A Machine Learning-based Cloud Detection Algorithm for the Himawari-8 Spectral Image

Author(s):  
Chao Liu ◽  
Shu Yang ◽  
Di Di ◽  
Yuanjian Yang ◽  
Chen Zhou ◽  
...  
Author(s):  
Seungjun Ryu ◽  
Seunghyeok Back ◽  
Seongju Lee ◽  
Hyeon Seo ◽  
Chanki Park ◽  
...  

Author(s):  
Pooja Nagpal ◽  
Shalini Bhaskar Bajaj ◽  
Aman Jatain ◽  
Sarika Chaudhary

It is the capability of humans and as well as vehicles to automatically detect object level motion that results into collision less navigation and also provides sense of situation. This paper presents a technique for secure object level motion detection which yields more accurate results. To achieve this, python code has been used along with various machine learning libraries. The detection algorithm uses the advantage of background subtraction and fed in data to detect even the slightest movement this system makes use of a webcam to scan a premise and detect movement of any sort; on the recognition of any activity it immediately sends an alert message to the owner of the system via mail. Any person requiring a surveillance system can use it.


2021 ◽  
Author(s):  
ADRIANA W. (AGNES) BLOM-SCHIEBER ◽  
WEI GUO ◽  
EKTA SAMANI ◽  
ASHIS BANERJEE

A machine learning approach to improve the detection of tow ends for automated inspection of fiber-placed composites is presented. Automated inspection systems for automated fiber placement processes have been introduced to reduce the time it takes to inspect plies after they are laid down. The existing system uses image data from ply boundaries and a contrast-based algorithm to locate the tow ends in these images. This system fails to recognize approximately 10% of the tow ends, which are then presented to the operator for manual review, taking up precious time in the production process. An improved tow end detection algorithm based on machine learning is developed through a research project with the Boeing Advanced Research Center (BARC) at the University of Washington. This presentation shows the preprocessing, neural network and post‐processing steps implemented in the algorithm, and the results achieved with the machine learning algorithm. The machine learning algorithm resulted in a 90% reduction in the number of undetected tows compared to the existing system.


2015 ◽  
Vol 8 (11) ◽  
pp. 4671-4679 ◽  
Author(s):  
J. Yang ◽  
Q. Min ◽  
W. Lu ◽  
W. Yao ◽  
Y. Ma ◽  
...  

Abstract. Obtaining an accurate cloud-cover state is a challenging task. In the past, traditional two-dimensional red-to-blue band methods have been widely used for cloud detection in total-sky images. By analyzing the imaging principle of cameras, the green channel has been selected to replace the 2-D red-to-blue band for detecting cloud pixels from partly cloudy total-sky images in this study. The brightness distribution in a total-sky image is usually nonuniform, because of forward scattering and Mie scattering of aerosols, which results in increased detection errors in the circumsolar and near-horizon regions. This paper proposes an automatic cloud detection algorithm, "green channel background subtraction adaptive threshold" (GBSAT), which incorporates channel selection, background simulation, computation of solar mask and cloud mask, subtraction, an adaptive threshold, and binarization. Five experimental cases show that the GBSAT algorithm produces more accurate retrieval results for all these test total-sky images.


Author(s):  
Manjunath K. E. ◽  
Yogeen S. Honnavar ◽  
Rakesh Pritmani ◽  
Sethuraman K.

The objective of this work is to develop methodologies to detect, and report the noncompliant images with respect to indian space research organisation (ISRO) recruitment requirements. The recruitment software hosted at U. R. rao satellite centre (URSC) is responsible for handling recruitment activities of ISRO. Large number of online applications are received for each post advertised. In many cases, it is observed that the candidates are uploading either wrong or non-compliant images of the required documents. By non-compliant images, we mean images which do not have faces or there is not enough clarity in the faces present in the images uploaded. In this work, we attempt to address two specific problems namely: 1) To recognise image uploaded to recruitment portal contains a human face or not. This is addressed using a face detection algorithm. 2) To check whether images uploaded by two or more applications are same or not. This is achieved by using machine learning (ML) algorithms to generate similarity score between two images, and then identify the duplicate images. Screening of valid applications becomes very challenging as the verification of such images using a manual process is very time consuming and requires large human efforts. Hence, we propose novel ML techniques to determine duplicate and non-face images in the applications received by the recruitment portal.


2022 ◽  
Vol 2 (14) ◽  
pp. 26-34
Author(s):  
Nguyen Manh Thang ◽  
Tran Thi Luong

Abstract—Almost developed applications tend to become as accessible as possible to the user on the Internet. Different applications often store their data in cyberspace for more effective work and entertainment, such as Google Docs, emails, cloud storage, maps, weather, news,... Attacks on Web resources most often occur at the application level, in the form of HTTP/HTTPS-requests to the site, where traditional firewalls have limited capabilities for analysis and detection attacks. To protect Web resources from attacks at the application level, there are special tools - Web Application Firewall (WAF). This article presents an anomaly detection algorithm, and how it works in the open-source web application firewall ModSecurity, which uses machine learning methods with 8 suggested features to detect attacks on web applications. Tóm tắt—Hầu hết các ứng dụng được phát triển có xu hướng trở nên dễ tiếp cận nhất có thể đối với người dùng qua Internet. Các ứng dụng khác nhau thường lưu trữ dữ liệu trên không gian mạng để làm việc và giải trí hiệu quả hơn, chẳng hạn như Google Docs, email, lưu trữ đám mây, bản đồ, thời tiết, tin tức,... Các cuộc tấn công vào tài nguyên Web thường xảy ra nhất ở tầng ứng dụng, dưới dạng các yêu cầu HTTP/HTTPS đến trang web, nơi tường lửa truyền thống có khả năng hạn chế trong việc phân tích và phát hiện các cuộc tấn công. Để bảo vệ tài nguyên Web khỏi các cuộc tấn công ở tầng ứng dụng, xuất hiện các công cụ đặc biệt - Tường lửa Ứng dụng Web (WAF). Bài viết này trình bày thuật toán phát hiện bất thường và cách thức hoạt động của tường lửa ứng dụng web mã nguồn mở ModSecurity khi sử dụng phương pháp học máy với 8 đặc trưng được đề xuất để phát hiện các cuộc tấn công vào các ứng dụng web.


Author(s):  
Guoqing Zhou ◽  
Xiang Zhou ◽  
Tao Yue ◽  
Yilong Liu

This paper presents a method which combines the traditional threshold method and SVM method, to detect the cloud of Landsat-8 images. The proposed method is implemented using DSP for real-time cloud detection. The DSP platform connects with emulator and personal computer. The threshold method is firstly utilized to obtain a coarse cloud detection result, and then the SVM classifier is used to obtain high accuracy of cloud detection. More than 200 cloudy images from Lansat-8 were experimented to test the proposed method. Comparing the proposed method with SVM method, it is demonstrated that the cloud detection accuracy of each image using the proposed algorithm is higher than those of SVM algorithm. The results of the experiment demonstrate that the implementation of the proposed method on DSP can effectively realize the real-time cloud detection accurately.


2018 ◽  
Vol 38 (10) ◽  
pp. 1028002 ◽  
Author(s):  
王权 Wang Quan ◽  
孙林 Sun Lin ◽  
韦晶 Wei Jing ◽  
周雪莹 Zhou Xueying ◽  
陈婷婷 Chen Tingting ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document