研究生: |
彭健賓 Jian-Bing Peng |
---|---|
論文名稱: |
鐵塔鍍鋅層及塗膜劣化影像分析及資料庫建立 Image Analysis and Database Design for Diagnosis of Zinc Coating and Paint Coating |
指導教授: |
鍾國亮
Kuo-Liang Chung |
口試委員: |
鮑興國
Hsing-Kuo Pao 林其禹 Chyi-Yeu Lin 顏文明 Wen-Ming Yan 施文彬 Wen-Pin Shih |
學位類別: |
碩士 Master |
系所名稱: |
電資學院 - 資訊工程系 Department of Computer Science and Information Engineering |
論文出版年: | 2006 |
畢業學年度: | 94 |
語文別: | 中文 |
論文頁數: | 47 |
中文關鍵詞: | 區域門檻值 、形態學 、Otsu門檻值決定法 、剝落 、龜裂 、生鏽 、熱浸鍍鋅 、資料庫 、影像處理技術 、鐵塔 |
外文關鍵詞: | Morphology, Local Threshold |
相關次數: | 點閱:307 下載:0 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
影像處理是近年來很熱門的研究課題,而鐵塔鍍鋅層及塗膜劣化影像分析及資料庫建立的研究目標是欲利用各種影像處理的工具與技術,發展出一套自動化的檢測系統,能精準、簡單且快速的來檢驗分佈於全台各地的鐵塔的腐蝕劣化。只需將欲檢測的鐵塔依制訂的規格拍攝照片,透過系統影像處理程序便能判斷腐蝕劣化的結果提供台電相關人員作為檢點、維修、汰換等依據。依目前台電公司所保有的鐵塔種類可區分為兩類,一類為鐵塔表面只進行熱浸鍍鋅表面處理,而其損害情形大致為合金層銹蝕;另一類為熱浸鍍鋅之後再塗上油漆的雙重防蝕,此類型包括有機塗膜的劣化判斷損害情形較為複雜,其可能的情形粗分為銹蝕、發泡與龜裂。
Image processing has been a popular research topic in recent years. In this thesis, the method proposed by us aims at utilizing various image processing tools and techniques to develop an automatic detection system which is capable of delivering accurate analysis based on the photos (taken according to the relevant specifications) of the power towers and then provides a guideline to the Taiwan Power Company (TPC) for further repair and replacement. At present, power stations owned by TPC include two major categories: (1) Power stations with just one layer of zinc coating for protection. Damages to this type of power stations are mainly corrosion; (2) Power stations with one layer of zinc coating and one layer of paint coating for protection. Damages to this type of power stations are more complex, which may include corrosion caused by rust, foaming, and cracking.
[1] 鍾國亮, 影像處理與電腦視覺, 第二版, 東華書局, 台北, 2004 。
[2] 鍾國亮, 資料壓縮的原理與應用, 第二版, 全華科技圖書, 台北, 2004 。
[3] 鍾國亮, 離散數學, 全華科技圖書, 台北, 2003。
[4] R. C. Gonzalez and R. E. Woods, Digital Image Processing, 2nd Edition,
Prentice-Hall, New York, 2002.
[5] S. J. Ko and Y. H. Lee, “Center weighted median filters and their
applications to image enhancement,” IEEE Trans. on Circuits and Systems
for Video Technology, 38(9), 1991, pp.984-993.
[6] J. Y. Kim, L. S. Kim, and S. H. Hwang, “An advanced contrast enhancement
using partially overlapped sub-block histogram equalization,” IEEE
Trans. on Circuits and Systems for Video Technology, 11(4), 2001, pp.475-
484.
[7] X. Yang and P. S. Toh, “Adaptive fuzzy multilevel median filter,” IEEE
Trans on Image Processing, 4(5), 1995, pp.680-682.
[8] N. Otsu, “A threshold selection method from gray level histogram,” IEEE
Trans. on Systems, Man, and Cybernetics, 9(1), 1979, pp.62-66.
[9] J. N. Kapur, P. K. Sahoo, and A. K. C. Wong, “A new method for gray-
level picture thresholding using the entropy of the histogram,”Computer
Vision, Graphics, and Image Processing, 29(3), 1985, pp.273-285.
[10] J. Adamek, Foundations of Coding, John Wiley & Sons, New York, 1991.
[11] C. E. Shannon, “A mathematical theory of communication,” Bell System
Technical Journal, 27, 1948, pp.379-423 and 623-656.
[12] R. W. Hamming, Coding and Information Theory, Prentice-Hall, New Jersey,
1980.
[13] W. H. Tsai, “Moment—Preserving thresholding: a new approach,”
Computer Vision, Graphics and Image Processing, 29(3), 1985, pp. 377-393.
[14] K. L. Chung and W. Y. Chen, “Fast adaptive PNN-based thresholding
algorithms,” Pattern Recognition, 36(12), 2003, pp.2793-2804.
[15] S. S. Wilson, “Theory of matrix morphology,”IEEE Trans. on Pattern
Analysis and Machine Intelligence, 14(6), 1992, pp. 636-652.
[16] P. Maragos and R. W. Schafer, “Morphological systems for
multidimensional signal processing,” Proc. IEEE, 78(4), 1990, pp.690-
710.
[17] R. V. Hogg and E. A. Tanis, Probability and Statistical Inference, 5th
Edition, Prentice-Hall, New Jersey, 1997.
[18] J. Canny, “A computational approach to edge detection,” IEEE Trans. on
Pattern Analysis and Machine Intelligence, 8(6), 1986, pp. 679-698.
[19] M. Sonka, V. Hlavac, and R. Boyle, Image Processing, Analysis and
Machine Vision, PWS, New York, 1999.
[20] D. H. Ballard and C. M. Brown, Computer Vision, Prentice-Hall, New York,
1982.
[21] D. Marr and E. Hildreth, “Theory of edge detection,” Proc. Royal Soc.
London, 1980, B207, pp.187-217.
[22] M. Kass, A. Witkin, and D. Terzopoulos, “Snakes: active contour
models,” International Journal of Computer Vision, 1(4), 1988, pp. 321-
331.
[23] E. Trucco and A. Verri, Introductory Techniques for 3-D Computer
Vision,Prentice-Hall, New Jersey, 1998.
[24] M. A. Furst, “Edge detection with image enhancement via dynamic
programming,” Computer Vision, Graphics, and Image Processing, 33(3),
1986, pp. 263-279.
[25] W. Niblack, An Introduction to Digital Image Processing, Prentice-Hall,
Englewood Cliffs, New Jersey, pp.115-116,1986.
[26] Z. Zhang and C. L. Tan, “Restoration of images scanned from thick bound
documents,” in Proc. of the 2001 Int. Conf. on Image Processing, vol.
1, pp.1074-1077, 2001.
[27] R. G. Brown, Statistical Forecasting for Inventony Control, McGraw-Hill,
New York,1959.
[28] R. G. Brown, Smoothing, Forecasting and Prediction of Discrete Time
Series, Prentice-Hall, New Jersey, 1962.
[29] 藤原 博,“畫像處理技術應用鋼橋之塗膜劣化度診斷,” 日本道路公團試驗研究所
保全技術研究室, 1996。