2010-03-21

嗯,每天写写,记录总结
内容概要:本文介绍了ENVI Deep Learning V1.0的操作教程,重点讲解了如何利用ENVI软件进行深度学习模型的训练与应用,以实现遥感图像中特定目标(如集装箱)的自动提取。教程涵盖了从数据准备、标签图像创建、模型初始化与训练,到执行分类及结果优化的完整流程,并介绍了精度评价与通过ENVI Modeler实现一键化建模的方法。系统基于TensorFlow框架,采用ENVINet5(U-Net变体)架构,支持通过点、线、面ROI或分类图生成标签数据,适用于多/高光谱影像的单一类别特征提取。; 适合人群:具备遥感图像处理基础,熟悉ENVI软件操作,从事地理信息、测绘、环境监测等相关领域的技术人员或研究人员,尤其是希望将深度学习技术应用于遥感目标识别的初学者与实践者。; 使用场景及目标:①在遥感影像中自动识别和提取特定地物目标(如车辆、建筑、道路、集装箱等);②掌握ENVI环境下深度学习模型的训练流程与关键参数设置(如Patch Size、Epochs、Class Weight等);③通过模型调优与结果反馈提升分类精度,实现高效自动化信息提取。; 阅读建议:建议结合实际遥感项目边学边练,重点关注标签数据制作、模型参数配置与结果后处理环节,充分利用ENVI Modeler进行自动化建模与参数优化,同时注意软硬件环境(特别是NVIDIA GPU)的配置要求以保障训练效率。
-12-03 14:47:36] 0x10244084):0x10000000 [2025-12-03 14:47:36] INFO: [ATF](1)K:[2277.200505][DRAMC-ATF] DRAMC_NAO_CHB + 0x88(0x10244088):0x4900000 [2025-12-03 14:47:36] INFO: }%5)}}}}}}}5)kedump: crc = 0x5d04143f [2025-12-03 14:47:41] mrdump_get_reserved_info:230: mrdump show :mblock-R[15].start: 0xbfd70000, size: 0x80000 name:atf_ramdump [2025-12-03 14:47:41] ERROR: [ATF](0)[2292.463796]mediatek_plat_sip_handler_bootloader: unknown 32b LK SMC(0x82000114) [2025-12-03 14:47:41] ATF: ram dump address hi:0x0, address lo:0xbfd70000, size hi:0, size lo:524288 [2025-12-03 14:47:41] INFO: [ATF](0)[2292.479303]Get ATF log buffer info. for AEE dump in LK. [2025-12-03 14:47:41] INFO: [ATF](0)[2292.485851]Buf addr:0x9dc14000, buf size:131072, flag addr:0x9dc0002c, flag value:0x41544641 [2025-12-03 14:47:41] ATF: log_buf_addr = 0x9dc14000, size = 0x20000, crash_flag_addr = 0x9dc0002c [2025-12-03 14:47:41] ATF: footprint hi_addr = 0x0, low_addr = 0x9dc13800, buf_size = 0x800 [2025-12-03 14:47:41] ATF: LAST BUFF [2025-12-03 14:47:41] kedump: last is not full pmic reset! [2025-12-03 14:47:41] kedump: lk dump flow [2025-12-03 14:47:41] aee_init:66: Trigger exception flow [2025-12-03 14:47:41] aee_init:70: boot_reason(4) boot_mode(0) [2025-12-03 14:47:41] aee_init:72: ddr_reserve_ready(1) ddr_reserve_success(1) [2025-12-03 14:47:41] aee_check_enable:290: lk aee dcfg = full (lv.2) [2025-12-03 14:47:41] rst from: kernel [2025-12-03 14:47:41] kedump mini start [2025-12-03 14:47:41] kedump: current time: [2010/1/1 0:38:11] [2025-12-03 14:47:41] kedump: ddr reserve mode enabled [2025-12-03 14:47:41] kedump: boot_reason(4) [2025-12-03 14:47:41] vmalloc_start:0xffffffc008000000, vmalloc_end:0xfffffffdf0000000,master_page_table:0x80ddf000, high_memory:0xffffff8080000000 [2025-12-03 14:47:41] kedump dram range 0x80000000 - 0x100000000 [2025-12-03 14:47:41] kedump: block size:0x200 [2025-12-03 14:47:41] kedump: data:0x11d000, size:0x800, offset:0x1200, va:0x4111d000 [2025-12-03 14:47:41] kedump: crc = 0x29e01cdc [2025-12-03 14:47:41] kedump add: SYS_RAMCONSOLE_RAW[0] 800/800@1200 [2025-12-03 14:47:41] kedump: data:0x9c100000, size:0xe0000, offset:0x1a00, va:0x41100000 [2025-12-03 14:47:41] kedump: crc = 0xf8c1906a [2025-12-03 14:47:41] kedump add: SYS_PSTORE_RAW[1] e0000/e0000@1a00 [2025-12-03 14:47:41] kedump: data:0x9c6760a8, size:0x8, offset:0xe1a00, va:0x416760a8 [2025-12-03 14:47:41] kedump add: KEDUMP_CRC[2] 8/8@e1a00 [2025-12-03 14:47:41] kedump: KEHeader 0x40042000 [2025-12-03 14:47:41] kedump: read header 0x0x40042000[0x7f454c46] [2025-12-03 14:47:41] kedump: mach[0xb7], phnum[0x3c], phoff[0x40] [2025-12-03 14:47:41] kedump: 0-PT[4] 1aa0@0 -> 3000(d60) [2025-12-03 14:47:41] kedump: 1-PT[4] 500@0 -> 3000(2800) [2025-12-03 14:47:41] kedump: 2-PT[1] 2000@11e000 -> 3000(0) [2025-12-03 14:47:41] kedump: invalid convert address:0x11f000 [2025-12-03 14:47:41] kedump: convert failed expected pa:0x11f000 (va:0xffffffc009dab000) [2025-12-03 14:47:41] kedump: data:0x11e000, size:0x2000, offset:0xe5200, va:0x4111e000 [2025-12-03 14:47:41] kedump: 3-PT[1] 11000@0 -> 5000(0) [2025-12-03 14:47:41] kedump: data:0x810a5000, size:0x11000, offset:0xe7200, va:0x410a5000 [2025-12-03 14:47:41] kedump: 4-PT[1] 8000@ff8b0000 -> 16000(0) [2025-12-03 14:47:41] kedump: data:0xff8b0000, size:0x8000, offset:0xf8200, va:0x418b0000 [2025-12-03 14:47:41] kedump: 5-PT[1] 8000@ff8c2000 -> 1e000(0) [2025-12-03 14:47:41] kedump: data:0xff8c2000, size:0x8000, offset:0x100200, va:0x418c2000 [2025-12-03 14:47:41] kedump: 6-PT[1] 8000@ff8d4000 -> 26000(0) [2025-12-03 14:47:41] kedump: data:0xff8d4000, size:0x8000, offset:0x108200, va:0x418d4000 [2025-12-03 14:47:41] kedump: 7-PT[1] 8000@ff8e6000 -> 2e000(0) [2025-12-03 14:47:41] kedump: data:0xff8e6000, size:0x8000, offset:0x110200, va:0x418e6000 [2025-12-03 14:47:41] kedump: 8-PT[1] 9000@0 -> 36000(0) [2025-12-03 14:47:41] kedump: data:0x814d7000, size:0x9000, offset:0x118200, va:0x414d7000 [2025-12-03 14:47:41] kedump: 9-PT[1] 4000@0 -> 3f000(0) [2025-12-03 14:47:41] kedump: data:0x81827000, size:0x4000, offset:0x121200, va:0x41827000 [2025-12-03 14:47:41] kedump: 10-PT[1] 9000@0 -> 43000(0) [2025-12-03 14:47:41] kedump: data:0x81218000, size:0x9000, offset:0x125200, va:0x41218000 [2025-12-03 14:47:41] kedump: 11-PT[1] 9000@0 -> 4c000(0) [2025-12-03 14:47:41] kedump: data:0x80cdf000, size:0x9000, offset:0x12e200, va:0x41cdf000 [2025-12-03 14:47:41] kedump: 12-PT[1] 9000@0 -> 55000(0) [2025-12-03 14:47:41] kedump: data:0x818cc000, size:0x9000, offset:0x137200, va:0x418cc000 [2025-12-03 14:47:41] kedump: 13-PT[1] 9000@0 -> 5e000(0) [2025-12-03 14:47:41] kedump: data:0x805b4000, size:0x9000, offset:0x140200, va:0x415b4000 [2025-12-03 14:47:41] kedump add: SYS_MINI_RDUMP[3] 67000/67000@e2200 [2025-12-03 14:47:41] kedump: data:0x9c1e0000, size:0x2d00, offset:0xe2200, va:0x411e0000 [2025-12-03 14:47:41] kedump: mini_rdump 0x66d00/0x67000 @0xe2200 [2025-12-03 14:47:41] kedump: misc[0x40042078] 500@2800 [2025-12-03 14:47:41] kedump: miscs[0x40044800], size 40 [2025-12-03 14:47:41] kedump: data:0x9c1e3000, size:0xe00, offset:0x149200, va:0x411e3000 [2025-12-03 14:47:41] kedump add: PROC_CUR_TSK[4] e00/e00@149200 [2025-12-03 14:47:41] kedump: data:0x813d0db8, size:0x80000, offset:0x14a000, va:0x413d0db8 [2025-12-03 14:47:41] kedump add: SYS_KERNEL_LOG_RAW_0[5] 80000/80000@14a000 [2025-12-03 14:47:41] kedump: data:0x81840000, size:0x20000, offset:0x1ca000, va:0x41840000 [2025-12-03 14:47:41] kedump add: SYS_LAST_KMSG[6] 20000/20000@1ca000 [2025-12-03 14:47:41] kedump: data:0x81838000, size:0x4cc0, offset:0x1ea000, va:0x41838000 [2025-12-03 14:47:41] kedump add: SYS_RR_DESC_RAW[7] 4cc0/4cc0@1ea000 [2025-12-03 14:47:41] kedump: data:0x8eb40000, size:0x4b00, offset:0x1eecc0, va:0x41b40000 [2025-12-03 14:47:41] kedump add: SYS_MODULES_INFO_RAW[8] 4b00/4b00@1eecc0 [2025-12-03 14:47:41] kedump: data:0x9a000800, size:0x6000, offset:0x1f37c0, va:0x41000800 [2025-12-03 14:47:41] kedump add: SYS_EXTRA_MDSS_RAW[9] 6000/6000@1f37c0 [2025-12-03 14:47:41] kedump: data:0x9def0020, size:0x9aa5, offset:0x1f97c0, va:0x41ef0020 [2025-12-03 14:47:41] kedump add: SYS_CUR_PLLK[10] 9aa5/9aa5@1f97c0 [2025-12-03 14:47:41] kedump: data:0x9dc14000, size:0x20000, offset:0x203265, va:0x41c14000 [2025-12-03 14:47:41] kedump add: SYS_ATF_LOG[11] 20000/20000@203265 [2025-12-03 14:47:41] kedump: data:0x9c6a106c, size:0x800, offset:0x223265, va:0x416a106c [2025-12-03 14:47:41] ATF: dev_write:1, atf fp addr pa:0x9dc13800 va:0x0x40072000 size:0x800 [2025-12-03 14:47:41] kedump add: SYS_ATF_FOOTPRINT[12] 800/800@223265 [2025-12-03 14:47:41] kedump: data:0xbfd70000, size:0x80000, offset:0x223a65, va:0x41d70000 [2025-12-03 14:47:41] ATF: dev_write:1, atf ramdump addr pa:0xbfd70000 va:0x0x40073000, size:0x80000 [2025-12-03 14:47:41] kedump add: SYS_ATF_RDUMP[13] 80000/80000@223a65 [2025-12-03 14:47:41] get_suffix:229: [LK] boot_ctrl magic number is match, compare priority 15, 14 [2025-12-03 14:47:41] load_mkimg_part_info:71: magic number : 0x58881688 [2025-12-03 14:47:41] load_mkimg_part_info:72: name : dpmpm [2025-12-03 14:47:41] load_mkimg_part_info:73: size : 31668 [2025-12-03 14:47:41] load_mkimg_part_info:71: magic number : 0x58881688 [2025-12-03 14:47:41] load_mkimg_part_info:72: name : cert1 [2025-12-03 14:47:41] load_mkimg_part_info:73: size : 1733 [2025-12-03 14:47:41] load_mkimg_part_info:71: magic number : 0x58881688 [2025-12-03 14:47:41] load_mkimg_part_info:72: name : cert2 [2025-12-03 14:47:41] load_mkimg_part_info:73: size : 981 [2025-12-03 14:47:41] load_mkimg_part_info:71: magic number : 0x58881688 [2025-12-03 14:47:41] load_mkimg_part_info:72: name : dpmdm [2025-12-03 14:47:42] load_mkimg_part_info:73: size : 928 [2025-12-03 14:47:42] load_mkimg_part_info:71: magic number : 0x58881688 [2025-12-03 14:47:42] load_mkimg_part_info:72: name : cert1 [2025-12-03 14:47:42] load_mkimg_part_info:73: size : 1733 [2025-12-03 14:47:42] load_mkimg_part_info:71: magic number : 0x58881688 [2025-12-03 14:47:42] load_mkimg_part_info:72: name : cert2 [2025-12-03 14:47:42] load_mkimg_part_info:73: size : 981 [2025-12-03 14:47:42] load_mkimg_part_info:71: magic number : 0x58881688 [2025-12-03 14:47:42] load_mkimg_part_info:72: name : dpmpt [2025-12-03 14:47:42] load_mkimg_part_info:73: size : 287327 [2025-12-03 14:47:42] load_partition:152: mkimg hdr detected (287327) [2025-12-03 14:47:42] [SEC_POLICY] sboot_state = 0x1 [2025-12-03 14:47:42] [SEC_POLICY] lock_state = 0x1 [2025-12-03 14:47:42] load_partition:167: img_auth_required = 1 [2025-12-03 14:47:42] [SEC] SBC_EN = 0, SEC_LEVEL: 0 [2025-12-03 14:47:42] [SEC] SW RoT Verify [PASS] [2025-12-03 14:47:42] [SEC] dpmpt cert chain vfy pass [2025-12-03 14:47:42] [SEC] ver:(group,verk,verc,otp,max)=(1, 0, 0, 0, 64) ok [2025-12-03 14:47:42] [SEC] image dpmpt header auth pass [2025-12-03 14:47:42] [SEC] image dpmpt auth pass [2025-12-03 14:47:42] kedump: data:0x9c6a10b4, size:0x200, offset:0x2a3a65, va:0x416a10b4 [2025-12-03 14:47:42] kedump: data:0x9c6a18bc, size:0x4fe00, offset:0x2a3c65, va:0x416a18bc [2025-12-03 14:47:42] kedump add: SYS_DPM_XFILE[14] 50000/50000@2a3a65 [2025-12-03 14:47:42] kedump: data:0x9c6a10b4, size:0x24, offset:0x2f3a65, va:0x416a10b4 [2025-12-03 14:47:42] kedump: data:0x9c6a18bc, size:0x8000, offset:0x2f3a89, va:0x416a18bc [2025-12-03 14:47:42] kedump: data:0x9c6a10b4, size:0x5c, offset:0x2fba89, va:0x416a10b4 [2025-12-03 14:47:42] kedump: data:0x9c69be2c, size:0x14, offset:0x2fbae5, va:0x4169be2c [2025-12-03 14:47:42] kedump: data:0x9c69be0c, size:0x8, offset:0x2fbaf9, va:0x4169be0c [2025-12-03 14:47:42] kedump: data:0x9c6a10b4, size:0x84, offset:0x2fbb01, va:0x416a10b4 [2025-12-03 14:47:42] kedump: data:0x9c6a18bc, size:0x8000, offset:0x2fbb85, va:0x416a18bc [2025-12-03 14:47:42] kedump: data:0x9c6a10b4, size:0x5c, offset:0x303b85, va:0x416a10b4 [2025-12-03 14:47:42] kedump: data:0x9c69be2c, size:0x14, offset:0x303be1, va:0x4169be2c [2025-12-03 14:47:42] kedump: data:0x9c69be0c, size:0x8, offset:0x303bf5, va:0x4169be0c [2025-12-03 14:47:42] kedump: data:0x9c6a10b4, size:0x84, offset:0x303bfd, va:0x416a10b4 [2025-12-03 14:47:42] kedump: data:0x9c6a10b4, size:0x20, offset:0x303c81, va:0x416a10b4 [2025-12-03 14:47:42] kedump: data:0x9c6a10b4, size:0x20, offset:0x303ca1, va:0x416a10b4 [2025-12-03 14:47:42] END DPM DUMP. [2025-12-03 14:47:42] kedump add: SYS_DPM_DATA[15] 1025c/1025c@2f3a65 [2025-12-03 14:47:42] kedump: data:0x11d800, size:0x200, offset:0x303cc1, va:0x4111d800 [2025-12-03 14:47:42] kedump add: SYS_LAST_DRAMC[16] 200/200@303cc1 [2025-12-03 14:47:42] kedump: data:0x9c6a18bc, size:0x2fc, offset:0x303ec1, va:0x416a18bc [2025-12-03 14:47:42] kedump add: SYS_LASTEMI_RAW[17] 2fc/2fc@303ec1 [2025-12-03 14:47:42] kedump: data:0x9c6a18bc, size:0x34000, offset:0x3041bd, va:0x416a18bc [2025-12-03 14:47:42] kedump add: SYS_MCUPM_COREDUMP[18] 34000/34000@3041bd [2025-12-03 14:47:42] dfd_internal_dump_check_triggered_or_not: dfd_status = 0x3 [2025-12-03 14:47:42] dfd_internal_dump_check_triggered_or_not: dfd_internal_dump_triggered = 0x1 [2025-12-03 14:47:42] dfd_mcu_get: paddr = (0xffc00000) [2025-12-03 14:47:42] dfd_mcu_get, no plat_dfd_decode function [2025-12-03 14:47:42] save_dfd_mcu_data: In dfd_mcu dump [2025-12-03 14:47:42] kedump: data:0xffc00000, size:0x280000, offset:0x3381bd, va:0x41c00000 [2025-12-03 14:47:42] save_dfd_mcu_data: dfd_mcu done (len = 0x280000) [2025-12-03 14:47:42] kedump add: DFD.dfd[19] 280000/280000@3381bd [2025-12-03 14:47:42] kedump: data:0x9c6a18bc, size:0x246, offset:0x5b81bd, va:0x416a18bc [2025-12-03 14:47:42] lastpc done [2025-12-03 14:47:42] plat_dfd_mcu done [2025-12-03 14:47:42] kedump: data:0x9c6a18bc, size:0x5a5, offset:0x5b8403, va:0x416a18bc [2025-12-03 14:47:42] return_stack done [2025-12-03 14:47:42] tracker done [2025-12-03 14:47:42] kedump: data:0x9c6a18bc, size:0x4c6, offset:0x5b89a8, va:0x416a18bc [2025-12-03 14:47:42] lastbus done [2025-12-03 14:47:42] etb done [2025-12-03 14:47:42] kedump add: SYS_LAST_CPU_BUS[20] cb1/cb1@5b81bd [2025-12-03 14:47:42] mblock_alloc_range_no_lock:504: start: 0xeeff0000, sz: 0x10000 lower_bound: 0x0, limit: 0xef000000,map:0 name:SPM-reserved [2025-12-03 14:47:42] get_suffix:229: [LK] boot_ctrl magic number is match, compare priority 15, 14 [2025-12-03 14:47:42] load_mkimg_part_info:71: magic number : 0x58881688 [2025-12-03 14:47:42] load_mkimg_part_info:72: name : spmfw [2025-12-03 14:47:42] load_mkimg_part_info:73: size : 13699 [2025-12-03 14:47:42] load_partition:152: mkimg hdr detected (13699) [2025-12-03 14:47:42] [SEC_POLICY] sboot_state = 0x1 [2025-12-03 14:47:42] [SEC_POLICY] lock_state = 0x1 [2025-12-03 14:47:42] load_partition:167: img_auth_required = 1 [2025-12-03 14:47:42] [SEC] SBC_EN = 0, SEC_LEVEL: 0 [2025-12-03 14:47:42] [SEC] SW RoT Verify [PASS] [2025-12-03 14:47:42] [SEC] spmfw cert chain vfy pass [2025-12-03 14:47:42] [SEC] ver:(group,verk,verc,otp,max)=(1, 0, 0, 0, 64) ok [2025-12-03 14:47:42] [SEC] image spmfw header auth pass [2025-12-03 14:47:42] [SEC] image spmfw auth pass [2025-12-03 14:47:42] spmfw version: pcm_suspend_20240105 [2025-12-03 14:47:42] mblock_free_with_size:947: start 0xeeff0000 size: 0x10000, name: SPM-reserved [2025-12-03 14:47:42] kedump: data:0x9c6a18bc, size:0x544, offset:0x5b8e6e, va:0x416a18bc [2025-12-03 14:47:42] kedump add: SYS_LAST_SPM_DATA[21] 544/544@5b8e6e [2025-12-03 14:47:42] kedump: data:0x12002000, size:0x4000, offset:0x5b93b2, va:0x41002000 [2025-12-03 14:47:42] kedump add: SYS_LAST_SPM_SRAM_DATA[22] 4000/4000@5b93b2 [2025-12-03 14:47:42] kedump: data:0xbffc8080, size:0x3fc, offset:0x5bd3b2, va:0x41fc8080 [2025-12-03 14:47:42] kedump add: SYS_SSPM_LAST_LOG[23] 3fc/3fc@5bd3b2 [2025-12-03 14:47:42] kedump: data:0xbfeff634, size:0x5cfec, offset:0x5bd7ae, va:0x41eff634 [2025-12-03 14:47:42] kedump add: SYS_SSPM_XFILE[24] 5cfec/5cfec@5bd7ae [2025-12-03 14:47:43] kedump: data:0x9c6a132c, size:0x274, offset:0x61a79a, va:0x416a132c [2025-12-03 14:47:43] kedump add: SYS_SSPM_DATA[25] 274/274@61a79a [2025-12-03 14:47:43] kedump: data:0xbffb0000, size:0x18000, offset:0x61aa0e, va:0x41fb0000 [2025-12-03 14:47:43] kedump: data:0xbffc8000, size:0x80, offset:0x632a0e, va:0x41fc8000 [2025-12-03 14:47:43] kedump add: SYS_SSPM_COREDUMP[26] 18080/18080@61aa0e [2025-12-03 14:47:43] kedump: data:0x9c6a18bc, size:0x965, offset:0x632a8e, va:0x416a18bc [2025-12-03 14:47:43] kedump add: SYS_LAST_DVFSRC_DATA[27] 965/965@632a8e [2025-12-03 14:47:43] kedump: data:0x11bc00, size:0x1400, offset:0x6333f3, va:0x4111bc00 [2025-12-03 14:47:43] kedump add: SYS_CPUHVFS_RAW[28] 1400/1400@6333f3 [2025-12-03 14:47:43] kedump: data:0x11b000, size:0x800, offset:0x6347f3, va:0x4111b000 [2025-12-03 14:47:43] kedump add: SYS_MCDI_DATA[29] 800/800@6347f3 [2025-12-03 14:47:43] kedump: data:0x9c68542c, size:0x5000, offset:0x634ff3, va:0x4168542c [2025-12-03 14:47:43] kedump add: ZAEE_LOG[30] 5000/5000@634ff3 [2025-12-03 14:47:43] kedump mini done [2025-12-03 14:47:43] aee_check_enable:290: lk aee dcfg = full (lv.2) [2025-12-03 14:47:43] mrdump_get_env:93: mrdump_output: none [2025-12-03 14:47:43] [MRDUMP10] D:Boot record found at 0x4011e000[5852] [2025-12-03 14:47:43] mrdump_detection:285: sram record with mode 4 [2025-12-03 14:47:43] mrdump_get_env:93: mrdump_mem_size: [2025-12-03 14:47:43] [MRDUMP10] I:Kdump triggerd by 'HWT' (address:80000000, size:2048M) [2025-12-03 14:47:43] gen_cmm:mrdump_cblock=0x4011e000, crach_record=0x4011e0f8 [2025-12-03 14:47:43] crash_recode msg: HWT
12-05
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值