Interpolation of Single Beam Echo Sounder Data for 3D Bathymetric Model
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2019, Vol 10, Issue 10
Abstract
Transmitting sound waves into water, and measuring time interval between emission and return of a pulse, single beam echo sounder determines the depth of the sea. To obtain a bathymetric model representing sea-floor continuously, interpolation is necessary to process irregular spaced measured points resulting from echo sounder acquisition and calculate the depths in unsampled areas. Several interpolation methods are available in literature and the choice of the most suitable of them cannot be made a priori, but requires to be evaluated each time. This paper aims to compare different interpolation methods to process single beam echo sounder data of the Gulf of Pozzuoli (Italy) for 3D model achievement. The experiments are carried out in GIS (Geographic Information System) environment (Software: ArcGIS 10.3 and its extension Geostatistical Analyst by ESRI). The choice of the most accurate digital depth model is made using automatic cross validation. Radial basis function and kriging prove to be the best interpolation methods for the considered dataset.
Authors and Affiliations
Claudio Parente, Andrea Vallario
A Generic Adaptive Multi-Gene-Set Genetic Algorithm (AMGA)
Genetic algorithms have been used extensively in solving complex solution-space search problems. However, certain problems can include multiple sub-problems in which multiple searches through distinct solution-spaces are...
Detection of Malware and Malicious Executables Using E-Birch Algorithm
Malware detection is one of the challenges to the modern computing world. Web mining is the subset of data mining used to provide solutions for complex problems. Web intelligence is the new hope for the field of computer...
The cybercrime process : an overview of scientific challenges and methods
The aim of this article is to describe the cybercrime process and to identify all issues that appear at the different steps, between the detection of incident to the final report that must be exploitable for a judge. It...
Image and AES Inspired Hex Symbols Steganography (IAIS) for Anti-Forensic Artifacts
Technology (including mobiles and computers) has become a basic, indispensable need in our daily life. With an initial purpose of achieving basic functions such as communication, technology has evolved into a virtual gat...
Analysis of an Automatic Accessibility Evaluator to Validate a Virtual and Authenticated Environment
This article’s objective is to analyze an automatic validation software compatible with the guidelines of Web Content Accessibility Guidelines (WCAG) 2.0 in an authenticated environment. To the evaluation it was utilized...