You are currently viewing a new version of our website. To view the old version click .
Applied Sciences
  • Article
  • Open Access

18 March 2023

A Smart Framework for Managing Natural Disasters Based on the IoT and ML

,
,
,
and
1
Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 21589, Saudi Arabia
2
Department of Information and Communication Sciences, Granada University, 18071 Granada, Spain
*
Authors to whom correspondence should be addressed.
This article belongs to the Special Issue Big Data Analytics for Internet of Things Enabled Smart Cities and Societies

Abstract

Natural disasters greatly threaten our lives in addition to adversely affecting all activities. Unfortunately, most solutions currently used in flood management are suffering from many drawbacks related to latency and accuracy. Moreover, the previous solutions consider that the whole city has the same level of vulnerability to damage, while each area in the city may have different topologies and conditions. This study presents a new framework that collects data in real-time about bad weather, which may cause floods, where the framework has a proposed classification algorithm to process sensed data to determine the level of danger in each area of the city. In case of a threat, the framework will send early alerts to users and rescue teams. The framework depends on the Internet of Things (IoT) and fog computing coupled with multiple models of machine learning (Rain Forest, Decision Tree, K-Nearest Neighbor, Support Vector Machine, Logistic Regression, and Deep Learning) to enhance performance and reliability. In addition, the research suggests some assistant services. To prove the efficiency of the framework, we applied the proposed algorithm to real data for the city of Jeddah, Saudi Arabia, for the years 2009 to 2013 and for the years 2018 to 2022. Then, we depended on standard metrics (accuracy, precision, recall, F1-score, and ROC curve). The Rain Forest and Decision Tree achieved the highest accuracy, exceeding 99 percent, followed by the K-Nearest Neighbor. The framework will provide flood detection systems that can predict floods early, send a multi-level warning, and reduce financial, human, and infrastructural damage.

1. Introduction

Machine learning and the Internet of Things (IoT) are rapidly changing the world into an intelligent space leading to changes in how things get done in various fields. According to Al-Barazanchi et al. [1], the Internet of Things enables continuous data collection through devices scattered all over, and the data is then sent from these devices to the cloud for analysis, processing, inferring knowledge, determining behaviors, and designing of more intelligent technologies to allow for seamless services for users.
The IoT incorporates wireless network sensors (WSNs) and radio frequency identifications (RFID) for data capturing and transfer. The WSNs capture data related to physical conditions in human beings’ environment, such as temperature, pressure, heart rate, illumination, humidity rate, wind speed, the amount of precipitation, and much more. The RFID radio identifiers give objects unique identifiers. In IoT, RFID radio identifiers enable the identification of objects and capturing of data related to the objects remotely [2].
There are vast applications of wireless network sensors in the Internet of Things technologies in different majors and systems such as health, learning, and crowd and disaster management to name a few. Thus, these systems aim to apply the technology for data collection in the real time, then analyze it by machine learning algorithms for more sophisticated services [3,4].
Disaster management systems are among the most important systems in which the Internet of Things and artificial intelligence have played significant roles. Floods are among the most common natural disasters combated using technology, notably through hydraulic modeling [5]. Hydraulic modeling is often less effective when it comes to flood prediction, as proved in countries already implementing various models but are still faced with the issue of flooding. To counter the ineffectiveness of hydraulic modeling in flood risk management, studies on how recent technologies, such as the application of machine learning and IoT, can aid in disaster management and have a useful role in relaxing the effects of some types of disasters, such as floods [6].
Floods are frequent and are accompanied by massive destruction, ranging from loss of life to agricultural damages and poor economic conditions. The United Nations [7], through the UN Institute of Water, Environment, and Health, states that floods affect more than half a billion people every decade. Asia is primarily affected by floods per the United Nations; notably, Saudi Arabia has recently witnessed at least a dozen flood-related deaths and injuries following the torrential rains. Intelligent flood detection systems are becoming necessary in the disaster management plans of cities [8]. Feasibility studies carried out when the authorities explore the possible solutions to floods point to incorporating technology into the legacy methods already in use. The most feasible technologies revolve around the Internet of Things approach based on wireless network sensors and machine learning [9].
WSNs have been heavily utilized recently due to the ease of use and maintenance coupled with their affordability and high data accuracy; wireless sensors’ power usage is relatively low, thus they have more durability [10]. The wireless network sensors connect to a base station wirelessly, the central processing unit of a wireless sensor network. Many recent wireless sensors connect using wireless technologies, such as LoRa, ZigBee, NFC, Ultra-wideband, and Bluetooth [11].
Bluetooth, NFC, and Zigbee technologies consume less power but are preferable for short-range connections and, thus, are unfavorable for applications that cover vast areas. Notably, the prementioned wireless technologies are not cellular network technologies, including 2G, 3G, 4G, and 5G technologies. Cellular technologies can cover broad areas but are faced with the problem of high-power consumption; thus, they are unsuitable for sensitive systems of delay [12].
The WSNs and RFID connect to the cloud through fog computing. Fog computing is a system-level horizontal architecture that distributes computing, storage, resources, management, and networking services across the range from Cloud to Things [13]. Fog computing, in this case, minimizes the bandwidth needed and the back and onward contact between the cloud and the sensors, which could affect the entire system’s functionality. Fog and cloud computing then connect, and thus refined data collected from the sensors reaches the cloud for operation. According to collected data in the cloud, and in case of any event, few governmental organizations send warning messages (SMS) to the phones for the public. This method of notifying is not effective and does not support real-time awareness for users [14].
The contributions of this research will be as follows:
  • First: A review study on flood early detection, the solutions presented in that, and the negatives and advantages of those solutions.
  • Second: presentation of a proposed approach platform base on a hybrid solution by integrating the IoT and machine learning algorithms.
  • Third: Building a smart algorithm to classify and predict the degree of risk in advance. We replaced the traditional prediction of the rainfall amount by RT classification of the level of threat according to many weather variables and previous situations.
  • Fourth: An actual study of actual data in the city of Jeddah, Saudi Arabia, during the previous years (2009 to 2013) and years (2018 to 2022) to prove the effectiveness of the proposed algorithm.
  • Fifth: Building an application to alert users and educate them in advance in the event of danger and alert the Civil Defense to take the necessary measures and a decision.
Jeddah city in Saudi Arabia is our study area. It is situated on a coastal plain. The west border is the Red Sea, and the east is Hijaz Mountains. Usually, valley areas are more threatened by flooding than others, especially after heavy rains [15]. Given the city’s heavy floods in 2011, 2012, 2016, and most recently, last November 2022, it was necessary to provide an efficient solution to reduce the effect of these cases. That can be achieved by a smart system providing early notifications about any potential floods. Figure 1 shows damages resulting from the last flood in 2022 in Jeddah.
Figure 1. Jeddah floods, 2022.
Following are the main and sub-sections of this paper. Firstly, a review study of the current solutions for managing disasters, especially floods. The research presents the proposed framework and classification algorithm in detail. After that, the research discusses the implementation of a real dataset and results according to standard metrics. Finally, the conclusion and future trends.

3. Methodology

The proposed framework is based on IoT and machine learning algorithms. Sensors will be distributed in the target region for data collection. The multiple sensor nodes deployed will form a wireless sensor network connected to fog nodes that connect to the cloud. Utilizing fog provides many advantages, such as dividing the cities to cells where each cell will be monitored independently. Moreover, fog will apply the roles and outputs of the proposed ML algorithms on the new data, which means reducing the load on the cloud in addition to fast detecting any threat without delay. The proposed framework and its layers, in addition to the proposed algorithms, will be discussed in detail by the following sub-sections.

3.1. Proposed Framework

It is an integrated and effective framework for early warning of disasters related to weather factors, especially floods resulting from rain or problems resulting from strong winds.
Figure 2 shows the general view of the proposed framework, including the main layers and objects. It shows the main four layers, which are the sensing layer, fog layer, cloud layer, and applications layer. In addition, Figure 2 includes icons that simulate objects of each layer. The first layer has many types of sensors, such as temperature, rainfall level, wind speed, etc. Moreover, the smart vehicle can be used as mobile sensors, and drones can be utilized also to collect information for locations that are difficult to use fixed sensors there. While Figure 3 depicts the detailed view and the functions of each layer. Weather disasters such as floods are related to many factors not limited to the amount of rain only. For example, the different topologies of area (low or high) have different degrees of threat, wind speed, humidity level, and temperature degree).
Figure 2. Proposed framework—general view.
Figure 3. Proposed framework—functional view.
Therefore, several types of sensors were used in our perception layer (First Layer). A large number of sensors were deployed to cover the whole city. Sensors have limited resources, so the second layer in the proposed framework was fog computing. Sensors and IoT objects send their captured values to the fog periodically (e.g., every 6 s). Fog manages the flow of data on behalf of the cloud especially the fog node manages a small area. Thus, fog nodes will collect data from the sensing layer and apply some important functions which are:
  • Caching data;
  • Detecting abnormal data or sensor;
  • Calculating the average of captured data from many sensors to enhance reliability and reduce the number of connections to the cloud;
  • Normalizing values and creating inputs of ML model;
  • Appling the ML model to classify the inputs data;
  • Sending notifications in real time if there is any threat;
  • Sending feedback and forwarding summarized data to the cloud every few minutes.
The third layer is the cloud. This layer receives data from the fog and stores it permanently. After a period, important historical data is created. Thus, the cloud applies the proposed ML algorithm to the historical data to form a smart classifier, in addition to important knowledge about the weather in each area.
Finally, the fourth layer is the applications one. In this layer, we proposed eight services and applications. However, it is available to add more services to any service provider. The eight applications are:
  • Alerts application, which sends an immediate alert to citizens of a specific area in case of danger;
  • News application, which sends the update of trusted information about the weather conditions or the status of the regions in the city;
  • Routing application, which helps drivers to choose the best and safest route during the bad weather;
  • Navigation application helps the civil defense to reach the affected or threatened places quickly;
  • First aid application, which is useful for volunteers to know the procedures that must be in emergency cases and circumstances to help others and the civil defense groups;
  • Crowdsourcing application allows people to evaluate the current situation and thus improve the accuracy of estimation cases in addition to results of the proposed algorithm;
  • Health application, which enables users in bad situations to request ambulance or request online medical consultations if the movement is danger and forbidden;
  • Monitoring application is useful to monitor the level of citizens’ commitment to government instructions, especially in the cases of a high threat indicator.

3.2. Proposed Algorithm

This paper proposed a classification algorithm applied to historical data in the cloud. The results of algorithms will be as rules. The cloud sends these rules to the fog nodes to classify any new sensed data from the first layer. Thus, fog nodes will detect and notify any potential threat in RT. In the case of a threat, an alert is sent to the citizens to take precautions, and to the civil defense to prepare for any emergency. Moreover, the results from fog nodes will be used as feedback to the proposed algorithm in the cloud for continuous enhancement over time.
The proposed algorithm relied on periodic classification. This classification gives an early notification of the threat and then alerted people. Moreover, with the continuation of the threat indicator over time, the algorithms can estimate the level of threat. In addition, the proposed algorithm depended on the best three accuracies of the machine learning models that were tested. Where the three algorithms are adopted together, the majority is taken in the test case, which will enhance the reliability of classification.
Figure 4 explains the main steps of proposed algorithm in the case of training and testing. The steps are:
Figure 4. Proposed algorithm.
  • # In the phase of training
  • Reading dataset of historical data in cloud;
  • Preprocessing data by filtering a nominal value;
  • Removing the missing value or replaced by average value of the feature;
  • Normalizing values of each feature;
  • Converting the date value to month number;
  • Selecting features depending on correlation value with threat column (Y);
  • Applying SMOTE function to address the unbalanced data issue;
  • Dividing data to training and testing (80, 20);
  • Applying ML models (we selected five models RF, SVM, DT, KNN, and LR);
  • Comparing results based on the confusion matrix;
  • Selecting the best three models.
  • # In the phase of testing
  • Fog receives values from sensors;
  • Fog preprocesses data and forms input of algorithm;
  • Fog applies data on the proposed algorithm;
  • Fog checks the majority of classification results for the best three models;
  • In case of a threat, fog calculates time of continues threat to estimate the level of threat;
  • Fog sends alert for people and teams of this area to take the precautions according to the threat level;
  • Fog forwards data to the cloud to enable this data to services providers;
  • Cloud creates complete imagination about the status of areas to support decisions of government.
Briefly, the main advantage of the proposed framework is that the alert will be in part of the city and not the entire city. That will relax the adverse impact of the disaster on the daily commercial, educational, and other activities of citizens within the city.

3.3. Other Advantages of the Proposed Framework Are

  • Considering the topology of regions (cell) according to fog node location;
  • Reducing the overhead on the cloud significantly, thus improving system performance;
  • Providing real-time response and tracking for the emergency’s cases;
  • Detecting cases of outlier values of sensors by comparing their behavior with other;
  • Depending on multi-models of ML to enhance the accuracy and reliability;
  • Monitoring the level of threat depending on period of continuous and the rate of change;
  • Suggesting most important services for dealing with the emergency situations.

3.4. Challenges of the Proposed Framework and Future Trend

  • The cost of deploying wireless network sensors and providing fog nodes in all areas of the city, usually these things are available in smart cities;
  • Interoperability between different kinds of sensors, companies, services, service providers, protocols, and data formats, which will affect the capability of integrating and processing. Thus, an effective solution has to be provided;
  • Concern about preserving the privacy and security of users’ data who collaborate or use the suggested services in the framework;
  • Utilize Blockchain as an important solution for providing trusted data and avoiding rumors during crises [38];
  • Providing smarter services can be utilized in a disaster situation, such as support awareness, encouraging volunteers, supporting disabled users, etc.

4. Implementation and Results

To test our proposed framework and algorithm, we tested it on real data that we have collected from the National Center of Meteorology and the Jeddah Municipality. We obtain daily weather data from Jeddah city for ten years (from 1 January 2009, to 31 December 2013) and (from 1 January 2018, to 31 December 2022). The dataset contains 3654 rows with eleven features are:
  • DT (Date);
  • Temperature (Deg. c);
  • Dry rate;
  • Wet rate;
  • Vapor rate;
  • Humidity rate (%);
  • Wind speed KTS/Deg;
  • Pressure degree (hPa);
  • Mean of sea level;
  • Total rain amount (mm);
  • Station level.
We received data as a PDF file and then we converted it to CSV to deal with it in python. Moreover, we discussed with experts and consultants of weather about the factors that have an effect on the flood, then selected thresholds for some features, such as rain amount and temperature degree, in addition to classifying data. In addition, we excluded some unimportant features, such as dry rate, pressure, and sea level, which did not change during dates for the same city. Table 2 shows a subset (10 rows) of the sample data based on the features after initial processing.
Table 2. Shape of dataset of Jeddah city weather for 10 years (2009–2013 and 2018–2022) (e.g., of nine rows).

4.1. Data Preparation and Implementation

We applied many steps. Firstly, we addressed the null values in some records. We replaced the null value with the average one. Then, we used standardized and normalizing functions for digital variables (temperature, relative humidity, wind velocity, and rain total amount). Normalization and standardization isolate the effect of the difference in ranges between values of variables (See Equations (1) and (2)). After that, we tested the coalition between each feature (variable) and classification column (Y). We excluded the variables with a correlation of less than 0.6 as sea level mean and humidity. This is logical because all data is related to the same city (Jeddah), so the sea level does not have any impact on records. Moreover, we customize our framework to deal with the small area (fog cells) instead of the city for considering the difference in areas’ topology.
In addition, we converted the nominal values, including dates, to numeric, where we replaced the date with the month number because each month has different behavior in Saudi Arabia. Finally, we dealt with the imbalanced data issue, where there are 3652 records classified as “no flood” (0) compared to 92 records as ‘flood’ (1). Many real-world domains have an imbalanced data problem, and combating imbalanced data is critical because it will negatively affect the machine learning process and drive errors in classification or prediction [39]. We applied the SMOTE technique to solve the imbalanced issue.
The data was divided into 80% for training and 20% for testing, where a different 20% is chosen each time of testing to cover all data and enhance the results’ reliability. Then, we selected five of the most popular ML models for classification targets. The selected models are Support Vector Machine (SVM), K-Nearest Neighbor (KNN), Decision Tree (DT), Rain Forest (RF), and Liner Regression (LR). Moreover, we added Deep Learning model (DL). We used Python programing language with the Google COLAB platform (Cloud Platform).
We applied the selected ML models to the final dataset and selected the best three models that gave the highest performance according to many metrics (accuracy, precision, recall, F-Score, and ROC curve). The best three models were DT, RF, and KNN. To enhance the accuracy and reliability of our algorithm, we depend on testing the actual value (input data formed by a fog) on these three models together. That means, the final result will depend on the majority of classification results of the three models. For example, if two of them give 1 and the third gives 0, then the result will be 1. In addition, we considered threats classification early before they become a disaster.
S t a n d a r d i z a t i o n   N e w X = X i M e a n ( X ) S t a n d a r d   D e v i a t i o n
N o r m a l i z a t i o n   N e w X = X i M i n ( X ) M a x ( X ) M i n ( X )
For comparison and evaluation between the models, we used standard metrics, which are confusion matrix and ROC curve (ROC), in addition to learning curve. The confusion matrix helps to calculate four important metrics which are:
  • Accuracy: is a popular machine learning model validation method used in evaluating classification problems and it is the rate of correct predictions over all test cases. For binary classification, as in our study, accuracy can also be calculated through pros and cons. However, when the class distribution is imbalanced, overall accuracy in machine learning classification models can be misleading, and correctly predicting the minority class is critical. In this case, the majority class may be correctly predicted, resulting in a high accuracy score, while the minority class is misclassified. This creates the false impression that the model is performing well when in fact it is not.
  • Precision: It is called the Precision of Positive Observations because it represents the ratio of expected correct positive observations to expected total positive observations. It aids in measuring the model’s ability to classify positive samples. In terms of precision when calculating the precision of a model, we should take into account both positive and negative samples that are classified. A machine learning model’s precision is affected by both negative and positive samples.
  • Recall (sensitivity): It is the ratio of correctly expected positive feedback to all actual observations (not just the positive). It allows us to determine how many positive samples the ML model correctly classified. When calculating a model’s recall, we only need all positive samples and ignore all negative samples. The recall is concerned with correctly categorizing all positive samples.
  • F1-Score: It is the weighted average of precision and recall. Therefore, this result considers bogus pros and false cons and is better than the accuracy criterion when the distribution is unequal for the categories. It is also useful when false positives and false negatives have the same cost to the system. Otherwise, each criterion (precision and recall) is best viewed separately.
The area under the ROC (AUC) measures the area underneath the entire ROC curve based on the true positive rate (TPR) and false positive rate (FPR), where TPR is equal to the value of sensitivity or recall, and FPR is equal to 1 minus the specificity value.

4.2. Results

We applied our algorithm to the data set of the first five years (2009–2013), then we extended our data to confirm the stability of the results by adding data from the other five years (2018–2022). Figure 5 shows the performance of the different models (KNN, SVM, RF, DF, Log, and DL) on a dataset of five years (2009–2013). The RF and DT are superior in most of the parameters. DL also achieved a good result, but not better than RF; DL took more than 42 s for training while RF took less than 1 s.
Figure 5. Comparison among the selected models of all criteria (Data 2009–2013).
To confirm that, Figure 6 depicts the performance of the same models but in 10 years (2009–2013 and 2018–2022). The results here showed enhancement of DL results; however, it still not better than RF, which preserved the best performance and confirmed its stability. Of note, the DL took more than 120 s for the 8 years of data, while RF took less than 1 s.
Figure 6. Comparison among the selected models of all criteria (data 2009–2013 and 2018–2022).
From Figure 5, the RF achieved the highest accuracy, “99%”, and a maximum precision of “1”. This means the margin of error is zero, and the probability of classified threat as not threat is zero also. That is very important in sensitive or critical systems. For the recall value, RF achieved 99%, which means there is a very small margin for error classification for the non-threat case as a threat. There is no effect in this case in the proposed framework. Because the framework repeats the testing process periodically to enhance the accuracy and to find the level of threat in real-time.
The F-score is the common factor that expresses recall and precision together. The results confirmed the superiority of RF and DT with KNN over the other models. Finally, the AUC and ROC present the significant superiority of RF, which is close to the maximum area, as shown in Figure 7. Table 3 and Table 4 present the actual metrics values of each model for both datasets (Dataset 1 2009–2013, Dataset 2 2009–2013 and 2018–2022). The time of training per second is added to the tables.
Figure 7. ROC curve for the RF model.
Table 3. Results of performance the different models for data 2009–2014.
Table 4. Results of performance the different models for data 2009–2013 and 2018–2022.
Finally, Figure 8 depicts the learning curve of each classification model. This figure proved the superiority of RF where the curve toward 1 and the gap between validation and training curve minimum. In addition, DL, KNN, and DT provided very good performance.
Figure 8. Learning curve of accuracy achievement of all ML models and the DL one.
As a justification for the superiority of RF, usually, DT and RF achieve higher performance than other models if the variables of the dataset are categorical or its values have a categorical tendency. That means that the values of the variables have certain thresholds that affect the result, in addition, the values of variables do not have complex relations. That returns to the nature of the weather in KSA. Thus, the DT and RF are suitable for this type of data. Moreover, the RF is used to achieve more stability if the dataset is changed, and that is exactly what is proven by extending the dataset by an additional five years of data. In addition, the DL can achieve the best results if we provide more and more data. For that, the accuracy of DL is enhanced when we extend data from 5 years to 10 years. However, on another side, the DL required more time for updating the model (in the training phase) (see Table 3 and Table 4).

5. Conclusions

This research presented an effective framework for managing weather disasters, specifically floods. The proposed framework is based on hybrid method by integration between the IoT, which enables the collection of necessary data in real-time and ML. Relying on fog computing helped in processing the sensed data without delay, immediately responding to any emergency change, and reducing the burden on the cloud. The cloud provided historical data from previous experiments to apply a proposed algorithm for early classification of the threat’s degree or the possibility of flooding happening. The proposed algorithm is based on three popular machine learning models, which are RF, DT, and KNN, to increase the level of reliability. The accuracy of these models exceeded the 99% threshold. DL also provide good performance but with a long time for training. In the last layer, the proposed framework presented a group of important services for disaster management; however, the details of these applications will be in the next study. Finally, the research presented the challenges that need future solutions, which are related to the security and privacy of users’ data, in addition to supporting interoperability. Moreover, in some critical applications, research has to use continuous classification instead of prediction, which will provide a more accurate model.

Author Contributions

Conceptualization, F.H.A. and A.A.A.S.; Methodology, F.H.A. and A.A.A.S.; Software, F.H.A. and A.A.A.S.; Validation, F.H.A. and A.A.A.S.; Formal analysis, F.H.A.; Investigation, B.A.; Resources, F.H.A.; Data curation, F.H.A.; Writing—original draft, F.H.A. and A.A.A.S.; Writing—review & editing, A.A.A.S., M.S.R., B.A. and N.M.B.; Supervision, M.S.R. and B.A. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Exclude this statement.

Data Availability Statement

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Al-Barazanchi, I.; Jaaz, Z.A.; Abbas, H.H.; Abdulshaheed, H.R. Practical application of IOT and its implications on the existing software. In Proceedings of the 2020 7th International Conference on Electrical Engineering, Computer Sciences and Informatics (EECSI), Yogyakarta, Indonesia, 1–2 October 2020; IEEE: New York, NY, USA, 2020; pp. 10–14. [Google Scholar]
  2. Mezzanotte, P.; Palazzi, V.; Alimenti, F.; Roselli, L. Innovative RFID sensors for internet of things applications. IEEE J. Microw. 2021, 1, 55–65. [Google Scholar] [CrossRef]
  3. Sen, A.A.A.; Eassa, F.A.; Jambi, K.; Yamin, M. Preserving privacy in internet of things: A survey. Int. J. Inf. Technol. 2018, 10, 189–200. [Google Scholar] [CrossRef]
  4. Bahbouh, N.; Basahel, A.; Sendra, S.; Sen, A.; Ahmed, A. Tokens shuffling approach for privacy, security, and reliability in IoHT under a pandemic. Appl. Sci. 2023, 13, 114. [Google Scholar] [CrossRef]
  5. Wang, Y.; Chen, X.; Wang, L.; Min, G. Effective IoT-facilitated storm surge flood modeling based on deep reinforcement learning. IEEE Internet Things J. 2020, 7, 6338–6347. [Google Scholar] [CrossRef]
  6. Huang, G.; Shen, Z.; Mardin, R. (Eds.) Overview of Urban Planning and Water-Related Disaster Management; Springer International Publishing: Cham, Switzerland, 2018. [Google Scholar] [CrossRef]
  7. Jung, D.; Tuan, V.T.; Tran, D.Q.; Park, M.; Park, S. Conceptual framework of an intelligent decision support system for smart city disaster management. Appl. Sci. 2020, 10, 666. [Google Scholar] [CrossRef]
  8. Nsabagwa, M.; Byamukama, M.; Kondela, E.; Otim, J.S. Towards a robust and affordable automatic weather station. Dev. Eng. 2018, 4, 100040. [Google Scholar] [CrossRef]
  9. Mahdavinejad, M.S.; Rezvan, M.; Barekatain, M.; Adibi, P.; Barnaghi, P.; Sheth, A.P. Machine learning for internet of things data analysis: A survey. Digit. Commun. Netw. 2018, 4, 161–175. [Google Scholar] [CrossRef]
  10. Khanh, Q.V.; Hoai, N.V.; Manh, L.D.; Le, A.N.; Jeon, G. Wireless communication technologies for IoT in 5G: Vision, applications, and challenges. Wirel. Commun. Mob. Comput. 2022, 2022, 1–12. [Google Scholar] [CrossRef]
  11. Puliafito, C.; Mingozzi, E.; Longo, F.; Puliafito, A.; Rana, O. Fog computing for the internet of things: A survey. ACM Trans. Internet Technol. (TOIT) 2019, 19, 1–41. [Google Scholar] [CrossRef]
  12. Sen, A.A.A.; Yamin, M. Advantages of using fog in IoT applications. Int. J. Inf. Technol. 2021, 13, 829–837. [Google Scholar] [CrossRef]
  13. Beltran, A., Jr.; Dizon, K.J.; Nones, K.; Salanguit, R.L.; Santos, J.B.; Santos, J.R. Arduino-based disaster management system. J. Robot. Control. (JRC) 2021, 2, 24–28. [Google Scholar] [CrossRef]
  14. Yamin, M.; Basahel, A.M.; Abi Sen, A.A. Managing crowds with wireless and mobile technologies. Wirel. Commun. Mob. Comput. 2018, 2018, 7361597. [Google Scholar] [CrossRef]
  15. Dano, U.L. Flash flood impact assessment in Jeddah City: An analytic hierarchy process approach. Hydrology 2020, 7, 10. [Google Scholar] [CrossRef]
  16. Adeel, A.; Gogate, M.; Farooq, S.; Ieracitano, C.; Dashtipour, K.; Larijani, H.; Hussain, A. A survey on the role of wireless sensor networks and IoT in disaster management. Geol. Disaster Monit. Based Sens. Netw. 2018, 3, 57–66. [Google Scholar] [CrossRef]
  17. Sciullo, L.; Trotta, A.; Di Felice, M. Design and performance evaluation of a LoRa-based mobile emergency management system (LOCATE). Ad Hoc Netw. 2020, 96, 101993. [Google Scholar] [CrossRef]
  18. Xu, J.; Ota, K.; Dong, M. Big data on the fly: UAV-mounted mobile edge computing for disaster management. IEEE Trans. Netw. Sci. Eng. 2020, 7, 2620–2630. [Google Scholar] [CrossRef]
  19. Ejaz, W.; Azam, M.A.; Saadat, S.; Iqbal, F.; Hanan, A. Unmanned aerial vehicles enabled IoT platform for disaster management. Energies 2019, 12, 2706. [Google Scholar] [CrossRef]
  20. Chamola, V.; Hassija, V.; Gupta, S.; Goyal, A.; Guizani, M.; Sikdar, B. Disaster and pandemic management using machine learning: A survey. IEEE Internet Things J. 2020, 8, 16047–16071. [Google Scholar] [CrossRef] [PubMed]
  21. Arinta, R.R.; Andi, E.W.R. Natural disaster application on big data and machine learning: A review. In Proceedings of the 2019 4th International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE), Yogyakarta, Indonesia, 20–21 November 2019; Volume 6, pp. 249–254. [Google Scholar] [CrossRef]
  22. Ranasinghe, R.M.; Ilmini, W.M.K.S. Introducing a LSTM Based Flood Forecasting Model for the Nilwala River Basin with a Mobile Application—A Review. 2020. Available online: http://ir.kdu.ac.lk/handle/345/3039 (accessed on 1 January 2023).
  23. Widiasari, I.R.; Nugroho, L.E. Deep learning multilayer perceptron (MLP) for flood prediction model using wireless sensor network based hydrology time series data mining. In Proceedings of the 2017 International Conference on Innovative and Creative Information Technology (ICITech), Salatiga, Indonesia, 2–4 November 2017; IEEE: New York, NY, USA, 2017. [Google Scholar]
  24. Halgamuge, M.N.; Daminda, E.; Nirmalathas, A. Best optimizer selection for predicting bushfire occurrences using deep learning. Nat. Hazards 2020, 103, 845–860. [Google Scholar] [CrossRef]
  25. Martínez-Álvarez, F.; Morales-Esteban, A. Big data and natural disasters: New approaches for spatial and temporal massive data analysis. Comput. Geosci. 2019, 129, 38–39. [Google Scholar] [CrossRef]
  26. Nourani, V.; Uzelaltinbulat, S.; Sadikoglu, F.; Behfar, N. Artificial intelligence based ensemble modeling for multi-station prediction of precipitation. Atmosphere 2019, 10, 80. [Google Scholar] [CrossRef]
  27. Kang, J.; Wang, H.; Yuan, F.; Wang, Z.; Huang, J.; Qiu, T. Prediction of precipitation based on recurrent neural networks in Jingdezhen, Jiangxi Province, China. Atmosphere 2020, 11, 246. [Google Scholar] [CrossRef]
  28. Yao, C.; Ye, J.; He, Z.; Bastola, S.; Zhang, K.; Li, Z. Evaluation of flood prediction capability of the distributed Grid-Xinanjiang model driven by weather research and forecasting precipitation. J. Flood Risk Manag. 2019, 12, 12544. [Google Scholar] [CrossRef]
  29. Bukhari, A.H.; Sulaiman, M.; Islam, S.; Shoaib, M.; Kumam, P.; Raja, M.A.Z. Neuro-fuzzy modeling and prediction of summer precipitation with application to different meteorological stations. Alex. Eng. J. 2019, 59, 101–116. [Google Scholar] [CrossRef]
  30. Samikwa, E.; Thiemo, V.; Joakim, E. Flood Prediction Using IoT and Artificial Neural Networks with Edge Computing. In Proceedings of the 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics (Cybermatics), Rhodes, Greece, 2–6 November 2020; IEEE: New York, NY, USA, 2020. [Google Scholar]
  31. Hassan, W.H.W.; Jidin, A.Z.; Aziz, S.A.C.; Rahim, N. Flood disaster indicator of water level monitoring system. Int. J. Electr. Comput. Eng. 2019, 9, 1694. [Google Scholar] [CrossRef]
  32. Esposito, M.; Palma, L.; Belli, A.; Sabbatini, L.; Pierleoni, P. Recent advances in internet of things solutions for early warning systems: A review. Sensors 2022, 22, 2124. [Google Scholar] [CrossRef]
  33. Acosta-Coll, M.; Solano-Escorcia, A.; Ortega-Gonzalez, L.; Zamora-Musa, R. Forecasting and communication key elements for low-cost fluvial flooding early warning system in urban areas. Int. J. Electr. Comput. Eng. (IJECE) 2021, 11, 4143–4156. [Google Scholar] [CrossRef]
  34. Sankaranarayanan, S.; Prabhakar, M.; Satish, S.; Jain, P.; Ramprasad, A.; Krishnan, A. Flood prediction based on weather parameters using deep learning. J. Water Clim. Chang. 2019, 11, 1766–1783. [Google Scholar] [CrossRef]
  35. Ighile, E.H.; Shirakawa, H.; Tanikawa, H. Application of GIS and machine learning to predict flood areas in Nigeria. Sustainability 2022, 14, 5039. [Google Scholar] [CrossRef]
  36. El-Haddad, B.A.; Youssef, A.M.; Pourghasemi, H.R.; Pradhan, B.; El-Shater, A.H.; El-Khashab, M.H. Flood susceptibility prediction using four machine learning techniques and comparison of their performance at Wadi Qena Basin, Egypt. Nat. Hazards 2021, 105, 83–114. [Google Scholar] [CrossRef]
  37. Ke, Q.; Tian, X.; Bricker, J.; Tian, Z.; Guan, G.; Cai, H.; Huang, X.; Yang, H.; Liu, J. Urban pluvial flooding prediction by machine learning approaches—A case study of Shenzhen city, China. Adv. Water Resour. 2020, 145, 103719. [Google Scholar] [CrossRef]
  38. Waseem, M.; Khan, M.A.; Goudarzi, A.; Fahad, S.; Sajjad, I.A.; Siano, P. Incorporation of blockchain technology for different smart grid applications: Architecture, prospects, and challenges. Energies 2023, 16, 820. [Google Scholar] [CrossRef]
  39. Ali, H.; Salleh, M.N.M.; Saedudin, R.; Hussain, K.; Mushtaq, M.F. Imbalance class problems in data mining: A review. Indones. J. Electr. Eng. Comput. Sci. 2019, 14, 1560–1571. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.