Improvised Interpolation of Contour Lines Using Spider Weaving Approach
Journal Title: International Journal on Computer Science and Engineering - Year 2013, Vol 5, Issue 9
Abstract
Geographically contours are virtual lines drawn across the terrain to join points that are at same elevation from certain reference point. Contours are essential morphological features that are used along with the associated elevation as basis for generating Terrain Model or Digital Elevation Model for the area of interest. These lines are represented at different scales depending upon the scale of data representation. The smoothness of the elevation model derived from these contours always depends on the number of contour lines covering the terrain. If there is lesser number of contour lines covering the terrain then the elevation model would rather appear sharp where as on the contrary if the number of line covering the terrain is more than the terrain would rather appear smooth. Further it implies that in order to create a smooth terrain from a set of contours, either contour map with smaller scale should be taken into consideration or efficient interpolation algorithms should be designed. errains for which small scale maps are not available the later proves effective. This research initiative aims at designing an efficient algorithm for determining reduced set of interpolation points for generating intermediate contours based on the concept of angular directional movement acquiring knowledge from weaving approach deployed by Spider.
Authors and Affiliations
Mohan P Pradhan , M K Ghose
SERVICE ORIENTED APPLICATION IN AGENT BASED VIRTUAL KNOWLEDGE COMMUNITY
With the availability of the Internet, virtual communities are proliferating at an unprecedented rate. Indepth understanding of virtual community dynamics can help us to address critical organizational and information sy...
Distributed Architecture for Transactions Synchronization in Distributed Database Systems
Various concurrency control algorithms have been proposed for use in istributed database systems. But, the number of algorithms available for the distributed concurrency control, come into one of three basic classes: lo...
Comparative study of various PKINIT methods used in Advanced Kerberos
Traditional authentication method is password, but it cannot resist dictionary and playback attack. Thus, applications, which send an unencrypted password over the network, are extremely vulnerable. Kerberos can be used...
An Efficient Method for Detection of Copy-Move Forgery Using Discrete Wavelet Transform
Copy-Move forgery is a specific type of image forgery, in which a part of digital image is copied and pasted to another part in the same image. This paper describes blind forensics approach for detecting Copy-Move forger...
Evaluating Qualitative Measures for Effective Website Design
The primary goal of this paper is to investigate and evaluate qualitative measures for improving the website design of various universities in India. The website of each university is scanned using W3C guidelines. The pa...