University of Wollongong Research Online University of Wollongong Thesis Collection 1954-2016 University of Wollongong Thesis Collections 2005 Applying wireless and mobile agent technologies for human decision making in the mission critical emergency environments Hamidreza Pousti University of Wollongong Recommended Citation Pousti, Hamidreza, Applying wireless and mobile agent technologies for human decision making in the mission critical emergency environments, PhD thesis, School of Economics and Information Systems, University of Wollongong, 2005. http://ro.uow.edu.au/ theses/299 Research Online is the open access institutional repository for the University of Wollongong. For further information contact the UOW Library: [email protected] Applying wireless and mobile agent technologies for human decision making in the mission critical emergency environments A thesis submitted in fulfilment of the requirements for the award of the degree Master of Information Systems (Research) from UNIVERSITY OF WOLLONGONG by Hamidreza Pousti BSc (University of Tehran) MICT (University of Wollongong) School of Economics and Information Systems 2005 Abstract Emergency response tasks, both military and civilian, occur in what are termed, 'Extreme Environments' characterised by uncertainty, high stress physical situations, and time sensitive decision-making. Emergency response crews in such environments need to be highly mobile, utilising a variety of advanced wireless technologies to communicate while accomplishing their assignments. It is crucial for the users in the field to be aware of their own situation and the situation in their vicinity to construct their own goals in coping with unpredictable conditions. These are problems identified in the Small Unit Operation (SUO) model used by the military in situations where people and equipment work together to meet some mission objective. These entities may have distinct roles and information needs, and are often geographically distributed. Moreover, other groups of users in the command and control (C2) position need to have an overall and clear picture of the current state of the operation, at the necessary level of detail, in order to make the proper decisions based upon different types of information they receive and their own knowledge. To tackle these issues, users face challenges concerned with the responsible for handling data through volatile wireless network connections and narrow bandwidth conditions. These conditions pose new challenges for all parties of users in terms of situation-awareness, sensemaking, reliable decision making and consequent actions. The aim of this research is to focus on technologies that can help decision makers in two ways: reduce the level of environmental uncertainty, and provide better situation awareness and sensemaking for individuals and teams in extreme environments. These technologies are studied in the light of human sensemaking requirements and the factors contributing to human cognitive states, especially in time critical situations. To achieve this aim, a secondary case study was carried out to identify various user requirements in dynamic environments, and the ways technologies can address those needs. Results show that many new wireless technologies, such as those based on Ultra Wideband (UWB) radio, demonstrate considerable potential for emergency response tasks circumstances. Furthermore, software agents show potential for deployment in emergency tasks to reduce the degree of uncertainty. Software mobile agents also show potential to improve the accuracy and agility of operations along with the ability to deal with the volatile wireless networks. The way decision makers understand their environmental states is vital for the success of emergency response operations. This understanding depends on the human capabilities of interpretation of information, as well as the memory and knowledge of decision makers at the moment the information is received. Thus, human issues need to be understood alongside the advances in technology. The potential contributions of the concept of mobile agents in this area is significant, especially where software mobile agents work as autonomous entities in order to handle the task and local decisions, on behalf of mobile emergency response crews. These findings draw attention to the significant role of software mobile agents working in a meshed wireless network. They could provide an ubiquitous network in an extreme environment. They also have the capability of supporting users' situation awareness, sensemaking and critical decision making, vital in emergency response environments. CERTIFICATION I, Hamidreza Pousti, declare that this thesis, submitted in fulfilment of the requirements for the award of Master degree, in the Department of information systems, University of Wollongong, is wholly my own work unless otherwise referenced or acknowledged. The document has not been submitted for qualifications at any other academic institution. Hamidreza. Pousti 03 August 2005 Acknowledgements Many people supported me during the completion of this thesis with criticism, helpful assistance, and references. This thesis would have never been possible without them. I would like to take this opportunity to offer thanks to all of them. Firstly, my sincere thanks go to my supervisors, Associated Professor Helen Hasan and Professor Eryk Dutkiewicz. They have asked just the right questions at precisely the right times. They forced me to think when I believed I had thought enough. They gave strength to my mind, and they were always there. Helen, your time, patience and wisdom are greatly appreciated. Your earnest and steadfast mentorship helped reveal to me the true nature of scientific enquiry, for which you have earned my deepest respect and gratitude. Also I am extremely grateful to Eryk for accepting the responsibility of being my co-supervisor. Eryk, you always steered me in the right direction when I wasn’t certain which path to investigate and I acknowledge your awesome helps and contribution to my Master studies. Many thanks to the University of Wollongong, particularly Department of Information Systems and the head of the department, Professor Peter Eklund, for supporting my research and giving me the chance to present my research topic there and providing me with valuable feedbacks. Likewise, I am grateful to the Faculty of Commerce at the University of Wollongong, especially Dean of Faculty of Commerce, Professor John Glynn and faculty's Research Manager, Mr. David Aylward, for supporting and providing me with amazing and unique facilities at the new Commerce Research Centre. I owe a considerable dept of gratefulness to many friends and colleagues who filled my life with laughter and joy throughout my Master thesis. I owe an immense debt of gratitude to my family and my acknowledgements now move closer to home to all my immediate and extended family. Mum and Dad, there are no word to express my gratitude but know it was you who have been my strength throughout. Dad (Pedaram) I am proud of you and I have had always this feeling in my heart for every single moment. Dad, your continual interest, advises, enthusiasm and support were my life-raft. Mum (Madaram) I learned the biggest lessens of my life in your hug. I understood what the love is just because of you. Your love and encouragement is my wealth. And finally, my beloved wife, Naghmeh, for your unconditional love and support particularly, during the times when it all seemed too hard. You are more deserving of my thanks than anyone for bringing this thesis to end. Few people are as fortunate as I am, however, to have a spouse who has offered not only emotional support but intellectual support as well. Thank you for all your patience and scarifies you made in all countless nights and weekends I spent locked away in front of computer. This journey would not have been possible and such an amazing experience without you. I would like to thank you for, quite simply, everything: Naghmeh, your companionship means the world to me. Publications and Awards • Pousti, H. and Hasan, H. (2005), ‘Knowledge Management through Mobile Networks in Emergency Situations’, Proceeding of 4th International Conference on Mobile Business, ICMB 2005, Sydney, Australia. • Pousti, H., Hasan, H. and Dutkiewicz, E. (2005), ‘Application of Mobile Agents in Wireless-Based Mission Critical Emergency Operations’, Proceeding of the 11th International Conference on Distributed Multimedia Systems, DMS'2005, Banff, Canada. • Pousti H. and Dutkiewicz, E. (2005),’ Effects of wireless-based mobile agents on the effectiveness of critical operations in extreme environments’, Accepted paper in the 2nd International conference on Mobile Technology, Applications and Systems, IEE Mobility 2005, Nov. 2005, Guangzhou, China. • Selected thesis topic from the Faculty of Commerce for the PhD Research Commercialisation Workshop in Queensland, April 2005 Table of Contents List of Figures List of Tables List of Abbreviations 1. Introduction ........................................................................................................ 1 1.1. Introduction .................................................................................................. 1 1.2. Outline of the Thesis .................................................................................... 5 2. Research Methodology ....................................................................................... 7 2.1. Chapter Overview ........................................................................................ 7 2.2. Introduction .................................................................................................. 7 2.3. The case for a qualitative research approach ............................................... 8 2.4. Ethnography ............................................................................................... 10 2.5. Action Research ......................................................................................... 12 2.6. Grounded Theory ....................................................................................... 15 2.7. Case Study .................................................................................................. 17 2.8. Justification for the case study used in this research .................................. 20 2.9. Limitations ................................................................................................. 27 3. Literature Review ............................................................................................. 29 3.1. Introduction ................................................................................................ 29 3.2. Review of agent technology literature ....................................................... 30 3.2.1. Defining an agent ........................................................................... 30 3.2.2. Attributes and Characteristics of Agents ........................................ 34 3.2.3. Agent Environment ........................................................................ 40 3.2.4. Mobile Agents ................................................................................ 42 3.3. Review of public safety literature .............................................................. 58 3.4. Review of wireless technology literature ................................................... 63 3.4.1. Wireless Local Area Networks ...................................................... 63 i 3.4.2. Ad hoc Wireless Networks ............................................................. 66 3.4.3. Bluetooth ........................................................................................ 79 3.4.4. Zigbee ............................................................................................. 82 3.4.5. IEEE 802.11 ................................................................................... 87 3.4.6. Ultra Wide Band (UWB) ................................................................ 91 3.5. Review of Wearable Computing literature ................................................. 98 4. Analysis of results ........................................................................................... 105 4.1. Introduction .............................................................................................. 105 4.2. Review of the September 11, 2001 WTC Collapse ................................. 106 4.2.1. Background .................................................................................. 106 4.2.2. First hit on the World Trade Centre ............................................. 107 4.2.3. Second hit on the World Trade Centre ......................................... 111 4.3. Case Discussion ........................................................................................ 115 4.4. Case Study Analysis ................................................................................. 120 4.4.1. Large number of users involved in the radio communication ...... 121 4.4.2. Lack of interoperability among different parties .......................... 123 4.4.3. Data traffic and network congestion ............................................ 125 4.4.4. Lack of Meta Data ........................................................................ 127 4.4.5. Network interruptions and volatility ............................................ 129 4.4.6. Problems concerning the suitability of equipment ....................... 130 4.4.7. Intelligent communication systems with autonomy ..................... 132 5. Discussions ...................................................................................................... 136 5.1. Introduction .............................................................................................. 136 5.2. Small Unit Operation ............................................................................... 138 5.3. Mobile Agents .......................................................................................... 140 5.4. Message Routing ...................................................................................... 145 5.5. Mesh Networks ........................................................................................ 148 5.5.1. Scenario 1 (Civilian fire event) .................................................... 153 5.5.2. Scenario 2 (Dangerous area isolation) ......................................... 158 5.6. Ultra Wideband technology ..................................................................... 160 5.7. Sensor Networks ...................................................................................... 166 5.8. Agent Framework ..................................................................................... 171 ii 5.9. Human, the ultimate decision maker and actor ........................................ 178 5.9.1. Situation Awareness and Decision Making ................................. 179 5.9.2. Sensemaking in a Changing Environment ................................... 185 5.9.3. Knowledge and Sensemaking .................................................... 193 5.9.3.1. Role of Knowledge Management in the Sensemaking Process194 5.10. Chapter Conclusion ................................................................................ 197 6. Conclusions ..................................................................................................... 198 6.1. A Summary of the Results and Conclusions ............................................ 198 6.2. Further Work ............................................................................................ 201 Bibliography Appendixes iii List of Figures 3.1 Interactions between an agent and its environment ....................................... 32 3.2 Combination of primary attributes of agents .................................................. 37 3.3 The framework in which a mobile agent can move throughout a network .... 44 3.4 Classification of wireless technologies based on the coverage rang .............. 65 3.5 Parasitic mobile ad hoc WLAN ..................................................................... 67 3.6 A typical wireless bridge topology – point to point ....................................... 69 3.7 A typical wireless Star topology – Point to Multipoint .................................. 70 3.8 A typical wireless mesh topology – peer to peer ........................................... 70 3.9 A Bluetooth piconet with one master and up to 8 slave nodes ...................... 80 3.10 A Bluetooth scaternet with two masters.......................................................... 81 3.11 Different types of topologies supported by Zigbee......................................... 84 3.12 Comparison of narrowband spectrum and Ultra-wideband ............................ 92 3.13 Different wireless technologies range and data rate........................................ 98 3.14 Attributes of wearable computing devices in interaction with humans ........ 101 4.1 The area destroyed in the North Tower hit by the first airplane ................... 109 4.2 The area destroyed in the South Tower hit by the first airplane ................... 112 5.1 A mesh configuration that every node can function as a outer .................... 151 5.2 An ad hoc wireless network supported by mesh topology at the scene ........ 154 5.3 Compatibility of mesh networks and SUO ................................................... 154 5.4 Determining the location of the first responder inside the buildings ............ 156 5.5 Different public safety agencies can communicate to each other ................. 157 iv 5.6 Isolation of dangerous area to protect civilians............................................. 158 5.7 Set up a fast and reliable network instantly at the scene............................... 159 5.8 Communications scenario through UWB ..................................................... 165 5.9 RETSINA framework ................................................................................... 175 5.10 Proposed framework based on the mobile agent........................................... 177 5.11 Source of situation awareness information ................................................... 183 5.12 Cognitive Processes of an Action.................................................................. 184 5.13 Single Sensemaking Cycle ............................................................................ 192 5.14 Sensemaking cycle and linkages ................................................................... 193 5.15 The sensemaking triangle.............................................................................. 195 v List of Tables 3.1 Comparison of different wireless topology .................................................... 72 3.2 Comparison table of Bluetooth and other wireless standards ........................ 82 3.3 Zigbee physical device types .......................................................................... 85 3.4 IEEE 802.11 different standards and their specifications .............................. 88 3.5 Comparison of 802.11a, 802.11b and 802.11g .............................................. 90 3.6 UWB specifications and applications ............................................................ 96 5.1 Comparison of different wireless topologies ............................................... 152 5.2 Pproperties of the UWB and its benefits ...................................................... 162 5.3 Comparison between different wireless standards ....................................... 164 vi List of Abbreviations 3D APRL AWICS C2 DARPA EMS FDNY FFD GPSR ICT IEEE IS KM LAN LPD MANET M-MPR MP-MP NYPD OFDM PAN PAPD PDA PHY/MAC PMP P-MP RAM RETSINA RF RFD ROM RPC SA SEA SUO TCP/IP UWB WBAN Wi-Fi WLAN WPAN WSN WTC 3 Dimensions Any-Path Routing without Loops Aircraft Wireless Intercommunications System Command and Control Defense Advanced Research Projects Agency Emergency Medical Service Fire Department of New York Full Function Device Greedy Perimeter Stateless Routing Information and Communications Technology Institute of Electrical and Electronics Engineers Information Systems Knowledge Management Local Area Network Low Probability of Detection Mobile Ad hoc Network Meshed Multi Path Routing Multi Point to Multi Point New York Police Department Orthogonal Frequency Division Multiplexing Personal Area Network Port Authority Police Department Personal Digital Assistant Physical/Media Access Point to Multi Point Point to Multi Point Random Access Memory Reusable Environment for Task Structured Intelligent Network Agents Radio Frequency Reduced Function Device Read Only Memory Remote Procedure Call Situation Awareness Spokesman Election Algorithm Small Unit Operation Transmission Control Protocol / Internet Protocol Ultra Wide Band Wireless Body Area Network Wireless Fidelity Wireless Local Area Network Wireless Personal Area Network Wireless Sensor Network World Trading Centre vii
© Copyright 2026 Paperzz