Documente Academic
Documente Profesional
Documente Cultură
Abstract— Hazardous materials are dangerous but necessary goods and must be transported into big cities.
Tracking of trucks is expensive and difficult to standardize under government surveillance. The proposed
solution to solve the lack of an integrated control system is network management based on virtual fences
using smartphone sensors to monitor and advise any exceeding threshold, which leads to accident
avoidance, faster detection time of accidents, and consequently, reduction in traffic jams, damage to human
health and environment.
Keywords— hazardous materials transportation, mass notification system, mobile applications,
threshold, tracking system.
I. INTRODUCTION the streets in São Paulo city has any kind of surveillance.
According to Brazil's National Transport Confederation, The inspection process of government entities is not able
road transport is responsible for 61% of cargo to track 100% of cargo transport. This fact doesn´t allow
transportation, and practically 100% of dangerous cargo them to take preventive measures and increases the time of
transportation in an urban environment is made by road. identification and containment of a possible accident. In
Dangerous goods or hazardous materials are substances case of an accident, firefighters put their lives in danger by
that can endanger human lives, health, and the adopting standard procedures with basic protective
environment [1]. equipment which is sometimes incompatible to hazardous
Possible accidents involving hazardous materials can cause substance and don’t solve the problem.
serious consequences for the population [2] and increase This paper proposes an evolution in dangerous goods
problems related to urban mobility [3]. Thus, the greater transportation surveillance considering the need for real-
the control and standardization of operating procedures for time tracking and cargos privacy.
this type of transport, the better and safer it will be for The implementation in trucks tracking considers
society. smartphone applications to track trucks and control their
There are 12 million citizens, 8, 3 million vehicles, and routes.
17,000 km of roads in the city of São Paulo. Its geo- Section 2 introduces the Integrated Operations Center,
economic characteristics cause a large flow of vehicles vehicle tracking by mobile networks, fault management,
with a significant amount of cargo to cross the city and to and problem management.
be able to transport dangerous goods it is necessary to have Section 3 shows the proposed hardware and software
authorization from Municipality, which receives more than architecture in an integrated control system to hazardous
45,000 annual applications. materials transportation. Section 4 shows the proposed
According to the São Paulo State Public Security configuration. Section 5 concludes the paper. Section 6
Department, between 2001 and 2015 there was an annual possible future directions.
average of 200 accidents involving dangerous cargo in the
state of São Paulo, at about 10% of them happened in the II. RELATED WORK
city of São Paulo. 2.1 Integrated Operations Center
Another critical factor for mitigation of existing problems More developed cities have Integrated Operations Centers
is the reduction in detection and actuation time, only 5% of that are made up of different government departments with
their legacy system. Despite several departments work in 2.4 Smartphone application interface
the same environment, not all information is shared. The There are development platforms used to support
lack of integration between different legacy systems applications to collect data from smartphone sensors and
thrusts aside the possibility of optimized transport route handle statistical data [8].
planning and increases the response time for abnormal There are four main data acquisition APIs:
conditions. Information and communication technologies a) SensorApi - Read sensor data
are transforming transportation systems [4]. b) RecordingApi - Provides data collection and storage on
2.2 Tracking technologies servers.
Many companies offer their services of tracking systems, c) SessionsApi- Provides the application to manage user
which are proprietary systems with high costs of activity sessions.
acquisition and maintenance. They often require the d) HistoryApi- Provides access to the database with data
installation of an on-board device inside the vehicle, which insertion, deletion, and reading capabilities.
is difficult to be installed and costs a lot of money. 2.5 Virtual Fences
Smartphone application to track vehicles is a non-intrusive The combination of digital maps and tracking signals
and cheaper solution. creates constrains areas with many applications like fleet
Mobile 5G technology is considered the IoT generation management, when a truck driver breaks from his route,
that can connect virtually any type of device, including the dispatcher receives an alert [9].
smartphones and vehicle-embedded modems. The 5G, as 2.6 Fault management
the next mobile network technology, promises to transfer FCAPS (Fault, Configuration, Account, Performance, and
core-to-edge functions; it will significantly reduce latency Security) is a standard defined by ISO – International
in critical mission operations, such as collision avoidance Standardization Organization [10].
functionality [5] and, will make feasible the connection Fault detection in sensor networks depends on the type of
between two smartphones, the D2D –Device to Device applications and the type of failures [10].
function [6] which can reach a throughput of 3.5 Mbps at According to OSI - Open System Interconnection
20m distance. recommendation the alarms reporting functions are
2.3 Smartphone sensors classified considering their severity and criticality [12] and
Smartphones have location sensors like accelerometer, according to ITIL (Information Technology Infrastructure
speed, compass, altitude, latitude, and longitude. Library) faults are classified as incidents [13].
Two location features in smartphones are used to 2.7 Problem management
georeference: Isaca.org [13] defines problem management as recording
a) The GNSS_Provider uses Global Navigation Satellite recurring incidents, mapping their root causes, and
System-GNSS, it is accurate but slow. determining standardized actions with registered and pre-
b) The Network_Provider uses the cellular mobile programmed procedures for each situation, to improve
network, it is faster but isn’t as accurate as decision-making and solve problems more assertively and
GNSS_Provider. efficiently [13].
The feature FusedLocationApi optimizes the two Figure 1 illustrates the ITIL problem management
smartphone features and avoids excessive battery drain. workflow.
Security vulnerabilities for tracking solutions have privacy
concerns that analyze United Nations patterns using
dangerous goods classification [8].
Table 1 presents the classification of automation levels a) Extract: Extracts data from the source system
[15], the higher the automatic level is, the more efficient b) Transform: Apply functions to conform data to a
and dedicated to greater intellectual capacity activities the standard dimensional schema
human actions will be[14]. c) Load: Load the data into the data mart for
consumption
Table 1. Classification of automation levels d) Process: Load the data from the data mart into the
Level Description cube for browsing and analyses the information
1 The automatic system does not provide any on cube view at OLAP – On-Line Analytical
assistance; the operator must perform all tasks by Processing
himself.
2 The automatic system offers a complete set of
action alternatives.
3 The automatic system shows some of the action Fig.2: ETL workflow
alternatives. Knowledge management, presented in figure 3 consists of
4 The automatic system suggests one action. three main steps:
5 The automatic system carries out an action in case a) Data: Sensors and transactional systems collect the
there is an approval from the operator. data.
6 The automatic system programs an automatic b) Information: The organization and summarization of
action that can be canceled by the operator within the data, become information.
a specific period. c) Knowledge: The information is analyzed and
7 The automatic system executes an action synthesized, becomes knowledge to support decisions.
automatically and informs the operator.
8 If the operator wants, the automatic system
informs him about the completion of the action.
9 The operator is informed about the completion of
the action if the artificial intelligence system
decides to do it.
10 The system takes all decisions by itself and acts
automatically, completely ignoring the operator.
Location
System
Zv
Mobile carrier
network
Yv
Xv
Zs
Ys
Xs
Acellerometer
and GPS
sensors
Application Server
COI
Fig.5: The proposed functional diagram for hazardous cargo transportation management.
Figure 6 illustrates a sample of the network using the critical path method to calculate the best road route considering time
and road capacity [18].
E [3,6]
[4,2]
[1,1]
[1,5]
O B D [1,2] T
The optimal cost is the minimum value from all travels There are at least six database sources: (1)Tracking
considering all origin and all destinations according to systems; (2)Crowd application; (3)Social networks;
track time and track capacity. (4)Phone calls; (5)Police Department and (6)Municipality
Min ∑𝑚 𝑛
𝑖=1 ∑𝑗=1 𝑡𝑖𝑗 𝑐𝑖𝑗 [1] control. Track systems consider the data collection from
Where: smartphone sensors such as three-dimensional
m, i: destinations accelerometers and GPS data that allow tracking vehicles,
n, j: origins their speed, and location with precision. After analysis, the
𝑡𝑖𝑗 : track time collected data is compared with the planned routes. In case
𝑐𝑖𝑗 : track capacity of relevant divergence, the threshold alerts can be sent to
the Integrated Operations Center. Figure 7 presents the
functional diagram for comparison between tracking data
and planned routes.
Fig.7: Functional diagram for comparison between tracking data and planned routes.
Vehicle traffic
Social flow servers
networks Tracking and
servers transport
Maps companies
database servers
servers
Carriers
Servers
Internet
Traffic Environment
Social engineering City hall department Military Health Civil
Town hall Firefighters
service company police police system defense
Distribution Switch
WEB Server
Intranet
Private cloud
Data centers
Core router interconnection links Core router
Virtual Virtual
machines machines
Application Application
servers servers
Route planning consists of analyzing all information Dynamic route optimization consists of analyzing the
relevant to vehicle flow between the route´s points of behavior of a track with a planned route and proposing
interest, including geographical zones, time restriction, changes whenever a more favorable condition is possible.
road capacity, etc. Route restrictions can be entered into the system manually
or automatically if incidents that cause an impact on the
Known
Planning Real time
problems
algorithms algorithms
database Complemented
maps database
Data collector
Tracking
Sensors Call center
systems
Tracking and
transport External
Carriers link
companies systems link
link
3.5 Proposed Software Architecture Figure 9 illustrates the proposed software architecture
The proposal of the software architecture takes into divided into five blocks.
consideration the concept of service-oriented architecture, The Proposed Software Architecture integrates
which enables the integration of multiple legacy systems in information from legacy systems of different architectures,
a staggered manner, avoiding abrupt migrations and protocols, and databases, which do not exchange
without interrupting users´ systems. information with each other. The use of service-oriented
The software architecture is divided into five blocks: architecture is based on integrating different legacy
Human-machine interface; Optimization system; Database; systems in a single service barring. Figure 10 illustrates
Communication system; Data acquisition system. SOA integration with different legacy systems using a
service barring.
Users
Interactions
Users
interface Process Information
IT Legacy systems
Fig.11: SOA integration with different legacy systems using a service bar. [10]
Tracking points as
heart bits thresholds