期刊文献+

FAST DETECTING TARGET GROUPS IN SAR IMAGES 被引量:1

FAST DETECTING TARGET GROUPS IN SAR IMAGES
下载PDF
导出
摘要 A successful algorithm for detecting target groups is presented. Firstly, A global Constant False Alarm Rate (CFAR) detector is utilized to locate the potential target regions, and then the features are com- puted for target discrimination based on voting mechanism. Finally, Target groups are extracted. The results of experiments show the validity of this algorithm. A successful algorithm for detecting target groups is presented. Firstly, A global Constant False Alarm Rate (CFAR) detector is utilized to locate the potential target regions, and then the features are computed for target discrimination based on voting mechanism. Finally, Target groups are extracted. The results of experiments show the validity of this algorithm.
出处 《Journal of Electronics(China)》 2006年第5期781-782,共2页 电子科学学刊(英文版)
关键词 检测 分辨 目标群 有效性 计算机技术 Detection Discrimination Location Target groups
  • 相关文献

同被引文献37

  • 1杨孟飞.空间容错计算机的基本问题和对策[J].航天控制,1994,12(2):35-39. 被引量:2
  • 2周海涛,朱纪洪.基于自检测的多数一致表决算法[J].清华大学学报(自然科学版),2005,45(4):488-491. 被引量:12
  • 3俞艳苹,郭渊博,马建峰.基于自适应大数表决机制的容忍入侵模型[J].系统工程与电子技术,2005,27(6):1098-1101. 被引量:12
  • 4郭文普,孙继银,任俊.一种基于数据融合的分布式入侵检测系统[J].计算机技术与发展,2006,16(2):217-219. 被引量:6
  • 5HOSEINNEZHAD R, BAB-HADIASHAR A. Fusion of redundant information in brake-by-wire systems, using a fuzzy voter[ J]. Journal of Advances in Information Fusion,2006,1 ( 1 ) :35-45.
  • 6KACELENGA R, ERICKSON D, PALMER D. Voting fusion adaptation for landmine detection[ C ]//Proc of the 5th International Conference on Information Fusion. 2002:333-340.
  • 7MU Xiao-yan, WATTA P, HASSOUN M H. A weighted voting model of associative memory[J]. IEEE Trans on Neural Networks,2007, 18(3) :756-777.
  • 8ERP M van, VUURPIJL L, SCHOMAKER L. An overview and comparison of voting methods for pattern recognition[ C]//Proc of the 8th International Workshop on Frontiers in Handwriting Recognition. Washington DC : IEEE Computer Society, 2002 : 195- 200.
  • 9PARHAMI B. A taxonomy of voting schemes for data fusion and dependable computation [ J ]. Reliability Engineering and System Safety, 1996,52 ( 2 ) : 139 - 151.
  • 10郭渊博,马建峰.容忍入侵的国内外研究现状及所存在的问题分析[C]//第九届保密通信与信息安全现状研讨会论文集.2005:337-341.

引证文献1

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部