Geographic Information System

Dinesh Bhattarai

Where am I?

Where do I need to go?

How do I get there?

  • Solar Compass
  • Magnetic Compass
  • Maps
  • GPS
  • GIS


  • Hardware/Sensors
  • Data
  • Database Engine
  • Apps and Processing

Data Capture

  • GPS
  • Camera
  • Drones
  • Satellites
  • Remote Sensing


  • Points
  • Shapes
  • Surfaces
  • Temporal data
  • Image(Vector and Raster) and Videos metadata


  • Clipping
  • Merging
  • Dissolving
  • Set Operations (Union intersection)


  • Google Map Pro
  • Leaflet - FOSS
  • OpenStreetMaps - Crowd sourced wikipedia for maps.
  • D3 - Visualization library.


Application: Maps (2D and 3D)

Layers, visualization, navigation, etc.

Application: Navigation, routing and scheduling

Telephone, internet, self driving car roads, drone delivery and shipping networks making efficient use of all available network bandwidth.

Application: Accident Analysis and hot spot analysis

Simulation, prevention, mitigation of accidents as a whole.

Application: Urban Planning

Road networks, fiber networks, delivery networks, drainage systems, electricity transmission line, etc.

Application: Agriculture

Irrigation, Crops monitoring, Pest Control, Mosture control, etc.

Application: Disaster management

Forecasting, planning, mitigation of flood, landslides, earthquakes, vulcanos, fires, pest control, etc

Application: Geology and Archaeology

Tracking environmental changes, landscape changes, preserving a digital copy of archaelogical ornament for study, etc

Application: Crime Control

Tracking of criminals, using geostatistics to predict crimes, planning for response, etc.

Application: Location Intelligence

Geofencing, location aware application, location aware projection, etc.

Application: Every IoT application

IoT incorporates GIS one way or other.

Application: Future

  • Virtual Environments, AR and maps
  • Indoor maps
  • Building plans, on place drone delivery.
  • Pokemon Go like AR environments, geofencing, projected imagery,


Threat: Hoarding of Private Data

Facebook, Google and other large companies are collecting data on every individual, using profiles as well as shadow profiles

Threat: Tracking of every move

Image metadata, web mining and cookies create a history of every move you made in the internet as well as in real world.

Threat: Misuse of data.

Military as well as terrorists can misuse your data. Even worse, politicians.


When guns get more powerful, you are as secure as your shield.

Proper handling of data

  • Compartmentalize your data
  • Share when it helps
  • Find who is using which of your personal data, and how.
  • Be cautious
  • Add some randomness
  • Use tools that you have control over. Find alternatives.