SlideShare a Scribd company logo
Gadhe Vishal Ashok et al., International Journal of Advance Research, Ideas and Innovations in Technology.
© 2017, www.IJARIIT.com All Rights Reserved Page | 27
ISSN: 2454-132X
Impact factor: 4.295
(Volume3, Issue6)
Available online at www.ijariit.com
Networking Smartphones for Disaster Recovery Using
Teamphone
Abstract: In this paper, we examine how to use networks with smartphones for providing communications in disaster recovery.
By lessening the communication gap among different kinds of wireless networks, we have designed and implemented a system
called TeamPhone, which provides Android phones the capabilities on communications in disaster helper. TeamPhone
consists of two components: a messaging system between rescue worker and the victim and a self-rescue system. The
messaging system between rescue worker and victim integrates cellular networking, ad-hoc networking, and opportunistic
networking seamlessly, and enables proper communication. The self-rescue system finds different communication network
ways for trapped survivors. Such a group of Android phones can cooperatively get a notification and send out emergency
messages in an energy-efficient manner with their location and position information so as to help rescue operations. We have
implemented TeamPhone as a prototype application on the Android platform and deployed it on all types of smartphones from
Samsung to Redmi and others. Results demonstrate that TeamPhone can properly enhance communication requirements and
increase the pace of disaster recovery. We are creating three applications with a centralized cloud for communication. First for
the admin who will monitor victim and rescue worker on Google map and other two for rescue worker and disaster victim.
Keywords: Smartphone, Routing, Disaster Recover, Wifi, Bluetooth, ADHOC, GSM, and GPS.
I. INTRODUCTION
Today mobile and mobile based applications have become an integral part of our day to day life. With the revolution in mobile
computing, many great features were added to the field and the mobiles got smaller, faster and better as the decade passed. It gave
rise to the introduction of new mobile-based operating systems where the programmers were presented with an open source
operating system named “ANDROID”.
With the introduction of android, the programmers were free to program freely and with the much-awaited programming language
as the programmers did not have to learn anything new. The android was a handsome mixture of java and mobile computing.
Thus a model integration of ANDROID platform with a desktop application can be utilized for disaster management applications
and disaster management which can be of many types varying from natural disaster, accident, fire, theft. So we are thinking of in
cooperating various constraints in our application like.
Vishal Ashok Gadhe
Dept. of Computer Science, University of Pune
vishalgadhe143@gmail.com
Ashwini Subhash Nimse
Dept. of Computer Science, University of Pune
ashwininimse30@gmail.com
Amruta Satish Tanpure
Dept. of Computer Science, University of Pune
tanpureamruta99@gmail.com
P. D. Sinare
Dept. of Computer Science, University of Pune
pramod.sinare100@gmail.com
Gadhe Vishal Ashok et al., International Journal of Advance Research, Ideas and Innovations in Technology.
© 2017, www.IJARIIT.com All Rights Reserved Page | 28
Injuries due to accidents are among the leading causes of hospitalization in elderly persons, often resulting in a rapid decline in
functionality and death. The fast and unique response can improve the victim's outcome, but this is often lacking when the injured
person lives alone and the nature of the injury is so bad to call for help.
The lack of efficient disaster management system that will help in times of need. One common scenario during disasters is that the
activity of rescue and relief is not well-coordinated. This increases a need for a well-coordinated disaster management system that
can be coordinated by a central entity such as administrator using the cloud. Since the use of Android smartphones has attracted
millions of people, the disaster management system was implemented as a smartphone application using Google’s Android
operating system. The disaster management system uses Google maps to monitor both victim and rescue worker. It finds out the
rescue worker which is nearest to the victim and sends him an alert to help the victim.
II. LITERATURE SURVEY
Considering worldwide systems for emergency reporting regardless of their communication method where it’s wired or wireless,
majorly we studied some unique parameters of the systems which will help us to define the strong objectives about our proposed
systems. Below listed generation wise systems gives us the fair idea about the survey we had done.
A. Closed-Circuit Television (CCTV)
Closed-circuit television (CCTV) is the use of cameras and its wired or wireless network to transmit a signal to its DVR. It can be
deployed as a point to point or point to multipoint links between camera and monitor. These are mainly used in surveillance areas
where they are needed from shops to airports etc. In mechanical and production plants, these video cameras are used to monitor
and take decisions accordingly while at one room only. Some places like the heavy heat generated while molding metal or another
area where worker can’t sustain that environment that time such CCTV are more useful and most suited one. Depends upon the
requirement these CCTV operate continuously or time being to a monitor. Now a day we have advanced Digital Video Recorders
(DVRs), which records 24 hours for many years. It can continuously run and record it in some storage like disk or tape. Also,
these CCTV supports IP based monitoring and centralized network-based storage such as cloud.
Advantage and disadvantage:
1>it can work and may be placed anywhere
2>DVR should always be on.
B. Smoke Detectors
Smoke detector systems are Emergency detection system in case of fire which generates smoke first. Such detectors are widely
used in areas where there are big facilities like factories and hotels. These systems report the issue to some kind of audible alarm
to alert public around it. Older smoke detectors were using the physical process of ionization whereas latest technology enables us
to use the photoelectric diode sense the smoke in the air and send an alarm after it. In large areas like factories, it runs mainly on
the power supply and not on batteries.
Advantage and disadvantage:
1>It can detect fire easily and accurately
2>It can do it only once not repeatedly.
C. Natural Disaster Monitor App (Developed by Dominic925)
This smartphone-based app gives you real-time updates on any global natural calamities like earthquake, tsunami, cyclone, floods,
and volcano eruptions on the backdrop of a Google earth map. The app makes use of the alerts published by the Global Disaster
Alert and Coordination System (GDACS). The app shows icons on the map with colours- green, orange, and red etc. each
indicating the severity of the natural calamity. On clicking the respective icons, the list shows date and time, region, disaster type
and other related details of the calamity.
Advantage and disadvantage:
1>It shows disasters on Google maps.
2>It cannot help and coordinate and help victims.
D. Tsunami Alert (Developed Palta Software)
This application is capable and built to help people living along the coastal lines across Pacific and the Indian Ocean, who
witnessed the large-scale devastation by the 2004 Tsunami. The main feature of the application is that a user will get real-time
updates from US government owned NOAA in every five minutes. It will also give details about the area affected, the location of
the earthquake and also provide with tips on how to react to it. In Tsunami Alert app, the user will have the option to select 5 main
regions- one US and Canada, Pacific, Hawaii, Indian Ocean and the Caribbean Sea.
Gadhe Vishal Ashok et al., International Journal of Advance Research, Ideas and Innovations in Technology.
© 2017, www.IJARIIT.com All Rights Reserved Page | 29
Advantage and disadvantage:
1>It gives perfect Tsunami alert
2>It cannot help and coordinate and help victims.
E. Help Me
Another very important mobile app which deals with disaster environment is called HelpMe. It introduces a new approach to
building the ad-hoc network using Wi-Fi to enable Android-based smartphones to communicate during disaster time. It works
without the help of any GSM operator, and smartly forwards the message on the hop-to-hop basis. It has centralized HelpMe
server to keep a log of all happening about an emergency, once service is restored. This information from a cell phone in knowing
whereabouts of the missing person.
Advantage and disadvantage:
1>It helps using the AdHoc network.
2>It cannot use any other network.
III. PROPOSED SYSTEM
Fig. 1 System Architecture
Our project can be distributed into three modules:
Survivor
Registration:
In this module a survivor will send name and location to admin using smartphone;
Beeper:
In this module, if all communication network fails a beeper will be on.
GPS:
In this module, if GPS is on the correct latitude and longitude will be given to admin.
Rescue worker:
In this module, the admin will find the nearest rescue worker and notify him the location of the survivor for help
AES:
In this module, the data on the cloud will be secured using AES (Advanced Encryption Standard) algorithm.
Gadhe Vishal Ashok et al., International Journal of Advance Research, Ideas and Innovations in Technology.
© 2017, www.IJARIIT.com All Rights Reserved Page | 30
Rescue Worker
Registration:
In this module a rescue worker will register to admin for helping the survivors;
GPS:
In this module, if GPS is on the correct latitude and longitude will be given to admin.
Map:
In this module, the rescue worker can see the survivor on his map and get the correct distance from him and survivor.
Notifications:
In this module, the admin will send notifications to rescue worker for further help.
AES:
In this module, the data on the cloud will be secured using AES (Advanced Encryption Standard) algorithm.
Desktop:
Authentication:
In this module, the administrator will authenticate himself using the cloud.
Survivor Monitoring:
In this module, the admin will continue monitor survivor whereabouts on his map.
Rescue Worker Monitoring:
In this module, the admin will continue monitor rescue worker and see if he is really near the survivor on the map.
Notifications:
In this module, the admin will find the nearest rescue worker and send him to the survivor by sending notifications about
the location of survivor and alert the survivor that help is coming.
AES:
In this module, AES algorithm will be used to handle encryption and decryption of data from the cloud.
IV. SYSTEM ANALYSIS
Fig. 1 System Analysis
CONCLUSION
In this paper, we propose TeamPhone, which is designed to network smartphones in disaster recovery. TeamPhone includes two
components: the messaging system that provides data communications for rescue workers, and the self-rescue system that groups
the smartphones of trapped survivors together, energy-efficiently discovers nearby messaging nodes and sends out emergency
messages including location and position information. TeamPhone is implemented as a prototype application on the Android
platform using the WiFi interface and cellular interface to provide several ways of communications. TeamPhone has been
deployed and evaluated on the off-the-shelf smartphones.
Register Rescue
Worker
Get victim Send notification to
nearest worker of
victim
Communicate via
BLUETOOTH
Communicate via
ADHOC
Communicate via
WIFI
Communicate via
GOOGLE CLOUD
Gadhe Vishal Ashok et al., International Journal of Advance Research, Ideas and Innovations in Technology.
© 2017, www.IJARIIT.com All Rights Reserved Page | 31
The evaluation results demonstrate that TeamPhone can accomplish various message transmissions with affordable power
consumption and delay, and greatly reduce the energy consumption of sending out emergency messages by grouping and wake-up
schedule.
REFERENCES
[1] K. Lorincz, D. Malan, T. Fulford-Jones, A. Nawoj, A. Clavel, V. Shnayder, G. Mainland, M. Welsh, and S. Moulton,
“Sensor networks for emergency response: challenges and opportunities,”
Pervasive Computing, IEEE, vol. 3, no. 4, pp. 16–23, 2004.
[2] S. George, W. Zhou, H. Chenji, M. Won, Y. O. Lee, A. Pazarloglou, R. Stoleru, and P. Barooah, “Distressed: a wireless
ad hoc and sensor network architecture for situation management in disaster
response,” Communications Magazine, IEEE, vol. 48, no. 3, pp. 128–136, 2010.
[3] G. Zussman and A. Segall, “Energy efficient routing in ad hoc disaster recovery networks,” in Proc. IEEE INFOCOM,
2003, pp.682–691.
[4] Official Bluetooth Website. (2015, January). [Online]. Available: http://www.bluetooth.com
[5] Lee, L.K. Zachariah, M. Everett, P. “CCTV camera site selection: a field experience”, 6th International VNIS. ‟A Ride
into the Future‟, pp.21-27, 1995.
[6] Official ELERTS Website. (2013, January). [Online]. Available: http://elerts.com
[7] Osnat Mokryn, Dror Karmi, Akiva Elkayam, Tomer Teller “Help Me: Opportunistic Smart Rescue Application and
System” The 11th Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net), 2012
[8] “Powerful quake ravages china killing thousands,
”http://www.nytimes.com/2008/05/13/world/asia/13china.html. X. Sun, Z. Lu, W. Hu, and G. Cao, “Symdetector:
Detecting sound related respiratory symptoms using smartphones,” in Proc. ACM UbiComp, 2015, pp. 97–108.
[9] http://www.ijraset.com/fileserve.php?FID=3773
[10] http://www.coep.org.in/page_assets/341/Emergency_Reporting_Using_Smartphone.pdf

More Related Content

What's hot

IRJET- Rescue Robot using ESP Microcontroller
IRJET-  	  Rescue Robot using ESP MicrocontrollerIRJET-  	  Rescue Robot using ESP Microcontroller
IRJET- Rescue Robot using ESP Microcontroller
IRJET Journal
 
Internet of Things Based Women Tracking and Security with Auto-Defender System
Internet of Things Based Women Tracking and Security with Auto-Defender SystemInternet of Things Based Women Tracking and Security with Auto-Defender System
Internet of Things Based Women Tracking and Security with Auto-Defender System
rahulmonikasharma
 
DESIGN OF A SECURE DISASTER NOTIFICATION SYSTEM USING THE SMARTPHONE BASED BE...
DESIGN OF A SECURE DISASTER NOTIFICATION SYSTEM USING THE SMARTPHONE BASED BE...DESIGN OF A SECURE DISASTER NOTIFICATION SYSTEM USING THE SMARTPHONE BASED BE...
DESIGN OF A SECURE DISASTER NOTIFICATION SYSTEM USING THE SMARTPHONE BASED BE...
csandit
 
Fog Based Emergency System For Smart Enhanced Living Environment
Fog Based Emergency System For Smart Enhanced Living EnvironmentFog Based Emergency System For Smart Enhanced Living Environment
Fog Based Emergency System For Smart Enhanced Living Environment
KEERTHANA M
 
Kali app - women safety (Concept)
Kali app - women safety (Concept)Kali app - women safety (Concept)
Kali app - women safety (Concept)
Mahek Shah
 
SenseDroid
SenseDroidSenseDroid
SenseDroid
Santanu Sarma
 
Gesture phones final
Gesture phones  finalGesture phones  final
Gesture phones final
sai venkata vinay chittuluru
 
It and safety
It and safetyIt and safety
It and safety
Aman Verma
 
IRJET- Enactment of Smart Child Monitoring System
IRJET- Enactment of Smart Child Monitoring SystemIRJET- Enactment of Smart Child Monitoring System
IRJET- Enactment of Smart Child Monitoring System
IRJET Journal
 
Personal Security Tracking based on Android and Web Application
Personal Security Tracking based on Android and Web ApplicationPersonal Security Tracking based on Android and Web Application
Personal Security Tracking based on Android and Web Application
TELKOMNIKA JOURNAL
 
SECURITY AND KEY MANAGEMENT CHALLENGES OVER WSN (A SURVEY)
SECURITY AND KEY MANAGEMENT CHALLENGES OVER WSN (A SURVEY) SECURITY AND KEY MANAGEMENT CHALLENGES OVER WSN (A SURVEY)
SECURITY AND KEY MANAGEMENT CHALLENGES OVER WSN (A SURVEY)
IJCSES Journal
 
IRJET-Protection for Women using IoT Smart Device with Location and Parameters
IRJET-Protection for Women using IoT Smart Device with Location and ParametersIRJET-Protection for Women using IoT Smart Device with Location and Parameters
IRJET-Protection for Women using IoT Smart Device with Location and Parameters
IRJET Journal
 
IRJET- Women Security System using GSM and GPS
IRJET-  	  Women Security System using GSM and GPSIRJET-  	  Women Security System using GSM and GPS
IRJET- Women Security System using GSM and GPS
IRJET Journal
 
Biometric Security Bags
Biometric Security BagsBiometric Security Bags
Biometric Security Bags
ijtsrd
 
IoT based Women Smart Sec.
IoT based Women Smart Sec.IoT based Women Smart Sec.
IoT based Women Smart Sec.
Arjun Dattaraju
 

What's hot (15)

IRJET- Rescue Robot using ESP Microcontroller
IRJET-  	  Rescue Robot using ESP MicrocontrollerIRJET-  	  Rescue Robot using ESP Microcontroller
IRJET- Rescue Robot using ESP Microcontroller
 
Internet of Things Based Women Tracking and Security with Auto-Defender System
Internet of Things Based Women Tracking and Security with Auto-Defender SystemInternet of Things Based Women Tracking and Security with Auto-Defender System
Internet of Things Based Women Tracking and Security with Auto-Defender System
 
DESIGN OF A SECURE DISASTER NOTIFICATION SYSTEM USING THE SMARTPHONE BASED BE...
DESIGN OF A SECURE DISASTER NOTIFICATION SYSTEM USING THE SMARTPHONE BASED BE...DESIGN OF A SECURE DISASTER NOTIFICATION SYSTEM USING THE SMARTPHONE BASED BE...
DESIGN OF A SECURE DISASTER NOTIFICATION SYSTEM USING THE SMARTPHONE BASED BE...
 
Fog Based Emergency System For Smart Enhanced Living Environment
Fog Based Emergency System For Smart Enhanced Living EnvironmentFog Based Emergency System For Smart Enhanced Living Environment
Fog Based Emergency System For Smart Enhanced Living Environment
 
Kali app - women safety (Concept)
Kali app - women safety (Concept)Kali app - women safety (Concept)
Kali app - women safety (Concept)
 
SenseDroid
SenseDroidSenseDroid
SenseDroid
 
Gesture phones final
Gesture phones  finalGesture phones  final
Gesture phones final
 
It and safety
It and safetyIt and safety
It and safety
 
IRJET- Enactment of Smart Child Monitoring System
IRJET- Enactment of Smart Child Monitoring SystemIRJET- Enactment of Smart Child Monitoring System
IRJET- Enactment of Smart Child Monitoring System
 
Personal Security Tracking based on Android and Web Application
Personal Security Tracking based on Android and Web ApplicationPersonal Security Tracking based on Android and Web Application
Personal Security Tracking based on Android and Web Application
 
SECURITY AND KEY MANAGEMENT CHALLENGES OVER WSN (A SURVEY)
SECURITY AND KEY MANAGEMENT CHALLENGES OVER WSN (A SURVEY) SECURITY AND KEY MANAGEMENT CHALLENGES OVER WSN (A SURVEY)
SECURITY AND KEY MANAGEMENT CHALLENGES OVER WSN (A SURVEY)
 
IRJET-Protection for Women using IoT Smart Device with Location and Parameters
IRJET-Protection for Women using IoT Smart Device with Location and ParametersIRJET-Protection for Women using IoT Smart Device with Location and Parameters
IRJET-Protection for Women using IoT Smart Device with Location and Parameters
 
IRJET- Women Security System using GSM and GPS
IRJET-  	  Women Security System using GSM and GPSIRJET-  	  Women Security System using GSM and GPS
IRJET- Women Security System using GSM and GPS
 
Biometric Security Bags
Biometric Security BagsBiometric Security Bags
Biometric Security Bags
 
IoT based Women Smart Sec.
IoT based Women Smart Sec.IoT based Women Smart Sec.
IoT based Women Smart Sec.
 

Similar to Networking smartphones for disaster recovery using teamphone

IRJET- Disaster Management System using Web
IRJET-  	  Disaster Management System using WebIRJET-  	  Disaster Management System using Web
IRJET- Disaster Management System using Web
IRJET Journal
 
Ijacsa published research paper march 2020
Ijacsa published research paper march 2020Ijacsa published research paper march 2020
Ijacsa published research paper march 2020
shoaibulhassanuos
 
ALPHA-ACCIDENT LOCATION PATIENT HEALTH ASSISTENCE
ALPHA-ACCIDENT LOCATION PATIENT HEALTH ASSISTENCEALPHA-ACCIDENT LOCATION PATIENT HEALTH ASSISTENCE
ALPHA-ACCIDENT LOCATION PATIENT HEALTH ASSISTENCE
IRJET Journal
 
IRJET - Android App for Women Security
IRJET -  	  Android App for Women SecurityIRJET -  	  Android App for Women Security
IRJET - Android App for Women Security
IRJET Journal
 
Ijirstv1 i6029
Ijirstv1 i6029Ijirstv1 i6029
Ijirstv1 i6029
anuj87420
 
A017340104
A017340104A017340104
A017340104
IOSR Journals
 
Application for Women Safety
Application for Women SafetyApplication for Women Safety
Application for Women Safety
iosrjce
 
WOMEN’s SAFETY APP
WOMEN’s SAFETY APPWOMEN’s SAFETY APP
WOMEN’s SAFETY APP
IRJET Journal
 
I am secure android application
I am secure android applicationI am secure android application
I am secure android application
eSAT Publishing House
 
Detect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructureDetect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructure
eSAT Publishing House
 
Cloud Based intrusion Detection System
Cloud Based intrusion Detection SystemCloud Based intrusion Detection System
Cloud Based intrusion Detection System
IJMTST Journal
 
MOBILE PHONE SENSORS META-MODEL
MOBILE PHONE SENSORS META-MODELMOBILE PHONE SENSORS META-MODEL
MOBILE PHONE SENSORS META-MODEL
ijasuc
 
MOBILE PHONE SENSORS META-MODEL
MOBILE PHONE SENSORS META-MODELMOBILE PHONE SENSORS META-MODEL
MOBILE PHONE SENSORS META-MODEL
ijasuc
 
3. UJRRA_23_26(B).pdf
3. UJRRA_23_26(B).pdf3. UJRRA_23_26(B).pdf
3. UJRRA_23_26(B).pdf
Twisting Memoirs Publication
 
A new system to detect coronavirus social distance violation
A new system to detect coronavirus social distance violation A new system to detect coronavirus social distance violation
A new system to detect coronavirus social distance violation
IJECEIAES
 
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET-  	  App Misbehaviour Check: Development of Virus Modeling, Propagation...IRJET-  	  App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET Journal
 
Performance Analysis of Communication Protocols for Post Disaster Communication
Performance Analysis of Communication Protocols for Post Disaster CommunicationPerformance Analysis of Communication Protocols for Post Disaster Communication
Performance Analysis of Communication Protocols for Post Disaster Communication
AM Publications,India
 
6’APART – A STEP TO PREVENT COVID-19
6’APART – A STEP TO PREVENT COVID-196’APART – A STEP TO PREVENT COVID-19
6’APART – A STEP TO PREVENT COVID-19
IRJET Journal
 
6’APART – A STEP TO PREVENT COVID-19
6’APART – A STEP TO PREVENT COVID-196’APART – A STEP TO PREVENT COVID-19
6’APART – A STEP TO PREVENT COVID-19
IRJET Journal
 
Hazard object reporting to respective authorities
Hazard object reporting to respective authoritiesHazard object reporting to respective authorities
Hazard object reporting to respective authorities
eSAT Publishing House
 

Similar to Networking smartphones for disaster recovery using teamphone (20)

IRJET- Disaster Management System using Web
IRJET-  	  Disaster Management System using WebIRJET-  	  Disaster Management System using Web
IRJET- Disaster Management System using Web
 
Ijacsa published research paper march 2020
Ijacsa published research paper march 2020Ijacsa published research paper march 2020
Ijacsa published research paper march 2020
 
ALPHA-ACCIDENT LOCATION PATIENT HEALTH ASSISTENCE
ALPHA-ACCIDENT LOCATION PATIENT HEALTH ASSISTENCEALPHA-ACCIDENT LOCATION PATIENT HEALTH ASSISTENCE
ALPHA-ACCIDENT LOCATION PATIENT HEALTH ASSISTENCE
 
IRJET - Android App for Women Security
IRJET -  	  Android App for Women SecurityIRJET -  	  Android App for Women Security
IRJET - Android App for Women Security
 
Ijirstv1 i6029
Ijirstv1 i6029Ijirstv1 i6029
Ijirstv1 i6029
 
A017340104
A017340104A017340104
A017340104
 
Application for Women Safety
Application for Women SafetyApplication for Women Safety
Application for Women Safety
 
WOMEN’s SAFETY APP
WOMEN’s SAFETY APPWOMEN’s SAFETY APP
WOMEN’s SAFETY APP
 
I am secure android application
I am secure android applicationI am secure android application
I am secure android application
 
Detect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructureDetect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructure
 
Cloud Based intrusion Detection System
Cloud Based intrusion Detection SystemCloud Based intrusion Detection System
Cloud Based intrusion Detection System
 
MOBILE PHONE SENSORS META-MODEL
MOBILE PHONE SENSORS META-MODELMOBILE PHONE SENSORS META-MODEL
MOBILE PHONE SENSORS META-MODEL
 
MOBILE PHONE SENSORS META-MODEL
MOBILE PHONE SENSORS META-MODELMOBILE PHONE SENSORS META-MODEL
MOBILE PHONE SENSORS META-MODEL
 
3. UJRRA_23_26(B).pdf
3. UJRRA_23_26(B).pdf3. UJRRA_23_26(B).pdf
3. UJRRA_23_26(B).pdf
 
A new system to detect coronavirus social distance violation
A new system to detect coronavirus social distance violation A new system to detect coronavirus social distance violation
A new system to detect coronavirus social distance violation
 
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET-  	  App Misbehaviour Check: Development of Virus Modeling, Propagation...IRJET-  	  App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
 
Performance Analysis of Communication Protocols for Post Disaster Communication
Performance Analysis of Communication Protocols for Post Disaster CommunicationPerformance Analysis of Communication Protocols for Post Disaster Communication
Performance Analysis of Communication Protocols for Post Disaster Communication
 
6’APART – A STEP TO PREVENT COVID-19
6’APART – A STEP TO PREVENT COVID-196’APART – A STEP TO PREVENT COVID-19
6’APART – A STEP TO PREVENT COVID-19
 
6’APART – A STEP TO PREVENT COVID-19
6’APART – A STEP TO PREVENT COVID-196’APART – A STEP TO PREVENT COVID-19
6’APART – A STEP TO PREVENT COVID-19
 
Hazard object reporting to respective authorities
Hazard object reporting to respective authoritiesHazard object reporting to respective authorities
Hazard object reporting to respective authorities
 

Recently uploaded

KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
IJNSA Journal
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
ssuser36d3051
 
Wearable antenna for antenna applications
Wearable antenna for antenna applicationsWearable antenna for antenna applications
Wearable antenna for antenna applications
Madhumitha Jayaram
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
anoopmanoharan2
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
gestioneergodomus
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
nooriasukmaningtyas
 
bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
Divyam548318
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
ihlasbinance2003
 
Exception Handling notes in java exception
Exception Handling notes in java exceptionException Handling notes in java exception
Exception Handling notes in java exception
Ratnakar Mikkili
 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
drwaing
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
JamalHussainArman
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
mamunhossenbd75
 
Series of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.pptSeries of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.ppt
PauloRodrigues104553
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
wisnuprabawa3
 

Recently uploaded (20)

KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
 
Wearable antenna for antenna applications
Wearable antenna for antenna applicationsWearable antenna for antenna applications
Wearable antenna for antenna applications
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
 
bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
 
Exception Handling notes in java exception
Exception Handling notes in java exceptionException Handling notes in java exception
Exception Handling notes in java exception
 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
 
Series of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.pptSeries of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.ppt
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
 

Networking smartphones for disaster recovery using teamphone

  • 1. Gadhe Vishal Ashok et al., International Journal of Advance Research, Ideas and Innovations in Technology. © 2017, www.IJARIIT.com All Rights Reserved Page | 27 ISSN: 2454-132X Impact factor: 4.295 (Volume3, Issue6) Available online at www.ijariit.com Networking Smartphones for Disaster Recovery Using Teamphone Abstract: In this paper, we examine how to use networks with smartphones for providing communications in disaster recovery. By lessening the communication gap among different kinds of wireless networks, we have designed and implemented a system called TeamPhone, which provides Android phones the capabilities on communications in disaster helper. TeamPhone consists of two components: a messaging system between rescue worker and the victim and a self-rescue system. The messaging system between rescue worker and victim integrates cellular networking, ad-hoc networking, and opportunistic networking seamlessly, and enables proper communication. The self-rescue system finds different communication network ways for trapped survivors. Such a group of Android phones can cooperatively get a notification and send out emergency messages in an energy-efficient manner with their location and position information so as to help rescue operations. We have implemented TeamPhone as a prototype application on the Android platform and deployed it on all types of smartphones from Samsung to Redmi and others. Results demonstrate that TeamPhone can properly enhance communication requirements and increase the pace of disaster recovery. We are creating three applications with a centralized cloud for communication. First for the admin who will monitor victim and rescue worker on Google map and other two for rescue worker and disaster victim. Keywords: Smartphone, Routing, Disaster Recover, Wifi, Bluetooth, ADHOC, GSM, and GPS. I. INTRODUCTION Today mobile and mobile based applications have become an integral part of our day to day life. With the revolution in mobile computing, many great features were added to the field and the mobiles got smaller, faster and better as the decade passed. It gave rise to the introduction of new mobile-based operating systems where the programmers were presented with an open source operating system named “ANDROID”. With the introduction of android, the programmers were free to program freely and with the much-awaited programming language as the programmers did not have to learn anything new. The android was a handsome mixture of java and mobile computing. Thus a model integration of ANDROID platform with a desktop application can be utilized for disaster management applications and disaster management which can be of many types varying from natural disaster, accident, fire, theft. So we are thinking of in cooperating various constraints in our application like. Vishal Ashok Gadhe Dept. of Computer Science, University of Pune vishalgadhe143@gmail.com Ashwini Subhash Nimse Dept. of Computer Science, University of Pune ashwininimse30@gmail.com Amruta Satish Tanpure Dept. of Computer Science, University of Pune tanpureamruta99@gmail.com P. D. Sinare Dept. of Computer Science, University of Pune pramod.sinare100@gmail.com
  • 2. Gadhe Vishal Ashok et al., International Journal of Advance Research, Ideas and Innovations in Technology. © 2017, www.IJARIIT.com All Rights Reserved Page | 28 Injuries due to accidents are among the leading causes of hospitalization in elderly persons, often resulting in a rapid decline in functionality and death. The fast and unique response can improve the victim's outcome, but this is often lacking when the injured person lives alone and the nature of the injury is so bad to call for help. The lack of efficient disaster management system that will help in times of need. One common scenario during disasters is that the activity of rescue and relief is not well-coordinated. This increases a need for a well-coordinated disaster management system that can be coordinated by a central entity such as administrator using the cloud. Since the use of Android smartphones has attracted millions of people, the disaster management system was implemented as a smartphone application using Google’s Android operating system. The disaster management system uses Google maps to monitor both victim and rescue worker. It finds out the rescue worker which is nearest to the victim and sends him an alert to help the victim. II. LITERATURE SURVEY Considering worldwide systems for emergency reporting regardless of their communication method where it’s wired or wireless, majorly we studied some unique parameters of the systems which will help us to define the strong objectives about our proposed systems. Below listed generation wise systems gives us the fair idea about the survey we had done. A. Closed-Circuit Television (CCTV) Closed-circuit television (CCTV) is the use of cameras and its wired or wireless network to transmit a signal to its DVR. It can be deployed as a point to point or point to multipoint links between camera and monitor. These are mainly used in surveillance areas where they are needed from shops to airports etc. In mechanical and production plants, these video cameras are used to monitor and take decisions accordingly while at one room only. Some places like the heavy heat generated while molding metal or another area where worker can’t sustain that environment that time such CCTV are more useful and most suited one. Depends upon the requirement these CCTV operate continuously or time being to a monitor. Now a day we have advanced Digital Video Recorders (DVRs), which records 24 hours for many years. It can continuously run and record it in some storage like disk or tape. Also, these CCTV supports IP based monitoring and centralized network-based storage such as cloud. Advantage and disadvantage: 1>it can work and may be placed anywhere 2>DVR should always be on. B. Smoke Detectors Smoke detector systems are Emergency detection system in case of fire which generates smoke first. Such detectors are widely used in areas where there are big facilities like factories and hotels. These systems report the issue to some kind of audible alarm to alert public around it. Older smoke detectors were using the physical process of ionization whereas latest technology enables us to use the photoelectric diode sense the smoke in the air and send an alarm after it. In large areas like factories, it runs mainly on the power supply and not on batteries. Advantage and disadvantage: 1>It can detect fire easily and accurately 2>It can do it only once not repeatedly. C. Natural Disaster Monitor App (Developed by Dominic925) This smartphone-based app gives you real-time updates on any global natural calamities like earthquake, tsunami, cyclone, floods, and volcano eruptions on the backdrop of a Google earth map. The app makes use of the alerts published by the Global Disaster Alert and Coordination System (GDACS). The app shows icons on the map with colours- green, orange, and red etc. each indicating the severity of the natural calamity. On clicking the respective icons, the list shows date and time, region, disaster type and other related details of the calamity. Advantage and disadvantage: 1>It shows disasters on Google maps. 2>It cannot help and coordinate and help victims. D. Tsunami Alert (Developed Palta Software) This application is capable and built to help people living along the coastal lines across Pacific and the Indian Ocean, who witnessed the large-scale devastation by the 2004 Tsunami. The main feature of the application is that a user will get real-time updates from US government owned NOAA in every five minutes. It will also give details about the area affected, the location of the earthquake and also provide with tips on how to react to it. In Tsunami Alert app, the user will have the option to select 5 main regions- one US and Canada, Pacific, Hawaii, Indian Ocean and the Caribbean Sea.
  • 3. Gadhe Vishal Ashok et al., International Journal of Advance Research, Ideas and Innovations in Technology. © 2017, www.IJARIIT.com All Rights Reserved Page | 29 Advantage and disadvantage: 1>It gives perfect Tsunami alert 2>It cannot help and coordinate and help victims. E. Help Me Another very important mobile app which deals with disaster environment is called HelpMe. It introduces a new approach to building the ad-hoc network using Wi-Fi to enable Android-based smartphones to communicate during disaster time. It works without the help of any GSM operator, and smartly forwards the message on the hop-to-hop basis. It has centralized HelpMe server to keep a log of all happening about an emergency, once service is restored. This information from a cell phone in knowing whereabouts of the missing person. Advantage and disadvantage: 1>It helps using the AdHoc network. 2>It cannot use any other network. III. PROPOSED SYSTEM Fig. 1 System Architecture Our project can be distributed into three modules: Survivor Registration: In this module a survivor will send name and location to admin using smartphone; Beeper: In this module, if all communication network fails a beeper will be on. GPS: In this module, if GPS is on the correct latitude and longitude will be given to admin. Rescue worker: In this module, the admin will find the nearest rescue worker and notify him the location of the survivor for help AES: In this module, the data on the cloud will be secured using AES (Advanced Encryption Standard) algorithm.
  • 4. Gadhe Vishal Ashok et al., International Journal of Advance Research, Ideas and Innovations in Technology. © 2017, www.IJARIIT.com All Rights Reserved Page | 30 Rescue Worker Registration: In this module a rescue worker will register to admin for helping the survivors; GPS: In this module, if GPS is on the correct latitude and longitude will be given to admin. Map: In this module, the rescue worker can see the survivor on his map and get the correct distance from him and survivor. Notifications: In this module, the admin will send notifications to rescue worker for further help. AES: In this module, the data on the cloud will be secured using AES (Advanced Encryption Standard) algorithm. Desktop: Authentication: In this module, the administrator will authenticate himself using the cloud. Survivor Monitoring: In this module, the admin will continue monitor survivor whereabouts on his map. Rescue Worker Monitoring: In this module, the admin will continue monitor rescue worker and see if he is really near the survivor on the map. Notifications: In this module, the admin will find the nearest rescue worker and send him to the survivor by sending notifications about the location of survivor and alert the survivor that help is coming. AES: In this module, AES algorithm will be used to handle encryption and decryption of data from the cloud. IV. SYSTEM ANALYSIS Fig. 1 System Analysis CONCLUSION In this paper, we propose TeamPhone, which is designed to network smartphones in disaster recovery. TeamPhone includes two components: the messaging system that provides data communications for rescue workers, and the self-rescue system that groups the smartphones of trapped survivors together, energy-efficiently discovers nearby messaging nodes and sends out emergency messages including location and position information. TeamPhone is implemented as a prototype application on the Android platform using the WiFi interface and cellular interface to provide several ways of communications. TeamPhone has been deployed and evaluated on the off-the-shelf smartphones. Register Rescue Worker Get victim Send notification to nearest worker of victim Communicate via BLUETOOTH Communicate via ADHOC Communicate via WIFI Communicate via GOOGLE CLOUD
  • 5. Gadhe Vishal Ashok et al., International Journal of Advance Research, Ideas and Innovations in Technology. © 2017, www.IJARIIT.com All Rights Reserved Page | 31 The evaluation results demonstrate that TeamPhone can accomplish various message transmissions with affordable power consumption and delay, and greatly reduce the energy consumption of sending out emergency messages by grouping and wake-up schedule. REFERENCES [1] K. Lorincz, D. Malan, T. Fulford-Jones, A. Nawoj, A. Clavel, V. Shnayder, G. Mainland, M. Welsh, and S. Moulton, “Sensor networks for emergency response: challenges and opportunities,” Pervasive Computing, IEEE, vol. 3, no. 4, pp. 16–23, 2004. [2] S. George, W. Zhou, H. Chenji, M. Won, Y. O. Lee, A. Pazarloglou, R. Stoleru, and P. Barooah, “Distressed: a wireless ad hoc and sensor network architecture for situation management in disaster response,” Communications Magazine, IEEE, vol. 48, no. 3, pp. 128–136, 2010. [3] G. Zussman and A. Segall, “Energy efficient routing in ad hoc disaster recovery networks,” in Proc. IEEE INFOCOM, 2003, pp.682–691. [4] Official Bluetooth Website. (2015, January). [Online]. Available: http://www.bluetooth.com [5] Lee, L.K. Zachariah, M. Everett, P. “CCTV camera site selection: a field experience”, 6th International VNIS. ‟A Ride into the Future‟, pp.21-27, 1995. [6] Official ELERTS Website. (2013, January). [Online]. Available: http://elerts.com [7] Osnat Mokryn, Dror Karmi, Akiva Elkayam, Tomer Teller “Help Me: Opportunistic Smart Rescue Application and System” The 11th Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net), 2012 [8] “Powerful quake ravages china killing thousands, ”http://www.nytimes.com/2008/05/13/world/asia/13china.html. X. Sun, Z. Lu, W. Hu, and G. Cao, “Symdetector: Detecting sound related respiratory symptoms using smartphones,” in Proc. ACM UbiComp, 2015, pp. 97–108. [9] http://www.ijraset.com/fileserve.php?FID=3773 [10] http://www.coep.org.in/page_assets/341/Emergency_Reporting_Using_Smartphone.pdf