首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
建立了从二维图像提取三维信息的几种数学模型,推导出通过摄像机校准来确定摄像机参数的数学过程.最后给出图像测量实验的程序框图,并验证了以上算法的正确性.  相似文献   

2.
针对火炮调炮精度检测中存在的不足, 提出了一种基于双目立体视觉的三重交会测量方法,在炮身管上附加球状标志物,利用CCD摄像机获取标志物图像,通过标志物成像的几何投影关系计算球心的三维坐标.为了降低图像识别误差的影响,对投影的识别位置进行拓展和细化,并对球心投影边界进行插值,摄像机光心与插值点连线射线形成了一个锥体,两摄像机的锥体分别与炮台球面相交形成曲面,计算两曲面公共部分的形心,即为球心位置.通过确定球心位置,对炮身管的高低角、方位角进行计算,从而检测火炮调炮的性能.实验证明,该算法简单、快速,具有较高的精度.  相似文献   

3.
利用图像信息获取战场三维几何数据.以装甲车为实例,提出适用的平面二次曲线获取方法,可以克服模糊背景的干扰,得到完整的轮廓曲线,并在此基础上求解了空间曲线三维数据.研究结果表明通过对摄影图像的标定、建模,可以获得战场环境中关注目标的三维几何数据,并且投影矩阵值和提取轮廓准确性对误差影响较大.  相似文献   

4.
在基于三维场景的管理信息系统中,摄像机作为人机交互的媒体直接决定场景对于管理人员的可视效果。针对全景摄像机控制方式选取问题,从位置和方向两个方面进行分析,提出了全景摄像机控制的两种改进方法。采用V irtools进行程序设计,通过实验测试表明,采用改进后的摄像机控制方法避免了操作人员对地形全貌观察的烦琐键盘操作,降低了对硬件性能配置的要求,增强了场景对于用户的可视效果,提高了管理工作效率。  相似文献   

5.
复杂背景下运动目标的快速检测一直是目标跟踪领域的难点.灰度投影法可将时空域内的图像序列由三维信号压缩为二维信号来处理,且压缩后的信号噪声仍能通过高斯滤波来消除;之后计算灰度投影向量的时空离散度,并采用水线阈值分割技术查找离散度曲线的波峰,从而确定运动目标所在位置,实现运动目标的快速检测.该方法计算简单,对于摄像机抖动、目标被部分遮挡或背景中景物非完全静止等等复杂背景情况,均能快速准确地检测到运动目标.  相似文献   

6.
针对光栅投影系统中棋盘格标定板角点检测时易受图像噪声和模糊影响,提出了一种新颖的基于圆阵列标定板的光栅投影系统标定方法.利用摄像机的非线性成像模型,设计了一种基于透视变换和圆心排序的圆心自动匹配算法,实现了圆心像素坐标与对应世界坐标的匹配;将投影仪视作逆向摄像机构成双目立体视觉模型,借助采集的水平与垂直光栅图像,利用九...  相似文献   

7.
用神经网络变易有效焦距的摄像机标定法   总被引:2,自引:2,他引:0       下载免费PDF全文
针对传统摄像机标定中由于像差等非线性因素的影响造成结果精度和稳定性不高且算法复杂的特点 ,提出了用 4层前向神经网络模型变易摄像机横纵向有效焦距的方法。给出了摄像机标定结果和用标定后的摄像机进行三维立体测量的结果 ,并与传统方法作了对比。结果表明 ,基于神经网络的摄像机标定方法可以获得比传统方法更高的精度和稳定性  相似文献   

8.
提出了一种在无人机降落并接近跑道的过程中,在已知跑道宽度的前提下,基于单幅跑道图像测量其位姿参数的新方法.通过分析跑道消影点与无人机位姿的关系,得到消影点的图像坐标与姿态角的关系.依据摄像机共线方程,推导出了无人机位姿与跑道的世界坐标方程系数及像直线方程系数的关系.通过合理假设,对位姿参数进行了简化,求解出无人机降落过程中的位姿状态.仿真实验结果证明,方法易于实现,可满足无人机自主降落导航的应用需求.  相似文献   

9.
提出了一种结构简单、命中率高的视频引信设计方案,该引信根据目标在摄像机视场中视频图像序列中的相对位置关系来确定引爆时机.对其中信息处理单元进行了硬件和软件设计,并在实验室条件下,模拟实际作战应用时图像特点,对设计的实验板进行了验证.实验结果表明,单片机软件工作可靠,该方案切实可行.  相似文献   

10.
计算机视觉测量中摄像机快速标定方法实现   总被引:1,自引:0,他引:1  
随着计算机视觉技术的发展,计算机视觉测量技术在工业领域的应用越加广泛。摄像机标定能确定空间坐标系中的物点与其在图像平面上的像点间的对应关系,是计算机视觉测量中不可或缺的组成部分。分析了一种快速、简便的摄像机标定方法。重点阐述了其基于OpenCV的方法实现,并通过实验证明了其有效性。  相似文献   

11.
12.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

13.
The US Army has two approaches to counterinsurgency operations in Afghanistan. One is hard, or combat-focused, and the other is soft, or development-focused. This study examines two US Army task forces deployed to Panjwai District, Afghanistan from 2012 to 2013. CTF 4-9 and 1-38 offer a meaningful comparison because they pursued these contrasting approaches among the same population and against the same enemy at the same time and place. The study compares each unit’s approach and finds that neither approach was successful absent the other. The article concludes by recommending further research into combining the approaches at the operational level.  相似文献   

14.
根据chirp信号在模糊域的特点,本文提出了线性核时频表示方法。这种方法在提高分辨率、消除交叉项以及抑制噪声等方面都具有较高的性能。理论分析和实验结果都证实了这种方法的有效性  相似文献   

15.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

16.
The surprising ‘Arab Spring’ raises the question as to what would enable national intelligence to provide high quality warnings prior to the eruption of popular revolutions. This article uses new sources of evidence to trace and explain Israel's success in comparison to US failure at correctly estimating the course of the Iranian Revolution in 1977–79. In explaining this variance, the article shows that it was mainly the result of the intimate acquaintance of Israel's representatives in Iran with the local language, history and culture, as well as the ability to communicate with locals – tools which the Americans completely lacked.  相似文献   

17.
继续教育作为终身教育的重要组成部分和基本形式,对教师的发展成长意义重大。继续教育工作开展十多年来,取得了一定的成绩,但还存在不少问题,如学习动机较为被动,管理认识不到位,教学内容陈旧空泛,教学方法呆板机械等。随着课程改革的不断深入,继续教育必须采取相应的改进措施,树立以人为本,服务至上的观点,教学内容的前瞻性与实用性并重,教学人员进行整合,教学方法灵活多样,评价考核规范科学等,以此激活受训教师内在的学习动机,更大程度地提高继续教育培训的实际效果。  相似文献   

18.
目前市场上的网络监控技术一般用昂贵的硬件设备来支撑,投资较大。在深入研究微软的DirectX9.0的基础上,提出如何用DirectShow软件技术和普通的数字摄像头来实现网络视频的监控和实现技术,内容涉及通信协议、视频的编码与解码技术、视频的编码格式和COM组件编程技术等,最终的实验结果令人满意,且费用低廉,技术可靠,为在高速局域网内构建视频监控系统提供有效的技术支持。  相似文献   

19.
In 1796 a 13-year-old boy playing on wasteland behind his father’s house in Ribchester, Lancashire discovered an assemblage of over 30 Roman artefacts, including a decorated brass helmet. Although partially corroded the Ribchester helmet is a fine example of a first-century AD cavalry sports helmet. This article considers how the interpretation of the helmet has evolved since its discovery. The multi-faceted iconography of the helmet with its mural crown diadem is that of an elite soldier and is paralleled in other examples of cavalry sports helmets of the Ribchester type. The long-neglected imagery on the helmet bowl is reinterpreted and seen not as a haphazard collection of randomly placed combatants but as a highly structured, symmetrical composition specifically designed to be viewed from different directions.  相似文献   

20.
This article provides an in-depth examination and analysis of the 2006–2009 Tuareg rebellion in Mali and Niger. It identifies the underlying reasons behind the rebellion, explores contrasting counter-insurgency (COIN) strategies employed by the two governments, and presents some lessons learned. While both COIN approaches ultimately produced similar peace settlements, the article argues that the Malian strategy of reconciliation combined with the selective use of force was far more effective than the Nigerien iron fist approach at limiting the size and scope of the insurgency and producing a more sustainable peace. It concludes by looking at the role of external actors, particularly the United States, and how the failure to internationalize the conflict was actually more beneficial to the local COIN effort, as well as to the longer strategic interests of the United States in the region.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号