Attributes | Values |
---|
rdf:type
| |
Description
| - The most important methods for security image data processing contain person recognition, suspicious events detection, objects and area of interest analysis and their classification, MSE, SNR and subjective evaluation. Image data processing of UWFC security systems is very difficult in general. Precision of image data post-processing and analyses, which is very important for these systems, decreases because of a lot of different kinds of optical aberrations and distortions. Influence of optical aberrations increases at most at the frontiers of field of view (high angular distance from optical axis of the system). These aberrations distort the PSF of optical system and rapidly cut the accuracy of measurements. The third order optical aberrations models for LSI and LSV systems have been described. These models are based on Seidel and Zernike approximating polynomials. Optical aberrations effect to the transfer function (PSF) of optical imaging systems has been described.
- The most important methods for security image data processing contain person recognition, suspicious events detection, objects and area of interest analysis and their classification, MSE, SNR and subjective evaluation. Image data processing of UWFC security systems is very difficult in general. Precision of image data post-processing and analyses, which is very important for these systems, decreases because of a lot of different kinds of optical aberrations and distortions. Influence of optical aberrations increases at most at the frontiers of field of view (high angular distance from optical axis of the system). These aberrations distort the PSF of optical system and rapidly cut the accuracy of measurements. The third order optical aberrations models for LSI and LSV systems have been described. These models are based on Seidel and Zernike approximating polynomials. Optical aberrations effect to the transfer function (PSF) of optical imaging systems has been described. (en)
|
Title
| - Modeling of the widefield space variant security systems
- Modeling of the widefield space variant security systems (en)
|
skos:prefLabel
| - Modeling of the widefield space variant security systems
- Modeling of the widefield space variant security systems (en)
|
skos:notation
| - RIV/68407700:21230/08:00146735!RIV10-MSM-21230___
|
http://linked.open...avai/riv/aktivita
| |
http://linked.open...avai/riv/aktivity
| |
http://linked.open...vai/riv/dodaniDat
| |
http://linked.open...aciTvurceVysledku
| |
http://linked.open.../riv/druhVysledku
| |
http://linked.open...iv/duvernostUdaju
| |
http://linked.open...titaPredkladatele
| |
http://linked.open...dnocenehoVysledku
| |
http://linked.open...ai/riv/idVysledku
| - RIV/68407700:21230/08:00146735
|
http://linked.open...riv/jazykVysledku
| |
http://linked.open.../riv/klicovaSlova
| - Image processing; Zernike polynomials; deconvolution (en)
|
http://linked.open.../riv/klicoveSlovo
| |
http://linked.open...ontrolniKodProRIV
| |
http://linked.open...v/mistoKonaniAkce
| |
http://linked.open...i/riv/mistoVydani
| |
http://linked.open...i/riv/nazevZdroje
| - Proceedings of 42nd Annual 2008 IEEE International Carnahan Conference on Security Technology
|
http://linked.open...in/vavai/riv/obor
| |
http://linked.open...ichTvurcuVysledku
| |
http://linked.open...cetTvurcuVysledku
| |
http://linked.open...UplatneniVysledku
| |
http://linked.open...iv/tvurceVysledku
| - Páta, Petr
- Řeřábek, Martin
|
http://linked.open...vavai/riv/typAkce
| |
http://linked.open...ain/vavai/riv/wos
| |
http://linked.open.../riv/zahajeniAkce
| |
http://linked.open...n/vavai/riv/zamer
| |
number of pages
| |
http://purl.org/ne...btex#hasPublisher
| |
https://schema.org/isbn
| |
http://localhost/t...ganizacniJednotka
| |