In: Wagner W., Székely, B. (eds.): ISPRS TC VII Symposium - 100 Years ISPRS, Vienna, Austria, July 5-7, 2010, IAPRS, Vol. XXXVIII, Part 7B
20
Recurrent Period and Cost to Process. In contrast, Red and
Blue (B and A) have hardly 6 in both essential parameter of
Recurrent Period and Cost to Process. Then again, Green line
(C) is scored slightly less than 6 in Detecting Moving Object
and Warning about Natural Hazard. Whereas Red and Blue (B
and A) are scored below 2 in detecting moving object in given
time. All in all, “technique C” is of course much better than
“technique B” and “technique A” outside the Malfunction,
Time to Stop an Intrusion, Data Resolution and Cost of
Capacity.
Figure 6. A quick view of candidate technique
From technical point of view, a decision to choose appropriate
technique will make based on access time to the area of
operation(site) in order to prevent damage from occurring,
standard and a perilous of petroleum transportation, the
pipeline network topology, investment and applied
technologies such as SCADA, optical fibre and national
infrastructure. That is to say, type C is proposed as a Ground
Based Remote Sensing method (GBRS). What is more about
implementation, remote sensing sensors are installed along the
pipeline (ROW). These detectors are electronic devices that can
sense activities against corridors in real time. Intrusion will be
recognized and analyzed by utilized techniques. As an obvious
benefit of push service, decision maker will received an alarm
message from the point that has been threatened.
3. IMPLEMENTATION
The proposed model needs to support by information and data
from the pipeline corridor samples per second. So, the service
should respond to context dynamically. Systems can
dynamically change their response because the context is
categorized as various, reactive, context-sensitive and
environmentally directed(Gregory, Anind et al. 1999). These
models are mostly introduced in the boarder context of
interaction systems. It can include the user and
applications(Anind 2001). From System Component point of
view, proposed models is to capture important system
components such as User. Location, Context and Data. (Anind
2001) and (Schilit, Adams et al. 1994) introduce different
contexts that are relevant to a user when accessing an
information service. Localization and service are the main key-
points in Context Processing application. It is an information
service, accessible with mobile devices through the mobile
network and utilizing the ability to make use of the
geographical position of the mobile device (Shu Wang 2008).
According to (Nivala, A-M et al. 2003) there are nine types of
context with sequential access of Physical surroundings,
Navigation history, Purpose of use, System properties, Time
and Map user, including Social Culture and Orientation
followed by Location Context. The result of the defined context
shows that Context Processing service targets many users and
is available in a mobile-network communication environment.
Eventually, the service of context is provided for both pull and
push services. Since Push-Services do not rely on previous user
interaction with the services. If the corridor be threatened by
external factors or disasters the information messages will be
received. As is illustrated in figure 7, technical based
components from Type C are: Detectors (those could be any
kind of Sensor/Scanner depending on the corridor situation,
Geographical location and the application purpose),
Communication network, positioning technology, and data
provider.
Figure 7. localization and service
Detectors, periodically report positioning information and send
it all to the service providers. Obviously, the provision of the
push services by such a database approach would involve a
huge amount of signalling information, since the positions of
all mobile devices have to be continuously transmitted to the
database server and information has to be send to the devices
(S. D. Hermann and A. Wolisz 2006). Supervisory and user
beneficiaries can receive information through the internet with
following sequential process.
If an intrusion or a disaster happens over the ROW, the actual
position of the sensor/ scanner is obtained from the positioning
service. Afterwards, an exact position of occurrence is sent via
communication network to a so called gateway. Consequently,
the gateway has the task to exchange messages among a
communication network and the internet. At the same time it
will store information about all the sensors. A server reads the
messages and sends them to a program analyzer. Moreover, the
service analyses the message and pushes it to the receiver.
Then, the service will find information on whether the corridor
should be under extra control. In the end, results are sent to the
consumer / supervisor via an internet gateway or mobile
system. Finally, proper action is taken.
3.1 Theoretical framework
Regardless of the sensor technologies and scanner, a pipeline
corridor can be scanned online by the ground based remote