Hierarchical Feature-Based Detection Method for SAR Targets Under Complex Environment

来源 :Chinese Journal of Electronics | 被引量 : 0次 | 上传用户:sk_only
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
A reliable target detection method for Synthetic aperture radar(SAR)images is needed urgently with the wide application of SAR systems.The performance of conventional detection algorithms,such as Constant false alarm rate(CFAR),degrade significantly in low SCR or complex regions while the Human visual system(HVS)can identify targets of interest without knowing characteristics of the background even in complicated environment.The combination of HVS with the SAR-ATR system may effectively achieve real-time multi-target detection in complex occlusion scenes.A new effective target detection algorithm is put forward using hierarchical characteristics of targets.Inspired by different roles of the retina and visual cortex in the HVS,this detection algorithm is divided into coarse detection and fine detection stage.Two kinds of features based on the correlation between target features and suspicious targets,namely overall feature and refined feature,are used in these two stages respectively to extract real targets.Experimental results verify its correctness and effectiveness in complex environment. A reliable target detection method for Synthetic aperture radar (SAR) images is needed urgently with the wide application of SAR systems. The performance of conventional detection algorithms, such as Constant false alarm rate (CFAR), degrade significantly in low SCR or complex regions while the Human visual system (HVS) can identify targets of interest without knowing characteristics of the background even in complicated environments. the combination of HVS with the SAR-ATR system may be achieve real-time multi-target detection in complex occlusion scenes. A new effective target detection algorithm is put forward using hierarchical characteristics of targets. Inspired by different roles of the retina and visual cortex in the HVS, this detection algorithm is divided into coarse detection and fine detection stage. Two kinds of features based on the correlation between target features and suspicious targets, have overall feature and refined feature, are used in these two stages respectively to extract real targets.Experimental results verify its correctness and effectiveness in complex environment.
其他文献
期刊
Device-to-Device(D2D)communication is viewed as an emerging technology in the fifth generation systems to fully explore the proximate gain residing in local com
目的 了解上海市新泾社区2型糖尿病人群盲和中重度视觉损伤的患病率及相关因素.方法 以人群为基础的横断面研究.2014年10月至2015年1月,对新泾社区2型糖尿病居民进行视力及眼
随着我国教育信息化的不断开展与深入,校园网络在高职院校中的应用地位也愈来愈重要。本文就PKI技术植入VPN技术获得安全性更高的校园网络模型进行了深入研究和分析,以便确保高职校园网络能够更加安全使用。
Due to the inefficiency of traditional fixed spectrum allocation policies,the paradox of apparent spectrum scarcity occurs while most of the bands are underutil
Black-burst based multi-hop broadcast protocols are effective means to disseminate Emergency messages(EMs)in Vehicular ad hoc networks(VANETs).However,Clear to
介绍了管道对接焊缝未焊透自身高度超声测定方法试验研究过程 ,提出了用当量法测定管道对接焊缝未焊透自身高度的检测工艺 This paper introduces the experimental researc
期刊
To detect copy-paste tampering,an improved SIFT(Scale invariant feature transform)-based algorithm was proposed.Maximum angle is defined and a maximum angle-based marked graph is constructed.The marke
Ciphertext policy attribute-based encryption(CP-ABE)is becoming a new primitive for finegrained access control.It neither produces multiple encrypted copies of