Data Taxonomy Towards the Applicability of the Digital Twin Conceptual Framework in Disaster Management
- URL: http://arxiv.org/abs/2503.00076v1
- Date: Thu, 27 Feb 2025 21:08:03 GMT
- Title: Data Taxonomy Towards the Applicability of the Digital Twin Conceptual Framework in Disaster Management
- Authors: Eva Brucherseifer, Marco Marquard, Martin Hellmann, Andrea Tundis,
- Abstract summary: The Digital Twin (DT) offers a novel approach to the management of critical infrastructures.<n>The increasing complexity and interconnectedness of these infrastructures necessitate the development of robust disaster response and management strategies.<n>This research introduces a taxonomy and similarity function for comparing data sources based on their features and vulnerability to crisis events.
- Score: 0.562479170374811
- License: http://creativecommons.org/licenses/by-sa/4.0/
- Abstract: The Digital Twin (DT) offers a novel approach to the management of critical infrastructures, including energy, water, traffic, public health, and communication systems, which are indispensable for the functioning of modern societies. The increasing complexity and interconnectedness of these infrastructures necessitate the development of robust disaster response and management strategies. During crises and disasters, data source availability for critical infrastructure may be severely constrained due to physical damage to communication networks, power outages, overwhelmed systems, sensor failure or intentional disruptions, hampering the ability to effectively monitor, manage, and respond to emergencies. This research introduces a taxonomy and similarity function for comparing data sources based on their features and vulnerability to crisis events. This assessment enables the identification of similar, complementary, and alternative data sources and rapid adaptation when primary sources fail. The paper outlines a data source manager as an additional component for existing DT frameworks, specifically the data ingress and scenario mangement. A case study for traffic data sources in an urban scenario demonstrates the proposed methodology and its effectiveness. This approach enhances the robustness and adaptability of DTs in disaster management applications, contributing to improved decision-making and response capabilities in critical situations.
Related papers
- Towards Robust Stability Prediction in Smart Grids: GAN-based Approach under Data Constraints and Adversarial Challenges [53.2306792009435]
We introduce a novel framework to detect instability in smart grids by employing only stable data.
It relies on a Generative Adversarial Network (GAN) where the generator is trained to create instability data that are used along with stable data to train the discriminator.
Our solution, tested on a dataset composed of real-world stable and unstable samples, achieve accuracy up to 97.5% in predicting grid stability and up to 98.9% in detecting adversarial attacks.
arXiv Detail & Related papers (2025-01-27T20:48:25Z) - Simulation of Multi-Stage Attack and Defense Mechanisms in Smart Grids [2.0766068042442174]
We introduce a simulation environment that replicates the power grid's infrastructure and communication dynamics.
The framework generates diverse, realistic attack data to train machine learning algorithms for detecting and mitigating cyber threats.
It also provides a controlled, flexible platform to evaluate emerging security technologies, including advanced decision support systems.
arXiv Detail & Related papers (2024-12-09T07:07:17Z) - Hypergame Theory for Decentralized Resource Allocation in Multi-user Semantic Communications [60.63472821600567]
A novel framework for decentralized computing and communication resource allocation in multiuser SC systems is proposed.
The challenge of efficiently allocating communication and computing resources is addressed through the application of Stackelberg hyper game theory.
Simulation results show that the proposed Stackelberg hyper game results in efficient usage of communication and computing resources.
arXiv Detail & Related papers (2024-09-26T15:55:59Z) - Enhancing Trustworthiness and Minimising Bias Issues in Leveraging Social Media Data for Disaster Management Response [0.1499944454332829]
Leveraging real-time data can significantly deal with data uncertainty and enhance disaster response efforts.
Social media appeared as an effective source of real-time data as there has been extensive use of social media during and after the disasters.
It also brings forth challenges regarding trustworthiness and bias in these data.
We aim to investigate and identify the factors that can be used to enhance trustworthiness and minimize bias.
arXiv Detail & Related papers (2024-08-15T10:59:20Z) - CrisisSense-LLM: Instruction Fine-Tuned Large Language Model for Multi-label Social Media Text Classification in Disaster Informatics [49.2719253711215]
This study introduces a novel approach to disaster text classification by enhancing a pre-trained Large Language Model (LLM)<n>Our methodology involves creating a comprehensive instruction dataset from disaster-related tweets, which is then used to fine-tune an open-source LLM.<n>This fine-tuned model can classify multiple aspects of disaster-related information simultaneously, such as the type of event, informativeness, and involvement of human aid.
arXiv Detail & Related papers (2024-06-16T23:01:10Z) - Emergency Computing: An Adaptive Collaborative Inference Method Based on
Hierarchical Reinforcement Learning [14.929735103723573]
We propose an Emergency Network with Sensing, Communication, Computation, Caching, and Intelligence (E-SC3I)
The framework incorporates mechanisms for emergency computing, caching, integrated communication and sensing, and intelligence empowerment.
We specifically concentrate on emergency computing and propose an adaptive collaborative inference method (ACIM) based on hierarchical reinforcement learning.
arXiv Detail & Related papers (2024-02-03T13:28:35Z) - Analysis and Optimization of Wireless Federated Learning with Data
Heterogeneity [72.85248553787538]
This paper focuses on performance analysis and optimization for wireless FL, considering data heterogeneity, combined with wireless resource allocation.
We formulate the loss function minimization problem, under constraints on long-term energy consumption and latency, and jointly optimize client scheduling, resource allocation, and the number of local training epochs (CRE)
Experiments on real-world datasets demonstrate that the proposed algorithm outperforms other benchmarks in terms of the learning accuracy and energy consumption.
arXiv Detail & Related papers (2023-08-04T04:18:01Z) - Detecting Vulnerable Nodes in Urban Infrastructure Interdependent
Network [30.78792992230233]
We model the interdependent network as a heterogeneous graph and propose a system based on graph neural network with reinforcement learning.
The presented system leverages deep learning techniques to understand and analyze the heterogeneous graph, which enables us to capture the risk of cascade failure and discover vulnerable infrastructures of cities.
arXiv Detail & Related papers (2023-07-19T09:53:56Z) - On Telecommunication Service Imbalance and Infrastructure Resource
Deployment [95.80185574417428]
We propose a fine-grained and easy-to-compute imbalance index, aiming to quantitatively link the relation among telecommunication service imbalance, telecommunication infrastructure, and demographic distribution.
Based on this index, we also propose an infrastructure resource deployment strategy by minimizing the average imbalance index of any geographical segment.
arXiv Detail & Related papers (2021-04-08T17:45:32Z) - Improving Community Resiliency and Emergency Response With Artificial
Intelligence [0.05541644538483946]
We are working towards a multipronged emergency response tool that provide stakeholders timely access to comprehensive, relevant, and reliable information.
Our tool consists of encoding multiple layers of open source geospatial data including flood risk location, road network strength, inundation maps that proxy inland flooding and computer vision semantic segmentation for estimating flooded areas and damaged infrastructure.
These data layers are combined and used as input data for machine learning algorithms such as finding the best evacuation routes before, during and after an emergency or providing a list of available lodging for first responders in an impacted area for first.
arXiv Detail & Related papers (2020-05-28T18:05:08Z) - Data Mining with Big Data in Intrusion Detection Systems: A Systematic
Literature Review [68.15472610671748]
Cloud computing has become a powerful and indispensable technology for complex, high performance and scalable computation.
The rapid rate and volume of data creation has begun to pose significant challenges for data management and security.
The design and deployment of intrusion detection systems (IDS) in the big data setting has, therefore, become a topic of importance.
arXiv Detail & Related papers (2020-05-23T20:57:12Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.