Aplikasi Teknologi Geospasial Berbasis Web Map Untuk Monitoring Bencana Epidemi Wabah Penyakit Covid-19 di Provinsi Riau

2021 ◽  
Author(s):  
Giant Amor
Keyword(s):  

Dimulai revolusi industri 4.0 terjadinya perkembangan teknologi yang sangat pesat salahsatunya dibidang informasi geospasial. Pemanfaatan teknologi sistem informasi geografis (SIG)sudah merambah pada berbagai aspek kehidupan. SIG juga sangat berkontribusi dalamperkembangan peradapan di kota-kota besar yang telah bertransformasi menjadi smart city.Keterbukaan informasi merupakan bahagian utama yang menjadi sasaran perkembangan smartcity. Tujuan dalam penelitian ini untuk mengengaplikasikan dan mengembangkan teknologi SIGberbasis Web Map dalam memetakan perseberan pasien covid 19 di Provinsi Riau. Melakukanuji kecepatan browser untuk mengakses web map informasi Covid 19. Dalam penelitian inidilakukan inventaris data berbasis cloud data spasial, perangkat yang digunakan berupaArcSIGPro untuk membangun webmap. Hasil dari penelitian ini ditemukan perkembanganjumlah pasien Covid-19 yang terus berkembang setiap waktu, yang direpresentasikan dalaminformasi lokasi. Tampilan akir web map ini dapat di akses melalui linkhttps://bit.ly/31EKXSW. Penggunaan WebSIG ini mampu memamaparankan informasi coviddengan sistem webmap lebih efisien untuk mengetahui spot –spot yang memiliki jumlah korbanyang relative tinggi, secara umum untuk kesemua jenis kasus Covid-19 tersebar banyak kasuspada wilayah administrasi Kabupaten Rokan Hulu, Rokan Hilir, Indragiri Hulu dan IndragiriHilir. Sedangkan untuk kasus positive covid-19 terbesar tersebar di wilayah Kota Pekanbarudengan jumlah 40 orang.

Author(s):  
Jiayong Yu ◽  
Longchen Ma ◽  
Maoyi Tian, ◽  
Xiushan Lu

The unmanned aerial vehicle (UAV)-mounted mobile LiDAR system (ULS) is widely used for geomatics owing to its efficient data acquisition and convenient operation. However, due to limited carrying capacity of a UAV, sensors integrated in the ULS should be small and lightweight, which results in decrease in the density of the collected scanning points. This affects registration between image data and point cloud data. To address this issue, the authors propose a method for registering and fusing ULS sequence images and laser point clouds, wherein they convert the problem of registering point cloud data and image data into a problem of matching feature points between the two images. First, a point cloud is selected to produce an intensity image. Subsequently, the corresponding feature points of the intensity image and the optical image are matched, and exterior orientation parameters are solved using a collinear equation based on image position and orientation. Finally, the sequence images are fused with the laser point cloud, based on the Global Navigation Satellite System (GNSS) time index of the optical image, to generate a true color point cloud. The experimental results show the higher registration accuracy and fusion speed of the proposed method, thereby demonstrating its accuracy and effectiveness.


Author(s):  
P. Sudheer ◽  
T. Lakshmi Surekha

Cloud computing is a revolutionary computing paradigm, which enables flexible, on-demand, and low-cost usage of computing resources, but the data is outsourced to some cloud servers, and various privacy concerns emerge from it. Various schemes based on the attribute-based encryption have been to secure the cloud storage. Data content privacy. A semi anonymous privilege control scheme AnonyControl to address not only the data privacy. But also the user identity privacy. AnonyControl decentralizes the central authority to limit the identity leakage and thus achieves semi anonymity. The  Anonymity –F which fully prevent the identity leakage and achieve the full anonymity.


Author(s):  
Umesh Banodha ◽  
Praveen Kumar Kataria

Cloud is an emerging technology that stores the necessary data and electronic form of data is produced in gigantic quantity. It is vital to maintain the efficacy of this data the need of data recovery services is highly essential. Cloud computing is anticipated as the vital foundation for the creation of IT enterprise and it is an impeccable solution to move databases and application software to big data centers where managing data and services is not completely reliable. Our focus will be on the cloud data storage security which is a vital feature when it comes to giving quality service. It should also be noted that cloud environment comprises of extremely dynamic and heterogeneous environment and because of high scale physical data and resources, the failure of data centre nodes is completely normal.Therefore, cloud environment needs effective adaptive management of data replication to handle the indispensable characteristic of the cloud environment. Disaster recovery using cloud resources is an attractive approach and data replication strategy which attentively helps to choose the data files for replication and the strategy proposed tells dynamically about the number of replicas and effective data nodes for replication. Thus, the objective of future algorithm is useful to help users together the information from a remote location where network connectivity is absent and secondly to recover files in case it gets deleted or wrecked because of any reason. Even, time oriented problems are getting resolved so in less time recovery process is executed.


2014 ◽  
Vol 13 (7) ◽  
pp. 4625-4632
Author(s):  
Jyh-Shyan Lin ◽  
Kuo-Hsiung Liao ◽  
Chao-Hsing Hsu

Cloud computing and cloud data storage have become important applications on the Internet. An important trend in cloud computing and cloud data storage is group collaboration since it is a great inducement for an entity to use a cloud service, especially for an international enterprise. In this paper we propose a cloud data storage scheme with some protocols to support group collaboration. A group of users can operate on a set of data collaboratively with dynamic data update supported. Every member of the group can access, update and verify the data independently. The verification can also be authorized to a third-party auditor for convenience.


2018 ◽  
Vol 6 (2) ◽  
pp. 287-292
Author(s):  
M.R. Dave ◽  
◽  
H.B. Patel ◽  
B. Shrimali ◽  
◽  
...  

Sign in / Sign up

Export Citation Format

Share Document