首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
提出了一种基于图像灰度值切线方向的边缘检测方法.首先搜索确定当前点的灰度值切线方向,然后根据此切线方向两侧像素的灰度变化情况生成边缘图像.对于含噪声的图像,引入噪声检测方法,无需平滑预处理,直接就能得到边界图.实验证明该方法是简单有效的边缘检测方法.  相似文献   

2.
红外图像通常存在着噪声大、目标和背景之间具有较小的灰度差、边缘较模糊的特点,使现有的方法不能有效地提取红外图像的边缘。而图像的表面积特征能较好地针对红外图像的这些特征提取出边缘,因此利用图像的表面积特征提出了一种实用的面元边缘检测法。在对图像灰度值变化情况进行分析的基础上,使用了一种十字面积计算公式以满足边缘检测的需要。通过噪声误差对面元法和梯度法计算结果的影响分别进行分析,发现面元法比梯度法的噪声抑制能力至少高两倍,而且在边缘处的噪声抑制能力更高。将面元法几种常用模板算子法的红外图像边缘检测结果进行实际对比后发现,所提出的面元法对红外图像的目标边缘检测能取得良好的结果。  相似文献   

3.
图像的边缘检测是图像分析领域十分重要的基础,在工程应用中占有很重要的地位.提出了一种基于高阶曲面拟合的边缘检测算法.算法首先利用自适应滤波对图像进行了去噪处理,接着通过曲面拟合获取图像的梯度信息,最后用统计方法进行了阈值选取.实验证明该算法得到的边缘图像相对简单,边缘点较少,有利于识别,同时该检测算法也为后续的图像分析、图像理解打下了良好的基础.  相似文献   

4.
针对高分辨率SAR(synthetic aperture radar)图像目标复杂,且具有严重的相干斑噪声,灰度出现剧烈起伏导致目标边缘模糊难以实现精准分割的问题,提出了一种分数阶傅里叶变换(fractional Fourier transform,Fr FT)域中里兹分数导数(Riesz fractional derivative,RFD)边缘检测和脉冲耦合神经网络(pulse coupled neural network,PCNN)协同的高分辨率SAR图像分割算法。该算法首先将原始图像经过边缘检测处理以保留较好的边缘信息,再由PCNN模型进行图像分割,最后通过形态学进一步去除相干斑点。将所提算法应用到不同区域的高分辨SAR图像分割中,实验结果表明该方法能够有效抑制相干斑噪声和灰度边界模糊的影响,获得精准的分割效果。  相似文献   

5.
对含有夹渣、气孔和裂纹缺陷的直焊缝X射线图像进行缺陷的边缘检测时,传统的Canny算法虽然可以检测出缺陷的边缘,但具有自适应差和容易出现伪边缘的缺点。提出了一种改进的Canny算法,对经过非极大值抑制后的梯度直方图,利用像素最值梯度和像素最值梯度方差自适应获取连接缺陷边缘所需的高、低阈值;同时也改进了计算梯度图像所需的模板。实验结果证明,改进的Canny算法不仅进一步抑制了噪声,也避免了伪边缘的出现,在保留缺陷的边缘细节方面具有良好的效果。  相似文献   

6.
针对现有图像拼接方法的缺点提出一种全自动图像拼接算法,该算法综合考虑了图像拼接的精度和速度.利用迭代法自动求得图像的最佳分割阈值,二值化原始图像,经过标记、筛选等处理后快速提取出边缘重叠图像匹配过程中所需的特征模板.通过提取出的特征模板利用基于灰度的方法确定图像的最佳拼接线,从而实现图像正确、平滑的无缝拼接.实验结果证明了该算法的有效性.  相似文献   

7.
在小波变换的基础上探讨出一种用于X线图像边缘检测的新算法,能够对X线图像进行边缘检测和分割。通过预处理(去噪,增强)、小波变换实现了图像的二值化。采用新算法及传统方法对X线图像进行边缘提取,并对结果进行比较。实验证明该新算法快速、精确、抗噪能力强。  相似文献   

8.
基于邻域灰度分布的IR弱小目标检测   总被引:6,自引:0,他引:6       下载免费PDF全文
图像中邻域内灰度起伏程度越大 ,各点灰度值占邻域内总灰度值的比率的平方和越大 ,由此提出了一种基于邻域灰度分布的弱小目标检测方法。同时考虑到复杂自然背景 ,特别是背景中含有大量边缘和高频点的情况 ,提出了目标检测的改进方法。最后 ,利用邻域判决法实现运动目标的进一步分离。实验表明该方法能够极大地减少候选目标点数 ,准确有效地检测复杂自然背景中的红外运动弱小目标 ,适合于实时和多目标的检测  相似文献   

9.
提出了一种基于数学形态学和支持向量机的跑道检测方法.首先采用Otsu法对原始图像进行全局阈值化处理,并利用灰度形态学边缘检测算法对所得图像进行边缘检测;然后利用Hough变换提取线段,若线段超过一定长度,则判定其所在区域为跑道的候选区域;最后选择8个分量组成跑道候选区域的纹理特征向量,用支持向量机作为分类函数,对候选区域的纹理特征向量进行分类,判别出跑道.实验表明,该算法对跑道定位准确,误检率低.  相似文献   

10.
一种梯度变换的水下图像对比度增强算法   总被引:1,自引:0,他引:1  
在水下激光成像系统中,针对海水对光的散射而引起的图像对比度下降的特点提出了一种自适应改变图像梯度来增强水下图像对比度的算法.该算法分三步时图像进行处理:首先利用双边滤波器对图像进行滤波,以消除噪声;其次根据图像的局部灰度强度,对图像梯度进行处理;曩后通过解泊松方程,将处理后的梯度图像还原成灰度图像,实验结果表明:该算法...  相似文献   

11.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

12.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

13.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

14.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

15.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

16.
17.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

18.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

19.
20.
ABSTRACT

What was the scope of the Bosnian jihadi participation in the war in Syria? Did the Bosnian volunteers tend to join one particular faction? Why did the Bosnian youngsters decide to join the holy war in the Levant? Was this an organized and hierarchical process or was this a grassroots movement? Last, were all the Salafis in Bosnia supportive of this dynamic or did this process cause internal frictions? These are some of the questions that this research will try to answer.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号