SlideShare a Scribd company logo
CIMPL:	
  A	
  Public	
  Safety	
  Tool	
  based	
  
on	
  Opportunistic	
  Communication	
  
Waldir	
  Moreira,	
  Antonio	
  Oliveira-­‐Jr,	
  and	
  Marcos	
  Aurélio	
  Ba7sta	
  
waldir.junior@ulusofona.pt,	
  antonio@inf.ufg.br,	
  marcos.ba7sta@pq.cnpq.br	
  	
  
Interna7onal	
  Conference	
  on	
  Ad	
  Hoc	
  Networks	
  and	
  Wireless	
  (AdHoc-­‐Now)	
  
July	
  4th,	
  2016	
  
Lille,	
  France	
  
Agenda	
  
•  Introduc7on	
  
•  Mo7va7on	
  
•  CIMPL	
  applica7on	
  
•  Small-­‐scale	
  Experiment	
  
•  Conclusions	
  and	
  Ongoing	
  Work	
  
Introduction	
  
•  Public	
  safety	
  guarantees	
  social	
  welfare	
  
•  Well-­‐known	
  approaches	
  
•  Police	
  presence,	
  road	
  maintenance	
  task	
  forces	
  
•  Society	
  counts	
  with	
  ci7zens	
  coopera7on	
  
•  Neighborhood	
  watch	
  (burglary,	
  drug	
  dealing)	
  
•  Safety	
  measures	
  can	
  be	
  
•  Reac7ve/Proac7ve:	
  aZer/before	
  an	
  incident	
  
•  Mi7ga7ng/Preven7ve:	
  impact	
  of	
  an	
  incident	
  
Motivation	
  
•  Use	
  of	
  technology	
  in	
  public	
  safety	
  
•  Drones	
  watching	
  crowds,	
  cameras	
  monitoring	
  
•  Exis7ng	
  applica7ons	
  	
  
•  Internet	
  connec7vity,	
  account	
  crea7on,	
  user	
  input	
  
•  Exemplary	
  ci7zens	
  are	
  proac7ve	
  
•  Willing	
  to	
  help	
  in	
  keeping	
  their	
  communi7es	
  safe	
  
•  Increased	
  capabili7es	
  of	
  mobile	
  personal	
  devices	
  
•  Processing,	
  storage,	
  wireless	
  comm.,	
  sensors	
  
CIMPL	
  application	
  
•  Portuguese	
  CIdadão	
  exeMPLar	
  	
  
•  Exemplary,	
  model	
  ci7zen	
  	
  
•  Requirements	
  
•  Simple	
  –	
  ci7zens	
  report	
  by	
  means	
  of	
  photos	
  
•  Proac7ve	
  –	
  exploi7ng	
  users	
  willingness	
  to	
  help	
  
•  Preven7ve	
  –	
  authori7es	
  can	
  take	
  fast	
  ac7ons	
  	
  
CIMPL	
  application	
  
Architecture	
  
CIMPL	
  application	
  
User	
  interface	
  -­‐	
  Ci7zen	
  
CIMPL	
  application	
  
User	
  interface	
  -­‐	
  Authority	
  
Small-­‐scale	
  Experiment	
  
CIMPL	
  users	
  (U1	
  and	
  U2)	
  	
  
City	
  Maintenance	
  Authority	
  (CMA)	
  	
  
U2
Movement direction
Data exchange
U1 U1
U2
2:00 p.m. 2:03 p.m.
2:07 p.m.
Small-­‐scale	
  Experiment	
  
•  Take	
  advantage	
  of	
  the	
  opportunis7c	
  contacts	
  
•  Latency	
  	
  
•  Time	
  the	
  content	
  remains	
  at	
  the	
  device	
  (7	
  min)	
  
•  Transmission	
  7me	
  irrelevant:	
  photo	
  has	
  	
  
~132	
  KB,	
  taking	
  0.055	
  s	
  to	
  be	
  transmieed	
  
•  Cost	
  
•  2	
  replicas	
  are	
  needed	
  to	
  achieve	
  a	
  successfully	
  
delivery	
  given	
  the	
  epidemic	
  nature	
  of	
  CIMPL	
  
•  Replica7ons	
  may	
  be	
  a	
  burden	
  
•  Many	
  users,	
  various	
  incidents,	
  and	
  limited	
  storage	
  
Conclusions	
  and	
  Ongoing	
  Work	
  
•  CIMPL	
  exploits	
  opportunis7c	
  contact	
  for	
  the	
  
exchange	
  of	
  public	
  safety	
  data,	
  having	
  a	
  posi7ve	
  
impact	
  on	
  social	
  welfare	
  
•  Photo	
  tagging	
  to	
  be	
  done	
  automa7cally	
  
•  In	
  current	
  version,	
  users	
  do	
  the	
  tagging	
  
•  OpenCV	
  computer	
  vision	
  library	
  	
  
(recogni7on	
  of	
  the	
  incident	
  and	
  authority)	
  
•  Employing	
  social-­‐based	
  opportunis7c	
  approach	
  	
  
•  Current	
  version	
  relies	
  on	
  an	
  epidemic	
  
Acknowledgements	
  	
  
To	
  Fundação	
  de	
  Amparo	
  à	
  Pesquisa	
  do	
  Estado	
  de	
  
Goiás	
  (FAPEG)	
  and	
  PNPD/CAPES.	
  	
  
CIMPL:	
  A	
  Public	
  Safety	
  Tool	
  based	
  
on	
  Opportunistic	
  Communication	
  
Waldir	
  Moreira,	
  Antonio	
  Oliveira-­‐Jr,	
  and	
  Marcos	
  Aurélio	
  Ba7sta	
  
waldir.junior@ulusofona.pt,	
  antonio@inf.ufg.br,	
  marcos.ba7sta@pq.cnpq.br	
  	
  
Interna7onal	
  Conference	
  on	
  Ad	
  Hoc	
  Networks	
  and	
  Wireless	
  (AdHoc-­‐Now)	
  
July	
  4th,	
  2016	
  
Lille,	
  France	
  

More Related Content

What's hot

Context detection and effects on behavior
Context detection and effects on behaviorContext detection and effects on behavior
Context detection and effects on behavior
Timo Smura
 
Visual victim detection and quadrotor-swarm coordination control in search an...
Visual victim detection and quadrotor-swarm coordination control in search an...Visual victim detection and quadrotor-swarm coordination control in search an...
Visual victim detection and quadrotor-swarm coordination control in search an...
IJECEIAES
 
A User Interface for Spontaneous Mobile Interaction with Pervasive Services
A User Interface for Spontaneous Mobile Interaction with Pervasive ServicesA User Interface for Spontaneous Mobile Interaction with Pervasive Services
A User Interface for Spontaneous Mobile Interaction with Pervasive Services
Dominique Guinard
 

What's hot (6)

IJCNC Top 10 Trending Articles in Academia !!!
IJCNC Top 10 Trending Articles in Academia !!!IJCNC Top 10 Trending Articles in Academia !!!
IJCNC Top 10 Trending Articles in Academia !!!
 
Context detection and effects on behavior
Context detection and effects on behaviorContext detection and effects on behavior
Context detection and effects on behavior
 
Visual victim detection and quadrotor-swarm coordination control in search an...
Visual victim detection and quadrotor-swarm coordination control in search an...Visual victim detection and quadrotor-swarm coordination control in search an...
Visual victim detection and quadrotor-swarm coordination control in search an...
 
A User Interface for Spontaneous Mobile Interaction with Pervasive Services
A User Interface for Spontaneous Mobile Interaction with Pervasive ServicesA User Interface for Spontaneous Mobile Interaction with Pervasive Services
A User Interface for Spontaneous Mobile Interaction with Pervasive Services
 
1 s2.0-s1570870514001255-main
1 s2.0-s1570870514001255-main1 s2.0-s1570870514001255-main
1 s2.0-s1570870514001255-main
 
Pervasive Data Sharing, New Directions in IoT
Pervasive Data Sharing, New Directions in IoTPervasive Data Sharing, New Directions in IoT
Pervasive Data Sharing, New Directions in IoT
 

Viewers also liked

ExOR Multihop Routing in Wireless Networks
ExOR Multihop Routing in Wireless NetworksExOR Multihop Routing in Wireless Networks
ExOR Multihop Routing in Wireless Networks
Yatindra shashi
 
Opportunistic Networking
Opportunistic NetworkingOpportunistic Networking
Opportunistic Networking
Noorin Fatima
 
Directed diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingDirected diffusion for wireless sensor networking
Directed diffusion for wireless sensor networking
Habibur Rahman
 

Viewers also liked (16)

Crowd Assisted Approach for Pervasive Opportunistic Sensing
Crowd Assisted Approach for Pervasive Opportunistic SensingCrowd Assisted Approach for Pervasive Opportunistic Sensing
Crowd Assisted Approach for Pervasive Opportunistic Sensing
 
Computer Networking meets Social Psychology
Computer Networking meets Social PsychologyComputer Networking meets Social Psychology
Computer Networking meets Social Psychology
 
ExOR Multihop Routing in Wireless Networks
ExOR Multihop Routing in Wireless NetworksExOR Multihop Routing in Wireless Networks
ExOR Multihop Routing in Wireless Networks
 
Study on the Effect of Network Dynamics on Opportunistic Routing
Study on the Effect of Network Dynamics on Opportunistic RoutingStudy on the Effect of Network Dynamics on Opportunistic Routing
Study on the Effect of Network Dynamics on Opportunistic Routing
 
A closer look at Online Social Networks (OSNs)
A closer look at Online Social Networks (OSNs)A closer look at Online Social Networks (OSNs)
A closer look at Online Social Networks (OSNs)
 
Using Social Information to Improve Opportunistic Networking
Using Social Information to Improve Opportunistic NetworkingUsing Social Information to Improve Opportunistic Networking
Using Social Information to Improve Opportunistic Networking
 
Trust in a networked world: Problems and measures
Trust in a networked world: Problems and measuresTrust in a networked world: Problems and measures
Trust in a networked world: Problems and measures
 
How can users' interests be considered to improve content dissemination/retri...
How can users' interests be considered to improve content dissemination/retri...How can users' interests be considered to improve content dissemination/retri...
How can users' interests be considered to improve content dissemination/retri...
 
Opportunistic Routing Based on Daily Routines
Opportunistic Routing Based on Daily RoutinesOpportunistic Routing Based on Daily Routines
Opportunistic Routing Based on Daily Routines
 
Assessment Model for Opportunistic Routing
Assessment Model for Opportunistic RoutingAssessment Model for Opportunistic Routing
Assessment Model for Opportunistic Routing
 
Mobile Communication
Mobile CommunicationMobile Communication
Mobile Communication
 
How Important Social Graphs are for DTN Routing
How Important Social Graphs are for DTN RoutingHow Important Social Graphs are for DTN Routing
How Important Social Graphs are for DTN Routing
 
Performance Evaluation of Opportunistic Routing Protocols: A Framework-based ...
Performance Evaluation of Opportunistic Routing Protocols: A Framework-based ...Performance Evaluation of Opportunistic Routing Protocols: A Framework-based ...
Performance Evaluation of Opportunistic Routing Protocols: A Framework-based ...
 
Opportunistic Networking
Opportunistic NetworkingOpportunistic Networking
Opportunistic Networking
 
Directed diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingDirected diffusion for wireless sensor networking
Directed diffusion for wireless sensor networking
 
Routage dans les réseaux de capteurs segonde partie
Routage dans les réseaux de capteurs segonde partie Routage dans les réseaux de capteurs segonde partie
Routage dans les réseaux de capteurs segonde partie
 

Similar to CIMPL: A Public Safety Tool based on Opportunistic Communication

R E G U L A R P A P E RUser-centric privacy awareness in v.docx
R E G U L A R P A P E RUser-centric privacy awareness in v.docxR E G U L A R P A P E RUser-centric privacy awareness in v.docx
R E G U L A R P A P E RUser-centric privacy awareness in v.docx
makdul
 
ILT202411111111111111111111111111111.pdf
ILT202411111111111111111111111111111.pdfILT202411111111111111111111111111111.pdf
ILT202411111111111111111111111111111.pdf
w7823125
 
Dragons den Semester 1 2015
Dragons den Semester 1 2015Dragons den Semester 1 2015
Dragons den Semester 1 2015
Samuel Mann
 
Article Detail 7 - Domestic Preparedness
Article Detail 7 - Domestic PreparednessArticle Detail 7 - Domestic Preparedness
Article Detail 7 - Domestic Preparedness
Diana Hopkins
 

Similar to CIMPL: A Public Safety Tool based on Opportunistic Communication (20)

R E G U L A R P A P E RUser-centric privacy awareness in v.docx
R E G U L A R P A P E RUser-centric privacy awareness in v.docxR E G U L A R P A P E RUser-centric privacy awareness in v.docx
R E G U L A R P A P E RUser-centric privacy awareness in v.docx
 
[EUC2014] cODA: An Open-Source Framework to Easily Design Context-Aware Andro...
[EUC2014] cODA: An Open-Source Framework to Easily Design Context-Aware Andro...[EUC2014] cODA: An Open-Source Framework to Easily Design Context-Aware Andro...
[EUC2014] cODA: An Open-Source Framework to Easily Design Context-Aware Andro...
 
ILT202411111111111111111111111111111.pdf
ILT202411111111111111111111111111111.pdfILT202411111111111111111111111111111.pdf
ILT202411111111111111111111111111111.pdf
 
Advance Intelligent Video Surveillance System Using OpenCV
Advance Intelligent Video Surveillance System Using OpenCVAdvance Intelligent Video Surveillance System Using OpenCV
Advance Intelligent Video Surveillance System Using OpenCV
 
Artss@itms2020
Artss@itms2020Artss@itms2020
Artss@itms2020
 
Object Recognition-based Mnemonics Mobile App for Senior Adults Communication
Object Recognition-based Mnemonics Mobile App for Senior Adults CommunicationObject Recognition-based Mnemonics Mobile App for Senior Adults Communication
Object Recognition-based Mnemonics Mobile App for Senior Adults Communication
 
Dragons den Semester 1 2015
Dragons den Semester 1 2015Dragons den Semester 1 2015
Dragons den Semester 1 2015
 
Challenges and Opportunities of the IoT Data and Service Interoperability
Challenges and Opportunities of the IoT Data and Service InteroperabilityChallenges and Opportunities of the IoT Data and Service Interoperability
Challenges and Opportunities of the IoT Data and Service Interoperability
 
Simon Forge TAFI workshop
Simon Forge TAFI workshopSimon Forge TAFI workshop
Simon Forge TAFI workshop
 
Emerging & Enabling Technologies event, 19 September 17 - presentation by Gav...
Emerging & Enabling Technologies event, 19 September 17 - presentation by Gav...Emerging & Enabling Technologies event, 19 September 17 - presentation by Gav...
Emerging & Enabling Technologies event, 19 September 17 - presentation by Gav...
 
SenseDroid
SenseDroidSenseDroid
SenseDroid
 
ACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of securityACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of security
 
The Roadmap to a Lifesaving Digital Ecosystem
The Roadmap to a Lifesaving Digital EcosystemThe Roadmap to a Lifesaving Digital Ecosystem
The Roadmap to a Lifesaving Digital Ecosystem
 
CNL Software IPSecurityCenter Case Studies Presentation 0113
CNL Software IPSecurityCenter Case Studies Presentation  0113CNL Software IPSecurityCenter Case Studies Presentation  0113
CNL Software IPSecurityCenter Case Studies Presentation 0113
 
Real Time Social Distance Detector using Deep learning
Real Time Social Distance Detector using Deep learningReal Time Social Distance Detector using Deep learning
Real Time Social Distance Detector using Deep learning
 
Event Detection Using Background Subtraction For Surveillance Systems
Event Detection Using Background Subtraction For Surveillance SystemsEvent Detection Using Background Subtraction For Surveillance Systems
Event Detection Using Background Subtraction For Surveillance Systems
 
mnask detetor ppt using deep learning.pptx
mnask detetor ppt using  deep learning.pptxmnask detetor ppt using  deep learning.pptx
mnask detetor ppt using deep learning.pptx
 
Article Detail 7 - Domestic Preparedness
Article Detail 7 - Domestic PreparednessArticle Detail 7 - Domestic Preparedness
Article Detail 7 - Domestic Preparedness
 
Realtime Face mask Detector using YoloV4
Realtime Face mask Detector using YoloV4Realtime Face mask Detector using YoloV4
Realtime Face mask Detector using YoloV4
 
Missouri University of Science and Technology (MS&T), Non-Destructive Microwa...
Missouri University of Science and Technology (MS&T), Non-Destructive Microwa...Missouri University of Science and Technology (MS&T), Non-Destructive Microwa...
Missouri University of Science and Technology (MS&T), Non-Destructive Microwa...
 

More from Waldir Moreira

The Role of Information in Opportunistic Networks
The Role of Information in Opportunistic NetworksThe Role of Information in Opportunistic Networks
The Role of Information in Opportunistic Networks
Waldir Moreira
 
Opportunistic Networking: Extending Internet Communications Through Spontaneo...
Opportunistic Networking: Extending Internet Communications Through Spontaneo...Opportunistic Networking: Extending Internet Communications Through Spontaneo...
Opportunistic Networking: Extending Internet Communications Through Spontaneo...
Waldir Moreira
 

More from Waldir Moreira (7)

SV4D: The project, the reality observed and the challenges to be addressed
SV4D: The project, the reality observed and the challenges to be addressedSV4D: The project, the reality observed and the challenges to be addressed
SV4D: The project, the reality observed and the challenges to be addressed
 
SV4D Architecture: Building Sustainable Villages for Developing Countries
SV4D Architecture: Building Sustainable Villages for Developing CountriesSV4D Architecture: Building Sustainable Villages for Developing Countries
SV4D Architecture: Building Sustainable Villages for Developing Countries
 
Sustainable Villages for Development: Promoting Digital Inclusion
Sustainable Villages for Development: Promoting Digital InclusionSustainable Villages for Development: Promoting Digital Inclusion
Sustainable Villages for Development: Promoting Digital Inclusion
 
DTN-Amazon: Digital/Social Inclusion in the Amazon Region
DTN-Amazon: Digital/Social Inclusion in the Amazon RegionDTN-Amazon: Digital/Social Inclusion in the Amazon Region
DTN-Amazon: Digital/Social Inclusion in the Amazon Region
 
The Role of Information in Opportunistic Networks
The Role of Information in Opportunistic NetworksThe Role of Information in Opportunistic Networks
The Role of Information in Opportunistic Networks
 
Encouraging Cooperation Through Community Dynamics
Encouraging Cooperation Through Community DynamicsEncouraging Cooperation Through Community Dynamics
Encouraging Cooperation Through Community Dynamics
 
Opportunistic Networking: Extending Internet Communications Through Spontaneo...
Opportunistic Networking: Extending Internet Communications Through Spontaneo...Opportunistic Networking: Extending Internet Communications Through Spontaneo...
Opportunistic Networking: Extending Internet Communications Through Spontaneo...
 

Recently uploaded

Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 

Recently uploaded (20)

Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 

CIMPL: A Public Safety Tool based on Opportunistic Communication

  • 1. CIMPL:  A  Public  Safety  Tool  based   on  Opportunistic  Communication   Waldir  Moreira,  Antonio  Oliveira-­‐Jr,  and  Marcos  Aurélio  Ba7sta   waldir.junior@ulusofona.pt,  antonio@inf.ufg.br,  marcos.ba7sta@pq.cnpq.br     Interna7onal  Conference  on  Ad  Hoc  Networks  and  Wireless  (AdHoc-­‐Now)   July  4th,  2016   Lille,  France  
  • 2. Agenda   •  Introduc7on   •  Mo7va7on   •  CIMPL  applica7on   •  Small-­‐scale  Experiment   •  Conclusions  and  Ongoing  Work  
  • 3. Introduction   •  Public  safety  guarantees  social  welfare   •  Well-­‐known  approaches   •  Police  presence,  road  maintenance  task  forces   •  Society  counts  with  ci7zens  coopera7on   •  Neighborhood  watch  (burglary,  drug  dealing)   •  Safety  measures  can  be   •  Reac7ve/Proac7ve:  aZer/before  an  incident   •  Mi7ga7ng/Preven7ve:  impact  of  an  incident  
  • 4. Motivation   •  Use  of  technology  in  public  safety   •  Drones  watching  crowds,  cameras  monitoring   •  Exis7ng  applica7ons     •  Internet  connec7vity,  account  crea7on,  user  input   •  Exemplary  ci7zens  are  proac7ve   •  Willing  to  help  in  keeping  their  communi7es  safe   •  Increased  capabili7es  of  mobile  personal  devices   •  Processing,  storage,  wireless  comm.,  sensors  
  • 5. CIMPL  application   •  Portuguese  CIdadão  exeMPLar     •  Exemplary,  model  ci7zen     •  Requirements   •  Simple  –  ci7zens  report  by  means  of  photos   •  Proac7ve  –  exploi7ng  users  willingness  to  help   •  Preven7ve  –  authori7es  can  take  fast  ac7ons    
  • 7. CIMPL  application   User  interface  -­‐  Ci7zen  
  • 8. CIMPL  application   User  interface  -­‐  Authority  
  • 9. Small-­‐scale  Experiment   CIMPL  users  (U1  and  U2)     City  Maintenance  Authority  (CMA)     U2 Movement direction Data exchange U1 U1 U2 2:00 p.m. 2:03 p.m. 2:07 p.m.
  • 10. Small-­‐scale  Experiment   •  Take  advantage  of  the  opportunis7c  contacts   •  Latency     •  Time  the  content  remains  at  the  device  (7  min)   •  Transmission  7me  irrelevant:  photo  has     ~132  KB,  taking  0.055  s  to  be  transmieed   •  Cost   •  2  replicas  are  needed  to  achieve  a  successfully   delivery  given  the  epidemic  nature  of  CIMPL   •  Replica7ons  may  be  a  burden   •  Many  users,  various  incidents,  and  limited  storage  
  • 11. Conclusions  and  Ongoing  Work   •  CIMPL  exploits  opportunis7c  contact  for  the   exchange  of  public  safety  data,  having  a  posi7ve   impact  on  social  welfare   •  Photo  tagging  to  be  done  automa7cally   •  In  current  version,  users  do  the  tagging   •  OpenCV  computer  vision  library     (recogni7on  of  the  incident  and  authority)   •  Employing  social-­‐based  opportunis7c  approach     •  Current  version  relies  on  an  epidemic  
  • 12. Acknowledgements     To  Fundação  de  Amparo  à  Pesquisa  do  Estado  de   Goiás  (FAPEG)  and  PNPD/CAPES.    
  • 13.
  • 14. CIMPL:  A  Public  Safety  Tool  based   on  Opportunistic  Communication   Waldir  Moreira,  Antonio  Oliveira-­‐Jr,  and  Marcos  Aurélio  Ba7sta   waldir.junior@ulusofona.pt,  antonio@inf.ufg.br,  marcos.ba7sta@pq.cnpq.br     Interna7onal  Conference  on  Ad  Hoc  Networks  and  Wireless  (AdHoc-­‐Now)   July  4th,  2016   Lille,  France