A Localised Cloud Masking Method For Malaysia

2883 words - 12 pages

Abstract - Two methods of cloud masking tuned to Malaysian conditions have been developed, based on spectral analysis and Principal Components Analysis (PCA) of MODIS data. In the spectral approach, thresholds were applied to four reflective bands (1, 2, 3, and 4), three thermal bands (29, 31 and 32), the band 2/band_1 ratio, and the difference between band 29 and 31 in order to detect cloud. The PCA test applied a threshold to the first principal component derived from the seven quantities used for spectral analysis. Cloud detections were compared with the standard MODIS cloud mask, and their accuracy was assessed using reference images and geographical information on the study area.

Keywords: Cloud masking, spectral analysis, Principal Components Analysis , reflectance, brightness temperature

1. INTRODUCTION

Typically, 50% of the Earth’s surface is covered by cloud at any time, where cloud is defined as a visible mass of condensed water droplets or ice crystals suspended in the atmosphere above the Earth's surface. In remote sensing, clouds are generally characterized by higher reflectance and lower temperature than the background. Thick opaque cloud blocks almost all information from the surface or near surface, while thin cloud has some physical characteristics similar to other atmospheric constituents. Misinterpretation of cloud may result in inaccuracy of various remote sensing applications, ranging from land cover classification to retrieval of atmospheric constituents (e.g. in air pollution studies).

Several cloud detection and masking studies have been reported in the literature. However, most of these algorithms were designed for the global scale (Rossow & Gardner 1993; Ackerman et al 2002), and little effort has been devoted to optimising regional methods. Some regional cloud masking algorithms have been designed for high, low and mid latitude regions, and these customised cloud masking algorithms tend to work best for these regions (Saunders 1986; Logar et al 1998). Little serious effort has been applied to the equatorial regions, especially South-east Asia (Franca & Cracknell 1995; Bendix et al 2004). This study considers this issue for the particular case of Malaysia. It uses MODIS Terra data to examine the spectral behaviour of cloud, identify effective MODIS bands for cloud detection and determine suitable cloud detection and masking methods in this region.

2. MATERIALS AND METHODS

This study is based on the MOD021KM product from MODIS Terra. A major advantage of MODIS is its wide range of spectral bands, with 36 spectral bands covering the visible, near infrared and thermal infrared wavelengths. In addition, MODIS, with its swath width of 2330 km, is capable of recording every point on the Earth at least once every two days and has an equatorial crossing time of 10:30 a.m. local time. Thus it can cover the whole study area (Peninsular Malaysia) in a single day pass with a high frequency of revisit....

Find Another Essay On A Localised Cloud Masking Method for Malaysia

Morphology of the Folk Tales as a Method for Analysis

1888 words - 8 pages analyze the diary of Zulikhan Elihadzhieva, a Chechen woman who committed a suicidal attack in July 5, 2003. While reading, I tried to apply some techniques of structural narrative analysis that might fit for this text. Initially, my intent was to use the L. White & A. Taket Narrative Analysis Method. However, in the process of analyzing the diary, I had a strong sense that the story had a plot similar to folktales, and the meaning of the

Religion as a Method of Improvement for Gender Equality

1950 words - 8 pages Religion as a Method of Improvement for Gender Equality Although women were still viewed and treated as second-class citizens, the status of women seemed improve under Christianity, especially in regard to social interaction and Islam, especially in regard to legal rights such as inheritance laws. The improvement of women’s situation was particularly pronounced when compared to the even lesser status of women during the Greek and Roman periods

A rugged, precise and accurate new gravimetry method for the determination of gold: an alternative to fire assay method

872 words - 4 pages the determination of gold in small scale or trace amounts like that of atomic absorption spectroscopy (AAS). The demand for gold is rapidly icreasing world wide and as of today, the standard test for its determination is Fire Assay ASTM E 1335-08 – a method that requires expertise, time, and can lead to a decrease in the sample’s amount. In this study, Gold – a rare metal known for its worth, value, and properties such as conductivity

TKVM: A METHOD AND TOOL FOR SCHOOL WEB SITES KNOWLEDGE CARTOGRAPHY

1847 words - 7 pages are becoming increasingly larger, thus locating and capturing teachers’ skills is very difficult because of the complexity of navigation in these websites. In this paper we propose TKVM a method for knowledge cartography in the domain of e-learning. In particular we use these school and universities websites to identify and then cartography teachers’ skills and knowledge. Our solution is to help users by providing automatically generated

Critically examine the use of social survey as a research method for sociologists

1272 words - 5 pages distinguished three main types of surveys. These are factual surveys, attitude survey and explanatory survey. Willmott and Young used structural interviews, which is a form of questionnaire, in their survey of family life in London in 1970.The BCS is a social survey used as a research method for sociologists. It is very useful as it covers a range of crimes with a large sample size. The BCS is a household survey which asks if anyone in their household had

Most Viable Method of Biometric Security for a Large Multinational Firm

1912 words - 8 pages Security is one of the most important aspects of everyday life. Knowing that one is safe makes life more comfortable, for example ‘Home Is Where Our Hearts Are’ research published on “The Bolton News” (2009) found out that 37% of the UK citizens planned to move out from locality due to crime. All in all it is essential to feel safe not only about one’s life but also to have a safe business and secure work place. Security can be greatly enhanced

TGFU- Teaching Game For Understanding: This Is A Paper On Understanding The Different Method For Teaching Sport

3386 words - 14 pages trouble scoring. So I would work more on creating space and showing different ways to get open then spend a lot of time on scoring. I think the TGFU is would be more effective for beginner and younger athletes. One may wonder if a child with a complete lack of skill would fail under this method because they have nothing to work with. IN addition, this method can result in poor skill development because the emphasis is on tactics and strategies

Cloud Computing Strategies in Improving Education

1081 words - 4 pages college or university by the systematic network that have been developed through the variety combination of software needed spread by the cloud for each department or faculty in institution. Thus, when all variety software have been combine to a cloud, it become more systematic to manage the system without no need to upgrade variety software of each PC in each department that indirectly increase cost. It show, how the cloud computing establish the

towards privacy preserving

1073 words - 5 pages parts of the cloud infrastructure provided by various vendors in a complex and heterogeneous in nature. Cloud Scheduler will allocate a memory space and also security key for user to protect their data. In this project, Cloud Scheduler will consider the user requirements and to satisfy it. By using algorithm encryption and decryption method is implemented for protecting data. Applications deployed in the cloud can be used to interact and in

Cloud Computing Security

1573 words - 6 pages perform various calculations on it. Google uses data encryption as a method of ensuring that data stored in its cloud is secured and confidential (Bradley, 2010). GovCloud is a special cloud established by Google for storing government related information and data (Bradley, 2010). Due to the sensitivity of the information stored in GovCloud, Google encrypts the data in such a way that the data is not available to unintended persons. All data

Cloud computing software

2192 words - 9 pages practical reason for this lack of knowledge. The public cloud is made available to the public and through smart phones and this enables easy access to the web and can easily pass for the most used cloud deployment method. On the other hand a rising firm might opt for a private cloud to keep their information confidential and hidden from competitors while large multinational organization might adopt a hybrid cloud. This essay discussed the

Similar Essays

Is Ethnography A Suitable Method For Research

2303 words - 9 pages Is Ethnography a Suitable method for Research on Residential Satisfaction and Community Participation. Ethnography within its wider field of research is described as the study of people’s behaviour in terms of social contexts, with emphasis on interaction in everyday situations (Lindsay, 1997). It is further defined as research that constitutes the art and science of describing a group or culture (Fetterman, 1989). However, the

A Novel Neuro Fuzzy Classification Method For Breast Cancer Detection

2499 words - 10 pages System (NFS) that exploits these two techniques. It combines the human alike logical reasoning of fuzzy based systems with the learning and connectedness structure of ANNs by means of the fuzzy set theory based approaches. In our work, we proposed a novel Neuro-fuzzy based classification method for detection of breast cancer. We applied our method to three benchmark data sets from the UCI machine learning repository for analysis and diagnosis of

A Novel Path Selection Method For Small Delay Defects Test

746 words - 3 pages Aggressive technology scaling has resulted in increasing process variations and statistical diversity in manufacturing. Process variations result in varying in path lengths, and thus a possibly different set of critical paths for different process corners, necessitating consideration of process variation in delay test methods. Also, process variation adds some of near-critical paths to the critical/longest paths set [4]. Therefore, to maintain

Fracking: A Controversial Method For Extracting Natural Gas

2481 words - 10 pages natural gas industry. The Marcellus shale is a financial spring for the natural gas industry but in the beginning there was a rather large problem…no one knew how to harvest the vast stores of natural gas trapped within the Marcellus shale. And if the natural gas could not be harvested, what use was it to the natural gas industry? Originally, the method for retrieving natural gas involved boring vertical wells down into the rock and releasing the
76 Filmes HERÓIS | Querlenker Satz Audi A4 B5 A6 C5 Vw Passat 3B 3Bg + Kombi 14-Tlg | IMDb: 5 HD Pocketman and Cargoboy