A Knowledge-based Approach for Reducing Cloud and Shadow

نویسندگان

  • Mingjun Song
  • Daniel L. Civco
چکیده

Completely cloud-free remotely sensed images are not always available, especially in tropical, neo-tropical, or humid climates, posing complications and perhaps serious constraints to image analysis. In this paper, a knowledge-based approach to reduce cloud and shadow using two dates of Landsat TM imagery is presented. Procedurally, first, the brightness and contrast of a secondary image was adjusted to be the same as the main image. Second, instead of detecting clouds and shadows in two images independently, a knowledge base was used to detect their presence in the main image in areas not present in the secondary image. Corresponding brightness value thresholds for cloud and shadow area in the main image and non-cloud and non-shadow area in the secondary image were set in TM bands 1 and 4, respectively. Thresholds of brightness difference between two images were used to avoid other features having similar brightness values. An object-based method was employed to distinguish linear water features from shadow areas. eCognition was used to segment images into objects, with emphasis on water and shadow features. and length-to-width ratio of these objects was derived to separate confused linear water and shadow area. Finally, a composite image was generated with minimal cloud and shadow by replacing the brightness values of detected areas in the main image with those of the secondary image. This paper describes the method and presents results for a study area in Madagascar.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A multi-scale convolutional neural network for automatic cloud and cloud shadow detection from Gaofen-1 images

The reconstruction of the information contaminated by cloud and cloud shadow is an important step in pre-processing of high-resolution satellite images. The cloud and cloud shadow automatic segmentation could be the first step in the process of reconstructing the information contaminated by cloud and cloud shadow. This stage is a remarkable challenge due to the relatively inefficient performanc...

متن کامل

ارائه چارچوبی برای سیستم مدیریت دانش در محیط رایانش ابری و وب 2.0

Today, data, information and knowledge are very important assets for the Organizations and the effective management of knowledge is considered a way to gain and sustain a competitive advantage in a highly dynamic environment of the organizations. With the growth of information and communication technologies, cloud computing and Web 2.0, as new Phenomena, recommend helpful solutions in the field...

متن کامل

Cloud Computing; A New Approach to Learning and Learning

Introduction: The cloud computing and services, as a technological solution for developing educational services, can accelerate the provision and expansion of these highly useful services. This study intended to provide an overall picture of practical areas of learning services based on cloud computing teaching and learning equipment. Methods: This was a theoretical hybrid research study in whi...

متن کامل

A Conceptual Framework for Smart Hospital towards Industry 4.0

Background: The fourth industrial revolution consists of combining network devices with cloud computing methods and analyzing large data and artificial intelligence, which makes it possible to call such an infrastructure smart. In a Smart Hospital, all things and devices are designed to be connected and integrated, thus achieving better patient care, increasing efficiency and reducing time wast...

متن کامل

Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing

Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002