converging BDA and IoT technologies. An early warning generation that can save lives and reduce infrastructure damage is one of this system’s key goals. Efficient disaster monitoring requires information derived from the device to make knowledgeable and timely decisions. Fig- ure9shows the execution time analysis.

The proposed IoTDRMF improves the commu- nication network infrastructure with big data to achieve a high-reliability ratio, enhance decision- making ratio, data accuracy, disaster risk reduc- tion, and improved execution time when compared to Fuzzy Analytic Hierarchy Process (F-AHP), actor-centered framework (ACF), data mining- based framework (DMF), long short-term memory LSTM-CNN and convolution neural network (CNN) methods.

4 Endnotes

This paper analyses disaster recovery with the help of IoT and big data. Disaster recovery (DR) is a security prepa- ration area intended to safeguard society from the conse- quences of large negative incidents. A society may easily retain or resume functions essential to a disorder with a disaster management plan in motion. Furthermore, this paper introduced the IoTDRMF use sensor to analyze the disaster parameters and predict the weather condition to preventive decide to reduce disaster risks. In disaster cases, such emergency requests must be collected from the large- scale knowledge pool for immediate assistance. Although emergency management services cooperate on their respective national system to respond to disasters, the impacted parties believe that the disaster response and recovery are successful before and after the disaster. Thus, the experimental results show the high-reliability ratio (92.3%), enhance decision-making ratio (93.6%), data accuracy (98.5%), disaster risk reduction (97.4%), and improved execution time (95.7%) when compared to other methods.

Author contributions Heqing Huang, BalaAnand Muthu contributed to conception and design of study. Sivaparthipan C.B was involved in acquisition of data. Heqing Huang contributed to analysis and/or interpretation of data. Li Zhou was involved in drafting the manuscript.

Declarations

Conflict of interest The authors declare that they have no conflict of interest.

Ethical approval This article does not contain any studies with human participants or animals performed by any of the authors.

References

Abdel-Basset M, Mohamed R, Elhoseny M, Chang V (2020) Evaluation framework for smart disaster response systems in uncertainty environment. Mechanical Systems and Signal Pro- cessing 145:106941

Aggarwal A, Rani A, Sharma P, Kumar M, Shankar A, Alazab M (2020) Prediction of landsliding using univariate forecasting models. Internet Technol Lett.https://doi.org/10.1002/itl2.209 Ahmed SH, Lee S, Park J, Kim D, Rawat DB (2017, January). iDFR:

Intelligent directional flooding-based routing protocols for underwater sensor networks. In: 2017 14th IEEE annual consumer communications & networking conference (CCNC).

IEEE, pp 560–565

Al-Turjman F (2019a) Cognitive routing protocol for disaster-inspired internet of things. Futur Gener Comput Syst 92:1103–1115

(13)

Al-Turjman F (2019b) A rational data delivery framework for disaster-inspired internet of nano-things (IoNT) in practice. Clust Comput 22(1):1751–1763

Anbarasan M, Muthu B, Sivaparthipan CB, Sundarasekar R, Kadry S, Krishnamoorthy S, Dasel AA (2020) Detection of flood disaster system based on IoT, big data, and convolutional deep neural network. Comput Commun 150:150–157

Balamurugan S, Muthu BA, Peng SL, Wahab MHA (2020) Call for special issue papers: big data analytics for agricultural disaster management: deadline for manuscript submission: December 12, 2020. In: Big Data, vol 8, no 5, pp 450–451

Bhoi A, Pujari SP, Balabantaray RC (2020) A deep learning-based social media text analysis framework for disaster resource management. Soc Netw Anal Min 10(1):1–14

Chen RS, Li TS (2020) Identifying the multiplex network of collaborative decision-making in municipal disaster preparation.

J US China Public Adm 17(5):192–202

Cumbane SP, Gido´falvi G (2019) Review of big data and processing frameworks for disaster response applications. ISPRS Int J Geo Inf 8(9):387

Edjossan-Sossou AM, Galvez D, Deck O, Al Heib M, Verdel T, Dupont L, Morel L (2020). Sustainable risk management strategy selection using a fuzzy multi-criteria decision approa- ch. Int J Disast Risk ReducInt J Disast Risk Reduc 45:101474 Hannan A, Arshad S, Azam MA, Loo J, Ahmed SH, Majeed MF,

Shah SC (2018) Disaster management system aided by named data network of things: architecture, design, and analysis.

Sensors 18(8):2431

Hu S, Fu Z, Jackson Samuel RD, Anandhan P (2021) Application of active remote sensing in confirmation rights and identification of mortgage supply-demand subjects of rural land in Guangdong Province. Eur J Remote Sens 54(sup2):396–404

Kara ME, Fırat SU¨ O, Ghadge A (2020). A data mining-based framework for supply chain risk management. Comput Indu Eng 139:105570

Kumar JS, Kumar S, Choksi M, Zaveri MA (2020) Collaborative data acquisition and processing for post disaster management and surveillance related tasks using UAV-based IoT cloud. Int J Ad Hoc Ubiquitous Comput 34(4):216–232

Ma C, Yang Y, Ma C (2019) Mobility-based sinknode-aided routing in disaster network under the background of big data. Clust Comput 22(5):11583–11590

Malekloo A, Ozer E, Al-Turjman F (2020) Combination of GIS and SHM in prognosis and diagnosis of bridges in earthquake-prone locations. In: Smart grid in IoT-enabled spaces: the road to intelligence in power, vol 139

Manogaran G, Lopez D (2018) Spatial cumulative sum algorithm with big data analytics for climate change detection. Comput Electr Eng 65:207–221

Manogaran G, Lopez D, Chilamkurti N (2018) In-Mapper combiner based MapReduce algorithm for processing of big climate data.

Futur Gener Comput Syst 86:433–445

McDonald F, Horwell CJ, Wecker R, Dominelli L, Loh M, Kamanyire R, Ugarte C (2020) Facemask use for community protection from air pollution disasters: An ethical overview and framework to guide agency decision making. Int J Disaster Risk Reduct 43:101376

Meechang K, Leelawat N, Tang J, Kodaka A, Chintanapakdee C (2020) The acceptance of using information technology for disaster risk management: a systematic review. Eng. J.s 24(4):111–132

Nespeca V, Comes T, Meesters K, Brazier F (2020) Towards coordinated self-organization: an actor-centered framework for the design of disaster management information systems. Int J Disast Risk Reduc 51:101887

Pandey P, Litoriya R (2019) Elderly care through unusual behavior detection: a disaster management approach using IoT and intelligence. IBM J Res Dev 64(1/2):15–21

Rhoades AM, Jones AD, Srivastava A, Huang H, O’Brien TA, Patricola CM, Zhou Y (2020) The shifting scales of western US landfalling atmospheric rivers under climate change. Geophys Res Lett 47(17):089096

Shah SA, Seker DZ, Hameed S, Draheim D (2019) The rising role of big data analytics and IoT in disaster management: recent advances, taxonomy and prospects. IEEE Access 7:54595–54614

Srivastava AK, Grotjahn R, Ullrich PA (2019) A Multimodel technique for estimating future changes in extreme precipitation.

AGUFM 2019:A51Q-2832

Srivastava AK (2017) Decadal predictability in climate models with and without interactive ocean dynamics (Doctoral dissertation, George Mason University)

Sun AY, Scanlon BR (2019) How can Big Data and machine learning benefit environment and water management: a survey of methods, applications, and future directions. Environ Res Lett 14(7):073001

Ulil AMR, Sukaridhoto S, Tjahjono A, Basuki DK (2019) The vehicle as a mobile sensor network base iot and big data for pothole detection caused by flood disaster. E&ES 239(1):012034 Wang J, Meyer MC, Wu Y, Wang YU (2019) Maximum data-

resolution efficiency for fog-computing supported spatial big data processing in disaster scenarios. IEEE Trans Parallel Distrib Syst 30(8):1826–1842

Publisher’s Note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Referenzen

ÄHNLICHE DOKUMENTE

Correction to: Personal and Ubiquitous Computing https://doi.org/10.1007/s00779-021-01603-7 In the published article "second author's school address is wrong" (see below). •

Organization  Date  Country  Hazard  Key Elements  Key Findings  ISET   2008  India  Drought  •

risk information management, risk information models, risk information interoperability, standards development, risk information processes modelling and applications, services

Despite the government ’ s national-level Priorities and Action Agenda 2006 – 2015 (PPA) and its successor, the Plan Long Act Short 2013 – 2016 document (PLAS), both including

Damage Mechanism A global facility that would be financed by developed countries and support the most vulnerable countries in their coping with two layers of climate risk Layer

Overall, the assessment finds that the available evidence indeed suggests sizeable returns to disaster risk reduction and as a global estimate across interventions and hazards

Combining human computing with the proliferation of mobile technology has resulted in vast amounts of geo-located data that have considerable value across multiple domains

This implementation of an integrated concept of risk is achieved by identifying a clear assessment variable (total ex ante and ex post costs of mitigating flood damage) and