scholarly journals A Survey on Trajectory Data Management, Analytics, and Learning

2021 ◽  
Vol 54 (2) ◽  
pp. 1-36
Author(s):  
Sheng Wang ◽  
Zhifeng Bao ◽  
J. Shane Culpepper ◽  
Gao Cong

Recent advances in sensor and mobile devices have enabled an unprecedented increase in the availability and collection of urban trajectory data, thus increasing the demand for more efficient ways to manage and analyze the data being produced. In this survey, we comprehensively review recent research trends in trajectory data management, ranging from trajectory pre-processing, storage, common trajectory analytic tools, such as querying spatial-only and spatial-textual trajectory data, and trajectory clustering. We also explore four closely related analytical tasks commonly used with trajectory data in interactive or real-time processing. Deep trajectory learning is also reviewed for the first time. Finally, we outline the essential qualities that a trajectory data management system should possess to maximize flexibility.

Author(s):  
Ruiyuan Li ◽  
Huajun He ◽  
Rubin Wang ◽  
Sijie Ruan ◽  
Tianfu He ◽  
...  

2021 ◽  
Vol 2021 ◽  
pp. 1-8
Author(s):  
Liang Xie ◽  
Xi Fang

With the advance of mobile technologies, mobile devices such as unmanned aerial vehicle (UAV) become more important in video surveillance. By applying mobile person re-identification (re-id), mobile devices can monitor pedestrians in the transportation system from complex environments. Since the computing and storage resources of mobile devices are limited, traditional person re-id methods are not appropriate for mobile condition. Besides, mobile person re-id task also requires real-time processing. In this paper, we propose a novel hashing method: online discrete anchor graph hashing (ODAGH) for mobile person re-id. ODAGH integrates the advantages of online learning and hashing technology. In ODAGH, we propose an online discrete optimization algorithm to improve the efficiency of anchor graph learning in the online scenario. Experimental results demonstrate the superiority of ODAGH in terms of both effect and efficiency.


Author(s):  
Xiaochun Tang ◽  
Jiawen Zhou

Aim. MRO2 system is a data management platform. It has the ability to manage and store all kinds of data in the product's lifecycle, that is both the mass storage capacity and the scalability are required. For the existing big-data stores for MRO2 systemeither only focus on the storage problem, or only do the scalability issue. In this paper, a two-layer data management model is proposed, in which the top layer uses the memory storage for scalability and the bottom layer uses the distributed key-value storage for mass storage. By adding a middle layer of the key group between the application and the KV storage system, the keys for real-time processing are combined to cache in a node. It satisfies the characteristics of the real-time application and improves the dynamic scalability. The present protocol of the dynamic key groups for real-time distributed computation for MRO2 system is explained in detail. And then the protocol for creating and deleting key groups is introduced. The third topic is an implement of a big-data store for supporting MRO2 system. In this topic, the delay times for creating and deleting the dynamic transaction groups to estimation are used. Finally, the experiments to appraise the present method are done. The response time of the present method is quite efficient in comparison with the other methods to be used inbig data storage systems.


Author(s):  
Yin Sheng Zhang

This study is to explore a newly configured data management system of Internet of Things and other intelligent technologies in ubiquitous computing based on semi-network OS architecture. Modern Internet of Things and other intelligent technologies have increasingly shown a trend of diversification and ubiquitous computing, and the usual mobile devices characterized by “single-task”, “stable”, “oriented”, and “immutable” are also bound to face the pressure and motion of reform and innovation. The advancement of merger of single-task mobile devices will be unstoppable, and the operating system rightfully needs to be divided into “base portion” and “expanded portion”, which just fits the concept of semi-network operating system architecture; the “base portion” is similar to existing “embedded operating system”, and the “expanded portion” is network resources. Today, the merger of single-task mobile devices and the formation of multi-task mobile devices have become general trend, and architecture of semi-network operating system can lay a new foundation for this wave of merger. The multi-task mobile device formed by merger of single-task mobile devices based on architecture of semi-network operating system has its special computing system: co-mobile computing system, where including a data management system. Multi-task mobile devices form a so-called co-mobile computing system, and also form a newly configured secure data management system, which is like a universal key to form a new working system for opening a lot of unspecified locks based on new principle and security mechanism.


2017 ◽  
Vol 4 (1) ◽  
pp. 62-66
Author(s):  
Luyen Ha Nam

From long, long time ago until nowadays information still takes a serious position for all aspect of life, fromindividual to organization. In ABC company information is somewhat very sensitive, very important. But how wekeep our information safe, well we have many ways to do that: in hard drive, removable disc etc. with otherorganizations they even have data centre to save their information. The objective of information security is to keep information safe from unwanted access. We applied Risk Mitigation Action framework on our data management system and after several months we have a result far better than before we use it: information more secure, quickly detect incidents, improve internal and external collaboration etc.


Sign in / Sign up

Export Citation Format

Share Document