Abstract
Coal is one of the main energy sources in China. The country attaches great importance to the development of coal mining industry, and coal production is on the rise. At the same time, mine ...safety accidents are becoming more and more frequent, and the country is paying more and more attention to mine safety accidents. The underground environment of coal mine is complex, noisy and uneven, and there will be problems such as occlusion and high false detection rate during video monitoring. In order to ensure the safety of underground personnel, moving target detection and tracking based on video monitoring information is of great significance for coal mine safety production. The purpose of this paper is to study how to analyze and study the monitoring of moving targets in coal mines based on computer vision processing, and describe the image processing methods. This paper puts forward the problem of target monitoring, which is based on image processing, and then elaborates on the concept of image enhancement and related algorithms. From the average gradient, the algorithm in this paper is 56.60% higher than the histogram equalization algorithm, and 68.26% higher than the dark primary color prior dehazing algorithm. and designs and analyzes cases of image enhancement in coal mines. The experimental results show that the information entropy of the algorithm in this paper is 31.10% higher than that of the dark primary color prior dehazing algorithm, and 18.72% higher than that of the histogram equalization algorithm. It can be seen that the algorithm in this paper can achieve better enhancement effect.
Image encryption (IE) technology is vital to privacy, but the parameter range of the traditional image encryption technology is limited. So it is important to enhance the performance of IE methods. ...In this study, a plaintext associative IE based on the improved logistic map and hyperchaotic system is proposed. The improved logistic map scrambles the pixels of the image. Then the hyperchaotic system performs diffusion and confusion operations on the image. For parameters μ and r , the sequence generated by the improved logistic map can traverse and uniformly distribute in the space (0,1). The Lyapunov exponent of the improved logistic map is greater than 21.5. The correlation coefficients of the encrypted image pixels after encryption are all less than 0.05. The UACI and NPCR indices of the improved encryption method are close to their theoretical values of 98.6133 and 33.1287, respectively, which are higher than those of the reference methods. The improved encryption method overcomes the limitations in the parameter range of traditional image and text encryption techniques, slow encryption speed, and uneven chaotic sequences. This method has higher security and sensitivity, andit can be used to establish a plaintext associative IE method.
The activated sludge (AS) process is a biological treatment process of wastewater used in sewage treatment plants, in which settling of AS is vitally important for wastewater treatment. In AS, ...however, bulking caused by filamentous bacteria will significantly reduce the settling capacity of activated sludge. Traditionally, the physicochemical method has been used to monitor the status or performance of filamentous bacteria in activated sludge, while it is a very compromising means in modern digital quality control for wastewater treatment when digital image processing and analysis technology is used to determine the status of filamentous bacteria in activated sludge. In order to avoid the disadvantages of deficient direction selectivity in the translation vector field for isotropic phase stretch transform (PST) and high noise susceptibility in determining the status of filamentous bacteria in AS and low accuracy, an anisotropic PST (APST) method for filamentous bacteria test in AS was proposed in this paper; specifically speaking, by analyzing and deriving the disadvantages of the traditional isotropic PST kernel function, we designed an APST kernel function, put forward a non-maximum suppression strategy for processing of images from different aspects and combined with the relative total variation theory to form APST-based algorithm for segmentation of activated sludge phase-contrast microscopic image. According to a large number of experimental results, in terms of the overall segmentation effect or the subjective and objective evaluation indicators, the resultant algorithm in this paper is superior to the latest traditional PST segmentation algorithm, Canny image segmentation algorithm and Sobel image segmentation algorithm. Also, the segmentation results for filamentous bacteria showed that probability rand index (PRI) and global consistency error (GCE) indicators were all improved by about 30%, supporting the effectiveness and superiority of the algorithm in this paper.
Aiming at the problems of serious geometric distortion, low efficiency, and poor stability of UAV remote sensing image, a new invariant feature extraction technology based on fuzzy fractional ...function was proposed. The fuzzy fractional function controller is used to eliminate a large number of low quality pixel points. Improved operator in Harris corner detection algorithm. Corner texture features and feature information are extracted by phase nonlinear transformation. Experimental results show that this method can accurately locate the feature points. At the same time, the algorithm is faster than the traditional method. This method has good application value.
Machine vision is an important branch of the rapid development of modern artificial intelligence, and it is a key technology to convert the image information of monitoring targets into digital ...signals. However, due to the wide range of machine vision applications, this research focuses on its application in video surveillance. In the era of artificial intelligence, the detection and tracking of moving objects have always been a key issue in video surveillance. The simulation of human vision is realized by combining the relevant functions of the computer and the image acquisition device, which enables the computer to have the ability to recognize the surrounding environment through images. The intelligent video analysis technology can automatically analyze and extract the key useful information from the video source with the powerful data processing ability of the computer, so as to realize the computer’s “understanding” of the video. It allows the computer to “understand” what is shown in the video or what kind of “event” happened and provides a new method and reliable basis for accident detection and accident analysis. Therefore, after a brief introduction to machine vision, moving target monitoring methods, and intelligent tracking algorithms, this paper will focus on moving target monitoring and intelligent tracking strategies for video surveillance. In addition, this paper will focus on introducing the principle of intelligent tracking algorithm through formulas and compare the accuracy and success rate of target monitoring and intelligent tracking between the machine vision-based algorithm and other algorithms during the experiment. Finally, experiments show that the monitoring and tracking effect of machine vision combined with “cloud” is the best, and the overall average can reach 85.7%. Based on this, this paper fully confirms the feasibility of the moving target monitoring and intelligent tracking algorithm based on machine vision.
Only vertex chain code can be applied to triangular grids, but it has defect in angle adjacent expression. Aimed at the problem of object border representation in triangular grid, three novel chain ...codes were proposed and compared in character and performance. Firstly, Freeman chain code was extended to triangular grids. For two different triangular elements, the corresponding 12-direction Freeman chain code encoding rules were designed respectively. Secondly, based on the relative direction changes of the contour, the relative direction chain code was proposed. Finally, the edge chain code could be obtained by differentiating the combinations of edges number and internal grids number of the boundary grids. The geometric properties, expressive abilities and compression ratios of three novel chain codes were compared and analyzed. Experiments show that the proposed methods can accurately and completely realize the shape boundary expression of triangular grids. Among them, edge chain owns the best performance, the average code number per grid is 1, and compression ratio can reach 0.75.