Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Problem Statement: Disaster ScenarioDisasters, whether natural ( like floods and hurricanes ) or human - caused ( such as chemical spills ) , pose significant

Problem Statement: Disaster ScenarioDisasters, whether natural (like floods and hurricanes) or human-caused (such as chemical spills), pose significant challenges globally. The frequency and intensity of these events are increasing due to climate change. During such disasters, communication infrastructure often fails, hindering rescue operations and community support efforts.Solution Description: Argus CrisisThe project aims to develop "Argus Crisis," a resilient communication system during flood disasters. The system leverages drones equipped with MQTT-enabled smartphones to facilitate distress communication from affected individuals. These messages are relayed through a distributed MQTT broker network to a central Crisis Management Center (CMC), where data is aggregated and visualized in a dashboard for efficient rescue coordination.Task: Create a Detailed DFD (50 points)Develop a comprehensive Data Flow Diagram (DFD) using OWASP Dragon, illustrating the entire Argus Crisis System:External Client Interaction: Depict interactions with external users sending distress messages via smartphones.Drone-Embedded Brokers: Illustrate how drones act as MQTT brokers, receiving and forwarding distress messages.Server Components: Detail the components at the Crisis Management Center (CMC), including an MQTT broker, database for storing distress messages, and a dashboard for visualization.Data Storage: Specify how data flows from drones to the CMCs database and how it is processed for visualization.Message Flow: Map out the flow of distress messages from initial transmission by users through drones to final aggregation and visualization at the CMC.Deliverable: Provide the DFD in OWASP Dragon (JSON file) along with a detailed table explaining each process, storage, and external entity. Include descriptions of how each component handles input, processes data, and produces output.(PLEASE Link to screenshot of the diagram created on OWASP threat dragon)

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

New Trends In Databases And Information Systems Adbis 2019 Short Papers Workshops Bbigap Qauca Sembdm Simpda M2p Madeisd And Doctoral Consortium Bled Slovenia September 8 11 2019 Proceedings

Authors: Tatjana Welzer ,Johann Eder ,Vili Podgorelec ,Robert Wrembel ,Mirjana Ivanovic ,Johann Gamper ,Mikolaj Morzy ,Theodoros Tzouramanis ,Jerome Darmont

1st Edition

3030302776, 978-3030302771

More Books

Students also viewed these Databases questions

Question

What is gravity?

Answered: 1 week ago

Question

What is the Big Bang Theory?

Answered: 1 week ago