Identification of Roads from RS Images

Authors

  • P. Bala  Computer Science Department, V.R.Siddhartha Engineering College, Student, Vijayawada, India
  • Dr. K. Suvarna Vani  Computer Science Department, V.R.Siddhartha Engineering College, Professor, Vijayawada, India

Keywords:

Remote Sensing Image, GPS navigation, Traffic management, City Planning, Road Extraction Methods.

Abstract

As a significant role for traffic management, city planning, road monitoring, GPS navigation and map updating, the technology of road extraction from a remote sensing (RS) image has been a hot research topic in recent years. In the project, after analysing different road features and road models, the road extraction methods were classified into the classification-based methods, knowledge-based methods, mathematical morphology, active contour model, and dynamic programming. Firstly, the road features, road model, existing difficulties and interference factors for road extraction were analysed. Secondly, the principle of road extraction, the advantages and disadvantages of various methods and research achievements were briefly highlighted. Then, the comparisons of the different road extraction algorithms were performed, including road features, test samples and shortcomings. Finally, the research results in recent years were summarized emphatically. It is obvious that only using one kind of road features is hard to get an excellent extraction effect.

References

  1. M. Raya and J. P. Hubaux, "Securing Vehicular ad hoc networks ," J. Compute. Security, vol. 15, no. 1, pp. 39-68, 2007.
  2. "time-consuming." Synonyms.net. STANDS4 LLC, 2017. Web. 19 Sep. 2017. <http://www.synonyms.net/antonyms/time-consuming>.
  3. Yaseer  Toor et al., "Vehicle Ad Hoc Networks:Applications and Related Technical Issues", IEEE Communictions Surveys & Tutorials, 3rd  quarter 2008, vol. 10, no. 3, pp.74-78.
  4. Maxim Raya et al., "The Security of Vehicular Ad Hoc Networks," SASN’05, Nov 7 20005, Alaxandria, Verginia, USA, pp. 11-21.
  5. Dedicated Short Range Communications (DSRC) Online. Available: http://grouper.ieee.org/groups/scc32/dsrc/index.html.
  6. http://www.mdpi.com/2224-2708/5/1/3/htm
  7. J. P. Hubaux, S. Capkun, and J.Leo, "The security and privacy of smart vehicles," IEEE Security Privacy Mag., vol. 2, no. 3, pp. 49-55, May-Jun. 2004.
  8. M. Nekovee and  B. B. Bogason, "Reliable and efficient information dissemination in intermittently connected vehicular ad hoc networks," in  Proc. IEEE Vehicular Technol. Conf., Apr. 2007, pp. 2486-2490.
  9. C. Zhang, X. Lin, R. Lu and P.-H. Ho, "RAISE: An effiient RSU—aided message authentication scheme in vehicular communication networks," in Proc. IEEE Int. Conf. Commun., May 2008, pp. 1451-1457.
  10. http://slideplayer.com/slide/9398450/
  11. Jose Maria de Fuentes, Ana Isabel Gonzalez-Tables, and Arturo Ribagorda , "An Overview of Security issues in Vehicular Ad Hoc Networks," Handbook of Research on Mobility and Computing, 2010.
  12. Mousafa. H, Zhang. Y, "Vehicular Networks:Techniques, Standards, and Applications," CRC Press, (2009).
  13. Dahill,  B. N. Levine, E. Royer and Clay Shields, "A Secure Routing protocol for Ad Hoc Networks," Proceedings of IEEE ICNP 2002, pp. 78-87, Nov. 2002.
  14. P. Papaadministrators and Z. J Haas, "Secure Data Transmission in Mobile Ad Hoc Networks," ACM Workshop on Wireless Security, San Diago, CA, September 2003.
  15. J. Zhao, Y. Zhang, and G. Cao, "Data pouring and buffering o the road: A new data dissemination paradigm in vehicular ad hoc networks," IEEE Trans. Vehicular Technol. Vol. 56, no. 6, pp. 3266-3277, Nov. 2007.
  16. Kevin Fall, Kannan Vardhan, "The ns manual," The VINT project, December 2008.
  17. Brent Welch, "Practical programming in TCL and Tk," Prentice Hall, May 1994.
  18. Vehicle Safety Communications Project, Final Report, DOT HS 810 591, April 2006.
  19. www.roadtraffic-technology.com
  20. G.Gowtham , E.Samlinson, "A Secured Trust Creation in VANET Environment Using Random Password Generator," International Conference on Computing, Electronics and Electrical Technologies ICCEET. PP:781-784, 2012.
  21. www.researchgate.net
  22. Shyr-Long Jeng, Wei-Hua Chieng, and Hsiang-Pin Lu, "Estimating Speed Using a Side-Looking Single-Radar Vehicle Detector," IEEE transactions on intelligent transportation systems, volume 15, No. 2, (2014).
  23. H. Zhu,  R. Lu, X. Shen, and   X. Lin, "Security in service-oriented vehicular networks," IEEE Wireless Commun. Vol. 16, no. 4, pp. 16-22, Aug.2009.
  24. http://www.isi.edu/nanam/ns/tutorial/index.html
  25. http://www.nile.wpi.edu/ns
  26. Menezes, S. Vnstone, and D. Hankerson, "Guide to elliptic curve cryptography," Spinger Professional Computing (Springer, New York 2004)
  27. Sirwan A Mohammad and Dr. Sattar, "Design of wireless network based on ns2," Journal of Global Research in Computr Science, vol. 3, no. 12, pp. 1-8, (2012)
  28. http://iitkgp.vlab.co.in/?sub=38&brch=121&sim=561&cnt=1
  29. http://www.tutorialsweb.com/ns2/NS2-1.html

Downloads

Published

2017-10-31

Issue

Section

Research Articles

How to Cite

[1]
P. Bala, Dr. K. Suvarna Vani, " Identification of Roads from RS Images, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 5, pp.356-360, September-October-2017.