90 research outputs found

    Assessing the accuracy of openstreetmap data in south africa for the purpose of integrating it with authoritative data

    Get PDF
    Includes bibliographical references.The introduction and success of Volunteered Geographic Information (VGI) has gained the interest of National Mapping Agencies (NMAs) worldwide. VGI is geographic information that is freely generated by non-experts and shared using VGI initiatives available on the Internet. The NMA of South Africa i.e. the Chief Directorate: National Geo- Spatial Information (CD: NGI) is looking to this volunteer information to maintain their topographical database; however, the main concern is the quality of the data. The purpose of this work is to assess whether it is feasible to use VGI to update the CD: NGI topographical database. The data from OpenStreetMap (OSM), which is one the most successful VGI initiatives, was compared to a reference data set provided by the CD: NGI. Corresponding features between the two data sets were compared in order to assess the various quality aspects. The investigation was split into quantitative and qualitative assessments. The aim of the quantitative assessments was to determine the internal quality of the OSM data. The internal quality elements included the positional accuracy, geometric accuracy, semantic accuracy and the completeness. The _rst part of the qualitative assessment was concerned with the currency of OSM data between 2006 and 2012. The second part of the assessment was focused on the uniformity of OSM data acquisition across South Africa. The quantitative results showed that both road and building features do not meet the CD: NGI positional accuracy standards. In some areas the positional accuracy of roads are close to the required accuracy. The buildings generally compare well in shape to the CD: NGI buildings. However, there were very few OSM polygon features to assess, thus the results are limited to a small sample. The semantic accuracy of roads was low. Volunteers do not generally classify roads correctly. Instead, many volunteers prefer to class roads generically. The last part of the quantitative results, the completeness, revealed that commercial areas reach high completeness percentages and sometimes exceed the total length of the CD: NGI roads. In residential areas, the percentages are lower and in low urban density areas, the lowest. Nonetheless, the OSM repository has seen signi_cant growth since 2006. The qualitative results showed that because the OSM repository has continued to grow since 2006, the level of currency has increased. In South Africa, the most contributions were made between 2010 and 2012. The OSM data set is thus current after 2012. The amount and type of contributions are however not uniform across the country for various reasons. The number of point contributions was low. Thus, the relationship between the type of contribution and the settlement type could not be made with certainty. Because the OSM data does not meet the CD: NGI spatial accuracy requirements, the two data sets cannot be integrated at the database level. Instead, two options are proposed. The CD: NGI could use the OSM data for detecting changes to the landscape only. The other recommendation is to transform and verify the OSM data. Only those features with a high positional accuracy would then be ingested. The CD: NGI currently has a shortage of sta_ that is quali_ed to process ancillary data. Both of the options proposed thus require automated techniques because it is time consuming to perform these tasks manually

    Proceedings of the 17th Annual Conference of the European Association for Machine Translation

    Get PDF
    Proceedings of the 17th Annual Conference of the European Association for Machine Translation (EAMT

    Ethical and Unethical Hacking

    Get PDF
    The goal of this chapter is to provide a conceptual analysis of ethical, comprising history, common usage and the attempt to provide a systematic classification that is both compatible with common usage and normatively adequate. Subsequently, the article identifies a tension between common usage and a normativelyadequate nomenclature. ‘Ethical hackers’ are often identified with hackers that abide to a code of ethics privileging business-friendly values. However, there is no guarantee that respecting such values is always compatible with the all-things-considered morally best act. It is recognised, however, that in terms of assessment, it may be quite difficult to determine who is an ethical hacker in the ‘all things considered’ sense, while society may agree more easily on the determination of who is one in the ‘business-friendly’ limited sense. The article concludes by suggesting a pragmatic best-practice approach for characterising ethical hacking, which reaches beyond business-friendly values and helps in the taking of decisions that are respectful of the hackers’ individual ethics in morally debatable, grey zones

    Best Practices and Recommendations for Cybersecurity Service Providers

    Full text link
    This chapter outlines some concrete best practices and recommendations for cybersecurity service providers, with a focus on data sharing, data protection and penetration testing. Based on a brief outline of dilemmas that cybersecurity service providers may experience in their daily operations, it discusses data handling policies and practices of cybersecurity vendors along the following five topics: customer data handling; information about breaches; threat intelligence; vulnerability-related information; and data involved when collaborating with peers, CERTs, cybersecurity research groups, etc. There is, furthermore, a discussion of specific issues of penetration testing such as customer recruitment and execution as well as the supervision and governance of penetration testing. The chapter closes with some general recommendations regarding improving the ethical decision-making procedures of private cybersecurity service providers

    Pattern Recognition

    Get PDF
    A wealth of advanced pattern recognition algorithms are emerging from the interdiscipline between technologies of effective visual features and the human-brain cognition process. Effective visual features are made possible through the rapid developments in appropriate sensor equipments, novel filter designs, and viable information processing architectures. While the understanding of human-brain cognition process broadens the way in which the computer can perform pattern recognition tasks. The present book is intended to collect representative researches around the globe focusing on low-level vision, filter design, features and image descriptors, data mining and analysis, and biologically inspired algorithms. The 27 chapters coved in this book disclose recent advances and new ideas in promoting the techniques, technology and applications of pattern recognition

    The Ethics of Cybersecurity

    Get PDF
    This open access book provides the first comprehensive collection of papers that provide an integrative view on cybersecurity. It discusses theories, problems and solutions on the relevant ethical issues involved. This work is sorely needed in a world where cybersecurity has become indispensable to protect trust and confidence in the digital infrastructure whilst respecting fundamental values like equality, fairness, freedom, or privacy. The book has a strong practical focus as it includes case studies outlining ethical issues in cybersecurity and presenting guidelines and other measures to tackle those issues. It is thus not only relevant for academics but also for practitioners in cybersecurity such as providers of security software, governmental CERTs or Chief Security Officers in companies

    Cognitive Foundations for Visual Analytics

    Full text link

    Models, Simulations, and the Reduction of Complexity

    Get PDF
    Modern science is a model-building activity. But how are models contructed? How are they related to theories and data? How do they explain complex scientific phenomena, and which role do computer simulations play? To address these questions which are highly relevant to scientists as well as to philosophers of science, 8 leading natural, engineering and social scientists reflect upon their modeling work, and 8 philosophers provide a commentary

    Models, Simulations, and the Reduction of Complexity

    Get PDF
    Modern science is a model-building activity. But how are models contructed? How are they related to theories and data? How do they explain complex scientific phenomena, and which role do computer simulations play? To address these questions which are highly relevant to scientists as well as to philosophers of science, 8 leading natural, engineering and social scientists reflect upon their modeling work, and 8 philosophers provide a commentary
    corecore