993 resultados para spatiotemporal information
Resumo:
‘Spatial governance’ involves a large number of situations where knowledge of place and time is important in achieving acceptable organisational outcomes. This paper argues that spatial governance calls for information-intensive activity in three main areas. The first establishes ‘authority’ in a legal entity to decide issues regarding resources within a territorial jurisdiction. The second involves planning the future use of resources. It engages a language of design, purpose, modeling, visualization, expectations and risk. The third involves monitoring of outcomes to see if expectations are met; and whether changes to authority and planning regimes need to be made in the light of experience. This engages a language of observing, recording, accounting, auditing, statistical indicators and accountability. ‘Authority’, ‘planning’ and ‘monitoring’ regimes can be constructed using a relatively small number of elements, in much the same way that a large number of words with recognisable meanings can be created using a relatively few standardised letters of the alphabet. Words can combine in a similar process of combinatorial explosion to create any message that can be imagined. Similarly, combining authority, planning and monitoring regimes can create a metalanguage of ‘spatial governance’ to give purpose, meaning and value to any spatiotemporal information system that can be imagined, described, interpreted and understood.
Resumo:
The advancement of GPS technology has made it possible to use GPS devices as orientation and navigation tools, but also as tools to track spatiotemporal information. GPS tracking data can be broadly applied in location-based services, such as spatial distribution of the economy, transportation routing and planning, traffic management and environmental control. Therefore, knowledge of how to process the data from a standard GPS device is crucial for further use. Previous studies have considered various issues of the data processing at the time. This paper, however, aims to outline a general procedure for processing GPS tracking data. The procedure is illustrated step-by-step by the processing of real-world GPS data of car movements in Borlänge in the centre of Sweden.
Resumo:
In recent years, there has been an enormous growth of location-aware devices, such as GPS embedded cell phones, mobile sensors and radio-frequency identification tags. The age of combining sensing, processing and communication in one device, gives rise to a vast number of applications leading to endless possibilities and a realization of mobile Wireless Sensor Network (mWSN) applications. As computing, sensing and communication become more ubiquitous, trajectory privacy becomes a critical piece of information and an important factor for commercial success. While on the move, sensor nodes continuously transmit data streams of sensed values and spatiotemporal information, known as ``trajectory information". If adversaries can intercept this information, they can monitor the trajectory path and capture the location of the source node. ^ This research stems from the recognition that the wide applicability of mWSNs will remain elusive unless a trajectory privacy preservation mechanism is developed. The outcome seeks to lay a firm foundation in the field of trajectory privacy preservation in mWSNs against external and internal trajectory privacy attacks. First, to prevent external attacks, we particularly investigated a context-based trajectory privacy-aware routing protocol to prevent the eavesdropping attack. Traditional shortest-path oriented routing algorithms give adversaries the possibility to locate the target node in a certain area. We designed the novel privacy-aware routing phase and utilized the trajectory dissimilarity between mobile nodes to mislead adversaries about the location where the message started its journey. Second, to detect internal attacks, we developed a software-based attestation solution to detect compromised nodes. We created the dynamic attestation node chain among neighboring nodes to examine the memory checksum of suspicious nodes. The computation time for memory traversal had been improved compared to the previous work. Finally, we revisited the trust issue in trajectory privacy preservation mechanism designs. We used Bayesian game theory to model and analyze cooperative, selfish and malicious nodes' behaviors in trajectory privacy preservation activities.^
Resumo:
In recent years, there has been an enormous growth of location-aware devices, such as GPS embedded cell phones, mobile sensors and radio-frequency identification tags. The age of combining sensing, processing and communication in one device, gives rise to a vast number of applications leading to endless possibilities and a realization of mobile Wireless Sensor Network (mWSN) applications. As computing, sensing and communication become more ubiquitous, trajectory privacy becomes a critical piece of information and an important factor for commercial success. While on the move, sensor nodes continuously transmit data streams of sensed values and spatiotemporal information, known as ``trajectory information". If adversaries can intercept this information, they can monitor the trajectory path and capture the location of the source node. This research stems from the recognition that the wide applicability of mWSNs will remain elusive unless a trajectory privacy preservation mechanism is developed. The outcome seeks to lay a firm foundation in the field of trajectory privacy preservation in mWSNs against external and internal trajectory privacy attacks. First, to prevent external attacks, we particularly investigated a context-based trajectory privacy-aware routing protocol to prevent the eavesdropping attack. Traditional shortest-path oriented routing algorithms give adversaries the possibility to locate the target node in a certain area. We designed the novel privacy-aware routing phase and utilized the trajectory dissimilarity between mobile nodes to mislead adversaries about the location where the message started its journey. Second, to detect internal attacks, we developed a software-based attestation solution to detect compromised nodes. We created the dynamic attestation node chain among neighboring nodes to examine the memory checksum of suspicious nodes. The computation time for memory traversal had been improved compared to the previous work. Finally, we revisited the trust issue in trajectory privacy preservation mechanism designs. We used Bayesian game theory to model and analyze cooperative, selfish and malicious nodes' behaviors in trajectory privacy preservation activities.
Resumo:
Background: The seasonality of suicide has long been recognised. However, little is known about the relative importance of socio-environmental factors in the occurrence of suicide in different geographical areas. This study examined the association of climate, socioeconomic and demographic factors with suicide in Queensland, Australia, using a spatiotemporal approach. Methods: Seasonal data on suicide, demographic variables and socioeconomic indexes for areas in each Local Government Area (LGA) between 1999 and 2003 were acquired from the Australian Bureau of Statistics. Climate data were supplied by the Australian Bureau of Meteorology. A multivariable generalized estimating equation model was used to examine the impact of socio-environmental factors on suicide. Results: The preliminary data analyses show that far north Queensland had the highest suicide incidence (e.g., Cook and Mornington Shires), while the south-western areas had the lowest incidence (e.g., Barcoo and Bauhinia Shires) in all the seasons. Maximum temperature, unemployment rate, the proportion of Indigenous population and the proportion of population with low individual income were statistically significantly and positively associated with suicide. There were weaker but not significant associations for other variables. Conclusions: Maximum temperature, the proportion of Indigenous population and unemployment rate appeared to be major determinants of suicide at a LGA level in Queensland.
Resumo:
A building information model (BIM) is an electronic repository of structured, three-dimensional data that captures both the physical and dynamic functional characteristics of a facility. In addition to its more traditional function as a tool to aid design and construction, a BIM can be used throughout the life cycle of a facility, functioning as a living database that places resources contained within the building in their spatial and temporal context. Through its comprehension of spatial relationships, a BIM can meaningfully represent and integrate previously isolated control and management systems and processes, and thereby provide a more intuitive interface to users. By placing processes in a spatial context, decision-making can be improved, with positive flow-on effects for security and efficiency. In this article, we systematically analyse the authorization requirements involved in the use of BIMs. We introduce the concept of using a BIM as a graphical tool to support spatial access control configuration and management (including physical access control). We also consider authorization requirements for regulating access to the structured data that exists within a BIM as well as to external systems and data repositories that can be accessed via the BIM interface. With a view to addressing these requirements we present a survey of relevant spatiotemporal access control models, focusing on features applicable to BIMs and highlighting capability gaps. Finally, we present a conceptual authorization framework that utilizes BIMs.
Resumo:
OBJECTIVE The aim of the study is to examine the spatiotemporal pattern of Japanese Encephalitis (JE) in mainland China during 2002-2010. Specific objectives of the study were to quantify the temporal variation in incidence of JE cases, to determine if clustering of JE cases exists, to detect high risk spatiotemporal clusters of JE cases and to provide evidence-based preventive suggestions to relevant stakeholders. METHODS Monthly JE cases at the county level in mainland China during 2002-2010 were obtained from the China Information System for Diseases Control and Prevention (CISDCP). For the purpose of the analysis, JE case counts for nine years were aggregated into four temporal periods (2002; 2003-2005; 2006; and 2007-2010). Local Indicators of Spatial Association and spatial scan statistics were performed to detect and evaluate local high risk space-time clusters. RESULTS JE incidence showed a decreasing trend from 2002 to 2005 but peaked in 2006, then fluctuated over the study period. Spatial cluster analysis detected high value clusters, mainly located in Southwestern China. Similarly, we identified a primary spatiotemporal cluster of JE in Southwestern China between July and August, with the geographical range of JE transmission increasing over the past years. CONCLUSION JE in China is geographically clustered and its spatial extent dynamically changed during the last nine years in mainland China. This indicates that risk factors for JE infection are likely to be spatially heterogeneous. The results may assist national and local health authorities in the development/refinement of a better preventive strategy and increase the effectiveness of public health interventions against JE transmission.
Resumo:
BACKGROUND: Dengue fever (DF) is one of the most important emerging arboviral human diseases. Globally, DF incidence has increased by 30-fold over the last fifty years, and the geographic range of the virus and its vectors has expanded. The disease is now endemic in more than 120 countries in tropical and subtropical parts of the world. This study examines the spatiotemporal trends of DF transmission in the Asia-Pacific region over a 50-year period, and identified the disease's cluster areas. METHODOLOGY AND FINDINGS: The World Health Organization's DengueNet provided the annual number of DF cases in 16 countries in the Asia-Pacific region for the period 1955 to 2004. This fifty-year dataset was divided into five ten-year periods as the basis for the investigation of DF transmission trends. Space-time cluster analyses were conducted using scan statistics to detect the disease clusters. This study shows an increasing trend in the spatiotemporal distribution of DF in the Asia-Pacific region over the study period. Thailand, Vietnam, Laos, Singapore and Malaysia are identified as the most likely clusters (relative risk = 13.02) of DF transmission in this region in the period studied (1995 to 2004). The study also indicates that, for the most part, DF transmission has expanded southwards in the region. CONCLUSIONS: This information will lead to the improvement of DF prevention and control strategies in the Asia-Pacific region by prioritizing control efforts and directing them where they are most needed.
Resumo:
In this paper, the problem of moving object detection in aerial video is addressed. While motion cues have been extensively exploited in the literature, how to use spatial information is still an open problem. To deal with this issue, we propose a novel hierarchical moving target detection method based on spatiotemporal saliency. Temporal saliency is used to get a coarse segmentation, and spatial saliency is extracted to obtain the object’s appearance details in candidate motion regions. Finally, by combining temporal and spatial saliency information, we can get refined detection results. Additionally, in order to give a full description of the object distribution, spatial saliency is detected in both pixel and region levels based on local contrast. Experiments conducted on the VIVID dataset show that the proposed method is efficient and accurate.
Resumo:
This thesis was a step forward in extracting valuable features from human's movement behaviour in terms of space utilisation based on Media-Access-Control data. This research offered a low-cost and less computational complexity approach compared to existing human's movement tracking methods. This research was successfully applied in QUT's Gardens Point campus and can be scaled to bigger environments and societies. Extractable information from human's movement by this approach can add a significant value to studying human's movement behaviour, enhancing future urban and interior design, improving crowd safety and evacuation plans.
Resumo:
The spatiotemporal dynamics of an alien species invasion across a real landscape are typically complex. While surveillance is an essential part of a management response, planning surveillance in space and time present a difficult challenge due to this complexity. We show here a method for determining the highest probability sites for occupancy across a landscape at an arbitrary point in the future, based on occupancy data from a single slice in time. We apply to the method to the invasion of Giant Hogweed, a serious weed in the Czech republic and throughout Europe.
Resumo:
Background Dengue fever has been a major public health concern in China since it re-emerged in Guangdong province in 1978. This study aimed to explore spatiotemporal characteristics of dengue fever cases for both indigenous and imported cases during recent years in Guangdong province, so as to identify high-risk areas of the province and thereby help plan resource allocation for dengue interventions. Methods Notifiable cases of dengue fever were collected from all 123 counties of Guangdong province from 2005 to 2010. Descriptive temporal and spatial analysis were conducted, including plotting of seasonal distribution of cases, and creating choropleth maps of cumulative incidence by county. The space-time scan statistic was used to determine space-time clusters of dengue fever cases at the county level, and a geographical information system was used to visualize the location of the clusters. Analysis were stratified by imported and indigenous origin. Results 1658 dengue fever cases were recorded in Guangdong province during the study period, including 94 imported cases and 1564 indigenous cases. Both imported and indigenous cases occurred more frequently in autumn. The areas affected by the indigenous and imported cases presented a geographically expanding trend over the study period. The results showed that the most likely cluster of imported cases (relative risk = 7.52, p < 0.001) and indigenous cases (relative risk = 153.56, p < 0.001) occurred in the Pearl River Delta Area; while a secondary cluster of indigenous cases occurred in one district of the Chao Shan Area (relative risk = 471.25, p < 0.001). Conclusions This study demonstrated that the geographic range of imported and indigenous dengue fever cases has expanded over recent years, and cases were significantly clustered in two heavily urbanised areas of Guangdong province. This provides the foundation for further investigation of risk factors and interventions in these high-risk areas.