Place code

Last updated

A P-code, short for place code, is a kind of addressing system used mostly by emergency response teams. It provides unique identifiers to thousands of locations and administrative units in a humanitarian operation. The p-codes are represented by combinations of letters and/or numbers to identify a specific location or feature on a map or within a database. These codes provide a systematic means of linking data to an unambiguous location. Any information that is tagged with P-codes can be combined and analyzed with any other p-coded data. The p-codes for a country can be found in the Common Operational Datasets, which are standard geographic references for the humanitarian community provided by UN OCHA:

Related Research Articles

Hypertext Transfer Protocol Application protocol for distributed, collaborative, hypermedia information systems

The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed, collaborative, hypermedia information systems. HTTP is the foundation of data communication for the World Wide Web, where hypertext documents include hyperlinks to other resources that the user can easily access, for example by a mouse click or by tapping the screen in a web browser.

The Session Initiation Protocol (SIP) is a signaling protocol used for initiating, maintaining, and terminating real-time sessions that include voice, video and messaging applications. SIP is used for signaling and controlling multimedia communication sessions in applications of Internet telephony for voice and video calls, in private IP telephone systems, in instant messaging over Internet Protocol (IP) networks as well as mobile phone calling over LTE (VoLTE).

Identification friend or foe electronic system used to positively identify friendly systems

Identification, friend or foe (IFF) is a radar-based identification system designed for command and control. It uses a transponder that listens for an interrogation signal and then sends a response that identifies the broadcaster. It enables military and civilian air traffic control interrogation systems to identify aircraft, vehicles or forces as friendly and to determine their bearing and range from the interrogator. IFF may be used by both military and civilian aircraft. IFF was first developed during World War II, with the arrival of radar, and several friendly fire incidents.

Digital object identifier Character string used as a permanent identifier for a digital object, in a format controlled by the International DOI Foundation

A digital object identifier (DOI) is a persistent identifier or handle used to identify objects uniquely, standardized by the International Organization for Standardization (ISO). An implementation of the Handle System, DOIs are in wide use mainly to identify academic, professional, and government information, such as journal articles, research reports and data sets, and official publications though they also have been used to identify other types of information resources, such as commercial videos.

A geocode is a code that represents a geographic entity. It is a unique identifier of the entity, to distinguish it from others in a finite set of geographic entities. In general the geocode is a human-readable and short identifier.

Representational state transfer (REST) is a software architectural style that defines a set of constraints to be used for creating Web services. Web services that conform to the REST architectural style, called RESTful Web services, provide interoperability between computer systems on the Internet. RESTful Web services allow the requesting systems to access and manipulate textual representations of Web resources by using a uniform and predefined set of stateless operations. Other kinds of Web services, such as SOAP Web services, expose their own arbitrary sets of operations.

In computing, geolocation software is software that is capable of deducing the geolocation of a device connected to the Internet. The identification of a device's IP address can be used to determine the country, city, or post/ZIP code, determining an object's geographical location. Other methods include examination of a MAC address, image metadata, or credit card information.

Secure communication is when two entities are communicating and do not want a third party to listen in. For that they need to communicate in a way not susceptible to eavesdropping or interception. Secure communication includes means by which people can share information with varying degrees of certainty that third parties cannot intercept what was said. Other than spoken face-to-face communication with no possible eavesdropper, it is probably safe to say that no communication is guaranteed secure in this sense, although practical obstacles such as legislation, resources, technical issues, and the sheer volume of communication serve to limit surveillance.

A persistent uniform resource locator (PURL) is a uniform resource locator (URL) that is used to redirect to the location of the requested web resource. PURLs redirect HTTP clients using HTTP status codes.

United Nations Office for the Coordination of Humanitarian Affairs organization

The United Nations Office for the Coordination of Humanitarian Affairs (OCHA) is a United Nations (U.N.) body established in December 1991 by the General Assembly to strengthen the international response to complex emergencies and natural disasters. It is the successor to the Office of the United Nations Disaster Relief Coordinator (UNDRO).

The National Bridge Inventory (NBI) is a database, compiled by the Federal Highway Administration, with information on all bridges and tunnels in the United States that have roads passing above or below. This is similar to the grade crossing identifier number database compiled by the Federal Railroad Administration which identifies all railroad crossings. This bridge information includes the design of the bridge and the dimensions of the usable portion. The data is often used to analyze bridges and judge their conditions. The inventory is developed with the purpose of having a unified database for bridges to ensure the safety of the traveling public as required by the Federal-Aid Highway Act of 1968. It includes identification information, bridge types and specifications, operational conditions, bridge data including geometric data and functional description, and inspection data. Any bridge more than 20 feet long used for vehicular traffic is included.

Disaster response

Disaster response is the second phase of the disaster management cycle. It consists of a number of elements, for example; warning/evacuation, search and rescue, providing immediate assistance, assessing damage, continuing assistance and the immediate restoration or construction of infrastructure .The aim of emergency response is to provide immediate assistance to maintain life, improve health and support the morale of the affected population. Such assistance may range from providing specific but limited aid, such as assisting refugees with transport, temporary shelter, and food, to establishing semi-permanent settlement in camps and other locations. It also may involve initial repairs to damaged or diversion to infrastructure.

Geolocation identification of the real-world geographic location of an object

Geolocation is the identification or estimation of the real-world geographic location of an object, such as a radar source, mobile phone, or Internet-connected computer terminal. In its simplest form, geolocation involves the generation of a set of geographic coordinates and is closely related to the use of positioning systems, but its usefulness is enhanced by the use of these coordinates to determine a meaningful location, such as a street address.

A Uniform Type Identifier (UTI) is a text string used on software provided by Apple Inc. to uniquely identify a given class or type of item. Apple provides built-in UTIs to identify common system objects – document or image file types, folders and application bundles, streaming data, clipping data, movie data – and allows third party developers to add their own UTIs for application-specific or proprietary uses. Support for UTIs was added in the Mac OS X 10.4 operating system, integrated into the Spotlight desktop search technology, which uses UTIs to categorize documents. One of the primary design goals of UTIs was to eliminate the ambiguities and problems associated with inferring a file's content from its MIME type, filename extension, or type or creator code.

There are a number of meanings for the term humanitarian. Here humanitarian pertains to the practice of saving lives and alleviating suffering. It is usually related to emergency response whether in the case of a natural disaster or a man-made disaster such as war or other armed conflict. Humanitarian principles govern the way humanitarian response is carried out.

The HTTP response status code 303 See Other is a way to redirect web applications to a new URI, particularly after a HTTP POST has been performed, since RFC 2616.

Humanitarian Logistics humanitarian logistics

Although logistics has been mostly utilized in commercial supply chains, it is also an important tool in disaster relief operations. Humanitarian logistics is a branch of logistics which specializes in organizing the delivery and warehousing of supplies during natural disasters or complex emergencies to the affected area and people. However, this definition focuses only on the physical flow of goods to final destinations, and in reality, humanitarian logistics is far more complicated and includes forecasting and optimizing resources, managing inventory, and exchanging information.Thus, a good broader definition of humanitarian logistics is the process of planning, implementing and controlling the efficient, cost-effective flow and storage of goods and materials, as well as related information, from the point of origin to the point of consumption for the purpose of alleviating the suffering of vulnerable people.

The Handle System is the Corporation for National Research Initiatives's proprietary registry assigning persistent identifiers, or handles, to information resources, and for resolving "those handles into the information necessary to locate, access, and otherwise make use of the resources".

The Legal Entity Identifier (LEI) is unique global identifier of legal entities participating in financial transactions. These can be individuals, companies or government entities that participate in financial transaction. The identifier is used in reporting to financial regulators and all financial companies and funds are required to have an LEI.

Common Operational Datasets or CODs, are authoritative reference datasets needed to support operations and decision-making for all actors in a humanitarian response. CODs are 'best available' datasets that ensure consistency and simplify the discovery and exchange of key data. The data is typically geo-spatially linked using a coordinate system and have unique geographic identification codes (P-codes).

References