enabling open access for flood risk preparedness
DESCRIPTION
Research into open architectures for providing sensor data to help with flood preparednessTRANSCRIPT
- 1. Enabling Open Access for Flood Risk Preparedness Terence van Zyl, et.al. Presented by: Graeme McFerren
2. Content
- Introduction
3. Risk Preparedness and the Sensor Web 4. The Requirements 5. Architecture for and Open Risk System 6. Continued Research Content 7. Informal Settlements
- A challenge for the emerging economy
8. Development are characterised by:
- Rapid Changes, (Expansion and contraction)
9. Unstructured 10. Unplanned Introduction 11. Floods in Africa
- SA 927, 710 people affected since October 2007
12. The effects go beyond death and extend to quality of life Introduction 13. Flood Preparedness
- Detect Informal Settlements
14. Acquire 50/100 year flood lines 15. Continuous analyses to raise an alert when they coincide with flood lines Floods Preparedness 16. The Sensor Web An open complex adaptive system organised as a network of open sensor resources, which pervades the internet and provides external access to sensor resources. By open sensor resources, we include any open system, including sensor networks that are a source of sensor data or sensor meta-data (van Zyl, Simonis, and Mcferren, 2008). The Sensor Web 17. The Sensor Web 18. The Use Cases Requirements 19. Non-Functional Requirements
- The system should be open
- Provide open access to data
20. Standards such as OGC The system should be web based
- Increased systemaccessibility
The system should be adaptive
- Respond to changes in environment
Requirements 21. Architecture
- Data View
- Flood Lines
22. Informal Settlements Services View
- Informal Settlement SOS, SPS
23. Flood-lines SOS 24. Risk SOS and SAS Architecture 25. GEOSS The System of Systems Approach Where a system is a collection of components Architecture 26. Continued Research
- Implementation in progress
27. Mechanism to automatically and continuously arrive at flood-lines using DEM and GRID 28. Attaining community buy in untrusted technologies Continued Research 29. Thank-You Questions? Please email me. [email_address]