Abstract
The advent of modern monitoring applications such as location based services, presents several new challenges when dealing with continuously evolving spatio-temporal information. Spatio-Temporal data analysis plays a central role in many security-related applications including those relevant to transportation infrastructure, border and inland security. This paper reviews a novel binary encoding scheme to store location information and proposes a trigger based security alarming scheme when an object enters into a sensitive area with proper messages to the security people.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Zeng, D., Cahng, W., Chen, H.: Clustering based Spatio- Temporal Hotspot Analysis Techniqes in Security Informatics. IEEE Transactions on Intelligent Transportation Systems
Trajcevski, G.: Context-Aware Optimization of Continuous Range Queries Maintenance for Trajectories (2005)
Prasad, M.: Location Based Services (2002), http://www.GISdevelopment.net
Jensen, C.S., Pedersen, T.B., Speicys, L., Timko, I.: Data Modeling for Mobile services in the Real World. In: Proceedings of the Eighth International Symposium on Spatial and Temporal Databases (2003)
Hage, C., Jensen, C.S., Pedersen, T.B., Speicys, I., Timko, I.: Integrated Data Management for Mobile services in the Real World. In: Proceedings of the Twenty Ninth International Conference on Very Large Databaes (2003)
Gupta, S., Kopparty, S., Ravishankar, C.: Roads, codes, and spatiotemporal queries. In: Proc. 22th ACM SIGACT-SIGMODSIGART Symposium on Principles of Database Systems, San Diego, California, pp. 115–124 (2004)
Papadias, D., Zhang, J., Mamoulis, N., Tao, Y.: Query processing in spatial network databases. In: Proc. 29th International Conference on Very Large Databases, Berlin, pp. 802–813 (2003)
Pfoser, D., Jensen, C.S.: Indexing of network constrained moving objects. In: 11th ACM Symposium on advances in Geographic Information Systems, New Orleans, Louisiana, pp. 25–32 (2003)
Pfoser, D., Jensen, C.S.: Trajectory indexing using movement constraints. In: V. Springer Science and Business Media B.V., GeoInformatica, pp. 25–32 (2005)
Faloutsos, C., Roseman, S.: Fractals for secondary key retrieval. In: 8th ACM SIGACTSIGMOD-SIGART Symposium on Principles of Database Systems, Philadelphia, Pennsylvania, pp. 247–252 (1989)
Almeida, V., Guting, R.H.: Indexing the trajectories of moving objects in networks. In: 16th International Conference on Scientific and Statistical Database Management, Santorini Island, pp. 115–118 (2004)
Almeida, V., Guting, R.H.: Indexing the trajectories of moving objects in networks. In: V. Springer Science and Business Media B.V., GeoInformatica, pp. 33–60 (2005)
Chakka, V.P., Everspaugh, A., Patel, J.M.: Indexing large trajectory data sets with SETI. In: 1st Conference on Innovative Data Systems Research, Asilomar, CA, pp. 164–175 (2003)
Frentzos, E.: Indexing objects moving on fixed networks. In: 8th International Symposium on Spatial and Temporal Databases, Santorini Island, pp. 289–305 (2003)
Orenstein, J.A., Merrett, T.H.: A class of data structures for associative searching. In: 3rd ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, Waterloo, Ontario, pp. 181–190 (1984)
Chang, W., Zeng, D., Chen, H.: Prospective Spatio-Temporal Data Anaysis for security Informatics, Department of management Information Systems at the University if Arizona, Tueson
Pfoser, D., Jensen, C.S., Theodoridis, Y.: Novel approaches in query processing for moving object trajectories. In: VLDB, pp. 395–406 (2000)
Lee, S., Park, S., Kim, W.-C.: An efficient location encoding method for moving objects using hierarchical administrative district and road network. Information Sciences 177, 832–843 (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Abraham, S., Lal, P.S. (2008). Trigger Based Security Alarming Scheme for Moving Objects on Road Networks. In: Yang, C.C., et al. Intelligence and Security Informatics. ISI 2008. Lecture Notes in Computer Science, vol 5075. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-69304-8_11
Download citation
DOI: https://doi.org/10.1007/978-3-540-69304-8_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-69136-5
Online ISBN: 978-3-540-69304-8
eBook Packages: Computer ScienceComputer Science (R0)