4.2. Panic Application
As the citizen security is the main goal of our solution, we develop a Mobile Application that allows users report
an event involving polices (a theft, a murder, etc.). The name of the application is “Panic Application”. For the
development of such panic button system, the quadrants previously defined were taken as references. Figure 1a
presents our application architecture. To determine the exact position of a citizen who requests a particular service
to the police by using our Panic Application installed in a mobile, the computational geometry algorithms included
in the DBMS were used.
The mobile application obtains the information of the citizen, the IMEI identification of the equipment, a custom
message and the GPS coordinates, which are in turn sent to a server where all these data are processed and
analyzed. Figure 1b depicts our Panic Application. That server is located at a monitoring center, where, on a big
map, all the requests can be visualized. After the server receives a request from a citizen, an administrator analyzes
such request and sends an alarm to the nearest police patrol to the quadrant where the request came from.
The assignment of police patrols to the client requests can happen in manual way by the administrator who
assigns patrols according to the quadrant the request come from, and the other way is automatically. In the
automatic way, we use the queuing theory according to the form M/M/s. This automatic allocation takes into
account the number of patrols assigned to the quadrants. Thus, there are multiple patrols (s > 1) and multiple
requests.