90 likes | 244 Views
Security Focus Group. Bruce Ralston University of Tennessee bralston@utk.edu. Special thanks to Dr. Rekha Pillai, ORNL; Dr. Hongbo Yu, Oklahoma State University, Dr. Val Naronha. Focus Group Vision.
E N D
Security Focus Group Bruce Ralston University of Tennessee bralston@utk.edu Special thanks to Dr. Rekha Pillai, ORNL; Dr. Hongbo Yu, Oklahoma State University, Dr. Val Naronha
Focus Group Vision • This focus group seeks to apply methods of geographic information science to problems of transport security. Included in this vision are the development of tools for security enhancement, security related data management including the collection, protection, and appropriate sharing of information, and the protection of individual rights with respect to transport information.
Research Questions and Topics • What are the best ways to visualize specific space-time paths when the volume of data is quite large? That is, when looking for a needle-in-a-haystack how do we confront the problem of ever increasing amounts of hay? Source: Yu, Hongbo
Research Questions and Topics • How can geospatial analysis support the management of jurisdictional boundaries when dealing with transport security? • How can methods of spatial transportation analysis be extended to reflect the challenges presented by multi-modal, multi-jurisdictional transport? “There were failures at every level of government—state, federal, and local”, Louisiana Gov. Blanco
Research Questions and Topics • How should existing data models, such as UNETRANS, FGDC 20-27(3) be adapted to support increased transport security? • How can methods of network design and analysis be adapted to explore the tradeoffs between transport system resiliency and economic efficiency?
Optimal=Vulnerable Resilient A B 2950 3055 A B 6124 4613
Research Questions and Topics • As security related transportation datasets become quite large, how should data models and algorithms be adapted to work in a high performance gird computing environment? • How can geospatial analysis methods be used to integrate multiple input sources, such as GPS, sensors, and image feeds to provide coherent security information?
Research Questions and Topics • Are there methods of analysis to use sources of geospatial information to fill in security related data gaps? • What methods of geospatial analysis should be used to analyze changing security profiles?