首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
SUSAN算子是一种基于图像局部灰度特征的算法,利用一个圆形的模板对图像进行扫描,比较模板内部的点与模板中心点的灰度值,如果灰度差值小于一定的阈值,就认为该点与中心点的灰度相同。统计模板内部与中心点灰度相同的点的个数,与一个阈值进行比较,判断该点是否属于某个区域的边缘点,从而实现对红外目标的检测。与传统的全局阈值相比,该算法抗干扰能力较强,实时性较好,能够快速、可靠地检测出红外目标。  相似文献   

2.
基于粒子滤波的目标图像多特征融合跟踪方法   总被引:1,自引:0,他引:1  
研究了序列图像中红外弱小目标的检测跟踪问题.基于多特征融合的小目标检测算法具有较好的检测性能和适应性,而粒子滤波则是一种处理非线性和非高斯动态系统状态估计的有效方法.结合两种算法的优点,提出了一种基于粒子滤波的目标图像多特征融合跟踪方法.从红外序列图像中提取了局部灰度均值对比度、局部梯度均值对比度、局部熵和灰度分布四个典型特征,根据各个特征对弱小目标检测的贡献,自适应地进行特征融合.在粒子滤波的框架下,将融合后的特征信息转化为粒子的权值,对红外弱小目标进行跟踪.仿真试验表明,该算法有着良好的检测与跟踪性能.  相似文献   

3.
针对单帧图像红外小目标检测算法在低空复杂背景下虚警率高的问题,提出一种基于高斯-拉普拉斯(LOG)滤波的增强局部对比度算法来检测低空复杂背景下的红外小目标。通过LOG滤波运算快速提取候选目标像素,同时通过像素灰度指数运算增强目标。根据局部区域目标与背景的灰度特征计算目标显著图,通过自适应阈值分割提取目标。针对不同的低空复杂场景,构建了测试数据集,从信噪比增益、背景抑制因子、检测率、虚警率及算法计算效率方面将所提算法与Top-Hat算法、Max-median算法、RLCM算法、IPI算法及MPCM算法进行对比分析。实验结果表明,在不同场景中,所提算法相较于对比算法不仅具有较高的信噪比增益和背景抑制因子,而且具有较高的检测率、较低的虚警率和较高计算效率,验证了该算法的有效性和鲁棒性。  相似文献   

4.
针对传统背景抑制方法虚警率高、检测率低的问题,提出一种基于改进滤波器和图像加权局部熵的红外 小目标图像处理方法。通过改进中值滤波对原始红外图像进行预处理,分别构建多尺度灰度差异算子、局部图像熵 算子,并将二者进行点积运算得到加权局部熵,从而能够有效地抑制背景并消除噪声。实验结果表明:该方法适应 性较好,运算效率相对传统中值滤波算法提升了20.6%,有一定的理论与工程应用价值。  相似文献   

5.
单帧红外小目标检测算法研究   总被引:3,自引:0,他引:3  
研究了单帧红外图像运动小目标的检测问题。首先利用数学形态学Tophar滤波对图像进行背景抑制,然后对图像进行对比度增强,针对对比度增强的同时会造成一些噪声的灰度值也得到增加的问题,采用改进的遗传算法对对比度增强之后的图像进行分割,提高目标分割精度的同时也提高了分割的速度。仿真实验结果表明了算法是有效的。  相似文献   

6.
蔡君  张尚悦  李伟 《兵工自动化》2013,32(10):62-65
针对红外弱小目标难以检测的问题,提出一种基于偏斜度的局部熵算法的新方法。通过对原始图像进行分块处理,利用局部熵值判断图像块找出感兴趣区域,再利用偏斜度进行判断,通过自适应阈值分割方法对弱小目标进行检测。经过实验证明:该方法能够有效地检测出弱小目标,具有算法简单,运算量小,便于硬件实现等特点。  相似文献   

7.
陈方涵  张肃  王文生 《兵工学报》2012,33(6):688-694
低对比度目标因其灰度对比度低、边缘模糊等缺点,使得联合变换相关器无法将其从混杂的背景图像中辨别出来,达到成功识别的目的。针对这一问题,采用了基于Curvelet变换的图像增强算法对目标联合图像进行处理。作为超小波分析范畴的Curvelet变换,因具有极强的方向性,成为比小波变换更适合分析和理解图像特征的多分辨率分析工具。文中采用不同的方法分别调整了Curvelet变换后的高、低频系数,增强了目标的灰度对比度和边缘信息。以低对比度坦克图像为例,增强后的目标对比度由原来的4.16%提高至29.37%. 计算机模拟和光学相关实验结果均表明,增强后的联合图像获得了明亮的相关点对,成功实现了低对比度坦克的自动识别。  相似文献   

8.
针对灰度图像对比度较低而难以识别目标区域的问题,对形态学中传统的高帽变换算子和toggle算子进行组合,提出了基于高帽变换和toggle算子组合的图像增强优化算法.该算法利用高帽变换算子增大原始图像灰度值的动态范围,同时利用toggle算子锐化图像,使图像清晰.实验结果表明,该组合算子相对单个算子来说,对灰度图像的对比度增强效果更好,目标识别效果更佳.  相似文献   

9.
为了有效地提高裂纹识别精准度和改进裂纹表征方法,针对奥克托今(HMX)基高聚物黏结炸药(PBX)CT检测图像存在的暗视野、低对比度、高噪声等问题开展研究。利用裂纹的稀密性和局部方向性,结合非局部均值、拉普拉斯锐化和Gamma校正等方法对CT图像进行预处理,然后运用统计学方法直接提取裂纹特征点集,借助马氏距离对裂纹特征点的局部方向性和裂纹位置、走向及粗细进行判定并推演裂纹的扩展方向,最终通过像素灰度值拷贝实现HMX基PBX的CT图像中完整裂纹的精细识别。在三种PBX热力耦合加载损伤的CT图像上对文中提出的MDCE算法(Mahalanobis distance based crack extraction algorithm)与Canny算法和相位一致性方法开展对比实验研究。结果表明,提出的MDCE算法能清晰准确地提取出多种形态的裂纹,证实了该方法的有效性和高效性,显著提高了裂纹的识别和表征能力。  相似文献   

10.
基于图像视觉信息的目标检测与识别一直是研究的重点和难点,针对复杂坏境的图像呈现出对比度低,强噪声干扰,灰度集中的特点,提出了一种基于小波变换理论和数学形态学的目标图像增强方法;首先对图像进行了小波变换,提取高频分量系数,其次利用阈值算法对图像进行降噪处理,最后对图像进行形态学交替滤波得到增强后的图像;实验表明:该检测算法对提高信噪比,增强目标有很好的效果,适合与目标检测与识别,算法在性能上优于传统的单一算法。  相似文献   

11.
Tetraacetyldibenzylhitane (TADBIW) was subjected to debenzylation by nitrosating with inorganic materials available commercially to synthesize tetraacetyldinitrosohexaazaisowurtzitane (TADNSIW). TADNSIW was purified, and its structure was determined by FTIR, 1H NMR, MS and element analysis. The debenzylation reaction of TADBIW gave quantitative benzaldehyde as a by-product. This indicates that the reaction produces an imine cation as an intermediate. Hexanitrohexaazaisowurtzitane (HNIW) was prepared from unpurified TADNSIW with the yield over 96.0 % and the purity more than 98.0 %. And the mechanism of the reaction from TADNSIW to HNIW is proposed to be oxidation of nitroso and nitration of acetyl on the molecule of TADNSIW, This reaction system involved is simple, and the reaction can complete within a short time and under mild conditions. The product can be easily to separate and the waste disposed readily.  相似文献   

12.
For measuring velocity and impacting position of single fragment of warhead, a non-contact measuring method is proposed, in which a six-light-screen array, a position indicator, a multi-channel chronograph and a computer are used.The principle of measurement is described. The key device of the system is a light screen array sensor which consists of six light screens allocated with certain geometrical parameters. When the fragment flies through the light screen array, the time of passing through each of the screens is recorded by the multi-channel chronograph. According to the time data and the geometrical parameters of the array, the velocity vector and the location of the fragment can be calculated immediately. The presented method can be used to locate the fragment and to measure the real velocity on its flying direction. It can also be used to measure the velocity of a fragment swarm after the system is engineered further.  相似文献   

13.
The technique of watermarking has been introduced into 2D vector maps for many potential applications such as protecting the copyright of important GIS (geographical information system) data and tracing the data source of military maps. In most previous works, although the validity of the map data could be preserved during the embedding procedure, the shape-distortions of the map elements are usually neglected which would tend to degrade the invisibility of the watermarking schemes. A shape-preserving algorithm for watermarking 2D vector maps is presented in this paper. A 1D distance sequence extracted from the original map is adopted as the cover data instead of 2D coordinates. A watermark bit is represented by changing the distributions of the cover data. The embedding procedure induces lower shape-distortions than in former works. Experimental results indicate better invisibility of the proposed scheme, as well as its robustness to certain attacks such as map simplification, interpolation, additive noise and most geometric transforms.  相似文献   

14.
阐述了数码电子雷管中,点火药剂细结晶三硝基间苯二酚铅(LTNR)的制备工艺;从点火药剂的种类、加入黏合剂的质量分数、桥丝直径、点火头的电阻值、防潮漆的蘸涂等方面对点火头性能的影响因素进行了探讨;通过震动试验、并联起爆试验、延期精度检测与考核,试验结果表明:一次性合成的细结晶LTNR是制造数码电子雷管点火头较为理想的点火药剂,按技术要求生产的点火头性能指标能够满足行业标准要求。  相似文献   

15.
The stability under illumination of transmission-mode GaAs photocathode sealed in the third generation intensifier is investigated by use of spectral response testing instruments. The variations of spectral response with the illumination times under weak and intense illumination are compared. The variations of photoemission performance parameters are also characterized. The results show that during initial several weak illuminations photocathode behaves no evident decay and a maximum sensitivity is achieved, while under intense illumination the sensitivity of photocathode begin to decrease largely at the first illumination. The calculated performance parameters show that the variation of surface escape probability with illumination times is a direct cause of instability of photocathode. It is also found that under intense illumination peak wavelength is moved towards short-wave and peak response is decreased, which shows that the ability of long-wave response of photocathode is decreased.  相似文献   

16.
Open rule-setting method advanced in this paper concentrates on providing designers of engines with a convenient way to express their design innovations and develop the expected prototypes in the early CAD stage, and constitute effective models for the following analysis process of CAE and CAPP. The problems arisen in the process of conceptual design with the traditional experience-based development method are analyzed. Based on those analyses, open rule-setting method is presented and some associated technical problems are discussed. The functional framework of open rule-setting system was built as software engineering methods. The speciality of the engine product as a kind of complex product and the requirement of the engine product based on its structural particularity to rule-setting system are considered carefully. A demonstration is supplied to illustrate how the open rule-setting method enhances the efficiency and quality of the engine conceptual design.  相似文献   

17.
The implementation of a missile's visual simulation system is explained that is developed with OpenGL(open graphic library) and the flight path and flight carriage in different stages of the missile are displayed. The establishment problems of the 3D scene are circumstantiated including the construction and redeployment of the model, creation of the virtual scene, setting of the multi-viewports and multi-windows etc. The missile's data driver, system flow, the modules and their mutual relations of the missile visual simulation system are discussed. The missile flight simulation results and effect of the scenes are given.  相似文献   

18.
By analyzing the working principle of Linux network device driver, discussing the Linux network driver structure and its key technologies, the general network driver structure and its design methodologies in Linux system are summarized. Through modifying the network device driver of Linux device driver 3rd version snull, c and improving the COW technology, the Zero-Copy technology in Linux (kernel version 2.6.11 ) is implemented. In the end, the success test tells us that the thorough analysis of network device driver is the foundation of many applications, and it also provides a certain improvement to a lot of real applications, even to military application development.  相似文献   

19.
By analyzing the influencing factors of part quality making of sheet alloy of titanium by vibra cutter, the shape of upper reamer is set as cylinder and wedge-shaped form, and the lower reamer as plain and hemicycle form, and its main structural parameters are defined as well. Then it is validated further that such improved vibra cutter reamer can be used to process curve-edged parts of titanium alloy sheet. The experimental result shows that the titanium alloy sheet parts processed by above equipment have no sharpen angles for convex parts and evident crevasse of concave-edged part. In summary, such improvement can eliminate the free-waved edge and improve the manufacture quality of titanium alloy sheet parts greatly.  相似文献   

20.
A new dynamic encryption application in ad-hoc networks is proposed. The advantages of this method are its being able to use the previous ciphertext as a seed of a new encryption process, rendering the encryption process effective in all communication process by continuous dynamic key generation together with synchronization, and its capability to cut back on system bandages to a greater extent, which is valuable for the ad-hoc circumstance. In addition, the rationality and effectiveness of this novel encryption method have been verified by the test results.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号