6,617 research outputs found
Training of Crisis Mappers and Map Production from Multi-sensor Data: Vernazza Case Study (Cinque Terre National Park, Italy)
This aim of paper is to presents the development of a multidisciplinary project carried out by the cooperation between Politecnico di Torino and ITHACA (Information Technology for Humanitarian Assistance, Cooperation and Action). The goal of the project was the training in geospatial data acquiring and processing for students attending Architecture and Engineering Courses, in order to start up a team of "volunteer mappers". Indeed, the project is aimed to document the environmental and built heritage subject to disaster; the purpose is to improve the capabilities of the actors involved in the activities connected in geospatial data collection, integration and sharing. The proposed area for testing the training activities is the Cinque Terre National Park, registered in the World Heritage List since 1997. The area was affected by flood on the 25th of October 2011. According to other international experiences, the group is expected to be active after emergencies in order to upgrade maps, using data acquired by typical geomatic methods and techniques such as terrestrial and aerial Lidar, close-range and aerial photogrammetry, topographic and GNSS instruments etc.; or by non conventional systems and instruments such us UAV, mobile mapping etc. The ultimate goal is to implement a WebGIS platform to share all the data collected with local authorities and the Civil Protectio
Anomaly Detection in Streaming Sensor Data
In this chapter we consider a cell phone network as a set of automatically
deployed sensors that records movement and interaction patterns of the
population. We discuss methods for detecting anomalies in the streaming data
produced by the cell phone network. We motivate this discussion by describing
the Wireless Phone Based Emergency Response (WIPER) system, a proof-of-concept
decision support system for emergency response managers. We also discuss some
of the scientific work enabled by this type of sensor data and the related
privacy issues. We describe scientific studies that use the cell phone data set
and steps we have taken to ensure the security of the data. We describe the
overall decision support system and discuss three methods of anomaly detection
that we have applied to the data.Comment: 35 pages. Book chapter to appear in "Intelligent Techniques for
Warehousing and Mining Sensor Network Data" (IGI Global), edited by A.
Cuzzocre
- …