共查询到20条相似文献,搜索用时 109 毫秒
1.
针对目前船舶水位识别精度低、检测场景迁移性差等问题,提出一种基于加权有向图的高精度、鲁棒性好的船舶水尺重建和水位识别方法.首先通过目标检测和图像分割算法识别船体上的水尺字符和水位线;然后根据船舶水尺的结构特点将识别出来的水尺字符构建加权有向图,通过寻找加权有向图中的最长路径完成船舶的水尺重建;最后根据重建水尺和水位线的位置关系识别船舶的水位高度.在黄骅港实地采集的视频数据上进行实验的结果表明,所提方法可以较好地修正前期基于水尺字符检测网络带来的字符误检问题,大大减少因船舶图像背景复杂产生的不利影响,在10 mm的误差范围内,水位识别准确率可达91.3%,显著优于业内主流方法. 相似文献
2.
3.
4.
融合特征和先验知识的车牌字符图像检测算法 总被引:1,自引:0,他引:1
提出一种融合车牌字符切割后的二值字符图像的结构特征及对应的彩色小字符图像的颜色信息对车牌分割后的小字符图像进行真伪字符图像区分,以此达到检测字符图像目的的算法。为满足实时车牌对时间响应的要求,对车牌字符切割得到的灰度图像作快速二值化,在二值化的图像上提取结构信息,结合车牌字符分布的特点去除了大部分非颜色车牌的伪字符图像。对于难以从结构上进行字符检测的颜色车牌伪字符图像,在结构特征分析的基础上再次通过从彩色图像提取的颜色信息进行相似性分析,排除伪字符图像。对候选字符图像融合大间隔这个先验知识得到输出的字符图像。实验结果表明算法有良好的字符检测效果,可以用于实时车牌识别系统中作为字符切割后期处理一部分。 相似文献
5.
哈萨克斯拉夫图像文本经过行切分和列切分后,存在水平方向接触和垂直方向重叠的粘连字符。为提高字符识别率,依据字符连通域的最小外接矩形切分开垂直方向重叠的粘连字符图像块;利用判决条件:字符宽度概率密度分布图、字符图像块垂直投影的波峰数目和字符图像块垂直投影波峰的对称性,分离初始粘连字符图像块中正确的单个字符图像块和实际接触的粘连字符图像块;在允许的字符宽度范围内,寻找粘连字符图像垂直投影图的极小值点,以切分实际接触的粘连字符。实验结果表明,该方法泛化能力较好且识别率有明显提高。 相似文献
6.
脑部CT图像拥有良好的纹理特性且图像间纹理角点的位置近似相同。基于此原因,文中提出基于K最近邻纹理角点(KAP)有向图模型的医学图像分类算法。首先提出面向纹理的角点提取方法;然后针对提取的角点,结合医学图像的固有特点,提出KAP有向图模型用于描述医学图像;最后基于KAP有向图模型提出医学图像分类算法。实验表明,文中算法在时间复杂度和准确度方面都取得较好结果。 相似文献
7.
8.
9.
为充分挖掘图像数据信息,提出了一种有向图模型检索方法,结合距离测度初次检索和有向图距离二次检索提高图像检索性能。首先,采用传统的纹理、边缘和颜色特征以及特征之间的欧氏距离测度来进行初次检索,得到一个查询排序列表;在此基础上,结合距离测度与余弦测度设计图像之间的相关测度,在不同的相关测度阈值下构建图像数据集的有向图模型集合;最后,计算有向图距离,据此进行二次检索,降低误检现象。在COREL和ImageCLEF两个数据集上的图像检索实验结果表明,该方法的平均精确度和平均召回率指标高。 相似文献
10.
11.
《Computers & Mathematics with Applications》2007,53(8):1206-1213
In this paper we consider the total domination number and the total bondage number for digraphs. The total bondage number, defined as the minimum number of edges whose removal enlarges the total domination number, measures to some extent the robustness of a network where a minimum total dominating set is required. We determine the total domination number and total bondage number of the extended de Burijn digraph and the extended Kautz digraph, proposed by Shibata and Gonda in 1995, which generalize the classical de Bruijn digraph and the Kautz digraph. 相似文献
12.
在关联规则数据挖掘领域中,Apriori算法是这个方面的经典算法,但它仍存在许多弊端,为此在Apriori算法的基础上提出了一种基于有向图链式存储的改进算法,此算法根据数据结构中有向图链式存储的结构,将所有事务全部存入链表,无需多次扫描数据库,只在事务链表中完成候选集和频繁集的寻找工作.此方法能够迅速得到候选集的支持度... 相似文献
13.
14.
We study spanning diverging forests of a digraph and related matrices. It is shown that the normalized matrix of out forests of a digraph coincides with the transition matrix in a specific observation model for Markov chains related to the digraph. Expression are given for the Moore–Penrose generalized inverse and the group inverse of the Kirchhoff matrix. These expressions involve the matrix of maximum out forest of the digraph. Every matrix of out forests with a fixed number of arcs and the normalized matrix of out forests are represented as polynomials of the Kirchhoff matrix; with the help of these identities new proofs are given for the matrix-forest theorem and some other statements. A connection is specified between the forest dimension of a digraph and the degree of an annihilating polynomial for the Kirchhoff matrix. Some accessibility measures for digraph vertices are considered. These are based on the enumeration of spanning forests. 相似文献
15.
The bondage number of a digraph D is the minimum number of arcs whose removal results in a new digraph with larger domination number. In this paper, we determine the bondage number in complete t-partite digraph . 相似文献
16.
《Computers & Mathematics with Applications》2006,51(6-7):1137-1147
In this paper, we consider the bondage number b(G) for a digraph G, which is defined as the minimum number of edges whose removal results in a new digraph with larger domination number. This parameter measures to some extent the robustness of an interconnection network with respect to link failures. By constructing a family of minimum dominating sets, we compute the bondage numbers of the extended de Bruijn digraph and the extended Kautz digraph. As special cases, we obtain for the de Bruijn digraph B(d, n) and the Kautz digraph K(d, n) that b(B(d, n)) = d if n is odd and d ⩽ b(B(d, n)) < 2d if n is even, and b(K(d, n)) = d + 1. 相似文献
17.
Deke Guo Guiming Zhu Hai Jin Panlong Yang Yingwen Chen Xianqing Yi Junxian Liu 《Information Processing Letters》2012,112(5):205-211
Möbius cube and deBruijn digraph have been proved to be two of the most popular interconnection architectures, due to their desirable properties. Some of the attractive properties of one, however, are not found in the other. The Möbius–deBruijn architecture, proposed in this paper, is the product of Möbius cube and deBruijn digraph, which is a combination of the two architectures. It employs the Möbius cube as a unit cluster and connects many such clusters by means of given number of parallel deBruijn digraphs. Consequently, the Möbius–deBruijn provides some of the desirable properties of both the architectures, such as the flexibility in terms of embedding of parallel algorithms, the high level of fault-tolerant, and the efficient inter-cluster communication. The proposed architecture also possesses the logarithmic diameter, the optimal connectivity, and the simple routing mechanism amenable to network faults. The methodology to construct the Möbius–deBruijn can apply to the product of deBruijn digraph and other hypercube-like networks, and also applies to the product of Kautz digraph and hypercube-like networks. 相似文献
18.
Toru Araki 《Information Processing Letters》2007,104(3):86-90
In a digraph G, a vertex u is said to dominate itself and vertices v such that (u,v) is an arc of G. For a positive integer k, a k-tuple dominating set D of a digraph is a subset of vertices such that every vertex is dominated by at least k vertices in D. The k-tuple domination number of a given digraph is the minimum cardinality of a k-tuple dominating set of the digraph. In this letter, we give the exact values of the k-tuple domination number of de Bruijn and Kautz digraphs. 相似文献
19.
A. T. Berztiss 《Acta Informatica》1980,13(4):325-346
Summary K-trees are tree representations of digraphs, and depth-first K-trees are Tarjan's depth-first search trees made explicit. Algorithms are given for the construction of depth-first K-trees. The depth-first K-trees are then used as a basis for nonrecursive algorithms for the following: topological ordering of an acyclic digraph, critical path analysis of a scheduling network, determination of longest paths from a single source in an acyclic digraph, and determination of strong components of a digraph. The time complexity of each algorithm is O(m), where m is the number of arcs in the digraph. Storage structures for K-trees are defined, and the updating of a scheduling network is discussed.The research reported here has been supported in part by the National Science Foundation under grants MCS 73-03371 A01 and MCS 77-01462 相似文献
20.
采用PCA学习子空间方法来进行灰度图象上字符的识别,不仅克服了传统的基于二值化字符特征提取和识别所带来的主要困难,还尽量多地保存了字符特征,该算法在PCA子空间的基础上,通过反馈监督学习的方法使子空间作旋转调整,从而获得了更好的分类效果,特别当字符类别数不是很大时,子空间的训练时间也将在可接受的范围之内,应用效果也表明,采用PCAA学习子空间算法对车牌汉字这一有限汉字集进行识别,取得了较好的效果,实用价值较高。 相似文献