A Localised Cloud Masking Method For Malaysia

2883 words - 12 pages

Abstract - Two methods of cloud masking tuned to Malaysian conditions have been developed, based on spectral analysis and Principal Components Analysis (PCA) of MODIS data. In the spectral approach, thresholds were applied to four reflective bands (1, 2, 3, and 4), three thermal bands (29, 31 and 32), the band 2/band_1 ratio, and the difference between band 29 and 31 in order to detect cloud. The PCA test applied a threshold to the first principal component derived from the seven quantities used for spectral analysis. Cloud detections were compared with the standard MODIS cloud mask, and their accuracy was assessed using reference images and geographical information on the study area.

Keywords: Cloud masking, spectral analysis, Principal Components Analysis , reflectance, brightness temperature


Typically, 50% of the Earth’s surface is covered by cloud at any time, where cloud is defined as a visible mass of condensed water droplets or ice crystals suspended in the atmosphere above the Earth's surface. In remote sensing, clouds are generally characterized by higher reflectance and lower temperature than the background. Thick opaque cloud blocks almost all information from the surface or near surface, while thin cloud has some physical characteristics similar to other atmospheric constituents. Misinterpretation of cloud may result in inaccuracy of various remote sensing applications, ranging from land cover classification to retrieval of atmospheric constituents (e.g. in air pollution studies).

Several cloud detection and masking studies have been reported in the literature. However, most of these algorithms were designed for the global scale (Rossow & Gardner 1993; Ackerman et al 2002), and little effort has been devoted to optimising regional methods. Some regional cloud masking algorithms have been designed for high, low and mid latitude regions, and these customised cloud masking algorithms tend to work best for these regions (Saunders 1986; Logar et al 1998). Little serious effort has been applied to the equatorial regions, especially South-east Asia (Franca & Cracknell 1995; Bendix et al 2004). This study considers this issue for the particular case of Malaysia. It uses MODIS Terra data to examine the spectral behaviour of cloud, identify effective MODIS bands for cloud detection and determine suitable cloud detection and masking methods in this region.


This study is based on the MOD021KM product from MODIS Terra. A major advantage of MODIS is its wide range of spectral bands, with 36 spectral bands covering the visible, near infrared and thermal infrared wavelengths. In addition, MODIS, with its swath width of 2330 km, is capable of recording every point on the Earth at least once every two days and has an equatorial crossing time of 10:30 a.m. local time. Thus it can cover the whole study area (Peninsular Malaysia) in a single day pass with a high frequency of revisit....

Find Another Essay On A Localised Cloud Masking Method for Malaysia


1847 words - 7 pages are becoming increasingly larger, thus locating and capturing teachers’ skills is very difficult because of the complexity of navigation in these websites. In this paper we propose TKVM a method for knowledge cartography in the domain of e-learning. In particular we use these school and universities websites to identify and then cartography teachers’ skills and knowledge. Our solution is to help users by providing automatically generated

Critically examine the use of social survey as a research method for sociologists.

1272 words - 5 pages distinguished three main types of surveys. These are factual surveys, attitude survey and explanatory survey. Willmott and Young used structural interviews, which is a form of questionnaire, in their survey of family life in London in 1970.The BCS is a social survey used as a research method for sociologists. It is very useful as it covers a range of crimes with a large sample size. The BCS is a household survey which asks if anyone in their household had

Most Viable Method of Biometric Security for a Large Multinational Firm

1912 words - 8 pages Security is one of the most important aspects of everyday life. Knowing that one is safe makes life more comfortable, for example ‘Home Is Where Our Hearts Are’ research published on “The Bolton News” (2009) found out that 37% of the UK citizens planned to move out from locality due to crime. All in all it is essential to feel safe not only about one’s life but also to have a safe business and secure work place. Security can be greatly enhanced

Cloud Computing Strategies in Improving Education

1081 words - 4 pages college or university by the systematic network that have been developed through the variety combination of software needed spread by the cloud for each department or faculty in institution. Thus, when all variety software have been combine to a cloud, it become more systematic to manage the system without no need to upgrade variety software of each PC in each department that indirectly increase cost. It show, how the cloud computing establish the

Cloud Computing Security

1573 words - 6 pages perform various calculations on it. Google uses data encryption as a method of ensuring that data stored in its cloud is secured and confidential (Bradley, 2010). GovCloud is a special cloud established by Google for storing government related information and data (Bradley, 2010). Due to the sensitivity of the information stored in GovCloud, Google encrypts the data in such a way that the data is not available to unintended persons. All data

Cloud computing software

2192 words - 9 pages practical reason for this lack of knowledge. The public cloud is made available to the public and through smart phones and this enables easy access to the web and can easily pass for the most used cloud deployment method. On the other hand a rising firm might opt for a private cloud to keep their information confidential and hidden from competitors while large multinational organization might adopt a hybrid cloud. This essay discussed the

Security: Cloud Computing

1554 words - 6 pages aims to encourage the use of multi-clouds due to its ability to reduce security risks that affect the cloud computing user. Our proposed model provides a better security for customer’s data according to their available budgets from that they can choose cloud service provider. Keywords: Cloud Networks , Service provider ,Multi- Cloud Storage ,Security, Cloud Services, Cloud Computing. 1. INTRODUCTION Cloud computing is nothing but rate server and

Cloud Computing Defined

2241 words - 9 pages , who was responsible for enabling the development of ARPANET (Advanced Research Projects Agency Network) in 1969. His dream was that every person in the world could be linked and could have access to their programs and data at any site, anywhere. Other experts accredit the cloud idea to computer scientist, John McCarthy, who first proposed the notion of computation being conveyed as a public utility, similar to the service bureaus which date back

Deforestation Rate in Southeast Asia

1544 words - 6 pages personnel The presence-absence method used in this study is one of the approach developed for estimating occupancy of single species within single season(MacKenzie, Nichols, Gideon, Droege, Royle and Langtimm, 2002). Occupancy is the proportion of a randomly selected sampling unit in an area under study is occupied with interested species. Occupancy modeling allows us to estimate the probability that a sampling unit is occupied, given that species

Reconstruction of Image with Hebcot Compression Technique

2420 words - 10 pages with a rich set of features, including resolution and SNR scalability together with a “random access” property. The algorithm has modest complexity and is suitable for applications involving remote browsing of large compressed images using prefix code method. The algorithm lends itself to explicit optimization with respect to MSE as well as more realistic psycho visual metrics, capable of modeling the spatially varying visual masking phenomenon

Introduction to The World of Biotechnology

1366 words - 5 pages ). This method can avoid the restrictions of recombinant protein expression in living cells which are protein degradation and aggregation. Malaysia is currently doing research in metagenomics for new enzyme discovery. Healthcare biotechnology refers to a medicinal or diagnostic product or a vaccine that consists of, or has been produced in, living organisms and may be manufactured via recombinant technology. Malaysian healthcare biotechnology

Similar Essays

Is Ethnography A Suitable Method For Research

2303 words - 9 pages Is Ethnography a Suitable method for Research on Residential Satisfaction and Community Participation. Ethnography within its wider field of research is described as the study of people’s behaviour in terms of social contexts, with emphasis on interaction in everyday situations (Lindsay, 1997). It is further defined as research that constitutes the art and science of describing a group or culture (Fetterman, 1989). However, the

A Novel Path Selection Method For Small Delay Defects Test

746 words - 3 pages Aggressive technology scaling has resulted in increasing process variations and statistical diversity in manufacturing. Process variations result in varying in path lengths, and thus a possibly different set of critical paths for different process corners, necessitating consideration of process variation in delay test methods. Also, process variation adds some of near-critical paths to the critical/longest paths set [4]. Therefore, to maintain

Fracking: A Controversial Method For Extracting Natural Gas

2481 words - 10 pages natural gas industry. The Marcellus shale is a financial spring for the natural gas industry but in the beginning there was a rather large problem…no one knew how to harvest the vast stores of natural gas trapped within the Marcellus shale. And if the natural gas could not be harvested, what use was it to the natural gas industry? Originally, the method for retrieving natural gas involved boring vertical wells down into the rock and releasing the

Religion As A Method Of Improvement For Gender Equality

1950 words - 8 pages Religion as a Method of Improvement for Gender Equality Although women were still viewed and treated as second-class citizens, the status of women seemed improve under Christianity, especially in regard to social interaction and Islam, especially in regard to legal rights such as inheritance laws. The improvement of women’s situation was particularly pronounced when compared to the even lesser status of women during the Greek and Roman periods