D5.6 Implementation and Verification of Information Routing and Social Apps, Version 2


Massimo Cristaldi, Federico Sangiorgio, Greg Holdridge, Marc-André Kaufhold


This technical document provides an updated version of implementation and verification activities performed after D5.5 publication. The main components of the EmerGent IT system analysed in this document are the EmerGent Mobile APP (EMA) and ES interface (ESI), even if additional components such as the Dissemination Service (DS) and the Processing and Analysis Subsystem (PAS) are briefly described to explain how they interact with EMA and ESI. Information Routing (IR) is described in detail in D5.5. This deliverable follows the same structure presented in D5.5 with two main sections that describe implementation and verification activities performed in T5.5 and T5.6. Implementation and verification tasks follow the structure of the main workflows identified and explained in D6.1 (C2A direct, C2A indirect and A2C).

For what concerns the first section, all implementation progresses performed for EMA and ESI are described with a complete deployment diagram which reflects development and verification environments and highlights each subcomponent implemented. Data protection issues occurred during the development phase are analysed as well.The second section reports results obtained during verification activities. Those activities have been approached following verification guidelines produced in T6.2 and they are focused to verify each main component described in this document in terms of functionalities and, where possible, in terms of performances (for additional information about verification approaches developed in EmerGent please refer to D6.2). Conclusions reports about further activities foreseen till the end of the project.

Purpose of the Document

This deliverable contributes to Objective O2 and O3 of EmerGent: “show the positive impact of mining, information quality, information gathering, and information routing for social media in emergencies” and “identify requirements, to implement, and to evaluate methods and tools for novel emergency management in social media generation”. A successful verification of the developed subsystems is the prerequisite to start with the validation and evaluation activities (T6.2 and 6.4)