首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 140 毫秒
1.
作为红外自寻的制导、搜索跟踪和预警等领域的一项关键技术,红外弱小目标检测与跟踪成了红外图像处理领域中的一项重要研究课题。本文采用了"先检测后跟踪(DBT)"的思想对红外小目标进行检测与跟踪,首先采用基于各向异性偏微分方程的背景抑制技术对单帧图像进行抑制,再用最大绝对对比度阈值对红外图像进行分割,最后采用形心跟踪法对小目标点坐标定位。试验证明本文算法应用于目标检测的可行性和有效性。  相似文献   

2.
针对多传感器多目标检测跟踪问题,提出了一种多传感器多目标双层粒子滤波检测前跟踪算法。算法采用双层粒子滤波结构,在目标检测层中采用量测消除法对多目标逐一检测,形成目标跟踪子粒子群,在目标跟踪层中采用二次重采样的方法对粒子群中粒子分布进行修正,在跟踪过程及时发现并剔除虚假目标。仿真结果表明算法的有效性。  相似文献   

3.
首先,在分析低慢小目标特性的基础上总结了低分辨预警雷达探测此类目标的技术难点。然后,分类总结介绍了目前国内外具有一定启发性的检测技术,基于检测前跟踪技术、基于变换域方法、基于微多普勒分析、基于多活性代理系统检测以及基于杂波白化等方法,并对各方法检测性能进行了简要分析。最后,总结提出了针对此类目标检测技术研究发展的几点思考。  相似文献   

4.
针对空中远距离红外小目标检测的实际问题,提出了一种基于小波变换的检测算法.该方法首先对小目标图像进行小波分解并在考虑高频系数能量的基础上对噪声和背景边缘系数进行抑制,然后将遗留下来的高频系数通过线性映射变换成灰度图像.其次对3个方向的高频图像按照一维最大熵法进行二值化处理并通过形态开算子进一步滤除噪声,随后将高频图像两两相与关联生成单帧检测结果,并进一步利用帧间目标位置的相关性完成小目标检测过程.最后,在原图像中以检测结果图像的质心为中心生成跟踪窗口.试验结果表明,相对于通常的小目标检测算法,提出的算法在背景抑制、检测准确度以及速度方面都具有一定的优势.  相似文献   

5.
一种基于自适应阈值与边缘跟踪的目标提取方法   总被引:1,自引:0,他引:1  
介绍了一种基于目标灰度门限和目标之间灰度距离门限的区域自动阈值检测法,用该方法检测出图像区域的阈值进行目标初分割,然后结合形态学中的开启和闭合方法对初分割后的二值图像进行双滤波,再用一种新的区域边缘跟踪标注法对其进行跟踪和标注,找出每个目标的包络矩形坐标,用其对原图进行区域定位,从而可以提取出原图中包含目标的小区域.  相似文献   

6.
根据同时检测到目标的两个传感器节点对目标进行定位的特点,提出了一种适用于二进制检测传感器网络的改进质心定位法;给出了一种基于线性最小二乘估计的目标跟踪算法,并结合质心定位法和改进质心定位法,得到了目标运动的航速和航向。仿真表明:改进的质心定位法相比于质心定位法,具有更高的定位精度;基于线性最小二乘估计的目标跟踪方法可以获得较为准确的目标航速和航向。  相似文献   

7.
在复杂战场环境下,传统的雷达系统很难检测到低空目标。针对低空目标信号微弱、背景杂波干扰强以及目标高机动性等特点,提出了一种低空目标检测融合系统的结构与框架设计方法。该融合系统通过引入混合式结构,增加了系统的鲁棒性与抗摧毁能力。在融合系统的传感器管理与分配环节,目标检测与跟踪方法融合环节,联合检测、跟踪与识别环节,通过对各模块的性能评估和动态优化,实现低空目标融合检测与跟踪性能的最优化。  相似文献   

8.
针对运动目标的智能跟踪检测提出一种基于先验信息的光流检测法。首先,通过利用区域生长法获取的道路先验信息并结合帧差法确定运动目标的大致范围。其次,采用光流法对处理后的图像进行分割,并由形态学方法对进行图像处理后检测出运动目标。最后,基于MATLAB平台对其进行仿真计算。结果表明,该方法克服了传统光流法在运动目标检测中易受干扰的问题,并为军事人员对运动目标跟踪检测提供了有效的辅助。  相似文献   

9.
针对复杂背景下雷达弱小目标的检测和跟踪问题,提出了一种改进动态规划的检测前跟踪算法.该方法用多级检验判决方法代替常用的两级门限检测,并用传统跟踪技术进行目标位置状态估计,根据估计值与状态值的欧氏距离设计一个惩罚项来改进值函数.通过仿真验证,结果表明该方法能有效消除伪航迹,减小计算量,提高对雷达弱小目标的检测和跟踪性能.  相似文献   

10.
基于目标距离像的地面目标检测和跟踪   总被引:7,自引:0,他引:7       下载免费PDF全文
本文阐述了高分辨率一维距离成像的原理,提出了一种基于目标距离像的目标信号检测和跟踪方法。理论分析与模拟结果表明,通过目标距离像可以测量出目标的一部分强散射中心;强散射中心信息的综合利用,可以提高信干比并改善检测和跟踪性能。因此利用目标距离像可以较好地解决强地物杂波背景下目标信号的检测和跟踪问题。  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
The war that Portugal was obliged to fight in Africa began in 1961 and immediately stretched the resources of its armed forces. Nowhere was this thinness more apparent than in policing the vast territory of Angola. The east and southeast of Angola were particularly vulnerable, as the area was a vast, sparsely populated region characterised by enormous featureless plains or chanas covered in tall grass and broken by an extensive river system and mountainous forests. The only military solution to policing these immense spaces was aviation and specifically the helicopter that could carry troops into battle, protect them with a gunship and bring them home when the operation was concluded. The immediate problem for the Portuguese Air Force (Força Aérea Portuguesa or FAP) in Angola and elsewhere was a scarcity of helicopters. The solution was an alliance with South Africa, which had a strong inventory of Alouette IIIs, to help in policing the east. This move was likewise in the interest of South Africa, as its threat came from Zambia through south-eastern Angola. This article examines the strategic and tactical development of this unusual, cross-cultural alliance and the symbiotic relationship that resulted in destruction of the enemies of both in Angola.  相似文献   

14.
本文主要介绍了国外焊条的现状和发展趋势,包括焊条的高韧性、高效率、低尘低毒和耐吸潮性能,为国内的焊条研究提供了参考依据。  相似文献   

15.
《Arms and Armour》2013,10(2):122-143
Many late medieval documents, notably inventories of arms and armour, of Englishmen contain references to ‘Scottish swords’ and other weapons. What did the compilers of these documents mean when they described a weapon as ‘Scottish’? How did such weapons come to be in the possession of these men? This article will attempt to explain this phenomenon drawing on primary documentary sources and surviving material culture from Glasgow Museums’ collections and others, as well as artworks from the period.  相似文献   

16.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

17.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

18.
19.
20.
《战略研究杂志》2012,35(5):689-711
Abstract

This article explores the effect of connectivity on strategic affairs. It argues that the effect on war's character is potentially, although not yet shown in practice, considerably large. Its effect upon the distribution of power among states in the international system is small, contrary to the claims of ‘cyberwar’ alarmists. All told, however, its effect upon strategic affairs is complex. On the one hand, it represents a significant advance in the ‘complexification’ of state strategies, understood in the sense of the production of intended effects. On the other hand, strategists today – still predominantly concerned with the conflicts and confrontations of states and organised military power – are generally missing the power which non-traditional strategic actors, better adapted to the network flows of the information age, are beginning to deploy. These new forms of organization and coercion will challenge the status quo.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号