Full text: Papers accepted on the basis of peer-reviewed abstracts (Part B)

IS, Vol. XXXVIII, Part 7B 
In: Wagner W., Székely, B. (eds.): ISPRS TC VII Symposium - 100 Years ISPRS, Vienna, Austria, July 5-7, 2010, IAPRS, Vol. XXXVIII, Part 7B 
19 
Hites are placed at three 
ler to find which one suits 
are briefed(UCAR 2009). 
)ital period is equal to the 
placed in high attitude of 
orm is viewing the same 
solution of imagery and 
this reason, imaging and 
geosynchronous. Thus 
2S are the most common 
Hite. This satellite passes 
he equator at the different 
a polar orbiting satellite 
vithin certain time period, 
e sensing applications. It 
h during one day. 
ironous. The satellite will 
:h at the same solar local 
cm above earth surface, 
g data is about 65 m as 
borne scanner. Any sensor 
position every other weeks 
;ly on solar energy as a 
a good choice for a space 
are 5, sun-synchronized is 
tuse its duration process of 
nary can provide data and 
e reason makes its profile 
e technique. Finally, polar 
i consideration despite the 
nt period. 
lar Sun-Synchronize 
jh High 
2 minute 9C-103 mintue — 
ice a day _ Once a 17-9' days 
continuous — Discontinuous - 
:e-bome scanner 
errestrial remote sensing is 
igh accuracy applications, 
and long range of 50-100, 
;ly. Principle of short rang 
id small objects. Medium 
¡curacy is using for 3D 
sensor frequently use for 
system, which are pleasing 
Panoramic scanner rotates 
n also scan 180 degrees 
land can rotate 360 degree 
degrees vertical swath. The 
ts on a fixed direction with 
lly and vertically. 
2.2 Candidate techniques 
In response to a warning from intrusion, illegalized activities 
over ROW will have stopped by the time the team who guards 
the ROW arrived over at given point. Whereas, this program is 
respected to scheduled program of the patrol and space- borne 
monitoring, there is no guarantee that a pipeline corridor 
equipped with a state of the art method of monitoring is 
protected against intrusion. Therefore, in response to the need 
of a continuous application, Grand Based Platform along with 
the state of the art techniques is considered. In the following 
section comparative technique are discussed and ranked based 
on the weight of the value. 
2.2.1 Comparative methods and techniques: Table 1 
highlights a number of advantages and disadvantages of 
candidate techniques. The column for A and B show certain 
similarities. There is the same rank of disadvantage for the 
Recurrent Period, Cost to Process and Lack of Sufficient Staff. 
in comparing with only two minor disadvantages of Cost to 
Capacity for ground based remote sensing technology and 
given Time to Stop an Intrusion from “technique C”. 
il 
21 
« 4 
Patrol, 
Helicopter 
Human eyes 
Yes 
paper based 
Report 
Low 
Real world 
Observation 
No 
High 
Scheduled 
Medium 
low 
High 
B- Space Borne 
Satellite&Airbor 
ne &UAV 
Camera & 
Sensor 
Yes 
Powerfull 
wares 
Medium 
Image and Data 
Remote sensing 
Yes 
High 
Scheduled 
Low 
High 
Medium- Pull 
Service 
*1 
? 
3 
2 
ID 
Ó 
Mobile based 
Sensor 
No 
GSM 
High 
Text 
Remote 
Sensing 
Yes 
Low 
Real time 
High 
High 
High-Push 
and Pull 
Techniques of monitoring 
Customizable platform 
User Interface and 
Lack of Sufficient Staff 
Data Analysis & Final Report 
Cost to Capacity 
High Resolution 
Detecting Moving object 
Warn about Natural Hazard 
Cost to Process 
Period and recurrent Period 
Concealment of Confidential area 
Time to Stop an intrusion 
Time to response (Push-Pull ) 
Table 1. Comparative Methods and Techniques 
Frequency or Recurrent Period defines length of time that is 
marked off by two observations. It is the act of observing 
comes back to the same area at almost same time. That is to 
say, a scheduled program is not provided continuous service for 
the company. For that reason, Cost to Process would make 
increase the expense of this process. Cost to Process means the 
money that company usually pay for a period of scheduled 
program. However, minimum interval would not be less than 6 
to 12 hours for those candidate techniques. That is to say, 
“technique B” pays out a bit higher for building capacity as 
well as running scheduled program. On the other hand, 
“technique C” shows that the Cost to Process for real time 
program is arguable although the Cost to Capacity itself would 
be expensive. Regarding The Lack of Sufficient Staff another 
weakness remarks that for both “A” and “B”. To put it another 
way, “technique A” always need to have on-call security and 
maintenance staff, as far as the requirement of professional 
analysts is concerned for “technique B”. Then again for 
“technique C” and B Time to Stop Intrusion is added to those 
disadvantages. For a case in point of warning about intrusion 
over given place, how long does it take till security and 
maintenance staff would be there? So multiple processing must 
be in place with trained staff and advanced application to 
achieve optimum system performance and safety. 
Conversely, the advantages of “technique B” over “A” are 
several items such as; User Interface, Report Generator, 
Detecting Moving Objects, and Warn about Natural Hazards, 
whereas with the reference to the need of notable items for the 
best candidate technique, some advantage are indicated. They 
are remarked as Time to Response, Continuous Monitoring. 
Less Cost to Process Online. Detecting Moving Object and 
Needing Few Trained Staff followed by Customizable 
Platform. In addition, Concealment of Confidential Area 
means to operate on limited area through the pipeline corridor 
from the level of official classification next above restricted 
and protected area such as; nature of interest, public awareness, 
historical and protected area, national park, dessert, forest, a 
secure place and mountainous corridor. Finally, in order to 
decrease the time of processing, Push Sen-ice would make it 
easy. Obviously, text processing needs as less as possible times 
to process. It would be an advantage to warn about intrusion at 
given time. To sum up, discussed parameter of the candidate 
technique are ranked as it shows in table2. 
Low importance =-2 High importance = 2 
High rank=5 
j Med rank =3 
| Low rank=l 
iportance Rate 
Patrol 
Space Borne 
Ground based 
C 
Parameter Ranked 
A 
B 
C 
Cost 
Lack of sufficient Staff 
1 
1 
3 
5 
Data Analysis & Final Report 
1 
3 
3 
5 
Cost to Process 
2 
1 
3 
5 
Cost to Capacity 
1 
5 
1 
3 
Customizable platform 
-2 
3 
1 
3 
Quality 
User Interface 
-1 
5 
3 
3 
Period and recurrent Period 
2 
1 
3 
5 
High Resolution 
1 
5 
3 
3 
Concealment of Confidential data 
2 
3 
1 
3 
Time 
Time to stop an intrusion 
2 
5 
3 
3 
Time to response ( Push-Pull) 
2 
1 
3 
5 
Detection 
Detecting Moving object 
1 
1 
1 
5 
Warn about Natural Hazard 
1 
1 
3 
5 
Table 2. Specification of candidate techniques 
Those parameters are classified in cost, quality> of data, 
frequency and detection. With reference to three techniques, 
technique A is weighed against both B and C which are space 
and ground based techniques respectively. Then again each 
parameter are assigned own factor between -2 and 2. Low 
importance is of course -2 whereas 2 present high importance 
parameter. Therefore important rate itself is multiplied by the 
given rank make score. Additionally, classified parameters are 
ascended from -2 to 2 as is depicted in Figure 6. The graph 
provides the ranking information of candidate technique. From 
top-down point of view, the first line (light green) plots 
specification of “technique C” while the second and third line 
(Red and Blue) show a detail description of “technique B” and 
A respectively. From the line graphs it can be seen that there 
are minimum and maximum score belonged to Customizable 
Platform in the extreme left, and Time to stop Intrusion in the 
extreme right. Maximum score reach over 10 is belong to the 
first line in Time to Response an Intrusion, Period and
	        
Waiting...

Note to user

Dear user,

In response to current developments in the web technology used by the Goobi viewer, the software no longer supports your browser.

Please use one of the following browsers to display this page correctly.

Thank you.