Sei sulla pagina 1di 34

DISASTER MANAGEMENT

www.reavan.com

UNIT TWO : APPLICATION OF TECHNOLOGY IN DRR

As per the Syllabus

According to our Omnibus

Application of various technologies


Data bases RDBMS
Management Information systems
Decision support system and other
systems
Geographic Information systems
Intranets and extranets
Video teleconferencing
Trigger mechanism
Remote sensing-an insight
Contribution of remote sensing and GIS
Case study.

Technologies in Disaster Management


DBMS & RDBMS
MIS
DSS
GIS
Remote Sensing
Intranets, Internets and Extranets
Video Tele Conferencing

TECHNOLOGIES IN DISASTER MANAGEMENT


1. Technology is the practical application of knowledge in a particular area wherein
scientific tools are used to ease human work in terms of rapidity and accuracy.
2. From the Stone Age to the industrial revolution to now, humans have always
shown a fascination towards technology and its enhancement.

3. Today, the human mankind is almost at the helm of technology enhancement


with IT(Information Technology), ICT (Information and Communication
Technology)
Technology)

&

ICST(Information

Communication

and

Space

4. We know that disaster = hazard + vulnerability. The role of technology in


disaster can be envisioned in such a way that it minimizes the hazard and
helps in reduction of vulnerability.
5. The wide spectrum of technologies used in all four phases of disaster
management - preparedness, mitigation, response and recovery are
Remote sensing;
Geographical Information System (GIS);

DISASTER MANAGEMENT

www.reavan.com

Global Positioning System (GPS);


Satellite navigation system;
Satellite communication;
Amateur and community radio;
Television and radio broadcasting;
Telephone and fax;
Cellular phones;
VideoConferencing
Networking Technologies
Internet, e-mail;
On-line management databases,
disaster information systems and networks
Robotics
6. The application of all these technologies in disaster management can be
listed as follows

Setting up disaster early warning system


Quick processing and analysis of disaster system
Database construction; Information integration and analysis
Disaster mapping and scenario simulation;
hazard assessment and monitoring;
disaster trend forecasting;
vulnerability assessment;
emergency response - decision support;
planning of disaster response, reduction, and relief ;
logistics preparation for disaster relief;
search and rescue teams
risk investigation and assessment;

7. The application of technologies are more vital and need to be more


creative in the disaster P phases of prevention(mitigation) and
preparedness than in the disaster R phases response and recovery.
DBMS & RDBMS
* Definition *Technical Information *Applications *Case Studies

1. DEFINITION
DBMS (Database Management System) is a computer based system that is used to
store, manipulate and retrieve data.
In any DBMS, there are three types of data models used to store and retrieve data
namely hierarchical, network and relational models.

DISASTER MANAGEMENT

www.reavan.com

A DBMS that is based on relational model is called as RDBMS (Relational Database


Management Systems). In RDBMS, data is stored in the form of a table, with
relations between data in rows and data in columns of the table.
RDBMS has lead to the evolution of DBMS. All Database systems that are sold in the
market, now- a-days, have either complete or partial implementation of relational
model.
2. TECHNICAL INFORMATION
1. Data Manipulation - While the words store and retrieve associated with DBMS
are well understood, the word Manipulation of data means (a) adding new data
(b) deleting unwanted data and (c) modifying the data
2. Features/Functions of DBMS Any DBMS should have the following general
features or perform the following functions
(a) Support for large amount of data - Each DBMS is designed to support large
amount of data. They provide special ways and means to store and manipulate
large amount of data. Also some of this data will have to be online. The DBMS
should be able to store terabytes of data.
(b)Data sharing, concurrency and locking - DBMS also allows data to be
shared by two or more users. The same data can be accessed by multiple users
at the same time data concurrency. However when same data is being
manipulated at the same time by multiple users certain problems arise. To avoid
these problems, DBMS locks data that is being manipulated to avoid two users
from modifying the same data at the same time.
(c) Data Security - While DBMS allowing data to be shared, it also ensures that
data in only accessed by authorized users. DBMS provides features needed to
implement security at the enterprise level. By default, the data of a user cannot
be accessed by other users unless the owner gives explicit permissions to other
users to do so.
(d)Data Integrity - DBMS provides means to implement rules to maintain integrity
of the data. Once we specify which rules are to be implemented, then DBMS can
make sure that these rules are implemented always. Three integrity rules
domain, entity and referential are always supported by DBMS.
(e) Data Recovery - DBMS also allows recovery in the event of failure. For
instance, if data on the disk is completely lost due to disk failure then also data
can be recovered to the point of failure if proper back up of the data is available.
(f) Support for Languages - DBMS supports a data access and manipulation
language. The most widely used data access language for RDBMS (relational
database management systems) is SQL (Structured Query Language).

DISASTER MANAGEMENT

www.reavan.com

3. DBMS Software
1. Microsoft Access
2. Microsoft SQL
3. Oracle
4. My SQL
5. Open Office Base
6. IBM DB2
7. Filemaker
8. ExtremeDB
4. ACID Rules It is one of the fundamental rules of any DBMS/RDBMS. It is an
acronym for four attributes Atomicity, Consistency, Isolation and Durability. For a
reliable database all this four attributes should be achieved i.e. data written in a
database should conform to four attributes.
Atomicity - Atomicity requires that each data transaction is "all or nothing" i.e. if one
part of the transaction fails, the entire transaction fails and the database state is left
unchanged.
Consistency - The consistency property ensures that any transaction never leaves the
database in a half-finished state.
Isolation - Isolation refers to the requirement that no transaction should be able to
interfere with another transaction.
Durability - Durability means that once a transaction has been committed, it will
remain so, even in the event of power loss, crashes, or errors.
5. Data processing Methods
In a database, Data Processing means retrieving data and deriving information from
data. Depending upon where it is done and how it is done, there are three methods.
Centralized data processing
De-centralized data processing
Distributed data processing

6. Data Models
Data model is a way of storing and retrieving the data. Data models differ in the way
they allow users to view and manipulate the data. There are three different data
models namely
Hierarchical (data is stored in the form of a tree)
Network (data is stored along with pointers)
Relational (data is stored in the form of table)
Needless to say, Relation data model is most successful of all three models. Designed
7. Fundamental Terms in Databases/RDBMS
Data is unprocessed Information. Information is interpreted data.
Database is an organized collection of data

DISASTER MANAGEMENT

www.reavan.com

An entity is any object that is stored in the database.


Tuple/Row is a single row in the table. Each row represents data of a single entity.
Attribute/Column is one that stores an attribute/value of the entity.
A table is a two dimensional array containing rows and columns
A primary key can be defined as a set of columns used to uniquely identify table rows
A foreign key is the key on the many side of the relationship
All the terms can be explained by the following diagrams

DISASTER MANAGEMENT

www.reavan.com

8. Integrity Rules
Data Integrity is one of the most important qualities of any DBMS/RDBMS. It can be
simply defined as the trustworthiness of the data or technically defined as the accuracy
of stored data, indicated by an absence of any alteration in data between two updates
of a data record. In any DBMS/RDBMS, data integrity is to be maintained at any cost. In
this regard, the following integrity rules that are to be followed
Domain integrity - Data is said to contain domain integrity when the value of a
column is derived from the collection of potential values.
Entity integrity - This specifies that all values in primary key must be not null and
unique.
Referential Integrity - This specifies that a foreign key must be either null or must
have a value that is derived from corresponding primary key.
9. Relational Algebra
A set of operators used to perform operations on tables of RDBMS is called as relational
algebra. Operators in relational algebra take one or more tables as parameters and
produce another table as the result. The following are operators in relational algebra:
Union
Intersect
Difference or minus
Project
Select
Join
10.
Structured Query Language (SQL)
Almost all relational database management systems use SQL (Structured Query
Language) for data manipulation and retrieval.
SQL is the standard, non-procedural language, where you need to concentrate on what
you want, not on how you get it.

SQL Commands are divided into four categories, depending upon what they do.
DDL (Data Definition Language) - used to define the data
DML (Data Manipulation Language) - used to manipulate data.
DCL (Data Control Language) - used to control access to data
Query (Retrieving data) used to retrieve data

11.
Database System Design
The design of a database system for RDBMS/DBMS involves the following steps outlined
by the flow chart available in the following page.

DISASTER MANAGEMENT

www.reavan.com

DISASTER MANAGEMENT

www.reavan.com

3. APPLICATIONS OF DBMS/RDBMS in DM
1.
2.
3.
4.
5.
6.

It is the base for other systems like MIS, DSS, GIS etc.
It can be used for creating Disaster Information Software
It can be used for setting up Disaster Information Network
It is essential to send out warning to all people in a vulnerable region
It can provide information on disaster professionals in a particular nation/region
It can be useful for proper accounting of calamity funds in a particular area

4. CASESTUDIES OF DBMS/RDBMS APPLICATIONS IN DM


(A) DesInventar
DesInventar is a disaster management related software that offers a systematic method
for collecting and storing data on the characteristics and effects of different types of
disasters.
The software is used particularly the ones not visible from global and national scales.
This allows for the observation and analysis of accumulated data on these invisible
disasters.
The DesInventar system can also be used to simulate disasters and proceed to study
their impact. For example, it can trigger an earthquake in the virtual environment and
analyze its impact on a geographical area ranging from a municipality to a group of
countries. It can also forecasts information on the possible loss of human lives, impact
on the economy, and damage to infrastructure, etc.
The DesInventar system uses DB2 RDBMS model for maintaining its databases.
It can be used not just by government agencies, but also by NGOs in their disaster
management work
The software has been designed by a Columbia based company and is supported by
ISDR and LARED.
(B) GSTL Tsunami Alert System
A Bangalore-based Geneva Software Technologies Limited (GSTL) has developed a
Tsunami Disaster Information Alert System which sends messages on mobile phones in
any of 14 Indian languages to a tsunami prone area in less than 50 seconds from
receipt of early tsunami warning.
The company has RDBMS ORACLE in which the data regarding the mobile numbers of
all the people living in coastal Tamil Nadu, Andhra and Kerala are registered. Any new
mobile number entry and change in mobile number entry can be done with an SMS
from the respected person followed by authorization.

DISASTER MANAGEMENT

www.reavan.com

The system is designed to reach the maximum people in the minimum time, it is
programmed to help especially the rural people and fisherman community to receive
messages in their local language.
Apart from the SMS facility called as LBLMS Location-Based Language Message
Service, the company also has DVTS Dynamic Voice Translation System to deliver
automated voice calls for illiterate people in the region.
MIS (MANAGEMENT INFORMATION SYSTEM)
* Definition *Technical Information *Applications *Case Studies

1. DEFINITION
Management Information Systems (MIS) is a computer based package, covering the
application of people, technologies, and procedures collectively called information
systems, to solving business problems using easy availability of required information.
Another well used definition of MIS is that MIS is a planned system of collecting,
storing and disseminating information needed to carry out the functions of
management
MIS is also defined by its three words
Management : Management is art of getting things done through and with the people in
formally organized groups
Information : Information is data that is processed and is presented in a form which
assists the end user
System : A system is defined as a set of elements which are joined together to achieve
a common objective.
2. TECHNICAL INFORMATION
1. Objectives of MIS The objectives of MIS are listed as follows
Data Capturing
Processing of Data
Storage of Information
Retrieval of Information
Dissemination of Information

DISASTER MANAGEMENT

www.reavan.com

2. Components of MIS The components of a MIS or pre requisites to establish


an MIS would include
Hardware
Software
People
Database
MIS Architecture and Strategies
3. MIS Software MIS Software should be tailor made. However some of the
popular MIS software adaptable for many applications are listed here
PRISM
EIMS
NSTMIS
4. MIS and ERP, MIS and DSS
ERP (Enterprise Resource Planning) activity and processing based
MIS (Management Information System) is information based

MIS (Management Information System) is basically a kind of link to facilitate


information and communication between managers across different areas in a
business organization. DSS (Decision Support System) is advancement from the
original MIS. The essential difference between the two is in focus. DSS, as the
term indicates, is about taking reliable decisions. MIS, on the other hand, is
about focusing on the actual flow of information itself.

5. INFORMATION TYPES in MIS Any MIS would have to cater to the following
types of information
Planning Information - Certain standard norms and specifications are used in
planning of any activity.
Control Information - Reporting the status of an activity through a feedback
mechanism is called the Controlling Information.
Knowledge Information - A collection of information through the library records and
the research studies to build up a knowledge base as an information is known as
Knowledge Information.
Organization Information - When the information is used by everybody in the
organization, it is called Organization Information.
Functional/ Operational Information - When the information is used in the
operation of a business it is called Functional/Operational Information.

DISASTER MANAGEMENT

www.reavan.com

Database Information - When the information has multiple use and application, it is
called as database information.
6. MIS SYSTEM DESIGN The design and development of MIS for a particular
requirement may follow any one of two basic approaches namely
1. System Development Life Cycle
2. Prototyping
System Development Life Cycle - In order to develop a system successfully, it is
managed by breaking the total development process into smaller basic activities or
phases. Any system development process, in general, is understood to have the
following phases:
i) Systems Planning
ii) Systems Analysis
iii) Systems Design
iv) Systems Implementation
v) Systems Operation and Support
Prototyping is the process of creating an incomplete model of the future full-featured
system, which can be used to let the users have a first idea of the completed program
or allow the clients to evaluate the program. The process of prototyping involves four
steps namely
i) Identify basic requirements.
ii) Develop initial prototype.
iii) Review
iv) Revise and Enhance the Prototype
3. APPLICATIONS OF MIS IN DM

1.
2.
3.
4.
5.
6.

It is essential to establish a DSS (Decision Support Systems)


It can be used for setting up Disaster Information Network
It is used to learn about disasters hazards by a user, at his own pace & peace
It is used for hazard mapping
It can be useful for vulnerability assessment
It can be a very vital component in disaster preparedness plan

4. CASE STUDIES
(A)

VULNERABILITY ATLAS OF INDIA

In 1997 the Government of India, Ministry of Urban Affairs & Employment


constituted an Expert Group to prepare a Vulnerability Atlas taking into account

DISASTER MANAGEMENT

www.reavan.com

three natural hazards which are the most common and damaging to India, namely
earthquakes, cyclones and floods.
The zoning maps on macro level for the three hazards are available on small scale
for the country as a whole. To make this information readily available to the
planners, administrators and disaster managers, these maps were prepared on
larger scale, state-wise, showing all the administrative units, namely, the district
boundaries, for easy identification of the areas covered by the zones of various
intensity levels.
The Vulnerability Atlas contains the following information for each State and Union
Territory of India:
(1) seismic hazard map
(2) cyclone and wind hazard map
(3) flood prone area map
(4) housing stock vulnerability table for each district
The Vulnerability Atlas has been published by the Building Materials and Technology
Promotion Council (BMTPC) and is an important input into the State level Disaster
Management Planning.
Given that a DMIS would require digitization and information collection on key
indicators at various levels, the Atlas is an important step in the establishment of
DMIS and represents the kind of work required to be done in each country.
(B)

INDIA DISASTER RESOURCE NETWORK

India Disaster Resource Network (IDRN), a web based information system, is a platform
for managing the inventory of equipments, skilled human resources and critical supplies
for emergency response.
The primary focus is to enable the decision makers to find answers on availability of
equipments and human resources required to combat any emergency situation. This
database will also enable them to assess the level of preparedness for specific
vulnerabilities.
IDRN is a national initiative collaborated by National Informatics Centre of Government
of India and UNDP. For corporate participation, IDRN has recently collaborated with
BAI(Builders Association of India) and CII(Confederation of Indian Industry)
IDRN has so far more than 80000 records from more than 530 districts
The data are obtained at district levels, digitized and verified at the State Level and
integrated with the national database available with National Informatics Centre and

DISASTER MANAGEMENT

www.reavan.com

Ministry of Home Affairs. The data transfer can be explained through the following
illustration

It can be accessed at www.idrn.gov.in


DSS (DECISION SUPPORT SYSTEM)
* Definition *Technical Information *Applications *Case Studies

1. DEFINITION
Decision Support System can be defined as an integration of computer hardware,
software and methodology that is designed to complement the cognitive thinking of
human beings in their decision making.
It should be understood that DSS supports in the process of decision making and does
not always give a decision it self.
DSS is an application of Hebert Simon model of decision making which marks three
phases namely i) Intelligence ii) Design and iii) Choice.
Intelligence means searching the environment for condition calling for decisions
Design refers to a set of alternative solutions generated and tested for feasibility
Choice is that phase where the decision-maker selects the best solution

DISASTER MANAGEMENT

www.reavan.com

2. TECHNICAL INFORMATION
1. Features of DSS
DSS should be adaptable and flexible.
DSS should be interactive and provide ease of use.
DSS effectiveness balanced with efficiency.
DSS should ensure complete control by decision-makers.
DSS should have unhindered data access.
DSS should be flexible to be standalone, integrated or Web-based
2. Analysis made by DSS
A DSS can perform many types of analysis. The major types of analysis are
What-if analysis (Makes hypothetical changes to problem and observes results)
Simulation analysis (Duplicates features of a real system)
Goal-seeking analysis (Determines problem data required for a given result)
3. Components of DSS
The various components of a DSS are
Hardware Workstation, Memory Devices, Input and Output Devices
Software Database, Data Analysis Capability, Modelbase
Methods Various Analysis Methods mentioned above
In order to manage the above mentioned components, we need the following systems
Database management system (DBMS)
Facilitates the easy flow of required data
Model base management system (MDMS)
Provides decision makers with access to a variety of models
Dialogue manager (DIALOG)
Allows decision makers to easily access and manipulate the DSS

The various components of DSS can be illustrated as shown

DISASTER MANAGEMENT

www.reavan.com

A more specific DSS flow chart with specific reference to disaster management can be
shown below

3. APPLICATIONS OF DSS IN DM
The DSS has its applications on the all four phases namely mitigation, preparedness,
response and recovery.
In mitigation stage, it can be used for (1) safety analysis of a particular hazard (2)
probability of occurrences with adverse effects (3) cost and time constraints analysis
and (4) Alternatives Analysis
In preparedness phase, it can be utilized for (1) inventory analysis of emergency
resources (2) Local Jurisdictions and Legal Provisions analysis (3) cost and schedule
dimensions of preparedness policy and (4) scenario generation for emergency training
In the response stage, it can be used for (1) EOC alert procedures (2) Damage
Reporting Assessment (3) Evacuation Requirements Analysis (4) Imminent danger
conditions and (5) mobilization of resources

DISASTER MANAGEMENT

www.reavan.com

In the recovery phase, it can be utilized for (1) Vulnerability Analysis for the immediate
future (2) What if Analysis of budgetary provisions (3) Task Priority Analysis and (4)
Safety Analysis
4. CASE STUDIES
(A)DSS FOR NATURAL DISASTER MANAGEMENT IN ALLAHABAD
Allahabad has now got the status of Metro-city with a population of over 10 lakhs. It is
essential that a comprehensive plan is needed for natural disasters decision support,
particularly earthquakes.
A GIS based DSS for disaster management can be developed consisting of three
modules, namely, integrated geo-database module; module consisting of disaster
management models; and user-interface module.
The GIS based system can be used as an integrated administrative and decision support
system to respond to the immediate humanitarian and disaster relief operation during
and after the event.

Further, the information required for decision making during any disaster is diverse,
spatial and temporal in nature. Thus, remote sensing technology can be advantageously
used for detailed near real-time monitoring, damage assessment and long-term relief
management.
The various stages involved in the preparation of GIS based DSS for disaster
management for Allahabad include the development of an integrated geo-database
consisting of various thematic maps, demographic data, socio-economic data and
infrastructural facilities at village level under GIS environment.
The various thematic maps include road network map, water supply network map, Fire
control office map, urban sprawl map, drainage map and land use map, among others.
The various utilities like education facilities, medical facilities, electricity, etc. and other
information from Census 2001 available for the district have been represented spatially
using GIS.
A menu driven Graphical User Interface (GUI) has also been developed so that the GIS
based DSS for disaster management can be used by those administrators who may not
have in-depth knowledge of working in GIS. By navigating through GUI, planners with
basic knowledge of computers can work on this system and this is expected to increase
the acceptability of the present system among planners and decision-makers.

DISASTER MANAGEMENT

www.reavan.com

The ArcGIS software and Erdas Imagine software have been used for carrying out the
work in the present study. The GIS based DSS for disaster management proposed for
Allahabad district may be adopted for further implementation by district administrators.

(B) DSS FOR EARLY WARNING, TAIWAN


A Decision Support System for Early Warning (DSSEW) was developed by
NCDR(National Science and Technology Centre for Disaster Reduction), Taiwan for
typhoon hazards.
The DSSEW is designed to integrate the real-time monitoring data, the dynamic hazard
models and Web-GIS technology to provide disaster management decision support tools
for early warning.
The input data of this system includes:
the basic maps
the real-time information of typhoon and rainfall issued by the Central Weather Bureau
the real-time water information form the Water Resources Agency
the hazard maps indicating areas of potential landslide, debris flow and flooding made
by NCDR herself
The results of analysis and warning messages are finally delivered to the Central
Emergency Operations Center (CEOC) and help the commander to make the right
decisions in disaster preparedness and response phases.
The DSS is illustrated as follows

DISASTER MANAGEMENT

www.reavan.com

GIS (GEOGRAPHICAL INFORMATION SYSTEM)


* Definition *Technical Information *Applications *Case Studies

1. DEFINITION
GIS (Geographic Information System) is a computer based system comprising
hardware, software, data, people and methodology that combine to provide answers to
queries of a geographical nature as and when required.

In simple words, GIS can be said as the evolution of maps. It can be referred to as
maps in computers which can be easily loaded with lots of valuable information.
Let's break down the term Geographic Information Systems
Geographic = a location. For example - a highway connecting two cities
Information = information about the location. For example - lanes in the a highway
System = that ties-in the above two
GIS is a unique because it combines location and information about the location. Using
GIS, you can not only see the 'place' but find out more information about the place.
2. TECHNICAL INFORMATION
1. Components of GIS
Any working GIS integrates five key components namely (1) Hardware (2) Software (3)
Data (4)
Methods

People

and

(5)

DISASTER MANAGEMENT

www.reavan.com

Computer Hardware: The general hardware component of a geographical


information system is the computer or work station. It is linked to a disk drive storage
unit like external hard disk drives which provides space for storing data and programs.
A digitizer or scanner is used to convert data from maps into digital form and send
them to computer. A scanner is used for obtaining raster data while a digitizer is a flat
used for vectorisation of any map. A plotter is used to present the result of the data
processing.
Computer Software: The GIS software includes the programs and the user interface
for driving the hardware. GIS software is essential to generate, store, analyze,
manipulate and display geographic information or data. A working GIS software should
require user friendliness, functionalities, compatibilities, updatability, documentation,
and cost effectiveness.
The following is a list of GIS software.
ArcInfo, ArcView (Environmental Systems Research Institute - ESRI)
AutoCAD Maps (Autodesk)
Mapinfo (Mapinfo Corporation)
Microstation (Bentley Systems)
Gram ++ (IIT Mumbai)
Data: Data is the most important component of a GIS. Geographic data (Spatial Data)
and related information data (Aspatial Data) can be collected, compiled and often
stored in a DBMS. The integration of spatial and tabular data stored in a DBMS is a key
functionality afforded by GIS.
People: GIS technology has limited value without the people who manage and develop
plans for applying it to real world problems. GIS users range from technical specialists,
who design and maintain the system, to engineers who provide and verify data and to
those who use it for their everyday work. This is what called 'brain ware' which is
equally important as the Hardware and software..
Methods: A successful GIS operates according to a well designed implementation plan
and business rules, which are the models and operating practices unique to each
organization.
2. Terms used in GIS

DISASTER MANAGEMENT

www.reavan.com

(a) Spatial/Geospatial Data: relating to 'space' or 'location'. E.g. Location of


Coimbatore
(b)Aspatial Data: relating to information about the space or location. E.g.
Population of Coimbatore, land use maps of Coimbatore, streets in Coimbatore
etc.
(c) GPS: Global Positioning System (GPS) is a satellite based system that gives
accurate location information anywhere on earth and can be traced using a
computer.
(d)Raster Data and Vector Data: The raster data formats allow for storing real
world coordinates of each pixel in the data. The vector data allows for storing
real-world objects are represented using points, lines or polygons. All GIS data,
contains two-types of information - location and information about the location.
So vector data will have coordinates (location) and attributes (information about
the location) while raster data will have only coordinates.
(e) Layers: GIS stores information about the world as a collection of thematic layers
that can be linked together. For example, layers of a dam may be soil profile,
groundwater data, hydrological profile,
3. GIS Workflow
The GIS workflow consists of following steps
Data Collection: To build any GIS, we need data. The data is collected, converted to a
convenient format and stored for use in subsequent processes.
Example: If you are building a GIS Disaster Response, one needs data on road
networks in the city, location of hospitals/fire stations/police stations, addresses of
residents etc. Various tools such as GPS devices, Aerial photos, Survey equipment etc.
can be used for data collection

Display and Analysis: The stored data is displayed and analyzed as per requirement.
The data is displayed on a computer screen and the operator gives commands to
perform analysis.
Example: To find the shortest route from a house to the nearest hospital, the operator
analyzes using a route finding algorithm on the roads data and the resulting path is
displayed on the computer screen. Many different types of data is displayed as different
layers and they are analyzed together.

DISASTER MANAGEMENT

www.reavan.com

Sharing: The result of analysis needs to be shared with the decision maker for further
action.
Example: In disaster response, the shortest route found using analysis, can be shared
with the ambulance driver in form of printed or verbal instruction.
3. APPLICATIONS OF GIS IN DM
It is used for hazard mapping
It can be useful for vulnerability assessment
It can be very useful for MIS and DSS
It can be useful for risk assessment in a particular area.
It can be useful for emergency response to locate dangerous points and to find
shortest route for the responders using network analysis.
6. It can be very useful for search and rescue operations in short term emergency
response when coupled with GPS and Remote Sensing
7. It can be useful for live GPS tracking and GIS tools of emergency resources
8. It can be used for finding evacuation routes and choosing emergency operation
centres
9. It is used to organize damage information and evaluation of sites
reconstruction
10.It is used to forecast and simulate disaster occurrences with reference to hazards
in a particular areas
1.
2.
3.
4.
5.

for

4. CASE STUDIES
(A)
Analysis on Damage Areas
Earthquake using GIS

of the Great

Hanshin - Awaji

The Great Hanshin - Awaji Earthquake magnitude with 7.2 on the Richer scale
abruptly occurred breaking the silence of the early morning of 17 January 1995.
More than 5,000 people living in Kobe, Japan were crushed to death.
The purpose of the study is to evaluate the impact from the Great Hanshin-Awaji
Earthquake by using GIS, in order to build a Disaster Management System in the
near future. This will be useful to minimize the casualties from natural disasters and
to facilitate a quick response from the government in the event of such natural
disasters.
The study involved five major steps namely
Identification of Target Location
Base Data Analysis
Comparison of the data before and after damage

DISASTER MANAGEMENT

www.reavan.com

Damage analysis
Study of DMIS development problems
GIS for the disaster is necessary to minimize the casualties from the natural
disasters and to facilitate a quick response from the government in the event of
such natural disasters.
But for developing countries, to digitize all houses in one area is almost impossible.
Due to a lack of housing map, a huge data storage and the cost of those computers
is too expensive compared with the daily cost of living are the reasons why it is
difficult to build a GIS system.

(B) TSUNAMI RISK ANALYSIS & DISASTER MANAGEMENT BY USING GIS


IN TURKEY
Sea disasters, especially tsunamis, can cause loss of lives and property damage
when it comes to shores. Locating the spatial distribution of a catastrophic event like
tsunami and knowing its impact has vital importance in response and recovery
stages in case of disaster. Through disaster mitigation, lives and property can be
saved and environmental damage can be reduced.
In this study, for Gcek Bay, a tsunami simulation has been produced using
NamiDANCE software. The simulation results are used as input to produce
inundation maps to detect the buildings which are possibly prone to inundate in case
of a tsunami. Based on the applied network modeling, the uses of obtained outputs
in the preparation of emergency action plans are discussed.
The main outcomes of the study are determining the inundated buildings and roads
and calculating the optimum routes using GIS to the closest facilities in case of
emergency. The analyses conducted in this study are based on the source data
gathered. These data are integrated with spatial data in order to determine the
optimum routes from inundation zones to safe places, thus an evacuation plan was
assessed.
(C)
VENTEN
It is hard to use disaster information from the satellite image for actual disaster
management without overlaying it to general geographical data. To solve this
problem, GIS professionals in Japan have developed VENTEN (Vehicle through
Electric Network of disaster geographical information) which is available to anyone
and everyone. An Internet-based GIS disaster information system, VENTEN
(Vehicle through Electronic Network of disasTer gEographical informatioN), was
developed to achieve a state of the art disaster management system aided by GIS.

DISASTER MANAGEMENT

www.reavan.com

The objective of the development of the VENTEN system is to provide both a system
and data (including analysis results). This system is designed to be readily used with
a personal computer connected to the Internet and installed with any browser.
Although various organizations were already providing, free or at cost, not only basic
map data including topographic and natural environment information, but also GIS
data, it was necessary to convert the data format to the requirements of the GIS
software in use in order to view and analyze these data.
Therefore, in the development of the VENTEN system, various GIS data were
converted into a VENTEN-compatible format to allow integrated management of
these data and the hardware.
Thus the arrival of VENTEN, an Internet based GIS has made disaster management
easy for not only a disaster manager, but also a layman.
(D) Development of Network Analysis Software - GRAMNET
IIT Mumbai is developing a standalone software package to solve real world
problems in networking including analysis related to resource allocation and routing.
They also plan to integrate this GIS based software with their own GIS software
GRAM (Geo-Reference Area Management) package to enhance its capabilities.
The new software would be called GRAMNET. GRAMNET is a compact tool for
solving network analysis problems (viz.) routing, location and allocation of facilities.
It accepts GRAM compatible .vec coverage files, builds topology and stores it as .sat
file.
The package models real world entities closely through network elements. Network
arcs form the framework of the network model. They represent real world structures
such as highways, transmission lines etc. All discrete locations lie on network nodes.
User can set the environment for network analysis by placing network elements at
desired locations.User can interactively set centers over network nodes before the
demands are allocated to the centers.
GRAMNET provides route, allocation, location/allocation processes. Route generates
optimal routes through user selected sequence of nodes taking care of barriers and
stops. Allocation process allocates the demand nodes to the nearest centres.
Location/allocation process identifies optimal location of centres so that overall
traversal cost from/to demand nodes to their respective centres is minimized.
The software was developed on a trial basis for Bombay Balasino, Chatna Block and
the total Cost of Project worked to roughly 12 lakhs.
REMOTE SENSING

DISASTER MANAGEMENT

www.reavan.com

* Definition *Technical Information *Applications *Case Studies

1. DEFINITION
Remote sensing is the science of acquiring information about the Earth's surface
without actually being in contact with it.
This is done by sensing and recording reflected or emitted energy (data
acquisition) and processing, analyzing, and applying (data processing) that
information.
2. DEFINITION
1. PROCESS
The process of remote sensing involves the following seven elements.

1. Energy Source or Illumination (A) - the first requirement for remote sensing is
to have an energy source which illuminates or provides electromagnetic energy to the
target of interest.
2. Radiation and the Atmosphere (B) - as the energy travels from its source to the
target, it will come in contact with and interact with the atmosphere it passes through.
This interaction may take place a second time as the energy travels from the target to
the sensor.

DISASTER MANAGEMENT

www.reavan.com

3. Interaction with the Target (C) - once the energy makes its way to the target
through the atmosphere, it interacts with the target depending on the properties of
both the target and the radiation.
4. Recording of Energy by the Sensor (D) - after the energy has been scattered
by, or emitted from the target, we require a sensor (remote - not in contact with the
target) to collect and record the electromagnetic radiation.
5. Transmission, Reception, and Processing (E) - the energy recorded by the
sensor has to be transmitted, often in electronic form, to a receiving and processing
station where the data are processed into an image (hardcopy and/or digital).
6. Interpretation and Analysis (F) - the processed image is interpreted, visually
and/or digitally or electronically, to extract information about the target which was
illuminated.
7. Application (G) - the final element of the remote sensing process is achieved when
we apply the information we have been able to extract from the imagery about the
target in order to better understand it, reveal some new information, or assist in solving
a particular problem.
The first four processes together constitute Data Acquisition Process while the last
three processes are called Data Processing Works.
2. ACTIVE AND PASSIVE REMOTE SENSING
As we have seen above, the fulcrum of remote sensing process is the energy source.
The sun provides a very convenient source of energy for remote sensing. The sun's
energy is either reflected or absorbed and then re-emitted, as it is for infrared
wavelengths. Remote sensing systems which use the natural energy source (sun) are
called passive sensors.
Active sensors, on the other hand, provide their own energy source for illumination.
The sensor emits radiation which is directed toward the target to be investigated. The
radiation reflected in microwave wavelengths from that target is detected and
measured by the sensor. Some examples of active sensors are RADAR, LIDAR, Laser
fluorosensor and synthetic aperture radar (SAR). The advantages for active remote
sensing include the ability to obtain measurements anytime, regardless of the time of
day or season.
3. PLATFORMS AND SENSORS
(A) Remote Sensing Platforms: Platforms in Remote Sensing refer to the carriers of
sensors. The platforms can be
Ground-based platforms: ground, vehicles and/or towers (upto 50m)

DISASTER MANAGEMENT

www.reavan.com

Airborne platforms: airplanes, helicopters, high-altitude aircrafts, balloons (upto 50 km)


Spaceborne platforms: from about 100 km to 36000 km
Space shuttle: 250-300 km
Space station: 300-400 km
Low-level satellites: 700-1500 km
High-level satellites: about 36000 km
(B) Remote Sensors: There are many sensors used in remote sensors which can be
presented as follows

3. APPLICATIONS OF REMOTE SENSING IN DM


The various applications of remote sensing can be presented as follows.

DISASTER MANAGEMENT

www.reavan.com

4. CASE STUDIES

(A)

THAMES RIVER STUDY

Among various natural phenomena we get rainfall, snow and four seasons that keep
varying the temperatures, soil moisture and humidity. With lot of land use changes
today, the quantity of overland flow and river flows is not the same and the possibility
of finding a relationship between the urbanization and river flows remote sensing and
Geographic Information Systems (GIS) techniques can be very useful.
Upper Thames River (UTR) watershed was chosen for this case study. This case study
illustrates the process of establishing a relationship between impervious area and river
flows using remote sensing techniques and through analyzing the hydrologic and
meteorological data.
Findings from this case study can be used to form policies on land use planning and
balanced urbanization by the city development, planning and conservation authorities.
Once the affect of urbanization on river flows is quantified, the future trend would
become possible to predict so that measures to cope with increasing demand for
residential/commercial areas can be met without risking the increased intensity and
extent of storm water in rainy periods.
The normally placid Thames was periodically subject to severe flooding which disrupted
the new communities built in the river's extensive floodplains. The study showed that
tremendous urban development has taken place in the watershed over three decades.
Surface water area appeared to be decreasing over the years from 3.65% in 1974 to
2.73% in 2000.
Natural disasters cause damage to life and property all over the world in various forms.
The pressure on the earth's resources caused by increased population has resulted in
increased vulnerability of human and their infrastructure to the natural hazards, which
have always existed. The result is a dynamic equilibrium between these forces in which
scientific and technological development plays a major role. A useful technology like
Remote Sensing can help the disaster mitigation process through better future scenario
predictions.
Such a study can be replicated for a city like Mumbai which is always torn by floods
during every monsoon season.

DISASTER MANAGEMENT

www.reavan.com

(B) RS & GIS IN GANGTOK


Geographic information system (GIS) and remote sensing (RS) are very useful and
effective tools in disaster management. Various disasters like earthquakes, landslides,
floods, fires, tsunamis, volcanic eruptions and cyclones are natural hazards that kill lots
of people and destroy property and infrastructures every year. Landslides are the most
regular geological vulnerabilities in mountain regions, particularly in Sikkim Himalaya.
Remotely sensed data can be used very efficiently to assess severity and impact of
damage due to these disasters. In the disaster relief phase, GIS, grouped with global
positioning system (GPS) is extremely useful in search and rescue operations in areas
that have been devastated and where it is difficult to find ones bearings. Disaster
mapping is the drawing of areas that have been through excessive natural or manmade troubles to the normal environment where there is a loss of life, property and
national infrastructures.
INTRANETS, EXTRANETS AND INTERNETS
* Intranet *Extranet *Internet *Corollary *Applications

1. INTRANET (INTERNAL NETWORK)


This is a network of computers in an organization where data can be shared within the
organization and the connected computers. It cannot be accessed or connected to the
outside world.
For example, consider an office with a few PCs and a few printers all networked
together. The network would not be connected to the outside world. On one of the
drives of one of the PCs there would be a directory of web pages that comprise the
Intranet. Other PCs on the network could access this Intranet by pointing their browser
(Netscape or Internet Explorer) to this directory.

Intranets are normally governed by FTP (File Transfer Protocol)


2. EXTRANET (EXTERNAL NETWORK)
An Extranet is actually an Intranet that is partially accessible to authorized outsiders.
The actual server (the computer that serves up the web pages) will reside behind a
firewall. The firewall helps to control access between the Intranet and Extranet
permitting access to the Intranet only to people who are suitably authorized. The level
of access can be set to different levels for individuals or groups of outside users. The

DISASTER MANAGEMENT

www.reavan.com

access can be based on a username and password or an IP address. Extranets are


normally governed by a modified FTP (File Transfer Protocol) FTP2
3. INTERNET (INTERNATIONAL NETWORK)
Internet is the world-wide network of computers accessible to anyone who knows their
Internet Protocol (IP) address, a unique set of numbers (such as 209.33.27.100) that
defines the computer's location. Most will have accessed a computer using a website
address such as http://www.hcidata.com. Before this named computer can be
accessed, the name needs to be resolved (translated) into an IP address. To do this
your browser (for example Netscape or Internet Explorer) will access a Domain Name
Server (DNS) computer to lookup the name and return an IP address - or issue an error
message to indicate that the name was not found. Once your browser has the IP
address it can access the remote computer. The server may implement security at a
directory level so that access is via a username and password, but otherwise all the
information is accessible.
Internet is governed by HTTP (Hyper Text Transfer Protocol)

4. COROLLARY
The firewall helps to control access between the Intranet and Internet to permit access
to the Intranet only to people who are members of the same company or organization.
If the Intranet network is connected to the Internet, the Intranet will reside behind a
firewall and, if it allows access from the Internet, will be an Extranet.
The differences between the Intranet, Internet and Extranet can be illustrated by the
following diagrams

DISASTER MANAGEMENT

www.reavan.com

5. APPLICATIONS
The applications of these networking technologies in
disaster management can be listed as follows

1. It can be used for easy communication


between disaster managers
2. These technologies are vital to set up a
Disaster MIS, DSS or accessible database
3. They are very essential in setting up a
Disaster Information Network (DIN)
4. The Internet is useful for disaster information
5.
6.
7.
8.

dissemination and early warning


The Intranet and Extranet would help in procurement and processing of data
related to disasters
The Networking technologies can also be very helpful in disaster response
training.
They can be used as a tool to facilitate community based disaster management.
They can be used for a major role in DRR education and awareness
VIDEO TELECONFERENCING
* Definition * Advantages and Disadvantages * Technical Features * Case Study

1. DEFINITION
Video teleconferencing or Videoconferencing is the conduct of a conference by a set of
telecommunication technologies which allow two or more locations to communicate by
simultaneous two-way video and audio transmissions.
2. ADVANTAGES AND DISADVANTAGES
The advantages of video teleconferencing are
No Time Constraint
Video conferencing can be conducted at any time of the day. Time differences between
countries do not matter when people use this method of communication because they
do not actually need to travel to attend meetings.
Saves Time and Money
Transaction of any business requires frequent travel, to facilitate its growth and
diversification. That translates to travel and associated costs like hotel accommodation

DISASTER MANAGEMENT

www.reavan.com

and food expenses. A video conference will keep executives in the office, rather than
sending them halfway across the country for conducting business. As one can conduct
transactions without traveling, it also reduces the time spent in doing so.
Sharing Information is Easy
Video conferencing enables improvisation of operations and services of remote outlets.
As it can also be used to transmit files and documents, it is possible to provide real-time
information, that can help in solving problems. Also, decisions can be made in the least
possible time. The ability to share, coordinate and evaluate digital data from anywhere
in the world allows people to conduct simultaneous communication and collaboration on
time-sensitive projects.
Facilitates Long-distance Programs
Educational institutions, mainly long-distance education programs and instructional
courses, have reaped enormous benefits of video conferencing. Professionals and
students are able to access lectures, study material, group discussions, and even oneto-one talk with the instructor. Video conferencing has taken education into far-flung
corners of the world.
The disadvantages of video teleconferencing are
Technical Problems
The foremost disadvantage of video conferencing are the technical difficulties
associated with smooth transmissions that could result from software, hardware or
network failure. Remote connections are sometimes known to be hampered by
environmental changes. On some occasions, the absence of technical support personnel
creates difficulty for participants who are unfamiliar with the videoconferencing
technological concepts.
Lack of Personal Interaction
Another major drawback is the lack of personal interaction, that sets the tone for many
business meetings in highly cultural societies. A handshake and an eye contact are
essential aspects of many business meetings. Some meetings require a personal touch
to be successful.
High Cost of Setup
Setting up video conferencing in an office can be a bit expensive for small-sized
companies. Simple features can fit into the budget, but if advanced features are
required, then a substantial amount of expenditure must be done.
3. TECHNICAL FEATURES
1. The core technology used in a videoconferencing system is digital compression of
audio and video streams in real time.

DISASTER MANAGEMENT

www.reavan.com

2. The components required for a videoconferencing system include


Codec/decoder
Digital Network
Video input
Video output
Audio input
Audio output
Computer
3. There are basically two kinds of videoconferencing systems namely

Dedicated systems that have all required components packaged into a single piece of
equipment, usually a console with a high quality remote controlled video camera.
Desktop systems are add-ons (hardware boards, usually) to normal PCs, transforming
them into videoconferencing devices. A range of different cameras and microphones
can be used with the board, which contains the necessary codec and transmission
interfaces. Most of the desktops systems work with the H.323 standard.
4. The components within a Conferencing System can be divided up into several
different conference layers: User Interface, Conference Control, Control or Signal
Plane and Media Plane.
User Interfaces could either be graphical or voice responsive. User interfaces for
conferencing have a number of different uses; it could be used for scheduling, setup,
and making the call. Through the User Interface the administrator is able to control the
other three layers of the system.
Conference Control performs resource allocation, management and routing. This layer
along with the User Interface creates meetings (scheduled or unscheduled) or adds and
removes participants from a conference.
Control (Signaling) Plane contains the stacks that signal different endpoints to create a
call and/or a conference. These signals control incoming and outgoing connections as
well as session parameters.
The Media Plane controls the audio and video mixing and streaming. This layer
manages Real-Time Transport Protocols, User Datagram Packets (UDP) and Real-Time
Transport Control Protocols (RTCP). The RTP and UDP normally carry information such
the payload type which is the type of codec, frame rate, video size and many others.

DISASTER MANAGEMENT

www.reavan.com

5. Robust, portable and easy video teleconferencing mechanisms are the order of the
day. With the advent of internet, wireless networks, Mobile phones and applications
like Skype, Google Hangout etc, video teleconferencing has become much cheaper
and simpler. A very simple desktop video teleconferencing system which is
followed these days is illustrated in the following page.

CASE STUDIES
(A) Case Study of the Statewide Telecommunication Network for Disaster
Management in Maharastra

In India, the State of Maharastra established a statewide network of telecommunication


and information technology.
The Network began in April 2000, as part of the Maharastra Emergency Earthquake
Rehabilitation Program following the Latur earthquake (which left more than 10,000
dead and destroyed 200,000 households).
The basic objective of the Network is to provide rapid flow of information, online
connectivity, response planning, operations, control, and monitoring of the disaster
situation.

DISASTER MANAGEMENT

www.reavan.com

This Network consists of an Emergency Operations Center (EOC), Central Control Room
at the Mantralaya,Mumbai (the Secretariat), a standby Control Room at the Center for
Disaster Management, Yashwant Rao Chavan State Academy of Development
Administration Pune,
Control Rooms at each of the six divisional headquarters headed by Divisional
Commissioners, and Control Rooms at each of the 32 districts headed by District
Collectors.
This Network is connected with VSAT telecommunication facilities for data, voice, and
information exchange, as well as video teleconferencing.
In a second level of communication. network, all tahsils (sub-district/blocks) are linked
together through a VHF Wireless Network with nodes of the District Control Room
reaching each tahsil headquarters.
This Telecommunication Network will facilitate teleconferencing among the nodes for
more purposive and successful monitoring and management of disasters. The very high
frequency (VHF) network is used to link the subdistrict headquarters with the respective
district headquarters.
It will take some time to realize the feasibility of this Network and for other States to
follow suit. However, with the implementation of this state-of-the-art network, it will
become possible for the State to collect, collate, and analyze information electronically
on any disaster.
Such a Network will address the online transmission of information on all matters,
pertaining to disaster management.

Potrebbero piacerti anche