Cross-Checking Different Sources of Mobility Information

نویسندگان

  • Maxime Lenormand
  • Miguel Picornell
  • Oliva G. Cantu-Ros
  • Antònia Tugores
  • Thomas Louail
  • Ricardo Herranz
  • Marc Barthelemy
  • Enrique Frías-Martínez
  • José J. Ramasco
چکیده

The pervasive use of new mobile devices has allowed a better characterization in space and time of human concentrations and mobility in general. Besides its theoretical interest, describing mobility is of great importance for a number of practical applications ranging from the forecast of disease spreading to the design of new spaces in urban environments. While classical data sources, such as surveys or census, have a limited level of geographical resolution (e.g., districts, municipalities, counties are typically used) or are restricted to generic workdays or weekends, the data coming from mobile devices can be precisely located both in time and space. Most previous works have used a single data source to study human mobility patterns. Here we perform instead a cross-check analysis by comparing results obtained with data collected from three different sources: Twitter, census, and cell phones. The analysis is focused on the urban areas of Barcelona and Madrid, for which data of the three types is available. We assess the correlation between the datasets on different aspects: the spatial distribution of people concentration, the temporal evolution of people density, and the mobility patterns of individuals. Our results show that the three data sources are providing comparable information. Even though the representativeness of Twitter geolocated data is lower than that of mobile phone and census data, the correlations between the population density profiles and mobility patterns detected by the three datasets are close to one in a grid with cells of 2×2 and 1×1 square kilometers. This level of correlation supports the feasibility of interchanging the three data sources at the spatio-temporal scales considered.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Health Mobility Is All True Mobility?; Comment on “Regional Incentives and Patient Cross-border Mobility: Evidence From the Italian Experience”

In their study, Brenna and Spandonaro analyzed the mobility into Italian regions. In particular, it analyzes the situation of 5 regions, with very different backgrounds. With this paper, we try to better define the meaning of health mobility and to find its underlying causes. Furthermore, we propose a strategy that could help in controlling mobility flows that currently are the source of health...

متن کامل

Determining Varying Usage of Sources of Information among Different Involvement Groups

This study tries to investigate the difference in usage of sources of information by the consumers for FMCG products when they are segregated into homogeneous groups.  Mean value is calculated for each group which is ranked to identify the source of information more often used by each group. Further on, the one-way ANOVA (F-test) is performed on score values provided by the respondents to find ...

متن کامل

بهره گیری از سری زمانی داده های ماهواره ای به منظور اعتبارسنجی کانون های شناسایی شده تولید گرد و غبار استان البرز

Dust is one of the common processes of arid and semiarid regions that its occurrence frequencies has increased in recent years in Iran. The proper identification of sand and dust storms (SDS) is particular importance due to its impact on the environment and human health. So far, several methods for identifying these sources have been proposed such as methods based on field studies and geomorpho...

متن کامل

A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving

In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره 9  شماره 

صفحات  -

تاریخ انتشار 2014