| 研究生: |
倪薇雯 Wei-Wen Ni |
|---|---|
| 論文名稱: |
高動態範圍監控系統之研究 Study of Surveillance System with High Spatial Dynamic Range |
| 指導教授: |
孫慶成
楊宗勳 |
| 口試委員: | |
| 學位類別: |
碩士 Master |
| 系所名稱: |
理學院 - 光電科學與工程學系 Department of Optics and Photonics |
| 論文出版年: | 2018 |
| 畢業學年度: | 106 |
| 語文別: | 中文 |
| 論文頁數: | 82 |
| 中文關鍵詞: | 監控系統 、分光鏡 、高空間動態 、廣角端 、望遠端 |
| 相關次數: | 點閱:12 下載:0 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
摘要
市面上普遍的閉路電視並不具備同時監控廣角影像與望遠之影像的功能,然而,在本高空間動態範圍監控系統中導入了分光鏡,致使入射光可以同時為廣角相機與望遠相機所使用,透過此種特性,可以將寬廣的監測範圍皆用光學變焦的方式做局部放大,使得各區域的影像都能清晰呈現,不同於傳統監控系統僅使用數位放大。系統定義上,首先,先探討分光鏡的尺寸與廣角相機的關係,再者,由於需要對每個廣角區域進行放大,故分光鏡之擺動角度之於待觀測點的數學模型建立也是不可或缺的,以至於擷取到之影像融合以及修正皆會針對此系統的進行討論,並藉由實驗的驗證,確認系統的可行性。
Abstract
Commercially available closed circuit television (CCTV) are generally not compatible of monitoring a wide-angle scene and enlarging a range of clear image in the same time. However, in order to let the incident light be made use of both wide-angle camera and telephoto camera, the surveillance system with high spatial dynamic range apply beam splitter (B.S.) to resolve this issue. By utilizing the feature of this system, the extensive monitoring image can be magnified in term of optical zoom in comparison to ordinary CCTV system which employed digital zooming technique. Therefore, each amplified picture is emerged sharpness. To determine the system, this dissertation define the relation between the size of beam splitter and wide-angle camera in the first place. Secondly, for the purpose of scanning every segment of the wide-angle image, establishing a mathematical model among the rotational angle of B.S. and observation area is indispensable. With the aim of combining both wide-angle part and telephoto section, merging as well as revising of captured images for this specific setup will also be discussed in this paper. Via experiment, the feasibility of this surveillance system with high spatial dynamic range can be well-verified.
參考文獻
1. Y. Alexander, and M. S. Swetnam, Usama Bin Laden's Al-Qaida: Profile of A Terrorist Network (Transnational Publishers Ardsley, NY, 2001).
2. B. Lia, Architect of Global Jihad: The Life of Al-Qaida Strategist Abu Mus' Ab Al-Suri (Hurst London, 2007).
3. M. Morgan, The Impact of 9/11 on Religion and Philosophy: The Day That Changed Everything? (Springer, 2009).
4. J. E. Mueller, Terrorism Since 9/11: The American Cases (Mershon Center, Ohio State University, 2013).
5. G. LaFree and L. Dugan, “Introducing the global terrorism database,” Terror. Polit. Violence 19, 181-204 (2007).
6. G. Makinen, The Economic Effects of 9/11: A Retrospective Assessment (Library of Congress Washington D.C. Congrssional Research Service, 2002).
7. M. Thompson, The $5 Trillion War on Terror (Time Magazine, 2011).
8. G. Willcoxon, A. Springer, S. West, M. Ihimoyan, and Z. Maskatia, Toward A Cost-Benefit Analysis of Nuclear Terrorism Prevention Technology (Citeseer, 2005).
9. J. Bamford, The Shadow Factory: The Ultra-Secret NSA from 9/11 To The Eavesdropping on America (Anchor, 2009).
10. L. Cauley, NSA Has Massive Database of Americans’ Phone Call (USA today 11, 2006).
11. G. Greenwald, No Place to Hide: Edward Snowden, The NSA, and The US Surveillance State (Macmillan, 2014).
12. A. Loewenstein, The Ultimate Goal of The NSA Is Total Population Control (The Gardian, 2014).
13. E. MacAskill, Edward Snowden, NSA Files Source: If They Want to Get You, in Time They Will (The Guardian, 2013).
14. T. Aaronson, The Terror Factory: Inside The FBI's Manufactured War on Terrorism (Ig Publishing New York, 2013).
15. P. Lance, 1000 Years for Revenge: International Terrorism and The FBI--The Untold Story (Harper Collins, 2009).
16. A. Carter, J. Deutch, and P. Zelikow, “Catastrophic terrorism-tackling the new danger,” Foreign Aff. 77, 80 (1998).
17. R. A. Brooks, “Muslim “hometown” terrorism in the United States: how serious is that threat?,”Int. Secur. 36, 7-47 (2011).
18. G. Kepel and P. Ghazaleh, The War for Muslim Minds: Islam and The West (Belknap Press of Harvard University Press Cambridge, MA, 2004).
19. C. Kurzman, Muslim-American Terrorism in 2003(Chapel Hill, NC: Department of Sociology, University of North Carolina, 2014).
20. M. Mamdani, “Good Muslim, bad Muslim: a political perspective on culture and terrorism,” Am. Anthropol. 104, 766-775 (2002).
21. V. D. Cha and D. C. Kang, Nuclear North Korea: A Debate on Engagement Strategies (Columbia University Press, 2003).
22. J. D. Pollack, No Exit: North Korea, Nuclear Weapons, and International Security (Routledge, 2017).
23. K. Ball and F. Webster, The Intensification of Surveillance: Crime, Terrorism and Warfare in The Information Era (Pluto Press, 2003).
24. A. Poberezhna, “From Russia with Boston Marathon Bombings,” http://natoassociation.ca/from-russia-with-boston-marathon-bombings/.
25. M. L. Smith, and S. M. Zeigler, “Terrorism before and after 9/11,” SAGE Journals 4, 1-8 (2017).
26. P. Viola and M. J. Jones, “Robust real-time face detection,” Int. J. Comput. Vis. 57, 137-154 (2004).
27. K.K. Sung, and T. Poggio, “Example-based learning for view-based human face detection,” IEEE Trans. Pattern Anal. Mach. 20, 39-51 (1998).
28. H. A. Rowley, S. Baluja, and T. Kanade, “Neural network-based face detection,” IEEE Trans. Pattern Anal. Mach. 20, 23-38 (1998).
29. R.L. Hsu, M. Abdel-Mottaleb, and A. K. Jain, “Face detection in color image,” IEEE Trans. Pattern Anal. Mach 24, 696-706 (2002).
30. G. G. Walter, “A Sampling Throrem for Wavelet Subspaces,” IEEE Trans. Inf. Theory 38, 881-884 (1992).
31. S. Katagiri and C. H. Lee, “A new hybrid algorithm for speech recognition based on HMM segmentation and learning vector quantization,” IEEE Trans. Speed Audio Process. 1, 421-430 (1993).
32. S. Osowski, L. T. Hoai, and T. Markiewicz, “Support Vector Machine-Based Expert System for Reliable Heartbeat Recognition,” IEEE Trans. Biomed. Eng. 51, 582-589 (2004).
33. R. P. Wildes, “Iris Recognition: An Emerging Biometric Technology,” Proc. IEEE 85, 1348-1363 (1997).
34. J. R. Matey, O. Naroditsky, K. Hanna, R. Kolczynski, D. J. LoIacono, S. Mangru, M. Tinker, T. M. Zappia, and W. Y. Zhao, “Iris on The Move: Acquisition of Images for Iris Recognition in Less Constrained Environment,” Proc. IEEE 94, 1936-1947 (2006).
35. J. Daugman, The Essential Guide to Image Processing (Elsevier, 2009).
36. H. Borgen, P. Bours, and S. D. Wolthusen, “Visible-Spectrum Biometric Retina Recognition,” Intelligent Information Hiding and Multimedia Signal Processing International Conference (2008).
37. J. M. Turner, P. L. Kenkel, R. B. Holcomb, and D. B. Arnall, “Economic Potential of Unmanned Aircraft in Agricultural and Rural Electric Cooperatives,” Southern Agricultural Economics Association Annual Meeting (2016).
38. Interact Analysis, “Commercial drones in 2022 – our predictions,” https://www.interactana
lysis.com/drones-market-2022-predictions/.
39. R. L. Finn, and D. Wright, “Unmanned aircraft systems: surveillance, ethics and privacy in civil applications,” Comput. Law Secur. Rev. 28, 184-194 (2012).
40. A. Gynnild, The Robot Eye Witness: Extending Visual Journalism Through Drone Surveillance (Digital journalism, 2014).
41. J. Olivito, “Beyond the fourth amendment: limiting drone surveillance through the constitutional right to information rivacy,” Ohio St. LJ 74, 669 (2013).
42. I. F. Rothfuss, “An economic perspective on the privacy implications of domestic drone surveillance,” JL Econ. & Pol'y 10, 441 (2013).
43. C. Whitlock, US Millitary Drone Surveillance Is Expending to Hot Spots Beyond Declared Combat Zones (The Washington Post, 2013).
44. F. Nilsson, Intelligent Network Video: Understanding Modern Video Surveillance Systems (CRC Press, 2008).
45. Visual Verification Systems Inc., http://www.vvsystems.com/page/ip-camera-vs-analog-analog-vs-ip-cameras/.
46. A. J. Jerri, “The Shannon sampling theorem-it’s various extensions and applications: a tutorial view,” Proc. IEEE 65, 1565-1596 (1977).
47. C. E. Shannon, “Communication in the presence of noise,” Proc. IRE 37, 10-21 (1949).
48. E. T. Whittaker, “On the functions which are represented by the expressions of the interpolation theory,” Proc. Roy. Soc. Edinburgh, Sect. A 35, 181-194 (1915).
49. J. W. Goodman, Introduction to Fourier Optics (Roberts and Company Publishers, 2005).
50. R. H. Ginsberg, “Image Rotation,” Appl. Optics 33, 8105_8101-8108 (1994).
51. Simon Fraser University, http://www2.ensc.sfu.ca/~glennc/e376/e376l19a.pdf.
52. H. Kannan, “What Are The Advantages And Disadvantages of The Optical Zoom and Digital Zoom in Cameras?,” https://www.quora.com/What-are-the-advantages-and-disadv
antages-of-the-optical-zoom-and-digital-zoom-in-cameras.
53. Logitech., http://support.logitech.com/en_us/product/hd-webcam-c615/specs.