context aware ad hoc network for mitigation of crowd disasters

16
Context aware ad hoc network for mitigation of crowd disasters Maneesha Vinodini Ramesh , Anjitha Shanmughan, Rekha Prabha AMRITA Center for Wireless Networks & Applications, AMRITA Vishwa Vidyapeetham (AMRITA University), India article info Article history: Received 14 August 2012 Received in revised form 24 December 2012 Accepted 22 February 2013 Available online xxxx Keywords: Context aware Crowd behavior estimation Wireless sensor network abstract Our research works focuses on the design and implementation of a novel ubiquitous multi context-aware mobile phone sensing network for mitigation of crowd disasters using machine-to-machine (M2M) communications. A mobile sensor network system integrated with wireless multimedia sensor networks (WMSNs) was designed for effective prediction of a stampede during crowd disasters. This proposed sensor network consists of mobile devices that are used as crowd monitoring participant nodes that employ light sensors, accelerometers, as well as audio and video sensors to collect the relevant data. Real-time crowd dynamics modeling and real-time activity modeling have been achieved by imple- menting the algorithms developed for Context Acquisition and multi-context fusion. Dynamic crowd monitoring was achieved by implementing the context based region iden- tification and grouping of participants, distributed crowd behavior estimation, and stam- pede prediction based on distributed consensus. The implementation of the proposed architecture in Android smartphone provides light-weight, easy to deploy, context aware wireless services for effective crowd disaster mitigation and generation of an in time alert to take measures to avoid the occurrence of a stampede. The system has been tested and illustrated within a group of people for stampede prediction by using empirically collected data. Ó 2013 Elsevier B.V. All rights reserved. 1. Introduction Wireless Sensor Networks (WSNs) consists of large number of sensor nodes which are capable of linking the physical world with the digital world by capturing and revealing real-world phenomena and converting these occurrences into a format that can be processed, stored and acted upon [31]. These sensors are low power devices that can be used for a wide range of applications beneficial for society. The accurateness and the timeliness of this sensed information is extremely important to take critical action in various real world situations. Hence, the key con- sideration of our recent research work in WSN is to im- prove the quality and reliability of the sensed information by utilizing the potential of Context Aware Computing (CAC). This context awareness helps to config- ure the WSN to adapt and react according to the real time situation of the physical space in which the sensors are de- ployed. The key focus of our research work is to integrate the concept of CAC for WSN (CAC-WSN) to predict the on- set of abnormality within a crowd. Context aware computing is the key enabling technol- ogy for pervasive computing. The major classification of context includes computing context, user context and physical context [30]. Computing context includes network connectivity, communication costs, communication band- width and nearby resources such as printers, displays and workstations. User context specifies the user’s profile, location, and people nearby, even the current social situa- tion. Physical context includes lighting, noise levels, traffic conditions and temperature. Design and deployment of context aware systems in open and dynamic environments is raising a new set of re- search challenges such as Sensor Data Acquisition, Context 1570-8705/$ - see front matter Ó 2013 Elsevier B.V. All rights reserved. http://dx.doi.org/10.1016/j.adhoc.2013.02.006 Corresponding author. Address: AMRITA Center for Wireless Net- works & Applications, Amrita Vishwa Vidyapeetham (AMRITA Univer- sity), Amritapuri Campus, Clappana P.O., Kollam 690 525, Kerala, India. E-mail addresses: [email protected] (M.V. Ramesh), an- [email protected] (A. Shanmughan), [email protected] (R. Prabha). Ad Hoc Networks xxx (2013) xxx–xxx Contents lists available at SciVerse ScienceDirect Ad Hoc Networks journal homepage: www.elsevier.com/locate/adhoc Please cite this article in press as: M.V. Ramesh et al., Context aware ad hoc network for mitigation of crowd disasters, Ad Hoc Netw. (2013), http://dx.doi.org/10.1016/j.adhoc.2013.02.006

Upload: rekha

Post on 18-Dec-2016

218 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Context aware ad hoc network for mitigation of crowd disasters

Ad Hoc Networks xxx (2013) xxx–xxx

Contents lists available at SciVerse ScienceDirect

Ad Hoc Networks

journal homepage: www.elsevier .com/locate /adhoc

Context aware ad hoc network for mitigation of crowd disasters

1570-8705/$ - see front matter � 2013 Elsevier B.V. All rights reserved.http://dx.doi.org/10.1016/j.adhoc.2013.02.006

⇑ Corresponding author. Address: AMRITA Center for Wireless Net-works & Applications, Amrita Vishwa Vidyapeetham (AMRITA Univer-sity), Amritapuri Campus, Clappana P.O., Kollam 690 525, Kerala, India.

E-mail addresses: [email protected] (M.V. Ramesh), [email protected] (A. Shanmughan), [email protected] (R. Prabha).

Please cite this article in press as: M.V. Ramesh et al., Context aware ad hoc network for mitigation of crowd disasters, Ad Hoc(2013), http://dx.doi.org/10.1016/j.adhoc.2013.02.006

Maneesha Vinodini Ramesh ⇑, Anjitha Shanmughan, Rekha PrabhaAMRITA Center for Wireless Networks & Applications, AMRITA Vishwa Vidyapeetham (AMRITA University), India

a r t i c l e i n f o

Article history:Received 14 August 2012Received in revised form 24 December 2012Accepted 22 February 2013Available online xxxx

Keywords:Context awareCrowd behavior estimationWireless sensor network

a b s t r a c t

Our research works focuses on the design and implementation of a novel ubiquitous multicontext-aware mobile phone sensing network for mitigation of crowd disasters usingmachine-to-machine (M2M) communications. A mobile sensor network system integratedwith wireless multimedia sensor networks (WMSNs) was designed for effective predictionof a stampede during crowd disasters. This proposed sensor network consists of mobiledevices that are used as crowd monitoring participant nodes that employ light sensors,accelerometers, as well as audio and video sensors to collect the relevant data. Real-timecrowd dynamics modeling and real-time activity modeling have been achieved by imple-menting the algorithms developed for Context Acquisition and multi-context fusion.Dynamic crowd monitoring was achieved by implementing the context based region iden-tification and grouping of participants, distributed crowd behavior estimation, and stam-pede prediction based on distributed consensus. The implementation of the proposedarchitecture in Android smartphone provides light-weight, easy to deploy, context awarewireless services for effective crowd disaster mitigation and generation of an in time alertto take measures to avoid the occurrence of a stampede. The system has been tested andillustrated within a group of people for stampede prediction by using empirically collecteddata.

� 2013 Elsevier B.V. All rights reserved.

1. Introduction information by utilizing the potential of Context Aware

Wireless Sensor Networks (WSNs) consists of largenumber of sensor nodes which are capable of linking thephysical world with the digital world by capturing andrevealing real-world phenomena and converting theseoccurrences into a format that can be processed, storedand acted upon [31]. These sensors are low power devicesthat can be used for a wide range of applications beneficialfor society. The accurateness and the timeliness of thissensed information is extremely important to take criticalaction in various real world situations. Hence, the key con-sideration of our recent research work in WSN is to im-prove the quality and reliability of the sensed

Computing (CAC). This context awareness helps to config-ure the WSN to adapt and react according to the real timesituation of the physical space in which the sensors are de-ployed. The key focus of our research work is to integratethe concept of CAC for WSN (CAC-WSN) to predict the on-set of abnormality within a crowd.

Context aware computing is the key enabling technol-ogy for pervasive computing. The major classification ofcontext includes computing context, user context andphysical context [30]. Computing context includes networkconnectivity, communication costs, communication band-width and nearby resources such as printers, displaysand workstations. User context specifies the user’s profile,location, and people nearby, even the current social situa-tion. Physical context includes lighting, noise levels, trafficconditions and temperature.

Design and deployment of context aware systems inopen and dynamic environments is raising a new set of re-search challenges such as Sensor Data Acquisition, Context

Netw.

Page 2: Context aware ad hoc network for mitigation of crowd disasters

2 M.V. Ramesh et al. / Ad Hoc Networks xxx (2013) xxx–xxx

Data Fusion, Context Modeling and Reasoning, Service Dis-covery, and Execution of Services for the user. One of thecrucial requirements of context-aware applications isreal-time collection and aggregation of sensor data fromsensors distributed in the environment.

The proposed Ubiquitous Multi-Context Model (UMM)consists of three major phases, namely the Context Acqui-sition phase, the Context Modeling and Inference phase,and the Context based Action Generation phase. The keyproblem under consideration of our model is to develop adistributed context aware architecture with key featuressuch as reusability, non-redundancy and wide area cover-age of context information.

The recent advancements in the field of WSN make useof mobile phones, specifically smartphones, to act as sen-sor nodes. The mobile phone penetration rate is increasingtremendously all over the world, and in India it is expectedto reach up to 97% of the total population in the year 2014[10]. The increased penetration rate of smartphones ineveryday life has resulted in the development of manypromising applications utilizing low cost embedded sen-sors such as accelerometers, microphone, camera, gyro-scope, and light sensors. This new research area isreferred to as mobile phone sensing.

The implementation of our UMM is performed on anAndroid framework using mobile phone sensing andCAC-WSN. The objective of our research work is to makeuse of UMM for applications suitable for both personalsensing (e.g. individual activity) and group sensing (e.g.crowd monitoring).

The demand for security and safety within public spacesis gaining attention nowadays due to the increase in crowddisasters. The brief history of crowd disasters in publicgatherings for pilgrimage, sports events, etc. from 1989to 2011 is reported in the reference paper [9]. India expe-riences more than 100 deaths per year due to crowd disas-ters. The major motivation for our research work is thestampede of pilgrims that occurred at the hilltop Sabari-mala shrine in the state of Kerala in southern India, whichtook the life of 102 devotees [9]. The stampede was set offwhen a jeep drove into the crowd of pilgrims. The pilgrim-age area was flooded with people and the situation wentuncontrollable. The other causes of crowd disasters are ter-rorist activities that are focused on public gatheringsresulting in the loss of life of many innocent people.

Integration of context aware computing with mobilephones makes the devices capable of sensing the physicalworld, process the current scenario, and adapt and reactto dynamic changes of the environment. The proposed sys-tem uses the above-mentioned capability to develop anapplication suitable for crowd management, real-timemonitoring of crowd behavior, and dissemination alertsand instructions for crowd control.

2. Context and context aware computing

Researchers defined the term context in a slightly dif-ferent manner such as, Schmidt defined context as knowl-edge about the state of the user’s IT devices, along withinformation on the surroundings, situation, and to a lessextent, location [3], Chen and Kotz defined context as the

Please cite this article in press as: M.V. Ramesh et al., Context aware(2013), http://dx.doi.org/10.1016/j.adhoc.2013.02.006

set of environmental states and settings that either deter-mined an application’s behavior or in which an applicationevent occurred and is interesting to the user [4], Dey et al.gave the definition of context as any information that isuseful to highlight the interaction between a user and anapplication and also used to characterize the situation ofan entity such as a person, place or object [5]. The knowl-edge of data along with its context will provide insightsinto the complex patterns hidden in those data. Thisunderstanding lead to the development of the new areaof ‘‘context awareness’’ in ubiquitous computing.

The term ‘‘context-awareness’’ in ubiquitous computingwas initially introduced by Schilit in 1994 [1,2]. Accordingto Schilit [1], context awareness is the capability of a sys-tem to ‘‘adapt according to the location of the user, the col-lection of information about nearby people, hosts,accessible devices, as well as the changes to such thingsover time’’. Pascoe et al. [6] define context-awareness asthe ability to detect, gather, interpret and react to contextchanges in the user’s surrounding and changes in its device.

The research paper [6] discusses the importance of con-text-aware sensing and provides a general overview ofacquiring context information and various context awareapplications.

These context aware frameworks detailed several openresearch challenges such as:

� Context Acquisition Issues– Determination of appropriate sensors and the type

of context to be acquired. Some of the sensors shouldinitially be chosen for recognizing context becausemost of the applications do not require context datafrom all the available sensors. Use redundant sensorsonly in case of uncertainty. In this way, data trans-mission over the network decreases together withthe processing demand.

– Real time management of the sensors. Providingfeedback to the sensors and dynamically managingthem during the operational phase can improve theapplication’s performance, improving the overallresult.

– Determination of who the context capturers will beand the number required. Assess the need for prede-termined participants or new users of the applica-tion and determine how many smartphones arerequired for the best context inference. Developautomatic techniques to prevent redundant infor-mation capture due to close proximity ofsmartphones.

– Determination of the most suitable time-period ofmonitoring with respect to the application.

� Context Modeling & Inference Issues– A distributed context aware inference formulating

framework is required.– Since new contexts are continuously added in the

sensor network, the requirement of continuousadaptive learning algorithm is an issue that drawsattention.

– Context inference is a complex task that requires agood mechanism for mapping simple captured con-text data to a higher level of data. This is not an easy

ad hoc network for mitigation of crowd disasters, Ad Hoc Netw.

Page 3: Context aware ad hoc network for mitigation of crowd disasters

M.V. Ramesh et al. / Ad Hoc Networks xxx (2013) xxx–xxx 3

task and requires using various context modelingtechniques. Research is still ongoing to find the bestmethod that will disregard errors, automaticallyadapt the system to new types of data, learn auton-omously, and reason correctly.

� Context-based Action Generation Issues– Visualizing results and incorporating results on the

screens of hand-held devices.– Overcoming low bandwidth in wireless networks by

introducing algorithms that minimize communica-tion as well as the number of hops.

– Limited battery power.– Minimizing the data-sampling frequency to save

energy and communication cost.

Based on the analysis of various context aware frame-works, shown in Table 1, the observations that can be ex-tended to our system under development for multipleapplication support include: the agent based architectureof CoBrA and the distributed middleware architecture ofSOCAM and Gaia.

The recent studies illustrated in [7] highlight the use ofsmartphones for context-aware applications because theyare relatively powerful in processing and they also supportvarious embedded sensors. Various smartphone platformsavailable are Android, iPhone, Symbian, RIM, Windowsphone and Linux. The two most promising platforms wereiPhone and Android because of their popularity, highusability, powerful CPUs, and available sensors.

The key features of Android includes support for ma-chine learning based programming in Java, access to morecore OS functionality, no requirement of any certificationor developer registration to deploy the software to thehardware, and the Android SDK is available on multipleplatforms [8]. The Android application framework hasbuilt-in context support. The main two parts are the rawcontext sources and context processing [7].

The raw context source support includes packages andclasses for Bluetooth, a camera, and a sensor manager forcollecting data from the embedded sensors on the Androiddevice (location data, time, etc.). Context sources providenecessary information about the entity it is associatedwith. Smart context sources supported by Android can becategorized as hard and soft sensors [8]. The hard sensorsinclude:

� Accelerometer: A tri-axial accelerometer is a sensor thatreturns a real valued estimate of acceleration along thex, y and z axis from which velocity and displacement

Table 1Study of existing context aware frameworks.

Context awareframework

Specific features analyzed for the development of

CoBrA [1] ‘‘Context Broker’’ component spans multiple applSOCAM [2] Distributed with centralized server and it performGaia project [3] Distributed middleware infrastructure which is in

applicationsCenceme [4] Sharing of context information in web portalInContexto [5] Obtain context from a smartphone user

Please cite this article in press as: M.V. Ramesh et al., Context aware(2013), http://dx.doi.org/10.1016/j.adhoc.2013.02.006

can also be estimated. Accelerometers can be used formotion detection, position, and posture sensing.� Digital Compass: The digital compass provides two

measures; the orientation and the ambient magneticfield. The values for orientation are in radians/secondand measure the rate of rotation around the X (roll), Y(pitch) and Z (yaw or Azimuth). The compass measuresthe ambient magnetic field in the X, Y and Z axis, andthose values are in micro-Tesla (lT).� Gyroscope: Gyroscopes are used for measuring angular

velocity, angular rotation, and the rate of rotationaround the X, Y and Z axis. Gyroscopes are used for nav-igation and homing applications.� Location sensor: Smartphone provides two major

modes of location tracking: an Assisted Global Position-ing System (A-GPS) and Global System for Mobile Com-munications (GSM) cell tower triangulation.

Social Networks Sites (SNSs) are becoming increasinglypopular and are referred to as soft sensors. SNS users sharetheir daily personal information via SNS. Context awareapplications are progressing to utilize the user specificinformation collection from SNS.

The context processing enables the management of thisraw context data, from hard and soft sensors, into usefulcontextual data such as speech recognition, face recogni-tion, text-to-speech, and location proximity.

Using an analysis of existing frameworks, we developedthe new idea of integrating mobile phone sensing with thepotential of wireless multimedia sensor networks(WMSNs) to reduce the geographical restriction of moni-toring. To achieve reliable alert generation with real timevalues and ease of deployment and maintenance, our pro-posed crowd abnormality detection system utilizes thecapabilities of WMSN and the embedded smartphone sen-sors. Our research work also brings in multi-sensor modal-ities for activity recognition. Another key objective is toestimate the probability of stampede occurrence using mo-bile phone sensing.

3. Crowd monitoring systems

Based on the study we conducted on crowd disasters,we identified two major problems that contribute to crowddisasters. They are inadequate space and individual loss ofphysiological and psychological control. Conventionalmanual crowd monitoring is a tedious effort, requiringthe dedicated participation of many security officers. Man-ual monitoring has been replaced by closed circuit televi-

new multiple application supporting framework: UMM

ication context aware agents by providing shared model of contextss context modeling based on ontologiestended to coordinate the development and execution of mobile

ad hoc network for mitigation of crowd disasters, Ad Hoc Netw.

Page 4: Context aware ad hoc network for mitigation of crowd disasters

4 M.V. Ramesh et al. / Ad Hoc Networks xxx (2013) xxx–xxx

sion systems (CCTV). The research paper [11] discussescrowd monitoring using an image processing approachthat includes an automated CCTV based technique. Thecost of deployment and maintenance of these systemswas very costly which led to the development of WirelessSensor Networks (WSNs) based crowd monitoring, whichuses low cost sensors and real time wirelesscommunications.

A prototype for stadium surveillance based on WSN,integrated with increased situational awareness, was pro-posed for better knowledge of real-time incidents withina stadium [12]. However, this system led to a high rate offalse alarms and was less reliable as it only used tempera-ture and acoustic sensors to develop situational awareness[12]. Due to the geographical restriction of monitoring dueto fixed deployment of WSN, the researchers brought inthe idea of mobile phone sensing for effective crowdbehavior monitoring. The research work in this area is inprogress and opens up very promising studies for widearea sensing and communication utilizing the potential ofthe embedded sensors in smartphones.

The use of mobile phone sensors for effective activityrecognition is illustrated in [13,14]. The disaster evacua-tion methods using the sensing capabilities of mobilephones were given in [15,16]. One of the major researchstudies in the area of mobile phone sensing is the decen-tralized detection of group formation using wearable sen-sors in [17]. In that work Wirz et al. details theexperimental results and detection of walking by a groupof people based on body worn accelerometer sensors andproved the applicability of mobile phone sensing for crowdmonitoring in real life situations. The experimental studieswere based on accelerometer sensor alone, and the authorssuggested the additional integration of multi-sensormodalities for better behavior recognition. A mobile phonesensing framework for crowd behavior estimation is de-scribed, and an experimentation illustration of effective-ness of mobile phone sensing for group activityrecognition is given in [28].

4. Context aware ad hoc network for mitigation ofcrowd disasters

Stampedes are one of the major reasons for recentcrowd disasters that have taken the lives of hundredsof people. Our proposed crowd disaster mitigation sys-

Fig. 1. (a) Homogenous crowd a

Please cite this article in press as: M.V. Ramesh et al., Context aware(2013), http://dx.doi.org/10.1016/j.adhoc.2013.02.006

tem focuses on estimating the probability of occurrenceof a stampede in a crowded area based on the distrib-uted sensor data fusion and analysis of sensor valuesfrom the tri-axial accelerometer, GPS, acoustic sensorsand video sensors, thereby aiming to avoid or decreasethe impact of imminent stampede. In the stampede sus-picious area, this system will provide the service tomake the crowd controlling station more vigilant andprovide alerts on facilitating evacuation schemes in caseof emergency.

4.1. Crowd dynamics and modeling

The scientific definition of a crowd is given as a concen-tration of a large number people in the same area at thesame time. The high density of a crowd causes continuousinteractions with or reactions to other individuals. Thereare different types of crowds: homogeneous, heteroge-neous, expressive and aggressive. Aggressive crowds getmore attention. Examples of two types of crowd are shownin Fig. 1. The pilgrimage crowd scenario is a heterogeneouscrowd that is composed of dissimilar elements. They haveno common bonds other than the event that brought themtogether.

Now-a-days, mass gatherings are prone to crowd disas-ters. The studies related to crowd disasters indicate thepresence of crowd stampede as the major life threateningcause behind the onset of such disasters. The major anom-alies in the crowd that leads to stampede are

(a) Unpredictable obstacle in the flow path of the crowdresulting in increased pressure.

(b) ‘Flight’ or ‘Panic’, where people experience either areal or perceived threat. This triggers crowd move-ment which leads to the occurrence of the event.

(c) A competitive rush to gain a highly valued goal.

Fruin [18] provides a detailed report of the causes andprevention of crowd disasters. According to Fruin, real-time information and communication are key factors inpreventing crowd disasters. He proposed a simple crowdmodel, know as FIST model, which specifies crowd force,information upon which the crowd acts, physical space,and time (duration of incident).

The FIST model designed by Fruin provides the scien-tific explanation of the impact of the crowd force.

nd (b) aggressive crowd.

ad hoc network for mitigation of crowd disasters, Ad Hoc Netw.

Page 5: Context aware ad hoc network for mitigation of crowd disasters

Fig. 2. Flow pattern variation with respect to increased crowd density.

M.V. Ramesh et al. / Ad Hoc Networks xxx (2013) xxx–xxx 5

‘‘When the density of the crowd increases and becomesequal to plan area of the human body, the group con-trols the individuals’’ [18]. When crowd density is aboutseven persons per square meter, the crowd becomes al-most a fluid mass. This fluid mass generates shockwaves that propagate through the crowd and are capa-ble of lifting people off their feet. The rise in crowdpressure results in an increase in the temperature andfeelings of asphyxia.

The studies in the field of crowd modeling identifiedthe similarity of the characteristics of individuals withinthe crowd with that of the movements of particles. Thiscomparison resulted in the modeling of the crowd basedon particles by Helbing [20]. Helbing identified the keyfeatures of escape panics and some of them are as fol-lows: (1) During panic people try to move considerablyfaster than normal. (2) Pushing among individualsmakes the interactions among people become physicalin nature. (3) Clogging and jamming effect occurs atthe exit. (4) The jamming effect multiplies and resultsin dangerous pressures of up to 4450 N m�1 which canbend steel barriers. (5) Injured people become ‘obsta-cles’ in the escape path.

The focus of Helbing’s model was on pedestrian dynam-ics rather than crowd dynamics as a whole. Taking this intoaccount, Hughes [21] modeled a crowd of individuals as a‘‘continuum’’ with a set of equations to improve the crowdflow of individuals. Helbing’s Social Force model [19]incorporates psychological and physical forces. The SocialForce model given in Eq. (1) takes into account the pedes-trian dynamics based on their motivation, destination, andenvironmental constraints. v0

i indicates the desired veloc-ity of motion, and e0

i (t) indicates the direction. fij(t) andfiw(t) are the interaction forces.

midvi

dt¼ mi

v0i ðtÞe0

i � viðtÞsi

þXjð–iÞ

f i j þX

W

f i W ð1Þ

The challenge in performing the analysis of crowddynamics is the inability to completely grab the real timein-place situation awareness. The studies of crowd behav-ior is performed based on the crowd disaster video data-sets collected at different time spans from differentcrowd scenarios such as pilgrimage, and sports events.Based on the analysis of crowd movements, they were ableto identify three general patterns of crowd flow. They arean ordered pattern (smooth) in normal crowd densityand surrounding conditions, the stop and go pattern whenthe crowd density become dense and obstacles areencountered in the free flow of the crowd, and the extremeflow condition referred as ‘‘Crowd Turbulence’’ due to veryhigh crowd density and critical crowd conditions. Thishigh-density crowd can become ‘‘turbulent’’ and can resultin injury or falling.

‘‘Crowd Turbulence’’ results in displacement of individ-uals in the crowd in all directions. The crowd flow pattern‘‘turbulence’’ resembles the fluid flows which show a insta-bility and randomness in the flow pattern. The scientificstudies of ‘‘Crowd Turbulence’’ reveal the presence of shar-ply peaked probability density function of velocity incre-

Please cite this article in press as: M.V. Ramesh et al., Context aware(2013), http://dx.doi.org/10.1016/j.adhoc.2013.02.006

ments Vx, given by Eq. (2), when the value of the timeshift s is small and r represents the location.

Vsx ¼ Vxðr; t þ sÞ � Vxðr; tÞ ð2Þ

Based on the video dataset analysis of Mecca pilgrim-age, the major conclusions brought in were the crowd acci-dent occurred after 10 min of onset of ‘‘Crowd Turbulence’’,more specifically when the crowd pressure, P(t), exceeded0.02/s2.

Crowd pressure, P(t), is a function of time t, which is ob-tained by multiplying the density with the variance of thespeed. The analysis also highlights that crowd accident oc-curred 30 min after the change in ordered flow pattern tostop and go. The analysis can be shown graphically inFig. 2.

The major focus of our research work is to predict theonset of stampede to take safety measures such as crowdflow control, pressure relief strategies, and techniques toblock the propagation of crowd pressure generatedshockwaves.

4.2. Participatory sensing

Participatory sensing [22] is an emerging technologythat makes use of mobile devices to form participatorysensor networks that acquire, process, and share the localinformation. It supports many applications such ashealth-care, surveillance, environmental monitoring, andcivic management. Even though there are different usagemodels for different applications, a general workflow inparticipatory sensing is described in [23].

The essential components of participatory sensing areubiquitous data capture and leveraged data processing.Ubiquitous data capture in a wide area can be achievedusing mobile phones to sense, compute, and communicatethe required data effectively. Leveraged data processingcan be achieved by using various models and algorithmsto analyze the data captured by the smartphone sensors,thus understanding complex phenomena related to theindividuals or groups.

This typical capability of participatory sensing isused in the development of multi-context frameworkhas been implemented and tested for crowdmonitoring.

ad hoc network for mitigation of crowd disasters, Ad Hoc Netw.

Page 6: Context aware ad hoc network for mitigation of crowd disasters

Fig. 3. Participatory sensing based mobile ad hoc network for mitigation of crowd disasters.

6 M.V. Ramesh et al. / Ad Hoc Networks xxx (2013) xxx–xxx

4.3. Architecture for mitigation of crowd disasters

In our proposed system shown in Fig. 3, in the area weare crowd monitoring, we assume that we are aware of:the geographical and topographical area, the acceptablecrowd capacity of the chosen area, the time of the crowdgathering, and the motivation of the crowd. With theseassumptions integrated, the objective of our proposedwork is: to estimate the Stampede Occurrence Probabilityin a specific area, based on correlation of distributed heter-ogeneous and homogeneous sensor values with knownspace and time values.

This application explores the use of a participatorysensing approach, where our assumption is that the per-sonal mobile devices and web services are used to system-atically explore the key aspects of the current context in acrowd. The personal mobile devices in the crowd act asparticipant sensor nodes.

For the estimation of the Stampede Occurrence Proba-bility, when the crowd density is ‘high’ and crowd flowpattern becomes ‘stop and go’, we perform real-time datamining on heterogeneous and homogeneous sensor values.

Sensor data is analyzed and mapped to activities basedon the distributed consensus of ‘n’ neighboring participantnodes. Sensor data is analyzed to determine the followingactivities:

(i) Forward force in the crowd towards the commondestination.

(ii) Backward force in the crowd against the commondestination.

(iii) Crowd force on the sidewalls, or building structures.(iv) Fall detection in a crowd.

Please cite this article in press as: M.V. Ramesh et al., Context aware(2013), http://dx.doi.org/10.1016/j.adhoc.2013.02.006

(v) Heat and thermal rise due to increased crowddensity.

(vi) High noise level due to screaming.

The correlation of Multiple Datasets from MultipleSources is required to appropriately estimate the StampedeOccurrence Probability.

An explanation of the system architecture follows:

� The Wireless Multimedia Sensing Module consistsof:– Temperature sensors – capture heat and thermal rise

due to increased crowd density.– Acoustic sensors – capture high noise level due to

screaming.– Visual sensors – capture crowd density and flow pat-

tern estimation.� The Smartphone Sensing Module consists of:

– Accelerometer and gyroscope – determine activityrecognition and flow pattern inference.

– Location sensors – provide location context.

4.4. Implementation of Smartphone Sensing Module for crowddisaster mitigation

Participatory sensing using smartphones of the indi-viduals in the crowd act as the key component in theproposed model. The task of estimation of crowddynamics and estimation of behavior patterns is verychallenging to implement in real world situations. Butour system makes use of crowd activity recognitionchain [28] and distributed consensus of the participantnodes to derive a reliable decision about the onset ofthe stampede.

ad hoc network for mitigation of crowd disasters, Ad Hoc Netw.

Page 7: Context aware ad hoc network for mitigation of crowd disasters

M.V. Ramesh et al. / Ad Hoc Networks xxx (2013) xxx–xxx 7

The distributed consensus is achieved based on initialindividual behavior estimation, then pair-wise Bluetoothad hoc network based behavior estimation, and finallybehavior estimation of the GPS based geographical clustersof participant nodes.

4.4.1. Individual participant node behavior estimation by theparticipant node

The crowd behavior estimation is carried out by theanalysis of sensor data for each participant node individu-ally. Based on the individual sensor data analysis, the ‘‘par-ticipant behavior’’ is estimated. The mapping betweenmulti-modal sensors and activities is learned using ma-chine-learning techniques. The individual participant nodebehavior can be represented as BSi. The block diagram forindividual behavior estimation is shown in Fig. 4.

The area of crowd formation is divided into a set ofsubareas by the crowd controller station. When a partici-pant node joins the crowd, the crowd controller stationadds that node into a specific subarea based on its currentlocation. This region identification of a participant nodecan be performed by using smartphone’s GPS, and thesteps involved in it are depicted in Algorithm 1. Algorithm2 explains the steps involved in grouping a participantnode into a subarea list. It is necessary to periodically per-form a region based grouping algorithm to take into ac-count the mobility of the participant nodes whenever thedistance traversed by the participant is greater than athreshold value. This threshold value is around 20 m fromthe Wi-Fi hotspot for indoor conditions and is of greatervalue for outdoor conditions. Algorithm 2 also determinesthe neighboring nodes in a subarea by estimating the dis-tance between two participant nodes. If the distance be-tween them is less than 10 m we add the newparticipant node to the same area. The 10 m is selectedto enable Bluetooth communication in case of an emer-gency situation. This distance estimation is based on Vinc-enty’s formula using latitude and longitude co-ordinatepoints.

Fig. 4. Individual participant n

Please cite this article in press as: M.V. Ramesh et al., Context aware(2013), http://dx.doi.org/10.1016/j.adhoc.2013.02.006

Algorithm 1 Region Identification of Participant Node,S using GPS

1: Begin2: Input: S; Output: <Latitude, Longitude, Time>3: while S in power-on state do4: set locationUpdateWindowSize5: set minTime i.e. the Location Manager couldpotentially rest for minTime milliseconds betweenlocation updates to conserve power.6: set minDistance i.e. a location will only bebroadcasted if the device moves by minDistancemeters.7: timeDeviation=location.getTime()-currentBestLocation.getTime()8: if timeDeviation>timeWindow then the user haslikely moved and transmit the new location tocrowd controller station with timestamp.9: end while10: End

Algorithm 2 Region based Grouping of ParticipantNode, S by Crowd Controller Station

1: Begin2: Input: SubAreaList={SA1,SA2,SA3. . .},<Latitude, Longitude, Time>; Output: S groupedin a SubArea, SA3: while S in power-on state do4: for each SAi in SubAreaList do

4.1: if <Latitude, Longitude> locationcontext matches with SAi, group theparticipant node in SAi andincrementCrowdCountSAi.

5: end for6: end while7: End

ode behavior estimation.

ad hoc network for mitigation of crowd disasters, Ad Hoc Netw.

Page 8: Context aware ad hoc network for mitigation of crowd disasters

8 M.V. Ramesh et al. / Ad Hoc Networks xxx (2013) xxx–xxx

4.4.1.1. Distance estimation using Vincenty’s

formulae. Vincenty’s formulae [24] are two related itera-tive methods used in geodesy to calculate the distance be-tween two points on the surface of a spheroid, developedby Vincenty. Vincenty’s formula is accurate to within0.5 mm, on the ellipsoid used.

The key features extracted from individual behaviorestimation are activity, flow velocity and flow direction.The flow direction extracted can be used in determiningthe flow pattern of the crowd.

Algorithm 3 Flow Velocity Estimation and FlowDirection Identification of Participant Node, S

1: Begin2: Input: <Latitude, Longitude, Time>, x_acceleration,y_acceleration, z_acceleration; Output: VSi and DSi

3: while S in power-on state do4. Calculate velocity using GPS data as Vgps.

4.1 Vgps= (currentGPSPoint - lastGPSPoint) / (timebetween GPS points)5: Calculate velocity using accelerometer readingsas Vacc.

5.1 Vacc = acceleration ⁄ Time6: Obtain VSi from Vgps and Vacc values7: Analyze accelerometer and digital compass datafor identification of participant flow direction, DSi.7: end for8: end while9: End

4.4.1.2. Feature extraction and activity recognition. Fig. et al.[25] provides the detailed description of different signalprocessing techniques that can be used for context recog-nition from accelerometer data. The techniques that canbe implemented in mobile devices range from classical sig-nal processing techniques such as FFT to contemporarystring-based methods. The paper [25] presented the exper-imental results to compare and evaluate the accuracy ofthe various techniques using real data sets collected fromdaily activities.

(i) Time domain techniques

Simple mathematical and statistical metrics can be usedto extract basic signal information from raw sensor data. Inaddition, these metrics are often used as preprocessingsteps for metrics in other domains as a way to select keysignal characteristics or features.

(a) Statistical metrics: mean, variance and standarddeviation

By determining the mean of a window or range of datasamples, meaningful information from almost every kindof sensor can be retrieved. This metric can be calculatedwith small computational cost and demands minimalmemory requirement. The mean is usually applied in orderto preprocess raw data by removing random spikes andnoise (both mechanical and electrical) from sensor signals,

Please cite this article in press as: M.V. Ramesh et al., Context aware(2013), http://dx.doi.org/10.1016/j.adhoc.2013.02.006

smoothing the overall dataset. Another important statisti-cal metric is the variance (s2) defined as the average ofthe squared differences from the mean. The standard devi-ation (s) is the square root of the variance and representsboth the variability of a data set and a probability distribu-tion. The standard deviation can give an indication of thestability of a signal. These two statistical metrics can beused as an input to a classifier or to threshold-based algo-rithms. l indicates the mean, s indicates the standard devi-ation, and w is the sampling window size.

lx ¼1w

Xw

i¼1

xi ð3Þ

ly ¼1w

Xw

i¼1

yi ð4Þ

lz ¼1w

Xw

i¼1

zi ð5Þ

Sx ¼

ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiPwi¼1ðxi � lxÞ

2

ðw� 1Þ

sð6Þ

Sy ¼

ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiPwi¼1ðyi � lyÞ

2

ðw� 1Þ

sð7Þ

Sz ¼

ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiPwi¼1ðzi � lzÞ

2

ðw� 1Þ

sð8Þ

(b) Root Mean Square (RMS) metricThe feature extraction is performed by taking average of

aj values in the ‘w’ sized sample window using (1) where ican be x, y or z axis. RMS value estimation can be used todistinguish the walking patterns.

aaverage ¼ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiXw

j¼0ðaijÞ2

� �=w

� �rð9Þ

(c) Correlation coefficientsThe estimation of correlation coefficients, r is useful for

distinguishing between activities.

rxy ¼Pw

i ðxi � lxÞðyi � lyÞðw� 1Þsxsy

ð10Þ

rxz ¼Pw

i ðxi � lxÞðzi � lyÞðw� 1Þsxsz

ð11Þ

ryz ¼Pw

i ðyi � lyÞðzi � lzÞðw� 1Þsysz

ð12Þ

(ii) Frequency domain techniqueFast Fourier Transform (FFT) is a computationally fast

alternative for Discrete Fourier Transform. FFT takes a dis-crete signal in the time domain and transforms that signalinto its discrete frequency domain representation. Activityrecognition workflow based on FFT coefficients extractionis illustrated in Fig. 5.

ad hoc network for mitigation of crowd disasters, Ad Hoc Netw.

Page 9: Context aware ad hoc network for mitigation of crowd disasters

M.V. Ramesh et al. / Ad Hoc Networks xxx (2013) xxx–xxx 9

4.4.2. Distributed pair wise behavior estimation based onBluetooth ad hoc networking and geographical clusteringbased behavior estimation

The block diagram for the distributed behavior estima-tion is shown in Fig. 6. Bsi indicates the individual participantnode behavior and S indicates the participant node. Thebehavioral pattern specifically Bsi changes with time. Hencewe need to compute the measure of behavior disparity be-tween a pair of individuals participating in a commoncrowd. The disparity D is computed based on function f, cor-relation Corr, and g provides the mapping to a disparity va-lue. f, Corr and g are computed based on the training data.

Algorithm 4 Distributed Pair Wise BehaviorEstimation

1: Begin2: Input: Bsi, Bsi+1, T; Output: Distributed Pair WiseBehavior Estimation3: while Si and Si+1 in power-on state do4: for each Si in SAi do

4.1: Select the neighboring node of Si say Si+1 andmark them as selected so that they will not beconsidered for further pair wise analysis.

4.2: Establish Bluetooth Communication for dataexchange between paired participant nodes.

4.3: Estimate Disparity Matrix for the selectedparticipant nodes, D(u;vT).

4.3.1: Determine the windowing function, f,Correlation and g

4.3.2:D(u;vT)=g(Correlation(f(BS; T); f(Bsi+1; T)))4.3.3: if D(u;vT) has lower values u and v take

part in the same crowd.5: end for6: end while7: End

Fig. 5. Activity recogn

Please cite this article in press as: M.V. Ramesh et al., Context aware(2013), http://dx.doi.org/10.1016/j.adhoc.2013.02.006

4.4.2.1. Distributed consensus algorithm for stampedeprediction in a geographic cluster. We are given with a setof participant nodes or processors P. Consensus is said tobe achieved if a good set of processors agree on an outcomeregardless of the bad processors. Participant node startswith an initial binary value stored in a variable V. Protocolsolves the binary distributed consensus problem, in our casedecision of whether there is chance of stampede or not, if italways terminates and satisfies the following twoconditions:

Agreement: at termination Vp = Vq for all p and q in PValidity: if at the beginning of the component Vp = V for

every p in P, then the same holds at the end.

� Step 1: Initially, set stampede prediction decision valueas 0 for all participant nodes.� Step 2: Perform activity recognition and flow pattern

extraction. If the condition for stampede depicted inSection 4.1 is satisfied regarding flow pattern variationin a high-density crowd, set the decision value to 1 forthe participant group.� Step 3: The leader election algorithm, based on residual

battery energy of smart phones, selects the masternode. The remaining nodes act as slave nodes. Slavenodes in a Bluetooth ad hoc network establish commu-nication with the master node and transfer the decisionvalue to it.� Step 4: When a set of participant nodes agrees on the

decision value as 1, send an alert message to the crowdcontroller station to generate appropriate controlmeasures.

5. Experimentation and result analysis

We illustrate the proposed context aware ad hoc net-work for mitigation of crowd disasters by detecting

ition workflow.

ad hoc network for mitigation of crowd disasters, Ad Hoc Netw.

Page 10: Context aware ad hoc network for mitigation of crowd disasters

Fig. 6. Distributed behavior estimation.

10 M.V. Ramesh et al. / Ad Hoc Networks xxx (2013) xxx–xxx

abnormal human movements, specifically erratic shakeand push, in a group of participants moving through anarrow pathway. Based on the analysis of crowd flowpatterns, for the purpose of experimentation, the groupof participants followed an ordered flow pattern ini-tially. Later on, due to insufficient space for free move-ment when they reached the narrow pathway, pushingand leaning of people against each other resulted inthe development of crowd forces, which are collectedby using accelerometers.

The push and erratic shake experienced by the group isextracted by the signal processing of raw tri-axis acceler-ometers embedded in the smartphones. The decision onthe prediction of stampede is based on crowd activity rec-ognition chain and distributed consensus algorithm. Forcrowd behavior estimation, it is important to estimateindividual behavior initially. Hence our experimentationfocuses on individual activity recognition, ad hoc network-ing for information spreading and distributed consensusfor prediction of stampede.

5.1. Experimental setup

5.1.1. Activity recognition of an individual5.1.1.1. Data acquisition. Activity recognition phase re-quired data acquisition from raw accelerometer sensor,embedded in the smartphone, to use as datasets for train-ing and testing. The smartphones used for data acquisitionare HTC Nexus One, Samsung Galaxy Y and Samsung Gal-axy Ace. The activities under consideration are:

(a) Standing.(b) Walking.(c) Slow running/jogging.(d) Climbing up.(e) Climbing down.(f) Fall.(g) Peak shake while standing.

Based on the result of Bao and Intille [26] researchwork, we were able to identify that the thigh is the most

Please cite this article in press as: M.V. Ramesh et al., Context aware(2013), http://dx.doi.org/10.1016/j.adhoc.2013.02.006

suitable position for the placement of accelerometers foridentifying various movements. Hence our experimenta-tion with smartphone was carried out by placing the phonein the pant pocket. Twenty participants spent variable timefor each activity at their convenience so the data could beacquired.

We created an Android application with a graphicaluser interface, shown in Fig. 7, to select, start and stop con-trol options for each activity. The collected data was writ-ten to the smartphone’s SD card in Attribute Relation FileFormat (ARFF). The application also graphed the sampledacceleration data, shown in Fig. 8, allowing for a real-timepreview of the data. Android SDK supports four abstractsampling rates Fastest, Normal, Game and UI [8]. The An-droid framework allows the acquisition of accelerometersamples when OnSensorChanged() event gets triggered.Following the sampling rates provided by Android frame-work, we could collect samples approximately every50 ms, i.e. 20 samples per second.

5.1.1.2. Signal processing and feature extraction. The rawvalues obtained from the smartphone’s accelerometer arepreprocessed prior to feature extraction. For the perform-ing preprocessing of data, we have used a window size of256 with 50% overlap. Each of the three axes is analyzedindividually and the statistical metrics such as mean, stan-dard deviation and correlations were obtained. The signif-icance of these statistical metrics is specified inSection 4.5.1.

The feature extraction values for various activities suchas walking, slow running, and falling is collected at thecrowd controller station. Activity recognition can be con-sidered as a classification problem and hence we can makeuse of the potentials of machine learning algorithms. Ma-chine learning algorithms are used to make decisionsbased on the gathered information from sensors to makethe initial scientific hypothesis. In order to classify the hu-man activities in a crowded area, decision tree based ma-chine learning algorithm was used.

C4.5 generates decision trees from a set of data ob-tained from the training phase. These training data set

ad hoc network for mitigation of crowd disasters, Ad Hoc Netw.

Page 11: Context aware ad hoc network for mitigation of crowd disasters

Fig. 8. Accelerometer plot (a) standing, (b) forward walk, (c) slow-run, and (d) peak shake.

Fig. 7. User interface for activity training and accelerometer based analysis.

M.V. Ramesh et al. / Ad Hoc Networks xxx (2013) xxx–xxx 11

contain samples which are features extracted. Thesefeatures are augmented with a specific vector to indicateto which class it belongs to C4.5 chooses one key featurefrom the set to split it into subsets. The feature with high-est normalized information gain is selected to make thedecision. For the purpose of analysis of the performanceof various machine learning algorithms, we make use ofthe Weka toolkit. Weka [27] is data mining software whichprovides a collection of machine learning algorithms. J48 is

Please cite this article in press as: M.V. Ramesh et al., Context aware(2013), http://dx.doi.org/10.1016/j.adhoc.2013.02.006

the implementation of C4.5 algorithm in Weka. For theactivity classification, Fast Fourier Transform values werealso obtained. The method of extraction is detailed in Fig. 5.

5.1.2. Prediction of stampede in a groupBased on the assumption of known geographical area

specifically an open space for crowd gathering, the raw val-ues were obtained from the participant smartphones. Sev-eral repeated experiments with change of locations were

ad hoc network for mitigation of crowd disasters, Ad Hoc Netw.

Page 12: Context aware ad hoc network for mitigation of crowd disasters

Fig. 9. Group of participants for the simulation of clogging in a narrow pathway.

Fig. 10. Real time detection of clogging.

Fig. 11. (a) CAM launch window and

12 M.V. Ramesh et al. / Ad Hoc Networks xxx (2013) xxx–xxx

Please cite this article in press as: M.V. Ramesh et al., Context aware(2013), http://dx.doi.org/10.1016/j.adhoc.2013.02.006

conducted to gather training data as well as decisionthreshold. The experiments were conducted in the Univer-sity premises with sample size of 20 smartphones. For thepurpose of deciding on the decision threshold, a simulationof clogging in a narrow pathway inside the universitybuilding was conducted, shown in Fig. 9. The participantswere instrumented with smartphones in their thighs. Thegroup was instructed to follow an ordered flow pattern be-fore reaching the narrow pathway.

Later on, in order to check the correctness of thedecision threshold, the experiment was conducted in areal time scenario. The participants with smartphonesinstalled with our Crowd Abnormality Monitor (CAM)application formed the part of a group of people movingout of narrow gateway at peak rush time shown inFig. 10.

(b) multi-context framework.

ad hoc network for mitigation of crowd disasters, Ad Hoc Netw.

Page 13: Context aware ad hoc network for mitigation of crowd disasters

Fig. 12. (a) Activity monitoring, (b) environmental monitoring, and (c) noise monitor.

Fig. 13. Crowd monitor in listening mode and monitor status.

M.V. Ramesh et al. / Ad Hoc Networks xxx (2013) xxx–xxx 13

5.2. Results and validation

5.2.1. Crowd Abnormality Monitor (CAM) on Android platformAn application in Android framework was developed for

crowd monitoring, named as Crowd Abnormality Monitor(CAM). The CAM application facilitates people in the crowdto participate in crowd monitoring by registering with thecrowd control station. On joining the crowd monitoringgroup, the information regarding the participant such asthe location context, unique MAC address and the activityare communicated to the crowd control station. Based onthe location context, the crowd control station performsthe region identification and grouping algorithm. The situ-ational awareness is generated by extracting the contextdata such as environmental noise level in the Sound Pres-sure Level (SPL), activity tracker, location tracker, and envi-ronmental monitor using the multi-context fusionframework, which is shown in Figs. 11 and 12.

5.2.1.1. Multi-context fusion procedure. smartphones areequipped with a wide variety of sensors. Let these sensorset be represented as S, where S = {Si}, Si’s are individualsensors such as audio, location, and light sensor. Our appli-cation makes use of say n, number of sensors from S formaking the critical decisions.

� Step 1: For a particular time period, the basic levels ofcrowd monitoring sensors are activated and the valuesare extracted. The basic level set id obtained based onthe battery usage.� Step 2: When the basic level threshold is exceeded, trig-

ger the activation of next level of sensors which arehigher in battery consumption.� Step 3: Fuse the extracted sensor data from multiple

specific sensors to make critical decisions. Generatealert according to the critical threshold.

5.2.1.2. Crowd monitoring module. The user of CAM appli-cation can decide whether to join crowd monitoring by

Please cite this article in press as: M.V. Ramesh et al., Context aware(2013), http://dx.doi.org/10.1016/j.adhoc.2013.02.006

checking the participate checkbox. When the partici-pant joins crowd monitoring, the application registerswith crowd controller station and switches to listeningmode. The crowd monitoring module is shown inFig. 13.

5.2.2. Activity recognition of an individual5.2.2.1. Performance analysis using J48 machine learningalgorithm. The trained dataset collected by using dataacquisition module is analyzed by using the Weka ma-chine learning tool. Tables 2 and 3 show the results ob-tained as part of data analysis. The J48 basedclassification was performed and a decision thresholdfor individual activity recognition was determined. TruePositive Rate (TP rate) indicates the rate of predictedcorrectly to total possibilities and False Positive Rate(FP rate) indicates the vice versa. Recall and precisionare the parameters for indicating relevance. F-measureis the harmonic mean of precision and recall. ROC areagives the performance of a system as the threshold is

ad hoc network for mitigation of crowd disasters, Ad Hoc Netw.

Page 14: Context aware ad hoc network for mitigation of crowd disasters

Table 2Performance analysis of activity recognition.

Class TP rate FP rate Precision Recall F-measure ROC area

Still 0.965 0.042 0.94 0.965 0.952 0.968Walking 0.903 0.049 0.903 0.903 0.903 0.948Running 0.889 0.024 0.928 0.889 0.908 0.949

Fig. 15. Energy estimation (a) energy utilization by CAM application and (b

0 10 20 30 40 500

2

4

6

8

10

12

14

16

18

20

Time

RM

S va

lue

Tria

xial

Acc

eler

omet

er (m

/s2 )

Fig. 14. Accelerometer signal analy

Table 3Confusion matrix for activity recognition.

Still Walking Running

109 3 15 84 42 6 64

14 M.V. Ramesh et al. / Ad Hoc Networks xxx (2013) xxx–xxx

Please cite this article in press as: M.V. Ramesh et al., Context aware(2013), http://dx.doi.org/10.1016/j.adhoc.2013.02.006

varied. The area under the ROC indicates the accuracy.Kappa statistic is a measure of agreement.

� Correctly Classified Instances: 92.446%.� Incorrectly Classified Instances: 7.554%.� Kappa statistic: 0.8845.

) CPU utilization of the entire system when CAM application is active.

60 70 80 90 100(s)

sis from clogging simulation.

ad hoc network for mitigation of crowd disasters, Ad Hoc Netw.

Page 15: Context aware ad hoc network for mitigation of crowd disasters

M.V. Ramesh et al. / Ad Hoc Networks xxx (2013) xxx–xxx 15

� Mean absolute error: 0.0569.� Root mean squared error: 0.2169.� Relative absolute error: 13.0096%.� Root relative squared error: 46.3803%.� Coverage of cases (0.95 level): 93.1655%.� Mean rel. region size (0.95 level): 33.5731%.

The major criteria for the detection of fall is when thelower threshold value of tri-axis acceleration vector sumis approximately around 5 m/s2 and the upper thresholdvalue greater than or equal to 20 m/s2.

5.2.3. Performance analysis and validation of stampedeprediction algorithm

Signal processing on raw accelerometer data obtainedfrom simulation of the clogging effect in a narrow pathwaywas performed to determine the decision threshold value.The Root Mean Square (RMS) value of the accelerometervalues obtained by performing three different simulationsis shown in the figure. Based on the analysis of the RMSvalues, we were able to take 13 m/s2 as the abnormalitydetection threshold (shown as red1 line in Fig. 14) for ourdistributed consensus algorithm, i.e. a prediction alert forstampede (in the simulation purpose clogging effect) occurswhen all the participant nodes the group exceeds the spec-ified threshold value. The decision threshold was set in theAndroid application according to the analysis and was per-formed in a real time scenario for clogging detection andalert generation.

5.2.4. Energy based cost evaluation of the systemThe energy of the proposed framework, CAM, is esti-

mated by making use of PowerTutor application [29]. Thebattery usage of the application including the usage ofCPU and communication cost is approximately 28.7 J. Theanalysis of energy and power are shown in Fig. 15.

6. Conclusion and future work

This research work has designed a mobile sensor net-work system integrated with wireless multimedia sensornetworks (WMS) for effective prediction of a stampedefor crowd disaster mitigation. This resourceful innovation,with an eye on the future for other applications, designed amulti context aware framework and made use of the pro-lific ownership of smartphones. For the implementationof a crowd monitoring system, we developed and evalu-ated individual behavior estimation, distributed behaviorestimation, and a distributed consensus algorithm forstampede prediction. This work has developed an Androidapplication for capturing real time dynamics of crowdbehavior, space configuration, space capacity, traffic pro-cessing capabilities, etc. Our activity recognition algorithmhas an accuracy of 92%, and the stampede prediction algo-rithm makes use of this activity recognition algorithmalong with individual behavior estimation.

Congestion, one of the stampede aspects, was experi-enced in the university building and was used to deter-mine the decision threshold. The Crowd Abnormality

Please cite this article in press as: M.V. Ramesh et al., Context aware(2013), http://dx.doi.org/10.1016/j.adhoc.2013.02.006

Monitor (CAM) application was developed based on thisthreshold. The CAM was tested in a real time situation,and the stampede prediction alert was generated.

Our research work predicts the onset of a stampede inorder to take safety measures such as crowd flow control,pressure relief strategies, and techniques to block thepropagation of crowd pressure shockwaves.

In the future, we plan to extend this research to inte-grate multimedia processing with mobile phone sensingfor better accuracy of stampede detection. Since modelingof a stampede using mobile phones is a new area, more re-search work needs to be brought in for crowd force estima-tion and modeling using mobile phones for stampedeprediction.

The ultimate objective of this research work is to devel-op a non-redundant and data sharing context aware frame-work for multiple applications including healthcare, trafficmonitoring, etc.

Acknowledgements

We would like to express our immense gratitude to ourbeloved Chancellor Sri Mata Amritanandamayi Devi forproviding the motivation and inspiration for doing this re-search work. We would also like to express our gratitude tothe students and faculty of AMRITA Center for WirelessNetworks and Applications for their support in data collec-tion and simulations. We would also like to express oursincere thanks to Ms. Karen Moawad, for providing herhelp in editing this paper.

References

[1] Bill Schilit, Norman Adams, Roy Want, Context aware computingapplications, in: Proceedings of IEEE Workshop on MobileComputing Systems and Applications, Santa Cruz, California,December 1994, pp. 85–90.

[2] Bill Schilit, Marvin Theimer, Disseminating active map informationto mobile hosts, IEEE Network 8 (5) (1994) 22–32.

[3] Albrecht Schmidt, Kofi Asante Aidoo, Antti Takaluoma, UrpoTuomela, Kristof Van Laerhoven, Walter Van de Velde, Advancedinteraction in context, in: Proceedings of First InternationalSymposium on Handheld and Ubiquitous Computing, Karlsruhe,Germany, September 1999, pp. 89–101.

[4] Guanling Chen, David Kotz, A survey of contextaware mobilecomputing research, Technical Report TR2000-381, ComputerScience Department, Dartmouth College, Hanover, New Hampshire,November 2000.

[5] Anind K. Dey, Understanding and using context, Personal andUbiquitous Computing 5 (1) (2001) 4–7.

[6] J. Pascoe, N. Ryan, D. Morse, Using while moving: HCI issues infieldwork, ACM Transactions on Computer–Human Interaction(TOCHI) 7 (3) (2000) 417–437.

[7] S.P. Hall, E. Anderson, Operating systems for mobile computing,Journal for Computing in Small Colleges 25 (2009) 64–71.

[8] Google, Android Developers, 2010. <http://developer.android.com/>.[9] Safer Crowds, 2012. <http://www.safercrowds.com/>.

[10] JagdishRebello, India Cell Phone Penetration to Reach 97% in 2012.<http://www.isuppli.com/Mobile-and-Wireless-Communications/News/Pages/India-Cell-Phone-Penetration-to-Reach-97-Percent-in-2014.aspx>.

[11] Anthony C. Davies, Jia Hong Yin, Sergio A. Velastin, Crowdmonitoring using image processing, IEE Electronic andCommunications Engineering Journal 7 (1) (1995) 37–47.

[12] L. Gomez, A. Laube, C. Ulmer, Secure sensor networks for publicsafety command and control system, IEEE Technologies forHomeland Security (2009).

ad hoc network for mitigation of crowd disasters, Ad Hoc Netw.

Page 16: Context aware ad hoc network for mitigation of crowd disasters

16 M.V. Ramesh et al. / Ad Hoc Networks xxx (2013) xxx–xxx

[13] Jennifer R. Kwapisz, Gary M. Weiss, Samuel A. Moore, Activityrecognition using cell phone accelerometers, ACM SensorKDD,Washington, DC, USA, 2010.

[14] T. Ryan Burchfield, S. Venkatesan, Accelerometer based HumanAbnormal Movement Detection in Wireless Sensor Networks, 2006.

[15] J.C. Puras, C.A. Iglesias, Disasters2.0 Application of Web2.0Technologies in Emergency Situations.

[16] Y. Nakajima, H. Shiina, S. Yamane, T. Ishida, H. Yamaki, Disasterevacuation guide: using a massively multiagent server and GPSmobile phones, Applications and the Internet (2007).

[17] Martin Wirz, Daniel Roggen, Gerhard Tröster, Decentralizeddetection of group formations from wearable acceleration sensors,CSE (4) (2009).

[18] John J. Fruin, The causes and prevention of crowd disasters, in: FirstInternational Conference on Engineering for Crowd Safety, 2002.

[19] D. Helbing, P. Mulnar, Social force model for pedestrian dynamics,Physical Review E 51 (1995) 4284–4286.

[20] D. Helbing, I. Farkas, T. Vicsek, Simulating dynamical features ofescape panic, Nature 407 (2000) 487–490.

[21] R.L. Hughes, The flow of human crowds, Annual Reviews of FluidMechanics 35 (2003) 169–183.

[22] J. Burke, M. Hansen, A. Parker, N. Ramanathan, S. Reddy, M.B.Srivastava, Participatory sensing, in: WSW’06 at SenSys, ACM,Boulder, 2006.

[23] Deborah Estrin, Participatory sensing: applications and architecture,IEEE Internet Computing, 2010. <www.computer.org/Internet>.

[24] T. Vincenty, Direct and Inverse Solutions of Geodesics on theEllipsoid with application of nested equations, April 1975.

[25] Davide Figo, Pedro C. Diniz, Diogo R. Ferreira, Joao M.P. Cardoso,Preprocessing techniques for context recognition fromaccelerometer data, Personal and Ubiquitous Computing 14 (7)(2010) 645–662.

[26] L. Bao, S. Intille, Activity recognition from user-annotatedacceleration data, Lecture Notes Computer Science 3001 (2004) 1–17.

[27] I.H. Witten, E. Frank, Data Mining: Practical Machine Learning Toolsand Techniques, second ed., Morgan Kaufmann, 2005.

[28] Martin Wirz, Daniel Roggen, Gerhard Troster, Recognition of crowdbehavior from mobile sensors with pattern analysis and graphclustering methods, Networks and Heterogeneous Media 6 (2011).

[29] PowerTutor, 2012. <http://ziyang.eecs.umich.edu/projects/powertutor/>.

[30] James J. Park, Jong Hyuk Park. Embedded and MultimediaComputing Technology and Service: Emc 2012, Springer, 2012.

[31] Maneesha V. Ramesh, Design, development, and deployment of awireless sensor network for detection of landslides, Ad HocNetworks, Elsevier, 2012, accepted for publication.

Maneesha V. Ramesh is the Director & Asso-ciate Professor of Amrita Centre for WirelessNetwork and Applications (www.amrita.edu/awna) and is the Director of Amrita Center forInternational Programs in the AmritapuriCampus of Amrita University, India. Shereceived her PhD in Computer Science fromAmrita University on ‘‘Wireless Sensor Net-work to detect rainfall induced landslides’’.She is the pioneer in building up and launch-ing, India’s first ever landslide detectionthrough WINSOC’, the European funded pro-

ject, in which she was the Principal Investigator. Data is continuously realstreamed to the web page www.winsoc.org. The project had issued a realtime warning in July 2009 for a potential landslide in Kerala, Southern

India. The landslide system won the rural innovation award fromNABARD, Govt. of India. Her research areas include wireless sensor net-works for disaster management, wireless networks for bio-nano-medicalapplications, wireless sensor network algorithms, wireless networkdesign and development, context aware systems, participatory sensing,mobile computing, smart grid etc.

Please cite this article in press as: M.V. Ramesh et al., Context aware(2013), http://dx.doi.org/10.1016/j.adhoc.2013.02.006

Anjitha Shanmughan is a Master’s student inAMRITA Center for Wireless Networks &Applications, Amrita University. She holds aBachelors’ degree in Computer Science andEngineering. Her research interests are wire-less sensor networks, context aware comput-ing and crowd dynamics modeling.

Rekha Prabha is a research associate inAMRITA Center for Wireless Networks &Applications, Amrita University. She is pur-suing PhD in the area of heterogeneouswireless networks. She holds a Masters degreein Applied Electronics and posse’s industrialexperience in product development, testingand documentation activities in the embed-ded domain. She was involved in the projectWINSOC, India’s first ever wireless sensornetwork to detect rain induced landslides. Herresearch interests are on wireless networks,

energy optimization, and embedded systems. Her particular interest is on

overlay communication and self-organized wireless networks.

ad hoc network for mitigation of crowd disasters, Ad Hoc Netw.