SlideShare a Scribd company logo
1 of 48
Download to read offline
SATELLITE IMAGES FOR
SURVEILLANC, SECURITY &
 EMERGENCY MANGAMENT
OVERVIEW


•This project will enable government or companies to manage satellite
imaging technology for surveillance and security missions:
    g g           gy                           y
– Sabotage
– Population
•The main application described will help to fight against pipelines &
terrorist sabotages. However, many others will be pointed.
•This proposal includes all necessary elements to get complete
independence (facilities, own technology, training,...).

                 SATELLITE IMAGE TECHNOLOGY
                         APPLICATIONS

          SATELLITE IMAGES / VIDEO FOR SURVEILLANCE AND SECURITY
                                                           FEBRUARY,
                                                           FEBRUARY, 2011

                                                            Text
SATELLITE IMAGE TECHNOLOGY




STAGE 1   Image from satellite


STAGE 2   Data collecting and pre-
            processing g

STAGE 3   Analyzing. Layer structure


STAGE 4   Prevention and countermeasure




                    SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY
                                                         FEBRUARY, 2011
STAGE 1: IMAGE FROM SATELLITES


There are two alternatives to get the source images:
1.
1    Buying them to satellite images distributors
                                     distributors.
2.   Receiving them directly with hardware equipment (antenna
     systems).              It is necessary to select some technical
                             t s ecessa y      se ect so e tec ca
                                specs to get successful information from
                                satellites:
                                •The most suitable satellite/s.
                                •The image sensor.
                                •The frequency range.
                                •The desired resol tion
                                 The         resolution.
                                •The size of area inspected.
                                •The delay between two consecutives images.
                                •Day/night conditions.
                                •Color or black and white images.

                     SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY
                                                                    FEBRUARY,
                                                                    FEBRUARY, 2011
STAGE 2: DATA COLLECTING AND
                               PREPROCESSING
      Before processing the image to analyze the
      results and reaching conclusions, there are
      several issues to consider:
      1.The preprocessing level. Distortions
      caused by the sensors sensibilities must be
      radio-metrically corrected.
      2.Distortions caused by relief must be
                            y
      ortho-rectified.
      3.Image   must      be    compared        with
      cartography to get accurate results.
      4.The format file must be suitable to analyze
      the images.
      th i


SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY
                                        FEBRUARY,
                                        FEBRUARY, 2011
STAGE 3: ANALYZING.
                                LAYER STRUCTURE



    A lot of aspects will be analyzed for each case.
    Sorting out every aspect a layer will be
                      aspect,
    obtained.
    Every layer will have an influence depending on
    the cause relationship with the threat.
    Combining all the influence, a risk map will be
            g                             p
    worked out




SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY
                                         FEBRUARY,
                                         FEBRUARY, 2011
STAGE 4: PREVENTION AND
                                                           COUNTERMEASURES

There must be a very closed plan to involve as many authorities groups as
p
possible to react together against threats. That includes army, policy, security
                     g        g                               y, p   y,        y
management, civilian protection, fire department,… The most accurate the plan
is, the fastest and most effective reaction will be possible.
CONCEPT:
1.  Getting images.
2.  Detecting threats.
3.  Alerting the authorities.
4.  Acting to avoid or mitigate damages.
SECURITY COUNTERMEASURES WILL HELP TO        TO:
1.  Mitigate causalities.
2.  Minimize damages to the corporate infrastructure.
3.  Restoring services at the earliest time possible after a security related
    incident.

                         SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY
                                                                        FEBRUARY,
                                                                        FEBRUARY, 2011
APPLICATIONS




SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY
                                     FEBRUARY,
                                     FEBRUARY, 2011
PIPELINE SABOTAGES (I)



A very important security problem is terrorism. There are many
kinds f terrorism. O
ki d of t       i     One of th most common t
                            f the     t       type which i t k
                                                    hi h is taken
place in Iraq in last years is PIPELINE SABOTAGES.


                                Then there is a study to show
                                how satellite images can help to
                                prevent    pipeline   sabotages.
                                                      sabotages
                                However this study can be
                                applied to most of the terrorism
                                ways.
                                ways
                                Finally, many other applications
                                of this technology will be include.



                 SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY
                                                         FEBRUARY,
                                                         FEBRUARY, 2011
PIPELINE SABOTAGES (II)



                    The Iraqi pipeline network has
                            q pp
                    suffered many attacks in the
                    last few years.
                    It has become in one of the
                    main objectives to terrorist
                    groups.
                    The starting point is knowing
                    perfectly the pipeline map and
                    its features.




SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY
                                      FEBRUARY,
                                      FEBRUARY, 2011
PIPELINE SABOTAGES (III)



                    Accessing to a database
                              g
                    registering pipelines sabotages
                    helps to create patterns.
                    If we are able to detect some
                    common      factors    in  the
                    sabotages, we will be able of
                    PREDICTING new attacks
                                      attacks.
                    So, satellite images of the exact
                    p
                    place, around in time, are
                         ,                     ,
                    decisive to create patterns.
                    That is achieved identifying
                    HOTSPOTS.
                    HOTSPOTS


SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY
                                       FEBRUARY,
                                       FEBRUARY, 2011
PIPELINE SABOTAGES (IV)




                            HOTSPOTS
                   Temperatures anomalies above
                   T        t           li    b
                   a certain threshold calculated
                   by suitable algorithms using
                   the IR bands of certain sensors
                   such as MODIS (Terra, Aqua),
                   AATSR (Envisat) or SEVIRI
                   (MSG).
                   (MSG)




SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY
                                     FEBRUARY,
                                     FEBRUARY, 2011
PIPELINE SABOTAGES (V)




                    Here is a distribution of
                    pipeline and MODIS hotspots
                    during 2003, 2004, 2005 and
                    2006.
                    Historic hotspots distributions
                    can h l t prevent f
                        help to        t from new
                    hotspots.




SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY
                                      FEBRUARY,
                                      FEBRUARY, 2011
PIPELINE SABOTAGES (VI)




                  There is a great amount of
                  factors to be evaluated for
                  drawing a vulnerability pipeline
                  map.
                  Each layer correspond to one of
                  this factor.
                  thi f t
                  Not all the factors have the same
                  importance to our proposal That
                                      proposal.
                  is why each factor will be
                  multiplied     by    a     specific
                  coefficient.



SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY
                                       FEBRUARY,
                                       FEBRUARY, 2011
PIPELINE SABOTAGES (VII)



                           Factor A:
                               •Proximity to populated areas
                               •Availability of public transportation near pipelines
                   ility



                           Factor B:
                               •Location of additional infrastructures near the pipeline
                                L    ti     f dditi    li f  t   t          th i li
            ulnerabi




                           Factor C:
                               •Impact in the national and international economy
                           Factor D:
Increasing vu




                               •Unfenced sections
                               •Lack of buffered-protected areas
                               •Areas without surveillance
                           Factor E:
                               •Pipeline above the ground
                           Factor F:
                               •Pipeline in remote areas
                               •Pipeline protected by patrols

                                      SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY
                                                                                     FEBRUARY,
                                                                                     FEBRUARY, 2011
PIPELINE SABOTAGES (VIII)




                     Co b
                     Combining all the factors in
                              g a t e acto s
                     the layer structure, it is
                     possible to design a
                     VULNERABILITY MAPMAP.
                     It helps  definitely        to
                     PREVENTION TASKS.




SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY
                                      FEBRUARY,
                                      FEBRUARY, 2011
OTHER APPLICATIONS (I)


Besides avoiding pipeline sabotage, there are so many applications in
which satellite images can help definitely (military and civilian):

1.    Defense & Security. Target surveillance.
2.
2     Communications
3.    Non removable Natural Resources
4.    Sustentable development & risk management
5.
5     Agriculture and forest
                       forest.
6.    Cartography & territory order.
7.    Population migrating.
8.
8     Natural di
      N t    l disasters. Fi
                    t     Fires.
9.    Climatology.
10.   Pollution.
11.   Hydrology. Land evolution.


                   SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY
                                                           FEBRUARY,
                                                           FEBRUARY, 2011
DEFENSE & SECURITY.
                                             TARGET SURVEILLANCE (I)

Permanent imaging very definite areas helps to watch over them,
and prevent potential terrorist attacks There are a lot of indicators
                                attacks.
to alert from attacks, such as: unusual people movements, vehicles
parked in forbidden areas,…


                                            1. Government buildings.
                                            2. Religious exhibitions.
                                            3. Humanitarian aids convoys.
                                            4. Factories.
                                            5. Airports.
                                            6. Armaments store.


                    SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY
                                                              FEBRUARY,
                                                              FEBRUARY, 2011
DEFENSE & SECURITY.
                       TARGET SURVEILLANCE (II)
       NECESSITY:
       • Multiplying the sources of information to
         strengthen monitoring of the territories
       • Detect and monitor changes in sensitive
         areas
       • Organizing the operations of
         peacekeeping
        RESULTS:
        RESULTS
       • The remote mapping of vast territories
       • The daily monitoring of borders and ports
       • The detection and accurate identification
          Infrastructure
       • Geographical databases to prepare
          surveillance missions

SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY
                                        FEBRUARY,
                                        FEBRUARY, 2011
COMMUNICATIONS


       NECESSITY:
       • Mapping the reception areas and identify
         difficult areas
       • Maintaining and developing the existing
         telecommunications infrastructure
       • Optimizing the location of broadcasters to
         increase network coverage
        RESULTS:
       • Ratings fine land occupation
       • Database for a 3D interactive simulation of
          the implementation of new infrastructure




SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY
                                       FEBRUARY,
                                       FEBRUARY, 2011
NON-
                                    NON-REMOVABLE
                                 NATURAL RESOURCES
       NECESSITY:
       •   Perfect exploring the geological and hydrological
           resources
       •   Optimizing the implementation of new mining and
           oil infrastructure
       •   Assessing the impact of farms on the
           environment
       •   Conduct a national inventory of water resources
        RESULTS:
        RESULTS
       •   Locating potential sites of exploitation
       •   Maps of natural hazards impact on industrial
           activity
              i i
       •   Mapping of ground deformation associated with a
           holding
       •   Maps of potential water resources
           surface or underground


SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY
                                             FEBRUARY,
                                             FEBRUARY, 2011
SUSTAINABLE DEVELOPMENT &
                              RISK MANAGEMENT

       NECESSITY:
       •   Preserving the environment around industrial
           projects
       •   Implement plans for p
              p        p        prevention of natural or
           industrial risks
       •   Identify and monitor natural protection zones
       •   Control the development of tourism activities

       RESULTS:
       • Regular monitoring of sites at risk (industries,
            g               g                (          ,
         infrastructure at sea)
       • Update mapping of sensitive areas and coastal
       • Tourist maps accurate and easy to update



SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY
                                            FEBRUARY,
                                            FEBRUARY, 2011
AGRICULTURE (I)

       NECESSITY:
       • Evaluate with precocity surfaces
         and agricultural production
       • Anticipate risks and assess their impacts
         (pollution, drought, floods)
       • Monitoring the implementation of agricultural
         regulations and environmental protection
       • Meet the wooded areas and monitor the
         development of plantations
       RESULTS:
       • Accurate and reliable agricultural statistics
         before harvest
         b f    h       t
       • Remote control of large areas under cultivation
       • Early warning system in case of changes
             y        g y                        g
       • Inventory and management of forestry
         (plantations, logging, fire prevention)

SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY
                                          FEBRUARY,
                                          FEBRUARY, 2011
AGRICULTURE (II)


Satellite images technology can help to identify exactly which use is
g
given to the land. Agricultural resources are basics in economy of
                     g                                           y
many countries.

                                     Both information and surveillance
                                     missions are possible.
                                     Studies can focus on which
                                     species are cultivated and the way
                                     they are grown up.




                   SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY
                                                            FEBRUARY,
                                                            FEBRUARY, 2011
CARTOGRAPHY(I)


  NECESSITY
  •   Topographic databases constitute reference
  •   Study and implement the schemes of urban and rural
  •   Create and update cadastral parcelling
  •   Optimizing road and rail networks
  •   Organize the census of the population regularly

   RESULTS
  •   Topographic maps at 1:25 000, consistent
      with international standards
  •   The classification of different urban structures
  •   The update of information
      cadastral 1:50 000 to 1:10 000
  •   Simulations and choice of paths of roads and railways
  •   The definition of areas to prepare a census


SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY
                                              FEBRUARY,
                                              FEBRUARY, 2011
CARTOGRAPHY(II)



A territory can be closely defined using satellite imagery. There are
          y              y             g              g y
several issues to consider:
                                        1. 3D mapping.
                                        2. Heights map.
                                        3. Terrain textures.
                                        4. Natural borders.
                                        5. Sea level.



Combining all thi f t
C bi i     ll this features very accurate maps would b b ilt
                                       t          ld be built.


                    SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY
                                                               FEBRUARY,
                                                               FEBRUARY, 2011
POPULATION MIGRATING (I)

Usually this movements are caused by natural disasters, wars, military
decisions,…
First of all, a database including all these causes can point a possibility of
detecting population migration.
The
Th easiest way t verify thi migrations i t analyze night satellite
          i t   to   if this i     ti     is to   l     i ht   t llit
images. One image should be previous to the cause and the other must
be later.
Differences between these images (basically lights in city or villages) can
be the proof to identify population migrating.




                      SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY
                                                                    FEBRUARY,
                                                                    FEBRUARY, 2011
POPULATION MIGRATING (II)




           Muzaffarabad                             Muzaffarabad
Manshira                         Manshira
                                                      Disappearing
                              Increasing Lights /     lights
                              Ephemeral Lights
                              Appear
                              A




               SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY
                                                         FEBRUARY,
                                                         FEBRUARY, 2011
NATURAL DISASTERS



      There is a wide spectrum of possible
      natural disaster to study.
      These phenomena are usually difficult to
      detect before taking place, although in
      very specific conditions there may be
      some indicators to alert and to start the
      prevention protocol.
      However, the importance of this point is to
      evaluate the consequences of natural
      disasters. An estimation of damages is
      always a need
               need.



SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY
                                        FEBRUARY,
                                        FEBRUARY, 2011
FIRES



Satellite images technology can support fire detection. It can not be a
prevent task, but it helps to identify some features:


                                  1.   Fire breaks.
                                  2.   Fire temperature.
                                  3.   Best options to extinguish the fire.
                                  4.   Area burned.




                    SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY
                                                              FEBRUARY,
                                                              FEBRUARY, 2011
CLIMATOLOGY


Besides meteorological information, satellites helps to forecast local
weather phenomena There are several to stand out:
        phenomena.

                                        1. Hurricanes.
                                        2. Tsunamis.
                                        3. Tornadoes.
                                        4. Acid rain.
                                        5. Sandstorms.
                                        6. Monsoons.




                    SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY
                                                             FEBRUARY,
                                                             FEBRUARY, 2011
POLLUTION



            Pollution is being considered as a front
            page problem. Many efforts have been
            carried on to reduce it as much as
            possible.
            possible
            Analyzing satellite images can help to
            po t
            point which areas produce great
                      c    a eas p oduce g eat
            amounts of pollution.
            Whit this useful data, a “pollution plan”
            can be developed.
            This photograph shows how pollution
            affects t S th E t A i
             ff t to South-East Asia.


SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY
                                        FEBRUARY,
                                        FEBRUARY, 2011
HIDROLOGY



     Nowadays a good management of water
     reservoirs is essential.
     Getting satellite images within a short
           g               g
     period of time, floods or droughts can be
     evaluated. Comparing images can makes
     easy to get results
                 results.
     Moreover water flows of rivers, lakes,
     swamps,..., would be sort out.
          p , ,




SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY
                                      FEBRUARY,
                                      FEBRUARY, 2011
LAND EVOLUTION




Some very particulars phenomena can b studied very accurately with
S              ti l      h              be t di d        t l   ith
the technology here proposed. Changes in their size, growing up
direction,… All desired parameters are available.




   Deserts              Glaciers               Deforestation



                  SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY
                                                         FEBRUARY,
                                                         FEBRUARY, 2011
CRITICAL INFRASTRUCTURE
                                                     PROTECTION


BUILDINGS
BRIDGES
HOSPITALS
MARKET PLACE


USING 3 TECHNOLOGIES:
- SATELLITE IMAGING
- LOCAL CAMERA ZONES
- GIS (Geographic Information System)



                  SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY
                                                       FEBRUARY,
                                                       FEBRUARY, 2011
PROPOSAL FOR A SATELLITE
                                 IMAGE PROCESSING CENTER


1.-
1 COMERCIAL SATELLITES AVALAIBLE
2.- IMAGE ADQUISITION
3.-
3 RESOLUTION
4.- FACILITIES
5.-
5 TRAINING
6.- ECONOMIC PROPOSAL




                 SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY
                                                      FEBRUARY,
                                                      FEBRUARY, 2011
SATELLITES ORBITS

There are 2 types of satellites useful for this project considering their orbits:
1. Geostationary orbit: the satellite is always “fixed” over the same point of earth
(period about 24 hours)
                 hours).
2. Polar orbit: the satellite is moving over the earth's surface (period about 100
minutes).
The use of each type will depend in a daily based need according with the alarms
and the technicians & politics decisions.
The license of images are restricted to country borders.




              GEOSTATIONARY ORBIT                            POLAR ORBIT

                        SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY
                                                                         FEBRUARY,
                                                                         FEBRUARY, 2011
SATELLITES AVAILABLE


     List of some COMERCIAL satellites watching at any time during their orbits:

1.
1       LANDSAT 7                                             9.
                                                              9     NOAA (AVHRR)
2.      LANDSAT5                                              10.   MSG (SEVIRI)
3.      SPOT 4-5 from 2.5 to 20 meters resolution             11.   RESURS 01
4.      FORMOSAT-2 from 2 to 8 meters resolution              12.   EROS A1
5.      KOMPSAT-2 from 1 to 4 meters resolution               13.   ENVISAT
6.      QUICKBIRD                                             14.   WORLDVIEW 1
7.      IKONOS 2                                              15.   TERRA
8.
8       EOS M1 (MODIS)                                        16.
                                                              16    AQUA




                           SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY
                                                                         FEBRUARY,
                                                                         FEBRUARY, 2011
FUTURE SATELLITES



1.
1    PLÉIADES 1 & 2. Very high resolution
                      2           resolution.
     - standard 50-centimeter
     - ortho-rectified products
                       p
     - daily revisit capabilities
     - perfect complement to SPOT 6 and 7

2.   SPOT 6 & 7 continuity SPOT 5 mission with
     the same 60-kilometer swath and improved
               60 kilometer
     2-meter
     resolution




                       SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY
                                                            FEBRUARY,
                                                            FEBRUARY, 2011
IMAGES ADQUISITIONS

 Images can be ordered either from archive or by tasking the satellites. For
 large volumes, the best solution is to locally receive the telemetry from the
 satellites.
 satellites
RECEIVING GROUND STATION
   Ground telemetry stations for direct acquisition from satellite once it passes over the
    station in real time.
WEB TECHNOLOGY
   Quasi real time (few hours after acquisition) images are recorded on board the
   Q    i     l ti  (f  h       ft      i iti ) i                d d    b   d th
     satellites, downloaded in north pole European receiving station and sent via secure
     encrypted ftp.
ALTIMETRIC DATABASE
   Location accuracy, called reference3d, that allows ortho-rectification of images from
    various sources and offers a unique reference. Immediately available over any
    country.
           y
   Cost efficient and can be considered as a national GIS (while setting up a traditional
    national GIS will take years and costs a lot of millions of Euros).


                         SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY
                                                                              FEBRUARY,
                                                                              FEBRUARY, 2011
RESOLUTION


HIGH RESOLUTION (HR) satellites cover a very wide swath, enabling
 them to portray a much larger picture of the situation on the ground,
                                                               ground
VERY HIGH RESOLUTION (VHR) satellites provide greater detail and
 pinpoint accuracy. The full constellation will operate simultaneously
 to provide monitoring of large areas and very tight coverage over
 small areas at the same time, thereby giving users the best capability
 for surveillance, situational awareness and analyst interpretation in
     surveillance
 near real-time.




                     SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY
                                                               FEBRUARY,
                                                               FEBRUARY, 2011
FACILITIES (I)



                                     Satellite Center


         Military                                                         Civil



   Defense/Security                              Population          Environment             Mapping




Propose a wide range of images plus the technical expertise to receive, archive, process, etc. Those
images and in downstream to use them in various applications for developing projects.


                               SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY
                                                                                          FEBRUARY,
                                                                                          FEBRUARY, 2011
FACILITIES (II)


BUILDING LOCALLY SPECIFIC OFFER (TBD *)


ANTENNA 6M COMPATIBLE WITH GEO&POLAR
    3.4 m for SPOT satellites and, in a smaller circle of visibility, ENVISAT and FORMOSAT-2.
    4.5 m or 5.4 m for ENVISAT and FORMOSAT-2, and receive future satellites KOMPSAT-2,
    TerraSAR-X, THEOS and PLEIADES.
TERMINAL COMPATIBLE FOR EACH SATELLITE COMPATIBILITY GROUP R ESOLUTION AVERAGE
    Terminal is the system that allows the acquisition, inventory, storage, processing and
    production data transmitted by the satellite digital sensors.

INSTALLATIONS INCLUDE: (TBD*)
                       (TBD )
• ZONE STUDY
• BUILDINGS PROJECT
• SOFTWARE
• HARDWARE
• COMMUNICATIONS
• ANTENNAS SYSTEM

(*)Specific offer has to be made based on precise specifications that will consider the local
context, the area to be imaged, the repetivity of viewing, the best combination of images from
different satellites.



                                   SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY
                                                                                                    FEBRUARY,
                                                                                                    FEBRUARY, 2011
FACILITIES (III)


There is the possibility of programming satellites to get the better data for each
application.
 pp
Depending on the solution, it might be possible to get the experience, de data and
the collaboration of many other centres around the world.

SERVICES INCLUDED:

System: installation, delivery acceptance testing, training on site, hot-line and
 maintenance materials and software
Operations: interfaced to Spot Image for programming and daily assistance relating
 to the operations stations
         p
Applications: implement support for information centers at the "foot of the
 antenna" for defense, agriculture, mapping and
 maritime surveillance with transfer of technology or know-how training and
           surveillance,                              know-how,
 technical assistance


                         SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY
                                                                         FEBRUARY,
                                                                         FEBRUARY, 2011
TRAINING (I)

Training is basic to get complete technological independence. However, technical support
will be provided to launch such an ambitious problem.
We understand formation as an intrinsic part of a project.
It will consist in theory and practicing with real tests.
It is a complete program developed in about 6 8 months depending on needs
                                            6-8 months,             needs.
It is included training in Spain to 12 technicians, 4 maintenance and 2 officials.

                                                   GETTING INDEPENDENCE
                                              • SOFTWARE FORMATION.
                                              • HARDWARE FORMATION.
                                              • ACQUIRING KNOW HOW.
                                                                HOW
                                              • HABITUATING TO THE TOOLS.
                                              • PRACTICING. REAL TESTS.
                                              •TECHNICAL SUPPORT.
                                              • SOLVING PROBLEMS.




                           SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY
                                                                                FEBRUARY,
                                                                                FEBRUARY, 2011
CONCLUSIONS (I)


Nowadays satellite features encourage to use their potential.
This project allows to have technological independency for managing
 surveillance and security missions.
NASA, ESA and EUSC supports this technology.
Satellite imaging can help to take high level control over a lot of
 aspects. Not only military, but also civilian applications can be
   p               y      y,                    pp
 carried on.
Prevention - alert – countermeasures. They are the three logical stages
 to manage security.




                     SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY
                                                                FEBRUARY,
                                                                FEBRUARY, 2011
CONCLUSIONS (II)



There i only one t h l
Th    is l       technology, b t l t of applications.
                             but lots f    li ti
Hardware, software, installations,…,       would   be    provided;   even
 formation to employees
              employees.
Know how will let to investigate new fields in future.
Other applications not described in this document would be studied.




                     SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY
                                                                FEBRUARY,
                                                                FEBRUARY, 2011
THANKS!




Contact : Yannick Gaillac,
email: y.gaillac@starsightproject.com
Mob : +44 7968 761 952                  www.aerosertec.com / www.starsightproject.com

More Related Content

Similar to Communication satellite

A NOVEL BACKGROUND SUBTRACTION ALGORITHM FOR PERSON TRACKING BASED ON K-NN
A NOVEL BACKGROUND SUBTRACTION ALGORITHM FOR PERSON TRACKING BASED ON K-NN A NOVEL BACKGROUND SUBTRACTION ALGORITHM FOR PERSON TRACKING BASED ON K-NN
A NOVEL BACKGROUND SUBTRACTION ALGORITHM FOR PERSON TRACKING BASED ON K-NN csandit
 
A Novel Background Subtraction Algorithm for Person Tracking Based on K-NN
A Novel Background Subtraction Algorithm for Person Tracking Based on K-NN A Novel Background Subtraction Algorithm for Person Tracking Based on K-NN
A Novel Background Subtraction Algorithm for Person Tracking Based on K-NN cscpconf
 
A NOVEL METHOD FOR PERSON TRACKING BASED K-NN : COMPARISON WITH SIFT AND MEAN...
A NOVEL METHOD FOR PERSON TRACKING BASED K-NN : COMPARISON WITH SIFT AND MEAN...A NOVEL METHOD FOR PERSON TRACKING BASED K-NN : COMPARISON WITH SIFT AND MEAN...
A NOVEL METHOD FOR PERSON TRACKING BASED K-NN : COMPARISON WITH SIFT AND MEAN...sipij
 
Landmine Detection and Classification Using MLP.pptx
Landmine Detection and Classification Using MLP.pptxLandmine Detection and Classification Using MLP.pptx
Landmine Detection and Classification Using MLP.pptxAjayVishwa2
 
IRJET- A Review on Moving Object Detection in Video Forensics
IRJET- A Review on Moving Object Detection in Video Forensics IRJET- A Review on Moving Object Detection in Video Forensics
IRJET- A Review on Moving Object Detection in Video Forensics IRJET Journal
 
Briefing to the U.S. House Committee on Homeland Security
Briefing to the U.S. House Committee on Homeland SecurityBriefing to the U.S. House Committee on Homeland Security
Briefing to the U.S. House Committee on Homeland SecurityMark Ehlen
 
IRJET- A Real Time Yolo Human Detection in Flood Affected Areas based on Vide...
IRJET- A Real Time Yolo Human Detection in Flood Affected Areas based on Vide...IRJET- A Real Time Yolo Human Detection in Flood Affected Areas based on Vide...
IRJET- A Real Time Yolo Human Detection in Flood Affected Areas based on Vide...IRJET Journal
 
Abandoned Object Detection Based on Statistics for Labeled Regions
Abandoned Object Detection Based on Statistics for Labeled RegionsAbandoned Object Detection Based on Statistics for Labeled Regions
Abandoned Object Detection Based on Statistics for Labeled RegionsIRJET Journal
 
Psnr value of digital image watermarking by using
Psnr value of digital image watermarking by usingPsnr value of digital image watermarking by using
Psnr value of digital image watermarking by usingeSAT Publishing House
 
Digital image hiding algorithm for secret communication
Digital image hiding algorithm for secret communicationDigital image hiding algorithm for secret communication
Digital image hiding algorithm for secret communicationeSAT Journals
 
Defending against Adversarial Cyberspace Participants
Defending against Adversarial Cyberspace ParticipantsDefending against Adversarial Cyberspace Participants
Defending against Adversarial Cyberspace Participantsnamblasec
 
IRJET- Human Fall Detection using Co-Saliency-Enhanced Deep Recurrent Convolu...
IRJET- Human Fall Detection using Co-Saliency-Enhanced Deep Recurrent Convolu...IRJET- Human Fall Detection using Co-Saliency-Enhanced Deep Recurrent Convolu...
IRJET- Human Fall Detection using Co-Saliency-Enhanced Deep Recurrent Convolu...IRJET Journal
 
Reversible Multiple Image Secret Sharing using Discrete Haar Wavelet Transform
Reversible Multiple Image Secret Sharing using Discrete Haar Wavelet Transform Reversible Multiple Image Secret Sharing using Discrete Haar Wavelet Transform
Reversible Multiple Image Secret Sharing using Discrete Haar Wavelet Transform IJECEIAES
 
Mag-Securs No.29, 2011 - Validy: Learning from the Stuxnet Case
Mag-Securs No.29, 2011 - Validy: Learning from the Stuxnet CaseMag-Securs No.29, 2011 - Validy: Learning from the Stuxnet Case
Mag-Securs No.29, 2011 - Validy: Learning from the Stuxnet CaseNeelabh Rai
 
A Survey on Person Detection for Social Distancing and Safety Violation Alert...
A Survey on Person Detection for Social Distancing and Safety Violation Alert...A Survey on Person Detection for Social Distancing and Safety Violation Alert...
A Survey on Person Detection for Social Distancing and Safety Violation Alert...IRJET Journal
 
0c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf0000000c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf000000authority12
 
The Rise of the Vulnerability Markets - History, Impacts, Mitigations - Thier...
The Rise of the Vulnerability Markets - History, Impacts, Mitigations - Thier...The Rise of the Vulnerability Markets - History, Impacts, Mitigations - Thier...
The Rise of the Vulnerability Markets - History, Impacts, Mitigations - Thier...Thierry Zoller
 

Similar to Communication satellite (20)

A NOVEL BACKGROUND SUBTRACTION ALGORITHM FOR PERSON TRACKING BASED ON K-NN
A NOVEL BACKGROUND SUBTRACTION ALGORITHM FOR PERSON TRACKING BASED ON K-NN A NOVEL BACKGROUND SUBTRACTION ALGORITHM FOR PERSON TRACKING BASED ON K-NN
A NOVEL BACKGROUND SUBTRACTION ALGORITHM FOR PERSON TRACKING BASED ON K-NN
 
A Novel Background Subtraction Algorithm for Person Tracking Based on K-NN
A Novel Background Subtraction Algorithm for Person Tracking Based on K-NN A Novel Background Subtraction Algorithm for Person Tracking Based on K-NN
A Novel Background Subtraction Algorithm for Person Tracking Based on K-NN
 
25 30
25 3025 30
25 30
 
20111214 iisf shinoda_
20111214 iisf shinoda_20111214 iisf shinoda_
20111214 iisf shinoda_
 
A NOVEL METHOD FOR PERSON TRACKING BASED K-NN : COMPARISON WITH SIFT AND MEAN...
A NOVEL METHOD FOR PERSON TRACKING BASED K-NN : COMPARISON WITH SIFT AND MEAN...A NOVEL METHOD FOR PERSON TRACKING BASED K-NN : COMPARISON WITH SIFT AND MEAN...
A NOVEL METHOD FOR PERSON TRACKING BASED K-NN : COMPARISON WITH SIFT AND MEAN...
 
Landmine Detection and Classification Using MLP.pptx
Landmine Detection and Classification Using MLP.pptxLandmine Detection and Classification Using MLP.pptx
Landmine Detection and Classification Using MLP.pptx
 
IRJET- A Review on Moving Object Detection in Video Forensics
IRJET- A Review on Moving Object Detection in Video Forensics IRJET- A Review on Moving Object Detection in Video Forensics
IRJET- A Review on Moving Object Detection in Video Forensics
 
Briefing to the U.S. House Committee on Homeland Security
Briefing to the U.S. House Committee on Homeland SecurityBriefing to the U.S. House Committee on Homeland Security
Briefing to the U.S. House Committee on Homeland Security
 
IRJET- A Real Time Yolo Human Detection in Flood Affected Areas based on Vide...
IRJET- A Real Time Yolo Human Detection in Flood Affected Areas based on Vide...IRJET- A Real Time Yolo Human Detection in Flood Affected Areas based on Vide...
IRJET- A Real Time Yolo Human Detection in Flood Affected Areas based on Vide...
 
Abandoned Object Detection Based on Statistics for Labeled Regions
Abandoned Object Detection Based on Statistics for Labeled RegionsAbandoned Object Detection Based on Statistics for Labeled Regions
Abandoned Object Detection Based on Statistics for Labeled Regions
 
Psnr value of digital image watermarking by using
Psnr value of digital image watermarking by usingPsnr value of digital image watermarking by using
Psnr value of digital image watermarking by using
 
Digital image hiding algorithm for secret communication
Digital image hiding algorithm for secret communicationDigital image hiding algorithm for secret communication
Digital image hiding algorithm for secret communication
 
[IJET-V1I6P4] Authors: Bhatia Shradha, Doshi Jaina,Jadhav Preeti, Shah Nikita
[IJET-V1I6P4] Authors: Bhatia Shradha, Doshi Jaina,Jadhav Preeti, Shah Nikita[IJET-V1I6P4] Authors: Bhatia Shradha, Doshi Jaina,Jadhav Preeti, Shah Nikita
[IJET-V1I6P4] Authors: Bhatia Shradha, Doshi Jaina,Jadhav Preeti, Shah Nikita
 
Defending against Adversarial Cyberspace Participants
Defending against Adversarial Cyberspace ParticipantsDefending against Adversarial Cyberspace Participants
Defending against Adversarial Cyberspace Participants
 
IRJET- Human Fall Detection using Co-Saliency-Enhanced Deep Recurrent Convolu...
IRJET- Human Fall Detection using Co-Saliency-Enhanced Deep Recurrent Convolu...IRJET- Human Fall Detection using Co-Saliency-Enhanced Deep Recurrent Convolu...
IRJET- Human Fall Detection using Co-Saliency-Enhanced Deep Recurrent Convolu...
 
Reversible Multiple Image Secret Sharing using Discrete Haar Wavelet Transform
Reversible Multiple Image Secret Sharing using Discrete Haar Wavelet Transform Reversible Multiple Image Secret Sharing using Discrete Haar Wavelet Transform
Reversible Multiple Image Secret Sharing using Discrete Haar Wavelet Transform
 
Mag-Securs No.29, 2011 - Validy: Learning from the Stuxnet Case
Mag-Securs No.29, 2011 - Validy: Learning from the Stuxnet CaseMag-Securs No.29, 2011 - Validy: Learning from the Stuxnet Case
Mag-Securs No.29, 2011 - Validy: Learning from the Stuxnet Case
 
A Survey on Person Detection for Social Distancing and Safety Violation Alert...
A Survey on Person Detection for Social Distancing and Safety Violation Alert...A Survey on Person Detection for Social Distancing and Safety Violation Alert...
A Survey on Person Detection for Social Distancing and Safety Violation Alert...
 
0c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf0000000c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf000000
 
The Rise of the Vulnerability Markets - History, Impacts, Mitigations - Thier...
The Rise of the Vulnerability Markets - History, Impacts, Mitigations - Thier...The Rise of the Vulnerability Markets - History, Impacts, Mitigations - Thier...
The Rise of the Vulnerability Markets - History, Impacts, Mitigations - Thier...
 

More from Spontane_IT

Starsight Defense Solution
Starsight Defense SolutionStarsight Defense Solution
Starsight Defense SolutionSpontane_IT
 
StarSight Wireless CCTV
StarSight Wireless CCTVStarSight Wireless CCTV
StarSight Wireless CCTVSpontane_IT
 
Military Communications Systems
Military Communications SystemsMilitary Communications Systems
Military Communications SystemsSpontane_IT
 
Indoor lighting
Indoor lightingIndoor lighting
Indoor lightingSpontane_IT
 
Starsight FT WIFI (for governments)
Starsight FT WIFI (for governments)Starsight FT WIFI (for governments)
Starsight FT WIFI (for governments)Spontane_IT
 
Starsight - FT WIFI (presentation)
Starsight - FT WIFI (presentation)Starsight - FT WIFI (presentation)
Starsight - FT WIFI (presentation)Spontane_IT
 

More from Spontane_IT (6)

Starsight Defense Solution
Starsight Defense SolutionStarsight Defense Solution
Starsight Defense Solution
 
StarSight Wireless CCTV
StarSight Wireless CCTVStarSight Wireless CCTV
StarSight Wireless CCTV
 
Military Communications Systems
Military Communications SystemsMilitary Communications Systems
Military Communications Systems
 
Indoor lighting
Indoor lightingIndoor lighting
Indoor lighting
 
Starsight FT WIFI (for governments)
Starsight FT WIFI (for governments)Starsight FT WIFI (for governments)
Starsight FT WIFI (for governments)
 
Starsight - FT WIFI (presentation)
Starsight - FT WIFI (presentation)Starsight - FT WIFI (presentation)
Starsight - FT WIFI (presentation)
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 

Recently uploaded (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 

Communication satellite

  • 1. SATELLITE IMAGES FOR SURVEILLANC, SECURITY & EMERGENCY MANGAMENT
  • 2. OVERVIEW •This project will enable government or companies to manage satellite imaging technology for surveillance and security missions: g g gy y – Sabotage – Population •The main application described will help to fight against pipelines & terrorist sabotages. However, many others will be pointed. •This proposal includes all necessary elements to get complete independence (facilities, own technology, training,...). SATELLITE IMAGE TECHNOLOGY APPLICATIONS SATELLITE IMAGES / VIDEO FOR SURVEILLANCE AND SECURITY FEBRUARY, FEBRUARY, 2011 Text
  • 3. SATELLITE IMAGE TECHNOLOGY STAGE 1 Image from satellite STAGE 2 Data collecting and pre- processing g STAGE 3 Analyzing. Layer structure STAGE 4 Prevention and countermeasure SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY FEBRUARY, 2011
  • 4. STAGE 1: IMAGE FROM SATELLITES There are two alternatives to get the source images: 1. 1 Buying them to satellite images distributors distributors. 2. Receiving them directly with hardware equipment (antenna systems). It is necessary to select some technical t s ecessa y se ect so e tec ca specs to get successful information from satellites: •The most suitable satellite/s. •The image sensor. •The frequency range. •The desired resol tion The resolution. •The size of area inspected. •The delay between two consecutives images. •Day/night conditions. •Color or black and white images. SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY FEBRUARY, FEBRUARY, 2011
  • 5. STAGE 2: DATA COLLECTING AND PREPROCESSING Before processing the image to analyze the results and reaching conclusions, there are several issues to consider: 1.The preprocessing level. Distortions caused by the sensors sensibilities must be radio-metrically corrected. 2.Distortions caused by relief must be y ortho-rectified. 3.Image must be compared with cartography to get accurate results. 4.The format file must be suitable to analyze the images. th i SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY FEBRUARY, FEBRUARY, 2011
  • 6. STAGE 3: ANALYZING. LAYER STRUCTURE A lot of aspects will be analyzed for each case. Sorting out every aspect a layer will be aspect, obtained. Every layer will have an influence depending on the cause relationship with the threat. Combining all the influence, a risk map will be g p worked out SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY FEBRUARY, FEBRUARY, 2011
  • 7. STAGE 4: PREVENTION AND COUNTERMEASURES There must be a very closed plan to involve as many authorities groups as p possible to react together against threats. That includes army, policy, security g g y, p y, y management, civilian protection, fire department,… The most accurate the plan is, the fastest and most effective reaction will be possible. CONCEPT: 1. Getting images. 2. Detecting threats. 3. Alerting the authorities. 4. Acting to avoid or mitigate damages. SECURITY COUNTERMEASURES WILL HELP TO TO: 1. Mitigate causalities. 2. Minimize damages to the corporate infrastructure. 3. Restoring services at the earliest time possible after a security related incident. SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY FEBRUARY, FEBRUARY, 2011
  • 8. APPLICATIONS SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY FEBRUARY, FEBRUARY, 2011
  • 9. PIPELINE SABOTAGES (I) A very important security problem is terrorism. There are many kinds f terrorism. O ki d of t i One of th most common t f the t type which i t k hi h is taken place in Iraq in last years is PIPELINE SABOTAGES. Then there is a study to show how satellite images can help to prevent pipeline sabotages. sabotages However this study can be applied to most of the terrorism ways. ways Finally, many other applications of this technology will be include. SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY FEBRUARY, FEBRUARY, 2011
  • 10. PIPELINE SABOTAGES (II) The Iraqi pipeline network has q pp suffered many attacks in the last few years. It has become in one of the main objectives to terrorist groups. The starting point is knowing perfectly the pipeline map and its features. SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY FEBRUARY, FEBRUARY, 2011
  • 11. PIPELINE SABOTAGES (III) Accessing to a database g registering pipelines sabotages helps to create patterns. If we are able to detect some common factors in the sabotages, we will be able of PREDICTING new attacks attacks. So, satellite images of the exact p place, around in time, are , , decisive to create patterns. That is achieved identifying HOTSPOTS. HOTSPOTS SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY FEBRUARY, FEBRUARY, 2011
  • 12. PIPELINE SABOTAGES (IV) HOTSPOTS Temperatures anomalies above T t li b a certain threshold calculated by suitable algorithms using the IR bands of certain sensors such as MODIS (Terra, Aqua), AATSR (Envisat) or SEVIRI (MSG). (MSG) SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY FEBRUARY, FEBRUARY, 2011
  • 13. PIPELINE SABOTAGES (V) Here is a distribution of pipeline and MODIS hotspots during 2003, 2004, 2005 and 2006. Historic hotspots distributions can h l t prevent f help to t from new hotspots. SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY FEBRUARY, FEBRUARY, 2011
  • 14. PIPELINE SABOTAGES (VI) There is a great amount of factors to be evaluated for drawing a vulnerability pipeline map. Each layer correspond to one of this factor. thi f t Not all the factors have the same importance to our proposal That proposal. is why each factor will be multiplied by a specific coefficient. SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY FEBRUARY, FEBRUARY, 2011
  • 15. PIPELINE SABOTAGES (VII) Factor A: •Proximity to populated areas •Availability of public transportation near pipelines ility Factor B: •Location of additional infrastructures near the pipeline L ti f dditi li f t t th i li ulnerabi Factor C: •Impact in the national and international economy Factor D: Increasing vu •Unfenced sections •Lack of buffered-protected areas •Areas without surveillance Factor E: •Pipeline above the ground Factor F: •Pipeline in remote areas •Pipeline protected by patrols SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY FEBRUARY, FEBRUARY, 2011
  • 16. PIPELINE SABOTAGES (VIII) Co b Combining all the factors in g a t e acto s the layer structure, it is possible to design a VULNERABILITY MAPMAP. It helps definitely to PREVENTION TASKS. SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY FEBRUARY, FEBRUARY, 2011
  • 17. OTHER APPLICATIONS (I) Besides avoiding pipeline sabotage, there are so many applications in which satellite images can help definitely (military and civilian): 1. Defense & Security. Target surveillance. 2. 2 Communications 3. Non removable Natural Resources 4. Sustentable development & risk management 5. 5 Agriculture and forest forest. 6. Cartography & territory order. 7. Population migrating. 8. 8 Natural di N t l disasters. Fi t Fires. 9. Climatology. 10. Pollution. 11. Hydrology. Land evolution. SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY FEBRUARY, FEBRUARY, 2011
  • 18. DEFENSE & SECURITY. TARGET SURVEILLANCE (I) Permanent imaging very definite areas helps to watch over them, and prevent potential terrorist attacks There are a lot of indicators attacks. to alert from attacks, such as: unusual people movements, vehicles parked in forbidden areas,… 1. Government buildings. 2. Religious exhibitions. 3. Humanitarian aids convoys. 4. Factories. 5. Airports. 6. Armaments store. SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY FEBRUARY, FEBRUARY, 2011
  • 19. DEFENSE & SECURITY. TARGET SURVEILLANCE (II) NECESSITY: • Multiplying the sources of information to strengthen monitoring of the territories • Detect and monitor changes in sensitive areas • Organizing the operations of peacekeeping RESULTS: RESULTS • The remote mapping of vast territories • The daily monitoring of borders and ports • The detection and accurate identification Infrastructure • Geographical databases to prepare surveillance missions SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY FEBRUARY, FEBRUARY, 2011
  • 20. COMMUNICATIONS NECESSITY: • Mapping the reception areas and identify difficult areas • Maintaining and developing the existing telecommunications infrastructure • Optimizing the location of broadcasters to increase network coverage RESULTS: • Ratings fine land occupation • Database for a 3D interactive simulation of the implementation of new infrastructure SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY FEBRUARY, FEBRUARY, 2011
  • 21. NON- NON-REMOVABLE NATURAL RESOURCES NECESSITY: • Perfect exploring the geological and hydrological resources • Optimizing the implementation of new mining and oil infrastructure • Assessing the impact of farms on the environment • Conduct a national inventory of water resources RESULTS: RESULTS • Locating potential sites of exploitation • Maps of natural hazards impact on industrial activity i i • Mapping of ground deformation associated with a holding • Maps of potential water resources surface or underground SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY FEBRUARY, FEBRUARY, 2011
  • 22. SUSTAINABLE DEVELOPMENT & RISK MANAGEMENT NECESSITY: • Preserving the environment around industrial projects • Implement plans for p p p prevention of natural or industrial risks • Identify and monitor natural protection zones • Control the development of tourism activities RESULTS: • Regular monitoring of sites at risk (industries, g g ( , infrastructure at sea) • Update mapping of sensitive areas and coastal • Tourist maps accurate and easy to update SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY FEBRUARY, FEBRUARY, 2011
  • 23. AGRICULTURE (I) NECESSITY: • Evaluate with precocity surfaces and agricultural production • Anticipate risks and assess their impacts (pollution, drought, floods) • Monitoring the implementation of agricultural regulations and environmental protection • Meet the wooded areas and monitor the development of plantations RESULTS: • Accurate and reliable agricultural statistics before harvest b f h t • Remote control of large areas under cultivation • Early warning system in case of changes y g y g • Inventory and management of forestry (plantations, logging, fire prevention) SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY FEBRUARY, FEBRUARY, 2011
  • 24. AGRICULTURE (II) Satellite images technology can help to identify exactly which use is g given to the land. Agricultural resources are basics in economy of g y many countries. Both information and surveillance missions are possible. Studies can focus on which species are cultivated and the way they are grown up. SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY FEBRUARY, FEBRUARY, 2011
  • 25. CARTOGRAPHY(I) NECESSITY • Topographic databases constitute reference • Study and implement the schemes of urban and rural • Create and update cadastral parcelling • Optimizing road and rail networks • Organize the census of the population regularly RESULTS • Topographic maps at 1:25 000, consistent with international standards • The classification of different urban structures • The update of information cadastral 1:50 000 to 1:10 000 • Simulations and choice of paths of roads and railways • The definition of areas to prepare a census SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY FEBRUARY, FEBRUARY, 2011
  • 26. CARTOGRAPHY(II) A territory can be closely defined using satellite imagery. There are y y g g y several issues to consider: 1. 3D mapping. 2. Heights map. 3. Terrain textures. 4. Natural borders. 5. Sea level. Combining all thi f t C bi i ll this features very accurate maps would b b ilt t ld be built. SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY FEBRUARY, FEBRUARY, 2011
  • 27. POPULATION MIGRATING (I) Usually this movements are caused by natural disasters, wars, military decisions,… First of all, a database including all these causes can point a possibility of detecting population migration. The Th easiest way t verify thi migrations i t analyze night satellite i t to if this i ti is to l i ht t llit images. One image should be previous to the cause and the other must be later. Differences between these images (basically lights in city or villages) can be the proof to identify population migrating. SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY FEBRUARY, FEBRUARY, 2011
  • 28. POPULATION MIGRATING (II) Muzaffarabad Muzaffarabad Manshira Manshira Disappearing Increasing Lights / lights Ephemeral Lights Appear A SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY FEBRUARY, FEBRUARY, 2011
  • 29. NATURAL DISASTERS There is a wide spectrum of possible natural disaster to study. These phenomena are usually difficult to detect before taking place, although in very specific conditions there may be some indicators to alert and to start the prevention protocol. However, the importance of this point is to evaluate the consequences of natural disasters. An estimation of damages is always a need need. SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY FEBRUARY, FEBRUARY, 2011
  • 30. FIRES Satellite images technology can support fire detection. It can not be a prevent task, but it helps to identify some features: 1. Fire breaks. 2. Fire temperature. 3. Best options to extinguish the fire. 4. Area burned. SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY FEBRUARY, FEBRUARY, 2011
  • 31. CLIMATOLOGY Besides meteorological information, satellites helps to forecast local weather phenomena There are several to stand out: phenomena. 1. Hurricanes. 2. Tsunamis. 3. Tornadoes. 4. Acid rain. 5. Sandstorms. 6. Monsoons. SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY FEBRUARY, FEBRUARY, 2011
  • 32. POLLUTION Pollution is being considered as a front page problem. Many efforts have been carried on to reduce it as much as possible. possible Analyzing satellite images can help to po t point which areas produce great c a eas p oduce g eat amounts of pollution. Whit this useful data, a “pollution plan” can be developed. This photograph shows how pollution affects t S th E t A i ff t to South-East Asia. SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY FEBRUARY, FEBRUARY, 2011
  • 33. HIDROLOGY Nowadays a good management of water reservoirs is essential. Getting satellite images within a short g g period of time, floods or droughts can be evaluated. Comparing images can makes easy to get results results. Moreover water flows of rivers, lakes, swamps,..., would be sort out. p , , SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY FEBRUARY, FEBRUARY, 2011
  • 34. LAND EVOLUTION Some very particulars phenomena can b studied very accurately with S ti l h be t di d t l ith the technology here proposed. Changes in their size, growing up direction,… All desired parameters are available. Deserts Glaciers Deforestation SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY FEBRUARY, FEBRUARY, 2011
  • 35. CRITICAL INFRASTRUCTURE PROTECTION BUILDINGS BRIDGES HOSPITALS MARKET PLACE USING 3 TECHNOLOGIES: - SATELLITE IMAGING - LOCAL CAMERA ZONES - GIS (Geographic Information System) SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY FEBRUARY, FEBRUARY, 2011
  • 36. PROPOSAL FOR A SATELLITE IMAGE PROCESSING CENTER 1.- 1 COMERCIAL SATELLITES AVALAIBLE 2.- IMAGE ADQUISITION 3.- 3 RESOLUTION 4.- FACILITIES 5.- 5 TRAINING 6.- ECONOMIC PROPOSAL SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY FEBRUARY, FEBRUARY, 2011
  • 37. SATELLITES ORBITS There are 2 types of satellites useful for this project considering their orbits: 1. Geostationary orbit: the satellite is always “fixed” over the same point of earth (period about 24 hours) hours). 2. Polar orbit: the satellite is moving over the earth's surface (period about 100 minutes). The use of each type will depend in a daily based need according with the alarms and the technicians & politics decisions. The license of images are restricted to country borders. GEOSTATIONARY ORBIT POLAR ORBIT SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY FEBRUARY, FEBRUARY, 2011
  • 38. SATELLITES AVAILABLE List of some COMERCIAL satellites watching at any time during their orbits: 1. 1 LANDSAT 7 9. 9 NOAA (AVHRR) 2. LANDSAT5 10. MSG (SEVIRI) 3. SPOT 4-5 from 2.5 to 20 meters resolution 11. RESURS 01 4. FORMOSAT-2 from 2 to 8 meters resolution 12. EROS A1 5. KOMPSAT-2 from 1 to 4 meters resolution 13. ENVISAT 6. QUICKBIRD 14. WORLDVIEW 1 7. IKONOS 2 15. TERRA 8. 8 EOS M1 (MODIS) 16. 16 AQUA SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY FEBRUARY, FEBRUARY, 2011
  • 39. FUTURE SATELLITES 1. 1 PLÉIADES 1 & 2. Very high resolution 2 resolution. - standard 50-centimeter - ortho-rectified products p - daily revisit capabilities - perfect complement to SPOT 6 and 7 2. SPOT 6 & 7 continuity SPOT 5 mission with the same 60-kilometer swath and improved 60 kilometer 2-meter resolution SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY FEBRUARY, FEBRUARY, 2011
  • 40. IMAGES ADQUISITIONS Images can be ordered either from archive or by tasking the satellites. For large volumes, the best solution is to locally receive the telemetry from the satellites. satellites RECEIVING GROUND STATION Ground telemetry stations for direct acquisition from satellite once it passes over the station in real time. WEB TECHNOLOGY Quasi real time (few hours after acquisition) images are recorded on board the Q i l ti (f h ft i iti ) i d d b d th satellites, downloaded in north pole European receiving station and sent via secure encrypted ftp. ALTIMETRIC DATABASE Location accuracy, called reference3d, that allows ortho-rectification of images from various sources and offers a unique reference. Immediately available over any country. y Cost efficient and can be considered as a national GIS (while setting up a traditional national GIS will take years and costs a lot of millions of Euros). SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY FEBRUARY, FEBRUARY, 2011
  • 41. RESOLUTION HIGH RESOLUTION (HR) satellites cover a very wide swath, enabling them to portray a much larger picture of the situation on the ground, ground VERY HIGH RESOLUTION (VHR) satellites provide greater detail and pinpoint accuracy. The full constellation will operate simultaneously to provide monitoring of large areas and very tight coverage over small areas at the same time, thereby giving users the best capability for surveillance, situational awareness and analyst interpretation in surveillance near real-time. SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY FEBRUARY, FEBRUARY, 2011
  • 42. FACILITIES (I) Satellite Center Military Civil Defense/Security Population Environment Mapping Propose a wide range of images plus the technical expertise to receive, archive, process, etc. Those images and in downstream to use them in various applications for developing projects. SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY FEBRUARY, FEBRUARY, 2011
  • 43. FACILITIES (II) BUILDING LOCALLY SPECIFIC OFFER (TBD *) ANTENNA 6M COMPATIBLE WITH GEO&POLAR 3.4 m for SPOT satellites and, in a smaller circle of visibility, ENVISAT and FORMOSAT-2. 4.5 m or 5.4 m for ENVISAT and FORMOSAT-2, and receive future satellites KOMPSAT-2, TerraSAR-X, THEOS and PLEIADES. TERMINAL COMPATIBLE FOR EACH SATELLITE COMPATIBILITY GROUP R ESOLUTION AVERAGE Terminal is the system that allows the acquisition, inventory, storage, processing and production data transmitted by the satellite digital sensors. INSTALLATIONS INCLUDE: (TBD*) (TBD ) • ZONE STUDY • BUILDINGS PROJECT • SOFTWARE • HARDWARE • COMMUNICATIONS • ANTENNAS SYSTEM (*)Specific offer has to be made based on precise specifications that will consider the local context, the area to be imaged, the repetivity of viewing, the best combination of images from different satellites. SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY FEBRUARY, FEBRUARY, 2011
  • 44. FACILITIES (III) There is the possibility of programming satellites to get the better data for each application. pp Depending on the solution, it might be possible to get the experience, de data and the collaboration of many other centres around the world. SERVICES INCLUDED: System: installation, delivery acceptance testing, training on site, hot-line and maintenance materials and software Operations: interfaced to Spot Image for programming and daily assistance relating to the operations stations p Applications: implement support for information centers at the "foot of the antenna" for defense, agriculture, mapping and maritime surveillance with transfer of technology or know-how training and surveillance, know-how, technical assistance SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY FEBRUARY, FEBRUARY, 2011
  • 45. TRAINING (I) Training is basic to get complete technological independence. However, technical support will be provided to launch such an ambitious problem. We understand formation as an intrinsic part of a project. It will consist in theory and practicing with real tests. It is a complete program developed in about 6 8 months depending on needs 6-8 months, needs. It is included training in Spain to 12 technicians, 4 maintenance and 2 officials. GETTING INDEPENDENCE • SOFTWARE FORMATION. • HARDWARE FORMATION. • ACQUIRING KNOW HOW. HOW • HABITUATING TO THE TOOLS. • PRACTICING. REAL TESTS. •TECHNICAL SUPPORT. • SOLVING PROBLEMS. SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY FEBRUARY, FEBRUARY, 2011
  • 46. CONCLUSIONS (I) Nowadays satellite features encourage to use their potential. This project allows to have technological independency for managing surveillance and security missions. NASA, ESA and EUSC supports this technology. Satellite imaging can help to take high level control over a lot of aspects. Not only military, but also civilian applications can be p y y, pp carried on. Prevention - alert – countermeasures. They are the three logical stages to manage security. SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY FEBRUARY, FEBRUARY, 2011
  • 47. CONCLUSIONS (II) There i only one t h l Th is l technology, b t l t of applications. but lots f li ti Hardware, software, installations,…, would be provided; even formation to employees employees. Know how will let to investigate new fields in future. Other applications not described in this document would be studied. SATELLITE IMAGES FOR SURVEILLANCE AND SECURITY FEBRUARY, FEBRUARY, 2011
  • 48. THANKS! Contact : Yannick Gaillac, email: y.gaillac@starsightproject.com Mob : +44 7968 761 952 www.aerosertec.com / www.starsightproject.com