Skip to main content

An Effective Method to Detect People in Danger

  • Conference paper
  • First Online:
Web-Age Information Management (WAIM 2014)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 8597))

Included in the following conference series:

Abstract

Instant disaster warning and accurate position information delivery are very helpful to reduce casualties and property losses in emergency management. Taking into account the fact that people and areas affected by disaster are always dynamically evolving, e.g., geo-areas suffered severe fire or infection are spreading and affected persons are increasing and moving. This paper proposes an effective method to support the location based query of PID (People in Danger), which can be used in guidance systems for emergency evacuation and surveillance. This method can deal with various kinds of moving objects like points and polygons that are widely used to express affected objects of disaster. The core of this method is to efficiently manage the dynamically changing status of all moving objects with the PIDA (People in Danger Algorithm) and accurately respond to various PID queries. The proposed algorithm consists of two major components: the TPRH-tree, which indexes all moving objects with constant or changing shapes in a unique structure, and the optimized position judgment algorithm, which is used to rapidly determine the location relationship between people in danger. In one hand, taking advantage of effective data processing, this method can efficiently handle various PID queries in emergency cases. In the other hand, it supports mutual location query and evacuation route recommendation for moving objects. The experimental results demonstrate that the feasibility of proposed algorithms with a wide range of use.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Tong, Z., Zhang, J., Luo, X., Bao, Y., Liu, X.: Study on grassland fires disaster emergency spatial decision support system based on case-base. In: Proceedings of the 4th International Conference on Risk Analysis and Crisis Response, Istanbul, Turkey, 27–29 August 2013, p. 397. CRC Press (2013)

    Google Scholar 

  2. Du, H., Gone, H., Jiang, Z., Zhang, J.: Key Technique Study of Emergency Spatial Data Management and Service System, p. 024 (2012)

    Google Scholar 

  3. Ertug, G.A., Kovel, J.P.: Using GIS in emergency management operations. J. Urban Plan. Dev. 126(3), 136–149 (2000)

    Article  Google Scholar 

  4. Murray, A.T., Tong, D., Grubesic, T.H.: Spatial optimization: expanding emergency services to address regional growth and development. Studies in Applied Geography and Spatial Analysis: Addressing Real World Issues, 109 (2012)

    Google Scholar 

  5. Wu, J., Yang, H., Gao, X., Ma, J., Liu, K.: Where to find help when you are in an emergency? In: Proceeding of the 2nd International Workshop on Emergency Management in Big Data Age (BIGEM 2014) (2014)

    Google Scholar 

  6. Hadjieleftheriou, M., et al.: R-trees–a dynamic index structure for spatial searching. In: Encyclopedia of GIS, pp. 993–1002. Springer US (2008)

    Google Scholar 

  7. Šaltenis, S., Jensen, C.S., Leutenegger, S.T., Lopez, M.A.: Indexing the positions of continuously moving objects. ACM Sigmod Rec. 29(2), 331–342 (2000)

    Article  Google Scholar 

  8. Saltenis, S., Jensen, C.S.: Indexing of moving objects for location-based services. In: Data Engineering 2002, pp. 463–472. IEEE (2002)

    Google Scholar 

  9. Haines, E.: Point in polygon strategies. In: Graphics Gems IV, vol. 994, pp. 24–26 (1994)

    Google Scholar 

  10. Žalik, B.: Point-in-polygon tests for geometric buffers. Comput. Geosci. 31(10), 1201–1212 (2005)

    Article  Google Scholar 

  11. Preparata, F.P., Ian Shamos, M.: Geometric Searching (1985)

    Google Scholar 

  12. Jimenez, J.J., Feito, F.R., Segura, R.J.: Robust and optimized algorithms for the point-in-polygon inclusion test without pre-processing. Comput. Graph. Forum 28(8), 2264–2274 (2009)

    Article  Google Scholar 

  13. Jiménez, J.J., Feito, F.R., Segura, R.J.: A new hierarchical triangle-based point-in-polygon data structure. Comput. Geosci. 35(9), 1843–1853 (2009)

    Article  Google Scholar 

  14. Hu, Y., Ravada, S., Anderson, R.: Geodetic point-in-polygon query processing in oracle spatial. In: Pfoser, D., Tao, Y., Mouratidis, K., Nascimento, M.A., Mokbel, M., Shekhar, S., Huang, Y. (eds.) SSTD 2011. LNCS, vol. 6849, pp. 297–312. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  15. Pedersen, R.N.: Point-in-polygon target location. U.S. Patent 8,416,122 (2013)

    Google Scholar 

  16. Sinha, S., Nanetti, L.: Inaccessibility-Inside Theorem for Point in Polygon. arXiv preprint arXiv:1010.0552 (2010)

    Google Scholar 

Download references

Acknowledgement

We would like to thank Dr. Jia Zhu and Mr. Yaguang Li for providing valuable suggestions. This work was supported by the National Natural Science Foundation of China (Nos. 91124001 and 91324008), and the Strategic Priority Research Program of the Chinese Academy of Sciences (No. XDA06010600).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hongtai Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Zhang, H., Liu, K., Wang, X., Guo, L., Ding, Z. (2014). An Effective Method to Detect People in Danger. In: Chen, Y., et al. Web-Age Information Management. WAIM 2014. Lecture Notes in Computer Science(), vol 8597. Springer, Cham. https://doi.org/10.1007/978-3-319-11538-2_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-11538-2_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-11537-5

  • Online ISBN: 978-3-319-11538-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics