当前位置:网站首页>Identification of bolt points in aerial photography based on perception
Identification of bolt points in aerial photography based on perception
2022-04-23 20:20:00 【Install a sound 77】
Purpose of this paper :
Automatically detect the bolt points in the video , Make it automatically judge the damage , Fall off , Location of rusted bolts , Reduce labor costs .
Technical principle :
Extract pictures from the original video... Percent 90 As a training set , Per cent 10 As test set , Manually selected and classified as 3 Species category , That is not a bolt , Normal bolt , Damage to bolts , Through transfer learning, convolutional neural network is used for graphic classification training , After training, use the completion model to distinguish all bolt points in the picture , After discrimination , If this point is damage to the bolt, feed back to the original drawing to show .
Pretreatment stage :
First, extract the pictures in the video , Considering that the number of frames is 50, Every time 50 Frame extraction once makes the picture have a certain difference .
Select and mark the possible damaged bolts manually .
For how to select the damaged bolt , Except for a few cases , There are also a large number of bolts that can not completely judge whether they are damaged by observing the pictures alone , Considering the difficulty of subsequent identification .
Therefore, the following principles shall be adopted when selecting bolts :
1. For bolt points with too deep color depth, we think they may be damaged .
2. For points where the color is significantly different from the surrounding bolts , We think it is possible that .
In addition, normal bolt points shall be intercepted manually , Irrelevant point , And classified storage , Finally get the training set
Normal bolt points 100 individual
Irrelevant point 50 individual
Damage bolt points 35 individual
The pixel of a single bolt point is (15*15) about
Carry out gray analysis for a single bolt point
Single bolt point
We can see from the picture that (R,G,B) The distribution is steep , It is not conducive to the distinction and discrimination of graphics .
In this regard, it is necessary to consider gray-scale two pole processing for bolt points , Make its grayscale distinction more obvious , Considering the time reason and expected results ( That is, the definition of the picture itself is too low , Limited promotion effect ), We still use the original picture for training .
Construction of neural network :
Through access inception, We only need to change the bottleneck layer to train a small part of the data , Can make it have a certain recognition function .
Deep learning process , Because the data set is small , And the pixels are low , We just need to train 400 Time , You can complete the training . The trained model is saved in run In the folder .
According to the image, we can find , The model thinks it's good to learn .
The structure of bolt point neural network
Testing phase :
Ideas : adopt openCV Module similarity identifies all bolt points , And get the coordinates of the point , Save in folder , In batch access through the test program , If it is identified as damage to the bolt, the record shall be saved in a new folder , It's best to feed back to the original drawing .
Therefore, through our accurate test atlas , Manually select some points to test the accuracy of the model
Normal point
According to the judgment point 1 Yes 76% The possibility is normal , Although right, this value is not high .
The problem summary :
1. The definition of aerial captured image is too low .
2. There is too little damage bolt point training data .
3. There is a certain uncertainty in the process of manually selecting damaged bolt points .
4. inceptionV3 Mainly used for static object recognition , The compatibility of bolt points is relatively low , The accuracy of the results will be greatly affected .
5. Due to time , Proficiency and other reasons , It is difficult to build neural network from scratch and train it in a short time .
6. The current model is only an experimental product, and there is still a distance between it and practical application .
版权声明
本文为[Install a sound 77]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/04/202204210551491745.html
边栏推荐
- Common form verification
- [text classification cases] (4) RNN and LSTM film evaluation Tendency Classification, with tensorflow complete code attached
- Compact CUDA tutorial - CUDA driver API
- The market share of the financial industry exceeds 50%, and zdns has built a solid foundation for the financial technology network
- Click an EL checkbox to select all questions
- Investigate why close is required after sqlsession is used in mybatties
- nc基础用法4
- Fundamentals of network communication (LAN, Wan, IP address, port number, protocol, encapsulation and distribution)
- R语言使用timeROC包计算存在竞争风险情况下的生存资料多时间AUC值、使用cox模型、并添加协变量、R语言使用timeROC包的plotAUCcurve函数可视化多时间生存资料的AUC曲线
- 中金财富公司怎么样,开户安全吗
猜你喜欢
STM32基础知识
Building the tide, building the foundation and winning the future -- the successful holding of zdns Partner Conference
go-zero框架数据库方面避坑指南
SQL Server Connectors By Thread Pool | DTSQLServerTP plugin instructions
aqs的学习
Grafana shares links with variable parameters
Commit and rollback in DCL of 16 MySQL
Linux64Bit下安装MySQL5.6-不能修改root密码
[graph theory brush question-5] Li Kou 1971 Find out if there is a path in the graph
Sqoop imports tinyint type fields to boolean type
随机推荐
Azkaban recompile, solve: could not connect to SMTP host: SMTP 163.com, port: 465 [January 10, 2022]
STM32基础知识
MySQL advanced lock - overview of MySQL locks and classification of MySQL locks: global lock (data backup), table level lock (table shared read lock, table exclusive write lock, metadata lock and inte
Remote code execution in Win 11 using wpad / PAC and JScript 3
Customize timeline component styles
The R language uses the timeroc package to calculate the multi time AUC value of survival data without competitive risk, and uses the confint function to calculate the confidence interval value of mul
R language uses the preprocess function of caret package for data preprocessing: BoxCox transform all data columns (convert non normal distribution data columns to normal distribution data and can not
SIGIR'22 "Microsoft" CTR estimation: using context information to promote feature representation learning
[2022] regard 3D target detection as sequence prediction - point2seq: detecting 3D objects as sequences
Historical track data reading of Holux m1200-e Bluetooth GPS track recorder
R language survival package coxph function to build Cox regression model, ggrisk package ggrisk function and two_ Scatter function visualizes the risk score map of Cox regression, interprets the risk
aqs的学习
Sqoop imports tinyint type fields to boolean type
WordPress plug-in: WP CHINA Yes solution to slow domestic access to the official website
Leetcode dynamic planning training camp (1-5 days)
論文寫作 19: 會議論文與期刊論文的區別
Vericrypt file hard disk encryption tutorial
Error reported by Azkaban: Azkaban jobExecutor. utils. process. ProcessFailureException: Process exited with code 64
Investigate why close is required after sqlsession is used in mybatties
Zdns was invited to attend the annual conference of Tencent cloud basic resources and share the 2020 domain name industry development report