Full text: Papers accepted on the basis of peer-reviewed abstracts (Part B)

In: Wagner W., Székely, B. (eds.): ISPRS TC VII Symposium - 100 Years ISPRS, Vienna, Austria, July 5-7, 2010, IAPRS, Vol. XXXVIII, Part 7B 
20 
Recurrent Period and Cost to Process. In contrast, Red and 
Blue (B and A) have hardly 6 in both essential parameter of 
Recurrent Period and Cost to Process. Then again, Green line 
(C) is scored slightly less than 6 in Detecting Moving Object 
and Warning about Natural Hazard. Whereas Red and Blue (B 
and A) are scored below 2 in detecting moving object in given 
time. All in all, “technique C” is of course much better than 
“technique B” and “technique A” outside the Malfunction, 
Time to Stop an Intrusion, Data Resolution and Cost of 
Capacity. 
Figure 6. A quick view of candidate technique 
From technical point of view, a decision to choose appropriate 
technique will make based on access time to the area of 
operation(site) in order to prevent damage from occurring, 
standard and a perilous of petroleum transportation, the 
pipeline network topology, investment and applied 
technologies such as SCADA, optical fibre and national 
infrastructure. That is to say, type C is proposed as a Ground 
Based Remote Sensing method (GBRS). What is more about 
implementation, remote sensing sensors are installed along the 
pipeline (ROW). These detectors are electronic devices that can 
sense activities against corridors in real time. Intrusion will be 
recognized and analyzed by utilized techniques. As an obvious 
benefit of push service, decision maker will received an alarm 
message from the point that has been threatened. 
3. IMPLEMENTATION 
The proposed model needs to support by information and data 
from the pipeline corridor samples per second. So, the service 
should respond to context dynamically. Systems can 
dynamically change their response because the context is 
categorized as various, reactive, context-sensitive and 
environmentally directed(Gregory, Anind et al. 1999). These 
models are mostly introduced in the boarder context of 
interaction systems. It can include the user and 
applications(Anind 2001). From System Component point of 
view, proposed models is to capture important system 
components such as User. Location, Context and Data. (Anind 
2001) and (Schilit, Adams et al. 1994) introduce different 
contexts that are relevant to a user when accessing an 
information service. Localization and service are the main key- 
points in Context Processing application. It is an information 
service, accessible with mobile devices through the mobile 
network and utilizing the ability to make use of the 
geographical position of the mobile device (Shu Wang 2008). 
According to (Nivala, A-M et al. 2003) there are nine types of 
context with sequential access of Physical surroundings, 
Navigation history, Purpose of use, System properties, Time 
and Map user, including Social Culture and Orientation 
followed by Location Context. The result of the defined context 
shows that Context Processing service targets many users and 
is available in a mobile-network communication environment. 
Eventually, the service of context is provided for both pull and 
push services. Since Push-Services do not rely on previous user 
interaction with the services. If the corridor be threatened by 
external factors or disasters the information messages will be 
received. As is illustrated in figure 7, technical based 
components from Type C are: Detectors (those could be any 
kind of Sensor/Scanner depending on the corridor situation, 
Geographical location and the application purpose), 
Communication network, positioning technology, and data 
provider. 
Figure 7. localization and service 
Detectors, periodically report positioning information and send 
it all to the service providers. Obviously, the provision of the 
push services by such a database approach would involve a 
huge amount of signalling information, since the positions of 
all mobile devices have to be continuously transmitted to the 
database server and information has to be send to the devices 
(S. D. Hermann and A. Wolisz 2006). Supervisory and user 
beneficiaries can receive information through the internet with 
following sequential process. 
If an intrusion or a disaster happens over the ROW, the actual 
position of the sensor/ scanner is obtained from the positioning 
service. Afterwards, an exact position of occurrence is sent via 
communication network to a so called gateway. Consequently, 
the gateway has the task to exchange messages among a 
communication network and the internet. At the same time it 
will store information about all the sensors. A server reads the 
messages and sends them to a program analyzer. Moreover, the 
service analyses the message and pushes it to the receiver. 
Then, the service will find information on whether the corridor 
should be under extra control. In the end, results are sent to the 
consumer / supervisor via an internet gateway or mobile 
system. Finally, proper action is taken. 
3.1 Theoretical framework 
Regardless of the sensor technologies and scanner, a pipeline 
corridor can be scanned online by the ground based remote
	        
Waiting...

Note to user

Dear user,

In response to current developments in the web technology used by the Goobi viewer, the software no longer supports your browser.

Please use one of the following browsers to display this page correctly.

Thank you.