The content of the invention
The purpose of the present invention is to solve the shortcomings of the prior art proposing a kind of orderly point set extracting method of image outline, solve
Certainly the operation of conventional images profile orderly point set extracting method is slow, the problem of be difficult to parse the border intersected, restrain unstable,
Computer vision developer is conducive to develop computer vision system.
A kind of orderly point set extracting method of image outline, based on a kind of logical topological structure, each point eight broken points of correspondence,
One broken point represents a UNICOM direction of point;All broken points are attached, its method is:If a broken point correspondence UNICOM
Direction reaches UNICOM's condition, then next broken point on the clockwise for the broken point that broken point is pointed to correspondence UNICOM direction, otherwise
Pointed to next broken point on the clockwise of this point.
Further illustrate 1:Described clockwise includes counter clockwise direction and clockwise direction.
Further illustrate 2:Described clockwise is all unified to all points, that is to say, that in a picture processing
The middle clockwise used a little must be consistent, that is to say, that not allow any one point to use different from other points
Clockwise;(referring to Fig. 2).
Further illustrate 3:Described UNICOM's condition be it is variable, by using the present invention computer vision developer according to
Demand and define.
Further illustrate 4:Described unified clockwise is not the clockwise of the boundary chain formed to broken point connection
Restriction, that is to say, that the broken chain that the connection of broken point is produced after finishing can be different clockwises, in fact of the invention broken
The broken chain that point connection is formed, its direction is existing also to be had counterclockwise clockwise.
Further illustrate 5:Due to carrying out after broken concatenation operation, broken of border chain is just ticked, but due to broken point and
Point is corresponding, that is to say, that ticking for broken of border chain, for computer vision developer, is equal to orderly point set
Tick;(Referring to Fig. 3, Fig. 4, Fig. 5).
Further illustrate 6:Computer vision developer the understanding of the present invention and utilization for convenience, specially makes non-
The basis for estimation of the supplement of invention essential feature --- acnode:Acnode is external connectionless point, broken chain its include
All broken points all correspond to same point, then the broken chain of namely one acnode of this broken chain(Referring to Fig. 3, point P8).
Further illustrate 7:Computer vision developer the understanding of the present invention and utilization for convenience, specially makes non-
The supplement of invention essential feature --- the basis for estimation 1 of the non-broken chain in border:Because all connections all occur in pairs, then when one
When two adjacent UNICOM directions of individual point are all externally first connected, broken chain where broken point rearward is ranked on clockwise
It must be broken of non-border chain;Referring to Fig. 3, broken chain P0(S6)、P1(S3,S4), P4 (S1) and broken chain P1(S5,S6)、P2
(S3,S4)、P4(S7,S0)、P5(S5,S2)。
Further illustrate 8:Computer vision developer the understanding of the present invention and utilization for convenience, specially makes non-
The supplement of invention essential feature --- the basis for estimation 2 of the non-broken chain in border:In the case that acnode not can be regarded as effective image, due to
One point eight broken point of correspondence, then the broken points of latter of connection effectively broken chain are certain to be more than eight, the invalid broken points of broken chain
It is certain to be less than or equal to eight;Referring to Fig. 3, broken chain P0(S6)、P1(S3,S4), P4 (S1) and broken chain P1(S5,S6)、P2(S3,
S4)、P4(S7,S0)、P5(S5,S2)。
Further illustrate 9:Computer vision developer the understanding of the present invention and utilization for convenience, specially makes non-
The supplement of invention essential feature --- the method for simplifying of broken chain, with put for unit along conterclockwise reverse direction successively computing
Eight broken points, if the external not UNICOM of certain broken point, is just pointed to the sensing for being changed to next broken point on clockwise, and will
Next broken point is removed;The number of times that broken point after computing in same point is appeared in same broken chain is reduced;It is worth note
Meaning, can be eliminated because all broken points of acnode are externally connectionless after simplification(Referring to Fig. 5).
Further illustrate 10:Because UNICOM's condition of all broken points is consistent, that is to say, that on a UNICOM direction
Connection is paired appearance;Because the closure rule for being connected into pairs appearance and all points are used is identical(Clockwise), institute
It is closure link that the connection one formed with all broken points, which is established a capital, so without worrying convergence problem.
Further illustrate 11:Due to each broken one UNICOM direction of point correspondence, the connection of broken point only with this direction whether
Reach that condition is related, so when two boundary-intersecteds, the present invention can also be detected respectively, without judging conflict.
Further illustrate 12:Because broken concatenation operation on each UNICOM direction is independent, and other UNICOM directions
Situation is unrelated, and the data dependence between broken point is smaller, so the present invention is well suited for concurrent operation.
Further illustrate 13:It understanding of knowable to further illustrating after 1-12, though the present invention creates for parallelization computing,
Its speed of service of relatively conventional method is very fast, the advantage intersected border, do not have to concern convergence problem can be detected, in non-parallel meter
Equally existed in calculation.
Novelty of the invention is that:The present invention is a kind of orderly point set extracting method of new image outline.
The practicality of the present invention is:A kind of orderly point set extraction side of image outline is provided for computer vision developer
Method, facilitates computer vision developer exploitation to be adapted to the computer vision system of parallel multiprocessor, compared with the prior art may be used
More quickly and easily to obtain the orderly point set data of image outline.
Embodiment
Below in conjunction with embodiment, the present invention will be described.
It is an a kind of implementation of the orderly point set extracting method of image outline of the invention as shown in Fig. 2, Fig. 3, Fig. 4, Fig. 5
Example, having handled one has 3*3 pixels, the image with 0,1,3 three kind of color value;UNICOM's condition that this example is used is face
Color is identical.
As shown in Fig. 2 be this embodiment after view data importing, the logical topology knot before broken concatenation operation
Structure;Wherein broken point a little all constitute a clockwise round closure chain;Wherein all auxiliary magnet P (- 1, -1, -1)
Composition prevents ' enclosure wall ' of calculation overflow together, because the broken point in ' enclosure wall ' is not engaged in computing, for clear, the letter of view
It is clean, do not pointed to and drawn in figure.
As shown in figure 3, being logical topological structures of the Fig. 2 after broken concatenation operation, P0(S6)、P1(S3,S4)、P4
(S1) broken of the non-border chain of one " strip " is constituted;P1(S5,S6)、P2(S3,S4)、P4(S7,S0)、P5(S5,S2)
Constitute broken of " cross " non-border chain.
As shown in figure 3, although the border for the image that P3, P7 are constituted and the border of image where P6 are to intersect border, but warp
It is two broken chains that them, which are crossed after broken concatenation operation, by detection respectively.
As shown in figure 3, acnode P8 is externally without UNICOM.
It is that Fig. 3 rejects the logical topological structure after non-broken chain in border, non-broken chain in border is eliminated such as Fig. 4(Mark
It is negative, clear for view is not drawn).
It is that Fig. 4 carries out the logical topological structure after broken chain simplified operation, the broken point of same point is in same broken point such as Fig. 5
The number of times occurred on chain is reduced, and acnode is also eliminated(I.e. labeled as negative, for not drawing clearly for view).
As shown in figure 5, the border ordered set that this example is drawn is:(P3,P7)With(P0,P4,P6,P4,P5,P2,P1), P4
Occur in that twice, tally with the actual situation in corresponding profile ordered set.
The following is this embodiment based on the tall and handsome partial code up to company's CUDA parallel computings, this hair is embodied
The characteristic of bright suitable concurrent operation;It is that computer vision developer understands and using the present invention that the purpose for providing these codes, which is,
Reference is provided.
Struct FR_POINT { // broken points
long next_x;The x values of // broken point pointed to
long next_y;The y values of // broken point pointed to
long next_s;The numbering of // broken the point pointed to
};
struct POINT{
long X;// abscissa
long y;// ordinate
long c;// color value
long selsete[4];// be used to select, it can be combined instead of if sentences according to different situations
Computing, produces different value
FR_POINT S[8];// broken point set
};
POINT P[5][5];// construction one is by dot-patterned structure group
for(i=0;i<5;i++){
// construction enclosure wall, prevents calculation overflow, and its color value -1 is invalid value, to prevent being connected
P[0][i].c = -1;
P[4][i].c = -1;
P[i][0].c = -1;
P[i][4].c = -1;
}
idx=threadIdx.x+1;// thread number x, idx scope 1-3
idy=threadIdx.y+1;// thread number y, idy scope 1-3
if(idx<4 && idy<4){ // idx scope 1-3, idy scope 1-3
for(t=0;t<8;t++){
P[idx][idy].S[t].next_x=idx;// all broken points are pointed into this point,
P[idx][idy].S[t].next_y=idy;
P[idx][idy].S[t].next_s=(t+1)%8;// broken point is constituted into close ring clockwise
Shape chain, is as a result shown in Fig. 2;
}
P[idx][idy].c=IMAGE_COLOR[idx][idy];// import color of image value
// broken put connects, and concatenation operation is concurrent operation, and operation result is shown in Fig. 3
P[idx][idy].selsete[3] = !P[idx][idy].c-P[idx][idy-1].c;
UNICOM's situation in // preservation S0 correspondence UNICOMs direction, the equal then connection status of color is 1, is otherwise zero
P[idx][idy].S[0].next_y -= P[idx][idy].selsete[3];
If the external UNICOMs of // S0 change y value, the point abscissa in S0 correspondence UNICOMs direction is consistent with S0 points;S0 pairs
The point abscissa x values in the UNICOM direction answered and the identical of this point are so without change
P[idx][idy].S[0].next_s = 4 * P[idx][idy].selsete[3]+1;
If the external UNICOMs of // S0 become S value into 5, S values are 1 if not UNICOM
P[idx][idy].selsete[3] = !(P[idx][idy].c-P[idx-1][idy-1].c);
P[idx][idy].S[1].next_x -= P[idx][idy].selsete[3];
P[idx][idy].S[1].next_y -= P[idx][idy].selsete[3];
P[idx][idy].S[1].next_s = 4 * P[idx][idy].selsete[3]+2;
P[idx][idy].selsete[3] = !(P[idx][idy].c-P[idx-1][idy].c);
P[idx][idy].S[2].next_x -= P[idx][idy].selsete[3];
P[idx][idy].S[2].next_s = 4 * P[idx][idy].selsete[3]+3;
P[idx][idy].selsete[3] = !(P[idx][idy].c-P[idx-1][idy+1].c);
P[idx][idy].S[3].next_x -= P[idx][idy].selsete[3];
P[idx][idy].S[3].next_y += P[idx][idy].selsete[3];
P[idx][idy].S[3].next_s = 4 * !P[idx][idy].selsete[3];
P[idx][idy].selsete[3] = !(P[idx][idy].c-P[idx][idy+1].c);
P[idx][idy].S[4].next_y += P[idx][idy].selsete[3];
P[idx][idy].S[4].next_s = 4 * !P[idx][idy].selsete[3]+1;
P[idx][idy].selsete[3] = !(P[idx][idy].c-P[idx+1][idy+1].c);
P[idx][idy].S[5].next_x += P[idx][idy].selsete[3];
P[idx][idy].S[5].next_y += P[idx][idy].selsete[3];
P[idx][idy].S[5].next_s = 4 * !P[idx][idy].selsete[3]+2;
P[idx][idy].selsete[3] = !(P[idx][idy].c-P[idx+1][idy].c);
P[idx][idy].S[6].next_x += P[idx][idy].selsete[3];
P[idx][idy].S[6].next_s = 4 * !P[idx][idy].selsete[3]+3;
P[idx][idy].selsete[3] = !(P[idx][idy].c-P[idx+1][idy-1].c);
P[idx][idy].S[7].next_x += P[idx][idy].selsete[3];
P[idx][idy].S[7].next_y += P[idx][idy].selsete[3];
P[idx][idy].S[7].next_s = 4 * P[idx][idy].selsete[3];
// negative is labeled as the following is by broken of non-border chain, to remove broken of non-border chain, operation result joins Fig. 4
P[idx][idy].selsete[0] = -10;
P[idx][idy].selsete[1] = 0;
P[idx][idy].selsete[2] = 0;
P[idx][idy].selsete[3]=!(P[idx][idy].S[0].next_s-1)+ !(P[idx][idy].S
[1].next_s-2);
// judge the adjacent two broken external UNICOM's situation of point S0, S1
P[idx][idy].S[1].next_s += P[idx][idy].selsete[P[idx][idy].selsete
[3]];
If all external UNICOM of // S0, S1, S1.next_s is pointed to and is changed to negative value, and representative is eliminated
P[idx][idy].selsete[3]=!(P[idx][idy].S[1].next_s-2)+ !(P[idx][idy].S
[2].next_s-3);
P[idx][idy].S[2].next_s += P[idx][idy].selsete[P[idx][idy].selsete
[3]];
P[idx][idy].selsete[3]=!(P[idx][idy].S[2].next_s-3)+ !(P[idx][idy].S
[3].next_s-4);
P[idx][idy].S[3].next_s += P[idx][idy].selsete[P[idx][idy].selsete
[3]];
P[idx][idy].selsete[3]=!(P[idx][idy].S[3].next_s-4)+ !(P[idx][idy].S
[4].next_s-5);
P[idx][idy].S[4].next_s += P[idx][idy].selsete[P[idx][idy].selsete
[3]];
P[idx][idy].selsete[3]=!(P[idx][idy].S[4].next_s-5)+ !(P[idx][idy].S
[5].next_s-6);
P[idx][idy].S[5].next_s += P[idx][idy].selsete[P[idx][idy].selsete
[3]];
P[idx][idy].selsete[3]=!(P[idx][idy].S[5].next_s-6)+ !(P[idx][idy].S
[6].next_s-7);
P[idx][idy].S[6].next_s += P[idx][idy].selsete[P[idx][idy].selsete
[3]];
P[idx][idy].selsete[3]=!(P[idx][idy].S[6].next_s-7)+ !(P[idx][idy].S
[7].next_s-0);
P[idx][idy].S[7].next_s += P[idx][idy].selsete[P[idx][idy].selsete
[3]];
P[idx][idy].selsete[3]=!(P[idx][idy].S[7].next_s-0)+ !(P[idx][idy].S
[0].next_s-1);
P[idx][idy].S[0].next_s += P[idx][idy].selsete[P[idx][idy].selsete
[3]];
// the following is may be not fully erased to computing above broken of non-border chain (such as P1 (S3)) be purged;
P[idx][idy].selsete[3]=!(P[idx][idy].S[0].next_s-1)+ !(P[idx][idy].S
[2].next_s-3);
// the external UNICOM's situation of S0, S2 is preserved, income value is zero if all external UNICOM
P[idx][idy].S[1].next_s += P[idx][idy].selsete[ P[idx][idy].selsete
[3] ];
If the external UNICOM of // S0, S2, S1 sensing is changed into negative
P[idx][idy].selsete[3]=!(P[idx][idy].S[2].next_s-3)+ !(P[idx][idy].S
[4].next_s-5);
P[idx][idy].S[3].next_s += P[idx][idy].selsete[ P[idx][idy].selsete
[3] ];
P[idx][idy].selsete[3]=!(P[idx][idy].S[4].next_s-5)+ !(P[idx][idy].S
[6].next_s-7);
P[idx][idy].S[5].next_s += P[idx][idy].selsete[ P[idx][idy].selsete
[3] ];
P[idx][idy].selsete[3]=!(P[idx][idy].S[6].next_s-0)+ !(P[idx][idy].S
[0].next_s-1);
P[idx][idy].S[7].next_s += P[idx][idy].selsete[ P[idx][idy].selsete
[3] ];
// be below the broken chain in border simplification, operation result is referring to Fig. 5
P[idx][idy].selsete[3] = !(P[idx][idy].S[7].next_s-0);
// if 0 is pointed to, illustrate the external not UNICOMs of S [7], if the external sensing that S [0] is pointed to not UNICOM,
And remove S [0]
P[idx][idy].selsete[0] = P[idx][idy].S[7].next_x;
Externally the UNICOM abscissa x that then S7 is pointed to is constant by //S [7]
P[idx][idy].selsete[1] = P[idx][idy].S[0].next_x;
Externally the UNICOM abscissa x that then S7 is pointed to is not changed into the abscissa of S [0] sensings to //S [7]
P[idx][idy].S[7].next_x = P[idx][idy].selsete[P[idx][idy].selsete
[3]];
// Selecting operation, if
P[idx][idy].selsete[0] = P[idx][idy].S[7].next_y;
P[idx][idy].selsete[1] = P[idx][idy].S[0].next_y;
P[idx][idy].S[7].next_y = P[idx][idy].selsete[P[idx][idy].selsete
[3]];
P[idx][idy].selsete[0] = P[idx][idy].S[7].next_s;
P[idx][idy].selsete[1] = P[idx][idy].S[0].next_s;
P[idx][idy].S[7].next_s = P[idx][idy].selsete[P[idx][idy].selsete
[3]];
P[idx][idy].selsete[0] = 1;
If // S [7] is externally connected, its sensing is not changed in above several line codes, it is necessary to retain S [0]
P[idx][idy].selsete[1] = -10;
If // S [7] is not connected externally, it, which is pointed to, to change in above several line codes, it is necessary to remove S [0], negative value generation
Table is removed
P[idx][idy].S[0].next_s *=P[idx][idy].selsete[P[idx][idy].selsete
[3]];
// make a choice computing,
P[idx][idy].selsete[3] = !(P[idx][idy].S[6].next_s-7);// if 7 are pointed to,
Illustrate the external not UNICOMs of S [6]
P[idx][idy].selsete[0] = P[idx][idy].S[6].next_x;
P[idx][idy].selsete[1] = P[idx][idy].S[7].next_x;
P[idx][idy].S[6].next_x = P[idx][idy].selsete[P[idx][idy].selsete
[3]];
P[idx][idy].selsete[0] = P[idx][idy].S[6].next_y;
P[idx][idy].selsete[1] = P[idx][idy].S[7].next_y;
P[idx][idy].S[6].next_y = P[idx][idy].selsete[P[idx][idy].selsete
[3]];
P[idx][idy].selsete[0] = P[idx][idy].S[6].next_s;
P[idx][idy].selsete[1] = P[idx][idy].S[7].next_s;
P[idx][idy].S[6].next_s = P[idx][idy].selsete[P[idx][idy].selsete
[3]];
P[idx][idy].selsete[0] = 1;
P[idx][idy].selsete[1] = -10;
P[idx][idy].S[7].next_s *=P[idx][idy].selsete[P[idx][idy].selsete
[3]];
P[idx][idy].selsete[3] = !(P[idx][idy].S[5].next_s-6);// if 6 are pointed to,
Illustrate the external not UNICOMs of S [5]
P[idx][idy].selsete[0] = P[idx][idy].S[5].next_x;
P[idx][idy].selsete[1] = P[idx][idy].S[6].next_x;
P[idx][idy].S[5].next_x = P[idx][idy].selsete[P[idx][idy].selsete
[3]];
P[idx][idy].selsete[0] = P[idx][idy].S[5].next_y;
P[idx][idy].selsete[1] = P[idx][idy].S[6].next_y;
P[idx][idy].S[5].next_y = P[idx][idy].selsete[P[idx][idy].selsete
[3]];
P[idx][idy].selsete[0] = P[idx][idy].S[5].next_s;
P[idx][idy].selsete[1] = P[idx][idy].S[6].next_s;
P[idx][idy].S[5].next_s = P[idx][idy].selsete[P[idx][idy].selsete
[3]];
P[idx][idy].selsete[0] = 1;
P[idx][idy].selsete[1] = -10;
P[idx][idy].S[6].next_s *=P[idx][idy].selsete[P[idx][idy].selsete
[3]];
P[idx][idy].selsete[3] = !(P[idx][idy].S[4].next_s-5);// if 5 are pointed to,
Illustrate the external not UNICOMs of S [4]
P[idx][idy].selsete[0] = P[idx][idy].S[4].next_x;
P[idx][idy].selsete[1] = P[idx][idy].S[5].next_x;
P[idx][idy].S[4].next_x = P[idx][idy].selsete[P[idx][idy].selsete
[3]];
P[idx][idy].selsete[0] = P[idx][idy].S[4].next_y;
P[idx][idy].selsete[1] = P[idx][idy].S[5].next_y;
P[idx][idy].S[4].next_y = P[idx][idy].selsete[P[idx][idy].selsete
[3]];
P[idx][idy].selsete[0] = P[idx][idy].S[4].next_s;
P[idx][idy].selsete[1] = P[idx][idy].S[5].next_s;
P[idx][idy].S[4].next_s = P[idx][idy].selsete[P[idx][idy].selsete
[3]];
P[idx][idy].selsete[0] = 1;
P[idx][idy].selsete[1] = -10;
P[idx][idy].S[5].next_s *=P[idx][idy].selsete[P[idx][idy].selsete
[3]];
P[idx][idy].selsete[3] = !(P[idx][idy].S[3].next_s-4);// if 4 are pointed to,
Illustrate the external not UNICOMs of S [3]
P[idx][idy].selsete[0] = P[idx][idy].S[3].next_x;
P[idx][idy].selsete[1] = P[idx][idy].S[4].next_x;
P[idx][idy].S[3].next_x = P[idx][idy].selsete[P[idx][idy].selsete
[3]];
P[idx][idy].selsete[0] = P[idx][idy].S[3].next_y;
P[idx][idy].selsete[1] = P[idx][idy].S[4].next_y;
P[idx][idy].S[3].next_y = P[idx][idy].selsete[P[idx][idy].selsete
[3]];
P[idx][idy].selsete[0] = P[idx][idy].S[3].next_s;
P[idx][idy].selsete[1] = P[idx][idy].S[4].next_s;
P[idx][idy].S[3].next_s = P[idx][idy].selsete[P[idx][idy].selsete
[3]];
P[idx][idy].selsete[0] = 1;
P[idx][idy].selsete[1] = -10;
P[idx][idy].S[4].next_s *=P[idx][idy].selsete[P[idx][idy].selsete
[3]];
P[idx][idy].selsete[3] = !(P[idx][idy].S[2].next_s-3);// if 3 are pointed to,
Illustrate the external not UNICOMs of S [2]
P[idx][idy].selsete[0] = P[idx][idy].S[2].next_x;
P[idx][idy].selsete[1] = P[idx][idy].S[3].next_x;
P[idx][idy].S[2].next_x = P[idx][idy].selsete[P[idx][idy].selsete
[3]];
P[idx][idy].selsete[0] = P[idx][idy].S[2].next_y;
P[idx][idy].selsete[1] = P[idx][idy].S[3].next_y;
P[idx][idy].S[2].next_y = P[idx][idy].selsete[P[idx][idy].selsete
[3]];
P[idx][idy].selsete[0] = P[idx][idy].S[2].next_s;
P[idx][idy].selsete[1] = P[idx][idy].S[3].next_s;
P[idx][idy].S[2].next_s = P[idx][idy].selsete[P[idx][idy].selsete
[3]];
P[idx][idy].selsete[0] = 1;
P[idx][idy].selsete[1] = -10;
P[idx][idy].S[3].next_s *=P[idx][idy].selsete[P[idx][idy].selsete
[3]];
P[idx][idy].selsete[3] = !(P[idx][idy].S[1].next_s-2);// if 2 are pointed to,
Illustrate the external not UNICOMs of S [1]
P[idx][idy].selsete[0] = P[idx][idy].S[1].next_x;
P[idx][idy].selsete[1] = P[idx][idy].S[2].next_x;
P[idx][idy].S[1].next_x = P[idx][idy].selsete[P[idx][idy].selsete
[3]];
P[idx][idy].selsete[0] = P[idx][idy].S[1].next_y;
P[idx][idy].selsete[1] = P[idx][idy].S[2].next_y;
P[idx][idy].S[1].next_y = P[idx][idy].selsete[P[idx][idy].selsete
[3]];
P[idx][idy].selsete[0] = P[idx][idy].S[1].next_s;
P[idx][idy].selsete[1] = P[idx][idy].S[2].next_s;
P[idx][idy].S[1].next_s = P[idx][idy].selsete[P[idx][idy].selsete
[3]];
P[idx][idy].selsete[0] = 1;
P[idx][idy].selsete[1] = -10;
P[idx][idy].S[2].next_s *=P[idx][idy].selsete[P[idx][idy].selsete
[3]];
P[idx][idy].selsete[3] = !(P[idx][idy].S[0].next_s-1);// if 1 is pointed to,
Illustrate the external not UNICOMs of S [0]
P[idx][idy].selsete[0] = P[idx][idy].S[0].next_x;
P[idx][idy].selsete[1] = P[idx][idy].S[1].next_x;
P[idx][idy].S[0].next_x = P[idx][idy].selsete[P[idx][idy].selsete
[3]];
P[idx][idy].selsete[0] = P[idx][idy].S[0].next_y;
P[idx][idy].selsete[1] = P[idx][idy].S[1].next_y;
P[idx][idy].S[0].next_y = P[idx][idy].selsete[P[idx][idy].selsete
[3]];
P[idx][idy].selsete[0] = P[idx][idy].S[0].next_s;
P[idx][idy].selsete[1] = P[idx][idy].S[1].next_s;
P[idx][idy].S[0].next_s = P[idx][idy].selsete[P[idx][idy].selsete
[3]];
P[idx][idy].selsete[0] = 1;
P[idx][idy].selsete[1] = -10;
P[idx][idy].S[1].next_s *=P[idx][idy].selsete[P[idx][idy].selsete
[3]];
}.
The orderly point set extracting method of a kind of image outline that the present invention is provided, is a kind of method invention, it can pass through
The computer hardwares such as CPU, GPU, MCU, DSP, FPGA are realized.
It can be seen from content of the invention explanation and embodiment, typical embodiment of the invention is not the limit to the present invention
It is fixed, it is any to utilize logical topological structure proposed by the present invention, and carry out broken point company according to broken connection method proposed by the present invention
The orderly point set extracting method of image outline connect, should all belong to scope of the invention.