zoukankan      html  css  js  c++  java
  • 文字识别

        read_image (Image, 'TestLbl')
    
        gen_rectangle1 (ROI_0, 1302.32, 1443.87, 1348.68, 1671.23)
       
    
        reduce_domain (Image, ROI_0, ImageReduced)
         scale_image (ImageReduced, ImageScaled, 3.54167, -273)
        binary_threshold (ImageScaled, Region, 'max_separability', 'dark', UsedThreshold)
        erosion_rectangle1 (Region, RegionErosion, 1, 1)
        *opening_circle (Region, RegionOpening, 2.0)
        *opening_rectangle1 (RegionOpening, RegionOpening1, 1, 10)
        connection (RegionErosion, ConnectedRegions)
        select_shape (ConnectedRegions, SelectedRegions, 'area', 'and', 100, 99999)
       
        *smallest_rectangle1 (SortedRegions, Row1, Column1, Row2, Column2)
        *intersection (SelectedRegions, Region, RegionIntersection)
         sort_region (SelectedRegions, SortedRegions, 'character', 'true', 'row')
        
        read_ocr_class_mlp ('Industrial_0-9A-Z_Rej.omc', OCRHandle)
        *create_ocr_class_mlp (8, 10, 'constant', 'default', ['0','1','2','3','4','5','6','7','8','9','V','D'], 80, 'none', 10, 42, OCRHandle)
        do_ocr_multi_class_mlp ( SortedRegions,ImageReduced, OCRHandle, Class, Confidence)
    View Code

    使用图片

    https://files-cdn.cnblogs.com/files/wdfrog/TestLbl.bmp

  • 相关阅读:
    python端口扫描
    python模块-platform
    Mysql注入root权限直接写一句话马
    meterpreter使用
    msfpayload反弹shell
    sql_injection之post注入
    初涉sqlmap
    sql_injection之基本get注入
    利用SSLStrip截获https协议--抓取邮箱等密码
    简析CSRF
  • 原文地址:https://www.cnblogs.com/wdfrog/p/14972485.html
Copyright © 2011-2022 走看看