Civil Defence Command Centers for New Century (Emergency Operation Center) By: Dr Rahul Ralegaonkar BACKGROUND • Frequency of disasters- growing vulnerability, and changing climate patterns. • Breaking the cycle of destruction and reconstructionAddress the root causes of vulnerability. • Causes of vulnerability- Rapid and uncontrolled urbanization, mismanagement of natural resources, inefficient public policies, and lagging & misguided investments in infrastructure. Disasters: Natural & Man-Made Disaster Assessment: Natural & Man-Made Earthquakes: Mapping geological lineaments land use, Geodynamic measurements of strain accumulation, Locate stricken areas, map damage Flash floods: Land use maps, Local rainfall measurements, Map flood damage, Major floods, Flood plain maps; Land use maps, Regional rainfall; Evapotranspiration, Map extent of floods Cyclones: Synoptic weather forecasts, Map extent of damage, Tornadoes Drought: Long ranged climate models, Monitoring vegetative biomass Volcanic eruptions: Topographic and land use maps, Detection/ measurement of gaseous emissions, Mapping lava flows, ash falls and lahars, map damage Landslides: Topographic and land use maps, Rainfall, slope stability, Mapping slide area Storm surge: Land use and land cover maps, Sea state; ocean surface wind velocities, Map extent of damage Nowcasts: local weather Local weather observations, Map amount, extent of damage Need for Planning • Disaster Planning- Predicting the risk of an event and possible impacts of the event to human life, property, and the environment. • Disaster Modeling- allows disaster managers to view the scope of a disaster, where the damage may be the greatest, what lives and property are at highest risk, and what response resources are required where. (i) Hazard assessment and vulnerability analysis (ii) Mitigation and preparedness (iii) Pre-disaster phase (iv) Response (v) Loss and damage assessment (vi) Rehabilitation and reconstruction Disaster Management Stages Mitigation and Prevention: Actions you take to identify preventable and unavoidable disasters and to address what can be done to eliminate or reduce the likelihood of a disaster and/or its accompanying risks Preparedness: Consideration of worst-case scenarios and development of comprehensive plan for coordinated and effective response to any given disaster Response: Execution of the preparedness plan and management of the disaster Recovery: Efficient and timely restoration of mission-critical operations and processes Disaster Management-Goals • Response requirements, protection needs can be determined for areas at highest risk. • Emergency disaster management requires response, incident mapping, establishing priorities, developing action plans, and implementing the plan to protect lives, property, and the environment. – Disaster managers should have quickly access and visual display of critical information by location. This information facilitates the development of action plans that are printed or transmitted to disaster response personnel for the coordination and implementation of emergency efforts. • Records Management Record keeping is the most critical task for disaster management. Claims, status of repairs, required repair work, personnel, and so forth, can be difficult to maintain and account for. An example- Earthquake Damage Prediction • Locate the epicenter and Intensity of earthquake. • Damaged area distance from the epicenter- demarcate a severely damaged area ,moderate damaged, and least affected area with the help of images. • Based on above information we need to provide a base relief operation. Area which needs most quicker relief, Man-power, Shortest route to provide medical facility, Food, shelter, and other basic needs. • Transportation: roads / highways / public transportation / airport /seaport • Parcels: building footprint and typology • Infrastructure: utilities / water and wastewater / power supply and electricity • Landscape features: water bodies / open spaces / slope and terrain / soil types. • Major population centers: hospitals / stadiums / schools and universities / movies theaters / shopping centers. • Population growth will be factored to establish a set of scenarios outlining the future regional structure, indicating some preliminary preferences. – Some form of government intervention is required here to guide the planning team on the desired growth pattern to be implemented. Emergency (E) Management- better prepared, respond faster and recover more quickly. • E Team provides a common operational view of an incident such that all parties involved in the response are in full coordination. • • • • • • • • E Team assists with: Tracking & managing incidents & events Gathering & sharing critical information Assessing impact on critical infrastructure Determining response capabilities across organizations Notifying & alerting key parties involved in the response Executing procedures & protocols Coordinating a multi-agency response Requesting, deploying & tracking resources Departments and Roles THIS INFORMATION COMES FROM MANY DIFFERENT SOURCES AND AT PRESENT IT IS DIFFICULT TO BRING IT ALL TOGETHER- Develop a culture of selfreliance. Organizational Roles 1. Organize the Planning Process 2. Disaster Defined 3. Data Collection & Documentation addressed 4. Recovery Strategies assessed / reviewed 5. Customize & Finalize the Plan 6. Test & Maintain the Plan 7. Performing a Risk Assessment 8. Format of the Disaster Recovery Plan 9. Identify Incident Response Team and Chain of Command 10. Provide Resources 11. Develop a Staged Shutdown 12. Coordinating With Partners 13. Conduct periodic audits of the plan EMERGENCY OPERATION CENTER (EOC) An EOC is the physical location where organizations comes together during an emergency to coordinate response and recovery actions and resources. Serves a number of purposes including operations, training, meetings and other uses. EOC- Flexible, interoperable, secure software system that will make life much easier regardless of size and complexity of disaster. - Information sharing (Multiagency Coordination Systems) and decision making Advantages: 1. Good information management tool (Contingency managers can create and organize their plans) 2. Incident Command System (ICS) (Conduct of emergency operations by providing a management structure and system) 3.Proper coordination of information management (optimize communication), decisions and resources facilitation. EOC-Resource Management – Establishing systems for describing, inventorying, requesting and tracking resources – Activating the systems prior to, during and after an incident – Dispatching resources prior, during and after an incident – Deactivating or recalling resources during or after an incident Data forms: Forms, Reports, Charts, Checklist, Massage, Weather Service, Common alerting protocol, Pocket PC compatible, Map Support, Web based, Client Server Technology, Simulation, Security, Data Linking. Development of standards, including: • Training • Equipment Certifications • Experience • Credentialing • Currency requirements • Physical and medical fitness EOC Organization EOC Manager Coordination Communications Resource Management Information Management Coordination Other Multiagency Coordination Entities Multiagency Coordination Entity Incident Command/ Unified Command 1 Situation status Resource needs Incident Command/ Unified Command 2 Resources Priorities Strategic coordination Unified Command (Representatives From Local Jurisdictions) Operations Planning Logistics Finance/ Administration EOC- Joint Information Centre (JIC) Joint Information Center Press Secretary (jurisdictional) Research Team Liaison (as required) Media Team Logistics Team State JIC Local JIC 1 Agency 1 PIO Local JIC 2 Must follow established JIC protocols IC/UC/Area Command PIO (at incident JIC) Agency 2 PIO Paper-Based Emergency Information Management • System: If electronic emergency information systems are not available, paper logs will be used to record events, communications & messages, damage assessments, situation reports, resources utilized, man-hours expended, etc. • Record Storage: Hard copy data will be stored in a secure location EOC Design Components A state-of-the-art EOC may have computer generated displays projected on several contiguous large screens located along a wall. These projections can integrate status boards, maps, charts, briefing slides, CCTV, Video teleconferencing, TV (weather channel/CNN), live plume models, plans, procedures, checklists, etc. • • • • • • Hardware Software Communications Facilities People Other resources E-management resources - The internet/intranet - voice and video teleconferencing (recorded) - phones with lights instead of ringers and, headsets for hands free operation - automated displays featuring status boards and maps with motion - raised access flooring for easy installation of telecommunications - acoustic walls and ceilings, and static-free carpeted floors - task lighting at each position - large screen room displays in virtual windows - systems furniture including ergonomic chairs - digital clock systems (accurate to a millisecond) - cameras and video recording - automated checklists and forms and computerized reference documents - human factored lighting and colors - mission driven seating configurations - Decision-makers that are facing away from traffic flow within the room Public Safety Answering Point (PSAP Center): • A PSAP is a 24X7 operation that typically has two critical activities or areas we can refer to as the "dispatcher area" (where the Call Takers and/or Dispatchers are located) and the "equipment room" (where the critical systems are housed). • The PSAP serves as the focal point for high density communications utilizing phones, radios, speakers, position-to-position voice communications and occasional foot traffic from shift changes, visitors, etc. Virtual EOC • Two-way audio-vidual communications…a structured mechanism for receiving and sending information. • Automated response and recovery checklists... • Alert notifications… EOC Decision Making Strong management will be needed during EOC operations. EOCs should be activated as soon as possible to ensure that rapid decision making can occur. During the incident response phase, the real-time tracking of incidents and response resources is critical. Resources may be in short supply while multiple requests for services pile up. An operations log capability in needed to fulfill the requirement of documenting, tracking, and managing the response to an infinite number of concurrent incidents. Typical Status Board Displays: Chronological, "Timeline" or "Significant Events" This display records all reports entered into the system that meet the criteria for entry. Reports are posted in the order received and are referenced by the Time of Receipt (TOR). Typically, the Time of Occurrence (TOC) is recorded in the narrative. If you had only one status board this is the one you would need. These displays can be filtered and sorted as well. Multiple chronological displays can be maintained. Examples are: A log of all reports to the system can be maintained; a log of “Significant Events” can be maintained; a log of reports by category can also be maintained. Categorical Displays help us manage high volume information flow by breaking it down into functional groups. Multi Input Displays Video windowing processors (or multiviewers) with multiple window display, picture-in-picture, split screen, and full screen modes. Input NTSC/PAL, S-Video, component, HDTV and RGB/DVI signals up to 1920 x 1200 pixel resolution for the intelligent display of multimedia information. Video Walls Multi screen displays offers installation, and 24/7 reliability. real time performance, easy Recording Computer and other imagery may be recorded in a variety of digital and analog formats, JPEG 2000, MPEG-2, and broadcast video. Video Transmission & Streaming For mission critical applications where maintaining the highest possible signal quality is required. PHOTONICS is being studied today as a possible alternate technology for the future. Investigations are on to harness the capability of the photon to carry information and energy. Fortunately, success has already been achieved in the area of communications. Optical fibers, not copper cables, are already being used to carry huge amounts of information across the great oceans. Even the internet cables around us are now optical and not electronic. However, communication is only one of the three `C' s, that has been taken care of, the other two being computing and control. Photonic switches and optical computers are still in the laboratories and not yet in the marketplace. The major bottleneck in this area is not in solving technological problems or in perfecting theoretical understanding, but in developing suitable materials. Photonics is the science of generating, controlling, and detecting photons, particularly in the visible and near infra-red spectrum, but also extending to the ultraviolet (0.2 - 0.35 µm wavelength), longwave infrared (8 - 12 µm wavelength), and far-infrared/THz portion of the spectrum (e.g., 2-4 THz corresponding to 75-150 µm wavelength) where today quantum cascade lasers are being actively developed. Photonics is an outgrowth of the first practical semiconductor light emitters. • Semiconductor photonic devices include optical data recording, fiber optic telecommunications, laser printing (based on xerography), displays, and optical pumping of high-power lasers. • The potential applications of photonics are virtually unlimited and include chemical synthesis, medical diagnostics, on-chip data communication, laser defense, and fusion energy, etc. The Nature of Optical Nonlinearity • Spectroscopic characterization and analysis of materials using the techniques of optical absorption, luminescence, Raman scattering are standard techniques in research. These studies help in structure analysis and in understanding the electronic processes and energy levels in systems. Several interesting photochemical processes and reactions such as photosynthesis have attracted the attentions of Materials Scientists and Biologists. The advent of lasers has revolutionized optical technology including spectroscopic instrumentation. • The high intensity radiation from lasers is also capable of causing new processes to occur in materials. In such cases, most of the materials can have a `nonlinear interaction' with the electric field. The nonlinear interaction results in several novel processes, which have the potential for communication, control and computing applications. VME Boards For a mobile system or other environment where space is an issue, a board-level version of multi-input display processors may be more appropriate than a stand alone peripheral. Scan Converters Video scan conversion offering broadcast quality NTSC/PAL, S-Video, CCIR 601, etc. Universal Scalers Improve the quality of projected video by scaling the input signal to match the native resolutions of any projector. Overlayers/Keyers Overlayers are used to combine images, e.g. a HUD on a OTW display for simulators, with all or part of one visible over the other. The product offers a variety of features and capabilities, including single line overlay accuracy, extractions, and independent input and output resolutions up to 1900x1200 pixels. RGB Matrix Switchers Routing Switchers are the perfect solutions for high demand, mission critical applications where maintaining the highest possible signal quality is required. These systems provide modular configurations that allow the combination of signal types (RGB/Audio/Composite/Component/SVideo) in a single chassis. DVI Matrix Switchers DVI Routing Switchers are the perfect solutions for mission critical applications where maintaining the highest possible signal quality is required. The portable outdoor Pan Tilt Zoom Monitoring and Recording system The system comes with four compact 12VDC OPTZ cameras, facilitating rapid deployment on the 9 foot tripods. The VIPER4-R has a fully integrated rugged control case with a 15” LCD Monitor and built-in 160GB digital video recorder. powervideoThe cables are supplied on reels to allow quick deployment and easy storage. Encrypted Secure Wireless Video Transmission with a range of up to 1 mile. 12VDC or AC powered. The system is powered from a single power input ( AC or DC ) which is distributed through the control case and to the cameras or optional wireless receivers. The system flexibility can be optionally expanded for remote wireless use with the 12VDC 5.8Ghz The VIPER4-R Shown Hardwired (Optional Wireless ) Networking • Networking is a complex part of computing that makes up most of the IT Industry. Without networks, almost all communication in the world would cease to happen. It is because of networking that telephones, televisions, the internet, etc. work. • One way to categorize computer networks are by their geographic scope, although many real-world networks interconnect Local Area Networks (LAN) via Wide Area Networks (WAN). Router: A router is a device that determines the proper path for data to travel between different networks, and forwards data packets to the next device along this path. They connect networks together; a LAN to a WAN for example, to access the Internet. Some units, like the Cisco 1800 (pictured), are available in both wired and wireless models. Modem: Short for modulator-demodulator. A modem is a device or program that enables a computer to transmit data over, for example, telephone or cable lines. Computer information is stored digitally, whereas information transmitted over telephone lines is transmitted in the form of analog waves. A modem converts between these two forms. Fortunately, there is one standard interface for connecting external modems to computers called RS-232. Consequently, any external modem can be attached to any computer that has an RS-232 port, which almost all personal computers have. There are also modems that come as an expansion board that you can insert into a vacant expansion slot. These are sometimes called onboard or internal modems. Switches: • A network switch is a computer networking device that connects network segments. A network card, network adapter or NIC (network interface card) is a piece of computer hardware designed to allow computers to communicate over a computer network This switch has 48 ports Low-end network switches appear nearly identical to network hubs, but a switch contains more "intelligence" (and a slightly higher price tag) than a network hub. Network switches are capable of inspecting data packets as they are received, determining the source and destination device of that packet, and forwarding it appropriately. By delivering each message only to the connected device it was intended for, a network switch conserves network bandwidth and offers generally better performance than a hub. As with hubs, Ethernet implementations of network switches are the most common. Mainstream Ethernet network switches support either 10/100 Mbit/s or 10/100/1000 Mbit/s ports Ethernet standards. Large switches may have 10 Gbit/s ports. The network switch, packet switch (or just switch) plays an integral part in most Ethernet local area networks or LANs. Networking: • Computer networking is the engineering discipline concerned with communication between computer systems or devices. • Communicating computer systems constitute a computer network and these networks generally involve at least two devices capable of being networked with at least one usually being a computer. The devices can be separated by a few meters (e.g. via Bluetooth) or nearly unlimited distances • A computer network is any set of computers or devices connected to each other. Examples of networks are the Internet, or a small home local area network (LAN) with two computers connected with standard networking cables connecting to a network interface card in each computer. All modern aspects of the Public Switched Telephone Network (PSTN) are computercontrolled, and telephony increasingly runs over the Internet Protocol, although not necessarily the public Internet. Local Area Network (LAN) • A Local Area Network is a network that spans a relatively small space and provides services to a small amount of people. Depending on the amount of people that use a Local Area Network, a peer-to-peer or client-server method of networking may be used. A peer-to-peer network is where each client shares their resources with other workstations in the network. A Local Area Network is a network that spans a relatively small space and provides services to a small amount of people. Depending on the amount of people that use a Local Area Network, a peer-to-peer or client-server method of networking may be used. A peer-to-peer network is where each client shares their resources with other workstations in the network. Wide Area Network (WAN) A Wide Area Network is a network where a wide variety of resources are deployed across a large domestic area or internationally. An example of this is a multinational business that uses a WAN to interconnect their offices in different countries. The largest and best example of a WAN is the Internet, which is the largest network in the world. The PSTN (Public Switched Telephone Network) also is an extremely large network that is converging to use Internet technologies, although not necessarily through the public Internet. Wireless Networks (WLAN, WWAN) • A wireless network is basically the same as a LAN or a WAN but there are no wires between hosts and servers. The data is transferred over sets of radio transceivers. These types of networks are beneficial when it is too costly or inconvenient to run the necessary cables. Types of connectivity: • Wi-Fi: • Wi-Fi is a wireless technology brand owned by the Wi-Fi Alliance intended to improve the interoperability of wireless local area network products based on the IEEE 802.11 standards. • A Wi-Fi enabled device such as a PC, cell phone or PDA can connect to the Internet when within range of a wireless network connected to the Internet. The area covered by one or several interconnected access points is called a hotspot. Hotspots can cover as little as a single room with wireless-opaque walls or as much as many square miles covered by overlapping access points. Wi-Fi can also be used to create a mesh network. Both architectures are used in community networks. Advantages of Wi-Fi • Wi-Fi allows LANs to be deployed without cabling for client devices, typically reducing the costs of network deployment and expansion. Spaces where cables cannot be run, such as outdoor areas and historical buildings, can host wireless LANs. • As of 2007 wireless network adapters are built into most modern laptops. The price of chipsets for Wi-Fi continues to drop, making it an economical networking option included in ever more devices. Wi-Fi has become widespread in corporate infrastructures, which also helps with the deployment of RFID technology that can piggyback on Wi-Fi VPN: • A virtual private network (VPN) is a communications network tunneled through another network, and dedicated for a specific network. One common application is secure communications through the public Internet, but a VPN need not have explicit security features, such as authentication or content encryption. VPNs, for example, can be used to separate out the traffic of different user communities over an underlying network with strong security features. • Connectivity to Internet • Dialup • Broad Band • Lease Line • Cable net • • • Other types of computer network As your business develops, you might wish to consider other networks such as wide area networks (WANs), virtual private networks (VPNs), intranets and extranets. These networks each offer different business benefits, such as linking together systems in different offices, allowing remote workers to access your office systems securely, or providing up-to-date information for your staff and business partners. WANs are used by companies with offices at different locations. The WAN connects different local area networks together, into a more complex network. You will need to use client/server networks, which are based around central server computers, so that you can connect the various servers over a telecommunications network. WANs use cables/lines that are leased from a telecoms company. A VPN allows the user to connect across the Internet to the business' private network. It creates a secure link between the remote worker's computer and the central system. A VPN can be cheaper to use than leased lines or domestic-type broadband connections. Equipments and Networking EmerGeo Architecture Clients Smart Client (Mobile / Tools) Web Client (Viewer Only) Intranet / Internet Servers Shared or separate servers EmerGeo Server WebEOC Server (SQL 2000 can be shared with EmerGeo) Optional WMS/WFS* “Data Connectors” Data Servers * Web Map Services / Web Feature Services OpenGIS-enabled GIS Systems ESRI Intergraph MapInfo AutoDesk Others Enabling Interoperability through Integration Internet/Intranet Applications (Base Map Data) Wireless Applications (GPS) Messaging Systems Analytical Models WebEOC + EmerGe o Video Surveillance Computer Aided Dispatch Facility Databases (Critical Infrastructure) Security and ITCyber Security for the Digital District •Security – All measures that monitor or restrict access to the system, such as locks, surveillance cameras, guards, fences, and entry control systems. • • • • • Sound backup system based on priorities Electronic and paper backup of vital records (and plan!) Offsite backups and data storage Offsite office/redundant data center Remote data replication and outsourcing Egress access from the EOC network to the Internet occurs through the local router's Network Address Translation (NAT) capability. Egress filtering is limited because of the variety of protocols used by agencies that may partner with the EOC in case of emergency. For example, assisting staff from local, state, and federal agencies may each require outbound connectivity to a different set of ports and destinations to facilitate access back to their organizations' networks. Because of the way Groove utilizes relay servers, workspace synchronization can also occur over this NAT connection. In the future, if we choose to implement more strict egress filtering, Groove would still function by wrapping its communications within HTTP frames for outbound access. Security and Emergency Management • • • • • • • • • • Operational areas, including CCTV, Security, and Emergency Management Customs House loading dock Security incident database Corporate security risk assessment Corporate Security Plan Alarm system remedial works Mail handling and receipt of goods Security alert procedures On-line visitor and contractor management system National Code of Practice for CCTV Systems for the Mass Passenger Transport for Counter Terrorism Security-Biometrics • • • • • • • • • • • face: the analysis of facial characteristics fingerprint: the analysis of an individual’s unique fingerprints hand geometry: the analysis of the shape of the hand and the length of the fingers retina: the analysis of the capillary vessels located at the back of the eye iris: the analysis of the colored ring that surrounds the eye’s pupil signature: the analysis of the way a person signs his name. vein: the analysis of pattern of veins in the back if the hand and the wrist voice: the analysis of the tone, pitch, cadence and frequency of a person’s voice. CCTV The development of novel sensor-centric data fusion models appropriate to fusion of disparate range and image data; Fusion of complex, information-rich, probabilistic representations of geometric and physical properties; and development of endogenous data fusion and communication algorithms appropriate to large-scale distributed sensor networks. Through Panel Remote Access Interface Modules For Access control application : Master – slave where multiple slaves can be connected to a master unit and Master is connected to computer. Master Recorder can be installed at entry and the slaves at the gate where access control is required. A person first punches in the Master and then in a slave to get entry to restricted premises. If he/she does not punch in the Master than slave will not accept the punch and entry will be denied. This ensures entry into restricted area only after one punches in master i.e. for attendance. Radio frequency identification (RFID) is a method of remotely storing and retrieving data using devices called RFID tags. An RFID tag is a small object, such as an adhesive sticker, that can be attached to or incorporated into a product. RFID tags contain antennae to enable them to receive and respond to radio-frequency queries from an RFID transceiver. RFID tags can be either active or passive. Another proposed application is the use of RFID as intelligent traffic signals on the road (Road Beacon System or RBS). Building on Groove and SharePoint SharePoint is the core of EOC communication platform, providing an easy-to-use, full-featured Web site for storing documents, contacts, and task lists. Because it's a Web-based application, we can easily make its content available to anyone physically in the EOC building or anywhere on the Internet (assuming we have network connectivity). What we can't do with SharePoint is take the data offline, and that's where Groove comes in. Groove provides key pieces of the overall solution. Through its Mobile Workspace for SharePoint, Groove allows us to take the entire SharePoint site and make it available offline. Groove users synchronize the contents of the SharePoint site to their local computers and can then view, edit, and add to the site even if they don't have a network connection. When they reconnect, the content is automatically synchronized back to SharePoint for the rest of the EOC to use. Using Groove forms, we can quickly and easily collect large amounts of data in any emergency situation. Groove can track the location and health of thousands of evacuees and volunteers. Users could take a Groove-equipped laptop to a site with no power or network connectivity, collect as much information as battery power allowed, then return to a place with network connectivity. As soon as the Groove client reconnected back to the workspace, it began synchronizing the data collected offline with all its peers This is a tremendously powerful capability because it allows us to rapidly integrate dispersed information into a single distributed database. Synchronizing Data through Groove and Sharepoint BASIS FOR EOC- TOOLS? Mapping, Database Construction and Decision Making • Resource Mapping: hospitals, police stations, transport services, blood banks, medicine shops, doctors, cranes, tent suppliers, water suppliers, ST depots, NGOs, fire stations etc. • Applications- record keeping and status of ongoing work, risk assessment; scenario analysis or analysis of consequences; forecast and projection; dissemination of information; allocation of personnel, equipment and other resources; reaching various affected areas by relief personnel; damage assessment and so on. Information Technology- Issues (conceptual, technical, socio-technical, political, institutional and financial perspectives) • Geographical Information Systems (GIS), Remote Sensing (RS), and Global Positioning System (GPS) • The integration of such technologies with each other and with other technologies such as decision support systems (DSS), the worldwide-web and simulators has created more effective disaster management. • Developing Spatial Data Infrastructure to Facilitate Disaster Management • Emergency Response Modeling and Simulation Systems (ERMSSs) • The access networks- inter- and intranets, policy and standards • Parallel Computing- Distributed computing • A web-based disaster management system for data sharing, data exchange and data analysis using an SDI model. • National Natural Disaster Knowledge Network:- (Nanadisk-Net) – Digital Library Multilinguistic and e-trainingIt is a platform to facilitate an interactive dialogue with all government departments, research institutions, universities, community-based organizations and even individuals. The network acts as a digital library service and facilitates access to global databases and early warning systems in a significant way. The Knowledge Network is designed to give a boost to technical cooperation among developing countries and to expand international relationships to include exchange of information and transfer of technology. Nanadisk-Net also promotes e-training and have the feature of many languages through a translation software. The Information System is structured at four levels: • First level – National Government (through the Standing Committee for Protection of the Population in the Events of Major Natural and Man-Made Disasters /SCPP/ under the Council of Ministers; the National Situation Center at the State Agency for Civil Protection (SACP), ministries and agencies); • Second level – district administrations; • Third level – municipalities; • Fourth level – peripheral (high-risk industrial or business facilities, power stations, sensitive points, research sites, observatories, warning and alert systems, etc.). Flood Forecast Management The Flood Watch interface allows users to carry out all forecasting activities, ranging from telemetric data collection through to model simulations and production of flood maps from a single consistent user interface. (MIGRAN): The graphical and interactive features of MIGRAN make it a highly effective tool for the transportation planner. The ultimate use of MIGRAN lies in the analysis of the impact of link additions and improvements. The planner can study the MIGRAN output and determine which links in the network need improvement. Alternatively, he may consider adding some links to divert traffic from critical paths. The modified network can be analysed by MIGRAN and the output of the two networks can then be compared by MIGRAN to assess the impact of the changes on the level of service. • MIGSOS was developed to design isolated signals and simulate the movement of vehicles. After the signal timings have been determined, the software generates the vehicles in a Poisson stream and animates their movement on the screen. The planner can study the effect of timing changes on the overall delay at the junction. QUICK ACCESS TO RESCUE DURING EMERGENCY •The modeled system was developed to save time by displaying routes having minimum travel time from Ambulance - accident spot - Hospital. Road Accident Database Automatic generation of collision diagram with vehicular movements Advanced querying and reporting Many new advanced features like: •High accident location identification •Scenario Analysis •Spot / Intersection Analysis •Cluster Analysis •Strip / Corridor Analysis •Ability to add Accident photograph or location photograph along with the accident data. Geomatics in e-Governance Geomatics or Geographic Informatics encompasses all aspects of geo-referenced data viz. acquisition, integration, decision support and dissemination. Its applications are fundamental to population growth, economic development and consumption of natural resources. Geomatics addresses the vital elements of any information system viz. geographic measurement, geo-accounting, spatial analysis and integrated decision-making. Geomatics comprises of remote sensing, photogrammetry, geographical information system (GIS), cartography and GPS. E-Governance using Geomatics • Rural road information As e-Gram Suvidha encompasses rural road inventory, key information corresponding to any selected road segment on the map can be easily obtained. The road information may consist of category of the road (NH: National Highways, SH: State Highways, MDR: Major District Road, ODR: Other District Road, OR: Other Roads) and type of the road (BT: Black Top, WBM, Earthen, Gravel), status (poor/good/average), length of road, population and villages benefited. • GIS Combines spatial and non-spatial data; Icons for infrastructure / projects at Block & Panchayat levels; Thematic maps on works / sanctioned amount / pending works; Geographic distribution of projects clearly seen; Clustering of projects in a Block or neglect of Panchayat identified. • The area traffic control (ATC) centre is the operational hub of the transport system. From the centre the traffic signals are constantly being monitored and the timings are being adjusted to aid the flow of traffic. Sensors are placed on the entire road, which help in detecting traffic density. The traffic signals are then controlled by a central control room. Faults are recorded and passed onto the engineers on street and the data is collected to aid the future development of traffic schemes. • Traffic information service: Increasing importance is attached to provide upto the minute information to road users about the condition of the transport network. A central database of incident and road network information is maintained comprising data, which has been supplied from a varity of sources including police, Local authorities, utility companies, public transport operators, media persons for broadcasting and the end users. • • • • • • • Aims of ATC system are Automated Vehicle Identification and Classification Automatic Vehicle Location Pedestrian Movement Detection Real Time Traffic Transmissions Pollution monitoring Environment conservation Tools for More Informed Decisions • • • • • With Autodesk Crisis Command 2 users can be more confident in the outcome of decisions made using new tools for tasks including sharing site and resource information, managing data for incidents in progress, and performing recovery analysis. Key features and benefits of Autodesk Crisis Command 2 include: Incident reporting and notification – Enhancements allow users to better track events, record incident history and automatically alert appropriate emergency managers for efficient event response and management, and insightful post-incident analysis. Situational and spatial awareness – Tools for critical asset tracking and buffer creation allow users to generate reports on map features within a selected location for situational and spatial awareness and analysis. Planning and locating resources – Landmark information, planning and drawing tools allow users to better visualize resources, mark up and share information for pre-planning emergency preparedness. Improved management and security - Work order, time reporting and administrative tools ensure emergency managers can secure access to information, manage and track assigned tasks, and understand time spent and personnel costs. The Autodesk Emergency Response Solution The Autodesk Emergency Response Solution consists of interoperable Autodesk technologies and services, including Autodesk MapGuide Web mapping software to manage and distribute information about an incident to anyone who needs it; Autodesk Crisis Command 2; and Autodesk Mobile Command software to provide both tactical and strategic capabilities including functionality for fire attack pre-planning, fire flow/bomb blast analysis, sniper/counter sniper capabilities, dynamic 3D visualization, and command and control. , Autodesk also uses its Autodesk Pre-Plan Command software to create and edit maps and drawings, and help non-technical users quickly transform architectural drawings and floor plans into ready-to-use tactical and fire attack pre-plans that can track casualties with up-to-date information during an incident. Information Communications & TechnologyWebEOC? User Log-out Button Admin Module (requires permissions) Event Identifier Chat Feature Checklists User Log-in Identifier Emergency Email System Emergency Contacts Display Checkbox (Opens Boards, Sub-menus or Linked Programs) Data Indicator Lights Black: No new data Input Button (Opens Input Form for Board) Red: New data available Example Sub-menu Blue: Sub-menus Green: Links WHAT IS WebEOC? WebEOC- Web-based, emergency operations center crisis information management software. WebEOC puts our paper forms, reports and whiteboards online for real-time information sharing and ‘roll-up’ of information. Real-time information is key when making decisions on the well-being of our citizens and protection of property. DUAL COMMIT AND DATA LINKING INSIDE • Dual commit allows information to be posted to two servers simultaneously – outside the firewall for access by external agencies via the Internet, and for information sharing between agencies having common WebEOC status boards. • Data-Linking Entries can be simultaneously posted from one board to another. A ‘controller’ position can be set-up to review Position Log entries flagged as ‘significant’ before they are posted to the Significant Events status board. OUTSIDE Disaster Management and GIS Developing Spatial Data Infrastructure to Facilitate Disaster Management Emergency Response Modeling and Simulation Systems (ERMSSs). Sources and Types of Electromagnetic Energy Used in Remote Sensing Syncroniser SLAR modulator transmitter Tranmit/ Receive switch Aircraft Antenna Mixer & local oscilator Range direction Pulse length Receiver Ground surface Detector Previous scan lines Azimuth direction film Analogue tape Digital tape Role of SDI in Disaster Management SDI is an initiative intended to create an environment that will enable a wide variety of users to access, retrieve and disseminate spatial data and information in an easy and secure way. In principle, SDIs allow the sharing of data, which is extremely useful, as it enables users to save resources, time and effort when trying to acquire new datasets by avoiding duplication of expenses associated with generation and maintenance of data and their integration with other datasets. The system meets the following basic requirements: • The system must be continuously accessible – 24 hours a day; • It must be highly reliable; • The system must provide for a high degree of information protection; • The system should provide for the rapid exchange of information throughout the Community; • The system must account for all languages used throughout the Community; • It should allow for the transmission of one message to many contact points; • At least a preliminary version of this system must be implemented quickly; • The system must include suitable procedures for handling data provided to the Commission by a Member State in confidence; • While the system must primarily provide for exchange of the information required under the Council Decision, it is desirable that such a system should have application in the context of other legal provisions of the Community that relate to the exchange of emergency (radiological) information. Conclusions • An EOC is a unique environment for most IT professionals. Many of the services often taken for granted, such as high bandwidth and Internet connectivity, cannot be relied on during an emergency. Thus, the systems put in place to manage emergencies must be able to deal with scenarios where connectivity may be spotty and users widely dispersed, but where it's more crucial than ever to have secure, reliable access to data. By combining SharePoint and Groove, it’s possible to build an EOC that's survivable and able to come to the needs of serious disasters. • A Virtual EOC can be a core concept of operations or an adjunct to a traditional EOC. Participants can share information, make decisions, and deploy resources without the requirement to be physically present in the operations center. A Virtual EOC can allow participants to work from their normal workstation, from home, or from the field with data, information and plans available from any location. Key Solution Nagpur District Data • • • • • • • Disasters-Natural (Earthquake, Flood) Industries Agriculture Health Buildings Transportation- Roads, Railways, Airport Census Data Etc.. Organizational Linkage with EOC • • • • Central Govt.-BSNL, National informatics centre, etc. State Govt.-Housing, water, medical, transport, etc. Banking Other- Police, Hospitals, etc. Integrated Modular Technology at EOC Police Fire Media Communication Network Medical Agency EOC in association with Govt. Parallel Computing, Multiple display, Alarms, Security Check, 24 Hrs. Help Line, Graphics Diplay, Supportive Database, Automated tolls for Decision Making- Ramtek Information retrieval Katol Hingna Action and Time Hard Copy Data Geneation Back-up Blood Banks Hospitals Nagpur Analyzed Information directed for action to various Departments Ambulance I/p Data Local Governing Body- Pre Disaster, Post disasterDisplay and Output Use Mobile Devices-GPS, Palm Tops, Mobile Ph., ATM sort Machines Services Action Plan Schedule information transfer (*Check Authentic Data Cameras, CCTV, Sensors, etc. ) Jai Hind..