Adaptive Concepts for a Mobile Cartoraphy
نویسنده
چکیده
GISs are moving away from a system for experts to a more widely-used tool for answering spatial-related questions. The dawn of new technologies on the horizon, such as telecommunication, mobile Internet, and handheld computing devices, offers new chances to the everyday use of geoinformation. However, existing approaches to mobile visualisation of geoinformation mostly have a commercial background and are rather technology-centred. This quite narrow view ignores many relevant problems and does not fully profit from the new possibilities a mobile cartography could provide. Taking the existing problems into account the paper sketches a general conceptual framework for geoinformation use in a mobile environment. Specific user tasks and requests in a mobile environment are identified, which is followed by an outline of possible methods to personalise a GIS for better mobile assistance. Putting emphasis on the importance of analytical functions for mobile cartography, the process of adaptive and dynamic generation of visualisations for mobile users on the basis of vector data (e.g. SVG) is illustrated and the key research fields involved are pointed out. Introduction For years GISs have been a tool for experts, running only on expensive machines requiring many skills. In the early nineties easy-to-use desktop GISs were introduced. With the widespread Internet and web mapping a further " democratisation " of geoinforma-tion use took place. And now, after the tremendous success of Internet and cellular telephone in the last decade, the next technological wave seems to be the convergence of the two: the mobile Internet. This brings web GIS and web mapping a step further, since the dissemination of digital geospatial data is no longer bounded to the desktop platform .
منابع مشابه
Iris localization by means of adaptive thresholding and Circular Hough Transform
In this paper, a new iris localization method for mobile devices is presented. Our system uses both intensity and saturation threshold on the captured eye images to determine iris boundary and sclera area, respectively. Estimated iris boundary pixels which have been placed outside the sclera will be removed. The remaining pixels are mainly the boundary of iris inside the sclera. Then, circular ...
متن کاملIntuitionistic fuzzy logic for adaptive energy efficient routing in mobile ad-hoc networks
In recent years, mobile ad-hoc networks have been used widely due to advances in wireless technology. These networks are formed in any environment that is needed without a fixed infrastructure or centralized management. Mobile ad-hoc networks have some characteristics and advantages such as wireless medium access, multi-hop routing, low cost development, dynamic topology and etc. In these netwo...
متن کاملNew Adaptive UKF Algorithm to Improve the Accuracy of SLAM
SLAM (Simultaneous Localization and Mapping) is a fundamental problem when an autonomous mobile robot explores an unknown environment by constructing/updating the environment map and localizing itself in this built map. The all-important problem of SLAM is revisited in this paper and a solution based on Adaptive Unscented Kalman Filter (AUKF) is presented. We will explain the detailed algorithm...
متن کاملDesign and Evaluation of a Method for Partitioning and Offloading Web-based Applications in Mobile Systems with Bandwidth Constraints
Computation offloading is known to be among the effective solutions of running heavy applications on smart mobile devices. However, irregular changes of a mobile data rate have direct impacts on code partitioning when offloading is in progress. It is believed that once a rate-adaptive partitioning performed, the replication of such substantial processes due to bandwidth fluctuation can be avoid...
متن کاملADAPTIVE ORDERED WEIGHTED AVERAGING FOR ANOMALY DETECTION IN CLUSTER-BASED MOBILE AD HOC NETWORKS
In this paper, an anomaly detection method in cluster-based mobile ad hoc networks with ad hoc on demand distance vector (AODV) routing protocol is proposed. In the method, the required features for describing the normal behavior of AODV are defined via step by step analysis of AODV and independent of any attack. In order to learn the normal behavior of AODV, a fuzzy averaging method is used fo...
متن کامل