Remote Sensing from Space (eBook)
LII, 297 Seiten
Springer Netherland (Verlag)
978-1-4020-8484-3 (ISBN)
David Stevens Space-based information, which includes earth observation data, is increasingly becoming an integral part of our lives. We have been relying for decades on data obtained from meteorological satellites for updates on the weather and to monitor weather-related natural disasters such as hurricanes. We now count on our personal satellite-based navigation systems to guide us to the nearest Starbucks Coffee and use web-based applications such as Google Earth and Microsoft Virtual Earth to study the area of places we will or would like to visit. At the same time, satellite-based technologies have experienced impressive growth in recent years with an increase in the number of available sensors, an increase in spatial, temporal and spectral resolutions, an increase in the availability of radar satellites such as Terrasar-X and ALOS, and the launching of specific constellations such as the Disaster Monitoring Constellation (DMC), COSMO- SkyMed (COnstellation of small Satellites for the Mediterranean basin Observation) and RapidEye. Even more recent are the initiatives being set-up to ensure that space-based information is being accessed and used by decision makers, such as Sentinel Asia for the Asia and Pacific region and SERVIR for the Latin America and Caribbean region.
Remote Sensing from Space 2
Preface 4
Contents 6
About the Editors 9
List of Acronyms 12
About the Contributors 16
Introduction 39
Chapter 1 49
Definitions, Concepts and Geospatial Dimensions of Security 49
1.1 Introduction 49
1.2 Security Definitions 51
1.2.1 Theoretical Frameworks for Security Concepts 51
1.2.2 Realist Definition: State Security 51
1.2.3 Changes in Definition: Human Security 52
1.2.4 Criticisms of the Human Security Concept 53
1.2.5 Gender Perspective in Security 53
1.3 On Course for a European Security Concept? 54
1.3.1 Historical Development of EU Security Policy 54
1.3.2 Legal, Institutional and Political Aspects Hampering the Development of a Coherent EU Security Concept 56
1.4 Spatial Component of Security 57
1.4.1 Spatial Concepts Related to State and Human Security Definitions 58
1.4.2 Spatial and Quantitative Analysis of Security 59
1.4.3 Geospatial Technologies for Security 60
1.4.3.1 Cartography 60
1.4.3.2 Earth Observation 60
1.4.3.3 Navigation 61
1.4.3.4 GIS 61
1.5 Conclusions: Geospatial Concepts and Tools to Support EU Security Policy 62
References 64
Chapter 2 66
European Security Policy and Earth Observation 66
2.1 A New Security Landscape 66
2.2 Major Threats and Risks 67
2.3 Strategic Objectives and Policy Implications 68
2.4 The Information Requirement 68
2.5 Customers 69
2.6 Earth Observation and Crisis Management 70
2.7 Targets for Earth Observation 71
2.8 Recent Work 71
2.8.1 Earth Observation in the Overall Information Picture 71
2.8.1.1 Prioritisation 72
2.8.2 Emerging Crises 74
2.8.3 Classification of EO Data 74
References 75
Background Information/Useful URLs 75
Chapter 3 77
Satellite Based Information to Support European Crisis Response 77
3.1 Introduction 78
3.2 Crisis Patterns Relevant for Europe 79
3.3 Satellite Imagery in European Crisis Management 80
3.3.1 Charter on Space and Major Disasters 81
3.3.2 Global Monitoring for Environment and Security: GMES 82
3.3.3 Group on Earth Observation: GEO 82
3.3.4 Satellite Imagery as It Is Applied Today 83
Assessment of an Explosion of Old Ammunition in the Ukraine 83
Base and Crisis Mapping of the Al Fashir and Al Junaynah Region, Darfur/Sudan 83
Verifying Nuclear Non-Proliferation Treaties 86
3.4 Involving the Scientific Community 86
3.4.1 Simulations and Exercises 86
3.5 Conclusion and Outlook 88
Chapter 4 90
The Security Dimension of GMES 90
4.1 Introduction 91
4.2 Security Issues Within GMES 92
4.3 Security Research Within GMES 94
4.4 GMOSS and its Role within GMES 95
4.4.1 Introduction 95
4.4.2 GMOSS Structure and Work Packages 97
References 98
Chapter 5 100
A Novel Approach to Capacity Building for Security Applications 100
5.1 Security and Threat 101
5.2 Concept for Capacity Building 103
5.3 GMOSS Summer Schools 104
5.4 Achievements and Challenges 105
5.5 Conclusions 109
References 110
Chapter 6 111
Games and Scenarios in the Context of GMOSS 111
6.1 Introduction 111
6.2 Gaming as a Tool for Analysis and Training 112
6.2.1 What Is a Game? 112
6.2.2 How to Run a Game? Theory About Practice 113
6.2.3 Typology of Games: The Aim and Construction of a Game 114
6.2.4 Open or Closed Games? 116
6.2.5 GMOSS Games for Various Purposes 117
6.3 Scenario Design 117
6.3.1 General Considerations 117
6.3.2 Scenario Design for GMOSS 118
6.4 Summary of Gaming and Scenario Experiences in GMOSS 121
Appendix 1 GMOSS Game at the Annual Workshop in Brussels, November 8, 2004 121
1 Background Scenarios 121
Europe Faces Increased Threat from Terrorism and Organized Crime 121
Homeland Security Commissioner: Tasks and Mandate 122
The European Surveillance Agency 123
2 Issues to Be Considered During the Game 123
Part 1 Defining the Tasks of the European Surveillance Agency 123
Part 2 Identify the Way the European Surveillance Agency Would Handle a Threat Scenario 124
Appendix 2 Scenario Design Approach for GMOSS 124
References 126
Chapter 7 127
GMOSS: Infrastructure and Standards 127
7.1 Introduction 127
7.1.1 Why Are Standards Important? 127
7.1.2 Types of Standards 129
7.1.3 Who Are Standards Important To? 129
7.1.4 Scope of GMOSS 132
7.2 Standards Bodies and Initiatives 133
7.2.1 Security and Remote Sensing 133
7.3 Standards for GMOSS 134
7.3.1 Generic Tools 134
7.3.2 Applications and Security Concepts 135
7.4 Data Sharing: An Example of Implementation in GMOSS 136
7.4.1 Data 136
7.4.2 Digital Rights Management (DRM) 137
7.4.3 Metadata 138
7.4.4 Data Catalogues 139
7.4.5 Future Direction 142
Chapter 8 143
Feature Recognition Techniques 143
8.1 Introduction 144
8.2 Feature Catalogue and Image Pre-processing 144
8.3 Land-Cover Classification Systems 147
8.4 Object Detection Systems 149
8.4.1 Man-Made Object Recognition 149
8.4.1.1 Example Database 149
8.4.1.2 Geometrical Characterization of Objects 150
8.4.1.3 Learning and Classification 151
8.4.1.4 Results and Discussion 151
8.4.1.5 Conclusions 153
8.4.2 Automatic Linear Feature Extraction 154
8.4.3 Automatic Verification of Man Made Structures 154
8.5 Summary and Conclusions 155
References 156
Chapter 9 157
Change Detection Tools 157
9.1 Introduction 158
9.2 Change Detection Using Optical and Multispectral Images 158
9.3 Change Detection Using Synthetic Aperture Radar Images 166
9.4 Three-dimensional Change Detection 170
9.5 Summary and Conclusions 173
Appendix Catalogue on Change Detection Applications, Data and Methods for the Application Work Packages 20400–20900 174
References 177
Chapter 10 179
Data Integration and Visualization for Crisis Applications 179
10.1 Introduction 180
10.2 Requirements for Security Applications 181
10.2.1 Speed, Real-Time Delivery and Realism 181
10.2.2 Detection and Ground Sensor Network 182
10.2.2.1 CARABAS 182
10.2.2.2 Ground Sensor Network 183
10.2.3 Common Operational Picture (COP) 184
10.3 Data Integration, Visualisation and Dissemination 186
10.3.1 Fast and Automatic Scene Generation: Rapid Visualization 186
10.3.1.1 Matching and Integration of Various Source Data 187
10.3.1.2 Object-Based Information Extraction 187
10.3.1.3 Object Libraries 189
10.3.1.4 Visualisation 189
10.3.2 Web-Based Visualization for Information Dissemination 190
10.3.2.1 Online Map Presentation 191
10.3.2.2 Real-Time 3D-Visualisation 192
10.3.3 Overview of 3D Tools 193
10.3.3.1 Two-Dimensional/Three-Dimensional Visualization Tools Emerged from GIS Technology Including Globe Viewers 194
10.3.3.2 Three-Dimensional Visualization Tools Originating from Computer Graphics 195
10.4 Conclusions 197
References 198
Chapter 11 199
UNOSAT Grid 199
11.1 Introduction 199
11.2 From Science–Fiction to Reality 200
References 201
Chapter 12 203
Treaty Monitoring 203
12.1 Introduction 204
12.2 Arms Control Treaties 205
12.3 The 1970 NPT 205
12.4 Digital Image Processing for Verification of Monitoring the NPT 206
12.4.1 Key for Research and Power Reactors and Conventional Power Plants 206
12.4.2 Research Reactors 207
12.4.3 Power Reactors 209
12.4.4 Conventional Power Station 210
12.4.5 Multispectral Change Detection 212
12.4.6 Detection of Changes Using Synthetic Aperture Radar (SAR) Images 214
12.4.7 Automated Object-Based Image Analysis 216
12.4.8 Analysis of Hyperspectral Satellite Imagery 218
12.5 Comprehensive Nuclear Test Ban Treaty (CTBT) 220
12.6 Digital Image Processing for CTBTO Monitoring 221
12.7 Conclusions and Outlook 222
References 223
Chapter 13 225
Early Warnings and Alerts 225
13.1 Introduction 226
13.2 Early/Rapid Alert for Security 227
13.3 Short/Medium Term Early Warnings of Security Events 228
13.4 Satellites Observations for Early Warnings and Alerts Within GMOSS 228
13.5 Satellite Observations at High (NOAA-AVHRR Data) or Very High (MSG-SEVIRI Data) Temporal Resolution: the RST Approach 229
13.6 Satellite Observations with High Spatial Resolution 236
13.6.1 Some Oil Wells Observed 236
13.6.2 Some Oil Leaks Observed 237
13.6.3 Observation Along the India–Pakistan Border 239
13.6.4 Some Preliminary Conclusions 243
13.7 Open Issues, Challenges and Future Perspectives 243
References 244
Chapter 14 246
Can Earth Observation Help to Improve Information on Population? 246
14.1 Introduction 246
14.2 Population Data in Emergency Response 248
14.2.1 Alerting 249
14.2.1.1 Future Direction 252
14.2.2 Local Population Estimates in Informal Settlements 252
14.2.2.1 Future Direction 253
14.2.3 Population Density Estimations 254
14.2.3.1 National and Sub-national Population Density Estimations 257
14.2.3.2 Zimbabwe Case Study 258
14.2.3.3 The Iraq Study Site 258
14.2.3.4 Future Direction 261
14.2.4 The Spatial Component of Population Vulnerability 261
14.2.4.1 The Iraq Study Site 262
14.2.4.2 Future Direction 263
14.3 Discussion 264
14.3.1 Spatial Temporal Characteristics of Population 268
14.4 Conclusions 269
References 270
Chapter 15 273
From Real Time Border Monitoring to a Permeability Model 273
15.1 Introduction 274
15.2 Areas of Study 275
15.3 Data Analysis 276
15.3.1 Statistical Databases 276
15.3.2 Survey 278
15.3.3 Earth Observation Information 280
15.4 Permeability Models for the Two Study Areas 284
15.4.1 The EU-25 Border Permeability Model 284
15.4.2 The Central African Permeability Model 288
15.5 Discussions 290
15.6 Conclusions 291
Annex: Questionnaire 292
References 292
Chapter 16 294
Rapid Mapping and Damage Assessment 294
16.1 Introduction 294
16.2 Rapid Mapping and Overview of Damages 295
16.2.1 Rapid Overview of Damaged Areas Using Satellites with a Short Revisit Time 296
16.2.2 Rapid Mapping Service for Satellite Based Crisis Information 298
16.3 Detailed Assessment of Damages 302
16.3.1 Detailed Analysis of Damages Using High-Resolution Satellite Imagery 304
16.3.2 Use of 3D Data to Determine Damages of Buildings 307
16.3.3 Detailed Damage Assessment Based on Visual Inspection of Using High-Resolution Satellite Imagery 308
16.3.4 Damage Assessment Using Radar Satellite Images 310
16.3.5 Damage Assessment and Risk Assessment of Damages in Alpine Regions Using Satellite Images 312
16.4 Conclusion 314
Overview of User Requirements and Activities of GMOSS Partners on Rapid Mapping and Damage Assessment 317
References 319
Summary and Outlook 320
Index 323
Erscheint lt. Verlag | 17.9.2009 |
---|---|
Zusatzinfo | LII, 297 p. |
Verlagsort | Dordrecht |
Sprache | englisch |
Themenwelt | Mathematik / Informatik ► Informatik ► Grafik / Design |
Informatik ► Theorie / Studium ► Künstliche Intelligenz / Robotik | |
Naturwissenschaften ► Geowissenschaften ► Geografie / Kartografie | |
Naturwissenschaften ► Geowissenschaften ► Geologie | |
Sozialwissenschaften ► Politik / Verwaltung ► Europäische / Internationale Politik | |
Technik | |
Schlagworte | Change detection • Civil Security • conflict • Conflicts • Crisis Management • Europe • Geoinformationssysteme • Geospatial • Image Processing • International Security • mapping • national security • Peace • Remote Sensing • Remote Sensing/Photogrammetry • Satellite • Visualization |
ISBN-10 | 1-4020-8484-6 / 1402084846 |
ISBN-13 | 978-1-4020-8484-3 / 9781402084843 |
Haben Sie eine Frage zum Produkt? |
Größe: 69,2 MB
DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasserzeichen und ist damit für Sie personalisiert. Bei einer missbräuchlichen Weitergabe des eBooks an Dritte ist eine Rückverfolgung an die Quelle möglich.
Dateiformat: PDF (Portable Document Format)
Mit einem festen Seitenlayout eignet sich die PDF besonders für Fachbücher mit Spalten, Tabellen und Abbildungen. Eine PDF kann auf fast allen Geräten angezeigt werden, ist aber für kleine Displays (Smartphone, eReader) nur eingeschränkt geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich