首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
针对水下图像对比度低,细节模糊,存在颜色偏差的问题,提出一种基于改进引导滤波的水下图像复原算法。将红通道进行反转得到新的水下模型,利用红色暗通道图估计背景光;通过饱和度估计粗透射率图,利用改进的引导滤波算法对透射率图进行细化;对恢复后的图像进行图像增强处理。使用该算法与几种水下图像处理算法对多种水下环境中的图像进行处理,比较视觉效果和UCIQE等评价指标。实验结果表明,算法可以有效复原出清晰图像,校正颜色失真,提高对比度,增强细节,且对人工光源区域也同样适用。  相似文献   

2.
无人机运动模糊图像复原技术   总被引:1,自引:0,他引:1  
在无人机飞行过程中,由于成像系统会受到相对运动、姿态变化、机械振动、镜头离焦以及大气湍流效应等影响,造成获取的图像产生退化.由于图像复原问题通常情况下是病态的,综合利用了无人机运动的先验信息,提出了不同运动模糊情况下点扩散函数的估计方法,采用维纳滤波复原算法估计图像,给出了适用于无人机成像制导系统的图像复原方案.最后经仿真实验证明,该算法图像复原效果好,计算量小,抗噪声鲁棒性强,有较大的工程应用价值.  相似文献   

3.
针对离焦模糊图像,提出了一种基于图像质量的约束复原算法.该算法基于平滑约束最小二秉,采用正则化技术以减少高频噪声的放大.使用人类视觉系统(HVS)特性中的对比敏感度函数(CSF)对图像功率谱加权来评价图像质量,通过搜索图像质量的最大值实现对正则参数的自适应选择,使复原结果更符合人的视觉感受.实验结果表明:该算法不需要估计降质图像的噪声水平,却能获得和平滑最小二秉复原方法相当甚至更好的复原结果.  相似文献   

4.
为研究星载光学遥感成像系统的复杂性,由复杂系统的基本特征与系统研究的基本原则出发,通过对成像全链路流程的分析,确定光学遥感成像系统的复杂性来源及其表现形式。建立星载光学成像的数学模型,以系统重要参数——调制传递函数为基点,通过正过程建模分析和逆过程测量计算相结合的方式,分析了系统复杂性研究的基本原则,即还原论与整体论相结合、定性与定量相结合的过程。由正、逆过程的对比分析,一方面阐述了系统性能与各个环节参数之间的关系,另一方面又由正则化盲反卷积的方式得到图像中真实的调制传递函数。二者相辅相成,既能通过补偿系统复杂性因素影响提升系统性能,又能进一步指导系统优化设计。  相似文献   

5.
本研究以小波理论为基础进行有损图像压缩,并在小波压缩图像中引入复原技术。通过应用图像复原到低频成分(该成分由解压过程中的熵解码得到)可以检索获得高频成分,这是在频域重建图像纹理的一个表达。通过将本文算法与传统的小波压缩算法进行试验比较,表明该方法优于传统算法。  相似文献   

6.
编码曝光技术将病态的运动模糊图像复原问题转化为良态问题,寻找最优码字是编码曝光技术的关键。面向实用化目的,提出了一种考虑CCD传感器噪声的编码曝光相机最优码字搜索方法。基于仿射噪声模型对图像成像过程中的噪声成分进行了系统分析,首次从理论上分析了Raskar码字选取依据并基于复原图像信噪比增益提出了光子噪声对最优码字构造影响的解析表达式。在对实际编码曝光相机进行噪声标定的基础上,提出了最优码字搜索的准则并构造出适应度函数,采用遗传算法进行优化搜索得到最优码字。仿真图像和真实图像的复原结果证实了该方法的有效性,复原图像信噪比得到有效的提高。  相似文献   

7.
分数域图像混合噪声盲复原方法   总被引:1,自引:1,他引:0       下载免费PDF全文
提出了一种在分数傅里叶变换域中对图像进行复原的新方法.对于模糊且含有高斯噪声和啁啾噪声的图像进行分数傅里叶变换,利用各种噪声在分数域中的性质估计出复原图像的分数谱,再通过逆分数傅里叶变换返回空域,获得复原图像.在图像受到多种因素导致退化的情况下,以及在无任何先验知识的前提下,此方法可以简化复原过程,进行图像盲复原.  相似文献   

8.
基于自相关的匀速运动模糊尺度参数识别   总被引:9,自引:0,他引:9       下载免费PDF全文
运动模糊图像复原主要取决于点扩散函数(PSF)的确定。对于匀速直线和匀速旋转运动模糊图像,运动方向和模糊尺度决定了PSF,是重要参数。根据模糊图像的像素点具有高度相关的特性,采用差分和自相关等技术,精确确定模糊尺度,为图像复原提供必要参数。仿真实验验证了该方法的正确性和有效性。  相似文献   

9.
气动光学效应中调制传递函数的计算方法   总被引:1,自引:0,他引:1  
从Maxwell方程出发 ,推导了光在湍流中传播的调制传递函数的计算公式。依据折射率起伏相关函数的两种形式 ,计算了光学相位差。根据湍流的动能和动能耗散率输运方程 ,建立了折射率起伏方差的计算模型。最后 ,指出了文中所给公式的适用范围 ,对更好地进行调制传递函数的计算提出了建议。  相似文献   

10.
为提升现有舰载光电探测系统图像的分辨率,通过图像降质及超分辨重建模型对复原图像中伪信息的产生进行了研究,在Lee方法的基础上,提出了采用高斯马尔科夫先验模型对图像重建过程进行约束的方法,实现了正则化参数的自适应计算。实验结果表明:该方法在视觉效果与客观指标上要优于传统方法与Lee方法,具有良好的应用前景。  相似文献   

11.
12.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

13.
The US Army has two approaches to counterinsurgency operations in Afghanistan. One is hard, or combat-focused, and the other is soft, or development-focused. This study examines two US Army task forces deployed to Panjwai District, Afghanistan from 2012 to 2013. CTF 4-9 and 1-38 offer a meaningful comparison because they pursued these contrasting approaches among the same population and against the same enemy at the same time and place. The study compares each unit’s approach and finds that neither approach was successful absent the other. The article concludes by recommending further research into combining the approaches at the operational level.  相似文献   

14.
根据chirp信号在模糊域的特点,本文提出了线性核时频表示方法。这种方法在提高分辨率、消除交叉项以及抑制噪声等方面都具有较高的性能。理论分析和实验结果都证实了这种方法的有效性  相似文献   

15.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

16.
The surprising ‘Arab Spring’ raises the question as to what would enable national intelligence to provide high quality warnings prior to the eruption of popular revolutions. This article uses new sources of evidence to trace and explain Israel's success in comparison to US failure at correctly estimating the course of the Iranian Revolution in 1977–79. In explaining this variance, the article shows that it was mainly the result of the intimate acquaintance of Israel's representatives in Iran with the local language, history and culture, as well as the ability to communicate with locals – tools which the Americans completely lacked.  相似文献   

17.
继续教育作为终身教育的重要组成部分和基本形式,对教师的发展成长意义重大。继续教育工作开展十多年来,取得了一定的成绩,但还存在不少问题,如学习动机较为被动,管理认识不到位,教学内容陈旧空泛,教学方法呆板机械等。随着课程改革的不断深入,继续教育必须采取相应的改进措施,树立以人为本,服务至上的观点,教学内容的前瞻性与实用性并重,教学人员进行整合,教学方法灵活多样,评价考核规范科学等,以此激活受训教师内在的学习动机,更大程度地提高继续教育培训的实际效果。  相似文献   

18.
目前市场上的网络监控技术一般用昂贵的硬件设备来支撑,投资较大。在深入研究微软的DirectX9.0的基础上,提出如何用DirectShow软件技术和普通的数字摄像头来实现网络视频的监控和实现技术,内容涉及通信协议、视频的编码与解码技术、视频的编码格式和COM组件编程技术等,最终的实验结果令人满意,且费用低廉,技术可靠,为在高速局域网内构建视频监控系统提供有效的技术支持。  相似文献   

19.
In 1796 a 13-year-old boy playing on wasteland behind his father’s house in Ribchester, Lancashire discovered an assemblage of over 30 Roman artefacts, including a decorated brass helmet. Although partially corroded the Ribchester helmet is a fine example of a first-century AD cavalry sports helmet. This article considers how the interpretation of the helmet has evolved since its discovery. The multi-faceted iconography of the helmet with its mural crown diadem is that of an elite soldier and is paralleled in other examples of cavalry sports helmets of the Ribchester type. The long-neglected imagery on the helmet bowl is reinterpreted and seen not as a haphazard collection of randomly placed combatants but as a highly structured, symmetrical composition specifically designed to be viewed from different directions.  相似文献   

20.
This article provides an in-depth examination and analysis of the 2006–2009 Tuareg rebellion in Mali and Niger. It identifies the underlying reasons behind the rebellion, explores contrasting counter-insurgency (COIN) strategies employed by the two governments, and presents some lessons learned. While both COIN approaches ultimately produced similar peace settlements, the article argues that the Malian strategy of reconciliation combined with the selective use of force was far more effective than the Nigerien iron fist approach at limiting the size and scope of the insurgency and producing a more sustainable peace. It concludes by looking at the role of external actors, particularly the United States, and how the failure to internationalize the conflict was actually more beneficial to the local COIN effort, as well as to the longer strategic interests of the United States in the region.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号