Identification of Roads from RS Images
Keywords:
Remote Sensing Image, GPS navigation, Traffic management, City Planning, Road Extraction Methods.Abstract
As a significant role for traffic management, city planning, road monitoring, GPS navigation and map updating, the technology of road extraction from a remote sensing (RS) image has been a hot research topic in recent years. In the project, after analysing different road features and road models, the road extraction methods were classified into the classification-based methods, knowledge-based methods, mathematical morphology, active contour model, and dynamic programming. Firstly, the road features, road model, existing difficulties and interference factors for road extraction were analysed. Secondly, the principle of road extraction, the advantages and disadvantages of various methods and research achievements were briefly highlighted. Then, the comparisons of the different road extraction algorithms were performed, including road features, test samples and shortcomings. Finally, the research results in recent years were summarized emphatically. It is obvious that only using one kind of road features is hard to get an excellent extraction effect.
References
- M. Raya and J. P. Hubaux, "Securing Vehicular ad hoc networks ," J. Compute. Security, vol. 15, no. 1, pp. 39-68, 2007.
- "time-consuming." Synonyms.net. STANDS4 LLC, 2017. Web. 19 Sep. 2017. <http://www.synonyms.net/antonyms/time-consuming>.
- Yaseer Toor et al., "Vehicle Ad Hoc Networks:Applications and Related Technical Issues", IEEE Communictions Surveys & Tutorials, 3rd quarter 2008, vol. 10, no. 3, pp.74-78.
- Maxim Raya et al., "The Security of Vehicular Ad Hoc Networks," SASN’05, Nov 7 20005, Alaxandria, Verginia, USA, pp. 11-21.
- Dedicated Short Range Communications (DSRC) Online. Available: http://grouper.ieee.org/groups/scc32/dsrc/index.html.
- http://www.mdpi.com/2224-2708/5/1/3/htm
- J. P. Hubaux, S. Capkun, and J.Leo, "The security and privacy of smart vehicles," IEEE Security Privacy Mag., vol. 2, no. 3, pp. 49-55, May-Jun. 2004.
- M. Nekovee and B. B. Bogason, "Reliable and efficient information dissemination in intermittently connected vehicular ad hoc networks," in Proc. IEEE Vehicular Technol. Conf., Apr. 2007, pp. 2486-2490.
- C. Zhang, X. Lin, R. Lu and P.-H. Ho, "RAISE: An effiient RSU—aided message authentication scheme in vehicular communication networks," in Proc. IEEE Int. Conf. Commun., May 2008, pp. 1451-1457.
- http://slideplayer.com/slide/9398450/
- Jose Maria de Fuentes, Ana Isabel Gonzalez-Tables, and Arturo Ribagorda , "An Overview of Security issues in Vehicular Ad Hoc Networks," Handbook of Research on Mobility and Computing, 2010.
- Mousafa. H, Zhang. Y, "Vehicular Networks:Techniques, Standards, and Applications," CRC Press, (2009).
- Dahill, B. N. Levine, E. Royer and Clay Shields, "A Secure Routing protocol for Ad Hoc Networks," Proceedings of IEEE ICNP 2002, pp. 78-87, Nov. 2002.
- P. Papaadministrators and Z. J Haas, "Secure Data Transmission in Mobile Ad Hoc Networks," ACM Workshop on Wireless Security, San Diago, CA, September 2003.
- J. Zhao, Y. Zhang, and G. Cao, "Data pouring and buffering o the road: A new data dissemination paradigm in vehicular ad hoc networks," IEEE Trans. Vehicular Technol. Vol. 56, no. 6, pp. 3266-3277, Nov. 2007.
- Kevin Fall, Kannan Vardhan, "The ns manual," The VINT project, December 2008.
- Brent Welch, "Practical programming in TCL and Tk," Prentice Hall, May 1994.
- Vehicle Safety Communications Project, Final Report, DOT HS 810 591, April 2006.
- www.roadtraffic-technology.com
- G.Gowtham , E.Samlinson, "A Secured Trust Creation in VANET Environment Using Random Password Generator," International Conference on Computing, Electronics and Electrical Technologies ICCEET. PP:781-784, 2012.
- www.researchgate.net
- Shyr-Long Jeng, Wei-Hua Chieng, and Hsiang-Pin Lu, "Estimating Speed Using a Side-Looking Single-Radar Vehicle Detector," IEEE transactions on intelligent transportation systems, volume 15, No. 2, (2014).
- H. Zhu, R. Lu, X. Shen, and X. Lin, "Security in service-oriented vehicular networks," IEEE Wireless Commun. Vol. 16, no. 4, pp. 16-22, Aug.2009.
- http://www.isi.edu/nanam/ns/tutorial/index.html
- http://www.nile.wpi.edu/ns
- Menezes, S. Vnstone, and D. Hankerson, "Guide to elliptic curve cryptography," Spinger Professional Computing (Springer, New York 2004)
- Sirwan A Mohammad and Dr. Sattar, "Design of wireless network based on ns2," Journal of Global Research in Computr Science, vol. 3, no. 12, pp. 1-8, (2012)
- http://iitkgp.vlab.co.in/?sub=38&brch=121&sim=561&cnt=1
- http://www.tutorialsweb.com/ns2/NS2-1.html
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.