All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Modeling of the widefield space variant security systems

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F68407700%3A21230%2F08%3A00146735" target="_blank" >RIV/68407700:21230/08:00146735 - isvavai.cz</a>

  • Result on the web

  • DOI - Digital Object Identifier

Alternative languages

  • Result language

    angličtina

  • Original language name

    Modeling of the widefield space variant security systems

  • Original language description

    The most important methods for security image data processing contain person recognition, suspicious events detection, objects and area of interest analysis and their classification, MSE, SNR and subjective evaluation. Image data processing of UWFC security systems is very difficult in general. Precision of image data post-processing and analyses, which is very important for these systems, decreases because of a lot of different kinds of optical aberrations and distortions. Influence of optical aberrations increases at most at the frontiers of field of view (high angular distance from optical axis of the system). These aberrations distort the PSF of optical system and rapidly cut the accuracy of measurements. The third order optical aberrations modelsfor LSI and LSV systems have been described. These models are based on Seidel and Zernike approximating polynomials. Optical aberrations effect to the transfer function (PSF) of optical imaging systems has been described.

  • Czech name

  • Czech description

Classification

  • Type

    D - Article in proceedings

  • CEP classification

    JA - Electronics and optoelectronics

  • OECD FORD branch

Result continuities

  • Project

  • Continuities

    Z - Vyzkumny zamer (s odkazem do CEZ)

Others

  • Publication year

    2008

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Article name in the collection

    Proceedings of 42nd Annual 2008 IEEE International Carnahan Conference on Security Technology

  • ISBN

    978-1-4244-1816-9

  • ISSN

  • e-ISSN

  • Number of pages

    5

  • Pages from-to

  • Publisher name

    IEEE

  • Place of publication

    Piscataway

  • Event location

    Prague

  • Event date

    Oct 13, 2008

  • Type of event by nationality

    EUR - Evropská akce

  • UT code for WoS article

    000264043000023