Next Article in Journal
Smart Boxing Glove “RD α”: IMU Combined with Force Sensor for Highly Accurate Technique and Target Recognition Using Machine Learning
Next Article in Special Issue
Medical Application of Big Data: Between Systematic Review and Randomized Controlled Trials
Previous Article in Journal
A Semantic Framework for Decision Making in Forest Fire Emergencies
Previous Article in Special Issue
A Network Analysis Approach to Detecting Social Issues with Web-Based Data
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Research on the Quality Evaluation Method of Mobile Emergency Big Data Based on the Measure of Medium Truth Degree

1
School of Economics and Management, Xi’an University of Technology, Xi’an 710054, China
2
International Business School, Shaanxi Normal University, Xi’an 710048, China
*
Authors to whom correspondence should be addressed.
Appl. Sci. 2023, 13(16), 9072; https://doi.org/10.3390/app13169072
Submission received: 24 May 2023 / Revised: 4 August 2023 / Accepted: 7 August 2023 / Published: 8 August 2023
(This article belongs to the Special Issue Recent Advances in Big Data Analytics)

Abstract

:
Mobile emergency services are better able to meet the needs of frequent public emergencies; however, their data quality problems seriously affect decision-making. In order to reduce the interference of low-quality data and solve the problem of data quality ambiguity, this paper first summarizes the five characteristics of mobile emergency big data. Second, based on the characteristics of mobile emergency big data, four data quality dimensions are defined with reference to existing research and national standards and combined with the measure of medium truth degree to give single-dimension and multi-dimension data quality truth degree measure models. Finally, a subjective-objective, qualitative-quantitative mobile emergency big data quality evaluation method based on the measure of medium truth degree is formed. The validity and practicality of the method are also verified by examples of algorithmic analysis of fire text datasets from Australian mountain fire data and the Chinese Emergency Incident Corpus. The experiments show that the method can realize quantitative mobile emergency big data quality assessment, solve the problem of data quality ambiguity, and reduce the interference of low-quality data, so as to save resources and improve the analysis and decision-making ability.

1. Introduction

In recent years, global public emergencies have occurred frequently, and traditional fixed emergency services have found it difficult to meet the complex and dynamic emergency needs. Mobile emergency services, on the other hand, can realize emergency command, on-site diagnosis and treatment, even disposal, material delivery, engineering construction, and other emergency services regardless of geographical location because of the advantages of variable location, mobility, flexibility, and forward decision-making, supporting rapid planning of emergency response beforehand, extremely fast execution of emergency services during the event, and rapid feedback of emergency results afterward. Given the immediacy, agility, and accuracy of mobile emergency services in emergency command and emergency protection, it inspires the attention and research of many scholars.
Among them, Li et al. [1] discussed mobile emergency material distribution and mobile emergency facility location settings. Kirci et al. [2] developed mobile applications to collect information before and after an earthquake. Cicek and Kantarci [3] provide a systematic review of mobile swarm intelligence techniques for disaster management. Since disasters are dynamically propagated, Medeiros et al. [4] established a group energy-sensing UAV system to manipulate the UAV to collect information about moving and changing objects and people. Lin et al. [5] used intelligent robots to detect and rescue people during earthquakes. Huang et al. [6] studied the emergency medical rescue vehicle-mounted mobile CT to solve the problem of remote mountainous and high-altitude areas with sudden natural disasters. After a disaster, the convenient, flexible, and responsive characteristics of UAVs are well suited for post-disaster package delivery, communication support, and other tasks that allow for rapid recovery of disaster areas [7]. Mobile devices running intensive applications throughout mobile emergency services can be resource constrained, and mobile edge computing can overcome this problem [8]. For example, mobile devices generate a large amount of data in applications with huge energy losses. To solve the energy consumption problem, Li et al. [9] proposed an energy-aware task offloading algorithm with deadline constraints in mobile edge computing to reduce the energy consumption of mobile devices. However, offloading workflow tasks to mobile edge computing servers is vulnerable to external security threats. Huang et al. [10] proposed a secure and energy-efficient offloading strategy for computation (SEECO) to address the security issue. It is clear from this that there has been a small amount of research on mobile emergency response, but research on mobile emergency data quality has not been addressed. Mobile emergency big data also has the “3V” characteristics of big data, and quality assessment can not only filter errors and poor quality data but also find the source of data problems based on low-quality data, which can help to improve the speed of analysis of subsequent data and the accuracy of decision-making judgment.
Since there is still a gap in the quality evaluation of mobile emergency big data, studies on emergency data evaluation are being sorted out. Among them, Daneshkohan et al. [11] used a questionnaire and SPSS software to analyze data quality in primary health care; Peterson et al. [12] used an expert review method to evaluate the quality of emergency data on websites; Mehrdad et al. [13] used a questionnaire and SPSS software to evaluate the accuracy, completeness, timeliness, clarity, and accessibility; all these methods are subjective evaluations; there is a subjective color, not an objective color, and the results are not reliable enough. So, how to evaluate objectively and quantitatively is the problem to be solved. Drawing on research in data quality, multiple data dimensions are used to quantitatively evaluate data quality by combining subjective and objective assignments. Among them, Zhao Xing et al. [14] proposed a full data quality assessment method based on quality standard metrics based on the combined subjective and objective weights; Mashoufi et al. [15] used an objective method to assess the data quality of emergency medical services; Wang Mingzheng et al. [16] used an AHP-based integrated determination method of multiple indicator weights to qualitatively and quantitatively analyze and quantify data quality; and Han Kyungwoo et al. [17] proposed a fact-based quality assessment method to assess the quality of Web document content data. The above methods determine different quality dimensions and indicators for different data, but they do not take into account the fuzzy nature of data quality and cannot evaluate the data meticulously and scientifically. And, to deal with the fuzzy phenomenon prevailing in engineering practice and scientific research, Hong Long et al. [18] established a method to measure the degree of logical truth value, namely MMTD (measure of medium truth degree), in the context of a mediated mathematical system, which can solve the fuzzy problem of data quality and was extended to the exploration of big data quality by Zhong Suyang [19]. An objective and quantitative data quality evaluation method has been formed and has been applied in several fields. Among them, typical ones include Cheng Weiqing et al. [20], who formed a non-intrusive single-ended objective evaluation method for predicting VoIP perceived service quality based on truth degree and stream characteristics to evaluate network call quality; Pan Xi et al. [21], who combined fuzzy mathematical evaluation methods to assess software quality; and Tang Ying et al. [22], who combined entropy theory to establish a comprehensive evaluation method for mediated truth degree to assess the quality of residential projects. Such data quality evaluation methods based on MMTD have been recognized in various fields and also provide a referenceable experience for conducting mobile emergency big data quality analysis.
In this paper, a quality evaluation method for mobile emergency big data based on the combination of subjective and objective, qualitative, and quantitative analysis of MMTD is proposed. First, the characteristics of mobile emergency big data are summarized and analyzed according to the existing research status in mobile emergency. Then, the data quality dimensions are determined by combining the Information Technology Data Quality Evaluation Index (GB/T 36344-2018) and the characteristics of mobile emergency big data, and then each dimension of the data quality is analyzed qualitatively by using mediating logic and fuzzy hierarchical analysis, and the function value formula of each dimension is designed, which will make a good preparation. Then, mediator logic and fuzzy hierarchical analysis are utilized to qualitatively analyze the dimensions of data quality, and the function formula of each dimension is designed to pave the way for quantitative evaluation of mobile emergency big data. Finally, the mediator truth degree measure is used to establish single-dimension and multi-dimension evaluation models for mobile emergency big data, and an example analysis is carried out to verify the effectiveness of this method in solving the ambiguity of data quality. By evaluating data quality, emergency responders can directly discard low-quality data in rescue work, thus reducing interference and speeding up analysis and decision-making. In addition, the low-quality data can be analyzed after the disaster to find the reasons for its low quality, so as to provide a good basic guarantee for the next disaster relief.

2. Feature Analysis of Mobile Emergency Big Data

In the process of mobile emergency services, big data resources not only come from spatiotemporal data, disaster data, natural geographic data, and socio-economic data formed by emergencies but also include a large amount of data information generated by mobile emergency facilities that provide emergency command, on-site diagnosis and treatment, even disposal, material delivery, engineering construction, and other services. This kind of data has the basic characteristics of big data, such as large scale, many kinds, fast update speed, and low-value density. And, due to the suddenness, complexity, randomness, and uncertainty of emergency events, it also has the unique characteristics of strong data proliferation, large data variability, and weak data integrity.

2.1. Strong Data Surge

The proliferation of mobile emergency big data comes from the suddenness of emergencies on the one hand, and emergencies have a certain degree of concealment and chance, and the process of generation is all relatively sudden. As shown in Figure 1, it is difficult to predict the time, situation, and scale of its occurrence. And, at the moment of the event, it often causes the sudden activation of mobile emergency facilities, while the preparation stage of mobile emergency needs the support of data resources related to the emergency, and the first operation of many kinds of mobile emergency services will also form a large amount of data information far beyond the usual. On the other hand, mobile emergency facilities will be fully mobilized to save lives and properties after the formation of an emergency disposal plan and response strategy. This will suddenly add a large amount of process information and process data, especially in the mid-event segment where mobile emergencies generate sudden and unpredictable phase tasks that will also lead to a surge in data volume.

2.2. High Data Variability

Mobile emergency big data, which is mainly based on mobile emergency facility information and its related scheduling, decision-making, process, and status, is in a “quiet state” when there is no emergency response service, and the data volume tends to be calm and fluctuates little. However, there is a surge in the occurrence of emergency events and the first service, especially in the mid-event stage when the frequency of updating, integration, and correction of data resources is greatly accelerated due to frequent mobile emergency decision-making and dispatching, thus showing a significant shock and rapid changes in data volume. And, it may be subject to greater changes brought by the entry of external mobile emergency facilities until the incident is effectively handled and enters the post-incident phase before the data volume stabilizes and rapidly decreases to daily scale data volume after the last service. Usually, the reduction of mobile emergency big data at the moment of the last service is the sum of the increase at the moment of the emergency and the moment of the first service, while only a specific area shows high frequency and large shocks in the mid-event phase.

2.3. Data Integrity Is Weak

Mobile emergency big data weakens the integrity of data due to the suddenness and high unpredictability of emergencies. This is mainly reflected in the sudden moment of disaster, when part of the video, audio, and image information, etc., cannot be collected in time, and because there are inevitably areas that cannot be covered by information collection equipment and practical scenarios that are difficult to implement by high-tech means, thus causing the shortage of mobile emergency big data in terms of basic data reserves. In addition to this, mobile emergency service systems usually have limited storage capacity to improve portability and mobility, and rolling storage restricts the integrity of data. In particular, emergency services are often under the jurisdiction of different administrative departments, and original data are lost to varying degrees after multiple parties and multi-level data fusion or integration. More importantly, the unsound information exchange mechanism at the beginning of the construction of mobile emergency systems also leads to a lack of integrity to some extent.

2.4. Large Amount of Data Processed

An important component of mobile emergency big data is the processing data generated by mobile emergency equipment such as drones, emergency rescue vehicles, and emergency robots that are frequently deployed after an emergency event. Compared with traditional fixed equipment, mobile emergency equipment has the advantages of mobile flexibility, rapid support, and easy operation. It also fully supports the rapid collection of data on disaster status, emergency processes, etc., so that the implementation of emergency response strategies can be traced at any time. Such big data include process link data, execution process data, disaster status data, rescue status data, etc. It is usually characterized as a diverse time series with spatial attributes, and time is used as a link to reflect the different stages of mobile emergency services to assist in immediate and accurate emergency decision-making.

2.5. High Data Correlation

Traditional fixed emergency equipment can only collect data within its limited scope, or even only observe the side or part of things at the time of the disaster, not being able to obtain information from multiple perspectives, and the resulting data is somewhat one-sided. In contrast, in mobile emergency scenarios, all kinds of data resources not only exist in the time dimension of development clues but also retain location relationships in space. And it also stores information chains from various mobile emergency devices, which are cross-fused with each other at the point of time and on the spatial plane and are closely connected with the development of events and the progress of rescue. The degree of its data relevance is much higher than that of finance, transportation, and agriculture, especially given the large amount of process data that constantly records the development direction and change trend of disaster situations that rely on each other, support each other, and are closely related.

3. Theory of Measure of Medium Truth Degree

In 2006, based on the treatment method proposed by Zadeh [23] to solve the problem of fuzzy phenomena and the principle of mediation proposed by Zhu [24], Hong [18] proposed the method of measuring medium truth degree and the method of establishing the relationship between the numerical value and the predicate truth degree value after numericalization. Since there will be transition intervals in the process of data evaluation in which there is a fuzzy phenomenon, the evaluation of the data will not be detailed and accurate enough. This method can deal with the fuzzy problem in the process of data evaluation and process the data qualitatively and quantitatively to evaluate the data more accurately.
For the measure of the truth value and degree value of good or bad of a single indicator, if the set X = x 1 , x 2 , x 3 , , x l is the set of this indicator, the subsets T P n and F P n satisfy: f ( x ) T R ( x ) and f ( x ) F R ( x ) , f is some function of this indicator and the degree of good or bad, and the predicate R , and the good or bad of R can measure the degree of good or bad of this indicator. If the predicate + R means particularly bad, R means bad, R means good, + R means particularly good, and R means transition between bad and good degrees, then in the “true value region” T and “false value region” F , there are standard degrees α T and α F corresponding to R and R . According to the truth-value correspondence between the values and predicates in Figure 2, by calculating the distance ratio function h T : f ( x ) P between this indicator x and the predicate R , the degree of truth value relative to the good degree of the indicator can be obtained.
h T ( y ) = d ( y , α F ε F ) / d ( α T ε T , α F ε F ) , y < α F ε F 0 ,     α F ε F y α F + ε F d ( y , α F + ε F ) / d ( α T ε T , α F + ε F ) , α F + ε F < y < α T ε T 1 ,     α T ε T y α T + ε T d ( y , α F + ε F ) / d ( α T + ε T , α F + ε F ) , y > α T + ε T
The quality evaluation process of mobile emergency big data studied in this paper is shown in the following Figure 3:

4. Mobile Emergency Big Data Evaluation Model

According to the “Information Technology Data Quality Evaluation Index (GB/T 36344-2018)”, data quality usually includes normality, completeness, accuracy, consistency, accessibility, and timeliness. For mobile emergency big data, with its strong proliferation, high variability, weak integrity, high process volume, and high correlation, the consistency of data is often incorporated into normality to be solved by designing a standardized data expression scheme, while accessibility is because mobile emergency big data will reach interoperability after the establishment of an information exchange mechanism is completed to support mutual access operations between each other. Therefore, with the support of the mediated truth degree measure MMTD, this paper is based on the description and design of the dimensions of data accuracy and precision according to Zhao et al. [14]. Considering the multi-source heterogeneity of the data and the main dimensions involved, the following four dimensions are set as the quality judgment criteria, and the four dimensions are defined and designed in more detail in terms of structured, semi-structured, and unstructured, respectively.

4.1. Mobile Big Data Quality Dimension Setting

According to the “Information Technology Data Quality Evaluation Index (GB/T 36344-2018)”, data quality usually includes normality, completeness, accuracy, consistency, accessibility, and timeliness. For mobile emergency big data, with its strong proliferation, high variability, weak integrity, high process volume, and high correlation, the consistency of data is often incorporated into normality to be solved by designing a standardized data expression scheme, while accessibility is due to the fact that mobile emergency big data will reach interoperability after the establishment of an information exchange mechanism is completed to support mutual access operations between each other. Therefore, the following four dimensions are set as quality criteria with the support of the mediated truth degree measure, MMTD.
(1) Normative dimension. If structured data resources are considered data entities with multiple attributes, the merit of each data entity can be measured by the distance ratio of its attribute value criterion according to MMTD. Therefore, let the data have n attributes. For the j th attribute R i j of the i th data, its attribute value can be written as T [ R i j ] . Using G ( R i j ) to denote the normality function of the R i j attribute, which is expressed as the degree of the R i j attribute satisfying the j th norm, the G ( R i j ) default value is 0. When T [ R i j ] is structured data (i.e., ( T [ R i j ] ) holds), T [ R i j ] is detected as conforming to template P j by the m a t c h ( ) · operator, then G ( R i j ) = 1 . When T [ R i j ] is unstructured or semi-structured data, it is 1 if the specification is satisfied after preprocessing. In this regard, given the j th attribute with weight r j T , there is a data normality function B 1 ( R i ) :
B 1 ( R i ) = i f f ( ( T [ R i j ] ) , j = 1 n r j T G ( R i j ) = m a t c h ( T [ R i j ] , P j ) ,   i f f ( G ( R i j ) = n u l l , 1 , 0 ) )
(2) Integrity dimension. The degree of completeness of the attribute value T [ R i j ] for the j th attribute R i j is reflected in two ways: When ( T [ R i j ] ) holds, completeness is expressed as the inverse of the missing rate of the structured data, and the missing rate is the number of attribute entries with missing values as a percentage of the total data volume; and when T [ R i j ] is unstructured or semi-structured data, the data is preprocessed so that completeness is expressed as the inverse of the mean of the ratio of the missing feature data in bytes to the total number of features of the unstructured or semi-structured data. Where the feature data are inscribed by the feature target ρ o , feature prerequisites ρ p , feature sentences/patterns ρ s , feature constraints ρ c , and feature content ρ t that embody key summary information. Given that α ( ρ 1 , ρ 2 , , ρ τ ) denotes the count of the front α not satisfying the back τ characteristics ρ τ , then there is a data completeness function B 2 ( R i ) is as follows:
B 2 ( R i ) = i f f ( ( T [ R i j ] ) , 1 j = 1 n ( T [ R i j ] = n u l l ) / n ,   1 j = 1 n ( T [ R i j ] ( ρ o , ρ p , ρ s , ρ c , ρ t ) / | ρ τ | ) / n )
(3) Accuracy dimension. The degree of accuracy of the attribute value T [ R i j ] for the j th attribute R i j is reflected as two aspects, when ( T [ R i j ] ) holds, let T * [ R i j ] denote the true value, and the accuracy is expressed as the inverse of the maximum relative error | T [ R i j ] T * [ R i j ] | / T * [ R i j ] of multiple attribute values, and this error satisfies the error transfer under mathematical operations; when T [ R i j ] is unstructured or semi-structured data, the data are preprocessed, and the accuracy is expressed as the product of the size of the data resource framework construct satisfying r d f ( T [ R i j ] ) and the similarity of the data content Z ( R i j ) . Where r d f ( T [ R i j ] ) is calculated as the compatibility of unstructured data with the schema of a particular RDF framework, the content similarity is then used in a bytewise manner to calculate the cosine similarity of the angle between the summary Ω ( T [ R i j ] ) and the summary truth value. Thus, there is a data accuracy function B 3 ( R i ) :
B 3 ( R i ) = i f f ( ( T [ R i j ] ) , 1 max ( | T [ R i j ] T * [ R i j ] | / T * [ R i j ] ) , Z ( R i j ) ) Z ( R i j ) = r d f ( T [ R i j ] ) [ Ω ( T [ R i j ] ) · Ω * ( T [ R i j ] ) ] / ( | | Ω ( T [ R i j ] ) | | · | | Ω * ( T [ R i j ] | | ) )
(4) Timeliness dimension. The timeliness for the i th data [25] is the difference between the ratio of the data transmission time to the effective time and one. Where D S T is the data sending time, D R T is the data receive time, D E T is the data cutoff time, D R T D S T is the data transmission time duration, and D E T D R T is the data validity time duration. The data transfer time duration can be expressed as the file size F S and network speed N S which is the ratio of D R T D S T = F S / N S . The data validity time can be determined according to the time constraint specified in the relevant regulations, while the value of the data timeliness function is the value between zero and the timeliness value, or the maximum value between zero and the timeliness value. Then, there is the data timeliness function B 4 ( R i ) , as follows:
B 4 ( R i ) = m a x 0 , 1 ( D R T D S T ) / ( D E T D R T )

4.2. Single-Dimensional Truth Degree Measurement Model

The evaluation result of a single dimension of mobile emergency big data is a continuous value, and there is a transition interval that cannot be simply expressed in a way that is easy to understand. Therefore, after setting the quality dimension, it is necessary to calculate the degree of truth value of the data according to the correspondence between value and predicate and combine the dimension function and distance ratio function so as to determine the degree of data quality. Form a single-dimensional truth degree measurement model.

4.2.1. Mobile Emergency Big Data Quality True Value Degree

For any of the dimensions of normality, completeness, accuracy, and timeliness, with the help of MMTD formal logic, let the set X = x 1 , x 2 , x 3 , , x l be the set of mobile emergency big data, and f be some function of data and quality degree. Its quality predicate is W , and the high or low degree of W can measure the quality of mobile emergency big data. If the quality predicate + W for particularly low degree, W for low degree, W for high degree, + W for a particularly high degree, and W for the transition between a high and low degree is noted. Then, there are standard degrees α T and α F , corresponding to W and W in the “true value region” T , and the “false value region” F . Figure 4 shows the correspondence between the values, and Table 1 shows the correspondence between predicates and quality levels.

4.2.2. Big Data Quality Measurement Model

The distance ratio function h T : f ( X ) R relative to W , when B k R i = f ( x ) f ( X ) is taken is as follows:
h T ( B k R i ) = d ( B k R i , α F ε F ) / d ( α T ε T , α F ε F ) , B k R i < α F ε F 0 , α F ε F B k R i α F + ε F d ( B k R i , α F + ε F ) / d ( α T ε T , α F + ε F ) , α F + ε F < B k R i < α T ε T 1 , α T ε T B k R i α T + ε T d ( B k R i , α F + ε F ) / d ( α T + ε T , α F + ε F ) , B k R i > α T + ε T
h T ( B k R i ) is the distance ratio function [17], and the truth degree value can be obtained from Equation (5), where d ( a , b ) = k = 1 n ( a k b k ) 2 1 / 2 is the Euclidean distance ( d ( a , b ) = a b in a one-dimensional case). Taking normalization as an example, according to the truth degree value and Figure 2, it can be seen that when B 1 R i < α F ε F and f ( x ) are in the + W region, the truth degree value is very small, and the farther away from the W region, the lower the normalization degree of data. When   α F ε F B 1 R i α F + ε F is in the ww region, f ( x ) is in the W region, and the truth degree value of the data is small, indicating that the normalization degree of the data is low. When α F + ε F < B 1 R i < α T ε T is in the ww region, f ( x ) is in the W region, and the farther it is from the W region, the greater the truth degree value, indicating the higher the normalization degree of data. 0 < h T ( B k R i ) 0.5 indicates that the normative degree of data is relatively low; 0.5 < h T ( B k R i ) < 1 indicates that the normative degree of data is lower than higher. When α T ε T B 1 R i α T + ε T is in the ww region, f ( x ) is in the W region, the degree of truth value of data is large, and the degree of normalization of the data is high. When B 1 R i > α T + ε T is in the + W region, f ( x ) has a very large degree of truth value and a particularly high degree of normalization of the data. Moreover, the farther away from the W region, the larger the degree of truth value and the higher the degree of normalization of the data.
In addition, for the integrity, accuracy, and timeliness of mobile emergency big data, B 1 R i in the above model for normality can be replaced by B 2 R i , B 3 R i , and B 4 R i , respectively, which means that the corresponding integrity measurement model, accuracy measurement model, and timeliness measurement model can be obtained.

4.3. Multidimensional Truth Degree Measurement Model

For a comprehensive and complete evaluation of the data, simple integration of four dimensions such as normalization, completeness, accuracy, and timeliness can be carried out; that is, weights are assigned to the truth degree values of each single-dimensional measurement model. Then, the comprehensive results of multidimensional truth degree measurement are obtained by weighting, and then the truth degree measurement of batch data is obtained by averaging. Set a batch of mobile emergency data with a total of l data items, and weight the i -th data in four dimensions. If the weight of each dimension is C 1 , C 2 , C 3 , C 4 and the sum of all dimensions is one, the measurement of the quality multidimensional truth degree of the i -th mobile emergency big data can be obtained, as shown in Equation (6). If the l multidimensional measurement models are averaged, U M = i l U i / l then the multi-dimensional truth degree value of the quality of the whole batch of mobile emergency big data can be obtained.
U i = C 1 × h T B 1 R i + C 2 × h T B 2 R i + C 3 × h T B 3 R i + C 4 × h T B 4 R i

5. Case Analysis

To test the effectiveness of the mobile emergency big data model, the Australian mountain fire data from the NASA website “https://www.kaggle.com/datasets/carlosparadis/fires-from-space-australia-and-new-zeland (accessed on 26 April 2023)” and the Chinese fire text dataset from the Critical Incident Corpus “https://github.com/shijiebei2009/CEC-Corpus (accessed on 26 April 2023)” were used as research objects. Among them, the Australian mountain fire dataset records mountain fire information up to 183,593 data points, and 135 structured data points from January 2020 are selected as the research object for quick calculation; the fire text dataset contains 75 unstructured data points. The quality function values of the selected data were obtained according to the evaluation methods of each dimension, and then the function values were put into the distance ratio function to obtain the single-dimension truth degree value. α F ε F = 0 . 2 , α F = 0 . 4 , α F + ε F = 0.6 , α T ε T = 0.85 , α T = 0.9 , and α T + ε T = 0.95 were set. The multi-dimensional truth degree value of each piece of data was obtained by weighting the truth degree value of the single dimension, and then the average value was calculated to evaluate the whole data quality.

5.1. Normative Evaluation

The data template P j was established, as shown in Table 2. The data were compared with the template, respectively, to obtain the data normative function values. The distance ratio function was used to obtain the truth value of the data normative value, and the normative evaluation of the data quality was carried out.
It can be seen from Table 1 that the first normative function of a data attribute is as follows: G ( R 11 ) = 1 , G ( R 12 ) = 1 , G ( R 13 ) = 1 , G ( R 14 ) = 0 , G ( R 15 ) = 1 , G ( R 16 ) = 1 , G ( R 17 ) = 1 , G ( R 18 ) = 1 , G ( R 19 ) = 1 , G ( R 110 ) = 1 , G ( R 1   11 ) = 1 , and G ( R 1   12 ) = 1 . Using fuzzy hierarchical analysis to find the weights of the attributes, the weights of each attribute can be obtained as follows: r 1 T = 0.093 , r 2 T = 0.093 , r 3 T = 0.074 , r 4 T = 0.074 , r 5 T = 0.074 , r 6 T = 0.093 , r 7 T = 0.093 , r 8 T = 0.074 , r 9 T = 0.083 , r 10 T = 0.074 , r 11 T = 0.092 , and r 12 T = 0.083 . The normality function of the data is calculated as B 1 ( R 1 ) = j = 1 n r j T G ( R 1 j ) = 0.926 , which is substituted into Equation (5), to obtain the normative truth degree value h T ( B 1 R 1 ) = 1 of the data. It means that the degree of normality of the data is high, and the quality is evaluated as “Level 2”.
In addition, for unstructured and semi-structured data, the data is first pre-processed and converted into XML format, and the syntax validator can be used to verify the data normalization according to the XML syntax specification by verifying that the first unstructured data has no syntax error. Then the normality function value B 1 ( R 1 ) = 1 , substituted into Equation (5) to obtain the normative truth degree value h T ( B 1 R 1 ) = 1.14 . It means that the data normality degree is particularly high, and the quality evaluation is “Level 1”.

5.2. Integrity Evaluation

Similar to the norm, according to Table 1, the data obtained were respectively compared with the data template P j to obtain the data integrity function value, the distance ratio function was used to obtain the true value of the data integrity value, and the data quality integrity evaluation was carried out. According to the data template, the first data integrity attribute value is as follows: T [ R 11 ] = 1   , T [ R 12 ] = 1   , T [ R 13 ] = 1 , T [ R 14 ] = 0   , T [ R 15 ] = 1 , T [ R 16 ] = 1 , T [ R 17 ] = 1   , T [ R 18 ] = 1   , T [ R 19 ] = 1 , T [ R 1   10 ] = 1 , T [ R 1   11 ] = 1 , and T [ R 1   12 ] = 1 . Since the total missing number is 1 and the total number of attributes is 12, according to the integrity definition, the integrity function value of this data is B 2 ( R 1 ) = 1 j = 1 n ( T [ R i j ] = n u l l ) / n = 1 ( 1 / 12 ) = 0.9167 , which is substituted into Equation (5) to obtain the truth value of data integrity degree, h T ( B 2 R 1 ) = 1 . It means that the data integrity degree is high, and the quality evaluation is “Level 2”.
In addition, for the unstructured data, pre-processing is performed first to extract the characteristic data in the data, and then comparative analysis is performed. The characteristic goal of the first data is to propagate and record the forest fire in health. The characteristic premise is to conform to a characteristic sentence pattern and characteristic constraint. The characteristic sentence pattern includes five parts: title, lead, subject, background, and conclusion. The feature constraint is to record the time, place, person, cause, process, and result of the event. The characteristic content is villagers burning paper and high-voltage wire collisions resulting in fire. By comparison, it is found that the characteristic data is not missing, and the data integrity function B 2 ( R 1 ) = 1 is obtained, which is substituted into Equation (5) to obtain the truth value of the data integrity degree h T ( B 1 R 1 ) = 1.14 . It means that the data integrity degree is particularly high; the quality evaluation is “Level 1”.

5.3. Accuracy Evaluation

Similar to the norm, the accuracy of the data is judged. For example, if the first data is selected and all attribute values are as follows: T [ R 11 ] = 1 , T [ R 12 ] = 1 , T [ R 13 ] = 1 , T [ R 14 ] = 0 . 6 , T [ R 15 ] = 1 , T [ R 16 ] = 1 , T [ R 17 ] = 1 , T [ R 18 ] = 1 , T [ R 19 ] = 1 , T [ R 1   10 ] = 1 , T [ R 1   11 ] = 1 , and T [ R 1   12 ] = 1   . Then the accuracy function value B 3 ( R 1 ) = 0 . 6 is obtained, which is substituted into Equation (5) to obtain the truth degree of the accuracy of the data, h T ( B 3 R 1 ) = 0 . It means that the degree of accuracy of the data is particularly high, and the quality evaluation is “Level 1”.
In addition, for unstructured or semi-structured data, the national standard “Chinese News Information Content Part 2: News Metadata” is used to establish a specific RDF framework, as shown in Table 3. The data preprocessing to obtain the corresponding feature data, and compare it with the resulting data, can be obtained, r d f ( T [ R i j ] ) = 0.8 . The content of the abstract is the time, place, person, cause, process, and result of the event. By calculating the cosine similarity between Ω ( T [ R i j ] ) = ( 1 , 1 , 1 , 1 , 1 , 1 ) of the abstract and the truth value of the abstract, the accuracy function value B 3 ( R 1 ) = Z ( R i j ) = 0 . 8 · [ ( 1 , 1 , 1 , 1 , 1 , 1 ) · ( 1 , 1 , 1 , 1 , 1 , 1 ) / | | ( 1 , 1 , 1 , 1 , 1 , 1 ) | | · | | ( 1 , 1 , 1 , 1 , 1 , 1 ) | | ] = 0.8 is obtained, which is substituted into Equation (5) to obtain the truth degree of data accuracy value h T ( B 3 R 1 ) = 0 . 8 . It means that the degree of accuracy of the data is lower than higher, and the quality evaluation is “Level 3”.

5.4. Timeliness Evaluation

If the file size of the first batch of structured data is about 17 kb and the average transmission speed of the 4G network adopted by mobile emergency equipment is 10–100 Mbps. The data transmission duration is the ratio of file size F S and network speed N S , that is, D R T D S T = F S / N S is 0.00017 ~ 0.0017 s. If the longest time is taken, the total duration of this data is determined to be 3 h according to the fire duration. When the data validity time is D E T D R T = 3   h 0.0017   s , the timeliness function value B 4 ( R ) = 1 of the first batch of data can be obtained, which is substituted into Equation (5) to obtain the timeliness truth degree value h T ( B 4 R ) = 1 . 14 . It means that the degree of timeliness of the data is particularly high, and the quality evaluation is “Level 1”.
In the same way, if the total size of unstructured data is 8 kb, then the data transmission time duration is D R T D S T = 0 . 000078 ~ 0 . 00078 s, taking its maximum value. Data effective time duration D E T D R T = 3   h 0.00078 s, can be obtained from the timeliness function value B 4 ( R ) = 1 of the first batch of unstructured data, which can be substituted into Equation (5) to obtain the timeliness truth degree value h T ( B 4 R ) = 1 . 14 . It means that the degree of timeliness of the data is particularly high, and the quality evaluation is “Level 1”.

5.5. Multidimensional Evaluation

First, function values and truth degree values of 135 structured and 75 unstructured data are calculated according to the above four-dimensional evaluation. Then, the multidimensional evaluation was carried out. The weights of these four dimensions were determined as C 1 = 0.2 , C 2 = 0.3 , C 3 = 0.3 , C 4 = 0.2 based on the Delphi method and analytic Hierarchy process [26], and the multidimensional evaluation results of structured and unstructured data quality were calculated, as shown in Table 4 and Table 5. The complete data are presented in Appendix A.
By comparing Figure 5 and Figure 6, it can be found that the function values of the structured data without using the MMTD method are closer to each other, the range of fluctuation is relatively small, and there are obvious ambiguities between some data. For example, the 23rd and 24th data are very close to the same data quality evaluation of “Level 3” in Figure 6, while Figure 5 clearly distinguishes the quality of the 23rd and 24th data as “Level 3” and “Level 4”, respectively; similarly, it can be seen that the quality of structured data without using the MMTD method is relatively close, the range of fluctuation is relatively small, and there are obvious ambiguities between some data. “Similarly, Figure 7 has a smaller range of fluctuation and cannot clearly deal with the ambiguity of the data. For example, the 37th and 39th data quality evaluations in Figure 7 are “Level 3”, while Figure 8 is “Level 3” and “Level 4”, respectively. This shows the effectiveness of this paper’s method in dealing with data ambiguity.
As can be seen in Table 4 and Figure 5, the multidimensional truth value of the 24th structured data is 0.356, with a quality rating of “Level 4”. This is mainly because the attributes “longitude”, “brightness”, “scan”, “track“, and “frp” are incomplete and not accurate to one decimal place, resulting in low normality, completeness, and accuracy of the data. In the process of disaster relief, such data should be discarded to avoid influencing decision-making. At the same time, it also reminds the staff to keep the data complete enough for the next disaster relief. The same is true for the 76th structured data. In addition, the 32nd, 47th, 51st, 56th, 64th, 69th, 93rd, 127th, and 134th data also have a low degree of truth value, and the quality evaluation is “Level 3”. This is mainly due to the fact that some attribute values are partially missing, which lowers the overall data quality. This kind of data should be utilized later, and high-quality data should be used first. At the same time, staff members are reminded that it is very important to record and preserve each attribute of mobile emergency data in strict accordance with the specifications.
As can be seen from Table 5 and Figure 8, the multidimensional degree of truth of the 39th, 61st, 62nd, and 63rd unstructured data is 0.456, 0.456, 0.456, and 0.408 with a quality evaluation of “Level 4”, and this kind of data is discarded. The main reason is that the data are missing parts of the eigenvalues, which leads to incomplete data and an inaccurate description of the emergency disaster, resulting in a decline in the quality of data completeness and accuracy. Similarly, the 22nd, 24th, 26th, 28th, 30th, and 37th data also have a low degree of truth, and the quality is evaluated as “Level 3”, so this kind of data will be used later. Staff members are also reminded to accurately describe emergency disasters and keep complete records.
From Figure 9, it can be clearly seen that the degree of truth value of accuracy has the highest volatility and the lowest average value among the structured dimensions, and even many of the degree of truth values are zero. Next is the lowest value of integrity, which indicates that the accuracy and integrity of this data are difficult to meet the requirements. At this point, the staff should be based on the problem to find the source, determine which step of the data collection, transmission, recording, and preservation process is involved in the problem, and make the corresponding improvements. For example, if the data collected by the collection equipment is incomplete, the equipment should be improved, and the staff should record the missing, duplicated, and omitted data. And the value of timeliness and standardization is kept very high and stable, which indicates that these data are very much in line with the data normality and timeliness requirements. It may be because it has a complete set of normative implementation plans, and with the development of the 5G network, the data transmission speed is fast enough to fully meet the timeliness requirements within the relief time frame. Similarly, it can be clearly seen from Figure 10 that the truth degree values of accuracy and completeness in each dimension of unstructured data fluctuate greatly and the average value is relatively low, while normality and timeliness are very stable and the truth degree values are very high.
In summary, this method can effectively calculate the function values of the four dimensions of the data, the truth degree values of each data point and the whole batch of data, and finally evaluate the data quality more accurately and carefully. The first batch of structured data has a truth value of 0.878, and the unstructured data has a truth value of 0.847, which means that the quality of both data is “Level 3” and both data are of high value. In the actual data use process, the data quality can be ranked from high to low, and high-quality data can be used first and low-quality data can be discarded. In addition, through the above fuzzy processing and quantitative evaluation of the quality of mobile emergency data, it can be found that the MMTD method can clearly obtain high and low degrees of data quality. It improves the speed and accuracy of data analysis, which in turn can reduce the interference of low-quality data and improve the utilization of high-quality data. It is also beneficial to explore the causes of low-quality data, improve data collection methods and data pre-processing methods, etc., and support the realization of accurate and intelligent mobile emergency services with high-quality data.

6. Summary

Mobile emergency big data quality is low, and there is ambiguity about how to scientifically and reasonably evaluate the mobile emergency big data problem. The article adopts a combination of qualitative and quantitative ideas. Through the analysis of mobile emergency big data, it is summarized that it has the characteristics of a strong surge, large change, weak integrity, a large amount of processing, and high correlation. And, from the four dimensions of standardization, completeness, accuracy, and timeliness, combined with the attribute weights obtained from the fuzzy hierarchical analysis method, a definition of data quality dimensions is given. Considering the ambiguity of the data, the MMTD method is introduced, and the distance ratio function is used to establish single-dimension and multi-dimension mobile emergency big data truth degree measurement models based on the theory of mediation logic. The model is analyzed by using the Australian mountain fire data from the NASA website and the fire text dataset from the Chinese Emergency Incident Corpus as example algorithms. The obtained results of the first batch of the dimensional evaluation of data quality and the multidimensional assessment results show that the MMTD-based mobile emergency big data quality evaluation method can effectively respond to the degree of data standardization, completeness, accuracy, and timeliness in a quantitative way. The comparison between this method and the direct use of the function value evaluation method shows that this method can effectively deal with data quality ambiguity. It has a positive effect on improving emergency response capability and the construction of intelligent mobile emergency service systems.

Author Contributions

Conceptualization, J.L. and Q.L.; methodology, J.L. and Q.L.; software, J.L. and Q.L.; validation, J.L. and Q.L.; formal analysis, J.L. and Q.L.; investigation, J.L. and Q.L.; resources, J.L. and Q.L.; data curation, J.L. and Q.L.; writing—original draft preparation, J.L. and Q.L.; writing—review and editing, J.L., Q.L., H.F. and K.K.L.; visualization, J.L. and Q.L.; supervision, J.L., Q.L., H.F. and K.K.L.; project administration, J.L., Q.L., H.F. and K.K.L.; funding acquisition, J.L. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by The National Social Science Fund of China grant number 21BGL200.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data will be made available on request.

Acknowledgments

JL gratefully acknowledges the support of National Social Science Fund of China (No.21BGL200).

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

Table A1. Structured data multidimensional evaluation results.
Table A1. Structured data multidimensional evaluation results.
Serial NumberNormative Function ValuesIntegrity Function ValueAccuracy Function ValueTime-Sensitive Function ValuesNormative Truth Degree ValueIntegrity Truth Degree ValueAccuracy True Value Degree ValueTime-Sensitive True Value Degree ValueThe Truth Degree Value of the i-th Data DimensionQuality EvaluationAverage Multidimensional Truth Degree Value of the Whole Batch Data
10.9260.91611111.141.141.07Level 10.878
20.8340.8330.610.9360.93201.140.6948Level 3
311111.141.141.141.141.14Level 1
40.9080.9160.611101.140.728Level 3
511111.141.141.141.141.14Level 1
610.9160.611.141.1401.140.798Level 3
711111.141.141.141.141.14Level 1
80.9070.9160.911111.141.028Level 1
911111.141.141.141.141.14Level 1
100.9080.9160.611101.140.728Level 3
1111111.141.141.141.141.14Level 1
120.9080.91611111.141.141.07Level 1
130.9080.9160.611101.140.728Level 3
1411111.141.141.141.141.14Level 1
1511111.141.141.141.141.14Level 1
1611111.141.141.141.141.14Level 1
1711111.141.141.141.141.14Level 1
180.8330.8330.610.9320.93201.140.694Level 3
190.8520.8330.6110.93201.140.7076Level 3
200.8520.8330.6110.93201.140.7076Level 3
210.8520.8330.6110.93201.140.7076Level 3
220.8520.8330.6110.93201.140.7076Level 3
230.7780.750.610.7120.601.140.5504Level 3
240.760.5830.610.64001.140.356Level 4
250.8520.8330.6110.93201.140.7076Level 3
260.8520.8330.6110.93201.140.7076Level 3
270.8520.8330.6110.93201.140.7076Level 3
280.8520.8330.6110.93201.140.7076Level 3
290.8520.8330.6110.93201.140.7076Level 3
300.8520.8330.6110.93201.140.7076Level 3
310.8520.8330.6110.93201.140.7076Level 3
320.760.750.610.640.601.140.536Level 3
330.8520.8330.6110.93201.140.7076Level 3
340.9080.9160.611101.140.728Level 3
3511111.141.141.141.141.14Level 1
3611111.141.141.141.141.14Level 1
370.9260.9160.611101.140.728Level 3
380.9260.9160.611101.140.728Level 3
390.8150.8330.610.860.93201.140.6796Level 3
400.9080.9160.611101.140.728Level 3
410.8340.8330.610.9360.93201.140.6948Level 3
4211111.141.141.141.141.14Level 1
430.9260.9160.911111.141.028Level 1
4411111.141.141.141.141.14Level 1
450.9260.9160.611101.140.728Level 3
4611111.141.141.141.141.14Level 1
470.7590.750.610.6360.601.140.5352Level 3
480.8520.8330.6110.93201.140.7076Level 3
490.8520.8330.6110.93201.140.7076Level 3
500.8520.8330.6110.93201.140.7076Level 3
510.7590.750.610.6360.601.140.5352Level 3
520.8520.8330.6110.93201.140.7076Level 3
530.8520.8330.6110.93201.140.7076Level 3
540.8520.8330.6110.93201.140.7076Level 3
550.8520.8330.6110.93201.140.7076Level 3
560.7590.750.610.6360.601.140.5352Level 3
570.8520.8330.6110.93201.140.7076Level 3
580.8520.8330.6110.93201.140.7076Level 3
590.8520.8330.6110.93201.140.7076Level 3
6011111.141.141.141.141.14Level 1
6110.8330.611.140.93201.140.7356Level 3
6211111.141.141.141.141.14Level 1
6311111.141.141.141.141.14Level 1
640.7780.750.610.7120.601.140.5504Level 3
650.8520.8330.6110.93201.140.7076Level 3
660.8520.8330.6110.93201.140.7076Level 3
670.8520.8330.6110.93201.140.7076Level 3
680.8520.8330.6110.93201.140.7076Level 3
690.760.750.610.640.601.140.536Level 3
700.9080.9160.611101.140.728Level 3
710.9070.9160.911111.141.028Level 1
720.9070.9160.911111.141.028Level 1
730.8330.8330.610.9320.93201.140.694Level 3
740.8520.8330.6110.93201.140.7076Level 3
750.8520.8330.6110.93201.140.7076Level 3
760.6660.6670.610.2640.26801.140.3612Level 4
770.8520.8330.6110.93201.140.7076Level 3
7811111.141.141.141.141.14Level 1
7911111.141.141.141.141.14Level 1
800.9260.9160.611101.140.728Level 3
810.8340.9160.610.9360.93601.140.696Level 3
820.9260.9160.611101.140.728Level 3
8311111.141.141.141.141.14Level 1
840.8150.8330.610.860.93201.140.6796Level 3
850.9070.9160.911111.141.028Level 1
8611111.141.141.141.141.14Level 1
870.9070.9160.911111.141.028Level 1
880.9260.9160.911111.141.028Level 1
890.9070.9160.81111.141.141.07Level 1
9011111.141.141.141.141.14Level 1
910.9070.9160.911111.141.028Level 1
9211111.141.141.141.141.14Level 1
930.760.750.610.640.601.140.536Level 3
940.8520.8330.6110.93201.140.7076Level 3
950.8520.8330.6110.93201.140.7076Level 3
960.8520.8330.6110.93201.140.7076Level 3
970.8520.8330.6110.93201.140.7076Level 3
9811111.141.141.141.141.14Level 1
9911111.141.141.141.141.14Level 1
10011111.141.141.141.141.14Level 1
10111111.141.141.141.141.14Level 1
10211111.141.141.141.141.14Level 1
10311111.141.141.141.141.14Level 1
1040.9070.9160.911111.141.028Level 1
10511111.141.141.141.141.14Level 1
10611111.141.141.141.141.14Level 1
10711111.141.141.141.141.14Level 1
10811111.141.141.141.141.14Level 1
10911111.141.141.141.141.14Level 1
11011111.141.141.141.141.14Level 1
11111111.141.141.141.141.14Level 1
1120.8520.8330.6110.93201.140.7076Level 3
1130.8330.8330.610.9320.93201.140.694Level 3
1140.9260.9160.611101.140.728Level 3
11511111.141.141.141.141.14Level 1
1160.9070.9160.911111.141.028Level 1
11711111.141.141.141.141.14Level 1
1180.9080.9160.611101.140.728Level 3
1190.9080.9160.611101.140.728Level 3
12011111.141.141.141.141.14Level 1
12111111.141.141.141.141.14Level 1
1220.9080.9160.611101.140.728Level 3
12311111.141.141.141.141.14Level 1
12411111.141.141.141.141.14Level 1
1250.9260.9160.611101.140.728Level 3
1260.8520.8330.6110.93201.140.7076Level 3
1270.7780.750.610.7120.601.140.5504Level 3
12811111.141.141.141.141.14Level 1
12911111.141.141.141.141.14Level 1
1300.8150.8330.610.860.93201.140.6796Level 3
13111111.141.141.141.141.14Level 1
13211111.141.141.141.141.14Level 1
13311111.141.141.141.141.14Level 1
1340.7590.750.610.6360.601.140.5352Level 3
13511111.141.141.141.141.14Level 1
Table A2. Multidimensional evaluation results of the unstructured data.
Table A2. Multidimensional evaluation results of the unstructured data.
Serial NumberNormative Function ValuesIntegrity Function ValueAccuracy Function ValueTime-Sensitive Function ValuesNormative Truth Degree ValueIntegrity Truth Degree ValueAccuracy True Value Degree ValueTime-Sensitive True Value Degree ValueThe Truth Degree Value of the i-th Data DimensionQuality EvaluationAverage Multidimensional Truth Degree Value of the Whole Batch Data
1110.80011.141.140.81.141.038Level 10.847
210.80.70011.140.80.41.140.816Level 3
310.80.73011.140.80.521.140.852Level 3
410.80.80011.140.80.81.140.936Level 3
510.80.91311.140.811.140.996Level 3
610.80.73011.140.80.521.140.852Level 3
710.80.91311.140.811.140.996Level 3
8111.00011.141.141.141.141.14Level 1
9110.90011.141.1411.141.098Level 1
1010.80.73011.140.80.521.140.852Level 3
1110.80.82211.140.80.88641.140.96192Level 3
1210.80.82211.140.80.88641.140.96192Level 3
1310.80.63911.140.80.15611.140.74283Level 3
14110.90011.141.1411.141.098Level 1
1510.80.45611.140.801.140.696Level 3
1610.80.82211.140.80.88641.140.96192Level 3
17111.00011.141.141.141.141.14Level 1
1810.80.82211.140.80.88641.140.96192Level 3
1910.80.91311.140.811.140.996Level 3
2010.80.82211.140.80.88641.140.96192Level 3
2110.60.73411.1400.53761.140.61728Level 3
2210.60.65311.1400.21121.140.51936Level 3
2310.80.73011.140.80.521.140.852Level 3
2410.60.65311.1400.21121.140.51936Level 3
2510.80.73011.140.80.521.140.852Level 3
2610.60.65311.1400.21121.140.51936Level 3
2710.80.73011.140.80.521.140.852Level 3
2810.60.65311.1400.21121.140.51936Level 3
2910.80.73011.140.80.521.140.852Level 3
3010.60.65311.1400.21121.140.51936Level 3
3110.80.73011.140.80.521.140.852Level 3
3210.80.63911.140.80.15611.140.74283Level 3
33110.80011.141.140.81.141.038Level 1
3410.80.63911.140.80.15611.140.74283Level 3
35110.70011.141.140.41.140.918Level 3
3610.60.73411.1400.53761.140.61728Level 3
3710.60.65311.1400.21121.140.51936Level 3
3810.80.63911.140.80.15611.140.74283Level 3
3910.60.57111.14001.140.456Level 4
4010.80.63911.140.80.15611.140.74283Level 3
4110.80.73011.140.80.521.140.852Level 3
4210.80.73011.140.80.521.140.852Level 3
4310.80.73011.140.80.521.140.852Level 3
4410.80.82211.140.80.88641.140.96192Level 3
4510.80.91311.140.811.140.996Level 3
4610.80.73011.140.80.521.140.852Level 3
4710.80.91311.140.811.140.996Level 3
4810.80.73011.140.80.521.140.852Level 3
4910.80.73011.140.80.521.140.852Level 3
5010.80.82211.140.80.88641.140.96192Level 3
51110.70011.141.140.41.140.918Level 3
5210.80.82211.140.80.88641.140.96192Level 3
5310.80.73011.140.80.521.140.852Level 3
5410.80.91311.140.811.140.996Level 3
5510.80.82211.140.80.88641.140.96192Level 3
5610.80.63911.140.80.15611.140.74283Level 3
5710.80.73011.140.80.521.140.852Level 3
5810.80.82211.140.80.88641.140.96192Level 3
5910.80.91311.140.811.140.996Level 3
6010.80.73011.140.80.521.140.852Level 3
6110.60.57111.14001.140.456Level 4
6210.60.49011.14001.140.456Level 4
6310.60.40811.14001.140.456Level 4
64110.90011.141.1411.141.098Level 1
65110.80011.141.140.81.141.038Level 1
6610.80.73011.140.80.521.140.852Level 3
6710.80.73011.140.80.521.140.852Level 3
6810.80.63911.140.80.15611.140.74283Level 3
6910.80.82211.140.80.88641.140.96192Level 3
70110.90011.141.1411.141.098Level 1
7110.80.73011.140.80.521.140.852Level 3
7210.80.63911.140.80.15611.140.74283Level 3
73110.80011.141.140.81.141.038Level 1
7410.80.91311.140.811.140.996Level 3
7510.80.54811.140.801.140.696Level 3

References

  1. Li, J.; Fu, H.; Lai, K.K.; Ram, B. Optimization of Multi-Objective Mobile Emergency Material Allocation for Sudden Disasters. Front. Public Health 2022, 10, 927241. [Google Scholar] [CrossRef] [PubMed]
  2. Kirci, P.; Arslan, D.; Dincer, S.F. A Communication, Management and Tracking Mobile Application for Enhancing Earthquake Preparedness and Situational Awareness in the Event of an Earthquake. Sustainability 2023, 15, 970. [Google Scholar] [CrossRef]
  3. Didem, C.; Burak, K. Use of Mobile Crowdsensing in Disaster Management: A Systematic Review, Challenges, and Open Issues. Sensors 2023, 23, 1699. [Google Scholar]
  4. Medeiros, I.; Boukerche, A.; Cerqueira, E. Swarm-Based and Energy-Aware Unmanned Aerial Vehicle System for Video Delivery of Mobile Objects. IEEE Trans. Veh. Technol. 2021, 71, 766–779. [Google Scholar] [CrossRef]
  5. Lin, T.H.; Huang, J.T.; Putranto, A. Integrated smart robot with earthquake early warning system for automated inspection and emergency response. Nat. Hazards 2022, 110, 765–786. [Google Scholar] [CrossRef]
  6. Huang, X.; Wen, L.; Hao, P.; Mao, R.; Yan, Q. Research and Practice of Vehicle-mounted Mobile CT Based on Emergency Medical Rescue. Chin. J. Med. Instrum. 2023, 47, 66–69. [Google Scholar]
  7. Rottondi, C.; Malandrino, F.; Bianco, A.; Chiasserini, C.F.; Stavrakakis, I. Scheduling of emergency tasks for multiservice UAVs in post-disaster scenarios. Comput. Netw. 2021, 184, 107644. [Google Scholar] [CrossRef]
  8. Haibeh, L.A.; Yagoub, M.C.E.; Jarray, A. A Survey on Mobile Edge Computing Infrastructure: Design, Resource Management, and Optimization Approaches. IEEE Access 2022, 10, 27591–27610. [Google Scholar] [CrossRef]
  9. Li, Z.; Chang, V.; Ge, J.; Pan, L.; Hu, H.; Huang, B. Energy-aware task offloading with deadline constraint in mobile edge computing. EURASIP J. Wirel. Commun. Netw. 2021, 2021, 56. [Google Scholar] [CrossRef]
  10. Huang, B.; Li, Z.; Tang, P.; Wang, S.; Zhao, J.; Hu, H.; Li, W.; Chang, V. Security modeling and efficient computation offloading for service workflow in mobile edge computing. Future Gener. Comput. Syst. 2019, 97, 755–774. [Google Scholar] [CrossRef] [Green Version]
  11. Daneshkohan, A.; Alimoradi, M.; Ahmadi, M.; Alipour, J. Data Quality and Data Use in Primary Health Care: A Case Study from Iran. Inform. Med. Unlocked 2022, 28, e100855. [Google Scholar] [CrossRef]
  12. Peterson, S.; Rainey, N.; Weible, K. Who Writes this Stuff? Musculoskeletal Information Quality and Authorship of Popular Health Websites:A Systematic Review. Musculoskelet. Sci. Pract. 2022, 60, e102563. [Google Scholar] [CrossRef] [PubMed]
  13. Farzandipour, M.; Karami, M.; Arbabi, M.; Abbasi Moghadam, S. Quality of Patient Information in Emergency Department. Int. J. Health Care Qual. Assur. 2019, 32, 108–119. [Google Scholar] [CrossRef] [PubMed]
  14. Zhao, X.; Li, S.; Yu, W.; Yang, S.; Ding, Y.G.; Hu, Y. Research on Web Data Source Quality Assessment Method in Big Data. Comput. Eng. 2017, 43, 48–56. [Google Scholar]
  15. Mashoufi, M.; Ayatollahi, H.; Khorasani-Zavareh, D.; Talebi Azad Boni, T. Data quality assessment in emergency medical services: An objective approach. BMC Emerg. Med. 2023, 23, 10. [Google Scholar] [CrossRef] [PubMed]
  16. Wang, M.Z.; Meng, W.Q.; Huang, J.H.; Wu, F.X. Education Security Data Management Using Hierarchical Data Quality Assessment Method. Netinfo Secur. 2019, 228, 79–87. [Google Scholar]
  17. Han, J.Y.; Chen, K.J. Ranking data quality of web article content by extracting face. Comput. Sci. 2014, 41, 247–251+255. [Google Scholar]
  18. Hong, L.; Xiao, X.A.; Zhu, W.J. Measure of medium truth scale and its application (I). Chin. J. Comput. 2006, 12, 2186–2193. [Google Scholar]
  19. Zhong, S.Y. Research on Big Data Quality Evaluation Based on MMTD; Nanjing University of Posts and Telecommunications: Nanjing, China, 2017. [Google Scholar]
  20. Cheng, W.Q.; Gong, J.; Ding, W. Flow features and truth scale based single-ended objective assessment of perceived quality of VoIP service. J. Commun. 2008, 29, 30–39. [Google Scholar]
  21. Pan, X.; Zhang, Y.P.; Chen, H.Y. A new valuation method based on fuzzy mathematics and medium truth theory. Comput. Eng. Sci. 2015, 37, 1676–1681. [Google Scholar]
  22. Tang, Y.; Zhang, Y.P.; Chen, H.Y. A comprehensive evaluation method based on entropy theory and measure of medium truth scale. Comput. Eng. Sci. 2015, 37, 946–950. [Google Scholar]
  23. Zadeh, L. Fuzzy sets. Inf. Control. 1965, 8, 338–353. [Google Scholar] [CrossRef] [Green Version]
  24. Zhu, W.J.; Xiao, X.A. Mathematical foundation & fuzzy mathematical foundation. Nat. Mag. 1984, 7, 723–726. [Google Scholar]
  25. Fan, X.J.; Zhang, L.W. Measurement for social network data currency and credibility. J. Beijing Inf. Sci. Technol. Univ. 2015, 30, 66–70. [Google Scholar]
  26. Song, J.D.; Liu, F.Y. A method and application studu of data quality evaluation supporting. Comput. Appl. Softw. 2018, 35, 328–333. [Google Scholar]
Figure 1. Feature analysis of mobile emergency big data.
Figure 1. Feature analysis of mobile emergency big data.
Applsci 13 09072 g001
Figure 2. Correspondence between values and predicates.
Figure 2. Correspondence between values and predicates.
Applsci 13 09072 g002
Figure 3. Mobile emergency big data quality evaluation flow chart.
Figure 3. Mobile emergency big data quality evaluation flow chart.
Applsci 13 09072 g003
Figure 4. Correspondence between values and qualitative predicates.
Figure 4. Correspondence between values and qualitative predicates.
Applsci 13 09072 g004
Figure 5. Multidimensional truth degree values for structured data.
Figure 5. Multidimensional truth degree values for structured data.
Applsci 13 09072 g005
Figure 6. Multidimensional function values for structured data.
Figure 6. Multidimensional function values for structured data.
Applsci 13 09072 g006
Figure 7. Multidimensional function values for unstructured data.
Figure 7. Multidimensional function values for unstructured data.
Applsci 13 09072 g007
Figure 8. Multidimensional true value degree values for unstructured data.
Figure 8. Multidimensional true value degree values for unstructured data.
Applsci 13 09072 g008
Figure 9. Comparison table of truth degree values for each dimension of the structured data.
Figure 9. Comparison table of truth degree values for each dimension of the structured data.
Applsci 13 09072 g009
Figure 10. Comparison table of the degree of truth values for each dimension of unstructured data.
Figure 10. Comparison table of the degree of truth values for each dimension of unstructured data.
Applsci 13 09072 g010
Table 1. Correspondence between predicates and quality levels.
Table 1. Correspondence between predicates and quality levels.
PredicateQuality LevelsPredicateQuality Levels
particularly highLevel 1relatively lowLevel 4
highLevel 2lowLevel 5
lower than higherLevel 3particularly lowLevel 6
Table 2. Data template P j .
Table 2. Data template P j .
P j Attribute NameDescription
P 1 latitudeDecimal latitude, accurate to four decimal places
P 2 longitudeDecimal latitude, accurate to four decimal places
P 3 brightnessLuminance temperature 21 (Kelvin): The luminance temperature of the channel 21/22 flame pixel, in Kelvin
P 4 scanScan along pixel size: This algorithm produces approximately 375 m pixels at the lowest point. Scanning and tracking reflect the actual pixel size
P 5 trackPixel size along the track: This algorithm produces approximately 375 m pixels at the lowest point. Scanning and tracking reflect the actual pixel size
P 6 acq_dateObtain the date, for example, 2021-1-1
P 7 acq_timeCapture time (UTC time)
P 8 instrumentVIIRS or MODIS: visible Infrared Imaging Radiometer or Moderate Resolution Imaging Spectrometer
P 9 confidenceConfidence estimates range from 0 to 100% and are designated as one of three fire types (low confidence fire, nominal confidence fire, or high confidence fire).
P 10 versionThe device version represents the data acquisition source
P 11 frpFire Radiative Power, which expresses the intensity of fire, accurate to one decimal place
P 12 typeData type: 0, 1, 2, 3, 4
Table 3. RDF framework.
Table 3. RDF framework.
Description ItemSubprojectDefinition
Title Clear and striking words that reveal the content
Founder An individual or group that creates a manuscript
Time range informationStart timeEvent time
End timeEvent end time
Reporting timeEvent reporting time
Abstract An extract or brief description of the main content
Source Manuscript source information
Location Location of the incident
Main character participant
Main mechanism Participating institution
Table 4. Multi-dimensional evaluation results of the structured data.
Table 4. Multi-dimensional evaluation results of the structured data.
Data Serial Number1232476135
Dimension
Normative function value0.9260.83410.760.6661
Integrity function value0.9160.83310.5830.6671
Accuracy function value10.610.60.61
Time function value111111
The truth degree value of the i-th data dimension1.070.69481.140.3560.36121.14
Quality evaluationLevel 1Level 3Level 1Level 4Level 4Level 1
Average multidimensional truth degree value of the whole batch data0.878
Table 5. Multi-dimensional evaluation results of the unstructured data.
Table 5. Multi-dimensional evaluation results of the unstructured data.
Data Serial Number123961626375
Dimension
Normative function value1111111
Integrity function value10.80.60.60.60.60.8
Accuracy function value0.80.70.5710.5710.4900.4080.545
Time function value1111111
The truth degree value of the i-th data dimension1.0380.8160.4560.4560.4560.4080.696
Quality evaluationLevel 1Level 3Level 4Level 4Level 4Level 4Level 3
Average multidimensional truth degree value of the whole batch data0.847
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Li, J.; Li, Q.; Fu, H.; Lai, K.K. Research on the Quality Evaluation Method of Mobile Emergency Big Data Based on the Measure of Medium Truth Degree. Appl. Sci. 2023, 13, 9072. https://doi.org/10.3390/app13169072

AMA Style

Li J, Li Q, Fu H, Lai KK. Research on the Quality Evaluation Method of Mobile Emergency Big Data Based on the Measure of Medium Truth Degree. Applied Sciences. 2023; 13(16):9072. https://doi.org/10.3390/app13169072

Chicago/Turabian Style

Li, Jianxun, Qing Li, Haoxin Fu, and Kin Keung Lai. 2023. "Research on the Quality Evaluation Method of Mobile Emergency Big Data Based on the Measure of Medium Truth Degree" Applied Sciences 13, no. 16: 9072. https://doi.org/10.3390/app13169072

APA Style

Li, J., Li, Q., Fu, H., & Lai, K. K. (2023). Research on the Quality Evaluation Method of Mobile Emergency Big Data Based on the Measure of Medium Truth Degree. Applied Sciences, 13(16), 9072. https://doi.org/10.3390/app13169072

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop