首页    期刊浏览 2025年02月28日 星期五
登录注册

文章基本信息

  • 标题:Development of architecture of embedded decision support systems for risk evaluation of transportation of dangerous goods/Sprendimu paramos sistemos iterptines architekturos pletote pavojinguju kroviniu transportavimo rizikai vertinti.
  • 作者:Dzemydiene, Dale ; Dzindzalieta, Ramunas
  • 期刊名称:Technological and Economic Development of Economy
  • 印刷版ISSN:1392-8619
  • 出版年度:2010
  • 期号:December
  • 语种:English
  • 出版社:Vilnius Gediminas Technical University
  • 摘要:When considering the risk as a complex phenomenon of transportation of dangerous goods we understand that transport by road is more hazardous nowadays. The recent EEC Directive 96/82/EC implies the evaluation of risk in highly industrialized areas by means of Quantitative Area Risk Analysis techniques. It should be stressed that certain dangerous substances are transported along particular road routes in quantities that would exceed the threshold for safety notification or declaration. The analysis of risks caused by the transportation of hazardous materials influence the evidences. The possibilities of pollution during accidental events are related with safety of moving objects. Possibilities to move in differently protected regions have a different risk. The means for evaluation dynamic objects are quite complex and differ from the evaluation means of fixed facilities and stationary established objects (Pine and Marx 1997; Dzemydiene et al. 2008) until complex evaluation means of dynamic objects (Zhang et al. 2007; Batarliene 2007).
  • 关键词:Data mining;Decision support systems;Hazardous substances;Risk assessment;Sustainable development;Transportation industry

Development of architecture of embedded decision support systems for risk evaluation of transportation of dangerous goods/Sprendimu paramos sistemos iterptines architekturos pletote pavojinguju kroviniu transportavimo rizikai vertinti.


Dzemydiene, Dale ; Dzindzalieta, Ramunas


1. Introduction

When considering the risk as a complex phenomenon of transportation of dangerous goods we understand that transport by road is more hazardous nowadays. The recent EEC Directive 96/82/EC implies the evaluation of risk in highly industrialized areas by means of Quantitative Area Risk Analysis techniques. It should be stressed that certain dangerous substances are transported along particular road routes in quantities that would exceed the threshold for safety notification or declaration. The analysis of risks caused by the transportation of hazardous materials influence the evidences. The possibilities of pollution during accidental events are related with safety of moving objects. Possibilities to move in differently protected regions have a different risk. The means for evaluation dynamic objects are quite complex and differ from the evaluation means of fixed facilities and stationary established objects (Pine and Marx 1997; Dzemydiene et al. 2008) until complex evaluation means of dynamic objects (Zhang et al. 2007; Batarliene 2007).

The related works that deal with the evaluation of risk of transportation of hazardous materials is presented by (Fabiano et al. 2001, 2005; Milazzo et al. 2010) where a site-oriented risk analysis is made and tested in a pilot areas. Road designing approaches integrating the geographic information systems (GIS) (Jakimavicius and Burinskiene 2009) and multi-criteria based analysis of sustainable development of transportation zones (Zavadskas et al. 2007; Kavaliauskas 2008; Kaklauskas et al. 2009) influence the safety of transportation in extremely engaging regions and junctions (nodes) of transport networks.

The problem concerns the development of decision support systems (DSS) which enable to assist in complex, operatively control processes of hazardous transportation. Related works started from an in-depth inventory of transported hazardous materials and the statistical analysis of traffics and accidents observed in the areas (List et al. 1991; Leoneli et al. 2000; Batarliene and Baublys 2007) and continuous in recently implemented projects for safety transportation such as eCall (eSafety iniciative 2007), Intelligent transport (Jarasuniene and Jakubauskas 2007), etc. For design of embedding DSS components the knowledge-based methodologies are needed with deeper multi-dimensional evaluation methods of situation recognition and decision making (Brauers and Zavadskas 2009; Minalga 2007; Kavaliauskas 2008; Zavadskas et al. 2007; Kaklauskas et al. 2009; Bielskis et al. 2009).

The aims of our research are related with the problems of sustainable development in the area of the transportation, considering several directions:

--Evaluation possibilities of the risk of transporting of goods with hazardous materials, especially evaluation of the risks after pollution during accidents in ground, air and water reservoirs;

--Development possibilities of mobile technologies with including the sensor systems, that can record data from moving objects in the distributed information systems (DIS);

--Development of componential architecture of embedded decision support system (DSS) that can assist in abnormal situations, by integrating an interface reaction and control according to abnormal situation evaluation which can cause the accidental events in the transportation processes of dangerous goods.

Implementation of some applications of layered protocols, used in mobile technologies by locating moving objects as transportation of dangerous goods in time and geographical dependencies can be helpful in the evaluation processes of the risk (Dzemydiene and Dzindzalieta 2009). Mobility support of peer-to-peer (P2P) applications is back grounded by charging of P2P applications. Solutions of P2P technology are widely implemented nowadays. Mobile web services (as clients) and server as the mobile terminal can be realized on the session initialization protocol (SIP) for mobility, presence, and session management. Some interesting examples of such sensors include: built-in cameras, motion/gesture sensors, location-sensing capabilities (e.g., GPS hardware), etc.

The location detection service (LDS) has made a real time location detection system using one of the certain techniques. The accuracy depends on the method chosen (Rosenberg et al. 2002). Location may be expressed in text or spatial descriptions. Descriptions of the spatial location may be expressed as latitude, longitude and altitude coordinates. Contextual information can be simply expressed as addresses, population density, risk of the rout, etc. (Gudgin et al. 2006).

To obtain the current location coordinates, we can use one of the following methods:

--The use of mobile networks (MRI). While being in an unknown geographical location, the exact location can be detected with the help of base stations. The user of mobile device identification (m-ID) situated in a certain geographic location gets into a mobile station's coverage area, therefore the user's location can be detected by using mathematical methods.

--The use of satellites, as compared with the mobile network positioning method, has more advantages because the accuracy of localization reaches 4-40 meters (Johnson et al. 2004). However, the greatest imperfection is that mobile devices must have an additional Global Positioning System (GPS) receiver, which was unnecessary for the first MRI method. Another shortcoming is that a mobile device uses a phone battery and it must be visible to satellites. So the mobile phone can use the area's information only after receiving the GPS data.

There is no single answer to decide which method is the best. It depends on the accuracy requirements.

The target of our research is integration of some components in the decision support system (DSS), which will allow to use the mobile services, to control and recognize the concrete situation of the moving objects (i.e., automobile transport), using distributed information systems and the means of wireless communication systems (i.e. programming components, protocols, sensors, and devices). We propose to use some wireless protocols for establishing the object's geographical coordinates, monitor and fix the state of behavior of the moving dangerous transport objects.

2. Principles of risk evaluation of unsafe transportation of hazardous goods

The risk is related with a probability that an accidental event et can occur. The road of transportation as well has different levels of ecological danger, i.e., environment protection. Selection of the best route has been widely investigated (List et al. 1991; Jakimavicius and Burinskiene 2009; Zavadskas et al. 2007) and recently formulated as a "minimum cost flow" problem. The problem consists of determining, for a specific hazardous substance, the cheap est flow distribution, honoring the arc capacities, from the origin vertices to the destination vertices (Leonelli et al. 2000). Some factors related to road conditions such as the road class, set speed limits, traffic density, as well as the population characteristics, are likely to result in a risk assessment insensitive to route specifics and over- or underestimating the overall level of risk (Fabiano et al. 2005).

The goods become wastes after an accidental event et of transportation at the time moment t.

We have based our consideration on the classification of wastes according to the Technical Directive for Hazardous Substances (TDHS)--i.e. Directives 201 (July 2002). TDHS is meant for the classification and labeling of wastes for disposal purposes (Hazardous Substances Ordinance 2004). The basis for the assessment of wastes by the ordinance for dangerous goods is the dangerous properties (Evaluation... 2010), which these materials can have:

--Flammability (combustibility);

--Oxidizing properties;

--Toxicity;

--Corrosiveness;

--Formation of flammable gases in contact with water;

--Contamination with infectious and pathogenic materials;

--Radioactive radiation;

--Water polluting properties;

--Release of hazardous dusts.

A further differentiation among the classes of dangerous goods can be made by substance registers. The classification and assessment of hazardous wastes are made according to their physical-chemical properties (solid/liquid, boiling point, ignition point, and toxicity data), etc.

The assignment of wastes to one of the listed hazard categories is difficult, if they are mixtures of solids or liquids (solutions). The dangerous goods ordinance gives some guides how to classify. But to this end, it is necessary to know the constituents and hazardous properties of the waste. We restricted the scope of our consideration to the properties of water pollution, because the phenomenon of wastes is of an unlimited character which can change in the course of time, as well as the properly to have evaporate into the air of the surroundings, etc.

The initial task of expertise is data gathering, resulting in the set {[Obt.sub.t]}--observed findings and storing in the temporal database of distributed information warehouses.

The materials are classified by the rate of their harmfulness. Such materials, which are ecologically dangerous, are the main decision variables of the water analysis task. We have established 4 grades of pollutant harmfulness:

--Set of pollutants of the first rate of harmfulness in water bodies, which are especially dangerous--{[H.sup.1.sub.j1]};

--Set of pollutants of the second rate of harmfulness, which one less dangerous--{[H.sup.2.sub.j2]};

--Set of pollutants of the third rate of harmfulness--{[H.sup.3.sub.j3]};

--Set of pollutants of unidentified effect, which can be harmful or non harmful and very dangerous in the chemical reaction with other materials--{[H.sup.4.sub.j4]}.

The DSS has the assistance properties for improved performance models for dispersion of chemical substances in complex universe of discourse (UoD). The DSS integrates a GIS platform in order to calculate and assist the regional/local decision making process for managing the transportation processes, related with et and recognized as chemical accidents. The means of calculating the exposure-related lifetime risk are complicated, and, for simplicity, we can calculate the additional risk as a difference between the risk of the exposed persons and the risk of the non-exposed control group as:

PA (x) = P(x) - P(0),

with PA (x)--additional risk during exposure x, P(x)--lifetime risk of the exposed persons, and P(0)--"background risk" (lifetime risk of a non-exposed control group).

We have the problem there with two different objectives/goals. The goal of the transport enterprises is a rational development for economic benefit (Radziukynas 2007; Zvirblis et al. 2008). It means that enterprises must guarantee the economic value growth. But, such transportation must be of minimal pollution of the environment and damage to the nature, not exceeding the permissible standards. It means an ecological clean transportation. Thus we have:

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII],

where [[??].sub.b,i] is the vector evaluating the economic benefit b of the transport enterprise i under consideration to increase in capacity and profit, [[??].sub.ter,k] is the vector evaluating pollution of the territory ter} of environment during the time duration [DELTA]k.

The highest permissible contents or interim permissible concentrations of these substances in the surrounding are established depending on some types of characteristics: the territory ([ter.sub.j]) characteristics; the type of water reservoirs, etc.

Harmful materials, and their models of distribution during transportation processes, are the main subsystems and the resulting information units that may be established in DSS and analyzed dynamically.

3. The architecture of DSS with embedded subsystems for monitoring and localization of moving objects

We describe the basic design principles and introduce a conceptually layered framework, with a view to associate the functionality of implemented components of the subsystems in the existing framework of the DSS, divide into various layers. We depict different context models used for representing, storing and exchanging sensing and contextual information.

A real-time subsystem is embedded in the target system as a concurrent computing system related with the monitoring of data (Fig. 1).

The monitoring subsystem connected with the expert subsystem must detect the faults of process performance. The time for obtaining a solution is often strictly limited. These conditions impose strict deadlines on the obtaining a decision and maintaining the functioning correctness. The system behavior defines a set of temporal dependencies, dynamic evaluation of situations, adaptively control feedbacks and complexity management, which must be implemented in the embedded DSS, according to related works (Dzemydiene et al. 2008; Dzemydiene and Tankeleviciene 2009; Bielskis et al. 2009). The system works as a multiple agent system.

[FIGURE 1 OMITTED]

The monitoring component of the system integrates several sensor systems which observe the transportation means and indicate possible conditions of the state. Such sensors are aimed at localization of the object, observing the main physical parameters inside the object, which can characterize multiplex state evaluation. The types of sensors are represented in Fig. 1. Such data became row data for transforming them in the data warehouses. The metadata represented in the conceptual schema of the repository of data warehouses are introduced in our system for a better understanding of data semantics and contextual information (see Fig. 2). The extraction transformation loading (ETL) engine is used for revealing and storing such row data into the data warehouses. Data mining techniques are introduced in the DSS as the components for extraction of the main rules and patterns of the situation recognition which can help to integrate multi-dimensional parameters into decision support processes and control processes of the accident event situation.

4. Description of the risk of road stretch characteristics in the DSS

The route is divided into road stretches and each is characterized by different characteristics. Risk is related with scenarios of accident events, influenced by types of dangerous goods, and surroundings. The approaches of multiple complex description of scenarios influence the classification them by types and can be based on the ontology of this phenomenon. Federal and provincial legislation provide for the regulation of an extensive list of products, substances or organisms classified as dangerous. The products fall into one of nine classes: explosive, flammable, radioactive, etc. The model is focused on evaluation of a proper frequency of accidents.

The set S = {[s.sub.k]} represents types of scenarios of accident events of transportation which we can to recognize, where k = l, n.

Following the recommendations of approaches by (Marti 1996, 2005; Rubinstein and Shapiro 1993; Fabiano et al. 2005), the expected number of fatalities as a consequence of an accident occurred on the road stretch r and evolving according to a scenario [s.sub.k], can be expressed as:

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII], (1)

where [f.sub.r] is the frequency of accident in the r-th road stretch [[accident-year.sup.-1]], [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] is the number of fatalities according to a scenario [s.sub.k] in the r-th road stretch [[accident fatalities.sup.-1]], P([s.sub.k]) is the probability of evolving scenarios of type [s.sub.k], following the accident initialises (i.e. collision; roll-over; failure, etc.).

The transportation network can be considered as a number of junctions (nodes) linked one to another by a number of arcs (Fig. 2).

The junctions represent the cross roads, towns, tool-gates, storage areas, etc. in the transportation network. An arc between two junctions can be characterized by a different number of road stretches and the expected number of fatalities for the arc is:

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII]. (2)

The frequency of an accident involving the scenario [s.sub.k], on the r-th road stretch, can be expressed as:

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII], (3)

[f.sub.r] = [[gamma].sub.r][L.sub.r][n.sub.r], (4)

where:

[[gamma].sub.r] = [[gamma].sub.0,r]G, (5)

where [[gamma].sub.r] is the expected frequency on the r-th road stretch [[accident x [km.sup.-1] x [vehicle.sup.-1] x [year.sup.-1]], [L.sub.r] is the road length [km], [n.sub.r] is the number of vehicles through the road r-th stretch in [vehicle], [[gamma].sub.0,r] is the regional accident frequency [accident x [km.supl.-1] x [vehicle.sup.-1] x [year.sup.-1]], according to (Prekopa 1995).

[FIGURE 2 OMITTED]

G is probabilistic parameter, characterized as a common evaluation parameter of environment. Various factors influence the accident events: environmental, behavioural, physical, mechanical. Road intrinsic descriptors are described by these parameters.

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII], (6)

where G is the local enhancing/mitigating parameter. The main types of these parameters we can describe as: [G.sub.1] is a parameter depending on temperature, [G.sub.2] is a parameter that depends on the inherent factor (such as tunnel, bend radii, slope, height gradient, etc), [G.sub.3] is a parameter that depends on the metrological factor (such as snow, sun, rain, ice, etc), [G.sub.4] is a parameter that depends on the wind speed and wind direction, and others until such parameter that we can recognize [G.sub.m].

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] is the total number of fatalities according to Eq. (2):

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] (7)

Being the in-road and the off-road number of fatalities calculated, respectively, as:

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] (8)

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] (9)

where [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] is a consequence of the in-road area associated with scenario [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] is a consequence of the off-road area associated with scenario [s.sub.k] [[km.sup.2]]; P(F,[s.sub.k]) is a probability of fatality F for accident scenario [s.sub.k]; [o[DELTA]t] is the average vehicle occupation factor during specific time period [DELTA]t, which can depend on the seasons or day time; [v.sub.r] is the vehicle density on the road area [vehicle x [m.sup.-2]]; [d.sub.r] is the population density of the r-th road area environment [inhabitants x [km.sup.-2]].

5. Representation of localization data of the transport objects using mobile technology

Moving objects are constrained by a road network and they are capable to obtain their positions from an associated GPS receiver. Moving objects (termed as mobile clients) are recognized by their location information. Location server and the central data warehouse are in the server site. The relationship is possible via a wireless communication network (Booth et al. 2004). The disconnection between client and server is realized by other mechanisms in the network than the tracking. The disconnection occurrences activate mechanisms which notify the server which appropriate actions are needed. After each update from a moving object, the position is represented in the data warehouse and the system informs the moving object about the location. The moving object issues an update when the predicted position deviates by some threshold from the real position obtained from the GPS receiver (Hofmann-Wellenhof et al. 1997; Johnson et al. 2004; Gudgin et al. 2006; Huang et al. 2006a,b).

The client initially obtains its location information from the GPS receiver and from the physical and virtual sensors. This possibility allows collection of the data from the sensors and processes them on-line. The data of sensor parameters are exchanged, and then the event [e.sub.ti] influence changes in reality. If the data are changed critically, DSS gets a signal or message. The architecture of these components is represented in Fig. 3.

A temporal database efficiently stores time series of data, typically by having some fixed timescale (such as seconds or even milliseconds) and afterwards storing changes only in the measured data. The temporal database is often used in real-time monitoring applications or when we lose the connection with the main databases.

The second layer is responsible for the retrieval of raw context data. It makes use of appropriate drivers of physical sensors and APIs of virtual and logical sensors. The query functionality is often implemented in reusable software components which make low-level details of hardware access transparent by providing more abstract methods such as getPosition().

While using the location J2ME programming interface, the location of user can be determined (White and Hemphill 2002; Mahmoud 2004; Kreiensen and Kyamakya 2004). This service can be adapted in other applications or other services in mobile devices such as limited mobile devices and PDA phones (Location API for J2ME 2003). Also, the functionality can be extended in them.
   Criteria crit = new Criteria();
   crit.setHorizontalAccuracy(500);
   LocationProvider locpro = LocationProvider.getInstance(crit);
   Location loc = locpro.getLocation(60);
   Coordinates cor = loc.getQualifiedCoordinates();
   if (cor! = null) (
   double lat = cor.getLatitude();
   double lon = cor.getLongitude();


[FIGURE 3 OMITTED]

Here the criteria fields (Criteria) include: accuracy, response time, height and speed. Criteria crit = new Criteria (); cr.setHorizontalAccuracy(500)--means that the horizontal accuracy is 500 meters. The location class extracts local results. Its object contains coordinates, speed if reached, and address where the text is reached and the time marker, which shows the dimensions of the space.

By using interfaces of the components responsible for equal types of context these components become exchangeable. Therefore, it is possible, for instance, to replace a RFID system by a GPS system without any major modification in the current and upper layers.

The fourth layer (Storage and Management) organizes the gathered data and offers them via a public interface to the client. Clients may gain access in two different ways: synchronous and asynchronous. In the synchronous manner, the client is polling the server for changes via remote method calls.

The use of mobile web services in a P2P manner is enabled by establishing a SIP session between the devices. The mobile web service endpoints are SIP URIs, the Web Service endpoints of both clients are URIs containing the current IP address.

To combine the web service protocol, e.g. Simple Object Access Protocol (SOAP), with SIP is very important for securing the communication between server systems and mobile devices (Mitra 2003). SOAP is a transport neutral mechanism for exchanging messages (Booth et al. 2004). SOAP can be used on the top of SIP or in parallel with the same layer (Rosenberg et al. 2002). The use of SOAP on the top of SIP on the user (data) plane enables transmission of SOAP messages within the SIP message. SIP is defined to be used only as a signaling protocol in the application layer. Thus, work is focused on the use of SIP on the control (signaling) plane in parallel with SOAP on the user plane. Separation of the user and signaling plane has advantages with respect to protocol design, communication software design, and performance. SIP is used to transmit "application layer" signaling messages. User data are transmitted over SOAP on top of various alternative underlying Internet protocols using different SOAP bindings. In order to communicate between two different mobile devices via Web Service there must be a mobile web service endpoint. The mobile web service endpoint is a SIP URI (URI is based on the IP address). Each web service must have ID which is used to easily identify and register for the mobile web service.

The SIP URI is as follows: sip:user_name@server_name:port. This URI is used in each SIP message exchanged between devices to identify the sender and the recipient. For example, e-mail addresses traditionally are assigned by a SIP provider to SIP users to enable them to receive and initiate communication sessions.

In general, each terminal is able to provide and use Mobile Web Services (MWS) at the same time and within the same SIP session. SOAP is a transport mechanism for exchanging messages. The use of MWS in a P2P manner is possible by establishing a SIP session between the devices. The MWS endpoints are SIP URIs, the web service endpoints of both clients are URIs containing the current IP address. First, we need a set of building-blocks of web services. They are common basic web services required by most mobile-service applications. The MWS and proxies have to register with the SIP agent in order to be notified about URI (IP address) changes.

The SensorListener listens to updates from sensors which are located in distributed computers called sensor nodes. Then the collected information is stored in the database by the SensorListener.

The ContextRetriever is responsible for retrieving the stored context data. Both of these classes may use the services of an interpreter. The ChangeListener is a component with communication capabilities that allows a mobile computer to listen to the notification on context change events. Sensor and LocationFinder classes also have built-in communications capabilities. Mobile clients connect to the server via wireless networks. To reduce the impact of intermittent connections local caching is supported on the client side.

These agents can be as applications hosted by mobile devices that a user carries or wears (e.g., cell phones, PDAs and headphones), services that are provided by devices (e.g., temperature controller) and web services that provide a web presence for people, places and things in the physical world (e.g., services keeping track of peoples and object whereabouts).

Registration is not required for the agents using a proxy server for outgoing calls. It is necessary, however, for an agent to register the receipt of income calls from proxies. The user mobile device must share its physical address with the registrar in the network. Along with this "registration" is the public identity that is to be bound to the physical address. Keep in mind that the public URI can change physical addresses many times as a subscriber moves about the network, so the binding of addresses may change frequently.

The request for a session typically consists of sending an INVITE message. However, requests are not limited to this method. The connection of two participators is able to start by sending a SIP INVITE message after starting the SIP session between two devices (or conference). This session is initialized by request that enables a virtual connection between two or more entities for exchange of user data (voice calls, data, e-mail, etc.). This method is used to set up a session between the identified entities.

The ContextRetriever is responsible for retrieving stored context data. Both of these classes may use the services of an interpreter. The ChangeListener is a component with communication capabilities, which allows a mobile computer to listen for notification of context change events. Sensor and LocationFinder classes also have built-in communications capabilities. Mobile clients connect to the server over wireless networks. To reduce the impact of intermittent connections local caching is supported on the client side.

6. Analysis of monitoring data and feedback management

The sensor's subsystems work as agents in parallel and the important information is written on the temporal information registration window (TIRW). The process control subsystem of DSS must detect the following facts: what the maximum value was at a concrete time interval, the number of times a value exceeded a predefined reference value (i.e., the limitation of concentrations of harmful materials in the surrounding, sewerage water, etc.), a temporal delay between the maximum of a variable, and the maximum effect on another variable.

The SensorListener listens to updates from sensors which are located on distributed computers called sensor nodes. Then the collected information is stored in the database by the SensorListener.

A direct sensor access approach is often used in devices with sensors locally built in. The client software gathers the desired information directly from these sensors, i.e., there is no additional layer for gaining and processing sensor data.

The first layer consists of a collection of different sensors. Note that the word "sensor" not only refers to sensing hardware, but also to every data source which may provide usable context information. In the view of the way data are captured, sensors can be classified in two groups.

The most frequently used types of sensors are physical and virtual sensors. Many hardware sensors are available nowadays which are capable of capturing almost any physical data. Possibilities to integrate such types of sensors are as follows:

--Light measurers--photodiodes, color sensors, IR and UV-sensors etc.;

--Visual context fixation--various cameras;

--Audio--microphones;

--Motion, acceleration--Mercury switches, angular sensors, accelerometers, motion detectors, magnetic fields;

--Location outdoors--Global Positioning System (GPS), Global System for Mobile Communications (GSM); Location Indoors: Active Badge system, etc;

--Touch measurers--touch sensors implemented in mobile devices;

--Temperature measurers--thermometers;

--Physical and chemical attributes measures--biosensors to measure skin resistance, blood pressure;

--Hit power sensors.

Virtual sensors source context data from different services or software applications. The monitoring subsystems are working as agents in parallel and the important information is written on the temporal information registration window (TIRW). The TIRW is organized for co-operation of agents at different levels of abstraction.

The topology of harmful materials constructed as a semantic model is used in the cooperation work of agents. The temporal information management requires handling the following kind of information as follows:

--past values will usually be "exactly known" in the used time scale and stored with time parameters (the temporal relations among them can be deduced using dates and time);

--current values are established at the current time moment and can be assumed as "partially known" and "dependent";

--future values are used to represent expected or predicted values (their management presents more difficulty due to the lack of knowledge about the exact instant at which they will be produced).

An example of TIRW for controlling some important parameters of sewage characteristic is shown in Fig. 4. The information is affected by the level of uncertainty. If the uncertainty is associated with the value itself, we analyze information with confidence measure, for instance, the concentration of copper (Cu) will be 0.04 mg/l with the confidence of 90% in time [t.sub.k5]. If the uncertainty is associated with temporal occurrence of the values, we deal with another kind of information, for instance: in the next 60 min the concentration of Cu will be 0.04 mg/l. The temporal occurrences of values are important in constructing of rules of the knowledge base.

The accessible degree of values affects other parameters, which are time dependent. When the causal facts occur (e.g., the temperature of sewage exceeds the limits and/or the concentration of harmful materials reach as the greatest permissible limitations), the dependent fact gets a status (e.g., Alarm = on). Such a fact entered in TIRW activates another agent the function of which is to influence the assistance supporting processes. If such situation does not occur, then the dependent fact will not occur.

[FIGURE 4 OMITTED]

In order to identify the necessary data, management and control structures, and information processing abilities, one has to imitate a cognitive task in the decision support system.

The courses of decision management and the basic sequences of functional reasoning are joined with information processes as a result of which the evaluation states are obtained. By a decision we mean reasoning (evaluation, determination, resolution, etc.) that has to follow certain actions. An ordinary determination--from certain assumptions to certain generalized conclusions may serve as a preliminary preparation for these actions.

Automatic generation of alternative solutions implies the use of semi-automatic methods for comparing these solutions. The complexity of the decision making task consists in finding the best decision under multiple criteria. As the number of alternatives increases, the multi-criteria evaluation involves a mechanism for rejecting a number of those alternatives.

When analyzing the possible choice mechanisms (under lack of information on the importance of criteria, or assuming the criteria are equivalent), the acceptable decision variant seems to be not so easily chosen. It is expedient to make a choice according to a weighed criterion. Then the basis for choosing the decision variant is qualitative information on the relative importance of each separate criterion.

The essential part of a decision support system is the model of a decision process. Referring to the decision support performance analysis, it is important to represent the relationships between the individual steps in decision-making and the control network ensuring a proper application of the information environment and the knowledge base. The description of this meta-model must include the model of goals, plans and must represent the practice and strategy of reasoning of specialist-experts in making a decision. At the stage of analysis and evaluation of the enterprise performance, the use of this meta-model could be of use:

--to recognize what changes in the environment may induce changes in decision goals;

--to decide whether the situation is relevant to the ready application of the existing rules or not;

--to specify the process of identification of possible courses of actions and alternatives and to control the choice of a concrete variant of these actions by evaluating the attractiveness of consequences of each action.

The multiple objective decision making level deals with the analysis of information obtained from the static sub model, taking into account all the possible measurement points revealed in a dynamic sub-model of such a system. The modeled system is regarded as a direct mapping of the real enterprise system, and decisions can be based on decisive facts and followed rather deterministic rules.

7. Conclusions

A dynamic environment has significant dynamic components that should be evaluates in accordance with correct well working assistances, such as DSS. On-line working sensors can help in the recognition of abnormal situations of transport means, by using mobile technologies. Some issues are presented for integrating mobile technologies into DSS under development. The location detection service enables a holder of mobile devices to receive and provide information on the geographic location of a moving object. We have developed this service adding a new functionality. An approach for developing the interaction architecture of mobile devices and remote server systems with additional functionalities for contextual information transmission is proposed. The paper has presented an architecture based on the MWS and the SIP infrastructure. The proposed context modeling mechanism assures an always up-to-date context model that contains information on the transport device and location. We offer mobile internet services to extend the users interaction with architecture. The main advantage is the extensible architecture so that you can get the data to a mobile devises through web services. In this way, we try to solve the data integration of heterogeneous systems and compatibility issues.

doi: 10.3846/tede.2010.40

References

Batarliene, N.; Baublys, A. 2007. Mobile solutions in road transport, Transport 22(1): 55-60.

Batarliene, N. 2007. Implementation of advanced technologies and other means in dangerous freight transportation, Transport 22(4): 290-295.

Bielskis, A. A.; Dzemydiene, D.; Denisov, V.; Andziulis, A.; Drungilas, D. 2009. An approach of multiagent control of biorobots using intelligent recognition diagnosis of persons with moving disabilities, Technological and Economic Development of Economy 15(3): 377-394. doi:10.3846/13928619.2009.15.377-394

Booth, D.; Haas, H.; McCabe, F.; Newcomer, E.; Champion, M.; Orchard C. F. D. 2004. Web Service Architecture. W3C Recommendation. Inspire official site [online]. 2010. Available from Internet: <http:// www.w3.org/TR/2004/NOTE-ws-arch-20040211/>.

Brauers, W. K.; Zavadskas, E. K. 2009. Multi-objective optimization with discrete alternatives on the basis of ratio analysis, Intellectual Economics 2(6): 30-41.

Dzemydiene, D.; Dzindzalieta, R. 2009. Development of decision support system for risk evaluation of transportation of dangerous goods using mobile technologies, in M. Grasserbauer, L. Sakalauskas, E. K. Zavadskas (Eds.). Knowledge-based Technologies and OR Methodologies for Strategic Decisions of Sustainable Development, 108-113.

Dzemydiene, D.; Maskeliunas, S.; Jacobsen, K. 2008. Sustainable management of water resources based on web services and distributed data warehouses, Technological and Economic Development of Economy 14(1): 38-50. doi:10.3846/2029-0187.2008.14.38-50

Dzemydiene, D.; Tankeleviciene, L. 2009. Multi-layered knowledge-based architecture of the adaptable distance learning system, Technological and Economic Development of Economy 15(2): 229-244. doi:10.3846/1392-8619.2009.15.229-244

eSafety Initiative. 2007. Safer Roads for European Citizens. Inspire official site [online]. 2010. Available from Internet: <http://www.esafetysupport.org/ en/esafety_activities/>.

Evaluation and Classification of Chemical Wastes. Inspire official site [online] 2010. Available from Internet: <http://www.oc-praktikum.de/en/ articles/pdf/WasteClassification_en.pdf>.

Fabiano, B.; Curro, F.; Reverberi, A. P.; Pastorino, R. 2005. Dangerous good transportation by road: from risk analysis to emergency planning, Journal of Loss Prevention in the Process Industries 18(4-6): 403-413. doi:10.1016/j.jlp.2005.06.031

Fabiano, B.; Palazzi, E.; Curro, F.; Pastorino, R. 2001. Risk assessment and decision-making strategies in dangerous good transport. From an Italian case-study to a general framework, in Loss Prevention and Safety Promotion in the Process Industries. Proceedings 2, Elsevier Science B.V. Amsterdam, NL, 955-966.

Gudgin, M.; Hadley, M.; Rogers, T. 2006. Web Services Addressing 1.0--Core. W3C Recommendation. INSPIRE official site [online]. 2010. Available from Internet: <http://www.w3.org/TR/ws-addr-core/>.

Hazardous Substances Ordinance. 2004. GefStoffV (BGBl. I p. 3758) as amended by Article 2 of the Ordinance of 23 December 2004 (BGBl. I p. 3855) Inspire official site [online]. 2010. Available from Internet: <www.zuv.uni-heidelberg.de/sw/gefahrstoffe/ gesetze/HazardousSubstances-Ordinance.pdf>.

Hofmann-Wellenhof, B.; Lichtenegger, H.; Collons, J. 1997. GPS--Global positioning system. Theory and practice.

Huang, C. M.; Lee, C. H. 2006a. Signal reduction and local route optimization of SIP-based network mobility, in Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC), 482-487.

Huang, C. M.; Lee, C. H.; Zheng, J. R. 2006b. A novel SIP-based route optimization for network mobility, IEEE Journal on Selected Areas in Communications 24(9): 1682-1691. doi:10.1109/JSAC.2006.875113

Jakimavicius, M.; Burinskiene, M. 2009. A GIS and multi-criteria-based analysis and ranking of transportation zones of Vilnius city, Technological and Economic Development of Economy 15(1): 39-48. doi:10.3846/1392-8619.2009.15.39-48

Jarasuniene, A.; Jakubauskas, G. 2007. Improvement of road safety using passive and active intelligent vehicle safety systems, Transport 22(4): 284-289.

Johnson, D.; Perkins, C.; Arkko, J. 2004. Mobility Support in IPv6. IETF RFC 3775.

Kaklauskas, A.; Zavadskas, E. K.; Saparauskas, J. 2009. Conceptual modelling of sustainable Vilnius development, Technological and Economic Development of Economy 15(1): 154-177. doi:10.3846/1392 8619.2009.15.154-177

Kavaliauskas, P. 2008. A concept of sustainable development for regional land use planning: Lithuanian experience, Technological and Economic Development of Economy 14(1): 51-63. doi:10.3846/2029 0187.2008.14.51-63

Kreiensen, S.; Kyamakya, K. 2004. Project mobiGPS.

Leonelli, P.; Bonvicini, S.; Spadoni, G. 2000. Hazardous materials transportation: a risk-analysis-based routing methodology, Journal of Hazardous Materials 71(1): 283-300. doi:10.1016/S0304-3894(99)00084-9

List, G. F.; Mirchandani, P. B.; Turnquist, M.; Zografos, K. G. 1991. Modeling and analysis for hazardous materials transportation. Risk analysis, routing/scheduling and facility location, Transportation Science 25(2): 100-114. doi:10.1287/trsc.25.2.100

Location API for J2ME (JSR 179). Java Specification Request, September 2003.

Mahmoud, H. 2004. J2ME and Location-Based Services.

Marti, K. 1996. Differentiation formulas for probability functions: The transformation method, Mathematical Programming 75(2): 201-220. doi:10.1007/BF02592152

Marti, K. 2005. Stochastic Optimization Methods. Springer: N.Y.

Milazzo, M. F.; Lisi, R.; Maschio, G.; Antonioni, G. ; Sadoni, G. 2010. A study of land transport of dangerous substances in Eastern Sicily, Journal of Loss Prevention in the Process Industries 23(3): 393-403. doi:10.1016/j.jlp.2010.01.007

Minalga, R. 2007. Economic issues of cargo security in separate logistics links, Intellectual Economics 2(2): 36-42 (in Lithuanian).

Mitra, N. 2003. SOAP Version 1.2 Part 0: Primer. w3C Recommendation. Inspire official site [online]. 2010. Available from Internet: <http://www.w3.org/TR/2003/ REC-soap12-part0-20030624/2.2>.

Pine, J.; Marx, B. 1997. Utilizing state hazardous materials transportation data in hazardous analysis, Journal of Hazardous Materials 54: 113-122. doi:10.1016/ S0304-3894(96)01871-7

Prekopa, A. 1995. Stochastic Programming. Kluwer.

Radziukynas, J. 2007. Methodological approaches in an analysis of the application of custom's procedures with an economic impact, Intellectual Economics 2(2): 51-59.

Rosenberg, J.; Schulzrinne, H.; Camarillo, G.; Johnston, A.; Peterson, J.; Sparks, M.; Handley; Schooler, E. 2002. SIP: Session Initiation protocol, RFC 3261. Inspire official site [online]. 2010. Available from Internet: <http://www. ietf.org/rfc/rfc3261.txt>.

Rubinstein, R.; Shapiro, A. 1993. Discrete events systems: sensitivity analysis and stochastic optimization by the score function method. Wiley & Sons, N.Y.

White, J.; Hemphill, D. 2002. Java 2 Micro Edition. Java in Small Things. Inspire official site [online]. 2010. Available from Internet: <http://www.desifile.com/files/ 27615241809/Manning--Java 2 Micro Edition.pdf>.

Zavadskas, E. K.; Kaklauskas, A.; Kaklauskiene, J. 2007. Modelling and forecasting of a rational and sustainable development of Vilnius, emphasis on pollution, International Journal of Environment and Pollution 30(3-4): 485-500. doi:10.1504/IJEP.2007.014824

Zhang, W.; Fang, X.; Yang, X.; Wu, Q. M. J. 2007. Spatiotemporal Gaussian mixture model to detect moving objects in dynamic scenes, J. Electronic Imaging 16(2): 023013. doi:10.1117/1.2731329

Zvirblis, A.; Macerinskiene, I.; Buracas, A. 2008. The principles and basic models to assess the potential of competitors, Intellectual Economics 1(3): 82-92.

Dale Dzemydiene (1), Ramunas Dzindzalieta (2)

(1,2) Mykolas Romeris University, Ateities g. 20, 08303 Vilnius, Lithuania (2) Institute of Mathematics and Informatics, Akademijos g. 4, 08412 Vilnius, Lithuania

E-mails: (1) daledz@mruni.eu; (2) ramunas.dzindzalieta@teo.lt

Received 13 April 2010; accepted 5 August 2010

Dale DZEMYDIENE. Professor, Dr (HP), Head of the Department of Informatics and Software Systems of the Social Informatics Faculty of the Mykolas Romeris University (Vilnius, Lithuania). She has published over 100 research articles, 4 manual books (with co-authors) and monograph book. She is an organizer of international conferences in the area of information systems and database development. She is the head of the Legal informatics section and member of Intellectics section of the Lithuanian Computer Society (LIKS), member of European Coordinating Committee for Artificial Intelligence (ECCAI) and member of Lithuanian Operation Research Association. Her research interests include: artificial intelligence methods, knowledge representation and decision support systems, evaluation of sustainable development processes.

Ramunas DZINDZALIETA. Ph doctoral student at the Department of Software Engineering in the Institute of Mathematics and Informatics. He works as lecturer at the Department of Informatics and Software Systems of the Social Informatics Faculty of the Mykolas Romeris University (Vilnius, Lithuania). He is the member of Lithuanian Computer Society (LIKS), His research interest areas: mobile devices, software engineering, decision support system development.
联系我们|关于我们|网站声明
国家哲学社会科学文献中心版权所有