首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 93 毫秒
1.
王丽辉  袁保宗 《信号处理》2011,27(6):932-938
随着三维点云模型越来越受到人们的关注,如何对数据量大,无序的三维点云模型进行特征点检测也是近几年的研究热点。本文提出了基于曲率和密度的特征点检测算法,为每个数据点定义一个特征参数,这个参数由三部分组成:点到邻居点的平均距离;点的法向与邻居点法向夹角的和;数据点曲率。然后通过八叉树方法计算模型的数据点密度,将这个密度作为阈值,特征参数大于阈值的点就是检测到的特征点。本文计算时,检测模型的特征点只需用到三维点云模型的几何特征,如数据点法向,曲率和邻居点。实例验证本算法可准确地检测出散乱数据点云的特征点。   相似文献   

2.
在摄像机标定过程中,较差的光照条件和镜头畸变会造成棋盘格角点漏检和角点冗余。分析了角点的灰度分布特性,提出一种基于角点灰度分布特征的棋盘格角点检测算法。为确保在较差光照条件和镜头畸变下,棋盘格图像角点不漏检,算法首先利用角点的灰度分布特性提取候选角点;然后通过迭代的方式提高候选角点的精度并再次结合棋盘格角点的灰度分布特性剔除候选角点中非角点处的伪角点,避免棋盘格角点冗余;最后通过角点处的邻近点合并获得最终的棋盘格角点坐标。实验结果证明,在较差的光照条件和镜头畸变条件下,本算法角点无漏检和冗余。将该算法提取的棋盘格角点应用于摄像机标定,结果显示重投影误差的均方差在0.1pixel范围以内,优于其他算法。  相似文献   

3.
在基于局部不变特征的SAR景像匹配制导中,局部不变特征点的匹配实时性具有十分重要的工程意义。提出了一种基于两层策略的特征点匹配方法。首先根据特征点响应的阈值对实时图和参考图分别提取一级特征点和二级特征点,然后依据二级特征点到一级特征点的距离使二级特征点隶属于距离最近的一级特征点,由此达到对二级特征点进行分组的目的。进一步,通过对一级特征点进行方向梯度描述,借助kd-tree最近邻方法(NN)匹配策略实现特征点初步配对,并结合RANSAC算法验证剔除误匹配点。最后,对隶属于提纯后一级特征点的二级特征点进行BRIEF描述,分组对二级特征点进行匹配。仿真实验结果表明,特征点匹配速度大幅提升。  相似文献   

4.
在实际生产应用中经常需要对激光器多次测量所得点云进行点云拼接,为解决激光点云的精确拼接问题,提出了一种基于单位四元数的点云拼接算法,通过计算点云重心点所在曲面的曲率特征点,经过多次迭代寻找最近点,求出点云平移与旋转矩阵的最优解,进而完成点云的自动精确拼接。  相似文献   

5.
牛立尚 《信息技术》2015,(6):112-114
提出一种基于统计分布特征的图像孤立点和边缘点检测的方法。通过定义离群半径,将每个像素点的邻域点进行初步分类,得到疑似孤立点,然后根据每一个点在不同邻域被划分为疑似孤立点的次数,计算该点的孤立置信度。根据孤立点和边缘点具有不同的邻域无关性的特性,从而可以用不同的孤立置信度阈值将两者分别检测出来。实验表明,文中的方法能够有效地检测孤立点和边缘点。  相似文献   

6.
一种改进的SUSAN算法   总被引:1,自引:0,他引:1  
针对SUSAN角点算法在对实际图像进行角点检测时角点数量太多,不利于角点匹配的局限性,提出了角点"好坏"的判别函数,减少了角点数量;并应用自适应非最大假设策略(ANMS),使改进算法检测的角点均匀分布在图像上。实验结果表明,改进的算法能够有效保留"好"的角点,有利于角点的匹配。  相似文献   

7.
李绕波  袁希平  甘淑  毕瑞  胡琳 《激光与红外》2021,51(9):1129-1136
针对采集到的点云数据中含有大量的冗余数据,为后期数据处理及其应用带来诸多不便,而采用现有通用压缩方法压缩后的点云容易造成细节特征丢失问题,为此,本文提出一种基于特征点和SIFT关键点提取的点云数据压缩方法。该方法的核心技术是首先根据查询点与邻域中的点所构成向量的夹角而提取边界点;然后根据点云数据的曲率和法向量夹角提取尖锐点,据此使特征点在点云压缩处理过程中得到绝对被保留;同时在平坦区域提取SIFT关键点,这样能避免在曲率变化缓慢区域所保留的并不是特征点;最后融合特征点和SIFT关键点而实现对点云数据的压缩处理。研究通过设计与现有两种基于曲率压缩方法进行对比实验分析,结果表明本文所提方法既能最大量的去除冗余数据,又能保留点云中大部分特征点,实现了点云数据的高质量压缩。  相似文献   

8.
基于FAST改进的快速角点探测算法   总被引:2,自引:0,他引:2  
提出了一种改进的快速角点探测算法.该算法基于FAST算法,首先对角点进行粗提取,即如果某点为候选角点,那么在该点的某个圆形邻域的圆周上应有足够多的点,这些点的灰度值与该点的灰度值之差的绝对值应大于自适应阈值;然后利用海森矩阵去除不稳定的边缘点;最后计算候选角点周围邻域内像素点的拉普拉斯值,只有取得拉普拉斯极值的候选点才能最终确定为角点,进一步剔除了虚假角点.实验表明:改进后的算法具有运算量小、定位精度高以及抗噪能力强的特点,更能满足实时应用的要求.  相似文献   

9.
点云边界提取是点云三维重建中极其关键的一步, 现有的边界提取算法大多采用一种 判别准则进行边界点提取,导致提取的效率低或者提取效果不理想。针对上述问题,本文提 出一种快速精确的点云边界提取算法,其包括粗提取与精提取两个步骤。粗提取中对任意点 ,利用Kdtree搜索其近邻点,对该点与其近邻点构成的单位法向量进行叠加,依据叠加后 向量的模长与近邻数的比值粗提取出边界点;精提取中对于粗提取出的边界点,搜索其近邻 点并依据近邻点拟合成平面,再将近邻点投影到该平面上,根据判断点的投影点与近邻点的 投影点连线间的最大夹角精确提取出边界点。使用地面与机载两类不同的点云数据验证本算 法,实验结果表明:本算法均可以准确提取出这两种点云的边界点,同时在提取机载点云边 界上效率提高了6.8倍,在地面点云中提高了2倍。本文算法可用于快 速提取边界点,有利用后续点云重建。  相似文献   

10.
近年来,纳米晶体(量子点)以及量子点光纤、量子点光纤放大器成为一个研究热点。介绍了CdSe/ZnS和PbSe量子点的光谱特性以及量子点的吸收-辐射截面,表明量子点具有强的吸收和发射。总结了低浓度和较高浓度CdSe/ZnS量子点掺杂光纤、熔融法及溶胶凝胶法制备PbSe量子点光纤材料的最新研究进展,分析了两种方法制备量子点光纤材料的优缺点,概述了PbSe量子点光纤放大器的研究近况,展望了量子点光纤的应用前景。  相似文献   

11.
Ubiquitous computing applications or widespread robots interactions execute in unforeseen environments and need to adapt to changeful available services, user needs, and variations of the environment. Context-awareness ability addresses such a need, enabling, through adaptation rules, applications to react to the perceived dynamic variations. Responses to adaptation have to be quick enough to maximize the time during which the application is coherent with its environment. Adaptation rules, associating variations of the environment to application reactions, are usually established at design time. However, in unforeseen and partially anticipated environments, we claim that adaptation rules have to be dynamically extensible to match previously unexpected variations. Our approach enables rule composition and ensures a deterministic result. We propose to use parameter adaptation to quickly respond to environmental variations and dynamic compositional adaptation to provide extensibility to the parameter adaptation. To foster even lower response times, we internalize context-awareness processing and decision into the application.  相似文献   

12.
MPLS技术是一项具有多协议支持的技术,它综合利用了网络核心的交换技术和网络边缘的IP路由技术各自的优点,它将标记分配给多协议的数据桢以便在基于我展品信元的网络中传输。它能够提供现有传统IP路由技术所不能支持的要求保障QoS的业务,通过MPLS技术,我们可以提供各种新兴的增值业务,有效的实施流量工程和计费管理措施,扩展和完善更高等级的基础服务。  相似文献   

13.
Two experiments examined the extent to which U.S. viewers' perceptions that Blacks face structural limitations to success, support for the death penalty, and culpability judgments could be influenced by exposure to racialized crime news. Participants were exposed to a majority of Black suspects, a majority of White suspects, unidentified suspects, and noncrime news stories. In addition, participants' prior news viewing was assessed. In Study 1, heavy news viewers exposed to unidentified perpetrators were less likely than heavy news viewers exposed to noncrime stories to perceive that Blacks face structural limitations to success. In addition, heavy news viewers exposed to unidentified perpetrators were more likely than heavy news viewers exposed to noncrime stories to support the death penalty. In Study 2, participants exposed to a majority of Black suspects were more likely than participants exposed to noncrime stories to find a subsequent race-unidentified criminal culpable for his offense. In addition, heavy news viewers were more likely to exhibit the above effect than light news viewers. The methodological and theoretical implications of these findings are discussed in light of chronic activation and the priming paradigm.  相似文献   

14.
Technical communicators need to be prepared for the challenges of international communication. This tutorial focuses on the need for technical communication faculty to prepare students to be skilled intercultural communicators and to play a role on the translation team. The tutorial begins with a discussion of the importance of writing for translation in the international workplace and then presents specific assignments designed to instruct students in intercultural communication and give them experience writing for translation. In addition to introducing students to the cultural issues that impact the creation of documentation for international audiences, these assignments also serve to reinforce core skills recognized as vital to professional success in the field of technical communication. Taken together, these assignments can be used as the basis for a course in international technical communication. An appendix to the tutorial includes numerous resources available to faculty who want either to develop a course in international technical communication or to include some of the assignments in existing technical communication courses.  相似文献   

15.
The provision of efficient public safety services continues to be one of the high priority efforts to improve the quality of life in our nation. These efforts are too often equipment oriented without realizing the system input of providing better services in terms of benefit to the public as opposed to providers of the services. These services are multielement containing many items which can be quantified and qualitative aspects which are difficult to assess. The methodology presented herein is designed to specifically evaluate such multi-element systems in a logical manner. Its use expanded to other than emergency medical service systems will permit weak areas to be identified, develop comparisions and rank system elements as to their individual contributions to "bottom line" results, and to help establish priorities for allocation of funding resources.  相似文献   

16.
In the Paper, we proposed a threshold mult- proxy multi-signature with share verification.In the scheme,a subset of original signers allows a designated group to proxy signers to sign on behalf of the original group, A message m has to be signed of proxy signers who can represent the proxy group. Then, the proxy signature is sent to the verifier group.A subset of verifiers in the verifier group can also represent the group to authenticate the proxy signature.In othe words,some threshold values will be given to indicate the number of persons to represent a group to authorize the signing capability or to sign a messagye or to verify the proxy signature.  相似文献   

17.
Employees in today’s enterprises are requesting their employers to allow them to work in a flexible manner. Work is no longer a place to go to but an activity to be undertaken. With developments in technology, the activity can be undertaken whenever and wherever it is convenient for the employees. Increasing demands by employees to be able to work in this way creates a tension within the enterprise as CIOs and finance officers strive to manage the costs and the infrastructure required to support this way of working. Over time, this situation will change as technology allows users to roam securely and seamlessly between networks accessing the required applications and information from a single suitably enabled device. This will tend to reduce the underlying costs as the best connection can be used. Service management will remain a challenge but become a better understood problem as the ’stove-pipe’ nature of current solutions is removed. For this change to be brought about, some enabling technologies have to be put in place. This paper considers issues surrounding next generation mobile solutions and shows how converged services can be used to deliver the vision of being able to work from any place, at any time. Consideration is given to how roaming from fixed to wireless networks can be achieved by reusing already established authentication principles that are now deployed in wide area wireless networks. In order to do this, open methods of managing user identity need to be devised and implemented and approaches to this are also discussed. The paper concludes with a consideration of some of the research challenges that remain to be solved. HP  相似文献   

18.
颜正恕 《信息技术》2007,31(3):110-114
介绍一种多可重复使用的智能机票的设计方案,利用目前成熟的RFID技术并结合GPS技术,为乘客提供一种在任何国家的机场,在语言不通的情况下,也能通过具有AGPS功能的手持设备读取存储在机票中的RFID芯片的内容,并将内容以二维电子地图的方式显示在设备上,并且利用机场GPS导航服务引导顾客到达他们想去的地方,这样不但可以使航空公司节省成本、提供高质量的机场服务而且可以解决机场分流问题,减少误机事件,提高经济效益。  相似文献   

19.
Mobile ad-hoc networks require nodes to cooperate in the relaying of data from source to destination. However, due to their limited resources, selfish nodes may be unwilling to forward packets, which can deteriorate the multi-hop connectivity. Different reputation-based protocols have been proposed to cope with selfishness in mobile ad-hoc networks. These protocols utilize the watchdog detection mechanism to observe the correct relaying of packets, and to compile information about potential selfish nodes. This information is used to prevent the participation of selfish nodes in the establishment of multi-hop routes. Despite its wide use, watchdog tends to overestimate the selfish behavior of nodes due to the effects of radio transmission errors or packet collisions that can be mistaken for intentional packet drops. As a result, the availability of valid multi-hop routes is reduced, and the overall performance deteriorates. This paper proposes and evaluates three detection techniques that improve the ability of selfishness prevention protocols to detect selfish nodes and to increase the number of valid routes.  相似文献   

20.
The fabrication and performance of an InGaN light-emitting diode (LED) array based on a microring device geometry is reported. This design has been adopted in order to increase the surface area for light extraction and to minimize losses due to internal reflections and reabsorption. Electrical characteristics of these devices are similar to those of a conventional large-area LED, while the directed light extraction proves to be superior. In fact, these devices are found to be more efficient when operated at higher currents. This may be attributed to improved heat sinking due to the large surface area to volume ratio. The potential applications of these devices are also discussed.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号