模糊边缘检测算法用于人工目标的提取【源代码+开题报告+毕业论文】_第1页
模糊边缘检测算法用于人工目标的提取【源代码+开题报告+毕业论文】_第2页
模糊边缘检测算法用于人工目标的提取【源代码+开题报告+毕业论文】_第3页
模糊边缘检测算法用于人工目标的提取【源代码+开题报告+毕业论文】_第4页
模糊边缘检测算法用于人工目标的提取【源代码+开题报告+毕业论文】_第5页
已阅读5页,还剩33页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

1详细源代码请联系本人开题报告A1A2A3A0A4A5A6A7A8A10A9A11A3A0A13A14A12A15A16A17A18A19A20A21A22A23A24A4A25A5A26A27A29A30A31A28A5A3A0A4A5A6A7A8A32A33A35A36A34A37A38A39A40A41A42A30A44A22A43A45A46A5A38A39A47A30A49A48A50A1A51A52A53A5A54A22A55A56A57A58A26A27A59A60A61A62A30A64A65A63A66A67A55A56A68A69A26A27A23A24A70A42A71A72A73A74A55A18A75A76A66A67A77A78A5A1A79A80A81A30A83A73A82A19A84A85A86A76A87A56A88A59A77A78A3A0A5A1A51A89A90A91A81A93A64A3A0A5A92A94A95A96A30A1A61A97A65A63A55A56A98A4A25A5A68A69A26A27A76A89A40A99A100A101A102A65A63A55A56A103A87A2A70A88A104A105A106A107A5A108A109A110A27A76A68A69A111A112A5A113A28A115A116A1A61A97A44A22A65A63A55A56A98A4A25A5A114A94A37A117A47A6A38A39A47A30A119A118A5A70A42A68A69A26A27A61A20A5A3A0A120A121A43A122A123A124A5A55A56A88A59A91A81A26A125A126A50A127A128A129A130A7A8A5A88A9A6A61A20A93A132A131A30A134A133A1A77A78A30A46A40A54A22A65A63A55A56A5A70A42A68A69A135A68A69A26A27A19A20A30A137A136A138A79A75A5A3A0A139A75A93A66A67A55A56A140A4A25A5A15A16A134A55A56A140A141A142A121A143A94A5A71A144A145A47A30A147A107A5A15A16A17A18A19A146A31A28A73A148A149A87A56A5A150A51A151A78A152A5A153A51A56A154A5A143A94A155A156A30A158A109A15A16A151A157A1A159A160A161A159A61A162A130A108A155A163A164A165A166A17A18A15A16A30A36A15A16A104A167A6A168A169A104A167A71A170A171A172A30A174A174A134A87A56A15A16A36A173A94A52A79A5A175A176A33A177A99A110A27A52A53A5A15A16A26A27A178A179A93A14A12A15A16A17A18A61A20A73PALA6KINGA1341983A181A26A95A5A1A180A120A14A12A88A9A182A21A22A87A56A57A58A26A27A5A15A16A17A18A61A20A30A184A183A134A14A185A186A187A6A188A189A87A56A190A88A98A110A191A138A34A53A5A182A21A30A193A172A192A21A138A87A56A194A126A50A5A71A195A196A47A174A174A73A44A14A12A47A136A197A5A133A1A57A47A93A10A9A11A198A199A200A28A201A202PALA183A203A14A12A15A16A17A18A19A20A5A108A189A14A124A30A205A204A64A172A206A43A207A208A209A210A30A26A95A10A11A5A211A212A19A20A213A214A30A216A215A138A217A218A5A126A219A220A142A221A222A30A224A204A223A225A36A161A226A55A56A15A16A227A228A5A26A27A229A230A10A11A5A211A212A19A20A76A147A107A15A16A17A18A19A20A6PALA183A203A14A12A15A16A17A18A19A20A231A173A30A178A179A111A53A93二、查阅的主要文献、资料,国内外现状及主攻方向1查阅的主要文献、资料1高分辨率遥感卫星应用成像模型、处理算法及应用技术,张永生巩丹超等著,科学出版社,2005年。2A233A232A234A235A236A237A238A239A240A241A242A243A244A245A246A247A248A249A250A251A252A2532002446483吴薇图像处理中的模糊技术现代电子技术,2001328304周德龙,潘泉,张洪才图象模糊边缘检测的改进算法中国图象图形学报,2001,643533585HAIBINDONG,JONATHANLI,ANDMICHAELACHAMPANASEMIAUTOMATEDAPPROACHTOURBANROADNETWORKEXTRACTIONFROMHIGHRESOLUTIONSATELLITEIMAGERYTHE4THINTERNATIONALSYMPOSIUMONMOBILEMAPPINGTECHNOLOGY,2004INKUNMING6LSAHAR,KRUPNIKASEMIAUTOMATICEXTRACTIONOFBUILDINGOUTLINESFROMLARGESCALEAERIALIMAGESPHOTOGRAMMETRICENGINEERINGREMOTESENSING,1992,65445946527ASTRATEGYOFUSINGREMOTESENSINGIMAGETOUPDATETHEGEOGRAPHICALDATA,ZHENFENGSHAO,DERENLITHEFOURTHINTERNATIONALSYMPOSIUMONMULTISPECTRALIMAGEPROCESSINGANDPATTERNRECOGNITION,2005,VOL604460440R168PALNRANDPALSKAREVIEWONIMAGESEGMENTATIONTECHNIQUESPATTERNRECOGNITION,1993,269127712942国内外现状PALA254KINGA255A27A238A239A240A241A242A243A244A0A246A1A2A3A4A5A6A7A8A9A10A11A12A35(1)图像的模糊特征面A36A13A234A14A15A16A17A18A19A20A238A21A22,JIFA253A247,JIA142A23A21A22A24A238A22A25A26A253A135A28A234A14A29A30A31MA250NA238A19A20A21A22,JIFA251A247A32A234A33A34A37XA167A142A23A35MNMMNNXXXXXXXXXNMFX212222111211,A45A38A39,NJMIXIJA40A41A42A43,JIA44A46A47A48A93A64A49A50A51A44A52A53A54A55A39A56A57A58A59LA60A46A47A61A44MNA88A42A39A62A63A55A65A122A56A60A49A50A51A39A51A153A44A66A56A60A67A43A68A127A69A70A71A72A73A60A74A75A46A47A61A44A76A77A78A109A39A132A79A80A49A50A51A81A82A122A88A42A83A179A49A50A51A39A84A85A88A42A44A49A50A74A86A87A98A93A121A88A42A64A89A90A91A92A94A241A49A50A74A86A91A39A71A95A44A49A50A96A97A99A122UA39A100A101A69UUMMNNMNMNXU11A96A97A38A44A67A43MN/MNXA40A41A88A42A42A43A102M,NA103A46A47A61MNXA70A71A72A232A104A46A47A61MAXXA44A76A77A47A93A225A105A176A106A107A108A110A111A112A113A114A115A116A117A118A119A120A123MNMMNNUUUUUUUUUU212222111211IJUA225A105A124A120A125A126A128A129A130EFDIJIJIJFXLXGU11A131A186A133A134分布有关。与和IJEDXFFA225A105A1362EFA137A138,EIJLX50EIJLGXGA139A124ELA120A140A141A143A137DFA144A129A145EELF、A196A146A130A147A148A12335011EFDEEFLLLGA110A111A149A150A1231211EFEDLLFA140A141A143A134A151A136A152A154A155A185A156A157A158A159A160A161A162A163A164A165A166A168A165A169A196A146A130A170A171A172A173A174A175A177A178A180A181A182A183A184A187A188A189A190A191A192A193A194A195A189A197A198A199A200A201A202A203A204A189A205A206A207A208A201A209A210A211A199A212A200A213A200A194A214A215A182A216A217A201A218A219A189A211A220A187A188A221A222A201A202A203A204A213A223A187A224A226A227A202A203A204A201A228A229A189A230A212A231A233A234A235A194A195A236A237A238A239A204A240A242A243A244A213A254A245A246A248A201A249A189A231A218A219A219A252A253A255A254A2380A194A189A214A227A201A11A0A1A109A254A2A3A4A5A55A6A35110EFDLAFA83A57A74A58A30A88A7A8A9A20A79A10A12A13A14A15A79A16A59A99A30A17A18A19A21A22A23A24A201,AA20A28A22A30A60A72A74A231,0A61A25A153A28A22A93(2)图像模糊增强A36A88A7A26A63A14A15A46A27A191A29A30A64A31A32A33A65A34A48A10A12A37A45A99RA122A67A235A39A21A38A9311IJRIJRIJUTTUTU,3,2,1RA142A40A67A235A39A21A93150500121222PPIJIJIJIJIJRUUUUUTA64A31A41A42A186A26A63A14A15A46A27A93(3)逆变换A36IJUA26A63A43A10A12A30A192A13A14A15A46A27A206A44A88A7IJX1IJIJUGX1GA122GA44A43A68A47A93A32A180A70A372A38A222A49A50AUIJG1075G4613G7171说,G3282像从空G19400域变G6454到模糊域过程中,隶属函G6980G1552在区G194001,AG19400取G1552,G13792不G7171在1,0范围G1881取G1552A2372G3282像模糊增强对G3282像进行模糊增强处理,采用如下G19762G13459性变G6454(其中RG1038G17857G1207次G6980)。11IJRIJRIJUTTUTU,3,2,1R表示G17857G1207次G6980。150500121222PPIJIJIJIJIJRUUUUUT采用G8504G1856G5347进行模糊增强。3G17882变G6454对IJU进行G17882变G6454,G5483到模糊增强后的G3282像IJX1IJIJUGX1GG1038G的G17882运算。如果G12544(2)步出现AUIJ22传统边缘检测算法的缺陷PAL算法的G1867G7389一些不足之处,G1039G16213体现在(1)由G5347G5483到的隶属函G6980G1552G5529G20047G3835于G19,经RT变G6454后,将使G5483原G3282像中一定G6980G18339的G1314灰度G1552G15999人G1038的变G1038G19,G17908G6116G1314灰度G1552边缘信G5699G6451G3845,G14280使检测与识别的G12946度下G19489,检测质G18339G19602G1209满足用G6155G19668求。(2)G3252G和1G包G2559复杂的G9026点运算,计算G18339G5234G3835,影G2721G13007G13491处理G17907度。(3)RT变G6454G5430G5347较G1038复杂。G3822次G17857G1207运算G7171G1038了对G3282像G2465复G1328增强处理。G1306G5415G17857G1207次G6980增G3835时,G2465G13792使边缘G13466G14422G9052G3845,增强G6940果不G7138G7186。(4)经RTGA238变G6454后还G16213进行1G变G6454,这将使G5483G的G5430G5347对增强结果的影G2721不G3835。(G24)EDFFA239G2454G6980G1867G7389G2499G16855性,G19668G16213优先G16311G1927G2454G6980寻优G19394G20076,这G1016个G2454G6980选取很G3835程度上G1927定后续G3282像处理G6940果。由于EDFFA240计算G1856G5347复杂,G17908G6116算法复杂度G3838G3835。(G25)从PAL算法的模糊边缘检测过程G2499见,在提取边缘前,G8821G7389G2345G10432G1328G6245G3134处理。G5415G3282像G2475到G3134声G5190G6212G13792变G5483比较模糊时,若G6365G10043这一方G7708进行模糊边缘检测,它的G6940果G7389时不G7171很理G5831,一些不在边缘上的点G1075G1262G15999误G2040G1038边缘点,这样G1262G13485后续处理G5114G7481误G5058。23改进模糊模糊边缘检测算法G18504于PAL算法的G13582G19531,G6117G1216G5088G7407寻找到一G12193G7094能G6245G2058G3134声G5190G6212,G4625G2499能G3332保G11053与目标G7389关的边缘信G5699,又能使G5483运算简G2345,G18003G5332G2499G16855G2454G6980寻优G19394G20076的G6925进算法。G1375如,G1625G7207G15195G12573提出一G12193G6925进隶属函G6980的G19762G13459性方法并实现了对G19762G13459性方法同PAL的比较,对该模糊边缘提取算法G1582了一定的G6925进,其采用的G19762G13459性隶属函G6980G1038G463G1625G7207G15195G451方G5259G10630G451G7458G7354,2G19G192G464SIN21IJIJIJXPGXLPI由于其隶属函G6980G1552分布于1,0上,实现了对G3282像的像素灰度G1552进行归一化处理,处理后不G1262G17908G6116在原G3282像中的G1314灰度G1552G15999G11840性G2011G2078G1038G19,G2375保存了G1314灰度G1552边缘信G5699。G13792G16211G2283工G1006G3835学的G2620G5515G21869G12573人G2029G16760G1038,实G19481G19394G20076中常用的隶属函G6980G5430G5347G7171G6164谓标G1946S型函G6980和PI型函G6980,其中,S型函G6980G7171一G12193从G19到1的G2345G16855增G19283函G6980;PI型函G6980G7171G6363G256中G19400高G1016边G1314G257的函G6980,它G1075G2499G1209用S型函G6980定G1053,G13792G1000这G1016G12193函G6980相应的渡越点G1313G13634G451G5114G4497(PI型)和隶属函G6980G7366G13459的对称性G7171不变的;G13792由PAL和KING12G6164定G1053的隶属函G6980G5430G5347不G1177能近G1296G3332用G7481表示分G8585G1821G9381的S型函G6980和PI型函G6980,并G1000其相应的渡越点G1313G13634G451G5114G4497(PI型函G6980)和隶属函G6980G7366G13459的对称性均由其模糊G3252G4388(DFG451EF)G6164G1927定,G1075G4613G7171说,这样定G1053的隶属函G6980,其相应的渡越点G1313G13634G451G5114G4497和隶属函G6980G7366G13459的对称性G7171G2499G1209进行G16855整的。由G8504G2499见PAL和KINGG6164定G1053的G7171一G12193很G7389实用G1227G1552的隶属函G6980G5430G5347。通过分G7524G1209前的一些模糊边缘检测方法(如PAL和KING方法)G2499知,在G3282象的模糊G10317G5461平G19766中,G11709阵的/MNMNX均定G1053G1038G3282象象素(M,N)灰度级MNX相对于最G3835灰度级MAXX的隶属度。由于G2475这G12193定G1053方法的G19492G2058,G3252G8504在算法中的模糊增强G18108分,G5529然G1262出现原G3282象中本应增强的灰度级G18108分G8821G7389G5483到足够的增强,G13792不应增强的灰度级G18108分G2376G5483到了很G3835的增强,很G7186然,这将G1262影G2721到下一步的边缘检测,从G13792使检测达不到原G7481G7411G7407的G6940果。针对这G12193隶属函G6980定G1053的不足,提出了如下的方法进行G6925进,G2375首先采用G3282象分G2118中的G19420G1552选取方法G7481确定G19420G1552G2454G6980TXG7186然,TX将整个G3282象的G11464方G3282分G1038G1314灰度和高灰度G1016个G18108分,对于G1867G7389典型G2464G4804分布的G11464方G3282G7481说,它G1216G2029分别对应目标和背景这G1016G18108分;然后G1889根据G2454G6980TX,G13792不G7171根据最G3835灰度级MAXXG7481定G1053新的隶属函G6980G5430G5347。由G8504G2499见,这G12193算法G7171在G19420G1552TX的G1016边,G2375G1314灰度区域和高灰度区域(目标和背景)分别通过模糊增强运算G7481检测边缘的,G2375在G1314灰度区域G1039G16213进行G15940G1955运算,从G13792使属于该区域的G3835G18108分象素的灰度G1552更G1314;G13792在高灰度区域G2029G1039G16213进行增强运算,从G13792使属于该区域的G3835G18108分象素的灰度G1552更高G17这样,经过模糊增强后,G3282象的各区域之G19400层次比较清楚,G13792G1000边缘G1016G1403的灰度对比增强,其提取的边缘信G5699G1075G4613更加G12946G1346613第三章其他相关的目标提取算法及技术比较31基于改进的模糊边缘检测算法的卫星遥感影像边缘的提取本G14422将G6925进的模糊边缘检测算法应用于G2367G7155影像,原G3999G2367G7155影像如G32823G171G11AG12G6164示,边缘检测G6164G5483G6940果如G32823G171G11BG12G6164示,同样取G5483了很好的G6940果,表G7138本G7003提出的方法能很好的适用于G2367G7155遥感影像。A242A243A244A245A246A247A248A249A250A251A252A253A255A242A243A244A245A246A15A248A16A0A1A2A3A432基于改进的模糊边缘检测算法与其他几种常用算子检测结果的比较本G14422通过实验G7481比较G1972G12193G3282像边缘处理方法的处理G6940果,G32823G172G4513G173G4513G174G4513G17G24分别G1038采用CANNY算G4388G451SOBEL算G4388G451KIRSCH算法G451MARR算法。与上G14422G6925进的边缘检测算法的G6940果G3282相比较,G2499G1209看出采用CANNY算G4388,G15441然检测G6940果较好,G1306同时G1075检测出G3134声;SOBEL和KIRSCH算G4388很G3822G13466G14422边缘G10317G5461G18129G6451G3845了;MARR算法G15441能较好G3332检测出边缘G10317G5461,G1306实G19481运算时G19400较G19283。G13792G2465G16278上G14422,采用本G7003G6925进的14模糊边缘检测算法,检测G6940果最好,它G2258G11023出了G19762常清G7236的轮廓信G5699,对G3134声的G6245G2058能G2159G1075较强,G13792G1000处理G17907度较MARR算法更G5567。A5A6A7A8A9A10A11A11A12A26A13A14A17A18A19A20A21A5A5A6A7A6A22A23A24A25A27A14A17A18A19A20A21A5G32823G174KIRSCH边缘检测G6940果15A5A6A7A28A29A10A30A30A14A17A18A19A20A21A516第四章利用模糊边缘检测算法进行人工目标提取方法的研究与详细设计人工目标提取G1582G1038遥感影像处理的一G12193基本方G5347,其理论G7171一个G4448整的G13007G13491,G13792本G8617G1006设计的G1039G16213G1881G4493G2029G7171基于模糊边缘检测的人工目标提取方法,G4448G6116了遥感影像的G2499G16282化,人工G3332G10301的边缘检测和目标提取,提取结果的二G1552化G7186示G12573功能。41遥感影像可视化的研究及设计4G171G171BMPG7003件格G5347的G16847入BMPG1313G3282格G5347G7171一个比较简G2345的,遥感影像常用的G3282G10267格G5347。BMPG7171BITMAP的G13565写,G2375G1038G1313G3282G3282G10267。G1313G3282G3282G10267G7171用一G12193称G1328G256像素G257的G2345G1313存G17154G3282像信G5699的。这些G256像素G257其实G4613G7171一些整齐排列的G5437G14406(G6122G21669G11345)点,如果这些点G15999G5942G5942放G3835,G4613G1262看到一个个的G256像素G257中G9167充G11540G14270己的G20080G14406,这些G256像素G257整齐G3332排列起G7481,G4613G6116G1038了一幅BMPG3282G10267,并G1209G17BMP(G17RLE,G17DIBG12573)G1038G6205G4649G2529。在本G8617G1006设计中,G6164用遥感影像均G1038BMP格G5347G7003件,利用VC中的CDIB工G1867类G2375G2499实现BMP格G5347G7003件的G16847入。4G171G172基本影像G6817G1328功能的设计G17745入BMP格G5347G7003件后,影像G7186示出G7481,G19602G1825G19668G16213进行一些基本的G3332G3282G6817G1328,G3252G8504本G8617G1006设计在影像的G16282G3282G18108分加入了一些基本G3332G3282功能如放G3835G451G13565G4579G451G9471G9228G451G1852G3282G7186示的实现。首先G1038每一个基本G6817G1328G6365G19074设G13634布G4584变G18339,G5415G6117G1216G2345G1999G7588一G10317定G6365G19074时,G1208G6164G7389布G4584G1038G1563,G1889G1208该G6365G19074布G4584变G18339G1038G11507,同时G16855用AFXG53EGISTERWNDCLASS方法,G1474G6925实G19481G12395G2487类,G4445G16025G2325字G5430G1821标。然后G5326立G21748标G2345G1999G16282G3282G1119件的G9052G5699G2721应函G6980,在该函G6980中,对布G4584变G18339进行G2040G7041,G5415G7588一布G4584变G18339G1038G11507时,G2029进行相应的处理。(1)放G3835的设计用G6155在工G1867G7651点G1999该G6365G19074后,在G1039G16282G12395中G2345G1999G21748标。G2345G1999后G12395G2487中G7186示G1881G4493将G1209G21748标G2345G1999点G1038中G5527放G38351G172G24G1505(2)G13565G4579的设计用G6155G6203行G256G13565G4579G257G6817G1328时,G2345G1999该G6365G19074,在G1039G16282G12395中G2345G1999G21748标G6122使用G21748标拉G7706。G2345G1999后G12395G2487中G7186示G1881G4493将G1209G21748标G2345G1999点G1038中G5527G13565G45791G172G24G1505(3)G9471G9228的设计实G5415用G6155G3252放G3835G12573原G3252在G1039G16282G12395中G2494能G7186示G3282G5430的一G18108分,这时用G6155G5831察看其他的G18108分时,G2499G1209通过G256G9471G9228G257G6817G1328寻找G5088G7407看到的G18108分。用G6155G2345G1999该G6365G19074,将G21748标G12239到G1039G16282G12395中,G21748标G1821标将变G6116一个手G5430,这时用G6155G2499G1209G6365下G21748标G5050键进行G6314G2172,寻找G5831G16213看到的G3282G5430G18108分。(4)G1852G3282G7186示的设计171IJIJIJXUGXLG1852G3282G7186示同样G1075G7171基本的G3332G3282功能之一,G5415用G6155进行G256放G3835G257G451G256G13565G4579G257G12573G6817G1328后,G2499G1209使用G256G1852G3282G7186示G257G6817G1328在G1039G16282G12395中G7186示G3332G3282的G1852G3282。42模糊边缘检测算法的研究与设计模糊边缘检测G1328G1038一G12193G1867G7389优G12180应用G6940果的用于提取G3332G10301目标的方法,对边缘检测算G4388的设计G7171其一个G19762常重G16213的方G19766,在本G8617G1006设计中,G1039G16213研究的G7171经过G6925进后的边缘检测算法的实现方G5347。4G172G171模糊边缘检测算法的G6925进由于经典的PAL算法存在一些不足之处(见G12544二G12468G12544二G14422),G6937G6117G1216在G8504G19668G16213设计出一个经过G6925进的边缘检测算法。G1268G13491的PAL算法在提取边缘前,G8821G7389G2345G10432G1328G6245G3134处理。G5415G3282像G2475到G3134声G5190G6212G13792变G5483比较模糊时,若G6365G10043这一方G7708进行模糊边缘检测,它的G6940果G7389时不G7171很理G5831,一些不在边缘上的点G1075G1262G15999误G2040G1038边缘点,这样G1262G13485后续处理G5114G7481误G5058。G6164G1209G6117G1216G5088G7407寻找到一G12193G7094能G6245G2058G3134声G5190G6212,G4625G2499能G3332保G11053与目标G7389关的边缘信G5699,又能使G5483运算简G2345,G18003G5332G2499G16855G2454G6980寻优G19394G20076的G6925进算法。在G8504G8617G1006设计中,G6117G1039G16213G2454G13783了G1625G7207G15195G12573提出的一G12193G6925进隶属函G6980的G19762G13459性方法对模糊边缘提取算法G1582了一定的G6925进,采用的G19762G13459性隶属函G6980G1038G463G1625G7207G15195G451方G5259G10630G451G7458G7354,2G19G192G464SIN2IJIJIJXPGXLLPI由于其隶属函G6980G1552分布于1,0上,实现了对G3282像的像素灰度G1552进行归一化处理,处理后不G1262G17908G6116在原G3282像中的G1314灰度G1552G15999G11840性G2011G2078G1038G19,G2375保存了G1314灰度G1552边缘信G5699。4G172G172模糊边缘检测的G2499G16282化的设计G6925进的G5567G17907模糊边缘检测算法步骤(1)G42变G6454LG32MAXIJX,1,0IJU(2)通常取CG2033G3999G1552G103850CU,然后根据实验结果G2172G5589G16855整隶属度G19420G1552(3)利用G1856G5347对G3282像进行模糊增强变G6454对G3282像进行模糊增强处理,采用如下G19762G13459性变G6454(其中RG1038G17857G1207次G6980)11IJRIJRIJUTTUTU18(4)进行运算G5483到模糊增强后的G3282像如果满G5859G2029G17728到G12544(G25)步,不满G5859G2029G17728到G12544(G24)步。(G24)根据实验的结果G2172G5589G16855整C的G1552,本G7003规定最G4579步G19283G1038G19G17G191,G6925变了C后,重新回到(3)。(G25)对增强后的空域G3282像进行平G9381运算,G9400G19512一定的G3134声G1209G1955G4581G3134声对下一步提取边缘的影G2721。(G26)利用NAKAGOWA和G53OSENFIELD提出的G256MING257G6122G256MAXG257算G4388提取边缘,提取出的G3282像的边缘G11709阵G1038EDGESG32NMGIJIJNMIJXXXMIN(G27)若检测结果理G5831,G2029算法结G7475。若不理G5831,G2029G2499能G7171C过G3835从G13792使G5483G13466G4579的边缘G9052G3845,G6122G13785G7171C过G4579从G13792过G3822G3332提取了次G16213的模糊边缘,在这样G1016G12193情况下G19668G16213G17832回到(2)。CG1552的选取G17331用G6155的G19668求G7389很G3835关G13007,用G6155根据G14270己G19668G16213G12373出G1039G5190边缘G6122G13785G19668G16213提取G13466G4579边缘的不同G16213求G2172G5589的选取C。(G28)算法结G7475。43检测结果影像二值化的研究及设计4G173G171灰度G3282像二G1552化的G5617G5831描述对象G5430状的二G1552G3282像G1146称G3282G5430,G3282G5430的G5430状G10317G5461G7171G3282像最本质的信G5699。在G8504目标提取程序中,G6117G1216最G13468G16213获G5483的G7171G3332G10301目标的G5430状G10317G5461,并根据不同的应用G16213求设定相应的二G1552化域G19492获G5483满足G19668G16213的G2465G7156提取结果的G3282像。4G173G172边缘检测结果灰度G3282像二G1552化的方法在提取了G3282像的边缘后,通常定G1053边缘检测G19388G19492T(G3282像二G1552化的G19388G19492)G1038A31,1,XJSTFIJN其中SG1038G6164G7389边G11040点的集合,NG1038边G11040点的总点G6980。然后G2499G1209G6365G10043下G19766G1856G5347G4448G6116G3282像的二G1552化1,0,FIJTFIJFIJTP本设计根据G19668G16213,采用G2454G6980G2499G16855方法,设G13634G2464G19388G194921T和2T,G1000G738921TTP,然后G2499G1209G6365G10043下G19766G1856G5347G4448G6116G3282像的二G1552化19211,1,0,FIJTFIJTFIJTFIJTPP44边缘检测结果去噪和细化的研究和设计由于G1821G13459变化和G6680影G6116像时的复杂条件,G3282像二G1552化后不G2499G18003G1825G1262G7389一些G3134声,G1867体表现在区域G18336G7389一些较G4408立的G10317G5461点。G3134声的存在不G1177影G2721G3282像的目标识别G451矢G18339化G12573工G1328,同时G1075G1262G19489G1314目标矢G18339化G6980据的空G19400定G1313G12946度。G3252G8504G5529G20047对二G1552化G3282像进行G2447G19512G3134声处理G11包括填G15929孔洞G451凹G19531和G2447G19512脏点G451毛刺G12573G12,G1209G5483到净化的二G1552G3282像。G1038了G9052G19512这些G3134声,本G7003采用八邻域点G9400波的方法,G2499G1209G7389G6940的G2447G19512G5190G6212,清G7236的分离出目标。(1)二G1552G3282像的G1039G16213G3134声及对矢G18339化G17908G6116的影G2721斑点二G1552G3282像中不连续的G4579像元块。在二G1552G3282像上呈随G7438分布,斑点对目标的连续性G8821G7389影G2721,G1306G1262G10995G6116G1563目标;G4579孔二G1552G3282像中存在的目标G13459G2022中G12373然出现的空G11345,往往出现在粗G13459G2022的G1881G18108。它的存在破坏了G13459G2022的连续性,G1262G17908G6116提取边缘的畸变;空隙二G1552G3282像中G13459条的微G4579G7041裂。它的存在G1262G13485矢G18339化G5114G7481G7041G13459,同样破坏了提取的边缘的连续性;边缘毛刺二G1552G3282像中目标G5050右边缘上的微G4579G12373出。它的存在G1262G5114G7481畸变边缘,从G13792G19489G1314矢G18339化的G1972何G12946度;边缘凹G19531二G1552G3282像中目标G5050右边缘上的微G4579G13582G2487。与边缘毛刺刚好相G2465,它的存在同样G2499G1209G17908G6116G13466化结果中的畸变。(2)G2447G3134方法G2447G19512二G1552G3282像中的G3134声通常使用模板方G5347,G2499G1209根据G1867体情况采用33模板G6122G24G24模板甚至更G3835。G1375如,G2499G1209采用G3282G25G241G6164示的模板,G2561G257G1207表G21669G14406像素G451G256G19G257G1207表G11345G14406像素G451G256G257G1207表G1231G5859像素。G1306G7171G256G257G2494能G1852G1038G2561G257G6122G1852G1038G256G19G257。G3282G25G241中G11AG12G3282G7186示的G7171G2447G19512毛刺和G4408立点的模板,G5415G256G257G1852G1038G256G19G257时G1207表G4408立点,G5415G256G257G1852G1038G2561G257时G1207表毛刺。扫描G3282像上的每一个像素,若中G5527像素与G11AG12中G6164示的模板相G2317G18209G11包括其旋G17728G989次G28G19G6164G5430G6116的模板G12,G2029中G5527像素由1变G1038G19。G3282G25G241中G11BG12G3282G7186示的G7171G2447G19512凹G19531和孔洞的模板,G5415G256G257G1852G1038G256G19G257时G1207表凹G19531,G5415G256G257G1852G1038G2561G257时G1207表孔洞。同理,扫描G3282像上的每一个像素,若中G5527像素与G11BG12中G6164示的模板相G2317G18209G11包括其旋G17728G989次G28G19G6164G5430G6116的模板G12,G2029中G5527像素由G19变G10381。20G11AG12G11AG12G11BG12G3282G25G241G2447G19512毛刺G451G4408立点G451孔洞和凹G19531的模板(3)二G1552化G3282像的G13466化G13459G13466化G7171提取G13459G

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论