A Survey on Smartphones Systems for Emergency Management (SPSEM)
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 6
Abstract
Emergency never runs with earlier intimations and indications. In the real world and practical life, detecting and perceiving such emergencies and reporting them are a genuine test and tough challenge. Smartphones Systems for Emergency Management (SPSEM) provide details of existing emergency applications and provide a new direction to overcome the traditional problem having manual intercession and reporting emergencies. In this paper, we provide a comprehensive overview of SPSEM. We elaborate how embedded sensors automate the procedure of emergency crisis detection and responding. Furthermore, we critically evaluate the operations, benefits, limitations, emergency applications and responsiveness in any emergency crisis of different approaches. We provide an easy and concise view of the underlying model adapted by each SPSEM approach. In last, we estimate the future utility and provide an insight of upcoming trends in SPSEM.
Authors and Affiliations
Hafsa Maryam, Munam Shah, Qaisar Javaid, Muhammad Kamran
Age Estimation Based on AAM and 2D-DCT Features of Facial Images
This paper proposes a novel age estimation method - Global and Local feAture based Age estiMation (GLAAM) - relying on global and local features of facial images. Global features are obtained with Active Appearance Model...
Database Preservation: The DBPreserve Approach
In many institutions relational databases are used as a tool for managing information related to day to day activities. Institutions may be required to keep the information stored in relational databases accessible becau...
A Systematic Report on Issue and Challenges during Requirement Elicitation
We say that researchers made a lot of contribution in requirement engineering by introducing many helpful tools and efficient methods for Requirement Engineering (RE) but simultaneously this field demands more research t...
Risk Propagation Analysis and Visualization using Percolation Theory
This article presents a percolation-based approach for the analysis of risk propagation, using malware spreading as a showcase example. Conventional risk management is often driven by human (subjective) assessment of how...
Iterative Learning Control for Trajectory Tracking of Single-link Flexible Arm
This paper focuses on the issue of tracking the trajectory of a flexible arm. The purpose is to ensure the flexible arm follows the desired path in the joint space. To achieve our objective, we have three problems to sol...