Road Extraction Based on Threshold Labeling Watershed Algorithm
نویسندگان
چکیده
منابع مشابه
A Hub-Based Labeling Algorithm for Shortest Paths on Road Networks
Abraham et al. [SODA 2010] have recently presented a theoretical analysis of several practical point-to-point shortest path algorithms based on modeling road networks as graphs with low highway dimension. Among the methods they analyzed, the one with the best time bounds is the labeling algorithm. Their results suggest that the algorithm is interesting from a theoretical viewpoint, but leave op...
متن کاملRoad Extraction Based on Snakes and Sophisticated Line Extraction
The extraction of roads from aerial and satellite images is an important task within cartography and planning of new road networks. The automation of this task is highly motivated by the expected increase of the speed and the precision of extraction. This work considers automatic road extraction from single aerial images of high resolution. It is based on two previously developed approaches: Th...
متن کاملRoad Extraction Based on Line Extraction and Snakes
The extraction of roads from aerial and satellite images is an important task within cartography and planning of new road networks. The automation of this task is highly motivated by the expected increase of the speed and the precision of extraction. The present work considers automatic road extraction from single aerial images of high resolution. It is based on two previously developed approac...
متن کاملWatershed based region growing algorithm
This paper presents a solution to a major drawback of watershed transformation: over segmentation. The solution utilizes one of its main advantages – very good edge extraction. It is a method that simulates pouring water onto a landscape created on a basis of a digital image. Unfortunately transformation produces a region for each local minimum so, usually, the number of watersheds (catchment b...
متن کاملThreshold quantum cryptograph based on Grover’s algorithm
Grover’s operator in the two-qubit case can transform a basis into its conjugated basis. A permutation operator can transform a state in the two conjugated bases into its orthogonal state. These properties are included in a threshold quantum protocol. The proposed threshold quantum protocol is secure based the proof that the legitimate participators can only eavesdrop 2 bits of 3 bits operation...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Image and Signal Processing
سال: 2017
ISSN: 2325-6753,2325-6745
DOI: 10.12677/jisp.2017.62012