Jasani / Pesaresi / Schneiderbauer | Remote Sensing from Space | E-Book | www2.sack.de
E-Book

E-Book, Englisch, 297 Seiten

Jasani / Pesaresi / Schneiderbauer Remote Sensing from Space

Supporting International Peace and Security
1. Auflage 2009
ISBN: 978-1-4020-8484-3
Verlag: Springer Netherlands
Format: PDF
Kopierschutz: 1 - PDF Watermark

Supporting International Peace and Security

E-Book, Englisch, 297 Seiten

ISBN: 978-1-4020-8484-3
Verlag: Springer Netherlands
Format: PDF
Kopierschutz: 1 - PDF Watermark



David Stevens Space-based information, which includes earth observation data, is increasingly becoming an integral part of our lives. We have been relying for decades on data obtained from meteorological satellites for updates on the weather and to monitor weather-related natural disasters such as hurricanes. We now count on our personal satellite-based navigation systems to guide us to the nearest Starbucks Coffee and use web-based applications such as Google Earth and Microsoft Virtual Earth to study the area of places we will or would like to visit. At the same time, satellite-based technologies have experienced impressive growth in recent years with an increase in the number of available sensors, an increase in spatial, temporal and spectral resolutions, an increase in the availability of radar satellites such as Terrasar-X and ALOS, and the launching of specific constellations such as the Disaster Monitoring Constellation (DMC), COSMO- SkyMed (COnstellation of small Satellites for the Mediterranean basin Observation) and RapidEye. Even more recent are the initiatives being set-up to ensure that space-based information is being accessed and used by decision makers, such as Sentinel Asia for the Asia and Pacific region and SERVIR for the Latin America and Caribbean region.

Jasani / Pesaresi / Schneiderbauer Remote Sensing from Space jetzt bestellen!

Weitere Infos & Material


1;Remote Sensing from Space;2
1.1;Preface;4
1.2;Contents;6
1.3;About the Editors;9
1.4;List of Acronyms;12
1.5;About the Contributors;16
1.6;Introduction;39
1.7;Chapter 1;49
1.7.1;Definitions, Concepts and Geospatial Dimensions of Security;49
1.7.1.1;1.1 Introduction;49
1.7.1.2;1.2 Security Definitions;51
1.7.1.2.1;1.2.1 Theoretical Frameworks for Security Concepts;51
1.7.1.2.2;1.2.2 Realist Definition: State Security;51
1.7.1.2.3;1.2.3 Changes in Definition: Human Security;52
1.7.1.2.4;1.2.4 Criticisms of the Human Security Concept;53
1.7.1.2.5;1.2.5 Gender Perspective in Security;53
1.7.1.3;1.3 On Course for a European Security Concept?;54
1.7.1.3.1;1.3.1 Historical Development of EU Security Policy;54
1.7.1.3.2;1.3.2 Legal, Institutional and Political Aspects Hampering the Development of a Coherent EU Security Concept;56
1.7.1.4;1.4 Spatial Component of Security;57
1.7.1.4.1;1.4.1 Spatial Concepts Related to State and Human Security Definitions;58
1.7.1.4.2;1.4.2 Spatial and Quantitative Analysis of Security;59
1.7.1.4.3;1.4.3 Geospatial Technologies for Security;60
1.7.1.4.3.1;1.4.3.1 Cartography;60
1.7.1.4.3.2;1.4.3.2 Earth Observation;60
1.7.1.4.3.3;1.4.3.3 Navigation;61
1.7.1.4.3.4;1.4.3.4 GIS;61
1.7.1.5;1.5 Conclusions: Geospatial Concepts and Tools to Support EU Security Policy;62
1.7.1.6;References;64
1.8;Chapter 2;66
1.8.1;European Security Policy and Earth Observation;66
1.8.1.1;2.1 A New Security Landscape;66
1.8.1.2;2.2 Major Threats and Risks;67
1.8.1.3;2.3 Strategic Objectives and Policy Implications;68
1.8.1.4;2.4 The Information Requirement;68
1.8.1.5;2.5 Customers;69
1.8.1.6;2.6 Earth Observation and Crisis Management;70
1.8.1.7;2.7 Targets for Earth Observation;71
1.8.1.8;2.8 Recent Work;71
1.8.1.8.1;2.8.1 Earth Observation in the Overall Information Picture;71
1.8.1.8.1.1;2.8.1.1 Prioritisation;72
1.8.1.8.2;2.8.2 Emerging Crises;74
1.8.1.8.3;2.8.3 Classification of EO Data;74
1.8.1.9;References;75
1.8.1.10;Background Information/Useful URLs;75
1.9;Chapter 3;77
1.9.1;Satellite Based Information to Support European Crisis Response;77
1.9.1.1;3.1 Introduction;78
1.9.1.2;3.2 Crisis Patterns Relevant for Europe;79
1.9.1.3;3.3 Satellite Imagery in European Crisis Management;80
1.9.1.3.1;3.3.1 Charter on Space and Major Disasters;81
1.9.1.3.2;3.3.2 Global Monitoring for Environment and Security: GMES;82
1.9.1.3.3;3.3.3 Group on Earth Observation: GEO;82
1.9.1.3.4;3.3.4 Satellite Imagery as It Is Applied Today;83
1.9.1.3.4.1;Assessment of an Explosion of Old Ammunition in the Ukraine;83
1.9.1.3.4.2;Base and Crisis Mapping of the Al Fashir and Al Junaynah Region, Darfur/Sudan;83
1.9.1.3.4.3;Verifying Nuclear Non-Proliferation Treaties;86
1.9.1.4;3.4 Involving the Scientific Community;86
1.9.1.4.1;3.4.1 Simulations and Exercises;86
1.9.1.5;3.5 Conclusion and Outlook;88
1.10;Chapter 4;90
1.10.1;The Security Dimension of GMES;90
1.10.1.1;4.1 Introduction;91
1.10.1.2;4.2 Security Issues Within GMES;92
1.10.1.3;4.3 Security Research Within GMES;94
1.10.1.4;4.4 GMOSS and its Role within GMES;95
1.10.1.4.1;4.4.1 Introduction;95
1.10.1.4.2;4.4.2 GMOSS Structure and Work Packages;97
1.10.1.5;References;98
1.11;Chapter 5;100
1.11.1;A Novel Approach to Capacity Building for Security Applications;100
1.11.1.1;5.1 Security and Threat;101
1.11.1.2;5.2 Concept for Capacity Building;103
1.11.1.3;5.3 GMOSS Summer Schools;104
1.11.1.4;5.4 Achievements and Challenges;105
1.11.1.5;5.5 Conclusions;109
1.11.1.6;References;110
1.12;Chapter 6;111
1.12.1;Games and Scenarios in the Context of GMOSS;111
1.12.1.1;6.1 Introduction;111
1.12.1.2;6.2 Gaming as a Tool for Analysis and Training;112
1.12.1.2.1;6.2.1 What Is a Game?;112
1.12.1.2.2;6.2.2 How to Run a Game? Theory About Practice;113
1.12.1.2.3;6.2.3 Typology of Games: The Aim and Construction of a Game;114
1.12.1.2.4;6.2.4 Open or Closed Games?;116
1.12.1.2.5;6.2.5 GMOSS Games for Various Purposes;117
1.12.1.3;6.3 Scenario Design;117
1.12.1.3.1;6.3.1 General Considerations;117
1.12.1.3.2;6.3.2 Scenario Design for GMOSS;118
1.12.1.4;6.4 Summary of Gaming and Scenario Experiences in GMOSS;121
1.12.1.5;Appendix 1 GMOSS Game at the Annual Workshop in Brussels, November 8, 2004;121
1.12.1.5.1;1 Background Scenarios;121
1.12.1.5.1.1;Europe Faces Increased Threat from Terrorism and Organized Crime;121
1.12.1.5.1.2;Homeland Security Commissioner: Tasks and Mandate;122
1.12.1.5.1.3;The European Surveillance Agency;123
1.12.1.5.2;2 Issues to Be Considered During the Game;123
1.12.1.5.2.1;Part 1 Defining the Tasks of the European Surveillance Agency;123
1.12.1.5.2.2;Part 2 Identify the Way the European Surveillance Agency Would Handle a Threat Scenario;124
1.12.1.6;Appendix 2 Scenario Design Approach for GMOSS;124
1.12.1.7;References;126
1.13;Chapter 7;127
1.13.1;GMOSS: Infrastructure and Standards;127
1.13.1.1;7.1 Introduction;127
1.13.1.1.1;7.1.1 Why Are Standards Important?;127
1.13.1.1.2;7.1.2 Types of Standards;129
1.13.1.1.3;7.1.3 Who Are Standards Important To?;129
1.13.1.1.4;7.1.4 Scope of GMOSS;132
1.13.1.2;7.2 Standards Bodies and Initiatives;133
1.13.1.2.1;7.2.1 Security and Remote Sensing;133
1.13.1.3;7.3 Standards for GMOSS;134
1.13.1.3.1;7.3.1 Generic Tools;134
1.13.1.3.2;7.3.2 Applications and Security Concepts;135
1.13.1.4;7.4 Data Sharing: An Example of Implementation in GMOSS;136
1.13.1.4.1;7.4.1 Data;136
1.13.1.4.2;7.4.2 Digital Rights Management (DRM);137
1.13.1.4.3;7.4.3 Metadata;138
1.13.1.4.4;7.4.4 Data Catalogues;139
1.13.1.4.5;7.4.5 Future Direction;142
1.14;Chapter 8;143
1.14.1;Feature Recognition Techniques;143
1.14.1.1;8.1 Introduction;144
1.14.1.2;8.2 Feature Catalogue and Image Pre-processing;144
1.14.1.3;8.3 Land-Cover Classification Systems;147
1.14.1.4;8.4 Object Detection Systems;149
1.14.1.4.1;8.4.1 Man-Made Object Recognition;149
1.14.1.4.1.1;8.4.1.1 Example Database;149
1.14.1.4.1.2;8.4.1.2 Geometrical Characterization of Objects;150
1.14.1.4.1.3;8.4.1.3 Learning and Classification;151
1.14.1.4.1.4;8.4.1.4 Results and Discussion;151
1.14.1.4.1.5;8.4.1.5 Conclusions;153
1.14.1.4.2;8.4.2 Automatic Linear Feature Extraction;154
1.14.1.4.3;8.4.3 Automatic Verification of Man Made Structures;154
1.14.1.5;8.5 Summary and Conclusions;155
1.14.1.6;References;156
1.15;Chapter 9;157
1.15.1;Change Detection Tools;157
1.15.1.1;9.1 Introduction;158
1.15.1.2;9.2 Change Detection Using Optical and Multispectral Images;158
1.15.1.3;9.3 Change Detection Using Synthetic Aperture Radar Images;166
1.15.1.4;9.4 Three-dimensional Change Detection;170
1.15.1.5;9.5 Summary and Conclusions;173
1.15.1.6;Appendix Catalogue on Change Detection Applications, Data and Methods for the Application Work Packages 20400–20900;174
1.15.1.7;References;177
1.16;Chapter 10;179
1.16.1;Data Integration and Visualization for Crisis Applications;179
1.16.1.1;10.1 Introduction;180
1.16.1.2;10.2 Requirements for Security Applications;181
1.16.1.2.1;10.2.1 Speed, Real-Time Delivery and Realism;181
1.16.1.2.2;10.2.2 Detection and Ground Sensor Network;182
1.16.1.2.2.1;10.2.2.1 CARABAS;182
1.16.1.2.2.2;10.2.2.2 Ground Sensor Network;183
1.16.1.2.3;10.2.3 Common Operational Picture (COP);184
1.16.1.3;10.3 Data Integration, Visualisation and Dissemination;186
1.16.1.3.1;10.3.1 Fast and Automatic Scene Generation: Rapid Visualization;186
1.16.1.3.1.1;10.3.1.1 Matching and Integration of Various Source Data;187
1.16.1.3.1.2;10.3.1.2 Object-Based Information Extraction;187
1.16.1.3.1.3;10.3.1.3 Object Libraries;189
1.16.1.3.1.4;10.3.1.4 Visualisation;189
1.16.1.3.2;10.3.2 Web-Based Visualization for Information Dissemination;190
1.16.1.3.2.1;10.3.2.1 Online Map Presentation;191
1.16.1.3.2.2;10.3.2.2 Real-Time 3D-Visualisation;192
1.16.1.3.3;10.3.3 Overview of 3D Tools;193
1.16.1.3.3.1;10.3.3.1 Two-Dimensional/Three-Dimensional Visualization Tools Emerged from GIS Technology Including Globe Viewers;194
1.16.1.3.3.2;10.3.3.2 Three-Dimensional Visualization Tools Originating from Computer Graphics;195
1.16.1.4;10.4 Conclusions;197
1.16.1.5;References;198
1.17;Chapter 11;199
1.17.1;UNOSAT Grid;199
1.17.1.1;11.1 Introduction;199
1.17.1.2;11.2 From Science–Fiction to Reality;200
1.17.1.3;References;201
1.18;Chapter 12;203
1.18.1;Treaty Monitoring;203
1.18.1.1;12.1 Introduction;204
1.18.1.2;12.2 Arms Control Treaties;205
1.18.1.3;12.3 The 1970 NPT;205
1.18.1.4;12.4 Digital Image Processing for Verification of Monitoring the NPT;206
1.18.1.4.1;12.4.1 Key for Research and Power Reactors and Conventional Power Plants;206
1.18.1.4.2;12.4.2 Research Reactors;207
1.18.1.4.3;12.4.3 Power Reactors;209
1.18.1.4.4;12.4.4 Conventional Power Station;210
1.18.1.4.5;12.4.5 Multispectral Change Detection;212
1.18.1.4.6;12.4.6 Detection of Changes Using Synthetic Aperture Radar (SAR) Images;214
1.18.1.4.7;12.4.7 Automated Object-Based Image Analysis;216
1.18.1.4.8;12.4.8 Analysis of Hyperspectral Satellite Imagery;218
1.18.1.5;12.5 Comprehensive Nuclear Test Ban Treaty (CTBT);220
1.18.1.6;12.6 Digital Image Processing for CTBTO Monitoring;221
1.18.1.7;12.7 Conclusions and Outlook;222
1.18.1.8;References;223
1.19;Chapter 13;225
1.19.1;Early Warnings and Alerts;225
1.19.1.1;13.1 Introduction;226
1.19.1.2;13.2 Early/Rapid Alert for Security;227
1.19.1.3;13.3 Short/Medium Term Early Warnings of Security Events;228
1.19.1.4;13.4 Satellites Observations for Early Warnings and Alerts Within GMOSS;228
1.19.1.5;13.5 Satellite Observations at High (NOAA-AVHRR Data) or Very High (MSG-SEVIRI Data) Temporal Resolution: the RST Approach;229
1.19.1.6;13.6 Satellite Observations with High Spatial Resolution;236
1.19.1.6.1;13.6.1 Some Oil Wells Observed;236
1.19.1.6.2;13.6.2 Some Oil Leaks Observed;237
1.19.1.6.3;13.6.3 Observation Along the India–Pakistan Border;239
1.19.1.6.4;13.6.4 Some Preliminary Conclusions;243
1.19.1.7;13.7 Open Issues, Challenges and Future Perspectives;243
1.19.1.8;References;244
1.20;Chapter 14;246
1.20.1;Can Earth Observation Help to Improve Information on Population?;246
1.20.1.1;14.1 Introduction;246
1.20.1.2;14.2 Population Data in Emergency Response;248
1.20.1.2.1;14.2.1 Alerting;249
1.20.1.2.1.1;14.2.1.1 Future Direction;252
1.20.1.2.2;14.2.2 Local Population Estimates in Informal Settlements;252
1.20.1.2.2.1;14.2.2.1 Future Direction;253
1.20.1.2.3;14.2.3 Population Density Estimations;254
1.20.1.2.3.1;14.2.3.1 National and Sub-national Population Density Estimations;257
1.20.1.2.3.2;14.2.3.2 Zimbabwe Case Study;258
1.20.1.2.3.3;14.2.3.3 The Iraq Study Site;258
1.20.1.2.3.4;14.2.3.4 Future Direction;261
1.20.1.2.4;14.2.4 The Spatial Component of Population Vulnerability;261
1.20.1.2.4.1;14.2.4.1 The Iraq Study Site;262
1.20.1.2.4.2;14.2.4.2 Future Direction;263
1.20.1.3;14.3 Discussion;264
1.20.1.3.1;14.3.1 Spatial Temporal Characteristics of Population;268
1.20.1.4;14.4 Conclusions;269
1.20.1.5;References;270
1.21;Chapter 15;273
1.21.1;From Real Time Border Monitoring to a Permeability Model;273
1.21.1.1;15.1 Introduction;274
1.21.1.2;15.2 Areas of Study;275
1.21.1.3;15.3 Data Analysis;276
1.21.1.3.1;15.3.1 Statistical Databases;276
1.21.1.3.2;15.3.2 Survey;278
1.21.1.3.3;15.3.3 Earth Observation Information;280
1.21.1.4;15.4 Permeability Models for the Two Study Areas;284
1.21.1.4.1;15.4.1 The EU-25 Border Permeability Model;284
1.21.1.4.2;15.4.2 The Central African Permeability Model;288
1.21.1.5;15.5 Discussions;290
1.21.1.6;15.6 Conclusions;291
1.21.1.7;Annex: Questionnaire;292
1.21.1.8;References;292
1.22;Chapter 16;294
1.22.1;Rapid Mapping and Damage Assessment;294
1.22.1.1;16.1 Introduction;294
1.22.1.2;16.2 Rapid Mapping and Overview of Damages;295
1.22.1.2.1;16.2.1 Rapid Overview of Damaged Areas Using Satellites with a Short Revisit Time;296
1.22.1.2.2;16.2.2 Rapid Mapping Service for Satellite Based Crisis Information;298
1.22.1.3;16.3 Detailed Assessment of Damages;302
1.22.1.3.1;16.3.1 Detailed Analysis of Damages Using High-Resolution Satellite Imagery;304
1.22.1.3.2;16.3.2 Use of 3D Data to Determine Damages of Buildings;307
1.22.1.3.3;16.3.3 Detailed Damage Assessment Based on Visual Inspection of Using High-Resolution Satellite Imagery;308
1.22.1.3.4;16.3.4 Damage Assessment Using Radar Satellite Images;310
1.22.1.3.5;16.3.5 Damage Assessment and Risk Assessment of Damages in Alpine Regions Using Satellite Images;312
1.22.1.4;16.4 Conclusion;314
1.22.1.5;Overview of User Requirements and Activities of GMOSS Partners on Rapid Mapping and Damage Assessment;317
1.22.1.6;References;319
1.23;Summary and Outlook;320
1.24;Index;323



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.