Skip to main content

What-If Emergency Response Through Higher Order Voronoi Diagrams

  • Chapter
  • First Online:
Security Informatics

Part of the book series: Annals of Information Systems ((AOIS,volume 9))

  • 1622 Accesses

Abstract

As witnessed in many recent disastrous events, what-if emergency response is becoming more and more important to prevent hazards, to plan for actions, to quickly respond to minimize losses, and to recover from damages. In this chapter, we propose a complete set of higher order Voronoi diagram-based emergency response system for what-if analysis which is particularly useful in highly dynamic environments. This system is based on a unified order-k Delaunay triangle data structure which supports various topological and regional queries, and what-if analysis. The proposed system encompasses (1) what-if scenarios when new changes are dynamically updated; (2) what-if scenarios when order-k generators (disasters or professional bodies) or their territorial regions are of interest; (3) what-if scenarios when ordered order-k generators or their territorial regions are of interest; (4) what-if scenarios when k-th nearest generators or their territorial regions are of interest; and (5) what-if scenarios with mixtures of the above.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Jayaraman V, Chandrasekhar M, Rao U: Managing the Natural Disasters from Space Technology Inputs. Acta Astronautica 40 (1997) 291–325

    Article  Google Scholar 

  2. Alexander D: Principles of Emergency Planning and Management. Oxford University Press, New York (2002)

    Google Scholar 

  3. Canton LG: Emergency Management: Concepts and Strategies for Effective Programs. Wiley, New Jersey (2007)

    Google Scholar 

  4. Haddow G, Bullock J, Coppola DP: Emergency Management. 2nd edn. Elsevier, Oxford (2007)

    Google Scholar 

  5. Chang N, Wei YL, Tseng CC, Kao CYJ: The Design of a GIS-Based Decision Support System for Chemical Emergency Preparedness and Response in an Urban Environment. Computers, Environment and Urban Systems 21(1) (1997) 67–94.

    Article  Google Scholar 

  6. Dymon UJ, Winter NL: Evacuation Mapping: The Utility of Guidelines. Disasters 17(1) (1993) 12–24

    Article  Google Scholar 

  7. Goodchild MF: GIS and Disasters: Planning for Catastrophe. Computers, Environment and Urban Systems 30(3) (2006) 227–229

    Article  Google Scholar 

  8. Kevany MJ: GIS in the World Trade Center Attack – Trial by Fire. Computers, Environment and Urban Systems 27(6) (2003) 571–583

    Article  Google Scholar 

  9. Montoya L: Geo-Data Acquisition Through Mobile GIS and Digital Video: An Urban Disaster Management Perspective. Environmental Modelling & Software 18(10) (2003) 869–876

    Article  MathSciNet  Google Scholar 

  10. Salt CA, Dunsmore MC: Development of a Spatial Decision Support System for Post-Emergency Management of Radioactively Contaminated Land. Journal of Environmental Management 58(3) (2000) 169–178

    Article  Google Scholar 

  11. Zerger A, Smith DI: Impediments to Using GIS for Real-Time Disaster Decision Support. Computers, Environment and Urban Systems 27(2) (2003) 123–141

    Article  Google Scholar 

  12. Gahegan M, Lee I: Data Structures and Algorithms to Support Interactive Spatial Analysis Using Dynamic Voronoi Diagrams. Computers, Environments and Urban Systems 24(6) (2000) 509–537

    Article  Google Scholar 

  13. Balasubramanian V, Massaguer D, Mehrotra S, Venkatasubramanian N: DrillSim: A Simulation Framework for Emergency Response Drills. In Mehrotra S, Zeng DD, Chen H, Thuraisingham BM, Wang FY, eds.: Proceedings of the IEEE International Conference on Intelligence and Security Informatics. Lecture Notes in Computer Science 3975, Springer, San Diego, CA (2006) 237–248

    Google Scholar 

  14. AEATechnology: EGRESS. http://www.aeat-safety-and- risk.com/html/egress.html (Accessed in 2006)

  15. CrowdDynamics: Myriad II. http://www.crowddynamics.com (Accessed in 2006)

  16. IES: Virtual Environment. http://www.iesve.com (Accessed in 2006)

  17. Lee I, Gahegan M: Interactive Analysis Using Voronoi Diagrams: Algorithms to Support Dynamic Update from a Generic Triangle-Based Data Structure. Transactions in GIS 6(2) (2002) 89–114

    Article  Google Scholar 

  18. Okabe A, Boots BN, Sugihara K, Chiu SN: Spatial Tessellations: Concepts and Applications of Voronoi Diagrams. 2nd edn. John Wiley & Sons, West Sussex (2000)

    Google Scholar 

  19. Gold CM: Problems with Handling Spatial Data – The Voronoi Approach. Canadian Institute of Surveying and Mapping Journal 45(1) (1991) 65–80

    Google Scholar 

  20. Aurenhammer F, Schwarzkopf O: A Simple On-Line Randomized Incremental Algorithm for Computing Higher Order Voronoi Diagrams. In: Proceedings of the Seventh Annual Symposium on Computational Geometry, ACM Press, North Conway, NH (1991) 142–151

    Chapter  Google Scholar 

  21. Chazelle B, Edelsbrunner H: An Improved Algorithm for Constructing kth-Order Voronoi Diagrams. IEEE Transactions on Computers 36(11) (1987) 1349–1354

    Article  MATH  MathSciNet  Google Scholar 

  22. Dehne FKHA: An O(N4) Algorithm to Construct all Voronoi Diagrams for K-Nearest Neighbor Searching in the Euclidean Plane. In Diaz J, ed.: Proceedings of the International Colloquium on Automata, Languages and Programming. Lecture Notes in Computer Science 154, Springer, Barcelona, Spain (1983) 160–172

    Google Scholar 

  23. Lee DT: On k-Nearest Neighbor Voronoi Diagrams in the Plane. IEEE Transactions on Computers 31(6) (1982) 478–487

    Article  MATH  Google Scholar 

  24. de Berg MT, van Kreveld MJ, Overmars MH, Schwarzkopf O: Computational Geometry: Algorithms and Applications. 2nd edn. Springer-Verlag, Heidelberg (2000)

    Google Scholar 

  25. Kraak MJ. Visualising Spatial Distributions. John Wiley & Sons Inc., New York (1998)

    Google Scholar 

  26. Murray AT, McGuffog I, Western JS, Mullins P: Exploratory Spatial Data Analysis Techniques for Examining Urban Crime. British Journal of Criminology 41(2001) 309–329

    Article  Google Scholar 

  27. Krause EF: Taxicab Geometry. Addison-Wesley, California (1975)

    Google Scholar 

  28. Jünger M, Kaibel V, Thienel S: Computing Delaunay Triangulations in Manhattan and Maximum Metric. Technical Report 94.174, Institutfur Informatik, Universitat zu Koln (1994) [Available at http://math.tu-berlin.de/ kaibel/papers/mandel.ps.gz].

  29. Lee I, Pershouse R, Phillips P, Christensen, C: What-if Emergency Management System: A Generalized Voronoi Diagram Approach. In: Proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics. Lecture Notes in Computer Science 4430, Springer, Taipei, Taiwan (2007) 58–69

    Google Scholar 

  30. Haddow GD, Bullock JA: Introduction to Emergency Management. Butterworth-Heinemann, Stoneham, MA (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Ickjai Lee , Reece Pershouse , Peter Phillips , Kyungmi Lee or Christopher Torpelund-Bruin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

Lee, I., Pershouse, R., Phillips, P., Lee, K., Torpelund-Bruin, C. (2010). What-If Emergency Response Through Higher Order Voronoi Diagrams. In: Yang, C., Chau, M., Wang, JH., Chen, H. (eds) Security Informatics. Annals of Information Systems, vol 9. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-1325-8_5

Download citation

  • DOI: https://doi.org/10.1007/978-1-4419-1325-8_5

  • Published:

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-1-4419-1324-1

  • Online ISBN: 978-1-4419-1325-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics