首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
跟踪算法是自动跟踪火控系统的关键.提出了一种新的基于模板匹配的跟踪算法,可应用于实时的跟踪系统.该算法由扩张状态观测器(ESO)和序贯相似性(SSDA)匹配算法组成.首先使用扩张状态观测器,可以预测出目标在下一帧图像中的位置,再使用SSDA算法,在预测位置的邻域内进行搜索从而获得目标的准确位置.基于扩张状态观测器的模板匹配算法减少了搜索位置,提高了算法的效率,同时也克服了传统卡尔曼滤波用于目标预测时需要目标模型已知且滤波时间长的缺点.仿真实验证明该算法可以满足实时性要求.  相似文献   

2.
以无人机拍摄的运动车辆为研究对象,针对航拍视频中的某一车辆目标,研究其目标跟踪方法。为准确预测车辆在未来帧中出现的位置,提出基于K邻域的目标预测算法,对于车辆目标可能会出现被全部遮挡的情况,提出基于车辆运动状态估计的抗遮挡算法,在目标检测过程中,针对可能会有多个目标被检测出来的情况,提出多特征融合的图像匹配算法以对检测结果进行匹配。将上述算法相结合,形成车辆目标跟踪方法。测试结果表明,提出的目标跟踪方法平均准确率达到了91.1%,准确率相对于常见的目标跟踪算法提升了约6.35%。  相似文献   

3.
最小二乘滤波在目标跟踪中的应用   总被引:3,自引:0,他引:3  
根据目标在运动过程中具有轨迹连续性的特点,基于最小二乘法通过设计综合预测器的方法,并结合坐标变换得出目标的预测位置信息。这种方法结合了线性预测器与平方预测器的特点,对于目标跟踪过程中的预测更加贴近,且能减少跟踪算法的计算量;对于实现导弹的稳定跟踪具有一定的应用价值。  相似文献   

4.
针对装甲车上的图像跟踪系统,提出了一种机动目标预测方法.将目标的运动分解为两部分,即全局运动和局部运动,并根据各自的动态特性分别进行预测.以局部运动预测为重点,通过对机动目标跟踪技术的研究,建立起性能优良的跟踪滤波器,并将其扩展到预测滤波器中对目标的未来运动状态进行预测,从而提出了"交互式多模型预测算法".仿真结果表明,该算法具有预测精度高、自适应能力强的特点,同时给出了计算方法.  相似文献   

5.
空中强机动性目标在视频中表现出运动形变剧烈、运动规律难预测且背景特征不明显不稳定等特点,传统的检测跟踪算法不能有效地对其实施检测跟踪.为解决上述问题,提出一种不依赖于帧间运动特性的基于提升框架检测的空中强机动视频目标跟踪算法.首先,利用提升框架实现图像的小波变换,得到目标的高频分量信息.然后,对高频分量进行融合,并提出了目标特征增强的方法,完成单帧图像的目标检测.最后,实现视频序列的实时跟踪.实验结果表明,该算法能够实时、准确地对空中背景下的强机动性目标进行检测跟踪,有效地解决了目标运动形变剧烈、某些帧中存在遮挡而造成后续帧失跟等跟踪困难.  相似文献   

6.
卡尔曼滤波器对线性高斯滤波问题能提供最优解, 而对目标运动模型、观测方程等要求的非线性就不再适合,提出了一种机动目标自适应非线性粒子滤波算法-" 粒子滤波器"(Particle Filters PF)法, 这种方法不受线性化误差和高斯噪声假定的限制,适用于任何状态转换或测量模型, 分析比较了粒子滤波(PF)与扩展卡尔曼滤波算法(EKF) 的滤波精度、运算量等方面指标.给出了基于典型非线性模型的算法仿真, 仿真结果表明粒子滤波新方法优于EKF对机动目标跟踪.  相似文献   

7.
根据同时检测到目标的两个传感器节点对目标进行定位的特点,提出了一种适用于二进制检测传感器网络的改进质心定位法;给出了一种基于线性最小二乘估计的目标跟踪算法,并结合质心定位法和改进质心定位法,得到了目标运动的航速和航向。仿真表明:改进的质心定位法相比于质心定位法,具有更高的定位精度;基于线性最小二乘估计的目标跟踪方法可以获得较为准确的目标航速和航向。  相似文献   

8.
针对一类未知机动目标设计了一种线性最优滤波器.该滤波器采用有限记忆模型作为滤波模型,模型参数用动态最小二乘方法辨识得到.由此得到的滤波器称为基于辨识有限记忆模型的线性最优滤波器.有限记忆模型克服了时间多项式模型(如CV模型、CA模型、Singer模型等)对目标物理特性的依赖性,它从目标运动轨迹入手对目标运动特性进行描述,更适合于战场未知目标的跟踪滤波.通过原理分析和Monte Carlo仿真实验验证了该滤波方法的有效性,并且和Kalman滤波方法进行了比较.  相似文献   

9.
针对无线传感器网络目标跟踪中跟踪精度与传感器节能问题进行研究,提出基于预测的簇头自适应聚类算法,该算法采用动态聚类算法,通过考虑传感器节点剩余能量、节点到汇聚的距离和节点到运动目标的距离3个参数,最大限度地减少簇头与基站间的远程通信,节约网络能量,延长网络寿命,降低目标漏失概率,加入预测机制,采用线性预测的方法预测跟踪...  相似文献   

10.
在现代战争中,视频跟踪技术是实现精确火力打击的关键技术,是获取信息对抗胜利从而夺取战争主动权、实现发现即摧毁的重要保证。由于战场地理环境复杂,经常存在跟踪目标被遮挡而丢失的情况,因此,稳定的长时跟踪算法必不可少。针对现在战场复杂环境下目标跟踪遇到的问题,提出了基于KCF(Kernelized Correlation Filters)和粒子滤波相融合的跟踪算法,相比较传统算法其能够在复杂环境下完成长时、稳定、准确的跟踪。通过设计的视频跟踪系统的硬件平台实验结果显示,该算法可实现目标的稳定跟踪以及目标被遮挡丢失之后的重新检测,能够满足复杂战场环境下目标的长时稳定跟踪的需求。  相似文献   

11.
12.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

13.
The US Army has two approaches to counterinsurgency operations in Afghanistan. One is hard, or combat-focused, and the other is soft, or development-focused. This study examines two US Army task forces deployed to Panjwai District, Afghanistan from 2012 to 2013. CTF 4-9 and 1-38 offer a meaningful comparison because they pursued these contrasting approaches among the same population and against the same enemy at the same time and place. The study compares each unit’s approach and finds that neither approach was successful absent the other. The article concludes by recommending further research into combining the approaches at the operational level.  相似文献   

14.
根据chirp信号在模糊域的特点,本文提出了线性核时频表示方法。这种方法在提高分辨率、消除交叉项以及抑制噪声等方面都具有较高的性能。理论分析和实验结果都证实了这种方法的有效性  相似文献   

15.
The surprising ‘Arab Spring’ raises the question as to what would enable national intelligence to provide high quality warnings prior to the eruption of popular revolutions. This article uses new sources of evidence to trace and explain Israel's success in comparison to US failure at correctly estimating the course of the Iranian Revolution in 1977–79. In explaining this variance, the article shows that it was mainly the result of the intimate acquaintance of Israel's representatives in Iran with the local language, history and culture, as well as the ability to communicate with locals – tools which the Americans completely lacked.  相似文献   

16.
继续教育作为终身教育的重要组成部分和基本形式,对教师的发展成长意义重大。继续教育工作开展十多年来,取得了一定的成绩,但还存在不少问题,如学习动机较为被动,管理认识不到位,教学内容陈旧空泛,教学方法呆板机械等。随着课程改革的不断深入,继续教育必须采取相应的改进措施,树立以人为本,服务至上的观点,教学内容的前瞻性与实用性并重,教学人员进行整合,教学方法灵活多样,评价考核规范科学等,以此激活受训教师内在的学习动机,更大程度地提高继续教育培训的实际效果。  相似文献   

17.
目前市场上的网络监控技术一般用昂贵的硬件设备来支撑,投资较大。在深入研究微软的DirectX9.0的基础上,提出如何用DirectShow软件技术和普通的数字摄像头来实现网络视频的监控和实现技术,内容涉及通信协议、视频的编码与解码技术、视频的编码格式和COM组件编程技术等,最终的实验结果令人满意,且费用低廉,技术可靠,为在高速局域网内构建视频监控系统提供有效的技术支持。  相似文献   

18.
In 1796 a 13-year-old boy playing on wasteland behind his father’s house in Ribchester, Lancashire discovered an assemblage of over 30 Roman artefacts, including a decorated brass helmet. Although partially corroded the Ribchester helmet is a fine example of a first-century AD cavalry sports helmet. This article considers how the interpretation of the helmet has evolved since its discovery. The multi-faceted iconography of the helmet with its mural crown diadem is that of an elite soldier and is paralleled in other examples of cavalry sports helmets of the Ribchester type. The long-neglected imagery on the helmet bowl is reinterpreted and seen not as a haphazard collection of randomly placed combatants but as a highly structured, symmetrical composition specifically designed to be viewed from different directions.  相似文献   

19.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

20.
This article provides an in-depth examination and analysis of the 2006–2009 Tuareg rebellion in Mali and Niger. It identifies the underlying reasons behind the rebellion, explores contrasting counter-insurgency (COIN) strategies employed by the two governments, and presents some lessons learned. While both COIN approaches ultimately produced similar peace settlements, the article argues that the Malian strategy of reconciliation combined with the selective use of force was far more effective than the Nigerien iron fist approach at limiting the size and scope of the insurgency and producing a more sustainable peace. It concludes by looking at the role of external actors, particularly the United States, and how the failure to internationalize the conflict was actually more beneficial to the local COIN effort, as well as to the longer strategic interests of the United States in the region.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号