Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Problem Statement: Disaster ScenarioDisasters, whether natural ( like floods and hurricanes ) or human - caused ( such as chemical spills ) , pose significant

Problem Statement: Disaster ScenarioDisasters, whether natural (like floods and hurricanes) or human-caused (such as chemical spills), pose significant challenges globally. The frequency and intensity of these events are increasing due to climate change. During such disasters, communication infrastructure often fails, hindering rescue operations and community support efforts.Solution Description: Argus CrisisThe project aims to develop "Argus Crisis," a resilient communication system during flood disasters. The system leverages drones equipped with MQTT-enabled smartphones to facilitate distress communication from affected individuals. These messages are relayed through a distributed MQTT broker network to a central Crisis Management Center (CMC), where data is aggregated and visualized in a dashboard for efficient rescue coordination.Task: Create a Detailed DFD (50 points)Develop a comprehensive Data Flow Diagram (DFD) using OWASP Dragon, illustrating the entire Argus Crisis System:External Client Interaction: Depict interactions with external users sending distress messages via smartphones.Drone-Embedded Brokers: Illustrate how drones act as MQTT brokers, receiving and forwarding distress messages.Server Components: Detail the components at the Crisis Management Center (CMC), including an MQTT broker, database for storing distress messages, and a dashboard for visualization.Data Storage: Specify how data flows from drones to the CMCs database and how it is processed for visualization.Message Flow: Map out the flow of distress messages from initial transmission by users through drones to final aggregation and visualization at the CMC.Deliverable: Provide the DFD in OWASP Dragon (JSON file) along with a detailed table explaining each process, storage, and external entity. Include descriptions of how each component handles input, processes data, and produces output.(PLEASE Link to screenshot of the diagram created on OWASP threat dragon)

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Machine Learning And Knowledge Discovery In Databases European Conference Ecml Pkdd 2015 Porto Portugal September 7 11 2015 Proceedings Part 1 Lnai 9284

Authors: Annalisa Appice ,Pedro Pereira Rodrigues ,Vitor Santos Costa ,Carlos Soares ,Joao Gama ,Alipio Jorge

1st Edition

3319235273, 978-3319235271

More Books

Students also viewed these Databases questions

Question

Connect with your audience

Answered: 1 week ago