Font Size: a A A

Research Of Object Identification Methods Based On Rocket Lunch Security Control Image

Posted on:2014-11-01Degree:MasterType:Thesis
Country:ChinaCandidate:Y H GongFull Text:PDF
GTID:2268330422450482Subject:Aircraft design
Abstract/Summary:PDF Full Text Request
As a mature image enhancement recognition technology, digital imageprocessing technology has been discussed widely in domestic and abroad, whileat present its application to launch initial control TV system is still blank. Thesignificance of research on initial control TV image recognition technology is asfollowing: instead of camera and tape recorder by using digital image acquisitionand storage system, the initial launch control system will collect and storagedigital images. By using different digital image processing technologies, therealization, capturing of rocket bodies can be achieved.Based on the systematic review of relevant references, the digital imageacquisition, processing and storage implementation used in launch site initialcontrol TV system has been carried out in this article. Programming by Matlabsoftware, testing by using the period launch initial security video, the advantages,disadvantages and processing time required have been analyzed and compared.The main work of this paper is:(1) Select the suitable hardware equipment, namely use the digital camera torealize the collection, processing and storage of digital images, and program theinterface codes between the camera and computer based on Matlab;(2) Access to relevant literature, based on morphology boundary detectiontechnology, Hoff transform line detection technology, optical flow detectiontechnology, written program code in Matlab, realize the capture, and recognitionof rocket bodies for the of initial segment security control television;(3) Based on these three different algorithms, according to the body normaland fault flight, affect of the sun position on taking video, different shootingeffect analysis and comparison at day and night, this article analyzed effect theresults and the computation time required for the three algorithms can satisfy theneed of real-time image processing.
Keywords/Search Tags:Security Control Image, Object Identification and Recognition, Morphology, Hough Transformation, Optical Flow
PDF Full Text Request
Related items