IS, Vol. XXXVIII, Part 7B
In: Wagner W., Székely, B. (eds.): ISPRS TC VII Symposium - 100 Years ISPRS, Vienna, Austria, July 5-7, 2010, IAPRS, Vol. XXXVIII, Part 7B
19
Hites are placed at three
ler to find which one suits
are briefed(UCAR 2009).
)ital period is equal to the
placed in high attitude of
orm is viewing the same
solution of imagery and
this reason, imaging and
geosynchronous. Thus
2S are the most common
Hite. This satellite passes
he equator at the different
a polar orbiting satellite
vithin certain time period,
e sensing applications. It
h during one day.
ironous. The satellite will
:h at the same solar local
cm above earth surface,
g data is about 65 m as
borne scanner. Any sensor
position every other weeks
;ly on solar energy as a
a good choice for a space
are 5, sun-synchronized is
tuse its duration process of
nary can provide data and
e reason makes its profile
e technique. Finally, polar
i consideration despite the
nt period.
lar Sun-Synchronize
jh High
2 minute 9C-103 mintue —
ice a day _ Once a 17-9' days
continuous — Discontinuous -
:e-bome scanner
errestrial remote sensing is
igh accuracy applications,
and long range of 50-100,
;ly. Principle of short rang
id small objects. Medium
¡curacy is using for 3D
sensor frequently use for
system, which are pleasing
Panoramic scanner rotates
n also scan 180 degrees
land can rotate 360 degree
degrees vertical swath. The
ts on a fixed direction with
lly and vertically.
2.2 Candidate techniques
In response to a warning from intrusion, illegalized activities
over ROW will have stopped by the time the team who guards
the ROW arrived over at given point. Whereas, this program is
respected to scheduled program of the patrol and space- borne
monitoring, there is no guarantee that a pipeline corridor
equipped with a state of the art method of monitoring is
protected against intrusion. Therefore, in response to the need
of a continuous application, Grand Based Platform along with
the state of the art techniques is considered. In the following
section comparative technique are discussed and ranked based
on the weight of the value.
2.2.1 Comparative methods and techniques: Table 1
highlights a number of advantages and disadvantages of
candidate techniques. The column for A and B show certain
similarities. There is the same rank of disadvantage for the
Recurrent Period, Cost to Process and Lack of Sufficient Staff.
in comparing with only two minor disadvantages of Cost to
Capacity for ground based remote sensing technology and
given Time to Stop an Intrusion from “technique C”.
il
21
« 4
Patrol,
Helicopter
Human eyes
Yes
paper based
Report
Low
Real world
Observation
No
High
Scheduled
Medium
low
High
B- Space Borne
Satellite&Airbor
ne &UAV
Camera &
Sensor
Yes
Powerfull
wares
Medium
Image and Data
Remote sensing
Yes
High
Scheduled
Low
High
Medium- Pull
Service
*1
?
3
2
ID
Ó
Mobile based
Sensor
No
GSM
High
Text
Remote
Sensing
Yes
Low
Real time
High
High
High-Push
and Pull
Techniques of monitoring
Customizable platform
User Interface and
Lack of Sufficient Staff
Data Analysis & Final Report
Cost to Capacity
High Resolution
Detecting Moving object
Warn about Natural Hazard
Cost to Process
Period and recurrent Period
Concealment of Confidential area
Time to Stop an intrusion
Time to response (Push-Pull )
Table 1. Comparative Methods and Techniques
Frequency or Recurrent Period defines length of time that is
marked off by two observations. It is the act of observing
comes back to the same area at almost same time. That is to
say, a scheduled program is not provided continuous service for
the company. For that reason, Cost to Process would make
increase the expense of this process. Cost to Process means the
money that company usually pay for a period of scheduled
program. However, minimum interval would not be less than 6
to 12 hours for those candidate techniques. That is to say,
“technique B” pays out a bit higher for building capacity as
well as running scheduled program. On the other hand,
“technique C” shows that the Cost to Process for real time
program is arguable although the Cost to Capacity itself would
be expensive. Regarding The Lack of Sufficient Staff another
weakness remarks that for both “A” and “B”. To put it another
way, “technique A” always need to have on-call security and
maintenance staff, as far as the requirement of professional
analysts is concerned for “technique B”. Then again for
“technique C” and B Time to Stop Intrusion is added to those
disadvantages. For a case in point of warning about intrusion
over given place, how long does it take till security and
maintenance staff would be there? So multiple processing must
be in place with trained staff and advanced application to
achieve optimum system performance and safety.
Conversely, the advantages of “technique B” over “A” are
several items such as; User Interface, Report Generator,
Detecting Moving Objects, and Warn about Natural Hazards,
whereas with the reference to the need of notable items for the
best candidate technique, some advantage are indicated. They
are remarked as Time to Response, Continuous Monitoring.
Less Cost to Process Online. Detecting Moving Object and
Needing Few Trained Staff followed by Customizable
Platform. In addition, Concealment of Confidential Area
means to operate on limited area through the pipeline corridor
from the level of official classification next above restricted
and protected area such as; nature of interest, public awareness,
historical and protected area, national park, dessert, forest, a
secure place and mountainous corridor. Finally, in order to
decrease the time of processing, Push Sen-ice would make it
easy. Obviously, text processing needs as less as possible times
to process. It would be an advantage to warn about intrusion at
given time. To sum up, discussed parameter of the candidate
technique are ranked as it shows in table2.
Low importance =-2 High importance = 2
High rank=5
j Med rank =3
| Low rank=l
iportance Rate
Patrol
Space Borne
Ground based
C
Parameter Ranked
A
B
C
Cost
Lack of sufficient Staff
1
1
3
5
Data Analysis & Final Report
1
3
3
5
Cost to Process
2
1
3
5
Cost to Capacity
1
5
1
3
Customizable platform
-2
3
1
3
Quality
User Interface
-1
5
3
3
Period and recurrent Period
2
1
3
5
High Resolution
1
5
3
3
Concealment of Confidential data
2
3
1
3
Time
Time to stop an intrusion
2
5
3
3
Time to response ( Push-Pull)
2
1
3
5
Detection
Detecting Moving object
1
1
1
5
Warn about Natural Hazard
1
1
3
5
Table 2. Specification of candidate techniques
Those parameters are classified in cost, quality> of data,
frequency and detection. With reference to three techniques,
technique A is weighed against both B and C which are space
and ground based techniques respectively. Then again each
parameter are assigned own factor between -2 and 2. Low
importance is of course -2 whereas 2 present high importance
parameter. Therefore important rate itself is multiplied by the
given rank make score. Additionally, classified parameters are
ascended from -2 to 2 as is depicted in Figure 6. The graph
provides the ranking information of candidate technique. From
top-down point of view, the first line (light green) plots
specification of “technique C” while the second and third line
(Red and Blue) show a detail description of “technique B” and
A respectively. From the line graphs it can be seen that there
are minimum and maximum score belonged to Customizable
Platform in the extreme left, and Time to stop Intrusion in the
extreme right. Maximum score reach over 10 is belong to the
first line in Time to Response an Intrusion, Period and