Serveur d'exploration sur la télématique

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

Towards a Holistic Framework for the Evaluation of Emergency Plans in Indoor Environments

Identifieur interne : 000546 ( Pmc/Corpus ); précédent : 000545; suivant : 000547

Towards a Holistic Framework for the Evaluation of Emergency Plans in Indoor Environments

Auteurs : Emilio Serrano ; Geovanny Poveda ; Mercedes Garijo

Source :

RBID : PMC:4003955

Abstract

One of the most promising fields for ambient intelligence is the implementation of intelligent emergency plans. Because the use of drills and living labs cannot reproduce social behaviors, such as panic attacks, that strongly affect these plans, the use of agent-based social simulation provides an approach to evaluate these plans more thoroughly. (1) The hypothesis presented in this paper is that there has been little interest in describing the key modules that these simulators must include, such as formally represented knowledge and a realistic simulated sensor model, and especially in providing researchers with tools to reuse, extend and interconnect modules from different works. This lack of interest hinders researchers from achieving a holistic framework for evaluating emergency plans and forces them to reconsider and to implement the same components from scratch over and over. In addition to supporting this hypothesis by considering over 150 simulators, this paper: (2) defines the main modules identified and proposes the use of semantic web technologies as a cornerstone for the aforementioned holistic framework; (3) provides a basic methodology to achieve the framework; (4) identifies the main challenges; and (5) presents an open and free software tool to hint at the potential of such a holistic view of emergency plan evaluation in indoor environments.


Url:
DOI: 10.3390/s140304513
PubMed: 24662453
PubMed Central: 4003955

Links to Exploration step

PMC:4003955

Le document en format XML

<record>
<TEI>
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en">Towards a Holistic Framework for the Evaluation of Emergency Plans in Indoor Environments</title>
<author>
<name sortKey="Serrano, Emilio" sort="Serrano, Emilio" uniqKey="Serrano E" first="Emilio" last="Serrano">Emilio Serrano</name>
</author>
<author>
<name sortKey="Poveda, Geovanny" sort="Poveda, Geovanny" uniqKey="Poveda G" first="Geovanny" last="Poveda">Geovanny Poveda</name>
</author>
<author>
<name sortKey="Garijo, Mercedes" sort="Garijo, Mercedes" uniqKey="Garijo M" first="Mercedes" last="Garijo">Mercedes Garijo</name>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">PMC</idno>
<idno type="pmid">24662453</idno>
<idno type="pmc">4003955</idno>
<idno type="url">http://www.ncbi.nlm.nih.gov/pmc/articles/PMC4003955</idno>
<idno type="RBID">PMC:4003955</idno>
<idno type="doi">10.3390/s140304513</idno>
<date when="2014">2014</date>
<idno type="wicri:Area/Pmc/Corpus">000546</idno>
<idno type="wicri:explorRef" wicri:stream="Pmc" wicri:step="Corpus" wicri:corpus="PMC">000546</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title xml:lang="en" level="a" type="main">Towards a Holistic Framework for the Evaluation of Emergency Plans in Indoor Environments</title>
<author>
<name sortKey="Serrano, Emilio" sort="Serrano, Emilio" uniqKey="Serrano E" first="Emilio" last="Serrano">Emilio Serrano</name>
</author>
<author>
<name sortKey="Poveda, Geovanny" sort="Poveda, Geovanny" uniqKey="Poveda G" first="Geovanny" last="Poveda">Geovanny Poveda</name>
</author>
<author>
<name sortKey="Garijo, Mercedes" sort="Garijo, Mercedes" uniqKey="Garijo M" first="Mercedes" last="Garijo">Mercedes Garijo</name>
</author>
</analytic>
<series>
<title level="j">Sensors (Basel, Switzerland)</title>
<idno type="eISSN">1424-8220</idno>
<imprint>
<date when="2014">2014</date>
</imprint>
</series>
</biblStruct>
</sourceDesc>
</fileDesc>
<profileDesc>
<textClass></textClass>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">
<p>One of the most promising fields for ambient intelligence is the implementation of intelligent emergency plans. Because the use of drills and living labs cannot reproduce social behaviors, such as panic attacks, that strongly affect these plans, the use of agent-based social simulation provides an approach to evaluate these plans more thoroughly. (1) The hypothesis presented in this paper is that there has been little interest in describing the key modules that these simulators must include, such as formally represented knowledge and a realistic simulated sensor model, and especially in providing researchers with tools to reuse, extend and interconnect modules from different works. This lack of interest hinders researchers from achieving a holistic framework for evaluating emergency plans and forces them to reconsider and to implement the same components from scratch over and over. In addition to supporting this hypothesis by considering over 150 simulators, this paper: (2) defines the main modules identified and proposes the use of semantic web technologies as a cornerstone for the aforementioned holistic framework; (3) provides a basic methodology to achieve the framework; (4) identifies the main challenges; and (5) presents an open and free software tool to hint at the potential of such a holistic view of emergency plan evaluation in indoor environments.</p>
</div>
</front>
<back>
<div1 type="bibliography">
<listBibl>
<biblStruct></biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Darlington, S" uniqKey="Darlington S">S. Darlington</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Cook, D J" uniqKey="Cook D">D.J. Cook</name>
</author>
<author>
<name sortKey="Augusto, J C" uniqKey="Augusto J">J.C. Augusto</name>
</author>
<author>
<name sortKey="Jakkula, V R" uniqKey="Jakkula V">V.R. Jakkula</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Aedo, I" uniqKey="Aedo I">I. Aedo</name>
</author>
<author>
<name sortKey="Yu, S" uniqKey="Yu S">S. Yu</name>
</author>
<author>
<name sortKey="Diaz, P" uniqKey="Diaz P">P. Díaz</name>
</author>
<author>
<name sortKey="Acu A, P" uniqKey="Acu A P">P. Acuña</name>
</author>
<author>
<name sortKey="Onorati, T" uniqKey="Onorati T">T. Onorati</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Cheon, M" uniqKey="Cheon M">M. Cheon</name>
</author>
<author>
<name sortKey="Lee, J" uniqKey="Lee J">J. Lee</name>
</author>
<author>
<name sortKey="Lee, W" uniqKey="Lee W">W. Lee</name>
</author>
<author>
<name sortKey="Hyun, C H" uniqKey="Hyun C">C.H. Hyun</name>
</author>
<author>
<name sortKey="Park, M" uniqKey="Park M">M. Park</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Zeng, Y" uniqKey="Zeng Y">Y. Zeng</name>
</author>
<author>
<name sortKey="Sreenan, C J" uniqKey="Sreenan C">C.J. Sreenan</name>
</author>
<author>
<name sortKey="Sitanayah, L" uniqKey="Sitanayah L">L. Sitanayah</name>
</author>
<author>
<name sortKey="Xiong, N" uniqKey="Xiong N">N. Xiong</name>
</author>
<author>
<name sortKey="Park, J H" uniqKey="Park J">J.H. Park</name>
</author>
<author>
<name sortKey="Zheng, G" uniqKey="Zheng G">G. Zheng</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Gray, A J G" uniqKey="Gray A">A.J.G. Gray</name>
</author>
<author>
<name sortKey="Sadler, J" uniqKey="Sadler J">J. Sadler</name>
</author>
<author>
<name sortKey="Kit, O" uniqKey="Kit O">O. Kit</name>
</author>
<author>
<name sortKey="Kyzirakos, K" uniqKey="Kyzirakos K">K. Kyzirakos</name>
</author>
<author>
<name sortKey="Karpathiotakis, M" uniqKey="Karpathiotakis M">M. Karpathiotakis</name>
</author>
<author>
<name sortKey="Calbimonte, J P" uniqKey="Calbimonte J">J.P. Calbimonte</name>
</author>
<author>
<name sortKey="Page, K" uniqKey="Page K">K. Page</name>
</author>
<author>
<name sortKey="Garcia Castro, R" uniqKey="Garcia Castro R">R. García-Castro</name>
</author>
<author>
<name sortKey="Frazer, A" uniqKey="Frazer A">A. Frazer</name>
</author>
<author>
<name sortKey="Galpin, I" uniqKey="Galpin I">I. Galpin</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Alonso, L" uniqKey="Alonso L">L. Alonso</name>
</author>
<author>
<name sortKey="Milanes, V" uniqKey="Milanes V">V. Milanés</name>
</author>
<author>
<name sortKey="Torre Ferrero, C" uniqKey="Torre Ferrero C">C. Torre-Ferrero</name>
</author>
<author>
<name sortKey="Godoy, J" uniqKey="Godoy J">J. Godoy</name>
</author>
<author>
<name sortKey="Oria, J P" uniqKey="Oria J">J.P. Oria</name>
</author>
<author>
<name sortKey="De Pedro, T" uniqKey="De Pedro T">T. De Pedro</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Eriksson, M" uniqKey="Eriksson M">M. Eriksson</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Fishwick, P A" uniqKey="Fishwick P">P.A. Fishwick</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Aldunate, R G" uniqKey="Aldunate R">R.G. Aldunate</name>
</author>
<author>
<name sortKey="Schmidt, K N" uniqKey="Schmidt K">K.N. Schmidt</name>
</author>
<author>
<name sortKey="Herrera, O" uniqKey="Herrera O">O. Herrera</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Serrano, E" uniqKey="Serrano E">E. Serrano</name>
</author>
<author>
<name sortKey="Botia, J" uniqKey="Botia J">J. Botia</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Millan Garcia, L" uniqKey="Millan Garcia L">L. Millan-Garcia</name>
</author>
<author>
<name sortKey="Sanchez Perez, G" uniqKey="Sanchez Perez G">G. Sanchez-Perez</name>
</author>
<author>
<name sortKey="Nakano, M" uniqKey="Nakano M">M. Nakano</name>
</author>
<author>
<name sortKey="Toscano Medina, K" uniqKey="Toscano Medina K">K. Toscano-Medina</name>
</author>
<author>
<name sortKey="Perez Meana, H" uniqKey="Perez Meana H">H. Perez-Meana</name>
</author>
<author>
<name sortKey="Rojas Cardenas, L" uniqKey="Rojas Cardenas L">L. Rojas-Cardenas</name>
</author>
</analytic>
</biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Luke, S" uniqKey="Luke S">S. Luke</name>
</author>
<author>
<name sortKey="Cioffi Revilla, C" uniqKey="Cioffi Revilla C">C. Cioffi-Revilla</name>
</author>
<author>
<name sortKey="Panait, L" uniqKey="Panait L">L. Panait</name>
</author>
<author>
<name sortKey="Sullivan, K" uniqKey="Sullivan K">K. Sullivan</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Collier, N" uniqKey="Collier N">N. Collier</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Dawson, R J" uniqKey="Dawson R">R.J. Dawson</name>
</author>
<author>
<name sortKey="Peppe, R" uniqKey="Peppe R">R. Peppe</name>
</author>
<author>
<name sortKey="Wang, M" uniqKey="Wang M">M. Wang</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Gatto, L B S" uniqKey="Gatto L">L.B.S. Gatto</name>
</author>
<author>
<name sortKey="M L, A C A" uniqKey="M L A">A.C.A. Mól</name>
</author>
<author>
<name sortKey="Dos Santos, I J L" uniqKey="Dos Santos I">I.J.L. dos Santos</name>
</author>
<author>
<name sortKey="Jorge, C A F" uniqKey="Jorge C">C.A.F. Jorge</name>
</author>
<author>
<name sortKey="Legey, A P" uniqKey="Legey A">A.P. Legey</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Szymanezyk, O" uniqKey="Szymanezyk O">O. Szymanezyk</name>
</author>
<author>
<name sortKey="Duckett, T" uniqKey="Duckett T">T. Duckett</name>
</author>
<author>
<name sortKey="Dickinson, P" uniqKey="Dickinson P">P. Dickinson</name>
</author>
</analytic>
</biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Gameplay, Free" uniqKey="Gameplay F">Free Gameplay</name>
</author>
</analytic>
</biblStruct>
<biblStruct></biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Ruppel, U" uniqKey="Ruppel U">U. Rüppel</name>
</author>
<author>
<name sortKey="Schatz, K" uniqKey="Schatz K">K. Schatz</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Kuligowski, E D" uniqKey="Kuligowski E">E.D. Kuligowski</name>
</author>
<author>
<name sortKey="Peacock, R D" uniqKey="Peacock R">R.D. Peacock</name>
</author>
<author>
<name sortKey="Hoskins, B L" uniqKey="Hoskins B">B.L. Hoskins</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Francis, R" uniqKey="Francis R">R. Francis</name>
</author>
<author>
<name sortKey="Saunders, P" uniqKey="Saunders P">P. Saunders</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Shestopal, V O" uniqKey="Shestopal V">V.O. Shestopal</name>
</author>
<author>
<name sortKey="Grubits, S J" uniqKey="Grubits S">S.J. Grubits</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Zhang, B" uniqKey="Zhang B">B. Zhang</name>
</author>
<author>
<name sortKey="Chan, W K V" uniqKey="Chan W">W.K.V. Chan</name>
</author>
<author>
<name sortKey="Ukkusuri, S V" uniqKey="Ukkusuri S">S.V. Ukkusuri</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Sakaki, T" uniqKey="Sakaki T">T. Sakaki</name>
</author>
<author>
<name sortKey="Toriumi, F" uniqKey="Toriumi F">F. Toriumi</name>
</author>
<author>
<name sortKey="Shinoda, K" uniqKey="Shinoda K">K. Shinoda</name>
</author>
<author>
<name sortKey="Kazama, K" uniqKey="Kazama K">K. Kazama</name>
</author>
<author>
<name sortKey="Kurihara, S" uniqKey="Kurihara S">S. Kurihara</name>
</author>
<author>
<name sortKey="Noda, I" uniqKey="Noda I">I. Noda</name>
</author>
<author>
<name sortKey="Matsuo, Y" uniqKey="Matsuo Y">Y. Matsuo</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Campillo Sanchez, P" uniqKey="Campillo Sanchez P">P. Campillo-Sanchez</name>
</author>
<author>
<name sortKey="Serrano, E" uniqKey="Serrano E">E. Serrano</name>
</author>
<author>
<name sortKey="Botia, J A" uniqKey="Botia J">J.A. Botía</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Campillo Sanchez, P" uniqKey="Campillo Sanchez P">P. Campillo-Sanchez</name>
</author>
<author>
<name sortKey="Serrano, E" uniqKey="Serrano E">E. Serrano</name>
</author>
<author>
<name sortKey="Botia, J A" uniqKey="Botia J">J.A. Botía</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Barton, J J" uniqKey="Barton J">J.J. Barton</name>
</author>
<author>
<name sortKey="Vijayaraghavan, V" uniqKey="Vijayaraghavan V">V. Vijayaraghavan</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="O Neill, E" uniqKey="O Neill E">E. O'Neill</name>
</author>
<author>
<name sortKey="Klepal, M" uniqKey="Klepal M">M. Klepal</name>
</author>
<author>
<name sortKey="Lewis, D" uniqKey="Lewis D">D. Lewis</name>
</author>
<author>
<name sortKey="O Donnell, T" uniqKey="O Donnell T">T. O'Donnell</name>
</author>
<author>
<name sortKey="O Sullivan, D" uniqKey="O Sullivan D">D. O'Sullivan</name>
</author>
<author>
<name sortKey="Pesch, D A" uniqKey="Pesch D">D.A. Pesch</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Nishikawa, H" uniqKey="Nishikawa H">H. Nishikawa</name>
</author>
<author>
<name sortKey="Yamamoto, S" uniqKey="Yamamoto S">S. Yamamoto</name>
</author>
<author>
<name sortKey="Tamai, M" uniqKey="Tamai M">M. Tamai</name>
</author>
<author>
<name sortKey="Nishigaki, K" uniqKey="Nishigaki K">K. Nishigaki</name>
</author>
<author>
<name sortKey="Kitani, T" uniqKey="Kitani T">T. Kitani</name>
</author>
<author>
<name sortKey="Shibata, N" uniqKey="Shibata N">N. Shibata</name>
</author>
<author>
<name sortKey="Yasumoto, K" uniqKey="Yasumoto K">K. Yasumoto</name>
</author>
<author>
<name sortKey="Ito, M" uniqKey="Ito M">M. Ito</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Tang, L" uniqKey="Tang L">L. Tang</name>
</author>
<author>
<name sortKey="Zhou, X" uniqKey="Zhou X">X. Zhou</name>
</author>
<author>
<name sortKey="Becker, C" uniqKey="Becker C">C. Becker</name>
</author>
<author>
<name sortKey="Yu, Z" uniqKey="Yu Z">Z. Yu</name>
</author>
<author>
<name sortKey="Schiele, G" uniqKey="Schiele G">G. Schiele</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Diewald, S" uniqKey="Diewald S">S. Diewald</name>
</author>
<author>
<name sortKey="Roalter, L" uniqKey="Roalter L">L. Roalter</name>
</author>
<author>
<name sortKey="Moller, A" uniqKey="Moller A">A. Möller</name>
</author>
<author>
<name sortKey="Kranz, M" uniqKey="Kranz M">M. Kranz</name>
</author>
</analytic>
</biblStruct>
<biblStruct></biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Noy, N F" uniqKey="Noy N">N.F. Noy</name>
</author>
<author>
<name sortKey="Mcguinness, D L" uniqKey="Mcguinness D">D.L. Mcguinness</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Garlik, S H" uniqKey="Garlik S">S.H. Garlik</name>
</author>
<author>
<name sortKey="Seaborne, A" uniqKey="Seaborne A">A. Seaborne</name>
</author>
<author>
<name sortKey="Prud Hommeaux, E" uniqKey="Prud Hommeaux E">E. Prud'hommeaux</name>
</author>
</analytic>
</biblStruct>
<biblStruct></biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Panagiotopoulos, I" uniqKey="Panagiotopoulos I">I. Panagiotopoulos</name>
</author>
<author>
<name sortKey="Seremeti, L" uniqKey="Seremeti L">L. Seremeti</name>
</author>
<author>
<name sortKey="Kameas, A" uniqKey="Kameas A">A. Kameas</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Grau, B C" uniqKey="Grau B">B.C. Grau</name>
</author>
<author>
<name sortKey="Horrocks, I" uniqKey="Horrocks I">I. Horrocks</name>
</author>
<author>
<name sortKey="Motik, B" uniqKey="Motik B">B. Motik</name>
</author>
<author>
<name sortKey="Parsia, B" uniqKey="Parsia B">B. Parsia</name>
</author>
<author>
<name sortKey="Patel Schneider, P" uniqKey="Patel Schneider P">P. Patel-Schneider</name>
</author>
<author>
<name sortKey="Sattler, U" uniqKey="Sattler U">U. Sattler</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Guerrero, L A" uniqKey="Guerrero L">L.A. Guerrero</name>
</author>
<author>
<name sortKey="Vasquez, F" uniqKey="Vasquez F">F. Vasquez</name>
</author>
<author>
<name sortKey="Ochoa, S F" uniqKey="Ochoa S">S.F. Ochoa</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Augusto, J" uniqKey="Augusto J">J. Augusto</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Yang, L" uniqKey="Yang L">L. Yang</name>
</author>
<author>
<name sortKey="Worboys, M A" uniqKey="Worboys M">M.A. Worboys</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Augusto, J C" uniqKey="Augusto J">J.C. Augusto</name>
</author>
<author>
<name sortKey="Hornos, M J" uniqKey="Hornos M">M.J. Hornos</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Compton, M" uniqKey="Compton M">M. Compton</name>
</author>
<author>
<name sortKey="Henson, C" uniqKey="Henson C">C. Henson</name>
</author>
<author>
<name sortKey="Neuhaus, H" uniqKey="Neuhaus H">H. Neuhaus</name>
</author>
<author>
<name sortKey="Lefort, L" uniqKey="Lefort L">L. Lefort</name>
</author>
<author>
<name sortKey="Sheth, A" uniqKey="Sheth A">A. Sheth</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Malizia, A" uniqKey="Malizia A">A. Malizia</name>
</author>
<author>
<name sortKey="Onorati, T" uniqKey="Onorati T">T. Onorati</name>
</author>
<author>
<name sortKey="Diaz, P" uniqKey="Diaz P">P. Diaz</name>
</author>
<author>
<name sortKey="Aedo, I" uniqKey="Aedo I">I. Aedo</name>
</author>
<author>
<name sortKey="Astorga Paliza, F" uniqKey="Astorga Paliza F">F. Astorga-Paliza</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Li, X" uniqKey="Li X">X. Li</name>
</author>
<author>
<name sortKey="Liu, G" uniqKey="Liu G">G. Liu</name>
</author>
<author>
<name sortKey="Ling, A" uniqKey="Ling A">A. Ling</name>
</author>
<author>
<name sortKey="Zhan, J" uniqKey="Zhan J">J. Zhan</name>
</author>
<author>
<name sortKey="An, N" uniqKey="An N">N. An</name>
</author>
<author>
<name sortKey="Li, L" uniqKey="Li L">L. Li</name>
</author>
<author>
<name sortKey="Sha, Y" uniqKey="Sha Y">Y. Sha</name>
</author>
</analytic>
</biblStruct>
<biblStruct></biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Gilbert, N" uniqKey="Gilbert N">N. Gilbert</name>
</author>
<author>
<name sortKey="Troitzsch, K G" uniqKey="Troitzsch K">K.G. Troitzsch</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Benjamin, P" uniqKey="Benjamin P">P. Benjamin</name>
</author>
<author>
<name sortKey="Patki, M" uniqKey="Patki M">M. Patki</name>
</author>
<author>
<name sortKey="Mayer, R" uniqKey="Mayer R">R. Mayer</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Garcia Valverde, T" uniqKey="Garcia Valverde T">T. Garcia-Valverde</name>
</author>
<author>
<name sortKey="Serrano, E" uniqKey="Serrano E">E. Serrano</name>
</author>
<author>
<name sortKey="Botia, J" uniqKey="Botia J">J. Botia</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Wang, X H" uniqKey="Wang X">X.H. Wang</name>
</author>
<author>
<name sortKey="Zhang, D Q" uniqKey="Zhang D">D.Q. Zhang</name>
</author>
<author>
<name sortKey="Gu, T" uniqKey="Gu T">T. Gu</name>
</author>
<author>
<name sortKey="Pung, H K" uniqKey="Pung H">H.K. Pung</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Horrocks, I" uniqKey="Horrocks I">I. Horrocks</name>
</author>
<author>
<name sortKey="Patel Schneider, P F" uniqKey="Patel Schneider P">P.F. Patel-Schneider</name>
</author>
<author>
<name sortKey="Boley, H" uniqKey="Boley H">H. Boley</name>
</author>
<author>
<name sortKey="Tabet, S" uniqKey="Tabet S">S. Tabet</name>
</author>
<author>
<name sortKey="Grosof, B" uniqKey="Grosof B">B. Grosof</name>
</author>
<author>
<name sortKey="Dean, M" uniqKey="Dean M">M. Dean</name>
</author>
</analytic>
</biblStruct>
<biblStruct></biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Millington, I" uniqKey="Millington I">I. Millington</name>
</author>
<author>
<name sortKey="Funge, J" uniqKey="Funge J">J. Funge</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Garcia Valverde, T" uniqKey="Garcia Valverde T">T. Garcia-Valverde</name>
</author>
<author>
<name sortKey="Campuzano, F" uniqKey="Campuzano F">F. Campuzano</name>
</author>
<author>
<name sortKey="Serrano, E" uniqKey="Serrano E">E. Serrano</name>
</author>
<author>
<name sortKey="Villa, A" uniqKey="Villa A">A. Villa</name>
</author>
<author>
<name sortKey="Botia, J A" uniqKey="Botia J">J.A. Botia</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Caballero, A" uniqKey="Caballero A">A. Caballero</name>
</author>
<author>
<name sortKey="Botia, J" uniqKey="Botia J">J. Botía</name>
</author>
<author>
<name sortKey="G Mez Skarmeta, A" uniqKey="G Mez Skarmeta A">A. Gómez-Skarmeta</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Erl, T" uniqKey="Erl T">T. Erl</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="El Gayar, O" uniqKey="El Gayar O">O. El-Gayar</name>
</author>
<author>
<name sortKey="Deokar, A" uniqKey="Deokar A">A. Deokar</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Corredor, I" uniqKey="Corredor I">I. Corredor</name>
</author>
<author>
<name sortKey="Bernardos, A M" uniqKey="Bernardos A">A.M. Bernardos</name>
</author>
<author>
<name sortKey="Iglesias, J" uniqKey="Iglesias J">J. Iglesias</name>
</author>
<author>
<name sortKey="Casar, J R" uniqKey="Casar J">J.R. Casar</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Ishida, T" uniqKey="Ishida T">T. Ishida</name>
</author>
<author>
<name sortKey="Nakajima, Y" uniqKey="Nakajima Y">Y. Nakajima</name>
</author>
<author>
<name sortKey="Murakami, Y" uniqKey="Murakami Y">Y. Murakami</name>
</author>
<author>
<name sortKey="Nakanishi, H" uniqKey="Nakanishi H">H. Nakanishi</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Messeguer, R" uniqKey="Messeguer R">R. Messeguer</name>
</author>
<author>
<name sortKey="Molina, C" uniqKey="Molina C">C. Molina</name>
</author>
<author>
<name sortKey="Ochoa, S F" uniqKey="Ochoa S">S.F. Ochoa</name>
</author>
<author>
<name sortKey="Santos, R M" uniqKey="Santos R">R.M. Santos</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Carren O, P" uniqKey="Carren O P">P. Carren̈o</name>
</author>
<author>
<name sortKey="Gutierrez, F" uniqKey="Gutierrez F">F. Gutierrez</name>
</author>
<author>
<name sortKey="Ochoa, S F" uniqKey="Ochoa S">S.F. Ochoa</name>
</author>
<author>
<name sortKey="Fortino, G" uniqKey="Fortino G">G. Fortino</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Ochoa, S F" uniqKey="Ochoa S">S.F. Ochoa</name>
</author>
<author>
<name sortKey="Santos, R" uniqKey="Santos R">R. Santos</name>
</author>
</analytic>
</biblStruct>
<biblStruct></biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Serrano, E" uniqKey="Serrano E">E. Serrano</name>
</author>
<author>
<name sortKey="Rovatsos, M" uniqKey="Rovatsos M">M. Rovatsos</name>
</author>
<author>
<name sortKey="Botia, J A" uniqKey="Botia J">J.A. Botia</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Abrahamsson, P" uniqKey="Abrahamsson P">P. Abrahamsson</name>
</author>
<author>
<name sortKey="Salo, O" uniqKey="Salo O">O. Salo</name>
</author>
<author>
<name sortKey="Ronkainen, J" uniqKey="Ronkainen J">J. Ronkainen</name>
</author>
<author>
<name sortKey="Warsta, J" uniqKey="Warsta J">J. Warsta</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Fernandez L Pez, M" uniqKey="Fernandez L Pez M">M. Fernández-López</name>
</author>
<author>
<name sortKey="G Mez Perez, A" uniqKey="G Mez Perez A">A. Gómez-Pérez</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Coronato, A" uniqKey="Coronato A">A. Coronato</name>
</author>
<author>
<name sortKey="Pietro, G D" uniqKey="Pietro G">G.D. Pietro</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Yang, S" uniqKey="Yang S">S. Yang</name>
</author>
<author>
<name sortKey="Li, Q" uniqKey="Li Q">Q. Li</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Serrano, E" uniqKey="Serrano E">E. Serrano</name>
</author>
<author>
<name sortKey="Munoz, A" uniqKey="Munoz A">A. Munoz</name>
</author>
<author>
<name sortKey="Botia, J" uniqKey="Botia J">J. Botia</name>
</author>
</analytic>
</biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Munoz, A" uniqKey="Munoz A">A. Munoz</name>
</author>
<author>
<name sortKey="Serrano, E" uniqKey="Serrano E">E. Serrano</name>
</author>
<author>
<name sortKey="Villa, A" uniqKey="Villa A">A. Villa</name>
</author>
<author>
<name sortKey="Valdes, M" uniqKey="Valdes M">M. Valdés</name>
</author>
<author>
<name sortKey="Botia, J A" uniqKey="Botia J">J.A. Botía</name>
</author>
</analytic>
</biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
</listBibl>
</div1>
</back>
</TEI>
<pmc article-type="research-article">
<pmc-dir>properties open_access</pmc-dir>
<front>
<journal-meta>
<journal-id journal-id-type="nlm-ta">Sensors (Basel)</journal-id>
<journal-id journal-id-type="iso-abbrev">Sensors (Basel)</journal-id>
<journal-title-group>
<journal-title>Sensors (Basel, Switzerland)</journal-title>
</journal-title-group>
<issn pub-type="epub">1424-8220</issn>
<publisher>
<publisher-name>MDPI</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="pmid">24662453</article-id>
<article-id pub-id-type="pmc">4003955</article-id>
<article-id pub-id-type="doi">10.3390/s140304513</article-id>
<article-id pub-id-type="publisher-id">sensors-14-04513</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Article</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>Towards a Holistic Framework for the Evaluation of Emergency Plans in Indoor Environments</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname>Serrano</surname>
<given-names>Emilio</given-names>
</name>
<xref rid="c1-sensors-14-04513" ref-type="corresp">
<sup>*</sup>
</xref>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Poveda</surname>
<given-names>Geovanny</given-names>
</name>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Garijo</surname>
<given-names>Mercedes</given-names>
</name>
</contrib>
<aff id="af1-sensors-14-04513">Department of Telematic Systems Engineering, Polytechnic University of Madrid, Madrid 28040, Spain; E-Mails:
<email>gpoveda@gsi.dit.upm.es</email>
(G.P.);
<email>mga@gsi.dit.upm.es</email>
(M.G.)</aff>
</contrib-group>
<author-notes>
<corresp id="c1-sensors-14-04513">
<label>*</label>
Author to whom correspondence should be addressed; E-Mail:
<email>eserrano@gsi.dit.upm.es</email>
; Tel.:+34-915-495700</corresp>
</author-notes>
<pub-date pub-type="collection">
<month>3</month>
<year>2014</year>
</pub-date>
<pub-date pub-type="epub">
<day>06</day>
<month>3</month>
<year>2014</year>
</pub-date>
<volume>14</volume>
<issue>3</issue>
<fpage>4513</fpage>
<lpage>4535</lpage>
<history>
<date date-type="received">
<day>08</day>
<month>10</month>
<year>2013</year>
</date>
<date date-type="rev-recd">
<day>24</day>
<month>2</month>
<year>2014</year>
</date>
<date date-type="accepted">
<day>26</day>
<month>2</month>
<year>2014</year>
</date>
</history>
<permissions>
<copyright-statement>© 2014 by the authors; licensee MDPI, Basel, Switzerland.</copyright-statement>
<copyright-year>2014</copyright-year>
<license>
<license-p>This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution license (
<ext-link ext-link-type="uri" xlink:href="http://creativecommons.org/licenses/by/3.0/">http://creativecommons.org/licenses/by/3.0/</ext-link>
).</license-p>
</license>
</permissions>
<abstract>
<p>One of the most promising fields for ambient intelligence is the implementation of intelligent emergency plans. Because the use of drills and living labs cannot reproduce social behaviors, such as panic attacks, that strongly affect these plans, the use of agent-based social simulation provides an approach to evaluate these plans more thoroughly. (1) The hypothesis presented in this paper is that there has been little interest in describing the key modules that these simulators must include, such as formally represented knowledge and a realistic simulated sensor model, and especially in providing researchers with tools to reuse, extend and interconnect modules from different works. This lack of interest hinders researchers from achieving a holistic framework for evaluating emergency plans and forces them to reconsider and to implement the same components from scratch over and over. In addition to supporting this hypothesis by considering over 150 simulators, this paper: (2) defines the main modules identified and proposes the use of semantic web technologies as a cornerstone for the aforementioned holistic framework; (3) provides a basic methodology to achieve the framework; (4) identifies the main challenges; and (5) presents an open and free software tool to hint at the potential of such a holistic view of emergency plan evaluation in indoor environments.</p>
</abstract>
<kwd-group>
<kwd>emergency plans</kwd>
<kwd>ambient intelligence</kwd>
<kwd>ambient intelligence simulation</kwd>
<kwd>agent-based social simulation</kwd>
<kwd>game engines</kwd>
<kwd>sensors simulation</kwd>
</kwd-group>
</article-meta>
</front>
<body>
<sec sec-type="intro">
<label>1.</label>
<title>Introduction</title>
<p>An emergency plan is an exhaustive information guide that contains the actions and procedures that people will follow when an emergency occurs. Its main goal is to generate, in a systematic manner, a set of instructions that allow interested agents to reduce and control the effects produced by emergency events, such as fires, earthquakes and terrorist attacks. Emergency action plans can help people to remain safe in many situations. Traditionally, these plans have been validated using drills. In addition to their cost, drills present a number of shortcomings, such as not covering crowd conditions in which people may experience human behaviors, such as panic. Several recent catastrophes, including those in the Madrid Arena [
<xref rid="b1-sensors-14-04513" ref-type="bibr">1</xref>
] and the Brazilian Santa Maria [
<xref rid="b2-sensors-14-04513" ref-type="bibr">2</xref>
], have demonstrated the necessity of improving emergency plan strategies.</p>
<p>Ambient intelligence (AmI) is an emerging discipline in information technology in which people are empowered through a digital environment that primarily consists of sensors and devices connected through a network [
<xref rid="b3-sensors-14-04513" ref-type="bibr">3</xref>
]. AmI is based on inherent aspects, such as artificial intelligence, human-computer interaction, sensors and ubiquitous computing. The main goal of AmI is to offer a digital environment in which it is possible to support the cooperation of devices, services and people. AmI allows creating sensitive, adaptive and responsive scenarios that interact with users seamlessly by providing them with implicit and unobtrusive interaction paradigms.</p>
<p>One of the most promising fields for AmI is the implementation of intelligent emergency plans in which it is possible to advise people in an intelligent manner when an emergency situation takes place in dynamic and complex scenarios. Putting decisions into action and resolving situations caused by emergency events require the integration of a set of techniques and elements that enable intelligent evacuations to be conducted. Inasmuch as AmI is meant to predict users' needs and react accordingly, this is a very suitable approach to support all the features required in an intelligent emergency plan and to allow for the collaboration and coordination strategy to improve response efforts in emergency situations. Similar works have addressed providing appropriate, updated and accessible information to all people in emergency situations [
<xref rid="b4-sensors-14-04513" ref-type="bibr">4</xref>
], developing intelligent emergency algorithms to calculate the emergency plan dynamically [
<xref rid="b5-sensors-14-04513" ref-type="bibr">5</xref>
,
<xref rid="b6-sensors-14-04513" ref-type="bibr">6</xref>
] and improving sensors or their management to detect the symptoms of emergencies [
<xref rid="b7-sensors-14-04513" ref-type="bibr">7</xref>
,
<xref rid="b8-sensors-14-04513" ref-type="bibr">8</xref>
].</p>
<p>AmI systems are traditionally assessed by using living labs, which refers to an approach that represents a user-centric methodology for sensing, prototyping, validating and refining complex solutions in evolving real-life contexts [
<xref rid="b9-sensors-14-04513" ref-type="bibr">9</xref>
]. Living labs use an infrastructure that enables developers to emulate final physical spaces, such as houses or buildings, with multiple ubiquitous devices connected and distributed across a network. Although the use of living labs is always desirable, they have the same problems as drills. In AmI research, there has been a trend of using simulations in addition to the hegemonic assessment method, living labs. However, common shortcomings include the following: (1) these simulations are usually “closed” and for a specific service,
<italic>i.e.</italic>
, they cannot be parameterized to adapt them to other cases beyond the studied case; (2) the experiments are not reproducible,
<italic>i.e.</italic>
, the information given about how the authors have built the simulations is insufficient to repeat them; and, most importantly; (3) the source code is rarely given.</p>
<p>Over the last few years, computer-based simulations (CBS) have become a useful part of modeling many natural and human systems [
<xref rid="b10-sensors-14-04513" ref-type="bibr">10</xref>
]. CBS have enabled emergency committees to improve the performance and efficiency of many emergency plans while decreasing the limitations of regular drills. By using CBS, it is possible to: (1) reduce the cost of experimentation; (2) control the variables and parameters of the experiment; and (3) control the time of the experiment. Several research works based on CBS have been proposed and developed to validate different types of emergency plans. Among those, the use of agent-based social simulation (ABSS) is one of the most representative research streams.</p>
<p>ABSS is a computer-assisted simulation technique used to model artificial societies populated with multiple autonomous entities, called agents, which act autonomously by employing some knowledge or representation of their beliefs, desires and intentions. ABSS is an innovative approach to open questions in a wide range of scientific domains, including economics, biology, chemistry, ecology and sociology. One of the main advantage of using ABSS to evaluate emergency plans is that it allow components of a final agent-based architecture to be connected in the simulation to be tested [
<xref rid="b11-sensors-14-04513" ref-type="bibr">11</xref>
].</p>
<p>In contrast with the large number of research projects and ABSS platforms in which emergency evacuation is a recurrent topic [
<xref rid="b12-sensors-14-04513" ref-type="bibr">12</xref>
] and the also vast number of emergency planning approaches that are studied by simulations [
<xref rid="b13-sensors-14-04513" ref-type="bibr">13</xref>
]: (1) the hypothesis this paper defends is that little interest has been shown in formally describing the key elements that these simulators must include in this domain. Most importantly, contributions that focus on some of these elements are usually presented without making the implementations available for researchers. This hinders researchers from interconnecting these contributions with other tools to achieve a holistic framework for emergency plan assessment. To support this hypothesis, over 150 simulators have been considered in different relevant scopes: general ABSS frameworks, game engines, simulators for the emergency domain and AmI simulators.</p>
<p>In addition to discussing the hypothesis explained above: (2) this paper also defines the authors' idea of the main modules required in such a holistic framework. Semantic web technologies, which concentrate on declarative forms of knowledge representation, are considered here as the cornerstone of the holistic framework. The reason is that the use of these technologies would allow (or at least facilitate) different implementations to understand each other. Even when this is not possible, researchers would always have a knowledge repository to use in their new implementations.</p>
<p>Furthermore, the paper: (3) proposes a methodology to develop and use a holistic framework based on the development of AmI systems; (4) discusses the main challenges; and (5) presents an open-source tool to achieve a simplistic version of the proposed holistic framework. The authors expect this paper to be a research proposal about the most efficient way of completing these modules by reusing existing works if possible and how to facilitate its future use and extension.</p>
<p>The paper outline is as follows. After presenting the background that supports the hypothesis stated in this paper in Section 2, the main components identified for the holistic framework are given in Section 3. A methodology for the development of this holistic framework and the main challenges are described in Section 4. A preliminary implementation is described in Section 5. Some illustrative experimental results are discussed in Sections 6 and 7 concludes.</p>
</sec>
<sec>
<label>2.</label>
<title>Background</title>
<p>This section describes a number of possible frameworks to evaluate emergency plans using simulations in four main categories: ABSS frameworks, game engines, emergency domain simulators and AmI simulators.</p>
<sec>
<label>2.1.</label>
<title>Agent-Based Social Simulation Frameworks</title>
<p>An interesting wiki [
<xref rid="b14-sensors-14-04513" ref-type="bibr">14</xref>
] on platform comparisons presents the large number of frameworks available for general ABSS. This wiki currently lists 81 frameworks with information that is important for the purpose of this paper, such as the license. To the best of the authors' knowledge, none of these simulators gives abstract mechanisms for simulating emergency plans. In general, the most popular ABSS frameworks, such as NetLogo [
<xref rid="b15-sensors-14-04513" ref-type="bibr">15</xref>
], MASON[
<xref rid="b16-sensors-14-04513" ref-type="bibr">16</xref>
] and Repast [
<xref rid="b17-sensors-14-04513" ref-type="bibr">17</xref>
], do not offer tools to build a realistic environment model with the capacity to perform emergency-plan evaluations. Nevertheless, these platforms can supply interesting support for developing more abstract resources. In this vein, Dawson
<italic>et al.</italic>
[
<xref rid="b18-sensors-14-04513" ref-type="bibr">18</xref>
] use NetLogo to study emergency plans for flood incidents.</p>
</sec>
<sec>
<label>2.2.</label>
<title>Game Engines</title>
<p>The use of general game engines is also very common when there is a need for modeling a real environment with agents moving through it. This is an essential requirement for emergency simulators, which is usually solved in these platforms, every time better and more automatically, by using navigation meshes and pathfinding methods. Barbosa
<italic>et al.</italic>
[
<xref rid="b19-sensors-14-04513" ref-type="bibr">19</xref>
] propose the use of virtual simulation to evaluate emergency operating procedures in the nuclear industry through reusing a game engine platform. In this work, the real environment may be virtually modeled, and people are able to virtually navigate and interact with each other. Szymanezyk
<italic>et al.</italic>
[
<xref rid="b20-sensors-14-04513" ref-type="bibr">20</xref>
] adapt popular video-game technology for an agent-based crowd simulation framework in an airport terminal. There is a wiki [
<xref rid="b21-sensors-14-04513" ref-type="bibr">21</xref>
] that details the main properties of a large number of these engines. Strangely enough, this wiki also lists exactly 81 game engines, the same number of ABSS frameworks mentioned above. Some of the most popular engines are Unity [
<xref rid="b22-sensors-14-04513" ref-type="bibr">22</xref>
] (proprietary and written in C++), GamePlay3D [
<xref rid="b23-sensors-14-04513" ref-type="bibr">23</xref>
] (under the Apache license and written in C++) and JMonkey [
<xref rid="b24-sensors-14-04513" ref-type="bibr">24</xref>
] (under the BSDlicense and written in Java). Although these engines are incredibly useful for our goal, they lack important elements, such as a model of simulated sensors or abstract behaviors for the users modeled. Some works overcome these limitation by considering real users as players to study their response in a simulated emergency [
<xref rid="b25-sensors-14-04513" ref-type="bibr">25</xref>
]. Moreover, the parameterization of simulations built by these engines is still complex; thus, they are only employed for closed simulations,
<italic>i.e.</italic>
, those in which changing the scenario or the elements requires rebuilding the engine.</p>
</sec>
<sec>
<label>2.3.</label>
<title>Emergency Domain Simulators</title>
<p>A number of domain-specific simulators address the emergency domain in indoor environments [
<xref rid="b26-sensors-14-04513" ref-type="bibr">26</xref>
]. Some examples are EVACNET4 [
<xref rid="b27-sensors-14-04513" ref-type="bibr">27</xref>
], WAYOUT [
<xref rid="b28-sensors-14-04513" ref-type="bibr">28</xref>
], STEPS [
<xref rid="b29-sensors-14-04513" ref-type="bibr">29</xref>
] and SimWalk [
<xref rid="b30-sensors-14-04513" ref-type="bibr">30</xref>
]. These works give excellent tools to model emergencies, but: (1) they do not contemplate the inclusion of AmI features to assess an intelligent plan, such as a sensor model and actuators to guide users intelligently; (2) they tend to ignore the multi-agent paradigm, which, as stated in the Introduction, is an intuitive manner of studying complex adaptive systems; and, more importantly; (3) the code is often not available, and thus, researchers cannot extend, reuse or simply learn from it.</p>
</sec>
<sec>
<label>2.4.</label>
<title>Ambient Intelligence Simulators</title>
<p>Campillo-Sanchez
<italic>et al.</italic>
[
<xref rid="b31-sensors-14-04513" ref-type="bibr">31</xref>
] review six different simulators devoted to evaluating general AmI systems, including UbiWise [
<xref rid="b33-sensors-14-04513" ref-type="bibr">33</xref>
], TATUS [
<xref rid="b34-sensors-14-04513" ref-type="bibr">34</xref>
] and UbiReal [
<xref rid="b35-sensors-14-04513" ref-type="bibr">35</xref>
]. Although they enable developers to design realistic environments, the user role has to be played by a real user interacting with the simulator. Therefore, it is not possible to conduct batches of experiments to obtain statistically significant results. Moreover, the authors do not give the source code, thereby hindering researchers from reusing modules of these works. This is also the case of the simulators proposed by Tang
<italic>et al.</italic>
[
<xref rid="b36-sensors-14-04513" ref-type="bibr">36</xref>
] and Diewald
<italic>et al.</italic>
[
<xref rid="b37-sensors-14-04513" ref-type="bibr">37</xref>
], which, although they are significant contributions for the AmI field, do not provide researchers with open implementations. Hence, to the best of the authors' knowledge, there is no open simulator that focuses on AmI general evaluation besides the one extended, released and presented in this paper.</p>
</sec>
<sec>
<label>2.5.</label>
<title>Partial Conclusion</title>
<p>These works demonstrate that there are numerous attempts to assess emergency plans by simulations, and excellent contributions have been proposed. However, there is no “most complete” tool, and most of the time, it is not possible to reuse and combine components of different frameworks. Further evidence of this can be found by consulting the EU Research Projects on the CORDIS (Community Research and Development Information Service) website [
<xref rid="b38-sensors-14-04513" ref-type="bibr">38</xref>
], where a search with the keywords “emergency” and “simulation” returns over 8,000 results of funded projects. As a result, without a true interest in sharing and interconnecting works, researchers in this domain are constantly damned to reinvent the wheel.</p>
</sec>
</sec>
<sec>
<label>3.</label>
<title>Main Components of the Holistic Framework</title>
<p>This section describes the proposed holistic framework for the evaluation of emergency plans. In an attempt to narrow down this challenging problem, the framework only addresses indoor environments.
<xref rid="f1-sensors-14-04513" ref-type="fig">Figure 1</xref>
depicts our vision of the holistic framework. The formally represented knowledge, on the left side of the figure, is the cornerstone of the framework. This knowledge is the basis for the other two main components: the ABSS models and a service-oriented architecture. These three components are explained and justified below.</p>
<sec>
<label>3.1.</label>
<title>Formally Represented Knowledge</title>
<p>As stated above, the basis of the framework is formally represented knowledge and, more specifically, the use of ontologies. There are several reasons to develop ontologies [
<xref rid="b39-sensors-14-04513" ref-type="bibr">39</xref>
]. They allow a common understanding of the structure of information to be shared among people or software agents. For this scope, this means that if tools are based on the use of ontologies, these are more likely to be understood by developers and to be connected successfully with other tools (whether they are developed by other researchers or not). Furthermore, ontologies enable the reuse of domain knowledge and, as stated in Section 2, given the number of projects and software packages that address this problem, reusing components is a must. Moreover, ontologies make domain assumptions explicit and enable experts in emergency plans (who may not have expertise in computer science) to verify these assumptions and change them if needed. Ontologies also separate the domain knowledge, which is very similar in the vast literature of emergency-plan evaluation, from the operational knowledge, which is considerably different in these works. Last, but not least, there are a number of powerful mechanisms developed over ontologies that can be used for the remaining components of the framework (such as the SPARQL [
<xref rid="b40-sensors-14-04513" ref-type="bibr">40</xref>
] for queries or SPINfor rules and constraints [
<xref rid="b41-sensors-14-04513" ref-type="bibr">41</xref>
]).</p>
<p>The following necessary basic ontologies have been identified:
<list list-type="bullet">
<list-item>
<p>
<italic>Users</italic>
. The users are the humans who need to be saved in case of an emergency by the final AmI system. There are a number of works that address ontologies that model AmI users [
<xref rid="b42-sensors-14-04513" ref-type="bibr">42</xref>
], which cover some of the concepts (or classes in OWL [
<xref rid="b43-sensors-14-04513" ref-type="bibr">43</xref>
] terminology) necessary for the emergency evacuation domain. Some examples are the personal context (such as location, state and time) and personal information (such as contact information, disabilities and physical information). Obviously, navigation in indoor environments is highly challenging for the severely visually impaired [
<xref rid="b44-sensors-14-04513" ref-type="bibr">44</xref>
]. These ontologies need to be adapted to include more knowledge relevant for the domain, such as knowledge about the routes or the adoption of special roles in emergencies, such as “leader”. Of course, this knowledge may not be available in the final system if sensors cannot perceive it or if it cannot be provided
<italic>a priori</italic>
. However, even in these cases, a user's ontology is very valuable to study the main human aspects that can affect the emergency plan and, therefore, to test the robustness of an emergency plan by considering a great variety of user populations.</p>
</list-item>
<list-item>
<p>
<italic>Indoor space</italic>
. Users, as other elements of the AmI system, are immersed in an environment (an indoor space for the considered domain). An AmI system is basically a system that uses processing units, sensors and actuators distributed in the environment to support humans in their daily lives [
<xref rid="b45-sensors-14-04513" ref-type="bibr">45</xref>
]. In the emergency management case, the environment limits, among others, people's speed and the routes that can be used for evacuations. Again, it is easy to find ontologies for indoor spaces [
<xref rid="b46-sensors-14-04513" ref-type="bibr">46</xref>
] with relevant concepts, such as doors, stairs, elevators or fire doors, but it is more difficult to find concepts that are required for a variety of possible emergencies (drains for floods, for example) or necessary to conduct a realistic simulation (the combustibility of the furniture, for instance).</p>
</list-item>
<list-item>
<p>
<italic>Sensors and actuators</italic>
. Sensors and actuators are the artifacts that are used to, respectively, capture the events from and act on the environment in which the humans are living, working, driving or learning, for example [
<xref rid="b47-sensors-14-04513" ref-type="bibr">47</xref>
]. Compton
<italic>et al.</italic>
[
<xref rid="b48-sensors-14-04513" ref-type="bibr">48</xref>
] revise different semantic specifications of sensors and the concepts they usually include, such as accuracy, frequency, field of vision, units of measurement, location and operating conditions. Regarding the actuators, the possible notification devices in case of emergency have been extensively discussed [
<xref rid="b49-sensors-14-04513" ref-type="bibr">49</xref>
] (they include phones, the web, e-mails and SMSs).</p>
</list-item>
<list-item>
<p>
<italic>Emergencies</italic>
. Another important category for which to formalize knowledge is the emergency that the service needs to address. The consideration of fires is certainly the most studied case in the emergency management of indoor environments, but there are other, less popular emergencies, such as floods or bombs. Furthermore, although it is easy to find works that simulate these emergencies, they usually lack a formalization of the knowledge that could help developers validate their correctness and extend them.</p>
</list-item>
<list-item>
<p>
<italic>Emergency service</italic>
. This ontology has to cover the main concepts of the emergency service to be evaluated and that motivates the holistic framework proposed in
<xref rid="f1-sensors-14-04513" ref-type="fig">Figure 1</xref>
. Several works have tried to formalize this knowledge [
<xref rid="b50-sensors-14-04513" ref-type="bibr">50</xref>
], which includes, among other concepts, scene control, medical aid, evacuation, monitoring and alerts and victim assistance. However, the interconnection among these concepts and relevant ontologies, such as the ones defined above, is not discussed.</p>
</list-item>
<list-item>
<p>
<italic>Experiments</italic>
. Finally, an ontology for the experiments is required to include, at least, the simulation configuration and the main metrics contemplated for the evaluation of the service. Therefore, this ontology necessarily includes concepts of the remaining ontologies and formalizes the evaluation to be conducted by simulations, which, as shown in Section 2, are conducted for thousands of projects.</p>
</list-item>
</list>
</p>
<p>Note that all these ontologies are interconnected. Therefore, if a graph was defined with a vertex for each ontology and edges indicating that two ontologies are interconnected, the resulting graph would be complete,
<italic>i.e.</italic>
, every pair of distinct vertices would be connected by a unique edge. Some examples include the following: the location of a user is a concept of the indoor space; a fire of the emergency ontology can excite a smoke sensor; and the emergency service may indicate an escape route by a number of actuators. Therefore, although there are ambitious works in the definition of ontologies for emergency management [
<xref rid="b49-sensors-14-04513" ref-type="bibr">49</xref>
], to the best of the authors' knowledge, the identification of these key ontologies is a novel contribution of the presented work. Moreover, these works hint at the difficulty of defining not only the whole holistic framework of this paper, but also this specific module.</p>
<p>Note also that, according to the semantic web philosophy, considering or including elements of external ontologies (concepts, roles or individuals) in the framework presented involves using URLsto link to these elements instead of replicating data. In other words, the linked data principles stated by Tim Berners-Lee [
<xref rid="b51-sensors-14-04513" ref-type="bibr">51</xref>
] must be followed: (1) a URL should point to the data; (2) anyone accessing the URL should get data back; and (3) the relationships in the data should point to additional URLs with data.</p>
</sec>
<sec>
<label>3.2.</label>
<title>Agent-Based Social Simulation Models</title>
<p>The ABSS model is a representation of the real system to be studied by simulations [
<xref rid="b52-sensors-14-04513" ref-type="bibr">52</xref>
]. In this case, the real system is the AmI system for emergency management, and the model (which, in the framework proposed in
<xref rid="f1-sensors-14-04513" ref-type="fig">Figure 1</xref>
, is separated into several models) is an abstraction of this reality that has to be easily studied (or, at least, in an easier manner than treating the reality directly). As stated in the introduction, emergency management is a field in which simulations are a typical solution, because they enable researchers to study emergencies under a number of situations that cannot be reproduced in drills.</p>
<p>The framework demonstrates that these models are based on: (1) the ontologies of the formally represented knowledge; and (2) a modeling technique. As explained by Benjamin
<italic>et al.</italic>
[
<xref rid="b53-sensors-14-04513" ref-type="bibr">53</xref>
], although ontological analysis has been demonstrated to be an effective first step in the construction of robust knowledge-based systems, the modeling and simulation community, in general, has not enjoyed the benefits of ontology-management methods and tools. Given the number of works and projects that address emergency simulations, ontologies are essential for facilitating simulation models' interoperability, composition and information exchange at the semantic level [
<xref rid="b53-sensors-14-04513" ref-type="bibr">53</xref>
].</p>
<p>There is a clear mapping from the ontologies to the identified models. Two exceptions are the following: (1) the experiment ontology, which is not employed by the ABSS models, because it addresses the implementations of these models (see Section 3.3); and (2) the context model, which gathers, merges, interprets, reasons and stores the contextual information needed by the emergency service [
<xref rid="b54-sensors-14-04513" ref-type="bibr">54</xref>
]. Although some works address isolated context ontologies [
<xref rid="b55-sensors-14-04513" ref-type="bibr">55</xref>
], in this scope, in which a number of ontologies address the main aspects of the problem, most of the concepts of the context are spread through the aforementioned ontologies.</p>
<p>It is important to note that although there exists a clear mapping from ontologies to models, ontologies have expressive limitations that make models necessary. In the semantic web literature, these limitations are usually overcome by rule-based knowledge. Accordingly, because the holistic framework presented is based on the use of ontologies, semantic rule-based modeling is recommended as the basic modeling technique for the agents included in the different ABSS models. For example, the context model may include the following rules (written in pseudo-code inspired by SWRL [
<xref rid="b56-sensors-14-04513" ref-type="bibr">56</xref>
]):
<disp-formula id="FD1">
<label>(1)</label>
<mml:math id="mm1">
<mml:mrow>
<mml:mtable columnalign="left">
<mml:mtr columnalign="left">
<mml:mtd columnalign="left">
<mml:mrow>
<mml:mtable columnalign="left">
<mml:mtr columnalign="left">
<mml:mtd columnalign="left">
<mml:mrow>
<mml:msub>
<mml:mi>R</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
<mml:mo>:</mml:mo>
</mml:mrow>
</mml:mtd>
<mml:mtd columnalign="left">
<mml:mrow>
<mml:mtext>Sensor</mml:mtext>
<mml:mo stretchy="false">(</mml:mo>
<mml:mo>?</mml:mo>
<mml:mi>s</mml:mi>
<mml:mo stretchy="false">)</mml:mo>
<mml:mo></mml:mo>
<mml:mtext>hasEvent</mml:mtext>
<mml:mo stretchy="false">(</mml:mo>
<mml:mo>?</mml:mo>
<mml:mi>s</mml:mi>
<mml:mo>,</mml:mo>
<mml:mo>?</mml:mo>
<mml:mi>e</mml:mi>
<mml:mo stretchy="false">)</mml:mo>
<mml:mo></mml:mo>
<mml:mtext>SmokeEvent</mml:mtext>
<mml:mo stretchy="false">(</mml:mo>
<mml:mo>?</mml:mo>
<mml:mi>e</mml:mi>
<mml:mo stretchy="false">)</mml:mo>
<mml:mo></mml:mo>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr columnalign="left">
<mml:mtd></mml:mtd>
<mml:mtd columnalign="left">
<mml:mrow>
<mml:mtext>value</mml:mtext>
<mml:mo stretchy="false">(</mml:mo>
<mml:mo>?</mml:mo>
<mml:mi>e</mml:mi>
<mml:mo>,</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo stretchy="false">)</mml:mo>
<mml:mo></mml:mo>
<mml:mtext>hasLocation</mml:mtext>
<mml:mo stretchy="false">(</mml:mo>
<mml:mo>?</mml:mo>
<mml:mi>s</mml:mi>
<mml:mo>,</mml:mo>
<mml:mo>?</mml:mo>
<mml:mi>l</mml:mi>
<mml:mo stretchy="false">)</mml:mo>
<mml:mo></mml:mo>
<mml:mtext>DangerousLocation</mml:mtext>
<mml:mo stretchy="false">(</mml:mo>
<mml:mo>?</mml:mo>
<mml:mi>l</mml:mi>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr columnalign="left">
<mml:mtd columnalign="left">
<mml:mrow>
<mml:mtable columnalign="left">
<mml:mtr columnalign="left">
<mml:mtd columnalign="left">
<mml:mrow>
<mml:msub>
<mml:mi>R</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
<mml:mo>:</mml:mo>
</mml:mrow>
</mml:mtd>
<mml:mtd columnalign="left">
<mml:mrow>
<mml:mtext>Sensor</mml:mtext>
<mml:mo stretchy="false">(</mml:mo>
<mml:mo>?</mml:mo>
<mml:mi>s</mml:mi>
<mml:mo stretchy="false">)</mml:mo>
<mml:mo></mml:mo>
<mml:mtext>hasEvent</mml:mtext>
<mml:mo stretchy="false">(</mml:mo>
<mml:mo>?</mml:mo>
<mml:mi>s</mml:mi>
<mml:mo>,</mml:mo>
<mml:mo>?</mml:mo>
<mml:mi>e</mml:mi>
<mml:mo stretchy="false">)</mml:mo>
<mml:mo></mml:mo>
<mml:mtext>MotionEvent</mml:mtext>
<mml:mo stretchy="false">(</mml:mo>
<mml:mo>?</mml:mo>
<mml:mi>e</mml:mi>
<mml:mo stretchy="false">)</mml:mo>
<mml:mo></mml:mo>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr columnalign="left">
<mml:mtd></mml:mtd>
<mml:mtd columnalign="left">
<mml:mrow>
<mml:mtext>value</mml:mtext>
<mml:mo stretchy="false">(</mml:mo>
<mml:mo>?</mml:mo>
<mml:mi>e</mml:mi>
<mml:mo>,</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo stretchy="false">)</mml:mo>
<mml:mo></mml:mo>
<mml:mtext>hasLocation</mml:mtext>
<mml:mo stretchy="false">(</mml:mo>
<mml:mo>?</mml:mo>
<mml:mi>s</mml:mi>
<mml:mo>,</mml:mo>
<mml:mo>?</mml:mo>
<mml:mi>l</mml:mi>
<mml:mo stretchy="false">)</mml:mo>
<mml:mo></mml:mo>
<mml:mtext>LocationWithUser</mml:mtext>
<mml:mo stretchy="false">(</mml:mo>
<mml:mo>?</mml:mo>
<mml:mi>l</mml:mi>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr columnalign="left">
<mml:mtd columnalign="left">
<mml:mrow>
<mml:mtable columnalign="left">
<mml:mtr columnalign="left">
<mml:mtd columnalign="left">
<mml:mrow>
<mml:msub>
<mml:mi>R</mml:mi>
<mml:mn>3</mml:mn>
</mml:msub>
<mml:mo>:</mml:mo>
</mml:mrow>
</mml:mtd>
<mml:mtd columnalign="left">
<mml:mrow>
<mml:mtext>User</mml:mtext>
<mml:mo stretchy="false">(</mml:mo>
<mml:mo>?</mml:mo>
<mml:mi>u</mml:mi>
<mml:mo stretchy="false">)</mml:mo>
<mml:mo></mml:mo>
<mml:mtext>hasSmartphone</mml:mtext>
<mml:mo stretchy="false">(</mml:mo>
<mml:mo>?</mml:mo>
<mml:mi>u</mml:mi>
<mml:mo>,</mml:mo>
<mml:mo>?</mml:mo>
<mml:mi>s</mml:mi>
<mml:mo stretchy="false">)</mml:mo>
<mml:mo></mml:mo>
<mml:mtext>hasLocation</mml:mtext>
<mml:mo stretchy="false">(</mml:mo>
<mml:mo>?</mml:mo>
<mml:mi>s</mml:mi>
<mml:mo>,</mml:mo>
<mml:mo>?</mml:mo>
<mml:mi>l</mml:mi>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr columnalign="left">
<mml:mtd></mml:mtd>
<mml:mtd columnalign="left">
<mml:mrow>
<mml:mo></mml:mo>
<mml:mtext>LocationWithUser</mml:mtext>
<mml:mo>(</mml:mo>
<mml:mo>?</mml:mo>
<mml:mi>l</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr columnalign="left">
<mml:mtd columnalign="left">
<mml:mrow>
<mml:mtable columnalign="left">
<mml:mtr columnalign="left">
<mml:mtd columnalign="left">
<mml:mrow>
<mml:msub>
<mml:mi>R</mml:mi>
<mml:mn>4</mml:mn>
</mml:msub>
<mml:mo>:</mml:mo>
</mml:mrow>
</mml:mtd>
<mml:mtd columnalign="left">
<mml:mrow>
<mml:mtext>LocationWithUser</mml:mtext>
<mml:mo stretchy="false">(</mml:mo>
<mml:mo>?</mml:mo>
<mml:msub>
<mml:mi>l</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
<mml:mo stretchy="false">)</mml:mo>
<mml:mo></mml:mo>
<mml:mtext>closestVisibleNotificationDevice</mml:mtext>
<mml:mo stretchy="false">(</mml:mo>
<mml:mo>?</mml:mo>
<mml:mi>n</mml:mi>
<mml:mo>,</mml:mo>
<mml:mo>?</mml:mo>
<mml:msub>
<mml:mi>l</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
<mml:mo stretchy="false">)</mml:mo>
<mml:mo></mml:mo>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr columnalign="left">
<mml:mtd></mml:mtd>
<mml:mtd columnalign="left">
<mml:mrow>
<mml:mtext>hasLocation</mml:mtext>
<mml:mo stretchy="false">(</mml:mo>
<mml:mo>?</mml:mo>
<mml:mi>n</mml:mi>
<mml:mo>,</mml:mo>
<mml:mo>?</mml:mo>
<mml:msub>
<mml:mi>l</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
<mml:mo stretchy="false">)</mml:mo>
<mml:mo></mml:mo>
<mml:mtext>LocationWithVisibleNotificationDevice</mml:mtext>
<mml:mo stretchy="false">(</mml:mo>
<mml:mo>?</mml:mo>
<mml:msub>
<mml:mi>l</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:math>
</disp-formula>
</p>
<p>
<italic>R</italic>
<sub>1</sub>
checks for smoke events with a value of one (smoke detected) in the sensor, ?
<italic>s</italic>
, to set the location of a danger zone in ?
<italic>l</italic>
. Analogously,
<italic>R</italic>
<sub>2</sub>
checks for the activation of motion events to detect possible user locations.
<italic>R</italic>
<sub>3</sub>
considers users with smartphones, including some type of indoor location system that allows the context model to obtain the device (and user's) location. Finally,
<italic>R</italic>
<sub>4</sub>
obtains positions for visible notification devices (such as monitors or the aforementioned smartphones). Note that the rules contain parts that obtain relevant information for the emergency service derived from data collected through sensors, such as dangerous positions, to infer the emergency state, users' locations to consider possible crowds in the escape route and notification device positions to display escape routes calculated from those points, for example.</p>
<p>As ontologies, these rules have expressive limitations. For example, because of the open-world assumption, rules that attempt to enumerate individuals or properties in an ontology are not always possible [
<xref rid="b57-sensors-14-04513" ref-type="bibr">57</xref>
]. Rules and inferences based on the number of individuals or property values in an ontology are not expressible in SWRL (unless OWL statements explicitly state those numbers). Therefore, with the aforementioned context model and using the same semantic rules for the emergency service, this service could not list the individuals of the
<italic>DangerousLocation</italic>
class to take them into account. On the other hand, this would be possible by using built-ins for lists, which are usable in OWL Full [
<xref rid="b43-sensors-14-04513" ref-type="bibr">43</xref>
]. Another option would be to introduce the positions one at a time, as shown in the following rule that the emergency system model may consider:
<disp-formula id="FD2">
<label>(2)</label>
<mml:math id="mm2">
<mml:mrow>
<mml:mtable columnalign="left">
<mml:mtr columnalign="left">
<mml:mtd columnalign="left">
<mml:mrow>
<mml:msub>
<mml:mi>R</mml:mi>
<mml:mn>5</mml:mn>
</mml:msub>
<mml:mo>:</mml:mo>
</mml:mrow>
</mml:mtd>
<mml:mtd columnalign="left">
<mml:mrow>
<mml:mtext>DangerousLocation</mml:mtext>
<mml:mo stretchy="false">(</mml:mo>
<mml:mo>?</mml:mo>
<mml:mi>l</mml:mi>
<mml:mo stretchy="false">)</mml:mo>
<mml:mo></mml:mo>
<mml:mo stretchy="false">(</mml:mo>
<mml:mtext>notConsideredByService</mml:mtext>
<mml:mo stretchy="false">)</mml:mo>
<mml:mo stretchy="false">(</mml:mo>
<mml:mo>?</mml:mo>
<mml:mi>l</mml:mi>
<mml:mo stretchy="false">)</mml:mo>
<mml:mo></mml:mo>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr columnalign="left">
<mml:mtd></mml:mtd>
<mml:mtd columnalign="left">
<mml:mrow>
<mml:mtext>EscapeRoute</mml:mtext>
<mml:mo stretchy="false">(</mml:mo>
<mml:mo>?</mml:mo>
<mml:mi>r</mml:mi>
<mml:mo stretchy="false">)</mml:mo>
<mml:mo></mml:mo>
<mml:mtext>includeForEscapeRoute</mml:mtext>
<mml:mo stretchy="false">(</mml:mo>
<mml:mo>?</mml:mo>
<mml:mi>r</mml:mi>
<mml:mo>,</mml:mo>
<mml:mo>?</mml:mo>
<mml:mi>l</mml:mi>
<mml:mo stretchy="false">)</mml:mo>
<mml:mo></mml:mo>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr columnalign="left">
<mml:mtd></mml:mtd>
<mml:mtd columnalign="left">
<mml:mrow>
<mml:mtext>ConsideredByService</mml:mtext>
<mml:mo stretchy="false">(</mml:mo>
<mml:mo>?</mml:mo>
<mml:mi>l</mml:mi>
<mml:mo stretchy="false">)</mml:mo>
</mml:mrow>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:math>
</disp-formula>
</p>
<p>The example shown above illustrates that the use of semantic rules is not always appropriate or easy. Therefore, semantic rule-based modeling is desirable in the presented framework, but not necessary. Moreover, the main idea of proposing this framework is trying to integrate previous works with it, and obviously, those works may be based on other modeling techniques. The use of behavior trees [
<xref rid="b58-sensors-14-04513" ref-type="bibr">58</xref>
], for instance, is very widespread for modeling agents' behaviors in video games, and they could be employed for the user models. Garcia Valverde
<italic>et al.</italic>
also propose the use of hierarchical automata to model human behaviors in AmI systems [
<xref rid="b59-sensors-14-04513" ref-type="bibr">59</xref>
]. Another example is the use of cognitive BDI (belief desire intention) agents in ABSS as introduced by Caballero
<italic>et al.</italic>
[
<xref rid="b60-sensors-14-04513" ref-type="bibr">60</xref>
].</p>
<p>This raises an important question: are the ontological components of the framework worthwhile when no semantic web technology is going to be employed at the modeling and implementation stages? Benjamin
<italic>et al.</italic>
[
<xref rid="b53-sensors-14-04513" ref-type="bibr">53</xref>
] note that the design and creation of ontologies, as a previous step of ABSS modeling, allow, at least, a terminology harmonization to enable shared and clear understanding by disambiguating terminology. Furthermore, ontologies facilitate detailed analysis of objects and mapping the simulation model constraints to the specifications of real-world constraints under the specific domain. Therefore, the ideas presented in this framework are valid for a range of scenarios. More specifically, its application to emergency management in outdoor environments is straightforward by adding new elements to interconnect different indoor spaces.</p>
</sec>
<sec>
<label>3.3.</label>
<title>Service-Oriented Architecture</title>
<p>After defining the model, in most ABSS research methodologies, there is a building stage that consists of translating the model into something that can be used by a computer (
<italic>i.e.</italic>
, programming the model) [
<xref rid="b52-sensors-14-04513" ref-type="bibr">52</xref>
]. The proposed framework presented in
<xref rid="f1-sensors-14-04513" ref-type="fig">Figure 1</xref>
demonstrates that this building stage is conducted by combining the ABSS models, the formally represented knowledge and a collection of languages and external services.</p>
<p>As shown in
<xref rid="f1-sensors-14-04513" ref-type="fig">Figure 1</xref>
, the resulting implementation is a service-oriented architecture (SOA),
<italic>i.e.</italic>
, a software architecture based on discrete pieces of software that give application functionality as services. Among others, design principles underlying SOA emphasize reuse, abstraction, loose coupling and composability [
<xref rid="b61-sensors-14-04513" ref-type="bibr">61</xref>
]. These principles are a must for the evaluation of emergency plans, because of the number of research projects that address this issue. As in the combination of ABSS and semantic web technologies, there are works that detail the number of benefits derived from the use of these semantic technologies in SOAs [
<xref rid="b62-sensors-14-04513" ref-type="bibr">62</xref>
].</p>
<p>Another important reason to propose an SOA is that it is one of the most widely employed paradigms for the development of AmI systems [
<xref rid="b63-sensors-14-04513" ref-type="bibr">63</xref>
]. Note that unlike in most ABSS research, some of the models of the proposed framework must evolve until becoming the final AmI system. More specifically, the simulation implementation (which is composed of services for simulating sensors, actuators, users, emergencies and an environment) is employed to evaluate an emergency service and the context model that connects them. After the assessment conducted by simulations, the simulation services have to disappear, and the same context middleware has to connect the emergency system with living labs for further evaluation drills.</p>
<p>In addition to these three evaluation levels (simulations, living labs and drills), the framework makes possible the combination of real elements with simulated entities [
<xref rid="b12-sensors-14-04513" ref-type="bibr">12</xref>
]. This approach involves the following: participatory simulations, in which scenario-guided agents and human-controlled avatars coexist in a shared virtual space and jointly perform simulations, and augmented experiments, in which an experiment is performed in real space by human subjects enhanced by the simulation [
<xref rid="b64-sensors-14-04513" ref-type="bibr">64</xref>
]. Moreover, depending on the service implementation, humans can play not only the role of AmI users, but also the role of sensors. In this vein, the use of human-centric wireless sensor networks (HWSNs) is a relevant technology that has been employed to implement services focusing on reducing energy consumption [
<xref rid="b65-sensors-14-04513" ref-type="bibr">65</xref>
], improving personal security [
<xref rid="b66-sensors-14-04513" ref-type="bibr">66</xref>
] and urban search and rescue activities [
<xref rid="b67-sensors-14-04513" ref-type="bibr">67</xref>
]. HWSNs are opportunistic networks that consist of regular sensors, information holders and human-based sensors [
<xref rid="b67-sensors-14-04513" ref-type="bibr">67</xref>
] (
<italic>i.e.</italic>
, people that input information to the network and that can provide qualitative information based on quantitative and qualitative information provided by other nodes). For participatory simulations, the implementation presented in Section 5 allows avatars in simulations to be controlled by developers using a keyboard and mouse. Moreover, the avatar's viewpoint can be adopted as in a first-person game. For augmented experiments, the aforementioned implementation has been used to make mobile devices, which can be used by humans playing the role of human-based sensors or AmI users, perceive simulated entities [
<xref rid="b31-sensors-14-04513" ref-type="bibr">31</xref>
] (video available on-line: [
<xref rid="b32-sensors-14-04513" ref-type="bibr">32</xref>
]).</p>
<p>A general programming language or one of the more abstract languages to implement simulation services can be used for the construction of the architecture (Section 2 discusses plenty of alternatives). The second option is considerably more convenient, because these works already give basic elements to address this problem. For example, the generation of a realistic indoor environment and coding the possibility of making an agent go from A to B in this environment could take several person-years with a general programming language. Aside from programming languages, a number of external tools are typically required and used in the simulation of emergency plans. If the models are based on semantic rules as proposed in Section 3.2, the use of semantic reasoners, such as SPIN [
<xref rid="b41-sensors-14-04513" ref-type="bibr">41</xref>
] and Jena [
<xref rid="b68-sensors-14-04513" ref-type="bibr">68</xref>
], provides developers with a natural transition from the model to the implementation. Again, for the sake of reuse and extension, open and free software is recommended.</p>
<p>Once more, the reader can appreciate the complexity of the research proposal this paper presents if an isolated service is considered. With this illustrative purpose,
<xref rid="f2-sensors-14-04513" ref-type="fig">Figure 2</xref>
displays a possible emergency service. The sensors give the data perceived from the world to the context layer, and the latter has to provide the emergency service with more abstract information, such as dangerous positions and user locations (see the semantic rules proposed in Section 3.2). This service, which is usually modularized in agents in charge of zones or sub-services, needs: (1) to reason about the aforementioned information to understand that there is an emergency, its nature and its state; (2) to feed an emergency plan generator (typically an evacuation algorithm); (3) to adapt this plan with expert rules if necessary; (4) to discover and learn patterns in past experiences [
<xref rid="b69-sensors-14-04513" ref-type="bibr">69</xref>
] (which come from simulation experiments) to improve the service; and (5) to communicate the decisions made to the context middleware.</p>
</sec>
</sec>
<sec>
<label>4.</label>
<title>Methodology and Main Challenges</title>
<p>The framework explained in Section 3 describes three clear modules: the formally represented knowledge, the ABSS model and the service-oriented architecture. Because each one is based on the following,
<xref rid="f3-sensors-14-04513" ref-type="fig">Figure 3</xref>
describes a simple flowchart with subroutines that clearly address these modules. Iterative and incremental development is necessary, as in several well-known strategies from software engineering (such as Spiral, Prototyping and any Agile software method [
<xref rid="b70-sensors-14-04513" ref-type="bibr">70</xref>
]). Hence, the flowchart also describes the iterations over these three main subroutines. The fourth and, after the required iterations, final subroutine is the evaluation of an emergency plan based on the use of the holistic framework presented in this paper.</p>
<p>Although emergency management evaluation by means of simulations is a hot topic, as described in the Introduction, this is the first work that proposes and justifies the combination of semantic web technologies, agent-based social simulations and ambient intelligence systems. Therefore, there is not a detailed methodology for the development of such a system in the specialized literature.
<xref rid="f3-sensors-14-04513" ref-type="fig">Figure 3</xref>
describes the main methodological research streams that have to be contemplated: (1) an ontology development methodology, such as METHONTOLOGY[
<xref rid="b71-sensors-14-04513" ref-type="bibr">71</xref>
]; (2) an agent-based social simulation methodology, such as the one proposed by Gilbert and Troitzsch [
<xref rid="b52-sensors-14-04513" ref-type="bibr">52</xref>
]; and (3) an ambient intelligence-development methodology, such as the formal approach proposed by Coronato and De Pietro [
<xref rid="b72-sensors-14-04513" ref-type="bibr">72</xref>
]. Moreover: (4) methodologies for the emergency plans definition and evaluation are required during the whole process, because of the specific domain nature of the framework. Finally, the: (5) systematic review methodologies [
<xref rid="b73-sensors-14-04513" ref-type="bibr">73</xref>
] have to be considered in an attempt to integrate available works when possible and to disseminate research results for this recurrent topic.</p>
<p>Although providing reference examples of methodologies for the isolated modules is easy, as shown above, the main challenge identified in the full deployment of this methodology is to include interactions among methodologies of disparate research streams. As explained above, the combination of the technologies contemplated here is an unexplored field, although some works address some of them [
<xref rid="b31-sensors-14-04513" ref-type="bibr">31</xref>
,
<xref rid="b47-sensors-14-04513" ref-type="bibr">47</xref>
]. Most importantly, as in any evaluation based on simulations, the ultimate question is whether the conclusions are valid for the real world or just a result of an incorrect verification and validation of the software [
<xref rid="b52-sensors-14-04513" ref-type="bibr">52</xref>
]. This question is extremely challenging even when considering isolated components of the framework: For example, are the simulated users realistic? Are the sensors responding to the simulated events as they would do with real ones? If debugging traditional software is considerably complex, debugging multi-agent-based simulations and multi-agent systems in which intelligent or emergent behaviors may appear is much more complex, because a well-known feature of agent technologies is their ability to generate unpredictable, complex and emergent behaviors from very simple rules [
<xref rid="b74-sensors-14-04513" ref-type="bibr">74</xref>
].</p>
</sec>
<sec>
<label>5.</label>
<title>Implementation and State of the Framework</title>
<p>As explained above, there are a number of simulators in the literature that cover some of these modules. Unfortunately, to the best of authors' knowledge, none of them cover all the relevant modules. Particularly, no open-source simulator of pedestrian movement under both normal and emergency conditions has been found. Even considering proprietary software, the reaction to possible actuators, such as indications in panels, and the error that sensors may include are not usually considered.</p>
<p>Currently, UbikSim [
<xref rid="b75-sensors-14-04513" ref-type="bibr">75</xref>
], a general AmI simulator, has been extended to implement different modules of the holistic framework for the evaluation of emergency plans in the indoor environments presented in this paper. Although some preliminary versions of UbikSim were distributed under an academic license [
<xref rid="b12-sensors-14-04513" ref-type="bibr">12</xref>
] (until 2010), the current version has been recently documented, tested and released via GitHub (on 31 January, 2013) [
<xref rid="b75-sensors-14-04513" ref-type="bibr">75</xref>
] in the scope of this research work and in collaboration with the University of Murcia (see the UbikSim license [
<xref rid="b75-sensors-14-04513" ref-type="bibr">75</xref>
]). UbikSim is open and free software, and its GPLlicense [
<xref rid="b76-sensors-14-04513" ref-type="bibr">76</xref>
] ensures that its extensions will remain open and free. This simulator has been employed to explain graphically possible emergencies detected after processing the data collected through artificial sensing [
<xref rid="b77-sensors-14-04513" ref-type="bibr">77</xref>
], among other applications.</p>
<p>One of the most significant improvements of this new version is that the environment model, which is a crucial factor in designing emergency plans, is realistic and parameterizable. Unlike most social simulation frameworks (see Section 2.1), which consider the space to be a toroidal grid, UbikSim allows creating realistic space models by using a drag and drop editor; see
<xref rid="f4-sensors-14-04513" ref-type="fig">Figure 4</xref>
. Unlike most simulations based on games engines (see Section 2.2), the model is parameterizable: developers cannot only modify common attributes in the elements simulated (such as the location, size, name and role), but also add any metadata needed in the simulations (such as the floor adhesiveness, furniture combustibility and maximum capacity of the stairs).</p>
<p>It is important to note that although the evacuation case has been a recurrent example of UbikSim's use in a number of research works (see the papers section in [
<xref rid="b75-sensors-14-04513" ref-type="bibr">75</xref>
]), it lacks some important features of an emergency simulator, such as realistic models of emergencies, evacuation algorithms for the AmI system and abstract behaviors for agents in this domain, such as “lead the evacuation of this floor” or “panic”. The EscapeSim [
<xref rid="b78-sensors-14-04513" ref-type="bibr">78</xref>
] library has been created to address these aspects. The border between UbikSim and EscapeSim is blurry, because when some feature is developed in the scope of EscapeSim and is considered interesting not only for the emergency domain, but also for general AmI study, this feature is integrated into UbikSim to be automatically inherited by EscapeSim.</p>
<p>This distinction between UbikSim and EscapeSim allows the EscapeSim library to offer remarkable usability. This simplicity of use was checked as part of the course “Agent-based social simulation” given at the Polytechnic University of Madrid. In this forum, undergraduate students were able to use EscapeSim after a few lessons to: (1) define emergency scenarios; (2) use predefined emergency management strategies; (3) implement new strategies; (4) build user profiles, such as handicapped or emergency managers; and, as described in Section 6, which was a programming assignment of this course; (5) conduct an evaluation of emergency plans though a batch of simulations.</p>
<p>Note that this paper is a research proposal, and we are still far from achieving the holistic framework described in Section 3. Our final purpose is to combine it (or replace it if needed) with other tools. More specifically, the definition of the ontologies required and the development of models based on semantic web technologies are still under development. On the other hand, EscapeSim in combination with UbikSim is the first AmI simulator for evaluating emergency plans that allows the interested reader to download it [
<xref rid="b78-sensors-14-04513" ref-type="bibr">78</xref>
] and adapt it for her own use. Possible adaptations include creating new environments (walls and rooms may be drawn, and then, the user can drag and drop other elements, such as sensors, users or furniture) and creating new user profiles with different emergency plans. In addition to the source code of the framework [
<xref rid="b78-sensors-14-04513" ref-type="bibr">78</xref>
], there is a video available on-line [
<xref rid="b79-sensors-14-04513" ref-type="bibr">79</xref>
] that shows the use of EscapeSim for developing a space model and assessing different emergency plans.</p>
</sec>
<sec>
<label>6.</label>
<title>Case Study</title>
<p>In the scope of the project
<italic>Technologies for the future of hotels</italic>
(THOFU) [
<xref rid="b80-sensors-14-04513" ref-type="bibr">80</xref>
], EscapeSim has been employed to model a hotel environment and to assess emergency evacuations in this space. The top panel of
<xref rid="f5-sensors-14-04513" ref-type="fig">Figure 5</xref>
shows the definition of the environment model with a number of points that model fire sensors that the context model uses to know the state of a fire. In the bottom panel, this figure also shows an execution of the simulation with a fire, which is started in a random position to be able to evaluate the emergency under previously unknown circumstances. By default, this simulation includes 27 users, who follow the shortest path that they receive via smartphone from the emergency service.</p>
<p>The simulation GUI makes it possible to study the effects of a number of what-if scenarios: What happens if the fire is near an exit? What if an exit is the closest to most of the rooms? Does the emergency plan produce crowds? One of the conclusions reached by this study was that given that the central staircases of the environment cover most rooms (see
<xref rid="f5-sensors-14-04513" ref-type="fig">Figure 5</xref>
, top), an emergency plan based on using the shortest path produces crowds, which delay the escape. Undoubtedly, these results are valid just for this specific hotel. This issue, as explained in the Introduction, is one of the reasons to study emergency plans in the scope of a specific case.</p>
<p>As observed above, the study of the simulation GUIis worthy. Nevertheless, the GUI tends to disappear for the evaluation in simulation research [
<xref rid="b12-sensors-14-04513" ref-type="bibr">12</xref>
]. As a result, batch experiments are employed to obtain general conclusions of the emergency plan being tested. EscapeSim includes the infrastructure required for: (1) defining a set of metrics to study the plan; (2) executing a batch of simulations; (3) logging the metrics defined in (1) for each time step and each simulation; and (4) conducting statistical operations over these data to summarize the results.</p>
<p>Just for illustrative purposes, EscapeSim includes two basic pre-defined metrics:
<italic>PeopleInBuilding</italic>
, which is the number of users who are on the floor for each time step; and
<italic>PeopleWhoReachEmergency</italic>
, which is the number of users who are in touch with the simulated emergency at each time step. The
<italic>PeopleWhoReachEmergency</italic>
does not necessarily measure failures of vital functions in the simulated users, although the simulator allows this option if required (in addition to defining new metrics). By default,
<italic>PeopleWhoReachEmergency</italic>
is increased when a user occupies the same position as the simulated emergency and only once per user.</p>
<p>Additionally, several emergency plans have been implemented:
<list list-type="order">
<list-item>
<p>
<italic>Random initial wait</italic>
. This policy consists of making agents wait a random number of simulation steps (zero to 50) before starting the flight to minimize breakdowns in access to exits. As explained, by default, the service provides users with the shortest path to the closest exit.</p>
</list-item>
<list-item>
<p>
<italic>Distributing exits based on escape order</italic>
. The first user evacuated receives a path to the first exit, the second to the second and the third to the third, whereas the fourth user receives the first exit again (assuming three exits, as in the environment modeled), and so on.</p>
</list-item>
<list-item>
<p>
<italic>Avoiding the exit closest to the fire</italic>
. After calculating the Euclidean distance to the fire (specifically, to the position of the fire calculated based on the sensors excited), the closest stairway to that position is discarded for the evacuation.</p>
</list-item>
<list-item>
<p>
<italic>Avoiding routes that include positions with fire</italic>
. To improve the plan shown above, only routes that include positions with fire are ruled out. Therefore, if it is possible, the service makes use of all exits and, if more than one fire escape is risky, they are not used.</p>
</list-item>
<list-item>
<p>
<italic>Putting out the fire</italic>
. A random user is chosen as the emergency manager and led to the lobby to activate sprinklers that put out the fire. Then, the service guides this user to the closest fire escape.</p>
</list-item>
</list>
</p>
<p>After executing 100 experiments with each emergency plan, the mean of the results for both metrics is displayed in
<xref rid="f6-sensors-14-04513" ref-type="fig">Figure 6</xref>
. The data are also available on-line with the standard deviation [
<xref rid="b81-sensors-14-04513" ref-type="bibr">81</xref>
]. The results demonstrate that putting out the fire (fifth plan), even when it is performed by a random user who can be far from the hall, gives the best results for both metrics. The fourth plan is the next best option, which is to evacuate most of the building as fast as possible. Nonetheless, some users can remain in the building for more time than with the first and second plans, because the service tries to avoid routes in touch with the emergency. Moreover, the number of users who reach the emergency is similar to the case when the third strategy, which is much simpler, is used.</p>
<p>Although these experiment are just to illustrate the use of EscapeSim, these results hint at the potential of studying emergency plans by simulations and contributing with open and free software. Moreover, as explained in Section 5, the usability of EscapeSim has been a major concern, and undergraduate students were able to reproduce and extend the experiments presented here in different scenarios. More importantly, the social simulation defined here proved to be a powerful tool to gain insights into the emergency plans; e.g., most students detected that the central stairs were the closest exit to nearly all rooms. Therefore, providing all users with the shortest path to an exit at the same time causes dangerous collapses, whereas the other two alternatives are underused.</p>
</sec>
<sec>
<label>7.</label>
<title>Conclusion and Future Works</title>
<p>After explaining the interest in enhancing emergency plans by ambient intelligence and the necessity of simulation techniques to evaluate these plans, this paper has linked to over 150 different simulators capable of conducting some aspects of this type of assessment, but, as explained, not all. Furthermore, thousands of projects that, to some extent, address this problem have been found. Inasmuch as most of the research literature focuses on improving emergency services, the simulators and simulations employed to evaluate these contributions often remain obscure;
<italic>i.e.</italic>
, the code or the implementation are not available or the experiments are not described enough, for example. This fact forces new researchers to build an evaluation framework from scratch, which can be even more complex than the service to be deployed and assessed.</p>
<p>To improve this situation, this research proposal paper has presented a holistic framework that attempts to address all emergency evaluation aspects and that facilitates the reuse, extension and interconnection of its major components. The framework has noted the necessity of: (1) including modules that formalize the concepts involved in the remaining modules by using semantic web technologies; (2) offering abstract models prior to the implementation without specific programming language constraints by employing the agent-based simulation paradigm; and, when implementing these models; (3) giving an open and highly modularized source code to enhance its reuse and extension in the context of a service-oriented architecture.</p>
<p>The paper has also described the methodological framework required for this novel combination of technologies, which emphasizes the integration of previous works and the diffusion of each little advance in the construction of this holistic framework. Finally, this work contributes an open and free software tool called EscapeSim [
<xref rid="b78-sensors-14-04513" ref-type="bibr">78</xref>
], which is based on the also-free software, UbikSim [
<xref rid="b75-sensors-14-04513" ref-type="bibr">75</xref>
]. The use of this software has been illustrated in the context of evaluating a number of emergency plans in a hotel (a presentation video [
<xref rid="b79-sensors-14-04513" ref-type="bibr">79</xref>
] and the experimental results are available on-line [
<xref rid="b81-sensors-14-04513" ref-type="bibr">81</xref>
]). EscapeSim intends to be a first grain of sand in the construction of the complex framework described here and an example of code dissemination.</p>
<p>Future work should focus on revising evacuation algorithms in the specialized literature, adapting the algorithms to make them contemplate the main elements considered in the holistic framework presented (particularly, an imperfect vision of the world given by sensors and the necessity of actuators to establish contact with users) and evaluating the performance of the existing algorithms and new adaptations proposed by using simulation techniques.</p>
</sec>
</body>
<back>
<ack>
<p>This research work is supported by the Spanish Ministry of Economy and Competitiveness under the R&D projects CALISTA (TEC2012-32457) and Thofu (CEN-2010-1019).</p>
</ack>
<notes>
<title>Author Contributions</title>
<p>Although Emilio Serrano took the leadership on this research work, all authors (Emilio Serrano, Geovanny Poveda and Mercedes Garijo) have contributed significantly to the original idea, proposed framework, tool development, case study, and manuscript writing.</p>
</notes>
<notes>
<title>Conflicts of Interest</title>
<p>The authors declare no conflicts of interest.</p>
</notes>
<ref-list>
<title>References</title>
<ref id="b1-sensors-14-04513">
<label>1.</label>
<element-citation publication-type="webpage">
<person-group person-group-type="author">
<collab>BBC</collab>
</person-group>
<article-title>Spain Halloween Stampede Kills Three in Madrid</article-title>
<year>2012</year>
<comment>Available online:
<ext-link ext-link-type="uri" xlink:href="http://www.bbc.co.uk/news/world-europe-20166315">http://www.bbc.co.uk/news/world-europe-20166315</ext-link>
</comment>
<date-in-citation>(accessed on 1 March 2014)</date-in-citation>
</element-citation>
</ref>
<ref id="b2-sensors-14-04513">
<label>2.</label>
<element-citation publication-type="webpage">
<person-group person-group-type="author">
<name>
<surname>Darlington</surname>
<given-names>S.</given-names>
</name>
</person-group>
<article-title>Fire Rips Through Crowded Brazil Nightclub Killing 223</article-title>
<year>2013</year>
<comment>Available online:
<ext-link ext-link-type="uri" xlink:href="http://edition.cnn.com/2013/01/27/world/americas/brazil-nightclub-fire">http://edition.cnn.com/2013/01/27/world/americas/brazil-nightclub-fire</ext-link>
</comment>
<date-in-citation>(accessed on 1 March 2014)</date-in-citation>
</element-citation>
</ref>
<ref id="b3-sensors-14-04513">
<label>3.</label>
<element-citation publication-type="book">
<person-group person-group-type="author">
<name>
<surname>Cook</surname>
<given-names>D.J.</given-names>
</name>
<name>
<surname>Augusto</surname>
<given-names>J.C.</given-names>
</name>
<name>
<surname>Jakkula</surname>
<given-names>V.R.</given-names>
</name>
</person-group>
<source>Ambient Intelligence: Technologies, Applications, and Opportunities</source>
<publisher-name>Elsevier</publisher-name>
<publisher-loc>Amsterdam, The Netherlands</publisher-loc>
<year>2007</year>
</element-citation>
</ref>
<ref id="b4-sensors-14-04513">
<label>4.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Aedo</surname>
<given-names>I.</given-names>
</name>
<name>
<surname>Yu</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Díaz</surname>
<given-names>P.</given-names>
</name>
<name>
<surname>Acuña</surname>
<given-names>P.</given-names>
</name>
<name>
<surname>Onorati</surname>
<given-names>T.</given-names>
</name>
</person-group>
<article-title>Personalized Alert Notifications and Evacuation Routes in Indoor Environments</article-title>
<source>Sensors</source>
<year>2012</year>
<volume>12</volume>
<fpage>7804</fpage>
<lpage>7827</lpage>
<pub-id pub-id-type="pmid">22969373</pub-id>
</element-citation>
</ref>
<ref id="b5-sensors-14-04513">
<label>5.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Cheon</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Lee</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Lee</surname>
<given-names>W.</given-names>
</name>
<name>
<surname>Hyun</surname>
<given-names>C.H.</given-names>
</name>
<name>
<surname>Park</surname>
<given-names>M.</given-names>
</name>
</person-group>
<article-title>Intelligent Emergency Stop Algorithm for a Manipulator Using a New Regression Method</article-title>
<source>Sensors</source>
<year>2012</year>
<volume>12</volume>
<fpage>7451</fpage>
<lpage>7467</lpage>
<pub-id pub-id-type="pmid">22969354</pub-id>
</element-citation>
</ref>
<ref id="b6-sensors-14-04513">
<label>6.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zeng</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Sreenan</surname>
<given-names>C.J.</given-names>
</name>
<name>
<surname>Sitanayah</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>Xiong</surname>
<given-names>N.</given-names>
</name>
<name>
<surname>Park</surname>
<given-names>J.H.</given-names>
</name>
<name>
<surname>Zheng</surname>
<given-names>G.</given-names>
</name>
</person-group>
<article-title>An Emergency-Adaptive Routing Scheme for Wireless Sensor Networks for Building Fire Hazard Monitoring</article-title>
<source>Sensors</source>
<year>2011</year>
<volume>11</volume>
<fpage>2899</fpage>
<lpage>2919</lpage>
<pub-id pub-id-type="pmid">22163774</pub-id>
</element-citation>
</ref>
<ref id="b7-sensors-14-04513">
<label>7.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Gray</surname>
<given-names>A.J.G.</given-names>
</name>
<name>
<surname>Sadler</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Kit</surname>
<given-names>O.</given-names>
</name>
<name>
<surname>Kyzirakos</surname>
<given-names>K.</given-names>
</name>
<name>
<surname>Karpathiotakis</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Calbimonte</surname>
<given-names>J.P.</given-names>
</name>
<name>
<surname>Page</surname>
<given-names>K.</given-names>
</name>
<name>
<surname>García-Castro</surname>
<given-names>R.</given-names>
</name>
<name>
<surname>Frazer</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Galpin</surname>
<given-names>I.</given-names>
</name>
<etal></etal>
</person-group>
<article-title>A Semantic Sensor Web for Environmental Decision Support Applications</article-title>
<source>Sensors</source>
<year>2011</year>
<volume>11</volume>
<fpage>8855</fpage>
<lpage>8887</lpage>
<pub-id pub-id-type="pmid">22164110</pub-id>
</element-citation>
</ref>
<ref id="b8-sensors-14-04513">
<label>8.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Alonso</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>Milanés</surname>
<given-names>V.</given-names>
</name>
<name>
<surname>Torre-Ferrero</surname>
<given-names>C.</given-names>
</name>
<name>
<surname>Godoy</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Oria</surname>
<given-names>J.P.</given-names>
</name>
<name>
<surname>De Pedro</surname>
<given-names>T.</given-names>
</name>
</person-group>
<article-title>Ultrasonic Sensors in Urban Traffic Driving-Aid Systems</article-title>
<source>Sensors</source>
<year>2011</year>
<volume>11</volume>
<fpage>661</fpage>
<lpage>673</lpage>
<pub-id pub-id-type="pmid">22346596</pub-id>
</element-citation>
</ref>
<ref id="b9-sensors-14-04513">
<label>9.</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Eriksson</surname>
<given-names>M.</given-names>
</name>
</person-group>
<article-title>State-of-the-art and Good Practice in the Field of Living Labs</article-title>
<conf-name>Proceedings of the 12th International Conference on Concurrent Enterprising: Innovative Products and Services through Collaborative Networks</conf-name>
<conf-loc>Italy, Milan</conf-loc>
<conf-date>3-4 July, 2006</conf-date>
<fpage>2628</fpage>
</element-citation>
</ref>
<ref id="b10-sensors-14-04513">
<label>10.</label>
<element-citation publication-type="book">
<person-group person-group-type="author">
<name>
<surname>Fishwick</surname>
<given-names>P.A.</given-names>
</name>
</person-group>
<source>Simulation Model Design and Execution</source>
<publisher-name>Prentice Hall</publisher-name>
<publisher-loc>Upper Saddle River, NJ, USA</publisher-loc>
<year>1995</year>
</element-citation>
</ref>
<ref id="b11-sensors-14-04513">
<label>11.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Aldunate</surname>
<given-names>R.G.</given-names>
</name>
<name>
<surname>Schmidt</surname>
<given-names>K.N.</given-names>
</name>
<name>
<surname>Herrera</surname>
<given-names>O.</given-names>
</name>
</person-group>
<article-title>Enabling Communication in Emergency Response Environments</article-title>
<source>Sensors</source>
<year>2012</year>
<volume>12</volume>
<fpage>6380</fpage>
<lpage>6394</lpage>
<pub-id pub-id-type="pmid">22778647</pub-id>
</element-citation>
</ref>
<ref id="b12-sensors-14-04513">
<label>12.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Serrano</surname>
<given-names>E.</given-names>
</name>
<name>
<surname>Botia</surname>
<given-names>J.</given-names>
</name>
</person-group>
<article-title>Validating ambient intelligence based ubiquitous computing systems by means of artificial societies</article-title>
<source>Inf. Sci.</source>
<year>2013</year>
<volume>222</volume>
<fpage>3</fpage>
<lpage>24</lpage>
</element-citation>
</ref>
<ref id="b13-sensors-14-04513">
<label>13.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Millan-Garcia</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>Sanchez-Perez</surname>
<given-names>G.</given-names>
</name>
<name>
<surname>Nakano</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Toscano-Medina</surname>
<given-names>K.</given-names>
</name>
<name>
<surname>Perez-Meana</surname>
<given-names>H.</given-names>
</name>
<name>
<surname>Rojas-Cardenas</surname>
<given-names>L.</given-names>
</name>
</person-group>
<article-title>An Early Fire Detection Algorithm Using IP Cameras</article-title>
<source>Sensors</source>
<year>2012</year>
<volume>12</volume>
<fpage>5670</fpage>
<lpage>5686</lpage>
<pub-id pub-id-type="pmid">22778607</pub-id>
</element-citation>
</ref>
<ref id="b14-sensors-14-04513">
<label>14.</label>
<element-citation publication-type="webpage">
<article-title>ABSS Frameworks List</article-title>
<comment>Available online:
<ext-link ext-link-type="uri" xlink:href="http://en.wikipedia.org/wiki/ABM_Software_Comparison">http://en.wikipedia.org/wiki/ABM_Software_Comparison</ext-link>
</comment>
<date-in-citation>(accessed on 1 March 2014)</date-in-citation>
</element-citation>
</ref>
<ref id="b15-sensors-14-04513">
<label>15.</label>
<element-citation publication-type="webpage">
<article-title>NetLogo 5.0.4 User Manual</article-title>
<comment>Available online:
<ext-link ext-link-type="uri" xlink:href="http://ccl.northwestern.edu/netlogo/docs/">http://ccl.northwestern.edu/netlogo/docs/</ext-link>
</comment>
<date-in-citation>(accessed on 1 March 2014)</date-in-citation>
</element-citation>
</ref>
<ref id="b16-sensors-14-04513">
<label>16.</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Luke</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Cioffi-Revilla</surname>
<given-names>C.</given-names>
</name>
<name>
<surname>Panait</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>Sullivan</surname>
<given-names>K.</given-names>
</name>
</person-group>
<article-title>MASON: A New Multi-Agent Simulation Toolkit</article-title>
<conf-name>Proceedings of the 2004 Swarmfest Workshop</conf-name>
<conf-loc>Ann Arbor, MI, USA</conf-loc>
<conf-date>9–11 May 2004</conf-date>
</element-citation>
</ref>
<ref id="b17-sensors-14-04513">
<label>17.</label>
<element-citation publication-type="webpage">
<person-group person-group-type="author">
<name>
<surname>Collier</surname>
<given-names>N.</given-names>
</name>
</person-group>
<article-title>RePast: An Extensible Framework for Agent Simulation</article-title>
<comment>Available online:
<ext-link ext-link-type="uri" xlink:href="http://www2.econ.iastate.edu/tesfatsi/RepastTutorial.Collier.pdf">http://www2.econ.iastate.edu/tesfatsi/RepastTutorial.Collier.pdf</ext-link>
</comment>
<date-in-citation>(accessed on 1 March 2002)</date-in-citation>
</element-citation>
</ref>
<ref id="b18-sensors-14-04513">
<label>18.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Dawson</surname>
<given-names>R.J.</given-names>
</name>
<name>
<surname>Peppe</surname>
<given-names>R.</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>M.</given-names>
</name>
</person-group>
<article-title>An agent-based model for risk-based flood incident management</article-title>
<source>Nat. Hazards</source>
<year>2011</year>
<volume>59</volume>
<fpage>167</fpage>
<lpage>189</lpage>
</element-citation>
</ref>
<ref id="b19-sensors-14-04513">
<label>19.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Gatto</surname>
<given-names>L.B.S.</given-names>
</name>
<name>
<surname>Mól</surname>
<given-names>A.C.A.</given-names>
</name>
<name>
<surname>dos Santos</surname>
<given-names>I.J.L.</given-names>
</name>
<name>
<surname>Jorge</surname>
<given-names>C.A.F.</given-names>
</name>
<name>
<surname>Legey</surname>
<given-names>A.P.</given-names>
</name>
</person-group>
<article-title>Virtual simulation of a nuclear power plant's control room as a tool for ergonomic evaluation</article-title>
<source>Progr. Nuclear Energy</source>
<year>2013</year>
<volume>64</volume>
<fpage>8</fpage>
<lpage>15</lpage>
</element-citation>
</ref>
<ref id="b20-sensors-14-04513">
<label>20.</label>
<element-citation publication-type="book">
<person-group person-group-type="author">
<name>
<surname>Szymanezyk</surname>
<given-names>O.</given-names>
</name>
<name>
<surname>Duckett</surname>
<given-names>T.</given-names>
</name>
<name>
<surname>Dickinson</surname>
<given-names>P.</given-names>
</name>
</person-group>
<article-title>Agent-Based Crowd Simulation in Airports Using Games Technology</article-title>
<source>Transactions on Computational Collective Intelligence VIII</source>
<person-group person-group-type="editor">
<name>
<surname>Nguyen</surname>
<given-names>N.T.</given-names>
</name>
</person-group>
<publisher-name>Springer</publisher-name>
<publisher-loc>Berlin/Heidelberg, Germany</publisher-loc>
<year>2012</year>
<volume>Volume 7430</volume>
<fpage>192</fpage>
<lpage>213</lpage>
</element-citation>
</ref>
<ref id="b21-sensors-14-04513">
<label>21.</label>
<element-citation publication-type="webpage">
<article-title>Game Engines List</article-title>
<comment>Available online:
<ext-link ext-link-type="uri" xlink:href="http://en.wikipedia.org/wiki/List_of_game_engines">http://en.wikipedia.org/wiki/List_of_game_engines</ext-link>
</comment>
<date-in-citation>(accessed on 1 March 2014)</date-in-citation>
</element-citation>
</ref>
<ref id="b22-sensors-14-04513">
<label>22.</label>
<element-citation publication-type="webpage">
<article-title>Unity-Game Engine</article-title>
<comment>Available online:
<ext-link ext-link-type="uri" xlink:href="http://unity3d.com/">http://unity3d.com/</ext-link>
</comment>
<date-in-citation>(accessed on1 March 2014)</date-in-citation>
</element-citation>
</ref>
<ref id="b23-sensors-14-04513">
<label>23.</label>
<element-citation publication-type="webpage">
<person-group person-group-type="author">
<name>
<surname>Gameplay</surname>
<given-names>Free</given-names>
</name>
</person-group>
<article-title>3D Game Engine</article-title>
<comment>Available online:
<ext-link ext-link-type="uri" xlink:href="http://gameplay3d.org/">http://gameplay3d.org/</ext-link>
</comment>
<date-in-citation>(accessed on 1 March 2014)</date-in-citation>
</element-citation>
</ref>
<ref id="b24-sensors-14-04513">
<label>24.</label>
<element-citation publication-type="webpage">
<article-title>jMonkeyEngine 3.0, Java OpenGL Game EnginejMonkeyEngine 3.0</article-title>
<comment>Available online:
<ext-link ext-link-type="uri" xlink:href="http://jmonkeyengine.org/">http://jmonkeyengine.org/</ext-link>
</comment>
<date-in-citation>(accessed on 1 March 2014)</date-in-citation>
</element-citation>
</ref>
<ref id="b25-sensors-14-04513">
<label>25.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Rüppel</surname>
<given-names>U.</given-names>
</name>
<name>
<surname>Schatz</surname>
<given-names>K.</given-names>
</name>
</person-group>
<article-title>Designing a BIM-based serious game for fire safety evacuation simulations</article-title>
<source>Adv. Eng. Inf.</source>
<year>2011</year>
<volume>25</volume>
<fpage>600</fpage>
<lpage>611</lpage>
</element-citation>
</ref>
<ref id="b26-sensors-14-04513">
<label>26.</label>
<element-citation publication-type="book">
<person-group person-group-type="author">
<name>
<surname>Kuligowski</surname>
<given-names>E.D.</given-names>
</name>
<name>
<surname>Peacock</surname>
<given-names>R.D.</given-names>
</name>
<name>
<surname>Hoskins</surname>
<given-names>B.L.</given-names>
</name>
</person-group>
<source>A Review of Building Evacuation Models</source>
<edition>2nd ed.</edition>
<publisher-name>National Institute of Standards and Technology (NIST)</publisher-name>
<publisher-loc>Gaithersburg, MD, USA</publisher-loc>
<fpage>1680</fpage>
</element-citation>
</ref>
<ref id="b27-sensors-14-04513">
<label>27.</label>
<element-citation publication-type="book">
<person-group person-group-type="author">
<name>
<surname>Francis</surname>
<given-names>R.</given-names>
</name>
<name>
<surname>Saunders</surname>
<given-names>P.</given-names>
</name>
</person-group>
<source>EVACNET: Prototype Network Optimization Models for Building Evacuation</source>
<publisher-name>National Bureau of Standards</publisher-name>
<publisher-loc>Gaithersburg, MD, USA</publisher-loc>
<year>1979</year>
</element-citation>
</ref>
<ref id="b28-sensors-14-04513">
<label>28.</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Shestopal</surname>
<given-names>V.O.</given-names>
</name>
<name>
<surname>Grubits</surname>
<given-names>S.J.</given-names>
</name>
</person-group>
<article-title>Evacuation Model for Merging Traffic Flows in Multi-Room and Multi-Storey Buildings</article-title>
<conf-name>Proceedings of the Fourth International Symposium on Fire Safety Science</conf-name>
<conf-loc>Ottawa, Canada</conf-loc>
<conf-date>13–17 June, 1994</conf-date>
</element-citation>
</ref>
<ref id="b29-sensors-14-04513">
<label>29.</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Zhang</surname>
<given-names>B.</given-names>
</name>
<name>
<surname>Chan</surname>
<given-names>W.K.V.</given-names>
</name>
<name>
<surname>Ukkusuri</surname>
<given-names>S.V.</given-names>
</name>
</person-group>
<article-title>Agent-Based Discrete-Event Hybrid Space Modeling Approach for Transportation Evacuation Simulation</article-title>
<conf-name>Proceedings of the Winter Simulation Conference, Winter Simulation Conference</conf-name>
<conf-loc>Savannah, GA, USA</conf-loc>
<conf-date>7–10 December, 2011</conf-date>
<fpage>199</fpage>
<lpage>209</lpage>
</element-citation>
</ref>
<ref id="b30-sensors-14-04513">
<label>30.</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Sakaki</surname>
<given-names>T.</given-names>
</name>
<name>
<surname>Toriumi</surname>
<given-names>F.</given-names>
</name>
<name>
<surname>Shinoda</surname>
<given-names>K.</given-names>
</name>
<name>
<surname>Kazama</surname>
<given-names>K.</given-names>
</name>
<name>
<surname>Kurihara</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Noda</surname>
<given-names>I.</given-names>
</name>
<name>
<surname>Matsuo</surname>
<given-names>Y.</given-names>
</name>
</person-group>
<article-title>Disaster Detection and Location Estimation of Suffered Areas Using Social Media</article-title>
<conf-name>Proceedings of the JSAI</conf-name>
<conf-loc>Yamaguchi, Japan</conf-loc>
<conf-date>12–15 December 2012</conf-date>
<fpage>4C1–R–</fpage>
<fpage>6</fpage>
<lpage>8</lpage>
</element-citation>
</ref>
<ref id="b31-sensors-14-04513">
<label>31.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Campillo-Sanchez</surname>
<given-names>P.</given-names>
</name>
<name>
<surname>Serrano</surname>
<given-names>E.</given-names>
</name>
<name>
<surname>Botía</surname>
<given-names>J.A.</given-names>
</name>
</person-group>
<article-title>Testing context-aware services based on smartphones by agent based social simulation</article-title>
<source>JAISE</source>
<year>2013</year>
<fpage>5</fpage>
<fpage>311</fpage>
<lpage>330</lpage>
</element-citation>
</ref>
<ref id="b32-sensors-14-04513">
<label>32.</label>
<element-citation publication-type="webpage">
<person-group person-group-type="author">
<name>
<surname>Campillo-Sanchez</surname>
<given-names>P.</given-names>
</name>
<name>
<surname>Serrano</surname>
<given-names>E.</given-names>
</name>
<name>
<surname>Botía</surname>
<given-names>J.A.</given-names>
</name>
</person-group>
<article-title>Connecting a Social Simulation with an Android Smartphone</article-title>
<comment>Available online:
<ext-link ext-link-type="uri" xlink:href="http://www.youtube.com/watch?v=jdeFYwf77HY">http://www.youtube.com/watch?v=jdeFYwf77HY</ext-link>
</comment>
<date-in-citation>(accessed on 1 March 2014)</date-in-citation>
</element-citation>
</ref>
<ref id="b33-sensors-14-04513">
<label>33.</label>
<element-citation publication-type="book">
<person-group person-group-type="author">
<name>
<surname>Barton</surname>
<given-names>J.J.</given-names>
</name>
<name>
<surname>Vijayaraghavan</surname>
<given-names>V.</given-names>
</name>
</person-group>
<source>UBIWISE, A Ubiquitous Wireless Infrastructure Simulation Environment</source>
<publisher-name>Technical Report; HP</publisher-name>
<publisher-loc>Palo Alto, CA, USA</publisher-loc>
<year>2002</year>
</element-citation>
</ref>
<ref id="b34-sensors-14-04513">
<label>34.</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>O'Neill</surname>
<given-names>E.</given-names>
</name>
<name>
<surname>Klepal</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Lewis</surname>
<given-names>D.</given-names>
</name>
<name>
<surname>O'Donnell</surname>
<given-names>T.</given-names>
</name>
<name>
<surname>O'Sullivan</surname>
<given-names>D.</given-names>
</name>
<name>
<surname>Pesch</surname>
<given-names>D.A.</given-names>
</name>
</person-group>
<article-title>Testbed for Evaluating Human Interaction with Ubiquitous Computing Environments</article-title>
<conf-name>Proceedings of the First International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities</conf-name>
<conf-loc>Washington, DC, USA</conf-loc>
<conf-date>5–7 May 2005</conf-date>
<fpage>60</fpage>
<lpage>69</lpage>
</element-citation>
</ref>
<ref id="b35-sensors-14-04513">
<label>35.</label>
<element-citation publication-type="book">
<person-group person-group-type="author">
<name>
<surname>Nishikawa</surname>
<given-names>H.</given-names>
</name>
<name>
<surname>Yamamoto</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Tamai</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Nishigaki</surname>
<given-names>K.</given-names>
</name>
<name>
<surname>Kitani</surname>
<given-names>T.</given-names>
</name>
<name>
<surname>Shibata</surname>
<given-names>N.</given-names>
</name>
<name>
<surname>Yasumoto</surname>
<given-names>K.</given-names>
</name>
<name>
<surname>Ito</surname>
<given-names>M.</given-names>
</name>
</person-group>
<source>UbiREAL: Realistic Smartspace Simulator for Systematic Testing</source>
<publisher-name>Springer</publisher-name>
<publisher-loc>Berlin, Germany</publisher-loc>
<year>2006</year>
<fpage>459</fpage>
<lpage>476</lpage>
</element-citation>
</ref>
<ref id="b36-sensors-14-04513">
<label>36.</label>
<element-citation publication-type="book">
<person-group person-group-type="author">
<name>
<surname>Tang</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>Zhou</surname>
<given-names>X.</given-names>
</name>
<name>
<surname>Becker</surname>
<given-names>C.</given-names>
</name>
<name>
<surname>Yu</surname>
<given-names>Z.</given-names>
</name>
<name>
<surname>Schiele</surname>
<given-names>G.</given-names>
</name>
</person-group>
<source>Situation-Based Design: A Rapid Approach for Pervasive Application Development. UIC/ATC</source>
<person-group person-group-type="editor">
<name>
<surname>Apduhan</surname>
<given-names>B.O.</given-names>
</name>
<name>
<surname>Hsu</surname>
<given-names>C.H.</given-names>
</name>
<name>
<surname>Dohi</surname>
<given-names>T.</given-names>
</name>
<name>
<surname>Ishida</surname>
<given-names>K.</given-names>
</name>
<name>
<surname>Yang</surname>
<given-names>L.T.</given-names>
</name>
<name>
<surname>Ma</surname>
<given-names>J.</given-names>
</name>
</person-group>
<publisher-name>IEEE</publisher-name>
<publisher-loc>New York, NY, USA</publisher-loc>
<fpage>128</fpage>
<lpage>135</lpage>
</element-citation>
</ref>
<ref id="b37-sensors-14-04513">
<label>37.</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Diewald</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Roalter</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>Möller</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Kranz</surname>
<given-names>M.</given-names>
</name>
</person-group>
<article-title>Towards a Holistic Approach for Mobile Application Development in Intelligent Environments</article-title>
<conf-name>Proceedings of the 10th International Conference on Mobile and Ubiquitous Multimedia</conf-name>
<conf-loc>Beijing, China</conf-loc>
<conf-date>7–9 November 2011</conf-date>
<fpage>73</fpage>
<lpage>80</lpage>
</element-citation>
</ref>
<ref id="b38-sensors-14-04513">
<label>38.</label>
<element-citation publication-type="webpage">
<article-title>CORDIS EU Research Projects</article-title>
<comment>Available online:
<ext-link ext-link-type="uri" xlink:href="http://cordis.europa.eu/projects/home_en.html">http://cordis.europa.eu/projects/home_en.html</ext-link>
</comment>
<date-in-citation>(accessed on 1 March 2014)</date-in-citation>
</element-citation>
</ref>
<ref id="b39-sensors-14-04513">
<label>39.</label>
<element-citation publication-type="webpage">
<person-group person-group-type="author">
<name>
<surname>Noy</surname>
<given-names>N.F.</given-names>
</name>
<name>
<surname>Mcguinness</surname>
<given-names>D.L.</given-names>
</name>
</person-group>
<article-title>Ontology Development 101: A Guide to Creating Your First Ontology</article-title>
<year>2001</year>
<comment>Available online:
<ext-link ext-link-type="uri" xlink:href="http://www.ksl.stanford.edu/people/dlm/papers/ontology-tutorial-noy-mcguinness-abstract.html">http://www.ksl.stanford.edu/people/dlm/papers/ontology-tutorial-noy-mcguinness-abstract.html</ext-link>
</comment>
<date-in-citation>(accessed on 1 March 2014)</date-in-citation>
</element-citation>
</ref>
<ref id="b40-sensors-14-04513">
<label>40.</label>
<element-citation publication-type="webpage">
<person-group person-group-type="author">
<name>
<surname>Garlik</surname>
<given-names>S.H.</given-names>
</name>
<name>
<surname>Seaborne</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Prud'hommeaux</surname>
<given-names>E.</given-names>
</name>
</person-group>
<article-title>SPARQL 1.1 Query Language</article-title>
<year>2011</year>
<comment>Available online:
<ext-link ext-link-type="uri" xlink:href="http://www.w3.org/TR/sparql11-query/">http://www.w3.org/TR/sparql11-query/</ext-link>
</comment>
<date-in-citation>(accessed on 1 March 2014)</date-in-citation>
</element-citation>
</ref>
<ref id="b41-sensors-14-04513">
<label>41.</label>
<element-citation publication-type="webpage">
<article-title>SPIN-SPARQL Inferencing Notation</article-title>
<year>2010</year>
<comment>Available online:
<ext-link ext-link-type="uri" xlink:href="http://www.topquadrant.com/spin/">http://www.topquadrant.com/spin/</ext-link>
</comment>
<date-in-citation>(accessed on 1 March 2014)</date-in-citation>
</element-citation>
</ref>
<ref id="b42-sensors-14-04513">
<label>42.</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Panagiotopoulos</surname>
<given-names>I.</given-names>
</name>
<name>
<surname>Seremeti</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>Kameas</surname>
<given-names>A.</given-names>
</name>
</person-group>
<article-title>An Alignable User Profile Ontology for Ambient Intelligence Environments</article-title>
<conf-name>Proceedings of the IEEE Intelligent Environments</conf-name>
<conf-loc>Athens, Greece</conf-loc>
<conf-date>16–19 July 2011</conf-date>
<fpage>270</fpage>
<lpage>276</lpage>
</element-citation>
</ref>
<ref id="b43-sensors-14-04513">
<label>43.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Grau</surname>
<given-names>B.C.</given-names>
</name>
<name>
<surname>Horrocks</surname>
<given-names>I.</given-names>
</name>
<name>
<surname>Motik</surname>
<given-names>B.</given-names>
</name>
<name>
<surname>Parsia</surname>
<given-names>B.</given-names>
</name>
<name>
<surname>Patel-Schneider</surname>
<given-names>P.</given-names>
</name>
<name>
<surname>Sattler</surname>
<given-names>U.</given-names>
</name>
</person-group>
<article-title>OWL 2: The next step for OWL</article-title>
<source>Web Semant</source>
<year>2008</year>
<volume>6</volume>
<fpage>309</fpage>
<lpage>322</lpage>
</element-citation>
</ref>
<ref id="b44-sensors-14-04513">
<label>44.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Guerrero</surname>
<given-names>L.A.</given-names>
</name>
<name>
<surname>Vasquez</surname>
<given-names>F.</given-names>
</name>
<name>
<surname>Ochoa</surname>
<given-names>S.F.</given-names>
</name>
</person-group>
<article-title>An Indoor Navigation System for the Visually Impaired</article-title>
<source>Sensors</source>
<year>2012</year>
<volume>12</volume>
<fpage>8236</fpage>
<lpage>8258</lpage>
<pub-id pub-id-type="pmid">22969398</pub-id>
</element-citation>
</ref>
<ref id="b45-sensors-14-04513">
<label>45.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Augusto</surname>
<given-names>J.</given-names>
</name>
</person-group>
<article-title>Ambient intelligence: The confluence of pervasive computing and artificial intelligence</article-title>
<source>Intell. Comput. Everywhere</source>
<year>2007</year>
<fpage>213</fpage>
<lpage>234</lpage>
<pub-id pub-id-type="doi">10.1007/978-1-84628-943-9_11</pub-id>
</element-citation>
</ref>
<ref id="b46-sensors-14-04513">
<label>46.</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Yang</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>Worboys</surname>
<given-names>M.A.</given-names>
</name>
</person-group>
<article-title>Navigation Ontology for Outdoor-Indoor Space: (Work-in-Progress)</article-title>
<conf-name>Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Indoor Spatial Awareness</conf-name>
<conf-loc>New York, NY, USA</conf-loc>
<conf-date>6 November 2011</conf-date>
<fpage>31</fpage>
<lpage>34</lpage>
</element-citation>
</ref>
<ref id="b47-sensors-14-04513">
<label>47.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Augusto</surname>
<given-names>J.C.</given-names>
</name>
<name>
<surname>Hornos</surname>
<given-names>M.J.</given-names>
</name>
</person-group>
<article-title>Software simulation and verification to increase the reliability of Intelligent Environments</article-title>
<source>Adv. Eng. Softw.</source>
<year>2013</year>
<volume>58</volume>
<fpage>18</fpage>
<lpage>34</lpage>
</element-citation>
</ref>
<ref id="b48-sensors-14-04513">
<label>48.</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Compton</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Henson</surname>
<given-names>C.</given-names>
</name>
<name>
<surname>Neuhaus</surname>
<given-names>H.</given-names>
</name>
<name>
<surname>Lefort</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>Sheth</surname>
<given-names>A.</given-names>
</name>
</person-group>
<article-title>A Survey of the Semantic Specification of Sensors</article-title>
<conf-name>Proceedings of the 2nd International Workshop on Semantic Sensor Networks, at 8th International Semantic Web Conference</conf-name>
<conf-loc>Washington, DC, USA</conf-loc>
<conf-date>25–29 October, 2009</conf-date>
</element-citation>
</ref>
<ref id="b49-sensors-14-04513">
<label>49.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Malizia</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Onorati</surname>
<given-names>T.</given-names>
</name>
<name>
<surname>Diaz</surname>
<given-names>P.</given-names>
</name>
<name>
<surname>Aedo</surname>
<given-names>I.</given-names>
</name>
<name>
<surname>Astorga-Paliza</surname>
<given-names>F.</given-names>
</name>
</person-group>
<article-title>SEMA4A: An ontology for emergency notification systems accessibility</article-title>
<source>Expert Syst. Appl.</source>
<year>2010</year>
<volume>37</volume>
<fpage>3380</fpage>
<lpage>3391</lpage>
</element-citation>
</ref>
<ref id="b50-sensors-14-04513">
<label>50.</label>
<element-citation publication-type="book">
<person-group person-group-type="author">
<name>
<surname>Li</surname>
<given-names>X.</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>G.</given-names>
</name>
<name>
<surname>Ling</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Zhan</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>An</surname>
<given-names>N.</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>Sha</surname>
<given-names>Y.</given-names>
</name>
</person-group>
<article-title>Building a Practical Ontology for Emergency Response Systems</article-title>
<source>CSSE (4)</source>
<publisher-name>IEEE Computer Society</publisher-name>
<publisher-loc>Wuhan, Hubei</publisher-loc>
<year>2008</year>
<fpage>222</fpage>
<lpage>225</lpage>
</element-citation>
</ref>
<ref id="b51-sensors-14-04513">
<label>51.</label>
<element-citation publication-type="webpage">
<article-title>Tim Berners-Lee on the next Web</article-title>
<comment>Available online:
<ext-link ext-link-type="uri" xlink:href="http://www.ted.com/talks/tim_berners_lee_-on_the_next_web.html">http://www.ted.com/talks/tim_berners_lee_-on_the_next_web.html</ext-link>
</comment>
<date-in-citation>(accessed on 1 March 2014)</date-in-citation>
</element-citation>
</ref>
<ref id="b52-sensors-14-04513">
<label>52.</label>
<element-citation publication-type="book">
<person-group person-group-type="author">
<name>
<surname>Gilbert</surname>
<given-names>N.</given-names>
</name>
<name>
<surname>Troitzsch</surname>
<given-names>K.G.</given-names>
</name>
</person-group>
<source>Simulation for the Social Scientist</source>
<publisher-name>Open University Press</publisher-name>
<publisher-loc>Berkshire, UK</publisher-loc>
<year>2005</year>
</element-citation>
</ref>
<ref id="b53-sensors-14-04513">
<label>53.</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Benjamin</surname>
<given-names>P.</given-names>
</name>
<name>
<surname>Patki</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Mayer</surname>
<given-names>R.</given-names>
</name>
</person-group>
<article-title>Using Ontologies for Simulation Modeling</article-title>
<conf-name>Proceedings of the 38th Conference on Winter Simulation</conf-name>
<conf-loc>Monterey, CA, USA</conf-loc>
<conf-date>3–6 December, 2006</conf-date>
<fpage>1151</fpage>
<lpage>1159</lpage>
</element-citation>
</ref>
<ref id="b54-sensors-14-04513">
<label>54.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Garcia-Valverde</surname>
<given-names>T.</given-names>
</name>
<name>
<surname>Serrano</surname>
<given-names>E.</given-names>
</name>
<name>
<surname>Botia</surname>
<given-names>J.</given-names>
</name>
</person-group>
<article-title>Combining the real world with simulations for a robust testing of Ambient Intelligence services</article-title>
<source>Artif. Intell. Rev.</source>
<year>2012</year>
<volume>Volume 0</volume>
<fpage>1</fpage>
<lpage>24</lpage>
</element-citation>
</ref>
<ref id="b55-sensors-14-04513">
<label>55.</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Wang</surname>
<given-names>X.H.</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>D.Q.</given-names>
</name>
<name>
<surname>Gu</surname>
<given-names>T.</given-names>
</name>
<name>
<surname>Pung</surname>
<given-names>H.K.</given-names>
</name>
</person-group>
<article-title>Ontology Based Context Modeling and Reasoning using OWL</article-title>
<conf-name>Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops</conf-name>
<conf-loc>Orlando, FL, USA</conf-loc>
<conf-date>24–28 March 2004</conf-date>
<fpage>18</fpage>
</element-citation>
</ref>
<ref id="b56-sensors-14-04513">
<label>56.</label>
<element-citation publication-type="webpage">
<person-group person-group-type="author">
<name>
<surname>Horrocks</surname>
<given-names>I.</given-names>
</name>
<name>
<surname>Patel-Schneider</surname>
<given-names>P.F.</given-names>
</name>
<name>
<surname>Boley</surname>
<given-names>H.</given-names>
</name>
<name>
<surname>Tabet</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Grosof</surname>
<given-names>B.</given-names>
</name>
<name>
<surname>Dean</surname>
<given-names>M.</given-names>
</name>
</person-group>
<article-title>SWRL: A Semantic Web Rule Language Combining OWL and RuleML. W3c member submission, World Wide Web Consortium</article-title>
<year>2004</year>
<comment>Available online:
<ext-link ext-link-type="uri" xlink:href="http://www.w3.org/Submission/SWRL/">http://www.w3.org/Submission/SWRL/</ext-link>
</comment>
<date-in-citation>(accessed on 1 March 2014)</date-in-citation>
</element-citation>
</ref>
<ref id="b57-sensors-14-04513">
<label>57.</label>
<element-citation publication-type="webpage">
<article-title>SWRL Language FAQ website</article-title>
<comment>Available online:
<ext-link ext-link-type="uri" xlink:href="http://protege.cim3.net/cgi-bin/wiki.pl?SWRLLanguageFAQ">http://protege.cim3.net/cgi-bin/wiki.pl?SWRLLanguageFAQ</ext-link>
</comment>
<date-in-citation>(accessed on 1 March 2014)</date-in-citation>
</element-citation>
</ref>
<ref id="b58-sensors-14-04513">
<label>58.</label>
<element-citation publication-type="book">
<person-group person-group-type="author">
<name>
<surname>Millington</surname>
<given-names>I.</given-names>
</name>
<name>
<surname>Funge</surname>
<given-names>J.</given-names>
</name>
</person-group>
<source>Artificial Intelligence for Games</source>
<edition>2nd ed.</edition>
<publisher-name>Morgan Kaufmann Publishers Inc.</publisher-name>
<publisher-loc>San Francisco, CA, USA</publisher-loc>
<year>2009</year>
</element-citation>
</ref>
<ref id="b59-sensors-14-04513">
<label>59.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Garcia-Valverde</surname>
<given-names>T.</given-names>
</name>
<name>
<surname>Campuzano</surname>
<given-names>F.</given-names>
</name>
<name>
<surname>Serrano</surname>
<given-names>E.</given-names>
</name>
<name>
<surname>Villa</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Botia</surname>
<given-names>J.A.</given-names>
</name>
</person-group>
<article-title>Simulation of human behaviors for the validation of Ambient Intelligence services: A methodological approach</article-title>
<source>J. Ambient Intell. Smart Environ.</source>
<year>2012</year>
<volume>4</volume>
<fpage>163</fpage>
<lpage>181</lpage>
</element-citation>
</ref>
<ref id="b60-sensors-14-04513">
<label>60.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Caballero</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Botía</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Gómez-Skarmeta</surname>
<given-names>A.</given-names>
</name>
</person-group>
<article-title>Using cognitive agents in social simulations</article-title>
<source>Eng. Appl. Artif. Intell.</source>
<year>2011</year>
<volume>24</volume>
<fpage>1098</fpage>
<lpage>1109</lpage>
</element-citation>
</ref>
<ref id="b61-sensors-14-04513">
<label>61.</label>
<element-citation publication-type="book">
<person-group person-group-type="author">
<name>
<surname>Erl</surname>
<given-names>T.</given-names>
</name>
</person-group>
<source>Service-Oriented Architecture: A Field Guide to Integrating XML and Web Services</source>
<publisher-name>Prentice Hall PTR</publisher-name>
<publisher-loc>Upper Saddle River, NJ, USA</publisher-loc>
<year>2004</year>
</element-citation>
</ref>
<ref id="b62-sensors-14-04513">
<label>62.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>El-Gayar</surname>
<given-names>O.</given-names>
</name>
<name>
<surname>Deokar</surname>
<given-names>A.</given-names>
</name>
</person-group>
<article-title>A semantic service-oriented architecture for distributed model management systems</article-title>
<source>Decis. Support Syst.</source>
<year>2013</year>
<volume>55</volume>
<fpage>374</fpage>
<lpage>384</lpage>
</element-citation>
</ref>
<ref id="b63-sensors-14-04513">
<label>63.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Corredor</surname>
<given-names>I.</given-names>
</name>
<name>
<surname>Bernardos</surname>
<given-names>A.M.</given-names>
</name>
<name>
<surname>Iglesias</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Casar</surname>
<given-names>J.R.</given-names>
</name>
</person-group>
<article-title>Model-Driven Methodology for Rapid Deployment of Smart Spaces Based on Resource-Oriented Architectures</article-title>
<source>Sensors</source>
<year>2012</year>
<volume>12</volume>
<fpage>9286</fpage>
<lpage>9335</lpage>
<pub-id pub-id-type="pmid">23012544</pub-id>
</element-citation>
</ref>
<ref id="b64-sensors-14-04513">
<label>64.</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Ishida</surname>
<given-names>T.</given-names>
</name>
<name>
<surname>Nakajima</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Murakami</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Nakanishi</surname>
<given-names>H.</given-names>
</name>
</person-group>
<source>Augmented Experiment: Participatory Design with Multiagent Simulation</source>
<conf-name>IJCAI 2007, Proceedings of the 20th International Joint Conference on Artificial Intelligence</conf-name>
<person-group person-group-type="editor">
<name>
<surname>Veloso</surname>
<given-names>M.M.</given-names>
</name>
</person-group>
<conf-loc>Hyderabad, India</conf-loc>
<conf-date>9–12 January 2007</conf-date>
<fpage>1341</fpage>
<lpage>1346</lpage>
</element-citation>
</ref>
<ref id="b65-sensors-14-04513">
<label>65.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Messeguer</surname>
<given-names>R.</given-names>
</name>
<name>
<surname>Molina</surname>
<given-names>C.</given-names>
</name>
<name>
<surname>Ochoa</surname>
<given-names>S.F.</given-names>
</name>
<name>
<surname>Santos</surname>
<given-names>R.M.</given-names>
</name>
</person-group>
<article-title>Reducing energy consumption in human-centric wireless sensor networks</article-title>
<source>SMC. IEEE</source>
<year>2012</year>
<fpage>1473</fpage>
<lpage>1478</lpage>
</element-citation>
</ref>
<ref id="b66-sensors-14-04513">
<label>66.</label>
<element-citation publication-type="book">
<person-group person-group-type="author">
<name>
<surname>Carren̈o</surname>
<given-names>P.</given-names>
</name>
<name>
<surname>Gutierrez</surname>
<given-names>F.</given-names>
</name>
<name>
<surname>Ochoa</surname>
<given-names>S.F.</given-names>
</name>
<name>
<surname>Fortino</surname>
<given-names>G.</given-names>
</name>
</person-group>
<article-title>Using Human-Centric Wireless Sensor Networks to Support Personal Security</article-title>
<source>Internet and Distributed Computing Systems</source>
<person-group person-group-type="editor">
<name>
<surname>Pathan</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Wei</surname>
<given-names>G.</given-names>
</name>
<name>
<surname>Fortino</surname>
<given-names>G.</given-names>
</name>
</person-group>
<publisher-name>Springer</publisher-name>
<publisher-loc>Berlin/Heidelberg, Germany</publisher-loc>
<year>2013</year>
<volume>Volume 8223</volume>
<fpage>51</fpage>
<lpage>64</lpage>
</element-citation>
</ref>
<ref id="b67-sensors-14-04513">
<label>67.</label>
<element-citation publication-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Ochoa</surname>
<given-names>S.F.</given-names>
</name>
<name>
<surname>Santos</surname>
<given-names>R.</given-names>
</name>
</person-group>
<article-title>Human-centric wireless sensor networks to improve information availability during urban search and rescue activities</article-title>
<source>Inf. Fusion</source>
<year>2013</year>
<comment>in Press</comment>
</element-citation>
</ref>
<ref id="b68-sensors-14-04513">
<label>68.</label>
<element-citation publication-type="webpage">
<article-title>Jena—A Semantic Web Framework for Java</article-title>
<year>2002</year>
<comment>Available online:
<ext-link ext-link-type="uri" xlink:href="http://jena.sourceforge.net/index.html">http://jena.sourceforge.net/index.html</ext-link>
</comment>
<date-in-citation>(accessed on 1 March 2014)</date-in-citation>
</element-citation>
</ref>
<ref id="b69-sensors-14-04513">
<label>69.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Serrano</surname>
<given-names>E.</given-names>
</name>
<name>
<surname>Rovatsos</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Botia</surname>
<given-names>J.A.</given-names>
</name>
</person-group>
<article-title>Data mining agent conversations: A qualitative approach to multiagent systems analysis</article-title>
<source>Inf. Sci.</source>
<year>2013</year>
<volume>230</volume>
<fpage>132</fpage>
<lpage>146</lpage>
</element-citation>
</ref>
<ref id="b70-sensors-14-04513">
<label>70.</label>
<element-citation publication-type="book">
<person-group person-group-type="author">
<name>
<surname>Abrahamsson</surname>
<given-names>P.</given-names>
</name>
<name>
<surname>Salo</surname>
<given-names>O.</given-names>
</name>
<name>
<surname>Ronkainen</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Warsta</surname>
<given-names>J.</given-names>
</name>
</person-group>
<source>Agile Software Development Methods</source>
<publisher-name>Technical Report; VTT Publications</publisher-name>
<publisher-loc>Espoo, Finland</publisher-loc>
<year>2002</year>
</element-citation>
</ref>
<ref id="b71-sensors-14-04513">
<label>71.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Fernández-López</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Gómez-Pérez</surname>
<given-names>A.</given-names>
</name>
</person-group>
<article-title>Overview and analysis of methodologies for building ontologies</article-title>
<source>Knowl. Eng. Rev.</source>
<year>2002</year>
<volume>17</volume>
<fpage>129</fpage>
<lpage>156</lpage>
</element-citation>
</ref>
<ref id="b72-sensors-14-04513">
<label>72.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Coronato</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Pietro</surname>
<given-names>G.D.</given-names>
</name>
</person-group>
<article-title>Formal Design of Ambient Intelligence Applications</article-title>
<source>IEEE Comput.</source>
<year>2010</year>
<volume>43</volume>
<fpage>60</fpage>
<lpage>68</lpage>
</element-citation>
</ref>
<ref id="b73-sensors-14-04513">
<label>73.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Yang</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>Q.</given-names>
</name>
</person-group>
<article-title>Inertial Sensor-Based Methods in Walking Speed Estimation: A Systematic Review</article-title>
<source>Sensors</source>
<year>2012</year>
<volume>12</volume>
<fpage>6102</fpage>
<lpage>6116</lpage>
<pub-id pub-id-type="pmid">22778632</pub-id>
</element-citation>
</ref>
<ref id="b74-sensors-14-04513">
<label>74.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Serrano</surname>
<given-names>E.</given-names>
</name>
<name>
<surname>Munoz</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Botia</surname>
<given-names>J.</given-names>
</name>
</person-group>
<article-title>An approach to debug interactions in multi-agent system software tests</article-title>
<source>Inf. Sci.</source>
<year>2012</year>
<volume>205</volume>
<fpage>38</fpage>
<lpage>57</lpage>
</element-citation>
</ref>
<ref id="b75-sensors-14-04513">
<label>75.</label>
<element-citation publication-type="webpage">
<article-title>UbikSim website</article-title>
<comment>Available online:
<ext-link ext-link-type="uri" xlink:href="https://github.com/emilioserra/UbikSim/wiki">https://github.com/emilioserra/UbikSim/wiki</ext-link>
</comment>
<date-in-citation>(accessed on 1 March 2014)</date-in-citation>
</element-citation>
</ref>
<ref id="b76-sensors-14-04513">
<label>76.</label>
<element-citation publication-type="webpage">
<article-title>GNU General Public License, version 3</article-title>
<year>2007</year>
<comment>Available online:
<ext-link ext-link-type="uri" xlink:href="http://www.gnu.org/licenses/gpl.html">http://www.gnu.org/licenses/gpl.html</ext-link>
</comment>
<date-in-citation>(accessed on 1 March 2014)</date-in-citation>
</element-citation>
</ref>
<ref id="b77-sensors-14-04513">
<label>77.</label>
<element-citation publication-type="journal">
<person-group person-group-type="author">
<name>
<surname>Munoz</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Serrano</surname>
<given-names>E.</given-names>
</name>
<name>
<surname>Villa</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Valdés</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Botía</surname>
<given-names>J.A.</given-names>
</name>
</person-group>
<article-title>An Approach for Representing Sensor Data to Validate Alerts in Ambient Assisted Living</article-title>
<source>Sensors</source>
<year>2012</year>
<volume>12</volume>
<fpage>6282</fpage>
<lpage>6306</lpage>
<pub-id pub-id-type="pmid">22778642</pub-id>
</element-citation>
</ref>
<ref id="b78-sensors-14-04513">
<label>78.</label>
<element-citation publication-type="webpage">
<article-title>EscapeSim website</article-title>
<comment>Available online:
<ext-link ext-link-type="uri" xlink:href="https://github.com/gsi-upm/EscapeSim">https://github.com/gsi-upm/EscapeSim</ext-link>
</comment>
<date-in-citation>(accessed on 1 March 2014)</date-in-citation>
</element-citation>
</ref>
<ref id="b79-sensors-14-04513">
<label>79.</label>
<element-citation publication-type="webpage">
<article-title>EscapeSim for evaluating emergency plans in a hotel</article-title>
<comment>Available online:
<ext-link ext-link-type="uri" xlink:href="http://www.youtube.com/watch?v=4h1frI3mU1A&hl=fr&cclang_pref=fr&ccload_policy=1">http://www.youtube.com/watch?v=4h1frI3mU1A&hl=fr&cclang_pref=fr&ccload_policy=1</ext-link>
</comment>
<date-in-citation>(accessed on 1 March 2014)</date-in-citation>
</element-citation>
</ref>
<ref id="b80-sensors-14-04513">
<label>80.</label>
<element-citation publication-type="webpage">
<article-title>THOFU (Tecnologías para el HOtel del FUturo)</article-title>
<comment>Available online:
<ext-link ext-link-type="uri" xlink:href="http://www.thofu.es/">http://www.thofu.es/</ext-link>
</comment>
<date-in-citation>(accessed on 1 March 2014)</date-in-citation>
<comment>Reference: CEN-2010-1019</comment>
</element-citation>
</ref>
<ref id="b81-sensors-14-04513">
<label>81.</label>
<element-citation publication-type="webpage">
<article-title>Case study experiments, additional material</article-title>
<comment>Available online:
<ext-link ext-link-type="uri" xlink:href="http://www.dit.upm.es/eserrano/EscapeSimExperiments">http://www.dit.upm.es/eserrano/EscapeSimExperiments</ext-link>
</comment>
<date-in-citation>(accessed on 1 March 2014)</date-in-citation>
</element-citation>
</ref>
</ref-list>
</back>
<floats-group>
<fig id="f1-sensors-14-04513" position="float">
<label>Figure 1.</label>
<caption>
<p>A holistic framework for the evaluation of emergency plans.</p>
</caption>
<graphic xlink:href="sensors-14-04513f1"></graphic>
</fig>
<fig id="f2-sensors-14-04513" position="float">
<label>Figure 2.</label>
<caption>
<p>Details of the emergency service in the holistic framework for the evaluation of emergency plans.</p>
</caption>
<graphic xlink:href="sensors-14-04513f2"></graphic>
</fig>
<fig id="f3-sensors-14-04513" position="float">
<label>Figure 3.</label>
<caption>
<p>Methodology for the development, extension and use of the holistic framework. ABSS, agent-based social simulation; SOA, service-oriented architecture.</p>
</caption>
<graphic xlink:href="sensors-14-04513f3"></graphic>
</fig>
<fig id="f4-sensors-14-04513" position="float">
<label>Figure 4.</label>
<caption>
<p>Designing an indoor space model with UbikSim.</p>
</caption>
<graphic xlink:href="sensors-14-04513f4"></graphic>
</fig>
<fig id="f5-sensors-14-04513" position="float">
<label>Figure 5.</label>
<caption>
<p>Using UbikSim for the emergency plan evaluation (the definition of the space model is in the (
<bold>top</bold>
) panel, and the caption of a simulation is in the (
<bold>bottom</bold>
) panel).</p>
</caption>
<graphic xlink:href="sensors-14-04513f5"></graphic>
</fig>
<fig id="f6-sensors-14-04513" position="float">
<label>Figure 6.</label>
<caption>
<p>Experimental results with EscapeSim.</p>
</caption>
<graphic xlink:href="sensors-14-04513f6"></graphic>
</fig>
</floats-group>
</pmc>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Ticri/CIDE/explor/TelematiV1/Data/Pmc/Corpus
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 000546 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/Pmc/Corpus/biblio.hfd -nk 000546 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Ticri/CIDE
   |area=    TelematiV1
   |flux=    Pmc
   |étape=   Corpus
   |type=    RBID
   |clé=     PMC:4003955
   |texte=   Towards a Holistic Framework for the Evaluation of Emergency Plans in Indoor Environments
}}

Pour générer des pages wiki

HfdIndexSelect -h $EXPLOR_AREA/Data/Pmc/Corpus/RBID.i   -Sk "pubmed:24662453" \
       | HfdSelect -Kh $EXPLOR_AREA/Data/Pmc/Corpus/biblio.hfd   \
       | NlmPubMed2Wicri -a TelematiV1 

Wicri

This area was generated with Dilib version V0.6.31.
Data generation: Thu Nov 2 16:09:04 2017. Site generation: Sun Mar 10 16:42:28 2024