Kenneth Johnson, Javier Cámara, Roopak Sinha, Samaneh Madanian, & Dave Parry. (2021). Towards Self-Adaptive Disaster Management Systems. In Anouck Adrot, Rob Grace, Kathleen Moore, & Christopher W. Zobel (Eds.), ISCRAM 2021 Conference Proceedings – 18th International Conference on Information Systems for Crisis Response and Management (pp. 49–61). Blacksburg, VA (USA): Virginia Tech.
Abstract: Disasters often occur without warning and despite extensive preparation, disaster managers must take action to respond to changes critical resource allocations to support existing health-care facilities and emergency triages. A key challenge is to devise sound and verifiable resourcing plans within an evolving disaster scenario. Our main contribution is the development of a conceptual self-adaptive system featuring a monitor-analyse-plan-execute (MAPE) feedback loop to continually adapt resourcing within the disaster-affected region in response to changing usage and requirements. We illustrate the system's use on a case study based on Auckland city (New Zealand). Uncertainty arising from partial knowledge of infrastructure conditions and outcomes of human participant's actions are modelled and automatically analysed using formal verification techniques. The analysis inform plans for routing resources to where they are needed in the region. Our approach is shown to readily support multiple model and verification techniques applicable to a range of disaster scenarios.
|
André Sabino, Rui Nóbrega, Armanda Rodrigues, & Nuno Correia. (2008). Life-saver: Flood emergency simulator. In B. V. de W. F. Fiedrich (Ed.), Proceedings of ISCRAM 2008 – 5th International Conference on Information Systems for Crisis Response and Management (pp. 724–733). Washington, DC: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: This paper proposes an agent-based simulation system for Dam Break Emergency Plan validation. The proposed system shows that integrating GIS data with an agent-based approach provides a successful simulation platform for the emergency plan validation process. Possible strategies to emergency plan modeling and representation are discussed, proposing a close relation with the actual workflow followed by the entities responsible for the plan's specification. The simulation model is mainly concerned with the location-based and location-motivated actions of the involved agents, describing the likely effects of a specific emergency situation response. The simulator architecture is further described, based on the correspondence between the representation of the plan, and the simulation model. This includes the involving characteristics of the simulation, the simulation engine, the description of the resulting data (for the later evaluation of the emergency plan) and a visualization and interaction component, enabling the dynamic introduction of changes in the scenario progression.
|
Jian Wang, Daniela Rosca, Williams Tepfenhart, & Allen Milewski. (2006). Incident command system workflow modeling and analysis: A case study. In M. T. B. Van de Walle (Ed.), Proceedings of ISCRAM 2006 – 3rd International Conference on Information Systems for Crisis Response and Management (pp. 127–136). Newark, NJ: Royal Flemish Academy of Belgium.
Abstract: The dynamics and volunteer-based workforce characteristics of incident command systems have raised significant challenges to workflow management systems. Incident command systems must be able to adapt to ever changing surroundings and tasks during an incident. These changes need to be known by all responsible parties, since people work in shifts, get tired or sick during the management of an incident. In order to create this awareness, job action sheets and forms have been created. We propose a paperless system that can dynamically take care of these aspects, and formally verify the correctness of the workflows. Furthermore, during an incident, the majority of workers are volunteers that vary in their knowledge of computers, or workflows. To address these challenges, we developed an intuitive, yet formal approach to workflow modeling, modification, enactment and validation. In this paper, we show how to apply this approach to address the needs of a typical incident command system workflow.
|