Pattern Classification for Geotag Generation

نویسنده

  • Di Qiu
چکیده

Geo-security, or location-based security service, provides authorization of persons or facilities based on their distinctive location information. It applies the field of position navigation and time (PNT) to the provision of security. Location-dependent parameters from radio navigation signals are quantized to compute a location verification tag or “geotag” to block or allow accesses by users. Adequate quantization steps of location-dependent parameters should be selected to achieve reliable performance. Loran is chosen as a case study because of its beneficial properties for location-based security services. The achievable performance and security of the system are determined by the quantity and quality of locationdependent parameters. By quantity, we mean the total number of different (independent) location-dependent measurements available. By quality, we mean the amount of unique location-dependent information and its consistency provided by each parameter that can be used to generate a robust geotag. It is desirable that the parameters be relatively insensitive to temporal changes that can weaken the uniqueness of the information. As a result, reproducibility and repeatable accuracy are fundamental requirements for any location-based security service. In practice, quantization error due to temporal variations in location-dependent parameters significantly degrades system reliability. In this paper we propose a new method to generate strong geotags from noisy location data. Pattern classification is the concept of assigning a physical object or measured data to one of the pre-specified groups, using a priori knowledge or statistical information. Three different classifier-based geotag generation algorithms are proposed, and real data are used to evaluate and compare their performance.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Contextual Policy Enforcement in Android Applications with Permission Event Graphs

ion Phase Verification Phase Apps Permission Event Graph Conformance or counterexamples Policies Approach Overview Case Study: Geotag "Mark location of your photos" Case Study: Geotag "Mark location of your photos" Case Study: Geotag "Mark location of your photos" Case Study: SMS Replicator Secret A spyware that secretly forwards every SMS to another number. Case Study: SMS Replicator Secret A ...

متن کامل

Study Impact of Architectural Style and Partial View on Landmark Recognition

Landmark recognition in image processing is one of the important object recognition problem. Some of the applications in smart phones with (Global Positioning System) GPS utilize the geotag information to recognize landmarks. However, tons of photos on the internet don?t have geotag. In addition, the GPS is not always very accurate to provide correct recognition. Thus, recognizing landmarks usi...

متن کامل

Weather-Adaptive Distance Metric for Landmark Image Classification

Visual appearance of landmark photos changes significantly in different weather conditions. In this work, we obtain weather information from a weather forecast website based on a landmark photo’s geotag and taken time information. With weather information, we adaptively adjust weightings for combining distances obtained based on different features and thus propose a weather-adaptive distance me...

متن کامل

State of the Geotags: Motivations and Recent Changes

The widespread adoption of smartphones has made it possible for large numbers of people to geotag their social media posts. Past work has studied the reasons people tag their location and the ways they do so on location-based social networks like Foursquare. But it is unclear how well these findings generalize to other social media not centered on location, such as Twitter or Flickr. Through an...

متن کامل

Static Security Constrained Generation Scheduling Using Sensitivity Characteristics of Neural Network

This paper proposes a novel approach for generation scheduling using sensitivitycharacteristic of a Security Analyzer Neural Network (SANN) for improving static securityof power system. In this paper, the potential overloading at the post contingency steadystateassociated with each line outage is proposed as a security index which is used forevaluation and enhancement of system static security....

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009