Skip to main content

Trigger Based Security Alarming Scheme for Moving Objects on Road Networks

  • Conference paper
Intelligence and Security Informatics (ISI 2008)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 5075))

Included in the following conference series:

Abstract

The advent of modern monitoring applications such as location based services, presents several new challenges when dealing with continuously evolving spatio-temporal information. Spatio-Temporal data analysis plays a central role in many security-related applications including those relevant to transportation infrastructure, border and inland security. This paper reviews a novel binary encoding scheme to store location information and proposes a trigger based security alarming scheme when an object enters into a sensitive area with proper messages to the security people.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Zeng, D., Cahng, W., Chen, H.: Clustering based Spatio- Temporal Hotspot Analysis Techniqes in Security Informatics. IEEE Transactions on Intelligent Transportation Systems

    Google Scholar 

  2. Trajcevski, G.: Context-Aware Optimization of Continuous Range Queries Maintenance for Trajectories (2005)

    Google Scholar 

  3. Prasad, M.: Location Based Services (2002), http://www.GISdevelopment.net

  4. Jensen, C.S., Pedersen, T.B., Speicys, L., Timko, I.: Data Modeling for Mobile services in the Real World. In: Proceedings of the Eighth International Symposium on Spatial and Temporal Databases (2003)

    Google Scholar 

  5. Hage, C., Jensen, C.S., Pedersen, T.B., Speicys, I., Timko, I.: Integrated Data Management for Mobile services in the Real World. In: Proceedings of the Twenty Ninth International Conference on Very Large Databaes (2003)

    Google Scholar 

  6. Gupta, S., Kopparty, S., Ravishankar, C.: Roads, codes, and spatiotemporal queries. In: Proc. 22th ACM SIGACT-SIGMODSIGART Symposium on Principles of Database Systems, San Diego, California, pp. 115–124 (2004)

    Google Scholar 

  7. Papadias, D., Zhang, J., Mamoulis, N., Tao, Y.: Query processing in spatial network databases. In: Proc. 29th International Conference on Very Large Databases, Berlin, pp. 802–813 (2003)

    Google Scholar 

  8. Pfoser, D., Jensen, C.S.: Indexing of network constrained moving objects. In: 11th ACM Symposium on advances in Geographic Information Systems, New Orleans, Louisiana, pp. 25–32 (2003)

    Google Scholar 

  9. Pfoser, D., Jensen, C.S.: Trajectory indexing using movement constraints. In: V. Springer Science and Business Media B.V., GeoInformatica, pp. 25–32 (2005)

    Google Scholar 

  10. Faloutsos, C., Roseman, S.: Fractals for secondary key retrieval. In: 8th ACM SIGACTSIGMOD-SIGART Symposium on Principles of Database Systems, Philadelphia, Pennsylvania, pp. 247–252 (1989)

    Google Scholar 

  11. Almeida, V., Guting, R.H.: Indexing the trajectories of moving objects in networks. In: 16th International Conference on Scientific and Statistical Database Management, Santorini Island, pp. 115–118 (2004)

    Google Scholar 

  12. Almeida, V., Guting, R.H.: Indexing the trajectories of moving objects in networks. In: V. Springer Science and Business Media B.V., GeoInformatica, pp. 33–60 (2005)

    Google Scholar 

  13. Chakka, V.P., Everspaugh, A., Patel, J.M.: Indexing large trajectory data sets with SETI. In: 1st Conference on Innovative Data Systems Research, Asilomar, CA, pp. 164–175 (2003)

    Google Scholar 

  14. Frentzos, E.: Indexing objects moving on fixed networks. In: 8th International Symposium on Spatial and Temporal Databases, Santorini Island, pp. 289–305 (2003)

    Google Scholar 

  15. Orenstein, J.A., Merrett, T.H.: A class of data structures for associative searching. In: 3rd ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, Waterloo, Ontario, pp. 181–190 (1984)

    Google Scholar 

  16. Chang, W., Zeng, D., Chen, H.: Prospective Spatio-Temporal Data Anaysis for security Informatics, Department of management Information Systems at the University if Arizona, Tueson

    Google Scholar 

  17. Pfoser, D., Jensen, C.S., Theodoridis, Y.: Novel approaches in query processing for moving object trajectories. In: VLDB, pp. 395–406 (2000)

    Google Scholar 

  18. Lee, S., Park, S., Kim, W.-C.: An efficient location encoding method for moving objects using hierarchical administrative district and road network. Information Sciences 177, 832–843 (2007)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Abraham, S., Lal, P.S. (2008). Trigger Based Security Alarming Scheme for Moving Objects on Road Networks. In: Yang, C.C., et al. Intelligence and Security Informatics. ISI 2008. Lecture Notes in Computer Science, vol 5075. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-69304-8_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-69304-8_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-69136-5

  • Online ISBN: 978-3-540-69304-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics