Just - in - Time Mapping Scenario
نویسنده
چکیده
M uch of the information that underpins the challenges facing society today—terrorist activities, global environmental change, natural disasters—is geospatial in nature. An everyday example of key geospatial data is the location of a cell phone user who has dialed 911 in an emergency. In terrorist situations, the origins and destinations of phone calls, travel patterns of individuals, dispersal patterns of airborne chemicals, assessment of places at risk, and the allocation of resources are all geospatial data. As the volume of geospatial data increases by several orders of magnitude over the coming years, so will the potential for corresponding advances in knowledge of our world and in our ability to react to change. This article is excerpted from IT Roadmap to a Geospatial Future (National Academies Press, 2003; www.cstb.org/ project_geospatial.html), a US National Research Council report (see the related sidebar). The NRC report outlines an interdisciplinary research roadmap focusing on challenges in location-aware computing, databases and data mining, and human-computer-interaction technologies. Its contribution lies in integrating diverse perspectives, especially on future cross-disciplinary research directions. As Figure 1 shows, the convergence of advances in these three areas, combined with a sharp increase in the quality and quantity of geospatial information, promises to transform our world. Geospatial data have become critically important in areas ranging from crisis management and public health to national security and international commerce. The “Just-in-Time Mapping Scenario” sidebar on page 82 describes a vision of what is possible with integrative, multidisciplinary research efforts. We will need diverse technological advances to achieve this imaginative future.
منابع مشابه
Mapping SAP-Six Sigma Resources to Agile Management Processes
Enterprise Resource Planning (ERP) has become the most strategic tool for an organization to employ. A leading ERP solution is SAP®. It has been employed by organizations to enable them to collaborate on different projects and to integrate all aspects of operations. Just as organizations have adopted ERP solutions, they employed quality initiatives that are designed to help organizations ma...
متن کاملNovel Automated Method for Minirhizotron Image Analysis: Root Detection using Curvelet Transform
In this article a new method is introduced for distinguishing roots and background based on their digital curvelet transform in minirhizotron images. In the proposed method, the nonlinear mapping is applied on sub-band curvelet components followed by boundary detection using energy optimization concept. The curvelet transform has the excellent capability in detecting roots with different orient...
متن کاملNaturalness Mapping of Fereydounshahr County with Respect to Ecotourism, Using Ordered Weighted Averaging Operator
The importance of the economic aspect of tourism usually overshadow many natural tourism destinations. Fereydounshahr county in Isfahan province, with pristine mountainous landscapes and diverse natural features, has high potential to attract many tourists. However, pristineness over much of its area suggests limiting the public access based on the degree of naturalness. Hence, the aim of this ...
متن کاملDesigning of P controller to obtain desired time domain scenario of the output
One of the most applicable and simple controllers, which always attracts the researcherchr('39')s attention to obtain a proper closed-loop performance, is the P controller. Proper performance of a system defined in the presence of controller has been proposed with different expressions like rising time, settling time and maximum overshoot. But in the view of this paper, the proper performance o...
متن کاملReal-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach
Alert correlation systems attempt to discover the relations among alerts produced by one or more intrusion detection systems to determine the attack scenarios and their main motivations. In this paper a new IDS alert correlation method is proposed that can be used to detect attack scenarios in real-time. The proposed method is based on a causal approach due to the strength of causal methods in ...
متن کامل