图像科学综述 外文文献 外文翻译 英文文献

合集下载

图像识别中英文对照外文翻译文献

图像识别中英文对照外文翻译文献

中英文对照外文翻译文献(文档含英文原文和中文翻译)Elastic image matchingAbstractOne fundamental problem in image recognition is to establish the resemblance of two images. This can be done by searching the best pixel to pixel mapping taking into account monotonicity and continuity constraints. We show that this problem is NP-complete by reduction from 3-SAT, thus giving evidence that the known exponential time algorithms are justified, but approximation algorithms or simplifications are necessary.Keywords: Elastic image matching; Two-dimensional warping; NP-completeness 1. IntroductionIn image recognition, a common problem is to match two given images, e.g. when comparing an observed image to given references. In that pro-cess, elastic image matching, two-dimensional (2D-)warping (Uchida and Sakoe, 1998) or similar types of invariant methods (Keysers et al., 2000) can be used. For this purpose, we can define cost functions depending on the distortion introduced in the matching andsearch for the best matching with respect to a given cost function. In this paper, we show that it is an algorithmically hard problem to decide whether a matching between two images exists with costs below a given threshold. We show that the problem image matching is NP-complete by means of a reduction from 3-SAT, which is a common method of demonstrating a problem to be intrinsically hard (Garey and Johnson, 1979). This result shows the inherent computational difficulties in this type of image comparison, while interestingly the same problem is solvable for 1D sequences in polynomial time, e.g. the dynamic time warping problem in speech recognition (see e.g. Ney et al., 1992). This has the following implications: researchers who are interested in an exact solution to this problem cannot hope to find a polynomial time algorithm, unless P=NP. Furthermore, one can conclude that exponential time algorithms as presented and extended by Uchida and Sakoe (1998, 1999a,b, 2000a,b) may be justified for some image matching applications. On the other hand this shows that those interested in faster algorithms––e.g. for pattern recognition purposes––are right in searching for sub-optimal solutions. One method to do this is the restriction to local optimizations or linear approximations of global transformations as presented in (Keysers et al., 2000). Another possibility is to use heuristic approaches like simulated annealing or genetic algorithms to find an approximate solution. Furthermore, methods like beam search are promising candidates, as these are used successfully in speech recognition, although linguistic decoding is also an NP-complete problem (Casacuberta and de la Higuera, 1999). 2. Image matchingAmong the varieties of matching algorithms,we choose the one presented by Uchida and Sakoe(1998) as a starting point to formalize the problem image matching. Let the images be given as(without loss of generality) square grids of size M×M with gray values (respectively node labels)from a finite alphabet &={1,…,G}. To define thed:&×&→N , problem, two distance functions are needed,one acting on gray valuesg measuring the match in gray values, and one acting on displacement differences :Z×Z→N , measuring the distortion introduced by t he matching. For these distance ddfunctions we assume that they are monotonous functions (computable in polynomial time) of the commonly used squared Euclid-ean distance, i.ed g (g 1,g 2)=f 1(||g 1-g 2||²)and d d (z)=f 2(||z||²) monotonously increasing. Now we call the following optimization problem the image matching problem (let µ={1,…M} ).Instance: The pair( A ; B ) of two images A and B of size M×M .Solution: A mapping function f :µ×µ→µ×µ.Measure:c (A,B,f )=),(),(j i f ij g B Ad ∑μμ⨯∈),(j i+∑⨯-⋅⋅⋅∈+-+μ}1,{1,),()))0,1(),(())0,1(),(((M j i d j i f j i f dμ⨯-⋅⋅⋅∈}1,{1,),(M j i +∑⋅⋅⋅⨯∈+-+1}-M ,{1,),()))1,0(),(())1,0(),(((μj i d j i f j i f d 1}-M ,{1,),(⋅⋅⋅⨯∈μj iGoal:min f c(A,B,f).In other words, the problem is to find the mapping from A onto B that minimizes the distance between the mapped gray values together with a measure for the distortion introduced by the mapping. Here, the distortion is measured by the deviation from the identity mapping in the two dimensions. The identity mapping fulfills f(i,j)=(i,j),and therefore ,f((i,j)+(x,y))=f(i,j)+(x,y)The corresponding decision problem is fixed by the followingQuestion:Given an instance of image matching and a cost c′, does there exist a ma pping f such that c(A,B,f)≤c′?In the definition of the problem some care must be taken concerning the distance functions. For example, if either one of the distance functions is a constant function, the problem is clearly in P (for d g constant, the minimum is given by the identity mapping and for d d constant, the minimum can be determined by sorting all possible matching for each pixel by gray value cost and mapping to one of the pixels with minimum cost). But these special cases are not those we are concerned with in image matching in general.We choose the matching problem of Uchida and Sakoe (1998) to complete the definition of the problem. Here, the mapping functions are restricted by continuity and monotonicity constraints: the deviations from the identity mapping may locally be at most one pixel (i.e. limited to the eight-neighborhood with squared Euclidean distance less than or equal to 2). This can be formalized in this approach bychoosing the functions f1,f2as e.g.f 1=id,f2(x)=step(x):=⎩⎨⎧.2,)10(,2,0>≤⋅xGxMM3. Reduction from 3-SAT3-SAT is a very well-known NP-complete problem (Garey and Johnson, 1979), where 3-SAT is defined as follows:Instance: Collection of clauses C={C1,···,CK} on a set of variables X={x1, (x)L}such that each ckconsists of 3 literals for k=1,···K .Each literal is a variable or the negation of a variable.Question:Is there a truth assignment for X which satisfies each clause ck, k=1,···K ?The dependency graph D(Ф)corresponding to an instance Ф of 3-SAT is defined to be the bipartite graph whose independent sets are formed by the set of clauses Cand the set of variables X .Two vert ices ck and x1are adjacent iff ckinvolvesx 1or-xL.Given any 3-SAT formula U, we show how to construct in polynomial time anequivalent image matching problem l(Ф)=(A(Ф),B(Ф)); . The two images of l (Ф)are similar according to the cost function (i.e.f:c(A(Ф),B(Ф),f)≤0) iff the formulaФ is satisfiable. We perform the reduction from 3-SAT using the following steps:• From the formula Ф we construct the dependency graph D(Ф).• The dependency graph D(Ф)is drawn in the plane.• The drawing of D(Ф)is refined to depict the logical behaviour of Ф , yielding two images(A(Ф),B(Ф)).For this, we use three types of components: one component to represent variables of Ф , one component to represent clauses of Ф, and components which act as interfaces between the former two types. Before we give the formal reduction, we introduce these components.3.1. Basic componentsFor the reduction from 3-SAT we need five components from which we will construct the in-stances for image matching , given a Boolean formula in 3-DNF,respectively its graph. The five components are the building blocks needed for the graph drawing and will be introduced in the following, namely the representations of connectors,crossings, variables, and clauses. The connectors represent the edges and have two varieties, straight connectors and corner connectors. Each of the components consists of two parts, one for image A and one for image B , where blank pixels are considered to be of the‘background ’color.We will depict possible mappings in the following using arrows indicating the direction of displacement (where displacements within the eight-neighborhood of a pixel are the only cases considered). Blank squares represent mapping to the respective counterpart in the second image.For example, the following displacements of neighboring pixels can be used with zero cost:On the other hand, the following displacements result in costs greater than zero:Fig. 1 shows the first component, the straight connector component, which consists of a line of two different interchanging colors,here denoted by the two symbols◇and□. Given that the outside pixels are mapped to their respe ctive counterparts and the connector is continued infinitely, there are two possible ways in which the colored pixels can be mapped, namely to the left (i.e. f(2,j)=(2,j-1)) or to the right (i.e. f(2,j)=(2,j+1)),where the background pixels have different possibilities for the mapping, not influencing the main property of the connector. This property, which justifies the name ‘connector ’, is the following: It is not possible to find a mapping, which yields zero cost where the relative displacements of the connector pixels are not equal, i.e. one always has f(2,j)-(2,j)=f(2,j')-(2,j'),which can easily be observed by induction over j'.That is, given an initial displacement of one pixel (which will be ±1 in this context), the remaining end of the connector has the same displacement if overall costs of the mapping are zero. Given this property and the direction of a connector, which we define to be directed from variable to clause, wecan define the state of the connector as carrying the‘true’truth value, if the displacement is 1 pixel in the direction of the connector and as carrying the‘false’ truth value, if the displacement is -1 pixel in the direction of the connector. This property then ensures that the truth value transmitted by the connector cannot change at mappings of zero cost.Image A image Bmapping 1 mapping 2Fig. 1. The straight connector component with two possible zero cost mappings.For drawing of arbitrary graphs, clearly one also needs corners,which are represented in Fig. 2.By considering all possible displacements which guarantee overall cost zero, one can observe that the corner component also ensures the basic connector property. For example, consider the first depicted mapping, which has zero cost. On the other hand, the second mapping shows, that it is not possible to construct a zero cost mapping with both connectors‘leaving’the component. In that case, the pixel at the position marked‘? ’either has a conflict (that i s, introduces a cost greater than zero in the criterion function because of mapping mismatch) with the pixel above or to the right of it,if the same color is to be met and otherwise, a cost in the gray value mismatch term is introduced.image A image Bmapping 1 mapping 2Fig. 2. The corner connector component and two example mappings.Fig. 3 shows the variable component, in this case with two positive (to the left) and one negated output (to the right) leaving the component as connectors. Here, a fourth color is used, denoted by ·.This component has two possible mappings for thecolored pixels with zero cost, which map the vertical component of the source image to the left or the right vertical component in the target image, respectively. (In both cases the second vertical element in the target image is not a target of the mapping.) This ensures±1 pixel relative displacements at the entry to the connectors. This property again can be deducted by regarding all possible mappings of the two images.The property that follows (which is necessary for the use as variable) is that all zero cost mappings ensure that all positive connectors carry the same truth value,which is the opposite of the truth value for all the negated connectors. It is easy to see from this example how variable components for arbitrary numbers of positive and negated outputs can be constructed.image A image BImage C image DFig. 3. The variable component with two positive and one negated output and two possible mappings (for true and false truth value).Fig. 4 shows the most complex of the components, the clause component. This component consists of two parts. The first part is the horizontal connector with a 'bend' in it to the right.This part has the property that cost zero mappings are possible for all truth values of x and y with the exception of two 'false' values. This two input disjunction,can be extended to a three input dis-junction using the part in the lower left. If the z connector carries a 'false' truth value, this part can only be mapped one pixel downwards at zero cost.In that case the junction pixel (the fourth pixel in the third row) cannot be mapped upwards at zero cost and the 'two input clause' behaves as de-scribed above. On the other hand, if the z connector carries a 'true' truth value, this part can only be mapped one pixel upwards at zero cost,and the junction pixel can be mapped upwards,thus allowing both x and y to carry a 'false' truth value in a zero cost mapping. Thus there exists a zero cost mapping of the clause component iff at least one of the input connectors carries a truth value.image Aimage B mapping 1(true,true,false)mapping 2 (false,false,true,)Fig. 4. The clause component with three incoming connectors x, y , z and zero cost mappings forthe two cases(true,true,false)and (false, false, true).The described components are already sufficient to prove NP-completeness by reduction from planar 3-SAT (which is an NP-complete sub-problem of 3-SAT where the additional constraints on the instances is that the dependency graph is planar),but in order to derive a reduction from 3-SAT, we also include the possibility of crossing connectors.Fig. 5 shows the connector crossing, whose basic property is to allow zero cost mappings if the truth–values are consistently propagated. This is assured by a color change of the vertical connector and a 'flexible' middle part, which can be mapped to four different positions depending on the truth value distribution.image Aimage Bzero cost mappingFig. 5. The connector crossing component and one zero cost mapping.3.2. ReductionUsing the previously introduced components, we can now perform the reduction from 3-SAT to image matching .Proof of the claim that the image matching problem is NP-complete:Clearly, the image matching problem is in NP since, given a mapping f and two images A and B ,the computation of c(A,B,f)can be done in polynomial time. To prove NP-hardness, we construct a reduction from the 3-SAT problem. Given an instance of 3-SAT we construct two images A and B , for which a mapping of cost zero exists iff all the clauses can be satisfied.Given the dependency graph D ,we construct an embedding of the graph into a 2D pixel grid, placing the vertices on a large enough distance from each other (say100(K+L)² ).This can be done using well-known methods from graph drawing (see e.g.di Battista et al.,1999).From this image of the graph D we construct the two images A and B , using the components described above.Each vertex belonging to a variable is replaced with the respective parts of the variable component, having a number of leaving connectors equal to the number of incident edges under consideration of the positive or negative use in the respective clause. Each vertex belonging to a clause is replaced by the respective clause component,and each crossing of edges is replaced by the respective crossing component. Finally, all the edges are replaced with connectors and corner connectors, and the remaining pixels inside the rectangular hull of the construction are set to the background gray value. Clearly, the placement of the components can be done in such a way that all the components are at a large enough distance from each other, where the background pixels act as an 'insulation' against mapping of pixels, which do not belong to the same component. It can be easily seen, that the size of the constructed images is polynomial with respect to the number of vertices and edges of D and thus polynomial in the size of the instance of 3-SAT, at most in the order (K+L)².Furthermore, it can obviously be constructed in polynomial time, as the corresponding graph drawing algorithms are polynomial.Let there exist a truth assignment to the variables x1,…,xL, which satisfies allthe clauses c1,…,cK. We construct a mapping f , that satisfies c(f,A,B)=0 asfollows.For all pixels (i, j ) belonging to variable component l with A(i,j)not of the background color,set f(i,j)=(i,j-1)if xlis assigned the truth value 'true' , set f(i,j)=(i,j+1), otherwise. For the remaining pixels of the variable component set A(i,j)=B(i,j),if f(i,j)=(i,j), otherwise choose f(i,j)from{(i,j+1),(i+1,j+1),(i-1,j+1)}for xl'false' respectively from {(i,j-1),(i+1,j-1),(i-1,j-1)}for xl'true ',such that A(i,j)=B(f(i,j)). This assignment is always possible and has zero cost, as can be easily verified.For the pixels(i,j)belonging to (corner) connector components,the mapping function can only be extended in one way without the introduction of nonzero cost,starting from the connection with the variable component. This is ensured by thebasic connector property. By choosing f (i ,j )=(i,j )for all pixels of background color, we obtain a valid extension for the connectors. For the connector crossing components the extension is straight forward, although here ––as in the variable mapping ––some care must be taken with the assign ment of the background value pixels, but a zero cost assignment is always possible using the same scheme as presented for the variable mapping.It remains to be shown that the clause components can be mapped at zero cost, if at least one of the input connectors x , y , z carries a ' true' truth value.For a proof we regard alls even possibilities and construct a mapping for each case. In thedescription of the clause component it was already argued that this is possible,and due to space limitations we omit the formalization of the argument here.Finally, for all the pixels (i ,j )not belonging to any of the components, we set f (i ,j )=(i ,j )thus arriving at a mapping function which has c (f ,A ,B )=0。

外文文献及翻译DigitalImageProcessingandEdgeDetection数字图像处理与边缘检测

外文文献及翻译DigitalImageProcessingandEdgeDetection数字图像处理与边缘检测

Digital Image Processing and Edge DetectionDigital Image ProcessingInterest in digital image processing methods stems from two principal applica- tion areas: improvement of pictorial information for human interpretation; and processing of image data for storage, transmission, and representation for au- tonomous machine perception.An image may be defined as a two-dimensional function, f(x, y), where x and y are spatial (plane) coordinates, and the amplitude of f at any pair of coordinates (x, y) is called the intensity or gray level of the image at that point. When x, y, and the amplitude values of f are all finite, discrete quantities, we call the image a digital image. The field of digital image processing refers to processing digital images by means of a digital computer. Note that a digital image is composed of a finite number of elements, each of which has a particular location and value. These elements are referred to as picture elements, image elements, pels, and pixels. Pixel is the term most widely used to denote the elements of a digital image.Vision is the most advanced of our senses, so it is not surprising that images play the single most important role in human perception. However, unlike humans, who are limited to the visual band of the electromagnetic (EM) spec- trum, imaging machines cover almost the entire EM spectrum, ranging from gamma to radio waves. They can operate on images generated by sources that humans are not accustomed to associating with images. These include ultra- sound, electron microscopy, and computer-generated images. Thus, digital image processing encompasses a wide and varied field of applications.There is no general agreement among authors regarding where image processing stops and other related areas, such as image analysis and computer vi- sion, start. Sometimes a distinction is made by defining image processing as a discipline in which both the input and output of a process are images. We believe this to be a limiting and somewhat artificial boundary. For example, under this definition, even the trivial task of computing the average intensity of an image (which yields a single number) would not be considered an image processing operation. On the other hand, there are fields such as computer vision whose ultimate goal is to use computers to emulate human vision, including learning and being able to make inferences and take actions based on visual inputs. This area itself is a branch of artificial intelligence (AI) whose objective is to emulate human intelligence. The field of AI is in its earliest stages of infancy in terms of development, with progress having been much slower than originally anticipated. The area of image analysis (also called image understanding) is in be- tween image processing and computer vision.There are no clearcut boundaries in the continuum from image processing at one end to computer vision at the other. However, one useful paradigm is to consider three types of computerized processes in this continuum: low-, mid-, and highlevel processes. Low-level processes involve primitive opera- tions such as imagepreprocessing to reduce noise, contrast enhancement, and image sharpening. A low-level process is characterized by the fact that both its inputs and outputs are images. Mid-level processing on images involves tasks such as segmentation (partitioning an image into regions or objects), description of those objects to reduce them to a form suitable for computer processing, and classification (recognition) of individual objects. A midlevel process is characterized by the fact that its inputs generally are images, but its outputs are attributes extracted from those images ., edges, contours, and the identity of individual objects). Finally, higherlevel processing involves “making sense” of an ensemble of recognized objects, as in image analysis, and, at the far end of the continuum, performing the cognitive functions normally associated with vision.Based on the preceding comments, we see that a logical place of overlap between image processing and image analysis is the area of recognition of individual regions or objects in an image. Thus, what we call in this book digital image processing encompasses processes whose inputs and outputs are images and, in addition, encompasses processes that extract attributes from images, up to and including the recognition of individual objects. As a simple illustration to clarify these concepts, consider the area of automated analysis of text. The processes of acquiring an image of the area containing the text, preprocessing that image, extracting (segmenting) the individual characters, describing the characters in a form suitable for computer processing, and recognizing those individual characters are in the scope of what we call digital image processing in this book. Making sense of the content of the page may be viewed as being in the domain of image analysis and even computer vision, depending on the level of complexity implied by the statement “making sense.” As will become evident shortly, digital image processing, as we have defined it, is used successfully in a broad range of areas of exceptional social and economic value.The areas of application of digital image processing are so varied that some form of organization is desirable in attempting to capture the breadth of this field. One of the simplest ways to develop a basic understanding of the extent of image processing applications is to categorize images according to their source ., visual, X-ray, and so on). The principal energy source for images in use today is the electromagnetic energy spectrum. Other important sources of energy include acoustic, ultrasonic, and electronic (in the form of electron beams used in electron microscopy). Synthetic images, used for modeling and visualization, are generated by computer. In this section we discuss briefly how images are generated in these various categories and the areas in which they are applied.Images based on radiation from the EM spectrum are the most familiar, es- pecially images in the X-ray and visual bands of the spectrum. Electromagnet- ic waves can be conceptualized as propagating sinusoidal waves of varying wavelengths, or they can be thought of as a stream of massless particles, each traveling in a wavelike pattern and moving at the speed of light. Each massless particle contains a certain amount (or bundle) of energy. Each bundle of energy is called a photon. If spectral bands aregrouped according to energy per photon, we obtain the spectrum shown in fig. below, ranging from gamma rays (highest energy) at one end to radio waves (lowest energy) at the other. The bands are shown shaded to convey the fact that bands of the EM spectrum are not distinct but rather transition smoothly from one to the other.Image acquisition is the first process. Note that acquisition could be as simple as being given an image that is already in digital form. Generally, the image acquisition stage involves preprocessing, such as scaling.Image enhancement is among the simplest and most appealing areas of digital image processing. Basically, the idea behind enhancement techniques is to bring out detail that is obscured, or simply to highlight certain features of interest in an image. A familiar example of enhancement is when we increase the contrast of a n image because “it looks better.” It is important to keep in mind that enhancement is a very subjective area of image processing. Image restoration is an area that also deals with improving the appearance of an image. However, unlike enhancement, which is subjective, image restoration is objective, in the sense that restoration techniques tend to be based on mathematical or probabilistic models of image degradation. Enhancement, on the other hand, is based on human subjective preferences regarding what constitutes a “good” enhancement result.Color image processing is an area that has been gaining in importance because of the significant increase in the use of digital images over the Internet. It covers a number of fundamental concepts in color models and basic color processing in a digital domain. Color is used also in later chapters as the basis for extracting features of interest in an image.Wavelets are the foundation for representing images in various degrees of resolution. In particular, this material is used in this book for image data compression and for pyramidal representation, in which images are subdivided successively into smaller regions.Compression, as the name implies, deals with techniques for reducing the storage required to save an image, or the bandwidth required to transmi storage technology has improved significantly over the past decade, the same cannot be said for transmission capacity. This is true particularly in uses of the Internet, which are characterized by significant pictorial content. Image compression is familiar (perhaps inadvertently) to most users of computers in the form of image file extensions, such as the jpg file extension used in the JPEG (Joint Photographic Experts Group) image compression standard.Morphological processing deals with tools for extracting image components that are useful in the representation and description of shape. The material in this chapter begins a transition from processes that output images to processes that output image attributes.Segmentation procedures partition an image into its constituent parts or objects. In general, autonomous segmentation is one of the most difficult tasks in digital image processing. A rugged segmentation procedure brings the process a long way toward successful solution of imaging problems that require objects to be identified individually. On the other hand, weak or erratic segmentation algorithms almost always guarantee eventual failure. In general, the more accurate the segmentation, the more likely recognition is to succeed.Representation and description almost always follow the output of a segmentation stage, which usually is raw pixel data, constituting either the bound- aryof a region ., the set of pixels separating one image region from another) or all the points in the region itself. In either case, converting the data to a form suitable for computer processing is necessary. The first decision that must be made is whether the data should be represented as a boundary or as a complete region. Boundary representation is appropriate when the focus is on external shape characteristics, such as corners and inflections. Regional representation is appropriate when the focus is on internal properties, such as texture or skeletal shape. In some applications, these representations complement each other. Choosing a representation is only part of the solution for trans- forming raw data into a form suitable for subsequent computer processing. A method must also be specified for describing the data so that features of interest are highlighted. Description, also called feature selection, deals with extracting attributes that result in some quantitative information of interest or are basic for differentiating one class of objects from another.Recognition is the process that assigns a label ., “vehicle”) to an object based on its descriptors. As detailed before, we conclude our coverage of digital image processing with the development of methods for recognition of individual objects.So far we have said nothing about the need for prior knowledge or about the interaction between the knowledge base and the processing modules in Fig2 above. Knowledge about a problem domain is coded into an image processing system in the form of a knowledge database. This knowledge may be as sim- ple as detailing regions of an image where the information of interest is known to be located, thus limiting the search that has to be conducted in seeking that information. The knowledge base also can be quite complex, such as an interrelated list of all major possible defects in a materials inspection problem or an image database containing high-resolution satellite images of a region in con- nection with change-detection applications. In addition to guiding the operation of each processing module, the knowledge base also controls the interaction between modules. This distinction is made in Fig2 above by the use of double-headed arrows between the processing modules and the knowledge base, as op- posed to single-headed arrows linking the processing modules.Edge detectionEdge detection is a terminology in and , particularly in the areas of and , to refer to which aim at identifying points in a at which the changes sharply or more formally has point and line detection certainly are important in any discussion on segmentation,edge dectection is by far the most common approach for detecting meaningful discounties in gray level.Although certain literature has considered the detection of ideal step edges, the edges obtained from natural images are usually not at all ideal step edges. Instead they are normally affected by one or several of the following effects: blur caused by a finite and finite ; 2. caused by shadows created by light sources of non-zero radius; 3. at a smooth object edge; or in the vicinity of object edges.A typical edge might for instance be the border between a block of red color and a blockof yellow. In contrast a (as can be extracted by a ) can be a small number of pixels of a different color on an otherwise unchanging background. For a line, there may therefore usually be one edge on each side of the line.To illustrate why edge detection is not a trivial task, let us consider the problem of detecting edges in the following one-dimensional signal. Here, we may intuitively say that there should be an edge between the 4th and 5th pixels.5 76 4 152 148 149If if the intensity differences between the adjacent neighbouring pixels were higher, it would not be as easy to say that there should be an edge in the corresponding region. Moreover, one could argue that this case is one in which there are several , to firmly state a specific threshold on how large the intensity change between two neighbouring pixels must be for us to say that there should be an edge between these pixels is not always a simple problem. Indeed, this is one of the reasons why edge detection may be a non-trivial problem unless the objects in the scene are particularly simple and the illumination conditions can be well controlled.There are many methods for edge detection, but most of them can be grouped into two categories,search-based and based. The search-based methods detect edges by first computing a measure of edge strength, usually a first-order derivative expression such as the gradient magnitude, and then searching for local directional maxima of the gradient magnitude using a computed estimate of the local orientation of the edge, usually the gradient direction. The zero-crossing based methods search for zero crossings in a second-order derivative expression computed from the image in order to find edges, usually the zero-crossings of the or the zero-crossings of a non-linear differential expression, as will be described in the section on following below. As a pre-processing step to edge detection, a smoothing stage, typically Gaussian smoothing, is almost always applied (see also ).The edge detection methods that have been published mainly differ in the types of smoothing filters that are applied and the way the measures of edge strength are computed. As many edge detection methods rely on the computation of image gradients, they also differ in the types of filters used for computing gradient estimates in the x- and y-directions.Once we have computed a measure of edge strength (typically the gradient magnitude), the next stage is to apply a threshold, to decide whether edges are present or not at an image point. The lower the threshold, the more edges will be detected, and the result will be increasingly susceptible to , and also to picking out irrelevant features from the image. Conversely a high threshold may miss subtle edges, or result in fragmented edges.If the edge thresholding is applied to just the gradient magnitude image, the resulting edges will in general be thick and some type of edge thinning post-processing is necessary. For edges detected with non-maximum suppression however, the edge curves are thin by definition and the edge pixels can be linked into edge polygon by an edge linking (edge tracking) procedure. On a discrete grid, the non-maximum suppression stage can be implemented by estimating the gradient direction using first-order derivatives, then rounding off the gradient direction to multiples of 45 degrees, and finally comparing the values of the gradient magnitude in the estimated gradient direction.A commonly used approach to handle the problem of appropriate thresholds for thresholding is by using with . This method uses multiple thresholds to find edges. We begin by using the upper threshold to find the start of an edge. Once we have a start point, we then trace the path of the edge through the image pixel by pixel, marking an edge whenever we are above the lower threshold. We stop marking our edge only when the value falls below our lower threshold. This approach makes the assumption that edges are likely to be in continuous curves, and allows us to follow a faint section of an edge we have previously seen, without meaning that every noisy pixel in the image is marked down as an edge. Still, however, we have the problem of choosing appropriate thresholding parameters, and suitable thresholding values may vary over the image.Some edge-detection operators are instead based upon second-order derivatives of the intensity. This essentially captures the in the intensity gradient. Thus, in the ideal continuous case, detection of zero-crossings in the second derivative captures local maxima in the gradient.We can come to a conclusion that,to be classified as a meaningful edge point,the transition in gray level associated with that point has to be significantly stronger than the background at that we are dealing with local computations,the method of choice to determine whether a value is “significant” or not id to use a we define a point in an image as being as being an edge point if its two-dimensional first-order derivative is greater than a specified criterion of connectedness is by definition an term edge segment generally is used if the edge is short in relation to the dimensions of the key problem in segmentation is to assemble edge segments into longer alternate definition if we elect to use the second-derivative is simply to define the edge ponits in an image as the zero crossings of its second definition of an edge in this case is the same as is important to note that these definitions do not guarantee success in finding edge in an simply give us a formalism to look for derivatives in an image are computed using the derivatives are obtained using the Laplacian.数字图像处理与边缘检测数字图像处理数字图像处理方法的研究源于两个主要应用领域:其一是为了便于人们分析而对图像信息进行改进:其二是为使机器自动理解而对图像数据进行存储、传输及显示。

关于机器视觉的外文文献

关于机器视觉的外文文献

关于机器视觉的外文文献Title: Overview of Machine Vision: Technologies and ApplicationsAbstract:Machine vision is an important technology that enables computers to interpret visual information from images or videos. This paper provides an overview of the technologies behind machine vision and their various applications. Thefirst section covers the basics of machine vision, including image acquisition, processing, and analysis. The secondsection discusses some common machine vision techniques suchas pattern recognition, object detection and classification. The third section gives examples of machine vision applications, including manufacturing, medical diagnosis, and surveillance.Introduction:Machine vision has become increasingly important in many fields, from manufacturing to medical diagnosis to robotics.It is a technology that allows computers to interpret visual information from images or videos, enabling them to make automated decisions based on that information. This paperwill provide an overview of machine vision technologies and their applications.Section 1: Basics of Machine Vision1.1 Image Acquisition: This section discusses the different ways in which images or videos can be captured and stored for machine vision applications. It covers topics such as cameras, sensors, and storage devices.1.2 Image Processing: This section explains the different methods used to clean up and enhance images before analysis. Techniques such as filtering and image segmentation are discussed.1.3 Image Analysis: This section discusses the different algorithms used to analyze images and extract important features such as edges, corners, and textures.Section 2: Machine Vision Techniques2.1 Pattern Recognition: This section covers the basics of pattern recognition and its importance in machine vision. Methods such as template matching and machine learning are discussed.2.2 Object Detection: This section explains the different ways in which objects can be detected in a scene, including feature-based methods and deep learning.2.3 Object Classification: This section covers the different algorithms used to classify objects based on their features or attributes. Methods such as decision trees and support vector machines are discussed.Section 3: Applications of Machine Vision3.1 Manufacturing: This section discusses the various applications of machine vision in manufacturing, including quality control, inspection, and assembly.3.2 Medical Diagnosis: This section covers the different ways in which machine vision can be used for medical diagnosis, including pathology, radiology, and ophthalmology.3.3 Surveillance: This section explains the different ways in which machine vision can be used for surveillance, including face recognition and crowd monitoring.Conclusion:Machine vision is a powerful technology that is becomingincreasingly important in many fields. With its ability to interpret visual information and make automated decisions based on that data, it has the potential to revolutionize the way we live and work. As the technology continues to evolve and improve, we can expect to see even more exciting applications of machine vision in the future.。

(完整word版)光学外文文献及翻译

(完整word版)光学外文文献及翻译

学号2013211033 昆明理工大学专业英语专业光学姓名辜苏导师李重光教授分数导师签字日期2015年5月6日研究生部专业英语考核In digital holography, the recording CCD is placed on the ξ-ηplane in order to register the hologramx ',y 'when the object lies inthe x-y plane. Forthe reconstruction ofthe information ofthe object wave,phase-shifting digital holography includes two steps:(1) getting objectwave on hologram plane, and (2) reconstructing original object wave.2.1 Getting information of object wave on hologram plateDoing phase shifting N-1 times and capturing N holograms. Supposing the interferogram after k- 1 times phase-shifting is]),(cos[),(),(),,(k k b a I δηξφηξηξδηξ-⋅+= (1) Phase detection can apply two kinds of algorithms:synchronous phase detection algorithms [9]and the least squares iterative algorithm [10]. The four-step algorithm in synchronous phase detection algorithm is in common use. The calculation equation is)2/3,,(),,()]2/,,()0,,([2/1),(πηξπηξπηξηξηξiI I iI I E --+=2.2 Reconstructing original object wave by reverse-transform algorithmObject wave from the original object spreads front.The processing has exact and clear description and expression in physics and mathematics. By phase-shifting technique, we have obtained information of the object wave spreading to a certain distance from the original object. Therefore, in order to get the information of the object wave at its initial spreading position, what we need to do is a reverse work.Fig.1 Geometric coordinate of digital holographyexact registering distance.The focusing functions normally applied can be divided into four types: gray and gradient function, frequency-domain function, informatics function and statistics function. Gray evaluation function is easy to calculate and also robust. It can satisfy the demand of common focusing precision. We apply the intensity sum of reconstruction image as the evaluation function:min ),(11==∑∑==M k Nl l k SThe calculation is described in Fig.2. The position occurring the turning point correspondes to the best registration distanced, also equals to the reconstructing distance d '.It should be indicated that if we only need to reconstruct the phase map of the object wave, the registration distance substituted into the calculation equation is permitted having a departure from its true value.4 Spatial resolution of digital holography4.1 Affecting factors of the spatial resolution of digital holographyIt should be considered in three respects: (1) sizes of the object and the registering material, and the direction of the reference beam, (2) resolution of the registering material, and (3) diffraction limitation.For pointx2on the object shown in Fig.3, the limits of spatial frequency are λξθλθθ⎥⎦⎤⎢⎣⎡⎪⎪⎭⎫ ⎝⎛-'-=-=-0211maxmax tan sin sin sin sin z x f R R Fig.2 Determining reconstructing distanceλξθλθθ⎥⎦⎤⎢⎣⎡⎪⎪⎭⎫⎝⎛-'-=-=-211minmintansinsinsinsin zxfRRFrequency range isλξξ⎥⎦⎤⎢⎣⎡⎪⎪⎭⎫⎝⎛-'-⎥⎦⎤⎢⎣⎡⎪⎪⎭⎫⎝⎛-=∆--211211tansintansinzxzxfso the range is unrelated to the reference beam.Considering the resolution of registering material in order to satisfy the sampling theory, phase difference between adjacent points on the recording plate should be less than π, namely resolution of the registration material.cfff=∆η21)(minmaxπ4.2 Expanding the spatial resolution of reconstruction imageExpanding the spatial resolution can be realized at least in three ways: (1) Reducing the registration distance z0 can improve the reconstruction resolution, but it goes with reduction of the reconstruction area at the same ratio.Therefore, this method has its limitation. (2) Increasing the resolution and the imaging size of CCD with expensive price. (3) Applying image-synthesizing technique[11]CCD captures a few of images between which there is small displacement (usually a fraction of the pixel size) vertical to the CCD plane, shown in Fig.4(Schematic of vertical moving is the same).This method has two disadvantages. First, it is unsuitable for dynamic testing and can only be applied in the static image reconstruction. Second, because the pixel size is small (usually 5μm to 10μm) and the displacement should a fraction of this size (for example 2μm), it needs a moving table with high resolution and precision. Also it needs high stability in whole testing.In general, improvement of the spatial resolution of digital reconstruction is Fig.3 Relationship between object and CCDstill a big problem for the application of digital holography.5 Testing resultsFig.5 is the photo of the testing system. The paper does testing on two coins. The pixel size of the CCD is 4.65μm and there are 1 392×1 040 pixels. The firstis one Yuan coin of RMB (525 mm) used for image reconstruction by phase-shifting digital holography. The second is one Jiao coin of RMB (520 mm) for the testing of deformation measurement also by phase-shifting digital holography.5.1 Result of image reconstructionThe dimension of the one Yuancoin is 25 mm. The registrationdistance measured by ruler isabout 385mm. We capture ourphase-shifting holograms andreconstruct the image byphase-shifting digital holography.Fig.6 is the reconstructed image.Fig.7 is the curve of the auto-focusFig.4 Image capturing by moving CCD along horizontal directionFig.5 Photo of the testing systemfunction, from which we determine the real registration distance 370 mm. We can also change the controlling precision, for example 5mm, 0.1 mm,etc., to get more course or precision reconstruction position.5.2 Deformation measurementIn digital holography, the method of measuring deformation measurement differs from the traditional holography. It gets object wave before and after deformation and then subtract their phases to obtain the deformation. The study tested effect of heating deformation on the coin of one Jiao. The results are shown in Fig.8, Where (a) is the interferential signal of the object waves before and after deformation, and (b) is the wrapped phase difference.5.3 Improving the spatial resolutionFor the tested coin, we applied four sub-low-resolution holograms to reconstruct the high-resolution by the image-synthesizing technique. Fig.9 (a) is the reconstructed image by one low-resolution hologram, and (b) is the high-resolution image reconstructed from four low-resolution holograms.Fig.6 Reconstructed image Fig.7 Auto-focus functionFig.8 Heating deformation resultsFig.9 Comparing between the low and high resolution reconstructed image6 SummaryDigital holography can obtain phase and amplitude of the object wave at the same time. Compared to other techniques is a big advantage. Phase-shifting digital holography can realize image reconstruction and deformation with less noise. But it is unsuitable for dynamic testing. Applying the intensity sum of the reconstruction image as the auto-focusing function to evaluate the registering distance is easy, and computation is fast. Its precision is also sufficient. The image-synthesizing technique can improve spatial resolution of digital holography, but its static characteristic reduces its practicability. The limited dimension and too big pixel size are still the main obstacles for widely application of digital holography.外文文献译文:标题:图像重建中的相移数字全息摘要:相移数字全息术被用来研究研究艺术品的内部缺陷。

医学影像学英文文献

医学影像学英文文献

医学影像学英文文献英文回答:Within the realm of medical imaging, sophisticated imaging techniques empower healthcare professionals with the ability to visualize and comprehend anatomical structures and physiological processes in the human body. These techniques are instrumental in diagnosing diseases, guiding therapeutic interventions, and monitoring treatment outcomes.Computed tomography (CT) and magnetic resonance imaging (MRI) are two cornerstone imaging modalities widely employed in medical practice. CT utilizes X-rays and advanced computational algorithms to generate cross-sectional images of the body, providing detailed depictions of bones, soft tissues, and blood vessels. MRI, on the other hand, harnesses the power of powerful magnets and radiofrequency waves to create intricate images that excel in showcasing soft tissue structures, including the brain,spinal cord, and internal organs.Positron emission tomography (PET) and single-photon emission computed tomography (SPECT) are nuclear medicine imaging techniques that involve the administration of radioactive tracers into the body. These tracers accumulate in specific organs or tissues, enabling the visualization and assessment of metabolic processes and disease activity. PET is particularly valuable in oncology, as it can detect the presence and extent of cancerous lesions.Ultrasound, also known as sonography, utilizes high-frequency sound waves to produce images of internal structures. It is a versatile technique commonly employed in obstetrics, cardiology, and abdominal imaging. Ultrasound offers real-time visualization, making it ideal for guiding procedures such as biopsies and injections.Interventional radiology is a specialized field that combines imaging guidance with minimally invasive procedures. Interventional radiologists utilize imaging techniques to precisely navigate catheters and otherinstruments through the body, enabling the diagnosis and treatment of conditions without the need for open surgery. This approach offers reduced invasiveness and faster recovery times compared to traditional surgical interventions.Medical imaging has revolutionized healthcare by providing invaluable insights into the human body. The ability to visualize anatomical structures andphysiological processes in exquisite detail has transformed the practice of medicine, leading to more accurate diagnoses, targeted treatments, and improved patient outcomes.中文回答:医学影像学是现代医学不可或缺的一部分,它利用各种成像技术对人体的解剖结构和生理过程进行可视化和理解,在疾病诊断、治疗方案制定和治疗效果评估中发挥着至关重要的作用。

外文翻译----数字图像处理和模式识别技术关于检测癌症的应用

外文翻译----数字图像处理和模式识别技术关于检测癌症的应用

引言英文文献原文Digital image processing and pattern recognition techniques for the detection of cancerCancer is the second leading cause of death for both men and women in the world , and is expected to become the leading cause of death in the next few decades . In recent years , cancer detection has become a significant area of research activities in the image processing and pattern recognition community .Medical imaging technologies have already made a great impact on our capabilities of detecting cancer early and diagnosing the disease more accurately . In order to further improve the efficiency and veracity of diagnoses and treatment , image processing and pattern recognition techniques have been widely applied to analysis and recognition of cancer , evaluation of the effectiveness of treatment , and prediction of the development of cancer . The aim of this special issue is to bring together researchers working on image processing and pattern recognition techniques for the detection and assessment of cancer , and to promote research in image processing and pattern recognition for oncology . A number of papers were submitted to this special issue and each was peer-reviewed by at least three experts in the field . From these submitted papers , 17were finally selected for inclusion in this special issue . These selected papers cover a broad range of topics that are representative of the state-of-the-art in computer-aided detection or diagnosis(CAD)of cancer . They cover several imaging modalities(such as CT , MRI , and mammography) and different types of cancer (including breast cancer , skin cancer , etc.) , which we summarize below .Skin cancer is the most prevalent among all types of cancers . Three papers in this special issue deal with skin cancer . Y uan et al. propose a skin lesion segmentation method. The method is based on region fusion and narrow-band energy graph partitioning . The method can deal with challenging situations with skin lesions , such as topological changes , weak or false edges , and asymmetry . T ang proposes a snake-based approach using multi-direction gradient vector flow (GVF) for the segmentation of skin cancer images . A new anisotropic diffusion filter is developed as a preprocessing step . After the noise is removed , the image is segmented using a GVF1snake . The proposed method is robust to noise and can correctly trace the boundary of the skin cancer even if there are other objects near the skin cancer region . Serrano et al. present a method based on Markov random fields (MRF) to detect different patterns in dermoscopic images . Different from previous approaches on automatic dermatological image classification with the ABCD rule (Asymmetry , Border irregularity , Color variegation , and Diameter greater than 6mm or growing) , this paper follows a new trend to look for specific patterns in lesions which could lead physicians to a clinical assessment.Breast cancer is the most frequently diagnosed cancer other than skin cancer and a leading cause of cancer deaths in women in developed countries . In recent years , CAD schemes have been developed as a potentially efficacious solution to improving radiologists’diagnostic accuracy in breast cancer screening and diagnosis . The predominant approach of CAD in breast cancer and medical imaging in general is to use automated image analysis to serve as a “second reader”, with the aim of improving radiologists’diagnostic performance . Thanks to intense research and development efforts , CAD schemes have now been introduces in screening mammography , and clinical studies have shown that such schemes can result in higher sensitivity at the cost of a small increase in recall rate . In this issue , we have three papers in the area of CAD for breast cancer . Wei et al. propose an image-retrieval based approach to CAD , in which retrieved images similar to that being evaluated (called the query image) are used to support a CAD classifier , yielding an improved measure of malignancy . This involves searching a large database for the images that are most similar to the query image , based on features that are automatically extracted from the images . Dominguez et al. investigate the use of image features characterizing the boundary contours of mass lesions in mammograms for classification of benign vs. Malignant masses . They study and evaluate the impact of these features on diagnostic accuracy with several different classifier designs when the lesion contours are extracted using two different automatic segmentation techniques . Schaefer et al. study the use of thermal imaging for breast cancer detection . In their scheme , statistical features are extracted from thermograms to quantify bilateral differences between left and right breast regions , which are used subsequently as input to a fuzzy-rule-based classification system for diagnosis.Colon cancer is the third most common cancer in men and women , and also the third mostcommon cause of cancer-related death in the USA . Y ao et al. propose a novel technique to detect colonic polyps using CT Colonography . They use ideas from geographic information systems to employ topographical height maps , which mimic the procedure used by radiologists for the detection of polyps . The technique can also be used to measure consistently the size of polyps . Hafner et al. present a technique to classify and assess colonic polyps , which are precursors of colorectal cancer . The classification is performed based on the pit-pattern in zoom-endoscopy images . They propose a novel color waveler cross co-occurence matrix which employs the wavelet transform to extract texture features from color channels.Lung cancer occurs most commonly between the ages of 45 and 70 years , and has one of the worse survival rates of all the types of cancer . Two papers are included in this special issue on lung cancer research . Pattichis et al. evaluate new mathematical models that are based on statistics , logic functions , and several statistical classifiers to analyze reader performance in grading chest radiographs for pneumoconiosis . The technique can be potentially applied to the detection of nodules related to early stages of lung cancer . El-Baz et al. focus on the early diagnosis of pulmonary nodules that may lead to lung cancer . Their methods monitor the development of lung nodules in successive low-dose chest CT scans . They propose a new two-step registration method to align globally and locally two detected nodules . Experments on a relatively large data set demonstrate that the proposed registration method contributes to precise identification and diagnosis of nodule development .It is estimated that almost a quarter of a million people in the USA are living with kidney cancer and that the number increases by 51000 every year . Linguraru et al. propose a computer-assisted radiology tool to assess renal tumors in contrast-enhanced CT for the management of tumor diagnosis and response to treatment . The tool accurately segments , measures , and characterizes renal tumors, and has been adopted in clinical practice . V alidation against manual tools shows high correlation .Neuroblastoma is a cancer of the sympathetic nervous system and one of the most malignant diseases affecting children . Two papers in this field are included in this special issue . Sertel et al. present techniques for classification of the degree of Schwannian stromal development as either stroma-rich or stroma-poor , which is a critical decision factor affecting theprognosis . The classification is based on texture features extracted using co-occurrence statistics and local binary patterns . Their work is useful in helping pathologists in the decision-making process . Kong et al. propose image processing and pattern recognition techniques to classify the grade of neuroblastic differentiation on whole-slide histology images . The presented technique is promising to facilitate grading of whole-slide images of neuroblastoma biopsies with high throughput .This special issue also includes papers which are not derectly focused on the detection or diagnosis of a specific type of cancer but deal with the development of techniques applicable to cancer detection . T a et al. propose a framework of graph-based tools for the segmentation of microscopic cellular images . Based on the framework , automatic or interactive segmentation schemes are developed for color cytological and histological images . T osun et al. propose an object-oriented segmentation algorithm for biopsy images for the detection of cancer . The proposed algorithm uses a homogeneity measure based on the distribution of the objects to characterize tissue components . Colon biopsy images were used to verify the effectiveness of the method ; the segmentation accuracy was improved as compared to its pixel-based counterpart . Narasimha et al. present a machine-learning tool for automatic texton-based joint classification and segmentation of mitochondria in MNT-1 cells imaged using an ion-abrasion scanning electron microscope . The proposed approach has minimal user intervention and can achieve high classification accuracy . El Naqa et al. investigate intensity-volume histogram metrics as well as shape and texture features extracted from PET images to predict a patient’s response to treatment . Preliminary results suggest that the proposed approach could potentially provide better tools and discriminant power for functional imaging in clinical prognosis.We hope that the collection of the selected papers in this special issue will serve as a basis for inspiring further rigorous research in CAD of various types of cancer . We invite you to explore this special issue and benefit from these papers .On behalf of the Editorial Committee , we take this opportunity to gratefully acknowledge the autors and the reviewers for their diligence in abilding by the editorial timeline . Our thanks also go to the Editors-in-Chief of Pattern Recognition , Dr. Robert S. Ledley and Dr.C.Y. Suen , for their encouragement and support for this special issue .英文文献译文数字图像处理和模式识别技术关于检测癌症的应用世界上癌症是对于人类(不论男人还是女人)生命的第二杀手。

外文翻译外文文献英文文献国内混合动力汽车发展

外文翻译外文文献英文文献国内混合动力汽车发展

China Hybrid Electric Vehicle DevelopmentWith the depletion of oil resources, increase awareness of environmental protection, hybrid vehicles and electric vehicles will become the first decades of the new century, the development of mainstream cars and automobile industry become the consensusof all of the industry. The Chinese government also has the National High Technology Research and Development Program (863 Program) specifically listed, including hybrid vehicles, including electric cars of major projects. At present, China's independent innovation of new energy vehicles in the process, adhere to the government support to core technology, key components and system integration focusing on the principles established in hybrid electric vehicles, pure electric vehicles, fuel cell vehicles as a "three vertical "To vehicle control systems, motor drive systems, power battery / fuel cellfor the "three horizontal" distribution of R & D, through close links between production cooperation, China's independent innovation of hybrid cars has made significant progress.With completely independent intellectual property rights form the power system technology platform, established a hybrid electric vehicle technology development. Is the core of hybrid vehicles batteries (including battery management system) technology. In addition, also include engine technology, motor control, vehicle control technology, engine and electrical interface between the power conversion and is also the key. From the current situation, China has established a hybrid electric vehicle power system through Cooperative R & D technology platforms and systems, made a series of breakthroughs for vehicle development has laid a solid foundation. As of January 31, 2009,Technology in hybrid vehicles, China Intellectual Property Office to receive and open for the 1116 patent applications in China. In 1116 patent applications, invention 782 (authority for the 107), utility model for the 334.Mastered the entire vehicle key development, the formation of a capability to develop various types of electric vehicles. Hybrid cars in China in systems integration, reliability, fuel economy and other aspects of the marked progress in achieving fuel economy of different technical solutions can be 10% -40%.Meanwhile, the hybrid vehicle automotive enterprises and industrial R & D investment significantly enhanced, accelerating the pace of industrialization. Currently, domestic automakers have hybrid vehicles as the next major competitive products in the strategic high priority, FAW, Dongfeng, SAIC Motor, Changan, Chery, BYD, etc. have put a lot of manpower, material resources,Hybrid prototyping has been completed, and some models have achieved low-volume market.FAW GroupDevelopment Goal: By 2012, the Group plans to build an annual capacity of 11,000 hybrid cars, hybrid bus production base of 1000.FAW Group since 1999 and a new energy vehicles for theoretical research and development work, and the development of a red car performance hybrid sample. "15" period, the FAW Group is committed to the national "863" major project in the "red card in series hybrid electric vehicle research and development" mission,officially began the research and development of new energy vehicles. Beginning in 2006, FAW B70 in the Besturn, based on the technology for hybrid-based research, the original longitudinal into transverse engine assembly engine assembly, using a transverse engine and dual-motor hybrid technology. At the same time, FAW also pay close attention to the engine, mechanical and electrical integration, transmission, vehicle control networks, vehicle control systems development, the current FAW hybrid electric car has achieved 42% fuel saving effect, reached the international advanced level.Jiefang CA6100HEV Hybrid Electric BusFAW "Liberation brand CA6100HEV Hybrid Electric Bus" project is a national "863" electric vehicle major projects funded project, with pure electric drive, the engine alone drives (and charge), the joint drive motor starts the engine, and sliding regenerative braking 5 kinds of basic operation. The power hybrid electric bus and economy to the leading level, 38% fuel economy than traditional buses, emissions reduced by 30%.Red Flag CA7180AE hybrid carsRed Flag hybrid cars CA7180AE according to the national "863 Plan" is thefirst in complete with industrial prospects of the car, it is built on the basisof red car with good performance and operational smoothness.Series which is a hybrid sedan, the luxury car ,0-100km acceleration time of 14s, fuel-efficientthan traditional cars by about 50%, Euro 川emission standard.Besturn B70 hybrid carsBesturn B70 Hybrid cars using petrol - electric hybrid approach. Dual motor power system programs, mixed degree of 40/103, is all mixed (Full-Hybrid, also known as re-mixed) configurations. Besturn B70 Hybrid cars are petrol versioncosts two to three times Besturn models, mass production will be gradually reduced after the costs, even if this hybrid version Besturn market, the price certainly higher than the existing Besturn models, but high the price of petrol will not exceed 30% version of Besturn models.SAICDevelopment Goals: 2010 launch in the mixed hybrid cars, plug-in 2012, SAIC strong mix of cars and pure electric cars will be on the market.In the R & D on new energy vehicles, SAIC made clear to focus on hybrid, fuel cell for the direction, and speed up the development of alternative products. Hybrid vehicles, fuel cell vehicles, alternative fuel vehicles as a new energy strategy SAIC three key.2010 SAIC Roewe 750 hybrid cars in the mix will be put on the market, during the World Expo in Shanghai, SAIC will put 150 hybrid cars in the Expo Line on the River Run. 2012 Roewe 550 plug-in hybrid cars will be strong market, the current car's power system has been launched early development and progress.Apply the new hybrid bus moving on the 1stApply the new hybrid bus moving on the 1st Academy of Engineering by the SAIC and Shanghai Jiaotong University and other units jointly developed with independent intellectual property rights. Existing cities in the Sunwin Bus Power platform, "the new dynamic application No. 1" uses a parallel hybrid electric vehicle drive program, so that hybrid electric vehicle operating conditions in the electric air-conditioning, steering, braking and other accessoriesstill able to work without additional electric system, while use of super capacitors, to improve starting power,braking energy recovery efficiency, thereby enhancing vehicle dynamic performance, reduce fuel consumption. Car length 10m, width 2.5m, high-3.2m, can accommodate 76 people.Roewe 750 hybrid carsRoewe 750 hybrid cars in the mixed system with BSG (Belt drive start generating one machine), with "smart stop zero-emission" and "environmental protection and the power of both the" two prominent features of a top speed of 205 km / h, the maximum added driving range of up to 500 km. As for the industrialization of SAIC's first own-brand hybrid car, the Roewe 750 hybrid integrated hybrid fuel-efficient cars can achieve rates of around 20%.Dongfeng Motor GroupDevelopment Goals: Plans move into 33 billion in 10 years to develop a range of environmentally friendly hybrid vehicles, including cars.EQ7200HEV hybrid carsEQ7200HEV hybrid cars are "863" project of major projects and major strategic projects of Dongfeng Motor Corporation. The car is EQ7200-U model (Fengshen Bluebird cars) is based on an electronically controlled automatic transmission with innovative electromechanical coupling in parallel programs, configure DC brushless motor and nickel-hydrogen batteries, plans to "10 5 "during the industrialization. In dustrializatio n, the vehicle cost more tha n EQ7200 cars in crease in cost W 30%.EQ61100HEV Hybrid Electric BusEQ61100HEV electric hybrid bus by Dongfeng Vehicle Company Limited Joint Beijing Jiaotong University, Beijing, China Textile Co., Ltd. and Hunan sharp Electromechanical Technology Co., Ltd. jointly developed Shenzhou. EQ61100HEV hybrid electric bus with switched reluctance motor, Cummins ISBe1504 cylinder common rail electronic injection diesel engine, new chassis design of the system, electronically controlled automatic transmission and innovative electromechanical coupling parallel program. In the annual output reached 200, the vehicle cost more tha n the in crease in automobile engine equipped with 6CT W 30%.China ChanganDevelopment Goals: the next three years, the formation of different grades, different purposes, carry a different system of mixed platforms, weak mix of scale, strong mixed industrial R & D capabilities, covering commercial, A grade, B grade, C grade products. 2014 will achieve sales of new energy vehicles 150 000 2020 sales of new energy vehicles for more than 500,000."Eleventh Five-Year Plan" period, Chang-an increased investment in clean energy vehicles, a diversified energy technologies to carry out exploratory research. Environmental protection through energy-saving models continues to introduce new technology to lead the industry to upgrade and fully utilize and mobilize global resources,Chang'an in the middle hybrid cars, hybrid cars and other technological strength of the field are explored. Chang's first hybrid car long Anjie Xun HEV was successfully listed in June 2009; the first batch of 20 hybrid taxis Long An Zhixiang in January of this year officially put into operation in Chongqing.CheryDevelopment Goals: after 2010, more than half of Chery's products carry different levels of hybrid systems.From 2003 to 2008, mainly mixed with moderate Chery hybrid cars and energy saving system development, and industrialization; Chery in Wuhu, a taxi has been carried out on probation, fuel consumption will be reduced by 10% to 30% to reach Europe IV Standard. Since 2004, Chery hybrid cars mainly for the development of strong and industrialization. Chery hybrid car fuel consumption target to reach 100 km 3 liters, to reach Europe and the United States emissions regulations.Chery A5BSGChery A5BSG is a weak parallel hybrid electric car, using fuel engines, electric engines complementary mode, the two different power sources in the car while driving to work together or separately, through this combination to achieve the least fuel consumption and exhaust emissions, in order to achieve fuel efficiency and environmental protection purposes. Compared with the conventional car, the car in urban conditions can save 10% -15% of fuel and reduce carbon dioxide emissions by about 12%, while costs increased by only about 25% -30%.Chery A5ISGChery A5 ISG hybrid power system consists of "1.3L gasoline engine + 5-speed manual transmission +10 kW motor +144 V Ni-MH battery," the composition of the battery system used by the Johnson Controls developed "plug-in" nickel metal hydride (Ni-MH), motor with permanent magnet synchronous motor and with the motor control system, inverter and DC / DC converters. The system enables the vehicle power to 1.6L displacement level and rate of 30% fuel savings and significantly reduce the emissions of Euro V standards.Cherry A3ISGChery A3 ISG has 1.3L473F gasoline engine and equipped with 10KW motor. By gasoline engines and electric motors with torque overlay approach to dynamic mixed to provide the best vehicle power operating efficiency and energy saving environmental protection goals. Chery A3 ISG also has Stop_Restart the idling stop function such as flame start to start (BSG function), to reduce red light in the vehicle stopped or suspended when the fuel consumption and emissions expenses.FY 2BSGFY 2 BSG carry 1.5LSQR477F inline four-cylinder engine configuration BSGstart / stop and so one electric motor, red light in the vehicle stopped thedriver into the gap, it will automatically enter standby mode to turn off the engine, starting moments after the entry block automatically start the engine. FY 2 BSG vehicle average fuel consumption than the 1.5L petrol cars reduce about 5-10%, average fuel consumption can be reduced up to 15%.BYD AutoDevelopment Goal: to electric cars as a transitional mode, the electric car as the ultimate goal, the development of new energy cars BYD.BYD follow the "independent research and development, independent production, independent brand" development path, and the "core technology, vertical integration" development strategy, as the transition to dual-mode electric vehicles, electric vehicles as the ultimate goal, the development of BYD new energy vehicles.国内混合动力汽车发展随着石油资源的枯竭、人们环保意识的提高,混合动力汽车及电动汽车将成为新世纪前几十年汽车发展的主流,并成为我国汽车界所有业内人士的共识。

外文文献及翻译-fpga实现实时适应图像阈值-其他专业

外文文献及翻译-fpga实现实时适应图像阈值-其他专业

FPGA实现实时适应图像阈值Elham Ashari电气与计算机工程系,滑铁卢大学理查德霍恩西计算机科学和工程系,纽约大学摘要:本文提出了一种基于实时阈值的通用FPGA结构。

硬件架构是基于一种加权聚类算法的架构,这种算法的重点就在于聚类的前景和背景像素的阈值问题。

该方法采用聚类的二值加权神经网络法找到两个像素组的质心。

图像的阈值是两个质心的平均值。

因为对于每个输入的像素,选定的最近的权值是用来更新的,因而推荐一种自适应的阈值技术。

更新是基于输入像素的灰度级和相关权值的差额的,通过学习快慢因素来衡量其速率。

硬件系统是在FPGA平台上实现的,它包含两个功能模块。

第一个模块获得图像框架阈值,另一个模块将阈值应用于图像的框架。

两个模块的并行性和简单的硬件组成部分使其适用于实时应用程序,并且,其性能可与经常用于离线阈值技术相媲美。

通过利用FPGA对无数的例子进行模拟和实验,得到该算法的结果。

这项工作的基本应用是确定激光的质心,但接下来将会讨论它在其他方面的应用。

关键词:实时阈值,自适应阈值,FPGA实现、神经网络1 简介图像二值化是图像处理的一个主要问题。

如果要从一张图像上提取有用的信息,我们需要将它分成不同的部分(例如背景色和前景色)来进行更为详细的分析。

一般来说,前景色的像素的灰度级与背景色的灰度级是不同的。

现在已有一些较好的使图像二值化地算法,就性能而不是就速度而言,这些算法的主要目标在于高效率,然而对于一些应用,尤其对是在那些定制的硬件和实时应用程序来说,速度则是最关键的要求。

可实现的快速而简单的阈值技术在实际成像系统中得到广泛应用。

例如,结合了CMOS图像传感器的片上图像处理技术普遍存在于各种各样的成像系统当中。

在这样一个系统当中,图像的实时处理及其得到的相关信息是至关重要的。

实时阈值技术的应用领域包括机器人、汽车、目标追踪以及激光测距。

在激光测距,即确定目标的运动范围的过程中,所捕获的图像为二值图像。

自动化专业-外文文献-英文文献-外文翻译-plc方面

自动化专业-外文文献-英文文献-外文翻译-plc方面

1、外文原文(复印件)A: Fundamentals of Single-chip MicrocomputerTh e si ng le-ch i p mi cr oc om pu ter is t he c ul mi nat i on o f bo th t h e d ev el op me nt o f th e d ig it al com p ut er an d t he int e gr at ed ci rc ui ta r gu ab ly th e t ow m os t s i gn if ic ant i nv en ti on s o f t h e 20t h c en tu ry[1].Th es e to w t ype s o f a rc hi te ct ur e a re fo un d i n s i ng le—ch ip m i cr oc om pu te r。

S o me em pl oy th e s p li t p ro gr am/d at a me mo ry of t he H a rv ar d ar ch it ect u re, sh ow n in Fi g.3-5A—1,ot he r s fo ll ow t hep h il os op hy, wi del y a da pt ed f or ge n er al—pu rp os e c o mp ut er s an dm i cr op ro ce ss or s, of ma ki ng no lo gi c al di st in ct io n be tw ee n p ro gr am a n d da ta m em or y a s i n th e Pr in cet o n ar ch it ec tu re,sh ow n in F ig。

3-5A-2.In g en er al te r ms a s in gl e—ch i p mi cr oc om pu ter isc h ar ac te ri zed b y the i nc or po ra tio n of al l t he uni t s o f a co mp ut er i n to a s in gl e de v i ce,as s ho wn i n F ig3—5A—3。

图像处理领域的SCI期刊

图像处理领域的SCI期刊

图像处理领域的SCI期刊International JournalsACM Transactions on Applied PerceptionACM Transactions on GraphicsACM SIGGRAPH Computer GraphicsACM Transactions on Information SystemsJournal of VisionJournal of Visual Communication and Image RepresentationJournal of Mathematical Imaging and VisionJournal of Electronic ImagingJournal of Pattern Recognition ResearchJournal of Soft ComputingIEEE Computer Graphics and ApplicationsIEEE Signal Processing LettersIEEE Signal Processing MagazineIEEE Transactions on Circuits and Systems for Video TechnologyIEEE Transactions on Information Forensics and SecurityIEEE Transactions on Image ProcessingIEEE Transactions on Pattern Analysis and Machine IntelligenceIEEE Transactions on Visualization and Computer GraphicsInternational Journal of Image and GraphicsInternational Journal of Remote SensingInternational Journal of Computer VisionInternational Journal of Imaging Systems and TechnologyInternational Journal of Wavelets, Multiresolution and Information Processing International Journal of Pattern Recognition and Artificial Intelligence Computer Vision and Image UnderstandingComputer Graphics ForumElectronic Letters on Computer Vision and Image AnalysisEURASIP Journal on Applied SignalGraphics Interface Graphics InterfaceImage and Vision ComputingICGST International Journal on Graphics, Vision and Image ProcessingIET Signal ProcessingIET Information SecurityIET Image ProcessingIET Computer VisionIETE Technical ReviewIETE Journal of ResearchNeurophysical Journals in Computer VisionNumerical Functional Analysis and OptimizationMGV: Machine GRAPHICS & VISIONPattern RecognitionPattern Recognition LettersReal-Time ImagingSIAM Journal on Imaging SciencesSignal, Image and Video ProcessingSignal Processing : Image CommunicationVision ResearchInternational ConferencesIEEE International Conference on Computer Vision and Pattern RecognitionIEEE International Conference on Computer VisionEuropean Conference on Computer VisionAsian Conference on Computer VisionInternational Conference on Image ProcessingInternational Conference on Pattern RecognitionACM SIGGRAPH International Conference and Exhibition on Computer Graphics and Interactive techniquesInternational Joint Conference on Artificial Intelligence。

matlab图像处理外文翻译外文文献

matlab图像处理外文翻译外文文献

matlab图像处理外文翻译外文文献附录A 英文原文Scene recognition for mine rescue robotlocalization based on visionCUI Yi-an(崔益安), CAI Zi-xing(蔡自兴), WANG Lu(王璐)Abstract:A new scene recognition system was presented based on fuzzy logic and hidden Markov model(HMM) that can be applied in mine rescue robot localization during emergencies. The system uses monocular camera to acquire omni-directional images of the mine environment where the robot locates. By adopting center-surround difference method, the salient local image regions are extracted from the images as natural landmarks. These landmarks are organized by using HMM to represent the scene where the robot is, and fuzzy logic strategy is used to match the scene and landmark. By this way, the localization problem, which is the scene recognition problem in the system, can be converted into the evaluation problem of HMM. The contributions of these skills make the system have the ability to deal with changes in scale, 2D rotation and viewpoint. The results of experiments also prove that the system has higher ratio of recognition and localization in both static and dynamic mine environments.Key words: robot location; scene recognition; salient image; matching strategy; fuzzy logic; hidden Markov model1 IntroductionSearch and rescue in disaster area in the domain of robot is a burgeoning and challenging subject[1]. Mine rescue robot was developed to enter mines during emergencies to locate possible escape routes for those trapped inside and determine whether it is safe for human to enter or not. Localization is a fundamental problem in this field. Localization methods based on camera can be mainly classified into geometric, topological or hybrid ones[2]. With its feasibility and effectiveness, scene recognition becomes one of the important technologies of topological localization.Currently most scene recognition methods are based on global image features and have two distinct stages: training offline and matching online.。

外文文献

外文文献

英文文献资料外文文献一:Food safety: the shocking truth about the food industrySource: Author: Marion Nestle、Refrigeration technology, pasteurization, pesticides, disease control, these technologies so that safe food into the 20th century, public health's greatest achievements. This book view is that food safety problems also depend on politics. September 2001 events to dispel this view of the doubts about aviation aircraft used by terrorists as a destruction of weapons to civilians and public figures have anthrax spores sent folder of letters, the consequences of these events shows, food, water can easily become a a tool for terrorists, it has also become the federal government for food safety control problem.This chapter will sum up this book referred to in the various food safety problems. Some of them threatened to keep animals healthy, very few will lead to a number of human diseases. Even so, these issues impact on human well-being is deep; large-scale destruction of breeding animals, affecting the livelihood of many people, limiting personal freedom. The 20th century, 90's and early 21st century, an outbreak of mad cow disease and foot and mouth disease Although this is only because of errors caused by the production process, but still brings a lot of destructive. In contrast, bio-terrorism is the deliberate use of biological and chemical substances to achieve their political objectives. For food safety issues,Bio-terrorism extends food safety issues and political outreach; deliberate destruction, excluding any consequences of innocent injury.In this chapter, we will discuss how the rise of bio-terrorism, food safety issues and extend the extension of food safety issues. In the United States, food safety, usually refers to the family food supply reliability. E-mail from the anthrax incident, the food safety issues, also includes safety from biological terrorism. Our discussion will be the beginning of some zoonotic diseases: such as mad cow disease, foot and mouth disease, anthrax. In recent years, these zoonotic diseases harmful to humans is relatively small. Today, for these zoonotic diseases, we are concerned that they may give rise to disease, destruction of food supply system,To become a tool for bio-terrorism aspect. This chapter summarizes the discussion of this book, fromsociety and from a personal point of view what action should be taken to face these issues, as well as food safety issues present and future.The political animal diseasesOne of the consequences of globalization is that of food cross-border long-distance rapid transit, affecting food supply all kinds of disease can easily spread from one country to another country. Animal diseases have a commercial impact, if a country has come to infectious diseases of animals, other countries will refuse to import the kinds of animal meat. The impact of business at the same time there are political consequences.Britain's mad cow disease and foot and mouth disease occurred as a result of beef in the production process caused by mismanagement, compared to the U.S. anthrax letters is a result of vandalism. However, this three kinds of threatening to cause great panic, they are difficult to detect control, can cause severe disease. Moreover, these three kinds of threats against people for the food supply, as well as confidence in the Government.Mad cow is the mid-20th century, 90 of the most popular of a food security crisis, the epidemic is mainly limited to the United Kingdom. With regard to BSE-related issues and our discussion, mainly because of political issues and scientific issues intertwined Among them, public confidence had a great impact. For example, the British Government in the BSE crisis in the practice is also considered to result in distrust of genetically modified food one of the reasons. The beginning of the 20th century, 80 years, no one had heard of the disease, but in 1999, this disease affects at least 175,000 British cattle. The consequences are very serious: 400 million head of livestock were slaughtered, the loss of 70 billion U.S. dollars,Spread to 18 countries worldwide national boycott of British beef. By 2001 only, although "only" 120 people died of the human variant of mad cow disease, it is estimated the death toll will reach 10 million people. Because mad cow disease revealed the modern politics of food safety issues, it is worth detailing.英文文献中文翻译06013618 胡冬敏外文翻译一:作者:玛丽恩·内斯特尔出版时间:2004年11月食品安全:令人震惊的食品行业真相(美)玛丽恩·内斯特尔冷藏技术,巴氏消毒,杀虫剂,疾病控制,这些技术使安全食品成为20世纪公众健康最伟大的成就之一。

数学 外文翻译 外文文献 英文文献 具体数学

数学 外文翻译 外文文献 英文文献 具体数学

Concrete MathematicsR. L. Graham, D. E. Knuth, O. Patashnik《Concrete Mathematics》,1.3 THE JOSEPHUS PROBLEM R. L. Graham, D. E. Knuth, O. Patashnik Sixth printing, Printed in the United States of America 1989 by Addison-Wesley Publishing Company,Reference 1-4pages具体数学R.L.格雷厄姆,D.E.克努特,O.帕塔希尼克《具体数学》,1.3,约瑟夫环问题R.L.格雷厄姆,D.E.克努特,O.帕塔希尼克第一版第六次印刷于美国,韦斯利出版公司,1989年,引用8-16页1.递归问题本章研究三个样本问题。

这三个样本问题给出了递归问题的感性知识。

它们有两个共同的特点:它们都是数学家们一直反复地研究的问题;它们的解都用了递归的概念,按递归概念,每个问题的解都依赖于相同问题的若干较小场合的解。

2.约瑟夫环问题我们最后一个例子是一个以Flavius Josephus命名的古老的问题的变形,他是第一世纪一个著名的历史学家。

据传说,如果没有Josephus的数学天赋,他就不可能活下来而成为著名的学者。

在犹太|罗马战争中,他是被罗马人困在一个山洞中的41个犹太叛军之一,这些叛军宁死不屈,决定在罗马人俘虏他们之前自杀,他们站成一个圈,从一开始,依次杀掉编号是三的倍数的人,直到一个人也不剩。

但是在这些叛军中的Josephus和他没有被告发的同伴觉得这么做毫无意义,所以他快速的计算出他和他的朋友应该站在这个恶毒的圆圈的哪个位置。

在我们的变形了的问题中,我们以n个人开始,从1到n编号围成一个圈,我们每次消灭第二个人直到只剩下一个人。

例如,这里我们以设n= 10做开始。

外文翻译 外文文献 英文文献 胜任力模型研究

外文翻译 外文文献 英文文献 胜任力模型研究

Research on Competency Model:A Literature Review andEmpirical StudiesAbstractWestern countries have applied competency models to addressing problems existed in their administrative and managerial systems since 1970s,and the findings is positine and promising. However, competency model hasn’t been introduced to China until 1990s and it is still unknown and mysterious to many Chinese managers. This paper aims to uncover the mysterious veil of competency model in order to broaden the horizon of Chinese managers and boost China's human resource development as well as management.Keywords:Competency,Competency Models,Empirical Studies of Competency ModelsIt has been more than 30 years since competency model was utilized to human resource management.In western countries,competency model first displayed its effectiveness in government administration, meanwhile many multinationals and their branch companies applied the competency model to their daily business management and their business was a great success. As the notion of competency is gradually come to light and accepted by people all around the world,more and more enterprises have been trying to build their own competency model under the help of professional consultant firms. As a result,competency model has gradually been a very fashionable phrase in the field of management and quite a few enterprises are thus benefited from it. In recent years, competency model has become a hot spot in the Chinese academia as well as big-,middle- and small-sized enterprises alike,many relevant writings and books have also been translated and published. However, competency and competency model are still mysterious to many Chinese scholars, business managers as well as government administrators.Purpose and Significance of the StudyThe purpose of the study aims to make a critical literature review of the competency model,clarify some confusion related to it and explore its application. The following questions are employed to guide this study:What is competency? What is competency model? What are the theoretical and empirical findings related to competency model?The study illustrates how we could take advantage of competency model in our harmonious society building. On one hand,the study will delineate competency and competency model in order to clarify confusions related to it since it is still strange and mysterious to many Chinese managers and administrators;on the other hand,thestudy would enrich Chinese HRD&HRM in the field of government administration and business management both theoretically and empirically.Research MethodThe present study has utilized qualitative analysis, induction and deduction. Since this research is a literature review in some sense, qualitative analysis will be an indispensable research method; Induction and deduction are applied to both theoretical and empirical studies.In order to enhance the credibility of present research,only the authoritative publications on competency model are reviewed,including books and papers written by foreign and Chinese scholars and HRDHRM practitioners. By searching for the keywords "competency" "competency model" and "competency model building" as well as "empirical studies on competency models",books and papers written by well-known foreign scholars such as McClelland D. C.,Lyle M. Spencer, Anntoinette D. Lucia, Richard Lepsinger etc.,are available; by the same token,books and papers written by Chinese scholars such as Zhi-gong He,Jianfeng Peng, Shaohua Fang, Nengquan Wu,etc.,could be consulted. All the books and papers are published between 1950s and 2007. In addition, many data cited in this paper comes from empirical studies at home and abroad.FindingsIn this part,a literature review of competency is firstly carried out;then competency model as well as its evolution,development and innovation is delineated;finally empirical studies are reviewed. Empirical studies mainly focus on competency model building and its application to human resource development and management.Understanding CompetencyIn 1973,American scholar David C. McClelland published his paper Testing for Competency Rather Than Intelligence which cited a large amount of research findings to illustratethe inappropriateness of assessing personnel qualities by abusing intelligence tests. Dr. McClelland further explained that some factors (personality, intelligence, value,etc.)which people had always taken for granted in determining work performance hadn't displayed their desired result. As a result,he emphasized that people should ignore those theoretical by pothese and subjective judgements which had been proved groundless in reality. He declared that people should tap directly those factors and behaviors which could really impact their performance (McClelland, 1973). These factors and behaviors were named "competency" by McClelland. The publishing of this paper symbolized the debut of competency research. From then on,many scholars started getting involved into the research on competency and they conceptualizedcompetency from different perspectives as shown in the following table: The above ten concepts of competency have a lot in common:①Competency is motive, trait,value,skill,self-image, social role,knowledge;②Competency is a combination;③Competency should be measurable, observable, instructional,phasic and hierarchical;④Competency is a determinant to outstanding performance.Thus competency is an underlying combination of individual characteristics such as motive, inner drive force, quality, attitude,sole role,self-image, knowledge and skill,it is causally related to criterion-referenced effective and/or superior performance in a job or situation and it is measurable,observable and instructional.Besides,many scholars and consultancy firms believe that competency could be explained under the help of three different models:Iceberg Model. This model treats competency as an iceberg, the part above the water represents behavior, knowledge and skills which are easy to measure and observe,while the part under the water symbolizes underlying qualities such as value,attitude,social role, self-image,traits which are hard to assess,and the deepest part under the water represents the most latent qualities such as inner drive force,social motive, etc. which are most difficult to observe and measure.Onion Model. This model treats competency as an onion, the outer layer represents skills and knowledge which are liable to acquire,the inner layer refers to qualities such as self-image,social role,attitude and value which are relatively difficult to appraise, while the core of the onion symbolizes traits and motives which are most difficult to cultivate and develop.Brain Model. This model stems from the brain mechanism. It presupposes that the brain could be divided into four parts. Each part functions differently. The upper-left part is in charge of competency such as analysing capacity, calculation, strong logic ability; the upper-right part is in charge of competency such as innovation and intuition;the bottom left part is in charge of competency such as organizing ability, planning ability; and the bottom-right part is in charge of competency such as communication ability,perception, etc. Different parts will exert corresponding influence on competency development.Conceptualizations of Competency ModelFew foreign scholars have directly put forward conceptualizations of competency model. By contrast,many Chinese scholars have expressed their opinions on it. The present paper only cites those concepts that have been published by authoritative publishing houses.Jianfeng Peng, a professor in Ch;na Renmin University,together with his students, has studied how to build competency models for effective HR management since 2003. He thought competency model was the combination of differentqualities which were necessary for people to successfully finish a job or achieve superior performance,these qualities included different motives,traits, self-images and social roles as well as knowledge and skill (Jianfeng Peng, 2003). Prof. Peng believed that a competency model was composed of 4-6 competencies that were closely related to performance. Competency models could help managers judge and distinguish key factors that led to superior performance or underperformance. As a result,competency model could be treated as a foundation to improve performance.Professor Nengquan Wu from Sun Yat-sen University published his book Competency Model:Design and Application in 2005,according to his understanding, competency model refers to "proficiencies that people define core competencies of different levels, delineate corresponding behaviors,determine key competencies as well as f inish certain work.”(Nengquan Wu,2005). Prof. Wu conceptualized competency model from the perspective of methodology. He believed that competency model was a unique HRM thinking mode, method and operation flow. On the basis of organizational strategy, competency model could be utilized to enhance organizational competitiveness and improve performance.Shaohua Fang, a senior HRM consultant and expert,provided us with the following definition:"Competency model is to conceptualize and describe the necessary knowledge,skills,qualities and abilities which an employee should have in order to finish work (Shaohua Fang, 2007)”.By taking advantage of definitions of different levels and related behavioral descriptions, people could determine the combination of core competencies and required proficiency to finish work. Hc} pointed out these behaviors and skills must be able to measure,observe and instruct and they should exert a great influence upon personal performance and business success.International Human Resource Institute(IHRI) has also defined competency model:"The so-called competency model is the standardized description and explanation of competencies that could actualize superior performance.”(·IHRI, 2005)IHRI declared that a competency model should include 6^-1 2 competencies.In summary, the first concept mentioned above attaches an importance to the composition of competency model and its function, while all of the rest three concepts emphasize cognitive abilities as well as criterion-referred performance. Thus competency, model is a combination of different competencies which could be observed,delineated,explained and calculated on one hand,and could facilitate superior performance on the other hand.Development and Evolution of Competency ModelIn early 1970, top officials in U. S. Department of State believed that theirdiplomats' se- lection based on intelligence test was ineffective. It was an upset situation for them to find that many seemly excellent people fail to live up to their expectations regarding their work performance. Under such circumstances, Dr. McClelland was invited to help Department of State design an effective personnel selection system which could appraise the actual performance of employees. In that program,McClelland and his colleague Charles Dailey adopted the method of Behavioral Event Interview (BEI) to collect information in older to study factors that influenced the diplomats' performance. Through a series of summaries and analyses, McClelland and Dailey found out the differences between an excellent diplomat and a mediocre diplomat as far as their behaviors and modes of thinking were concerned. In this way, competencies that a diplomat should possess were found out. This program is the earliest empirical application of competency model. And the research findings were two papers: Improving Officer Selection for the Foreign Service (McClelland&Dailey,1972) as well as Evaluating New Methods of Measuring the Qualities Needed in Superior Foreign Service Information Officers(McClelland& Dailey,1973).Mcber and American Management Association (A'MA) also started their research on competency model in the same year. They focused on providing the answer to the question:what kind of competencies should be displayed by successful managers rather than unsuccessful ones? AMA spent 5 years observing 1 800 managers. By comparing the performance of excellent managers and mediocre ones, AMA defined their competencies based on their traits. The research results showed that all the successful managers shared the following 5 competencies:professional knowledge,maturity of mentality, maturity of .entrepreneurship,people relations and maturity of the profession. Of which,only professional knowledge were shared by excellent and mediocre managers (Mcber&.AMA, 1970).Then Prof. Bray carried out 8 years research at AT&T based on technique of assessment center. From the aspectives of abilities, attitudes and traits, etc.,he built a competency model composed of 25 competencies such as interpersonal relations, expression ability, social sensitivity, creativity,flexibility,organizational ability,planning ability, decision-making ability, etc(Bray and Grant,1978).In China,however, researches on competency model are relatively much late.Chinese scholars Chongming Wang and Minke Chen published their paper about competency model in Psychological Science in 1992. They studied 220 senior and middle-level managers of 51 enterprises in 5 cities. After examining and testing the competency model for senior managers on the basis of factor analysis and structural equation modelling, they compiled "Key Managerial Behavior Assessment Scale" (Chongming Wang&Minke Chen,2002).Scholars such as Kan Shi, Jicheng Wang and Chaoping Li took advantage of Behaviocal Event Interview to assess the competency model for senior managers in the industry of telecommunication (Kan Shi,Jicheng Wang&Chaoping Li,2002). Jicheng Wang designed 5 universal competency models for technical personnel,sales people, community service personnel,managers as well as entrepreneurs respectively.Jianfeng Peng and his postgraduate student Xiaojuan Xing built 4 universal competency models for business managers,business technical personnel,marketing personnel as well as HR managers (Jianfeng Peng,2003 ).The above domestic studies illustrate that competency models for middle-level and senior managers have been built based on in-depth interview and questionnairing. Most publications only focus on conceptualizing competency model,its development,behavioral event interview as well as competency model building,most of the findings are theoretical rather than empirical. By contrast,foreign studies are much maturer both theoretically and empirically.Empirical StudiesEmpirical studies highlight the application of competency model to enterprises, governments and other institutions.Nowadays,empirical studies on competency models mainly focus on the following 4 aspects:Staffing and Selection. Besides job standards and skills prescription, more and more businesses have carried out their personnel staffing and selection in light of the candidates' competencies which are crucial to their future performance. This competency-based personnel staffing and selection has connected business strategies and targets to business employees themselves. As a result,the quality of staffing and selection is greatly improved.Performance Management. Businesses which have built their competency models are more interested in the competency rather than the result itself in their performance management. As a result, their performance management style has been competency-driven rather than result-driven. Managers haven’t attached an importance to short-term performance, but current and long-term performances. In such a managerial system,outstanding performance has been easily actualized. Each employee has made most of their core competencies and expertise to make a contribution to their business.Compensation Management.After the competency-based compensation management system is set up, businesses have concentrated on their employees’future development and potential value, which has stimulated employees and managers of all ranks to improve themselves both menetuacy and teconologcal. Competency oases compense lion management system has helped enterprises attract and retain moretalents. In a word,competency model has endowed employees with a sense of respect and creativity.Training and Development. Enterprises which have built their competency models tend to determine core competencies in light of business strategies,environments, employee development planning and performance appraisal. Enterprises decide their training and development priorities on the basis of competency model.Future TrendsDespite that there is a growing body of literature on competency model,research on competency model is still in a premature stage and many questions still remain unanswered. Therefore, further research is required to address several important issues.First of all,although there are growing studies on the impacts of the competency model on organizational outcomes,antecedents of competency model need to be identified and academically explored. Future studies are needed to examine the relationships between the features of competency model and its key antecedent variables such as organizational sttracture.leadership and external environment. For example,it can be reasoned that the features of competency model are likely to be positively correlated with the structures of enterprises, governments as well as other institutions. Secondly,the impact of competency model on performance needs to be thoroughly explored. More studies are needed to examine whether the features of competency model or organizational culture,has direct or indirect impacts on organizational performance. While quite a few HRD and HRM researchers and practitioners have demonstrated that the concept of competency model has a positive impact on organizational performance, however,such impact may be mediated by other important organizational variables. Finally, it is also important to consider the relationships of competency model and other important HR variables such as career development, managerial coaching as well as employee training.Conclusions and DiscussionsIn conclusion,competency model has increasingly exerted profound influence on human resource development and management. While this concept has received an increase in both academic and management fields,there are increasing empirical studies designed to examine the nature of the construct and its relationships with other important organizational variables. More studies are needed to enhance the theoretical and empirical foundations of competency model.胜任力模型研究:文献综述和实证研究摘要20世纪70年代以来,西方国家已经利用胜任力模型来解决存在于行政和管理系统中的问题,其结果是积极且有前途的。

数字图像处理论文中英文对照资料外文翻译文献

数字图像处理论文中英文对照资料外文翻译文献

第 1 页中英文对照资料外文翻译文献原 文To image edge examination algorithm researchAbstract :Digital image processing took a relative quite young discipline,is following the computer technology rapid development, day by day obtains th widespread application.The edge took the image one kind of basic characteristic,in the pattern recognition, the image division, the image intensification as well as the image compression and so on in the domain has a more widesp application.Image edge detection method many and varied, in which based on brightness algorithm, is studies the time to be most long, the theory develo the maturest method, it mainly is through some difference operator, calculates its gradient based on image brightness the change, thus examines the edge, mainlyhas Robert, Laplacian, Sobel, Canny, operators and so on LOG 。

外文翻译 外文文献 英文文献 国内混合动力汽车发展

外文翻译 外文文献 英文文献 国内混合动力汽车发展

China Hybrid Electric Vehicle DevelopmentWith the depletion of oil resources, increase awareness of environmental protection, hybrid vehicles and electric vehicles will become the first decades of the new century, the development of mainstream cars and automobile industry become the consensus of all of the industry. The Chinese government also has the National High Technology Research and Development Program (863 Program) specifically listed, including hybrid vehicles, including electric cars of major projects. At present, China's independent innovation of new energy vehicles in the process, adhere to the government support to core technology, key components and system integration focusing on the principles established in hybrid electric vehicles, pure electric vehicles, fuel cell vehicles as a "three vertical "To vehicle control systems, motor drive systems, power battery / fuel cell for the "three horizontal" distribution of R & D, through close links between production cooperation, China's independent innovation of hybrid cars has made significant progress.With completely independent intellectual property rights form the power system technology platform, established a hybrid electric vehicle technology development. Is the core of hybrid vehicles batteries (including battery management system) technology. In addition, also include engine technology, motor control, vehicle control technology, engine and electrical interface between the power conversion and is also the key. From the current situation, China has established a hybrid electric vehicle power system through Cooperative R & D technology platforms and systems, made a series of breakthroughs for vehicle development has laid a solid foundation. As of January 31, 2009,Technology in hybrid vehicles, China Intellectual Property Office to receive and open for the 1116 patent applications in China. In 1116 patent applications, invention 782 (authority for the 107), utility model for the 334.Mastered the entire vehicle key development, the formation of a capability to develop various types of electric vehicles. Hybrid cars in China in systems integration, reliability, fuel economy and other aspects of the marked progress in achieving fueleconomy of different technical solutions can be 10% -40%. Meanwhile, the hybrid vehicle automotive enterprises and industrial R & D investment significantly enhanced, accelerating the pace of industrialization. Currently, domestic automakers have hybrid vehicles as the next major competitive products in the strategic high priority, FAW, Dongfeng, SAIC Motor, Changan, Chery, BYD, etc. have put a lot of manpower, material resources,Hybrid prototyping has been completed, and some models have achieved low-volume market.FAW GroupDevelopment Goal: By 2012, the Group plans to build an annual capacity of 11,000 hybrid cars, hybrid bus production base of 1000.FAW Group since 1999 and a new energy vehicles for theoretical research and development work, and the development of a red car performance hybrid sample. "15" period, the FAW Group is committed to the national "863" major project in the "red card in series hybrid electric vehicle research and development" mission, officially began the research and development of new energy vehicles. Beginning in 2006, FAW B70 in the Besturn, based on the technology for hybrid-based research, the original longitudinal into transverse engine assembly engine assembly, using a transverse engine and dual-motor hybrid technology. At the same time, FAW also pay close attention to the engine, mechanical and electrical integration, transmission, vehicle control networks, vehicle control systems development, the current FAW hybrid electric car has achieved 42% fuel saving effect, reached the international advanced level.Jiefang CA6100HEV Hybrid Electric BusFAW "Liberation brand CA6100HEV Hybrid Electric Bus" project is a national "863" electric vehicle major projects funded project, with pure electric drive, the engine alone drives (and charge), the joint drive motor starts the engine, and sliding regenerative braking 5 kinds of basic operation. The power hybrid electric bus and economy to the leading level, 38% fuel economy than traditional buses, emissions reduced by 30%.Red Flag CA7180AE hybrid carsRed Flag hybrid cars CA7180AE according to the national "863 Plan" is the first in complete with industrial prospects of the car, it is built on the basis of red car with good performance and operational smoothness. Series which is a hybrid sedan, the luxury car ,0-100km acceleration time of 14s, fuel-efficient than traditional cars by about 50%, Euro Ⅲemission standard.Besturn B70 hybrid carsBesturn B70 Hybrid cars using petrol - electric hybrid approach. Dual motor power system programs, mixed degree of 40/103, is all mixed (Full-Hybrid, also known as re-mixed) configurations. Besturn B70 Hybrid cars are petrol version costs two to three times Besturn models, mass production will be gradually reduced after the costs, even if this hybrid version Besturn market, the price certainly higher than the existing Besturn models, but high the price of petrol will not exceed 30% version of Besturn models.SAICDevelopment Goals: 2010 launch in the mixed hybrid cars, plug-in 2012, SAIC strong mix of cars and pure electric cars will be on the market.In the R & D on new energy vehicles, SAIC made clear to focus on hybrid, fuel cell for the direction, and speed up the development of alternative products. Hybrid vehicles, fuel cell vehicles, alternative fuel vehicles as a new energy strategy SAIC three key.2010 SAIC Roewe 750 hybrid cars in the mix will be put on the market, during the World Expo in Shanghai, SAIC will put 150 hybrid cars in the Expo Line on the River Run. 2012 Roewe 550 plug-in hybrid cars will be strong market, the current car's power system has been launched early development and progress.Apply the new hybrid bus moving on the 1stApply the new hybrid bus moving on the 1st Academy of Engineering by the SAIC and Shanghai Jiaotong University and other units jointly developed with independent intellectual property rights. Existing cities in the Sunwin Bus Powerplatform, "the new dynamic application No. 1" uses a parallel hybrid electric vehicle drive program, so that hybrid electric vehicle operating conditions in the electric air-conditioning, steering, braking and other accessories still able to work without additional electric system, while use of super capacitors, to improve starting power, braking energy recovery efficiency, thereby enhancing vehicle dynamic performance, reduce fuel consumption. Car length 10m, width 2.5m, high-3.2m, can accommodate 76 people.Roewe 750 hybrid carsRoewe 750 hybrid cars in the mixed system with BSG (Belt drive start generating one machine), with "smart stop zero-emission" and "environmental protection and the power of both the" two prominent features of a top speed of 205 km / h, the maximum added driving range of up to 500 km. As for the industrialization of SAIC's first own-brand hybrid car, the Roewe 750 hybrid integrated hybrid fuel-efficient cars can achieve rates of around 20%.Dongfeng Motor GroupDevelopment Goals: Plans move into 33 billion in 10 years to develop a range of environmentally friendly hybrid vehicles, including cars.EQ7200HEV hybrid carsEQ7200HEV hybrid cars are "863" project of major projects and major strategic projects of Dongfeng Motor Corporation. The car is EQ7200-Ⅱmodel (Fengshen Bluebird cars) is based on an electronically controlled automatic transmission with innovative electromechanical coupling in parallel programs, configure DC brushless motor and nickel-hydrogen batteries, plans to "10 5 "during the industrialization. Industrialization, the vehicle cost more than EQ7200 cars increase in costs ≤30%.EQ61100HEV Hybrid Electric BusEQ61100HEV electric hybrid bus by Dongfeng Vehicle Company Limited Joint Beijing Jiaotong University, Beijing, China Textile Co., Ltd. and Hunan sharp Electromechanical Technology Co., Ltd. jointly developed Shenzhou. EQ61100HEV hybrid electric bus with switched reluctance motor, Cummins ISBe1504 cylinder common rail electronic injection diesel engine, new chassis design of the system,electronically controlled automatic transmission and innovative electromechanical coupling parallel program. In the annual output reached 200, the vehicle cost more than the increase in automobile engine equipped with 6CT ≤30%.China ChanganDevelopment Goals: the next three years, the formation of different grades, different purposes, carry a different system of mixed platforms, weak mix of scale, strong mixed industrial R & D capabilities, covering commercial, A grade, B grade, C grade products. 2014 will achieve sales of new energy vehicles 150 000 2020 sales of new energy vehicles for more than 500,000."Eleventh Five-Year Plan" period, Chang-an increased investment in clean energy vehicles, a diversified energy technologies to carry out exploratory research. Environmental protection through energy-saving models continues to introduce new technology to lead the industry to upgrade and fully utilize and mobilize global resources, Chang'an in the middle hybrid cars, hybrid cars and other technological strength of the field are explored. Chang's first hybrid car long Anjie Xun HEV was successfully listed in June 2009; the first batch of 20 hybrid taxis Long An Zhixiang in January of this year officially put into operation in Chongqing.CheryDevelopment Goals: after 2010, more than half of Chery's products carry different levels of hybrid systems.From 2003 to 2008, mainly mixed with moderate Chery hybrid cars and energy saving system development, and industrialization; Chery in Wuhu, a taxi has been carried out on probation, fuel consumption will be reduced by 10% to 30% to reach Europe ⅣStandard. Since 2004, Chery hybrid cars mainly for the development of strong and industrialization. Chery hybrid car fuel consumption target to reach 100 km 3 liters, to reach Europe and the United States emissions regulations.Chery A5BSGChery A5BSG is a weak parallel hybrid electric car, using fuel engines, electric engines complementary mode, the two different power sources in the car while driving to work together or separately, through this combination to achieve the leastfuel consumption and exhaust emissions, in order to achieve fuel efficiency and environmental protection purposes. Compared with the conventional car, the car in urban conditions can save 10% -15% of fuel and reduce carbon dioxide emissions by about 12%, while costs increased by only about 25% -30%.Chery A5ISGChery A5 ISG hybrid power system consists of "1.3L gasoline engine + 5-speed manual transmission +10 kW motor +144 V Ni-MH battery," the composition of the battery system used by the Johnson Controls developed "plug-in" nickel metal hydride (Ni-MH), motor with permanent magnet synchronous motor and with the motor control system, inverter and DC / DC converters. The system enables the vehicle power to 1.6L displacement level and rate of 30% fuel savings and significantly reduce the emissions of Euro V standards.Cherry A3ISGChery A3 ISG has 1.3L473F gasoline engine and equipped with 10KW motor. By gasoline engines and electric motors with torque overlay approach to dynamic mixed to provide the best vehicle power operating efficiency and energy saving environmental protection goals. Chery A3 ISG also has Stop_Restart the idling stop function such as flame start to start (BSG function), to reduce red light in the vehicle stopped or suspended when the fuel consumption and emissions expenses.FY 2BSGFY 2 BSG carry 1.5LSQR477F inline four-cylinder engine configuration BSG start / stop and so one electric motor, red light in the vehicle stopped the driver into the gap, it will automatically enter standby mode to turn off the engine, starting moments after the entry block automatically start the engine. FY 2 BSG vehicle average fuel consumption than the 1.5L petrol cars reduce about 5-10%, average fuel consumption can be reduced up to 15%.BYD AutoDevelopment Goal: to electric cars as a transitional mode, the electric car as the ultimate goal, the development of new energy cars BYD.BYD follow the "independent research and development, independent production, independent brand" development path, and the "core technology, vertical integration" development strategy, as the transition to dual-mode electric vehicles, electric vehicles as the ultimate goal, the development of BYD new energy vehicles.国内混合动力汽车发展随着石油资源的枯竭、人们环保意识的提高,混合动力汽车及电动汽车将成为新世纪前几十年汽车发展的主流,并成为我国汽车界所有业内人士的共识。

3-电气工程及其自动化专业 外文文献 英文文献 外文翻译

3-电气工程及其自动化专业 外文文献 英文文献 外文翻译

3-电气工程及其自动化专业外文文献英文文献外文翻译1、外文原文(复印件)A: Fundamentals of Single-chip MicrocomputerThe single-chip microcomputer is the culmination of both the development of the digital computer and the integrated circuit arguably the tow most significant inventions of the 20th century [1].These tow types of architecture are found in single-chip microcomputer. Some employ the split program/data memory of the Harvard architecture, shown in Fig.3-5A-1, others follow the philosophy, widely adapted for general-purpose computers and microprocessors, of making no logical distinction between program and data memory as in the Princeton architecture, shown in Fig.3-5A-2.In general terms a single-chip microcomputer is characterized by the incorporation of all the units of a computer into a single device, as shown in Fig3-5A-3.ProgramInput& memoryOutputCPU unitDatamemoryFig.3-5A-1 A Harvard typeInput&Output CPU memoryunitFig.3-5A-2. A conventional Princeton computerExternal Timer/ System Timing Counter clock componentsSerial I/OReset ROMPrarallelI/OInterrupts RAMCPUPowerFig3-5A-3. Principal features of a microcomputerRead only memory (ROM).ROM is usually for the permanent,non-volatile storage of an applications program .Many microcomputers and microcontrollers are intended for high-volume applications and hence the economical manufacture of the devices requires that the contents of the program memory be committed permanently during the manufacture of chips . Clearly, this implies a rigorous approach to ROM code development since changes cannot be made after manufacture .This development process may involve emulation using a sophisticated development system with a hardware emulation capability as well as the use of powerful software tools.Some manufacturers provide additional ROM options by including in their range devices with (or intended for use with) user programmablememory. The simplest of these is usually device which can operate in a microprocessor mode by using some of the input/output lines as an address and data bus for accessing external memory. This type of device can behave functionally as the single chip microcomputer from which itis derived albeit with restricted I/O and a modified external circuit. The use of these ROMlessdevices is common even in production circuits where the volume does not justify the development costs of custom on-chip ROM[2];there canstill be a significant saving in I/O and other chips compared to a conventional microprocessor based circuit. More exact replacement for ROM devices can be obtained in the form of variants with 'piggy-back' EPROM(Erasable programmable ROM )sockets or devices with EPROM instead of ROM 。

图像处理方面的参考文献

图像处理方面的参考文献

图像处理方面的参考文献:由整理[1] Pratt W K. Digital image processing :3rd edition [M]. New York :Wiley Inter-science ,1991.[2] HUANG Kai-qi ,WANG Qiao ,WU Zhen-yang ,et al. Multi-Scale Color Image Enhancement AlgorithmBased on Human Visual System [J]. Journal of Image and Graphics ,2003,8A(11) :1242-1247.[3] 赵春燕,郑永果,王向葵.基于直方图的图像模糊增强算法[J]. 计算机工程,2005,31(12):185-187.[4] 刘惠燕,何文章,马云飞. 基于数学形态学的雾天图像增强算法[J]. 天津工程师范学院学报, 2021.[5] Pal S K, King R A. Image enhancement using fuzzy sets[J]. Electron Lett, 1980, 16(9): 376 —378.[6] Zhou S M, Gan J Q, Xu L D, et al. Interactive image enhancement by fuzzy relaxation [J]. International Journalof Automation and Computing, 2007, 04(3): 229 —235.[7] Mir A.H. Fuzzy entropy based interactive enhancement of radiographic images [J]. Journal of MedicalEngineering and Technology, 2007, 31(3): 220 —231.[8] TAN K, OAKLEY J P. Enhancement of color images in poor visibility conditions[C] / / Proceedings of IEEEInternational Conference on Image Processing. Vancouver, Canada: IEEE press, 2000, 788 - 791.[9] TAN R T, PETTERSSON N, PETERSSON L. Visibility enhancement for roads with foggy or hazy scenes[C] / /IEEE intelligent Vehicles Symposium. Istanbul Turkey: IEEE Press, 2007: 19 - 24.[10] 祝培,朱虹,钱学明, 等. 一种有雾天气图像景物影像的清晰化方法[J ]. 中国图象图形学报, 2004, 9 (1) : 124 -128.[11] 王萍,张春,罗颖昕. 一种雾天图像低比照度增强的快速算法[J ]. 计算机应用, 2006, 26 (1) : 152 - 156.[12] 詹翔,周焰. 一种基于局部方差的雾天图像增强算法[J ]. 计算机应用, 2007, 27 (2) : 510 - 512.[13] 芮义斌,李鹏,孙锦涛. 一种图像去薄雾方法[ J ]. 计算机应用,2006, 26 (1) : 154 - 156.[14] Coltuc D ,Bolon P,Chassery J-M. Exact Histogram Specification [J]. IEEE TIP ,2006,15(05):1143-1152.[15] Menotti D. Contrast Enhancement in Digital Imaging Using Histogram Equalization [D]. Brazil :UFMGUniversidade Federal de Minas Gerais ,2021.[16] Alsuwailem A M. A Novel FPGA Based Real-time Histogram Equalization Circuit for Infrared ImageEnhancement [J]. Active and Passive Electronic Devices ,2021(03):311-321.[17] 杨必武,郭晓松,王克军,等.基于直方图的线性拉伸的红外图像增强新算法[J]. 红外与激光工程,2003,32(1):1-3,7[18] 赵立兴,唐英干,刘冬,关新平.基于直方图指数平滑的模糊散度图像分割[J].系统工程与电子技术,2005,27(7):1182-1185[19] 李忠海.图像直方图局部极值算法及其在边界检测中的应用[J]. 吉林大学学报,2003,21( 5):89-91[20] Dah-Chung Chang,Wen-Rong Wu.Image Contrast Enhancement Based on a Histogram Transformation ofLocal Standard Deviation[J].IEEE Transactions on Medical Imageing,1998,17(4):518-530[21] Andrea Polesel, Giovanni Ramponi, and V.John Mathews. Image Enhancement via Adaptive UnsharpMasking[J].IEEE Transactions on Image Processing,2000,9(3)[22] 苏秀琴,张广华,李哲. 一种陡峭边缘检测的改进Laplacian 算子[J]. 科学技术与工程,2006,6(13):1833-1835[23] 张利平,何金其,黄廉卿•多尺度抗噪反锐化淹没的医学影像增强算法[J].光电工程,2004,31( 10):53-56 ,68[24] CHENG H D, XU HU I2JUAN. A novel fuzzy logic app roach to mammogram contrast enhancement[J ].Information Sciences, 2002,148: 167 - 184.[25] Zhou S M, Gan J Q. A new fuzzy relaxation algorithm for image enhancement [J]. International Journal ofKnowledge-based and Intelligent Engineering Systems, 2006, 10(3): 181 —192.[26] 李水根,吴纪桃.分形与小波[M]. 北京:科学出版社,2002[27] 冈萨雷斯. 数字图像处理[M]. 电子工业出版社,2003.[28] Silvano Di Zenzo,Luigi Cinque.Image Thresholding Using FuzzyEntrops.IEEE TRANSACTIONSONSYSTEM,MAN,ANDCYBERNETICS-PARTB:CYBERNETICS,1998,28(1):23[29] 王保平,刘升虎,范九伦,谢维信.基于模糊熵的自适应图像多层次模糊增强算法[J].电子学报,2005,33(4):730-734[30] Zhang D,Wang Z.Impulse noise detection and removal using fuzzy techniques[J].IEEE ElectronicsLetters.1997,33(5):378-379[31] Jun Wang,Jian Xiao, Dan Hu.Fuzzy wavelet network modeling with B-spline wavelet[J].Machine Learning andCybernetics,2005:4144-4148[32] 刘国军,唐降龙,黄剑华,刘家峰.基于模糊小波的图像比照度增强算[J].电子学报,2005, 33⑷:643-646[33] 陈佳娟,陈晓光,纪寿文.基于遗传算法的图像模糊增强处理方法[J].计算机工程与应用,2001, 21:109-111[34] 汪亚明,吴国忠,赵匀•基于模糊上级遗传算法的图象增强技术[J].农业机械学报,2003,34(3):96-98[35] 赵春燕,郑永果,王向葵•基于直方图的图像模糊增强算法[J].计算机工程,2005, 31(12):185-186,222[36] Tobias,,Seara.Image segmentation by histogram thresholding using fuzzy sets[J].IEEE Transactions onImage Processing,2002 11(12):1457-1465[37] 王玉平,蔡元龙多尺度B样条小波边缘算子]J]冲国科学,A辑,1995,25⑷:426 —437.[38] 李玉,于凤琴,杨慧中等基于新的阈值函数的小波阈值去噪方法[J].江南大学学报,2006 ,5(4):476-479[39] ,,K.R.Subramanian.Low-Complexity Image Denoiseing based on Statistical Modeling of WaveletCofficients[J].IEEE Signal Process,1999,6(12):300-303[40] 朱云芳,戴朝华,陈维荣.小波信号消噪及阈值函数的一种改良方法[J].中国测试技术,2006, 32(7):28-30[41] 凌毓涛,姚远,曾竞.基于小波的医学图像自适应增强[J].华中师范大学学报(自然科学版),2004,38(1):47-51[42] 何锦平.基于小波多分辨分析的图像增强及其应用研究[D]. 西北工业大学硕士学位论文,2003,4[43] Hayit Grernspan,Charles H,Anderson.Image Enhancement by Nonlinear Extrapolation[J].IEEE Transactionson Image Processing,2000,9(6):[44] 李旭超,朱善安.基于小波模极大值和Neyman Pearson准那么阈值的图像去噪.中国图象图形学报,10(8):964-969[45] Tai-Chiu Hsung,Daniel Pak-Kong Lun,Wan-Chi Siu.Denoising by Singularity Detection[J].IEEETransactions on Signal Processing,1999,47(11)[46] Lei Zhang,Paul Bao.Denoising by Spatial Correlation Thresholding[J]. IEEE Transactions on Circuts andSystems for Video Technology,2003,13(6):535-538[47] ,Huai Li,Matthew T.Freedman Optimization of Wavelet Decomposition for ImageCompression and Feature Preservation.IEEE Transactions on Medical Imaging,2003,22(9):1141-1151 [48] Junmei Zhong,Ruola Ning.Image Denoising Based on Wavelets and Multifractals for SingularityDetection[J].IEEE Transactions on Image Processing,2005,14(10):1435-1447[49] Z Cai,T H Cheng,C Lu,, 2001,37(11):683-685[50] Ahmed,J,Jafri,Ahmad.Target Tracking in an Image Sequence Using Wavelet Features and a NeuralNetwork[J].TENCON 2005,10(11):1-6[51] Yunyi Yan,Baolong Guo,Wei Ni.Image Denoising:An Approach Based on Wavelet Neural Network andImproved Median Filtering[J].WCICA 2006:10063-10067[52] Changjiang Zhang,Jinshan Wang,Xiaodong Wang,Huajun Feng.Contrast Enhancement for Image withIncomplete Beta Transform and Wavelet Neural Network[J].Neural Networks and Brain,2005,10:1236-1241 [53] Cao Wanpeng,Che Rensheng,Ye Dong An illumination independent edge detection and fuzzy enhancementalgorithm based on wavelet transform for non-uniform weak illumination images[J]Pattern Recognition Letters 29(2021)192-199金炜,潘英俊,魏彪 .基于改良遗传算法的图象小波阈值去噪研究 [M]. 刘轩,刘佳宾.基于比照度受限自适应直方图均衡的乳腺图像增强[J].计算机工程与应 用,2021,44(10):173-175Pal S k,King R A.Image enhancement using smoothing with fuzzy sets[J].IEEE Trans,Syst,Man,Cybern, 1981,11(7):494-501徐朝伦.基于子波变换和模糊数学的图像分割研究[D]:[博士学位论文].北京:北京理工大学电子工程 系, 1998Philippe Saint-Marc,Jer-Sen Chen. Adaptive Smoothing: A General Tool for Early Vision[J].IEEE Transactionson Pattern Analysis and Machine Intelligence.2003 , 13( 6) : 514-528翟艺书柳晓鸣,涂雅瑗.基于模糊逻辑的雾天降质图像比照度增强算法 [J].计算机工程与应用,2021,3 艾明晶,戴隆忠,曹庆华.雾天环境下自适应图像增强去雾方法研究 [J].计算机仿真,2021,7 Joung - YounKim ,Lee - SupKim , Seung - HoHwang. An Advanced Contrast Enhancement Using PartiallyOverlapped Sub - Block Histogram Equalization [J]. IEEE Transactions on Circuits and Systems of VideoTechnology , 2001, 11 (4) : 475 - 484.Srinivasa G Narasimhan , Shree K. Nayar. Contrast Restoration of weather Degraded Images[ J ]. IEEE Transactions on Pattern Analysis andMachine Intelligence, 2003, 25 (6) : 713 -724陈武凡 ,鲁贤庆 . 彩色图像边缘检测的新算法 ——广义模糊算子法 [ J ]. 中国科学 (A) , 2000, 15 ( 2) : 219-224.刘博,胡正平,王成儒. 基于模糊松弛迭代的分层图像增强算法 [ J ]. 光学技术, 2021,1 黄凯奇,王桥,吴镇扬,等. 基于视觉特性和彩色空间的多尺度彩色图像增强算法 [J]. 电子学报,2004, 32(4): 673-676.吴颖谦,方涛,李聪亮,等. 一种基于小波分析和人眼视觉特性的图像增强方法 [J]. 数据采集与处理, 2003,18: 17-21.陈少卿,吴朝霞,程敬之 .骨肿瘤 X 光片的多分辨特征增强 .西安:西安交通大学校报, 2003. 周旋,周树道,黄峰. 基于小波变换的图像增强新算法 [J ] . 计算机应用 :2005 ,25 (3) :606 - 608. 何锦平. 基于小波多分辨分析的图像增强及其应用研究 [D] .西安:西北工业大学 ,2003. 张德干 .小波变换在数字图像处理中的应用研究[J]. 沈阳:东北大学, 2000. 方勇•基于软阈值的小波图像增强方法〔J 〕计算机工程与应用,2002, 23:16 一 19. 谢杰成,张大力,徐文立 .小波图像去噪综述 .中国图象图形学报,2002, 3(7), 209 一 217. 欧阳诚梓、李勇等,基于小波变换与中值滤波相结合的图像去噪处理 [J].中原工学院学报 王云松、林德杰,基于小波包分析的图像去噪处理 [J].计算技术与自动 李晓漫 , 雷英杰等,小波变换和粗糙集的图像增强方法 [J]. 电光与控制 ,2007.12 刘晨 ,候德文等 . 基于多小波变换与图像融合的图像增强方法 [J]. 计算机技术及应用 ,2021.5 徐凌,刘薇,杨光等. 结合小波域变换和空间域变换的图像增强方法 [J]. 波谱学杂志 Peli E. Cont rast in complex images [J ] . J Opt Soc Am A , 1990 , 7 (10) : 2 032 - 2 040.Huang K Q , Wu Z Y, Wang Q. Image enhancement based on t he statistics of visual representation [J ] .Image Vision Comput , 2005 , 23 (1) : 51 - 57.高彦平 .图像增强方法的研究与实现 [D]. 山东科技大学硕士学位论文, 2005, 4XIANG Q S, LI A. Water-fat imaging with direct phase encoding [J]. Magnetic ResonanceImaging,1997,7(6):1002-1015.MA J, SINGH S K, KUMAR A J, et al. Method for efficient fast spin echo Dixon imaging [J]. Magnetic Resonance in Medicine, 2002, 48(6):1021-1027. [54][55] [56] [57][58] [59][60][61] [62] [63] [64][65] [66] [67] [68] [69][70][71][72] [73] [74] [75] [76][77][78][79] [80][81] [82]。

数字图像处理 外文翻译 外文文献 英文文献 数字图像处理

数字图像处理 外文翻译 外文文献 英文文献 数字图像处理

数字图像处理外文翻译外文文献英文文献数字图像处理Digital Image Processing1 IntroductionMany operators have been proposed for presenting a connected component n a digital image by a reduced amount of data or simplied shape. In general we have to state that the development, choice and modi_cation of such algorithms in practical applications are domain and task dependent, and there is no \best method". However, it isinteresting to note that there are several equivalences between published methods and notions, and characterizing such equivalences or di_erences should be useful to categorize the broad diversity of published methods for skeletonization. Discussing equivalences is a main intention of this report.1.1 Categories of MethodsOne class of shape reduction operators is based on distance transforms. A distance skeleton is a subset of points of a given component such that every point of this subset represents the center of a maximal disc (labeled with the radius of this disc) contained in the given component. As an example in this _rst class of operators, this report discusses one method for calculating a distance skeleton using the d4 distance function which is appropriate to digitized pictures. A second class of operators produces median or center lines of the digitalobject in a non-iterative way. Normally such operators locate critical points _rst, and calculate a speci_ed path through the object by connecting these points.The third class of operators is characterized by iterative thinning. Historically, Listing [10] used already in 1862 the term linear skeleton for the result of a continuous deformation of the frontier of a connected subset of a Euclidean space without changing the connectivity of the original set, until only a set of lines and points remains. Many algorithms in image analysis are based on this general concept of thinning. The goal is a calculation of characteristic properties of digital objects which are not related to size or quantity. Methods should be independent from the position of a set in the plane or space, grid resolution (for digitizing this set) or the shape complexity of the given set. In the literature the term \thinning" is not used - 1 -in a unique interpretation besides that it always denotes a connectivity preserving reduction operation applied to digital images, involving iterations of transformations of speci_ed contour points into background points. A subset Q _ I of object points is reduced by ade_ned set D in one iteration, and the result Q0 = Q n D becomes Q for the next iteration. Topology-preserving skeletonization is a special case of thinning resulting in a connected set of digital arcs or curves.A digital curve is a path p =p0; p1; p2; :::; pn = q such that pi is a neighbor of pi?1, 1 _ i _ n, and p = q. A digital curve is called simpleif each point pi has exactly two neighbors in this curve. A digital arc is a subset of a digital curve such that p 6= q. A point of a digital arc which has exactly one neighbor is called an end point of this arc. Within this third class of operators (thinning algorithms) we may classify with respect to algorithmic strategies: individual pixels are either removed in a sequential order or in parallel. For example, the often cited algorithm by Hilditch [5] is an iterative process of testing and deleting contour pixels sequentially in standard raster scan order. Another sequential algorithm by Pavlidis [12] uses the de_nition of multiple points and proceeds by contour following. Examples of parallel algorithms in this third class are reduction operators which transform contour points into background points. Di_erences between these parallel algorithms are typically de_ned by tests implemented to ensure connectedness in a local neighborhood. The notion of a simple point is of basic importance for thinning and it will be shown in this reportthat di_erent de_nitions of simple points are actually equivalent. Several publications characterize properties of a set D of points (to be turned from object points to background points) to ensure that connectivity of object and background remain unchanged. The report discusses some of these properties in order to justify parallel thinning algorithms.1.2 BasicsThe used notation follows [17]. A digital image I is a functionde_ned on a discrete set C , which is called the carrier of the image.The elements of C are grid points or grid cells, and the elements (p;I(p)) of an image are pixels (2D case) or voxels (3D case). The range of a (scalar) image is f0; :::Gmaxg with Gmax _ 1. The range of a binary image is f0; 1g. We only use binary images I in this report. Let hIi be the set of all pixel locations with value 1, i.e. hIi = I?1(1). The image carrier is de_ned on an orthogonal grid in 2D or 3D - 2 -space. There are two options: using the grid cell model a 2D pixel location p is a closed square (2-cell) in the Euclidean plane and a 3D pixel location is a closed cube (3-cell) in the Euclidean space, where edges are of length 1 and parallel to the coordinate axes, and centers have integer coordinates. As a second option, using the grid point model a 2D or 3D pixel location is a grid point.Two pixel locations p and q in the grid cell model are called 0-adjacent i_ p 6= q and they share at least one vertex (which is a 0-cell). Note that this speci_es 8-adjacency in 2D or 26-adjacency in 3D if the grid point model is used. Two pixel locations p and q in the grid cell model are called 1- adjacent i_ p 6= q and they share at least one edge (which is a 1-cell). Note that this speci_es 4-adjacency in 2D or 18-adjacency in 3D if the grid point model is used. Finally, two 3Dpixel locations p and q in the grid cell model are called 2-adjacent i_ p 6= q and they share at least one face (which is a 2-cell). Note that this speci_es 6-adjacency if the grid point model is used. Any of these adjacency relations A_, _ 2 f0; 1; 2; 4; 6; 18; 26g, is irreexive andsymmetric on an image carrier C. The _-neighborhood N_(p) of a pixel location p includes p and its _-adjacent pixel locations. Coordinates of 2D grid points are denoted by (i; j), with 1 _ i _ n and 1 _ j _ m; i; j are integers and n;m are the numbers of rows and columns of C. In 3Dwe use integer coordinates (i; j; k). Based on neighborhood relations wede_ne connectedness as usual: two points p; q 2 C are _-connected with respect to M _ C and neighborhood relation N_ i_ there is a sequence of points p = p0; p1; p2; :::; pn = q such that pi is an _-neighbor of pi?1, for 1 _ i _ n, and all points on this sequence are either in M or all in the complement of M. A subset M _ C of an image carrier is called _-connected i_ M is not empty and all points in M are pairwise _-connected with respect to set M. An _-component of a subset S of C is a maximal _-connected subset of S. The study of connectivity in digital images has been introduced in [15]. It follows that any set hIi consists of a number of _-components. In case of the grid cell model, a component is the union of closed squares (2D case) or closed cubes (3D case). The boundary of a 2-cell is the union of its four edges and the boundary of a 3-cell is the union of its six faces. For practical purposes it iseasy to use neighborhood operations (called local operations) on adigital image I which de_ne a value at p 2 C in the transformed image based on pixel- 3 -values in I at p 2 C and its immediate neighbors in N_(p).2 Non-iterative AlgorithmsNon-iterative algorithms deliver subsets of components in specied scan orders without testing connectivity preservation in a number of iterations. In this section we only use the grid point model.2.1 \Distance Skeleton" AlgorithmsBlum [3] suggested a skeleton representation by a set of symmetric points.In a closed subset of the Euclidean plane a point p is called symmetric i_ at least 2 points exist on the boundary with equal distances to p. For every symmetric point, the associated maximal discis the largest disc in this set. The set of symmetric points, each labeled with the radius of the associated maximal disc, constitutes the skeleton of the set. This idea of presenting a component of a digital image as a \distance skeleton" is based on the calculation of a speci_ed distance from each point in a connected subset M _ C to the complement of the subset. The local maxima of the subset represent a \distance skeleton". In [15] the d4-distance is specied as follows. De_nition 1 The distance d4(p; q) from point p to point q, p 6= q, is the smallest positive integer n such that there exists a sequence of distinct grid points p = p0,p1; p2; :::; pn = q with pi is a 4-neighbor of pi?1, 1 _ i _ n.If p = q the distance between them is de_ned to be zero. Thedistance d4(p; q) has all properties of a metric. Given a binary digital image. We transform this image into a new one which represents at each point p 2 hIi the d4-distance to pixels having value zero. The transformation includes two steps. We apply functions f1 to the image Iin standard scan order, producing I_(i; j) = f1(i; j; I(i; j)), and f2in reverse standard scan order, producing T(i; j) = f2(i; j; I_(i; j)), as follows:f1(i; j; I(i; j)) =8><>>:0 if I(i; j) = 0minfI_(i ? 1; j)+ 1; I_(i; j ? 1) + 1gif I(i; j) = 1 and i 6= 1 or j 6= 1- 4 -m+ n otherwisef2(i; j; I_(i; j)) = minfI_(i; j); T(i+ 1; j)+ 1; T(i; j + 1) + 1g The resulting image T is the distance transform image of I. Notethat T is a set f[(i; j); T(i; j)] : 1 _ i _ n ^ 1 _ j _ mg, and let T_ _ T such that [(i; j); T(i; j)] 2 T_ i_ none of the four points in A4((i; j)) has a value in T equal to T(i; j)+1. For all remaining points (i; j) let T_(i; j) = 0. This image T_ is called distance skeleton. Now weapply functions g1 to the distance skeleton T_ in standard scan order, producing T__(i; j) = g1(i; j; T_(i; j)), and g2 to the result of g1 in reverse standard scan order, producing T___(i; j) = g2(i; j; T__(i; j)), as follows:g1(i; j; T_(i; j)) = maxfT_(i; j); T__(i ? 1; j)? 1; T__(i; j ? 1) ? 1gg2(i; j; T__(i; j)) = maxfT__(i; j); T___(i + 1; j)? 1; T___(i; j + 1) ? 1gThe result T___ is equal to the distance transform image T. Both functions g1 and g2 de_ne an operator G, with G(T_) = g2(g1(T_)) = T___, and we have [15]: Theorem 1 G(T_) = T, and if T0 is any subset of image T (extended to an image by having value 0 in all remaining positions) such that G(T0) = T, then T0(i; j) = T_(i; j) at all positions of T_with non-zero values. Informally, the theorem says that the distance transform image is reconstructible from the distance skeleton, and it is the smallest data set needed for such a reconstruction. The useddistance d4 di_ers from the Euclidean metric. For instance, this d4-distance skeleton is not invariant under rotation. For an approximation of the Euclidean distance, some authors suggested the use of di_erent weights for grid point neighborhoods [4]. Montanari [11] introduced a quasi-Euclidean distance. In general, the d4-distance skeleton is a subset of pixels (p; T(p)) of the transformed image, and it is not necessarily connected.2.2 \Critical Points" AlgorithmsThe simplest category of these algorithms determines the midpointsof subsets of connected components in standard scan order for each row. Let l be an index for the number of connected components in one row of the original image. We de_ne the following functions for 1 _ i _ n: ei(l) = _ j if this is the lth case I(i; j) = 1 ^ I(i; j ? 1) = 0 in row i, counting from the left, with I(i;?1) = 0 ,oi(l) = _ j if this is the lth case I(i; j) = 1- 5 -^ I(i; j+ 1) = 0 ,in row i, counting from the left, with I(i;m+ 1)= 0 ,mi(l) = int((oi(l) ?ei(l)=2)+ oi(l) ,The result of scanning row i is a set ofcoordinates (i;mi(l)) ofof the connected components in row i. The set of midpoints of all rows midpoints ,constitutes a critical point skeleton of an image I. This method is computationally eÆcient.The results are subsets of pixels of the original objects, and these subsets are not necessarily connected. They can form \noisy branches" when object components are nearly parallel to image rows. They may be useful for special applications where the scanning direction is approximately perpendicular to main orientations of object components.References[1] C. Arcelli, L. Cordella, S. Levialdi: Parallel thinning ofbinary pictures. Electron. Lett. 11:148{149, 1975}.[2] C. Arcelli, G. Sanniti di Baja: Skeletons of planar patterns. in: Topolog- ical Algorithms for Digital Image Processing (T. Y. Kong, A. Rosenfeld, eds.), North-Holland, 99{143, 1996.}[3] H. Blum: A transformation for extracting new descriptors of shape. in: Models for the Perception of Speech and Visual Form (W. Wathen- Dunn, ed.), MIT Press, Cambridge, Mass., 362{380, 1967.19} - 6 -数字图像处理1引言许多研究者已提议提出了在数字图像里的连接组件是由一个减少的数据量或简化的形状。

外文资料及翻译

外文资料及翻译

外文资料及译文原文:Television Video SignalsAlthough over 50 years old , the standard television signal is still one of the most common way to transmit an image. Figure 8.3 shows how the television signal appears on an oscilloscope. This is called composite video, meaning that there are vertical and horizontal synchronization (sync) pulses mixed with the actual picture information.These pulses are used in the television receiver to synchronize the vertical and horizontal deflection circuits to match the video being displayed. Each second of standard video contains 30 complete images, commonly called frames , A video engineer would say that each frame contains 525 lines, the television jargon for what programmers call rows. This number is a little deceptive because only 480 to 486 of these lines contain video information; the remaining 39to 45 lines are reserved for sync pulses to keep the television’s circuits synchronized with the video signal.Standard television uses an interlaced format to reduce flicker in the displayed image. This means that all the odd lines of each frame are transmitted first, followed by the even lines. The group of odd lines is called the odd field, and the group of even lines is called the even field. Since each frame consists of two fields, the video signal transmits 60 fields per second. Each field starts with a complex series of vertical sync pulses lasting 1.3 milliseconds. This is followed by either the even or odd lines of video. Each line lasts for 63.5 microseconds, including a 10.2 microsecond horizontal sync pulse, separating one line from the next. Within each line, the analog voltage corresponds to the gray scale of the image, with brighter values being in the direction away from the sync pulses. This place the sync beyond the black range. In video jargon, the sync pulses are said to be blacker than black..The hardware used for analog-to-digital conversion of video signals is called a frame grabber. This is usually in the form of an electronics card that plugs into a computer, and connects to a camera through a coaxial cable. Upon command from software, the frame grabber waits for the beginning of the next frame, as indicated by the vertical sync pulses. During the following two fields, each line of video is sampled many times, typically 512,640 or 720 samples per line, at 8bits per sample. These samples are stored in memory as one row of the digital image.This way of acquiring a digital image results in an important difference between the vertical and horizontal directions. Each row in the digital image corresponds to one line in the video signal, and therefore to one row of wells in the CCD. Unfortunately,the columns are not so straightforward. In the CCD, each row contains between about 400 and 800 wells (columns), depending on the particular device used. When a row of wells is read from the CCD, the resulting line of video is filtered into a smooth analog signal, such as in Figure 8.3. In other words, the video signal does not depend on how many columns are present in the CCD. The resolution in the horizontal direction is limited by how rapidly the analog signal is allowed to change. This is usually set at 3.2 MHz for color television, resulting in a rise time of about 100 nanoseconds, i.e, about1/500th of the 53.2 microsecond video line.When the video signal is digitized in the frame grabber, it is converted back into conclusions. However, these columns in the digitized image have no relation to the columns in the CCD. The number of columns in the digital image depends solely on how many times the frame grabber samples each line of video. For example, a CCD might have 800 wells per row, while the digitized image might only have 512 pixels (i.e columns) perrow.The number of columns in the digitized image is also important for another reason. The standard television image has an aspect ratio of 4 to 3, i.e. it is slightly wider than it is high. Motion pictures have the wider aspect ratio of 25 to 9. CCDs used for scientific applications often have an aspect ratio of 1 to 1, i.e , a perfect square. In any event, the aspect ratio of a CCD is fixed by the placement of the electrodes, and cannot be altered. However, the aspect ratio of the digitized image depends on the number of samples per line. This becomes a problem when the image is displayed, either on a video monitor or in a hardcopy. If the aspect ratio isn’t properly reproduced, the image looks squashed horizontally or vertically.The 525 line video signal described here is called NTSC (National Television Systems Committee), a standard defined way back in 1954. This is the system used in the United States and Japan. In Europe there are two similar standards called PAL (Phase Alternation by Line) and SECAM (Sequential Chrominance and Memory). The basic concepts are the same, just the numbers are different. Both PAL and SECAM operate with 25 interlaced frames per second, with 625 lines per frame. Just as with NTSC, some of these lines occur during the vertical sync, resulting in about 576 lines that carry picture information. Other more subtle differences relate to how color and sound are added to the signal.The most straightforward way of transmitting color television would be to have three separate analog signals, one for each of the three colors the human eye can detect: red, green and blue. Unfortunately, the historical development of television did not allow such a simple scheme. The color television signal was developed to allow existing blackand white television sets to remain in use without modification. This was done by retaining the same signal for brightness information , but adding a separate signal for color information. In video jargon, the brightness is called the luminance signal, while the color is the chrominance signal. The chrominance signal is contained on a 3.58 MHz carrier wave added to the black and white video signal. Sound is added in this same way, on a 4.5 MHz carrier wave. The television receiver separates these three signals, processes them individually, and recombines them in the final diplay.译文:关键词:核心,合成信号,电压耦合电视信号尽管已经拥有50年的历史了,电视信号依然是常用的传递信息的途径之一。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

附录图像科学综述近几年来,图像处理与识别技术得到了迅速的发展,现在人们己充分认识到图像处理和识别技术是认识世界、改造世界的重要手段。

目前它己应用于许多领域,成为2l世纪信息时代的一门重要的高新科学技术。

1.图像处理与识别技术概述图像就是用各种观测系统以不同形式和手段观测客观世界而获得的,可以直接或间接作用于人眼而产生视知觉的实体。

科学研究和统计表明,人类从外界获得的信息约有75%来自于视觉系统,也就是说,人类的大部分信息都是从图像中获得的。

图像处理是人类视觉延伸的重要手段,可以便人们看到任意波长上所测得的图像。

例如,借助伽马相机、x光机,人们可以看到红外和超声图像:借助CT可看到物体内部的断层图像;借助相应工具可看到立体图像和剖视图像。

1964年,美国在太空探索中拍回了大量月球照片,但是由于种种环境因素的影响,这些照片是非常不清晰的,为此,美国喷射推进实验室(JPL)使用计算机对图像进行处理,使照片中的重要信息得以清晰再现。

这是这门技术发展的重要里程碑。

此后,图像处理技术在空间研究方面得到广泛的应用。

总体来说,图像处理技术的发展大致经历了初创期、发展期、普及期和实用化期4个阶段。

初创期开始于20世纪60年代,当时的图像采用像素型光栅进行扫描显示,大多采用巾、大型机对其进行处理。

在这一时期,由于图像存储成本高,处理设备造价高,因而其应用面很窄。

20世纪70年代进入了发展期,开始大量采用中、小型机进行处理,图像处理也逐渐改用光栅扫描显示方式,特别是出现了CT和卫星遥感图像,对图像处理技术的发展起到了很好的促进作用。

到了20世纪80年代,图像处理技术进入普及期,此时购微机已经能够担当起图形图像处理的任务。

VLSL的出现更使得处理速度大大提高,其造价也进一步降低,极大地促进了图形图像系统的普及和应用。

20世纪90年代是图像技术的实用化时期,图像处理的信息量巨大,对处理速度的要求极高。

21世纪的图像技术要向高质量化方面发展,主要体现在以下几点:①高分辨率、高速度,图像处理技术发展的最终目标是要实现图像的实时处理,这在移动目标的生成、识别和跟踪上有着重要意义:②立体化,立体化所包括的信息最为完整和丰富,数字全息技术将有利于达到这个目的;②智能化,其目的是实现图像的智能生成、处理、识别和理解。

2.图像处理与识别技术的应用领域目前,图像处理与识别技术的主要应用领域有生物医学、文件处理、工业检测、机器人视觉、货物检测、邮政编码、金融、公安、银行、机械、交通、电子商务和多媒体网络通信等领域。

3.图像处理与识别数字图像处理和识别学科所涉及的知识非常广泛,具体的方法种类繁多,应用也极为普遍,但从学科研究内容上可以分为以下几个方面:图像数字化、图像变换、图像增强、图像分割、图像分析。

4.图像识别技术图像识别是近20年来发展起来的一门新型技术科学,它以研究某些对象或过程(统称图像)的分类与描述为主要内容。

图像识别所研究的领域十分广泛,它可以是医学图像中的癌细胞识别;机械加工中零部件的识别、分类;可以是认遥感图片中辨别农作物、森林、湖泊和军事设施,以及判断农作物的长势,预测收获量等;可以是自导引小车中的路径识别;邮政系统中自动分拣信函;交通管制、识别违章行驶的汽车牌照;银行的支票识别、身份证识别等。

上述都是图像识别研究的课题。

总体来说所研究的问题,主要是分类问题。

5.图像处理在研究图像时,首先要对获得的图像信息进行预处理(前处理)以滤去干扰、噪声,作几何、彩色校正等。

这样可提高信噪比;有时由于信息微弱,无法辨识,还得进行增强处理。

增强的作用,在于提供一个满足一定要求的图像,或对图像进行变换,以便人或计算机分析。

并且为了从图像中找到需要识别的东西,还得对图像进行分割,也就是进行定位和分离,以分出不同的物体。

为了给观察者以清晰的图像,还要对图像进行政善,即进行复原处理,它是把已经退化了图像加以重建或恢复的过程,以便改进图像的保真度。

在实际处理中,由于图像信息量非常大,在存储及传送时,还要对图像信息进行压缩。

上述工作必须用计算机进行,因而要进行编码等工作。

编码的作用,是用最少数量的编码位(亦称比特),表示单色和彩色图像,以便更有效地传输和存储。

以上所述都属图像处理的范畴。

因此,图像处理包括图像编码、图像增强、图像压缩、图像复原、图像分割等。

对图像处理环节来说,输入是图像,输出也是图像。

由图像处理的内容可见,图像处理的目的主要在于解决两个问题:一是判断图像中有无需要的信息:另一是确定这些信息是什么。

6.图像理解所谓图像理解是一个总称。

上述图像处理及图像识别的最终目的,就在于对图像作描述和解释,以便最终理解它是什么图像。

所以它是在图像处理及图像识别的基础上,再根据分类作结构句法分析,去描述图像和解释图像。

因而图像理解包括图像处理、图像识别和结构分析。

对理解部分米说,输入是图像,输出则是图像的描述与解释。

7.图像识别与图像处理及图像理解的关系上面说过,图像理解是一个总称。

图像识别是一个系统。

其中每一部分和其前面的一部分都有一定的关系,也可以说有一种反馈作用,例如分割可以在预处理中进行。

并且,该系统不是孤立的,为了发挥其功能,它时时刻刻需要来自外界的必要信息,以便使每个部分能有效地工作。

这些外界信息是指处理问题及解决问题的看法、设想、方法等。

例如,根据实际图像,在处理部分需要采用什么样的预处理,在识别部分需要怎样分割,抽取什么样的特征及怎样抽取特征,怎样进行分类,要分多少类,以及最后提供结构分析所需的结构信息等。

在该系统中,图像预处理、图像分割为图像处理;图像特征提取和图像分类属图像识别;而结构句法分析涉及的内容则是从图像分割到图像结构分析这一过程;整个系统所得到的结果是图像的描述及解释。

当某个新的对象(图像)送进系统时,就可以进行解释,说明它是什么。

8.Matlab技术简介Mat lab是Math works公司与1982年推出的一套高性能的数值计算和可视化数学软件。

被誉为“巨人肩上的工具”。

由于使用Mat lab编程运算与人进行科学计算的思路和表达方式完全一致,所以不像学习其它高级语言,如Basic和C等那样难于掌握,用Mat lab编写程序犹如在演算纸上排列出公式与求解问题,所以又被称为演算科学算法语言。

一般数值分析、矩阵运算、数字信号处理、建模和系统控制和优化等应用程序,并集应用程序和图形于一个便于使用的集成环境中。

在这个环境下,对所要求解的问题,用户只需简单地列出数学表达式,其结果便以数值或图形方式显示出来。

Mat lab的含义是矩阵实验室(MATRIXLABORATORY),主要用于方便矩阵的存取,其基本元素是无须定义维数的矩阵。

Mat lab自问世以来,就是以数值计算称雄。

Mat lab进行数值计算的基本单位是复数数组(或称阵列),这使得Mat lab高度“向量化”。

经过十几年的完善和扩充,它现已发展成为线性代数课程的标准工具。

由于它不需定义数组的维数,并给出矩阵函数、特殊矩阵专门的库函数,使之在求解诸如信号处理、建模、系统识别、控制、优化等领域的问题时,显得大为简捷、高效、方便,这是其它高级语言所不能比拟的。

美国许多大学的实验室都安装有Mat lab供学习和研究之用。

在那里,Mat lab是攻读学位的大学生、硕士生、博士生必须掌握的基本工具。

Mat lab中包括了被称作工具箱(TOOU玉OX)的各类应用问题的求解工具。

工具箱实际上是对Mat lab进行扩展应用的一系列Mat lab 函数(称为M文件),它可用来求解各类学科的问题,包括信号处理、图象处理、控制系统辨识、神经网络等。

随着Mat lab版本的不断升级,其所含的工具箱的功能也越来越丰富,因此,应用范围也越来越广泛,成为涉及数值分析的各类工程师不可不用的工具。

Image Science ReviewIn recent years, image processing and recognition technology has developed rapidly, now people have been fully aware of image processing and recognition technology is to understand the world and an important means of transforming the world. Currently, it has been used in many fields, 21 century information age an important high-tech science and technology.1. Image Processing and Recognition TechnologyImage is to use all kinds of observing systems in various forms and means of observation and access to the objective world, directly or indirectly, in the role of a human eye and visual perception of the entity. Scientific research and statistics show that the human race from the outside world the information obtained about 75 percent comes from the visual system, that is, human beings are the most of the information obtained from the image.Image processing is an important extension of human vision means that people can be arbitrary wavelength measured by the image. With CT can see objects within the fault image with the corresponding tools can be seen as three-dimensional images and post-image. 1964, the United States in space exploration shoot the moon to a large number of photos, but because of various environmental factors, these photos is not very clear, to that end, the U.S. Jet Propulsion Laboratory (JPL) on the use of computer image processing, Photos of important information to clear reproduction. This is the door an important milestone in the development of technology.Generally speaking, the development of image processing technologies generally experienced a start-up phase, the period of development, popularization and applicationof view of four stages. Start-up phase began in the 1960s, the image grating used to scan revealed that most of a towel, its mainframe processing. During this period, due to the high cost of image storage, processing equipment costs, thus its use of very narrow. In the 1970s entered a period of development, began using large, image processing is gradually switching to raster scan display, especially in the CT and satellite remote sensing image, the image processing technology development played a very good Facilitating role. By the 1980s, image processing technology into the popular view, this purchase has been able to take on computer graphics image processing tasks. VLSL makes the emergence of more processing speed greatly improved, further reducing its cost, greatly promote the popularity of graphics imaging systems and applications. 20 images in the 1990s is the period of practical technology, image processing of the huge amount of information on the requirements of high processing speed.21st century technology to high-quality images of the area of development, embodied in the following points: ①high-resolution, high speed, image processing technology development of the ultimate goal is to achieve real-time image processing, which in the formation of a moving target, identification And on the track is of great significance: ②three-dimensional, three-dimensional information covered by the most complete and rich, digital holographic technology will help to achieve this objective;②intelligent, and its purpose is to achieve a smart image formation, processing, recognition and understanding .2. Image processing and recognition technology applicationsAt present, image processing and recognition technology the main areas of biomedical applications, document processing, industrial inspection, robot vision, cargo inspection, zip code, finance, public security, banking, machinery, transport, e-commerce and multimedia communication networks, and other fields.3.Image processing and recognitionDigital image processing and identifying the knowledge disciplines involved in a very wide variety of specific ways, the application also very common, but research on the subject can be divided into the following areas: digital image, image transformation, image enhancement, image segmentation.4. Image Recognition TechnologyRecognition is nearly 20 years to develop a new type of science and technology, to study certain object or process (collectively images) and the classification described as the main content.Image Recognition by the study a wide variety of areas, it can be a medical image of the cancer cell recognition; machining parts and components in the identification, classification can be identified in remote sensing images to identify crops, forests, lakes and military facilities, and the judge of crops Growth is forecast harvest levels; can be a self-guided car in the path recognition; postal system of automatic letter sorting; traffic control, identification of regulations on vehicle, bank identification, ID cards and other identification. These images recognition of are the subject. Overall, the study's main problem is classification issues.5. Image ProcessingIn examining images, the first to receive the image information on the pretreatment (before processing) filtered to interference, noise, for geometry, color correction, and so on. This will improve the signal to noise ratio; sometimes because of weak information, is not recognized, had to deal with enhancements. Enhance the role is to provide a meet certain requirements of the image, or images transform, or to computer analysis. And in order to find images from the need to identify things have to split the image, that is, positioning and separation, separation of different objects. To give observers a clear image, but also the image of good governance, that is, rehabilitation treatment, it is already degraded the image to rebuild or restore the process in order to improve the image fidelity. In the actual processing, because image is very large amount of information in storage and transmission, but also the image data compression.The work must be carried out by computer, thus to encode and so on. The role is the least number of digital coding (also known as bits), said monochrome and color image for a more effective transmission and storage.The above are considered image processing areas. Therefore, image processing, including image coding, image enhancement, image compression, image restoration, image segmentation, and so on. On the part of image processing, image processing, themain purpose is to solve two problems: First, determine whether the image needed: another is to determine what information is.6. Image UnderstandingThe so-called image understanding is a general term. The image processing and image recognition of the ultimate goal is to make the image described and explained that in order to understand what it is the final image. So it is in image processing and image recognition on the basis of re-classification under the syntactic structure for analysis, and interpretation of images to describe images. Thus image understanding, including image processing, image recognition and analysis.7. The relationship of Image recognition and image processing and image understandingAbove that image is a general term for understanding. Recognition is a system. Each of these parts and the front part of a certain relationship can also say there is a feedback effect, for example, can be divided in the pretreatment of conduct. In addition, it always needs the necessary information from the outside world, so that each part can work effectively. For example, according to the actual images, some need to adopt in dealing with what kind of preprocessing, in recognition of the need to separate what, from what kind of features and characteristics of how to take and how to classify, to the number of sub-category, and, finally, to provide the necessary structural analysis The structure of information.In this system, image pre-processing, image segmentation for image processing, image feature extraction and image classification of image recognition and the syntactic structure of the content is separated from image to image the structure of this process; system as a whole received The result is the description and image interpretation. Whena new object (images) into the system, you can interpret that what it is.8. Mat lab Technical OverviewMat lab is Math works with the 1982 launch of a high-performance numerical computing and visualization of mathematical software. As the use of computing and programming Mat lab conducted scientific computing ideas and expression exactly the same, so unlike other high-level language learning, such as Basic and C, and so on, asdifficult to grasp, with Mat lab procedures for the preparation of the calculus is like a piece of paper with formula And solving problems, is also known as calculus scientific.General numerical analysis, matrix computing, digital signal processing, modeling and system control and optimization applications, and collect applications and graphics in a user-friendly integrated environment. In this environment, the solution of the problem required, users simply set out mathematical expression, the result will be numerical or graphic to show.Mat lab is the meaning of Matrix Laboratories (MATRIXLABORATORY), the basic element is not defined dimension of the matrix. Mat lab has since come out. Mat lab numerical calculation is the basic unit complex array (or array), which makes high Mat lab "to quantify." After more than 10 years of refinement and expansion, it has become the standard linear algebra course tools. Because no definition of an array of dimension, and gives matrix function, special matrix specialized library function, so that in solving such as signal processing, modeling, system identification, control and optimize the areas of the issue, it Greatly simple, efficient, convenient and other senior This is unprecedented language. Many American universities have installed a laboratory Mat lab for study and research purposes. There, doctoral students must master the basic tools. Mat lab, known as included in the toolbox application of the various tools to solve the problem. Kit is actually Mat lab to expand the application of a series of Mat lab function it can be used to solve various disciplines, including signal processing, image processing, the control system identification, neural networks. With Mat lab version of the continually escalating, the functions contained in the toolbox and extensive Therefore, the application of more and more extensive, involving a numerical analysis of the types of engineers do not have to be a tool.。

相关文档
最新文档