This website uses cookies to ensure you have the best experience. Learn more

Location Type And Trip Purpose Detection Essay

3033 words - 12 pages

Travelers’ Diary

Location-Type and Trip-Purpose Detection

Each geographic position is associated with spatial information that could be used to derive contextual and factual information about the position and the objects at that position. The real-time positions of pedestrians, which are provided by mobile devices with global positioning system (GPS) capability, include information needed for identifying a pedestrian’s “context”, namely time of day, physical environment, a person’s mood and so (Asahara, Maruyama, Sato, & Seto, 2011).
The trajectory of a user (irrespective of the mode of transportation between positions) consists of a set of discrete positioning characterizing the user’s locations and activities. These discrete positions are therefore events constituting the traveler’s (user’s) diary. The information in this diary can be useful to the user and other officials. For instance, mining this data with other related information about positions can help derive information for the user such as the possible trip purpose. With such information, users can better plan their activities and actions ahead of time. Furthermore, this information can be useful in improving facility managements for different users. For example, given a position, underling information may reveal that the position is a commercial area whose population increases during a certain time. Transportation facilities around such area can be better managed using such information.
Traditional diaries contain voluntary information gathered by user. These diaries contain multiple information including places visited, trip purposes and activities at these places. However, these diaries are subject to information holes as data might be missing (due to failure of the user to remember details or there unwillingness to provide certain information) or inaccurate (due to the user’s poor recollection of events). Moreover, this information is kept private. Otherwise, this information could be used as an inspiration to different initiatives. For instance, with a diary containing bus delay experiences, proper authorities could use such personal experiences to model and plan for the use of several amenities and services. Furthermore, the use of traditional diaries is uncommon as only a small fraction of people utilize this. This may be due to several reasons including the considerable time-requirement to complete the information. Information from traditional diaries is therefore unreliable regardless of their privacy.
Getting timely, accurate and complete information about users positions without bridging their privacy is therefore a major challenge. Yet this information is useful for the better of users and facilities management.
There have been many efforts to combine GPS data with various travel survey data to improve the method and accuracy of data collection, while reducing the burden on the user to fill out tedious questionnaires. We have...

Find Another Essay On Location-Type and Trip-Purpose Detection

An Advanced Grammatical Evolution Approach for Intrusion Detection in Manet

1347 words - 6 pages grammar the mobility related feature and the packet related features are considered at every time interval by each node. The detection rate and the false positive rate of the intrusion is calculated using the fitness function, a fitness function is a particular type of objective function that is used to summarise, how close a given design solution is to achieving the set aims. 4.3 Experimental results In this advanced grammatical evolution

Distribution of Final Year Project: Communication and Components from the Sea

3661 words - 15 pages desired location and need so it give only path how to drive the motors. • Lcd screen is used here to show the new and updated location of ship and obstacle detection warning. • Motors is used here to drive the ship in according to desired condition need which is suitable according to environments need. 2.1.3 BLOCK DIAGRAM OF CONTROLLING SIDE ON OPERATORS POINT: 2.1.4 DESCRIPTION OF BLOCK DIAGRAM: • Remote control switch is

Autonomous SAR Robots Necessary for Natural Disasters

639 words - 3 pages under the wreckage, and sometime it does navigating due to incomplete map. Victim detection: Detect the victim and describe their shape, heat, motion etc. and report the location of the victim. Intelligent Agent/Component and Environment of the system Intelligent agent: Autonomous Search and Rescue (SAR) Robot. The autonomous SAR robot may have the components as listed below: • Infrared camera – used to differentiate between human and non-human

Intrusion Detection Systems and Intrusion Prevention Systems

1487 words - 6 pages happening, and attacking the organization through active response. Intrusion prevention is what prevents an attack from taking place and detection is the systems, and processes that identify the attacks (Mattord & Whitman, 2013, p. 283). One type of Intrusion detection prevention system is the network-based system. This kind of system is located on a computer or appliance that is connected to the organizations network as this is how it monitors the

Botnets: The Real Threat

4126 words - 17 pages to review all salient research work being done in this domain and present critical review so that efficient mitigation and defensive framework against botnets can be proposed. Keywords- botnet; IRC botnets; HTTP botnets; P2P botnetse; miscellanious botnets; botmaster; detection; mitigation; defensive framework; threat. I. INTRODUCTION Botnets software is usually installed through all type of attacking techniques like Trojan horses, worms

Case Brief of Illinois v. Caballes

1041 words - 5 pages Case Brief of Illinois v. Caballes Citation: 543 U.S. 405 (2005) Case Facts: Roy Caballes was stopped for speeding by an Illinois state trooper Daniel Gillette. During the traffic stop another state trooper Craig Graham of the Illinois State Police Drug Interdiction Team, overheard the stop on the radio and showed up to the scene with a narcotics detection dog. While the first trooper was writing Roy Caballes a warning ticket for speeding the

Review Analysis

749 words - 3 pages Review Analysis and Evaluation DECLARATIVE TITLE: Importance of careful assessment of oral cavity for suspicious lesions for early detection of multiple myeloma.1 ARTICLE TITLE AND BIBLIOGRAPHIC INFORMATION: Article title: “The multiple oral presentations of multiple myeloma”.1 Bibliographic information: Richard C. Cardoso & Peter J. Gerngross & Theresa M. Hofstede & Donna M. Weber & Mark S. Chambers. Support Care Cancer (2014) 22:259


7526 words - 30 pages emotional items (relative to the neutral items) than shown by young adults or greater facilitation g y , g , single target image of a different type from the remaining were asked to decide whether a different item was included in were recorded for each decision. Of primary interest were ) based on the valence and arousal levels of the target ung and older adults were equally focused on emotional t similar degrees of facilitation in the detection of


1168 words - 5 pages among caregivers did not relate to patients and caregivers’ disagreement in reporting pain behaviors. The results of this study replicate the earlier findings on the existence of attentional bias to pain among family caregivers of chronic pain patients (Mohammadi et al., 2012) and parents of children with pain (Liossi et al., 2012; Vervoort et al., 2011). In detection of attentional biases to pain information one of the substantial elements is

Facial Features Detection in Colour Images Based on Skin Colour Segmentation

924 words - 4 pages modeling, expression analysis, control system, video games control and security purpose. During the last year many method were proposed for facial features detection. Face detection method should be classified three categories, Knowledge based method, Template machine method and Appearance based method. Knowledge base method discussed about the basic facial features [1]. In case of template matching method face recognition is parameterized by

The Image Watermarking System

2446 words - 10 pages uses as one of their technique to authenticate the Indian currency. Fragile watermarks are used for this purpose so as to maintain the integrity and authenticity of the currency. 3 DIGITAL IMAGE WATERMARKING TECHNIQUES Any manipulations of image in image processing can be done in two ways, spatial and transform domain. Same is the case in digital image watermarking: 3.1 SPATIAL DOMAIN In this type of embedding manipulation is done

Similar Essays

Residential Education Essay

2154 words - 9 pages logistics, a major section of the pre-trip stage is gone and field trips may not be academically successful. One technique of achieving this objective is to provide partakers with mediated disclosure to the field trip location as section of pre-trip instruction. Mediated disclosure could include the field trip manager viewing partaker’s photographs, sketches, or a record of the location to be visited. This can occur at assembly erstwhile to the field

Multiple Object Segmantation Essay

603 words - 3 pages disturbance due to devices and object itself. Segmentation of fore ground object is complex problem in computer vision. Many techniques are developed to segment the objects in given frame of image. Object detection in any video system start with localization of object in given frames. The object location may be at one place or multiple places in same frame. Once target object is localized then it is passed to recognition system for recognition of

Networking And Security: Protecting Sensitive Data For Organizations

1265 words - 6 pages firewalls are employed by an organization to protect data and resources from intrusions. These preventive techniques are incapable of detecting attacks which exploit the strengths of any application programs. Hence; Intrusion Detection Systems have to come into existence as a second line of defense. IDS is software that automates the process of intrusion detection. The aim of an Intrusion Detection System, IDS, is to detect illegal and improper use

Heterogeneous Parallel Ensemble Classifiers For Face Detection

1254 words - 5 pages Heterogeneous Parallel Ensemble Classifiers for Face Detection Abstract - Face detection is a process to determine the presence of a human face in a given image, and if exists then returns the location of detected face. Face detection is a difficult process due to certain factors, such as background complexity, illumination conditions, scale, expression, position, orientation and pose of the face. The presence of external facial