<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>A Platform for Wild re Fighting: A Comprehensive Approach</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>David Villa</string-name>
          <email>david.villa@uclm.es</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Felix J. Villanueva</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Maria J. Santo mia</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>F. Moya</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Juan Carlos Lopez</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Information Technologies and Systems School of Computer Science Ciudad Real</institution>
          ,
          <country country="ES">Spain</country>
        </aff>
      </contrib-group>
      <fpage>27</fpage>
      <lpage>40</lpage>
      <abstract>
        <p>This paper describes a support platform for integrating services and technologies, most of them speci cally devoted to wild re ghting. The platform presented summarizes a three years work project, funded by the Prometeo research project, involving a consortium of fteen companies and several research centers and universities. Sensors, control command centers, 3D visualization technologies, re real-time simulations, re ghting helicopters and airplanes, or re ghters, among the most relevant, are examples of the entities integrated into a comprehensive approach whose main purpose consists in avoiding the \information island" phenomenon, currently dramatically impacting the wild re ghting task.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>Standard procedures to wild re ghting are characterized by lack of precision
and delays of verbal communications held by the extinction coordinator and the
di erent teams involved in the eld works. Despite the fact that there might
exist information gathering subsystems such as weather historic data, weather
forecast or satellite images, this information can be considered obsolete taking
into account the period of measurement in contrast to how quickly wild res
evolve.</p>
      <p>This type of scenarios, in which there is an evolving event that somehow
can be predicted, could be bene t from a platform that provides real-time live
data, based on sensed data, simulations and forecasts. However this type of
architecture poses highly demanded challenges such as integration issues among
heterogeneous systems and devices as well as communication support for the
di erent systems sensors and devices involved in this type of scenarios.</p>
      <p>Information representation is also a key issue, since data is coming from
di erent sources, implementing di erent standards or information models.
Centralizing this information into sink is also a relevant need that should be tackled.</p>
      <p>Wild re ghting is a key concern for the Spanish government. Every summer
a sequence of catastrophic res ruin large extensions of forest, having a dramatic
impact in the local fauna, sometimes even getting to populated areas. Due to
the economic and environmental impact that res have on countries, the
Spanish government has funded a four years research project intended to leverage
technological advances to support re extinction works.</p>
      <p>This project has been mainly devoted to provide re extinction groups with
updated and live data about how re and weather conditions evolve.
Additionally, this information can be combined with climate and fuel models to simulate
the directions towards which the re is evolving. This main intention is
articulated through several subgoals, which basically consist in:
{ A permanent infrastructure to manage incoming wild re alarms and sighting.
{ Integration and coordination of a wide variety of live information providers.
{ Full featured graphical representation for all of the information collected.
{ Mechanisms to create ad-hoc communication facilities on the event of a
wildre.
{ Data representation homogenization to make parties inter-operate.
{ Common event format speci cation for all parties.</p>
      <p>The rest of the paper is organized as follows. Section 2 presents similar works
focused in communication infrastructure and details, section 3 describes the
project overall goals and components; then section 4 deals with the
communication requirements and the proposed approach.</p>
      <p>By means of a communication middleware, platform provides a powerful
integration mechanism which is especially important in this scenario due the
diversity of programming languages, computer architectures and even partners
sta technical knowledge background.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Related work</title>
      <p>
        The literature revision on re ghting brings into light a relevant number of
works, most of them mainly focused in a speci c domain. Wild re
monitoring [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], architectures for re ghting tactical training [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], task allocation for
brigades [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], autonomous re- ghting robot design [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], etc. are examples of works
in which the emphasis is made in a speci c domain rather than considering the
overall complex problem of re ghting. Despite the fact that this approach
enables a better understanding of the di erent problems faced by di erent domains,
the lack of comprehensive approaches leaves numerous issues open that would
otherwise arise during the integration of partial solutions.
      </p>
      <p>
        Several works basically focus their proposal in using new IT technologies for
gathering information for wild re prediction, detection and/or monitoring. An
example of this type of works can be found in [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] in which a 802.15.4 based
wireless sensor network (WSN) is designed, basically for indoor environments.
The platform also includes RFID tag position (sensors, re ghting men, etc.)
and video surveillance cameras.
      </p>
      <p>
        Additionally, other works base their proposals in integrating high level
information. In [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], a Web-Service based architecture is proposed for integrating
information systems in an abstract, loosely coupled and coarse-grained way. The main
drawback of this work is that it focuses in high-level information services,
involving the use of Web-Service protocols (e.g. XML-text based protocols, HTTP,
etc.). However, these type of protocols are not appropriate for low-bandwidth
networks used in sensor networks, delay tolerant networks, etc., which will be
common in future re ghting scenarios as we will see later.
      </p>
      <p>
        An additional approach encompasses those e orts aimed at integrating
speci c tools. For example in [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], an integration of simulations with geographical
information systems (GIS) is described, enabling data representation through
visualization improvements. Moreover, the work in [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] describes an approach for
integrating environmental models like satellite images, meteorological
information, etc. None of these works consider the integration of environmental real-time
information, brigades position, etc. essential for a successful approach to wild re
re ghting.
      </p>
      <p>The literature revision therefore brings into light a lack of comprehensive
approaches that support the integration of information, coming from di erent
sources and devoted to assist in tactical decisions in a wild re extinction. From
an engineering point of view and as we will see later, we followed a bottom-up
approach identifying data sources relevant to the purpose of the system and
integrating all elements in a seamless way. When we started the project, we analyzed
re ghting technologies used in re extinction, identi ed future technologies to
be integrated and started to extract the information model from acknowledge
experts.
3</p>
    </sec>
    <sec id="sec-3">
      <title>Project overview</title>
      <p>One of the main contributions of the Prometeo project is the multidisciplinary
approach it advocates for managing the heterogeneous sources of information
and actuation. In this sense, di erent people roles and devices are involved in
the task of compiling wild re live information. This information is provided to
the extinction coordinator who will be able to take grounded decisions, that will
be strategically aimed at protecting people, goods and infrastructure, and
natural resources, in this order. Providing the extinction coordinator with live and
simulated information about the current and future state of the re does not
only minimizes response times but it also helps on preventing irreparable
damages. For these reasons, Prometeo may be seen as a real-time Decision Support
System.</p>
      <p>In order to tackle this general goal, the di erent stages that are traditionally
involved in a wild re extinction have to be adopted and adapted to incorporate
the technological and communication advances considered in this project. A
summarized version of the involved stages is described underneath. Additionally,
gure 1 depicts the di erent elements involved in the following stages:
{ The PSU (Prometeo Support Unit) receives a re alarm that speci es the
approximate location where the re has been detected. The re alarm might
come from di erent sources: deployed sensors, observation towers, satellite
images, etc.
{ A helicopter takes o as soon as the re alarm has been validated. It ies
to the given location waiting for further information to be received during
y time. This helicopter carry three people: the person who operates the
camera and two transmission operators, apart from the people operating the
helicopter.
{ In the meantime, the support unit gathers preliminary weather forecast. This
information is combined with latest news and events that somehow helps on
completing a more accurate view of the overall wild re situation.
{ The support unit is constantly updating the helicopter crew with new
information, using a 3G connection.
{ The helicopter takes ground in a safe area near the wild re. There, a
transmission operator lands, carrying the required equipment to establish a PAU
(Prometeo Advanced Unit), which can be seen as the communication
center of the ad-hoc infrastructure that it is being deployed. The advanced unit
includes an antena to establish a satellite link to connect to the support unit.
{ The helicopter takes o and explores the surrounding area taking photos,
infra-red (IR) and multi-spectral images. That information is sent back to the
PUA using WIMAX/VHF connection. The advanced unit forwards relevant
information to the support unit through the satellite link.
{ The helicopter might land again to deploy additional sensors and repeaters in
those places that become relevant for the re evolution in which no previous
sensors were deployed. These new sensors and repeaters will be in charge of
sending data back to the advanced unit. The second transmission operator
left back to the advanced unit.
{ Land brigades arrive to the wild re scenario using ground vehicles. During
their actuation in the eld, land brigades are monitored by collecting
physiological data using wearable sensors. Environmental data is also collected
and combined with the physiological data to be sent back to the advanced
unit. This information will be used to preserve their safety anticipating risk.</p>
      <p>After having deployed the human, technological, and communication
infrastructure described above, the re extinction works start up. Di erent aspects
need to be considered during this process, such as weather, human brigades
and helicopter locations, foreseeable evolution of the wild re, etc. These aspects
are monitored and supported on di erent modules, distributed all along the
considered scenario. These modules are described in the following subsections.
Additionally, gure 1 represents how these modules are deployed in di erent
locations.
3.1</p>
      <sec id="sec-3-1">
        <title>Environment sensing</title>
        <p>Depending on available resources, some \sentinel" sensor nodes (forming a WSN)
may be permanently deployed in the forest. These sensors include temperature,
humidity, wind speed and direction, intensity of light and rain. These wireless
nodes centralize data acquisition on a local bridge that can contact the support
unit when required through a 3G/GPRS modem attached to the bridge. Data
taken from sensors is locally evaluated to determine risk situations and may lead
to a re alarm event.</p>
        <p>At the time of a wild re, helicopter people may deploy additional sensor
nodes and repeaters where required. At that situation, data communication
among the WSN and support unit can be done through the satellite link, to
avoid coverage and bandwidth issues.</p>
        <p>Additionally, during a wild re situation it is desirable to gather information
as representative as possible about the environmental conditions. In order to do
that, new sensor nodes and repeaters are deployed ad-hoc by the transmission
operator, landed from the helicopter.
3.2</p>
      </sec>
      <sec id="sec-3-2">
        <title>Brigade monitoring</title>
        <p>
          This module monitors the physiological evolution of the land brigades such
as heart rate, body temperature and sweating. These measures are collected
through a set of wearable sensors located in the re ghter suits. The wearable
sensor information along with GNSS coordinates are sent to the brigade leader.
This transmission is performed every few seconds using the ANT+ protocol[
          <xref ref-type="bibr" rid="ref11">11</xref>
          ]
and ZigBee[
          <xref ref-type="bibr" rid="ref12">12</xref>
          ]. In this sense, the brigade leader works as a router through which
information is sent to the helicopter, whenever it is within the WIMAX range.
This information is then forwarded by the helicopter to the advanced unit. The
role of the helicopter in the transmission process is basically that of a repeater.
        </p>
        <p>Additionally, the leader has some other environmental sensors, such as:
temperature, humidity and CO2. As mentioned before, this data is combined with
the data received from his/her peers and re-transmitted.
3.3</p>
      </sec>
      <sec id="sec-3-3">
        <title>Forecasting</title>
        <p>Regional governments may provide general forecasting information that may be
useful for project activities. Also, a inner process provides speci c forecasting
for the re a ected area and surroundings with better resolution.
3.4</p>
      </sec>
      <sec id="sec-3-4">
        <title>Propagation maps</title>
        <p>By means of simulation it is possible to obtain a re propagation model. Many
factors in uence such model; one of most important is the vegetation
characterization, specially its moisture (FMC). This process produces maps in NetCDF
format that may be directly consumed by other processes.
3.5</p>
      </sec>
      <sec id="sec-3-5">
        <title>Image, IR, multi spectral</title>
        <p>Helicopters are equipped with conventional and IR cameras. When the helicopter
recognizes the re scenario, it takes images that are immediately sent to the
advanced unit, and hence to all interested peers.
3.6</p>
      </sec>
      <sec id="sec-3-6">
        <title>Fire simulation</title>
        <p>The re simulation module takes forecast and FMC data and provides
estimations every two hours. Simulations include hourly geographic details about the
wild re advance for the next twelve hours. This data is very important for the
coordinator. She decides where to send brigades according to the estimated re
behavior specially when people, housing or infrastructures may be a ected.
3.7</p>
      </sec>
      <sec id="sec-3-7">
        <title>3D representation</title>
        <p>All the gathered sensing data, forecast, images and simulations are centralized,
represented and continuously updated in a 3D graphics application. This
application is running in the PCA (Prometeo Advance Command) and also in the
support unit. The PCA is operated by third party people (i.e. government sta ).
4</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Integration Platform</title>
      <p>Regarding the communication platform requirements, Prometeo is composed of
two parts. The rst one is the support unit including all modules attached to it.
The second consists mainly on the advanced unit and is deployed on-site wherever
the re occurs. Both must be connected to share information in both directions
as soon as they are available. The advanced unit communication infrastructure
needs to be operational in a few minutes and it must be ready to integrate
all other modules. Not all modules are present in all deployments and neither
at same time. Infrastructure needs to deal with modules that may appear and
disappear several times during the wild re extinction session.</p>
      <p>The communication model adopted in the Prometeo scenario is mainly event
oriented. All modules are seen as event channel publishers and subscribers. In
fact several of then play both roles. The publish/subscribe model has some
interesting features for this environment:
{ Information is sent as soon as it is available.
{ Only a message is required. Consumers do not need to query producers for
new data. It just requires one-way communication.
{ Publishers are simpler than conventional servers because they do not need
to store data waiting for client queries.
{ Publishers and consumers do not known each other. All peers are decoupled,
the only remote reference they all share is the event channel.
{ The above implies it may be an arbitrary numbers of publishers and
subscriber and they may be attached at any moment.
4.1</p>
      <sec id="sec-4-1">
        <title>Event channels</title>
        <p>Prometeo needs to deal with data of di erent nature, mapped to event types.
However, there are some details common to all of them:
{ All events are time-stamped with a POSIX time (1 second precision).
{ All events have a time expiration value measured in seconds. After that time,
subscribers should consider the event as obsolete information.
{ Node-based events are geo-positioned. Usually the 3D position of the sensor
is used.
{ Node-based events have a unique hierarchical node identi er.
{ All scalar measures have a quality attribute that can be used to indicate
precision or sensor quality.</p>
        <p>Identi ed event types are obviously related to the functional modules. Each
event type is uniquely related to a unique event channel. They are the following:</p>
      </sec>
      <sec id="sec-4-2">
        <title>Environment</title>
        <p>Includes data from the sensor network. Event message types are: humidity,
temperature, windSpeed, windDirecction, luminosity and rain. As we
stated above, these events include sensor node position and node identi er,
measure timestamp and expiration. For greater orthogonality, the value is
stored as a 16 bit integer in all of them.</p>
      </sec>
      <sec id="sec-4-3">
        <title>Brigade</title>
        <p>Uses only a kind of message but it is complex due to the fact that it carries
information about an entire brigade. It includes unique values for timestamp,
expiration, node ID, environment temperature, humidity and CO2, and also
per-person values for body temperature, humidity (sweating) and HRM.</p>
      </sec>
      <sec id="sec-4-4">
        <title>Forecast</title>
        <p>There are two types of forecast events: weather data (called meteo) and
FMC calculations. Because this is a very complex information we decided to
send a whole NetCDF le as the event payload. NetCDF is a widely use le
format for that purpose. The le size (around 5 MiB) could be an issue but
these events are rare (about one every two hours). Both event types include
timestamp and expiration parameters.</p>
      </sec>
      <sec id="sec-4-5">
        <title>Simulation</title>
        <p>Simulation results are sent as KML les with size in the range 15-19 MiB.
These events are produced at a rate of one every few hours. As forecast
events, they have timestamp and expiration.</p>
      </sec>
      <sec id="sec-4-6">
        <title>Media</title>
        <p>Cameras installed at the helicopter take image and video sequences and send
them to the advanced unit. An image may be sent in four di erent resolutions
and three di erent types: visible image, IR or video fragments. The image is
sent in jpeg format. Other parameters are helicopter position, timestamp,
expiration, camera identi er, image type, resolution and camera orientation.</p>
        <p>Almost all modules publish to and consume from at least one event channel.
A key issue is that modules are distributed in two di erent places: support unit
and advance unit, although some modules are present in both. Due to the fact
that the connection among these places is realized with a satellite link, it is
important to reduce the amount of tra c required. The solution was to install two
event brokers (one in each place) and link the corresponding event channels
together. This way, a single ow per channel cross the satellite link minimizing the
required bandwidth. Subscribers register themselves in the local broker. Figure 2
illustrates the main event channels, their subscribers, publishers and links.
4.2</p>
      </sec>
      <sec id="sec-4-7">
        <title>Event persistence</title>
        <p>Logging is a very valuable service in an emergency situation. The middleware
infrastructure provides an event logging service that stores all emitted messages
in all channels. Despite all events are time stamped, in order to minimize the
asynchrony, the logging subscribers add an incoming time tag to each event.</p>
        <p>That information is used later to analyze, detect procedure failures, improve
re extinction activities or other forensic purposes. Furthermore, a set of
simulated publishers may re-send logged data to reconstruct the whole scenario in
real time. This is interesting to test failing modules or to exercise modules not
involved in the moment when the re extinction activities actually occurred.
4.3</p>
      </sec>
      <sec id="sec-4-8">
        <title>Event delay management</title>
        <p>The physical medium employed in these type of scenarios, mainly WiMAX, 3G,
and satellite, the connectivity and availability issues are not reliable enough to be
left unattended. Typical transport protocols do not properly address these issues
when connectivity is lost for long enough period of time, in terms of minutes.
Due to this fact, it cannot be assumed that a lost of connectivity results in the
transport layer discarding messages. In order to overcome this transport layer
limitation, the work presented here proposes a solution consisted in temporally
store the messages while there is not connection available to resend the awaited
messages.</p>
        <p>The physical medium employed in this type of scenarios, mainly WiMAX,
3G, and satellite, is not reliable enough to be left unattended. Typical transport
protocols do not properly address connectivity and availability issues. When
connectivity is lost for a long enough period of time (in the range of minutes) the
transport layer would react assuming the connection is lost and discarding
messages. In order to overcome this transport layer limitation, the work presented
here proposes a solution consisting in temporally storing messages while there
is not connection available to resend the awaited messages.</p>
        <p>The proposed mechanism is inspired in the Delay Tolerant Network (DTN)
paradigm, although shortening the period of time during which messages are
kept. In the considered scenario, connectivity lost is not expected to take longer
than a few minutes. Additionally, the Prometeo mechanism also di ers from
DTN in that it provides location transparency. It should be noted that Prometeo
messages are addressed to distributed-objects, such as the event broker, rather
than to host addresses. This feature permits that if the target distributed object
changes its location, the message can still properly reach the object. The message
identi es the recipient by a unique distributed object identi cation which is
network independent.
5</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Prototype</title>
      <p>
        The current Prometeo communication infrastructure is supported by the ZeroC
Ice [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. Ice is a full featured object oriented distributed middleware based on
similar principles than CORBA, but substantially lighter and straightforward.
Speci cally, the IceStorm service is heavily used. IceStorm is a broker based event
distribution mechanism. To interconnect channels with same name in the two
di erent places (support unit and advanced unit ) the provided link mechanism is
applied. To avoid cycles, IceStorm links allow only one hop which is very valuable
in this case. These links are represented in the gure 2 as arrows between the
advanced unit and the support unit.
      </p>
      <p>The modules described here were made available to the project partners.
They are implemented using several languages and they run on several
operating systems (at least Microsoft Windows and di erent GNU/Linux avors). In
gure 3 we can see the channel bandwidth used by the partners of the project
during nal demo in the re management console.</p>
      <p>Some media events are stamped with GPS coordinates so we can see them
on the point were they were taken. Figure 4 shows the pictures taken by an
helicopter in a path devoted to evaluate the status of the re.</p>
      <p>One of the main objectives of the platform is to feed a re simulation for
predicting the most probable evolution of the re attending to di erent parameters.
Figure 5 shows a screenshot of one of this re simulation, the central orange ring</p>
      <p>Fig. 5. Fire simulation
represents the current situation of the re. From this central ring, we can see
di erent black rings which represent, in step of 12 hours, the expected evolution
of the re scenario according with di erent re models.</p>
      <p>Due to the fact that most project partners had no prior knowledge about
Ice, we developed an ad-hoc integration library. That library hides most of the
details of the publication and subscription operations and it may create event
channels when required. It also provides a speci c signature because IceStorm is
type agnostic. The library has been implemented in the Java, C# and Python,
the languages the projects partners requested.</p>
      <p>IceStorm provides another valuable feature, unusual in other middlewares;
each peer (publisher or subscriber) may use a di erent transport protocol to
communicate to the broker. Even a single entity that behaves as a subscriber
and publisher at the same time, may use a di erent protocol per role. The
supported protocols are UDP, TCP and SSL, but these are enough for the usual use
cases, that is, reliable/non-reliable and secure transports, being the latter very
important when the infrastructure requires intermediate third party networks.
5.1</p>
      <sec id="sec-5-1">
        <title>Native sensor integration</title>
        <p>Most modules may work independently. The middleware integration library
provides bindings to easily encapsulate results to other modules and there
deencapsulate them to be used as input information. There is a clear boundary
among modules inner implementation and the events channels. That boundary
is responsible to convert and adapt formats, data types, name conventions, etc.
However this adaption introduces some overhead regarding increased latency
and message size.</p>
        <p>For most of modules this issue is not relevant but in the case of the sensor
network it implies some interesting issues. The described deployment entails a
bridge device that receive messages from the sensors nodes (in a proprietary
protocol) and convert them to events (object invocations in the IceStorm case).</p>
        <p>It is advantageous to develop an end-to-end integration mechanism that
allows all entities to send and receive conventional object invocations without
intermediaries, avoiding thereby message adapting processes. In this sense, we
are developing THEM (The Heterogeneous Embedded Middleware) that
supports basic object oriented middleware capabilities and is suitable to be installed
on very low footprint micro-controllers. THEM is based on specialized virtual
machine installed in the sensor node. That machine interprets an ad-hoc
generated program able to recognize and generate middleware protocol compliant
messages. This way it is possible to set triggers that send conventional remote
objects invocations when a physical event occurs.
6</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>Conclusions</title>
      <p>This paper describes the integration process and resulting platform towards the
coordination of the information ows gathered and generated during the wild re
extinction activities.</p>
      <p>One of the main challenges that have been faced to accomplish this goal
involves issues such as heterogeneity of platforms, underlying networks, event
type and timing, or even the sta technical background that complicates the
inter-work among all the parties involved. An additional limitation of traditional
approaches is that data are highly dispersed all over the involved entities. Each of
the involved entities generally generates or gathers information using their own
formats, protocols, or semantics giving rise to the \information island" problem.
Finally, one of the last challenge faced by this work is due to the limitations
of the physical medium along with the high mobility of some of the entities
supporting the communications. All these features belonging to the real world
communication originate a low-reliability communication network, with highly
variable delays, or lost of connectivity, among some.</p>
      <p>The main contributions of this paper are intended to provide a solution to
the aforementioned challenges. Regarding heterogeneity issues, the proposed
solution resorts to a middleware platform that abstracts platforms and
networksdependent details by providing system-wide interfaces publicly available. In this
sense, the use of a middleware assures that programmers count on a common
API, made available as a library, whereas the use of the middleware
communication channels forces a common message format that enables protocol-level
interoperability.</p>
      <p>One of the main novelties of this work is related to how the \information
island" problem has been resolved. The proposed solution resorts to providing
a common set of rules for event propagation. For example, apart from the
timestamp attached to every event, if an event comes from a deployed device it
also adds its GPS coordinates. It is important to highlight that combining all
the collected events it is possible to reliably recreate, both in space and time,
all the happenings that took during the extinction works. This information is
extremely useful for forensic analysis intended to identify faults and propose
future improvements.</p>
      <p>The last contribution of this work is intended to relieve the involved
entities from having to deal with the network delays and reliability issues. The
proposed solution consists in enhancing the aforementioned library with
transparent mechanism to temporally store the propagated events until the reliable
link is available to be resent.</p>
    </sec>
    <sec id="sec-7">
      <title>Acknowledgment</title>
      <p>This research was supported by the Spanish Ministry of Science and Innovation
and the Centre for the Development of Industrial Technology under the project
PROMETEO (CEN-20101010), and by the Spanish Ministry of Economy and
Competitiviness under the project DREAMS (TEC2011-28666-C04-03).</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <given-names>Z.</given-names>
            <surname>Hui</surname>
          </string-name>
          ,
          <source>Study on Fire Fighting Information Integration System Architecture Based on SOA/Web Services</source>
          ,
          <source>2011 Fourth International Symposium on Knowledge Acquisition and Modeling (KAM)</source>
          , pp.
          <fpage>226</fpage>
          -
          <lpage>228</lpage>
          , Oct.
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <given-names>S.</given-names>
            <surname>Duan</surname>
          </string-name>
          , K. Cheng,
          <string-name>
            <given-names>Q.</given-names>
            <surname>Ge</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Wen</surname>
          </string-name>
          .
          <source>Wireless Intelligent Fire Fighting Systems Software Platform R &amp; D, International Conference on and 4th International Conference on Cyber, Physical and Social Computing Internet of Things</source>
          (iThings/CPSCom) pp.
          <fpage>94</fpage>
          -
          <lpage>99</lpage>
          , Oct.
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>D.</given-names>
            <surname>Yuan</surname>
          </string-name>
          ;
          <string-name>
            <given-names>X.</given-names>
            <surname>Jin</surname>
          </string-name>
          ;
          <string-name>
            <given-names>X.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <article-title>Building a immersive environment for re ghting tactical training</article-title>
          ,
          <source>9th IEEE International Conference on Networking, Sensing and Control (ICNSC)</source>
          , pp.
          <fpage>307</fpage>
          -
          <lpage>309</lpage>
          ,
          <year>April 2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Poggenpohl</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Guttinger</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <source>Optimizing Task Allocation on Fire Fighting 4th International Conference on Intelligent Networking and Collaborative Systems (INCoS)</source>
          , pp.
          <fpage>497</fpage>
          -
          <lpage>502</lpage>
          , Sept.
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Pack</surname>
            ,
            <given-names>D.J.</given-names>
          </string-name>
          ; Avanzato,
          <string-name>
            <surname>R.</surname>
          </string-name>
          ; Ahlgren,
          <string-name>
            <given-names>D.J.</given-names>
            ;
            <surname>Verner</surname>
          </string-name>
          ,
          <string-name>
            <surname>I.M.</surname>
          </string-name>
          ,
          <article-title>Fire- ghting mobile robotics and interdisciplinary design-comparative perspectives IEEE Transactions on Education</article-title>
          , vol.
          <volume>47</volume>
          , no.
          <issue>3</issue>
          , pp.
          <volume>369</volume>
          ,
          <issue>376</issue>
          ,
          <string-name>
            <surname>Aug</surname>
          </string-name>
          .
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <given-names>I.</given-names>
            <surname>Yoon; D. Kun Noh</surname>
          </string-name>
          ;
          <string-name>
            <given-names>D.</given-names>
            <surname>Lee</surname>
          </string-name>
          ; Teguh,
          <string-name>
            <surname>R.</surname>
          </string-name>
          ; Honma,
          <string-name>
            <given-names>T.; H.</given-names>
            <surname>Shin</surname>
          </string-name>
          ,
          <source>Reliable Wild re Monitoring with Sparsely Deployed Wireless Sensor Networks IEEE 26th International Conference on Advanced Information Networking and Applications (AINA)</source>
          , pp.
          <fpage>460</fpage>
          -
          <lpage>466</lpage>
          ,
          <year>March 2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Pastor</surname>
          </string-name>
          , E.;
          <string-name>
            <surname>Sole</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Lopez</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ; Royo,
          <string-name>
            <given-names>P.</given-names>
            ;
            <surname>Barrado</surname>
          </string-name>
          ,
          <string-name>
            <surname>C.</surname>
          </string-name>
          ,
          <article-title>Helicopter-based wild re monitoring system software architecture IEEE Aerospace Conference</article-title>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>18</lpage>
          ,
          <year>March 2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Zapatero</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Castro</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ; Wainer,
          <string-name>
            <surname>G.</surname>
          </string-name>
          ; Houssein,
          <string-name>
            <surname>M.</surname>
          </string-name>
          ,
          <article-title>Architecture for integrated modeling, simulation and visualization of environmental systems using GIS</article-title>
          and
          <source>CellDEVS Proceedings of the Winter Simulation Conference (WSC)</source>
          , pp.
          <fpage>997</fpage>
          -
          <lpage>1009</lpage>
          , Dec.
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Kontoes</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Keramitsoglou</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ; Papoutsis,
          <string-name>
            <surname>I.</surname>
          </string-name>
          ; Herekakis,
          <string-name>
            <given-names>T.</given-names>
            ;
            <surname>Michail</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            ; Xo s, P.;
            <surname>Koubarakis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            ;
            <surname>Kyzirakos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            ;
            <surname>Karpathiotakis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            ;
            <surname>Nikolaou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ;
            <surname>Sioutis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            ;
            <surname>Garbis</surname>
          </string-name>
          ,
          <string-name>
            <surname>G.</surname>
          </string-name>
          ; Vassos,
          <string-name>
            <given-names>S.</given-names>
            ;
            <surname>Manegold</surname>
          </string-name>
          ,
          <string-name>
            <surname>S.</surname>
          </string-name>
          ; Kersten,
          <string-name>
            <given-names>M.</given-names>
            ;
            <surname>Pirk</surname>
          </string-name>
          ,
          <string-name>
            <surname>H.</surname>
          </string-name>
          ; Ivanova,
          <string-name>
            <surname>M.</surname>
          </string-name>
          ,
          <article-title>Operational wild re monitoring and disaster management support using state-of-the-art EO</article-title>
          and Information Technologies,
          <source>Second International Workshop on Earth Observation and Remote Sensing Applications (EORSA)</source>
          , pp.
          <fpage>196</fpage>
          -
          <lpage>200</lpage>
          ,
          <year>June 2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <article-title>Michi Henning and Mark Spruiell, Distributed Programming with Ice Revision 3</article-title>
          .4,
          <string-name>
            <surname>June</surname>
            <given-names>2010</given-names>
          </string-name>
          , ZeroC Inc.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Dynastream</surname>
            <given-names>Innovations</given-names>
          </string-name>
          , Inc.,
          <source>ANT Message Protocol and Usage, Revision</source>
          <volume>5</volume>
          .0,
          <string-name>
            <surname>January</surname>
          </string-name>
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12. ZigBee Standards Organization,
          <source>ZigBee Speci cation (document 053474r17)</source>
          ,
          <year>January 2008</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>