Computer Science ›› 2019, Vol. 46 ›› Issue (3): 159-163.doi: 10.11896/j.issn.1002-137X.2019.03.024
• ChinaMM2018 • Previous Articles Next Articles
ZHAO Zhen-bing1,CUI Ya-ping1,QI Yin-cheng1,DU Li-qun1,ZHANG Ke1,ZHAI Yong-jie2
CLC Number:
[1]MA X Y.Research on automatic inspection technology of transmission lines based on aerial image[D].Beijing:North China Electric Power University,2016.(in Chinese) 马兴誉.基于航拍图像的输电线路自动巡检相关技术研究[D].北京:华北电力大学,2016. [2]JIANG S,JIANG W,HUANG W,et al.UAV-Based oblique photogrammetry for outdoor data acquisition and offsite visual inspection of transmission line[J].Remote Sensing,2017,9(3):278-303. [3]MATIKAINEN L,LEHTOMAKI M,AHOKAS E,et al.Remote sensing methods for power line corridor surveys[J].Isprs Journal of Photogrammetry & Remote Sensing,2016,119:10-31. [4]KRIZHEVSKY A,SUTSKEVER I,HINTON G E.ImageNet classification with deep convolutional neural networks[J].Communications of the Acm,2012,60(2):1097-1105. [5]DAI J F,LI Y,HE K M,et al.R-FCN:Object Detection via Region-based Fully Convolutional Networks[C]∥Conference and Workshop on Neural Information Processing Systems(NIPS).2016:379-387. [6]HOSANG J,BENENSON R,DOLLAR P,et al.What Makes for Effective Detection Proposals?[J].IEEE Transactions on Pattern Analysis & Machine Intelligence,2016,38(4):814. [7]GIRSHICK R,DONAHUE J,DARRELL T,et al.Rich Feature Hierarchies for Accurate Object Detection and Semantic Segmentation[C]∥IEEE Conference on Computer Vision and Pattern Recognition(CVPR).2013:580-587. [8]SANDE K,UIJLINGS J,GEVERS T,et al.Segmentation as selective search for object recognition[C]∥IEEE International Conference on Computer Vision (ICCV).2012:1879-1886. [9]HE K M,ZHANG X,REN S Q,et al.Spatial pyramid pooling in deep convolutional networks for visual recognition[J].IEEE Transactions on Pattern Analysis & Machine Intelligence,2014,37(9):1904-1916. [10]GIRSHICK R.Fast R-CNN[C]∥IEEE International Confe- rence on Computer Vision(ICCV).2015:1440-1448. [11]REN S Q,HE K M,GIRSHICK R,et al.Faster R-CNN:to- wards real-Time object detection with region proposal networks[J].IEEE Transactions on Pattern Analysis & Machine Intelligence,2015,39(6):1137-1149. [12]LIU W,ANGUELOV D,ERHAN D,et al.SSD:single shot multiboxdetector[C]∥European Conference on Computer Vision(ECCV).2015:21-37. [13]HUANG X N,ZHANG Z L.A method to extract insulator image from aerial image of helicopter patrol[J].Power System Technology,2010,34(1):194-197.(in Chinese) 黄宵宁,张真良.直升机巡检航拍图像中绝缘子图像的提取算法[J].电网技术,2010,34(1):194-197. [14]XU Y L,ZHANG S C,YANG N,et al.An algorithm to extract insulator image from aerial image[J].Journal of Shanghai University of Electric Power,2011,27(5):515-518.(in Chinese) 徐耀良,张少成,杨宁,等.航拍图像中绝缘子的提取算法[J].上海电力学院学报,2011,27(5):515-518. [15]YAO C Y,JIN L J,YAN S J.Recognition of insulator string in power grid patrol images[J].Journal of System Simulation,2012,24(9):1818-1822.(in Chinese) 姚春羽,金立军,闫书佳.电网巡检图像中绝缘子的识别[J].系统仿真学报,2012,24(9):1818-1822. [16]XU X J,WANG S P,JI Q C,et al.Insulator infrared image recognition method based on gaussian scale-space and GHT[J].Infrared Technology,2014,36(7):596-599.(in Chinese) 徐向军,王生鹏,纪青春,等.基于高斯尺度空间GHT的绝缘子红外图像识别方法[J].红外技术,2014,36(7):596-599. [17]ZHAO Z B,WANG L.Aerial insulator string image automatic location method[J].Chinese Journal of Scientific Instrument,2014,35(3):558-565.(in Chinese) 赵振兵,王乐.一种航拍绝缘子串图像自动定位方法[J].仪器仪表学报,2014,35(3):558-565. [18]ZHAO Z B,XU G Z,QI Y C,et al.Multi-patch deep features for power line insulator status classification from aerial images[C]∥IEEE International Joint Conference on Neural Networks (IJCNN).2016:3187-3194. [19]ZHAO Z B,FAN X Q,XU G Z,et al.Aggregating deep convolutional feature maps for insulator detection in infrared images[J].IEEE Access,2017,5(1):21831-21839. [20]ZHAO Z B,XU G Z,QI Y C.Representation of binary feature pooling for detection of insulator strings in infrared images[J].IEEE Transactions on Dielectrics and Electrical Insulation,2016,23(5):2858-2866. [21]WANG X,SHRIVASTAVA A,GUPTA A.A-Fast-RCNN: hard positive generation via adversary for object detection[C]∥IEEE Conference on Computer Vision and Pattern Recognition(CVPR).2017:3039-3048. |
[1] | WANG Run-an, ZOU Zhao-nian. Query Performance Prediction Based on Physical Operation-level Models [J]. Computer Science, 2022, 49(8): 49-55. |
[2] | FENG Lei, ZHU Deng-ming, LI Zhao-xin, WANG Zhao-qi. Sparse Point Cloud Filtering Algorithm Based on Mask [J]. Computer Science, 2022, 49(5): 25-32. |
[3] | LIANG Jing-ru, E Hai-hong, Song Mei-na. Method of Domain Knowledge Graph Construction Based on Property Graph Model [J]. Computer Science, 2022, 49(2): 174-181. |
[4] | HUANG Mei-gen, LIU Chuan, DU Huan, LIU Jia-le. Research on Cognitive Diagnosis Model Based on Knowledge Graph and Its Application in Teaching Assistant [J]. Computer Science, 2021, 48(6A): 644-648. |
[5] | GUO Wen, YIN Tong-ling, ZHANG Tian-zhu, XU Chang-sheng. Temporal Consistency Preserving Multi-Mask Sparse Deep Representation for Visual Tracking [J]. Computer Science, 2021, 48(6): 110-117. |
[6] | LIU Yun-han, SHA Chao-feng, NIU Jun-yu. Analysis of Topics on Database Systems in Stack Overflow [J]. Computer Science, 2021, 48(6): 48-56. |
[7] | FAN Peng-hao, HUANG Guo-rui, JIN Pei-quan. NVRC:Write-limited Logging for Non-volatile Memory [J]. Computer Science, 2021, 48(3): 130-135. |
[8] | LIU Li-cheng, XU Yi-fan, XIE Gui-cai, DUAN Lei. Outlier Detection and Semantic Disambiguation of JSON Document for NoSQL Database [J]. Computer Science, 2021, 48(2): 93-99. |
[9] | LING Fei, CHEN Shi-ping. Shared Digital Credits Management Mechanism of Enterprise Alliance Based on Blockchain [J]. Computer Science, 2021, 48(11A): 533-539. |
[10] | E Hai-hong, HAN Peng-hao, SONG Mei-na. Conversion Method from Relational Database to Graph Database [J]. Computer Science, 2021, 48(10): 140-144. |
[11] | LU Jia-wen, YAN Li. Mapping Method from Object-relational Database to RDF(S) [J]. Computer Science, 2021, 48(10): 145-151. |
[12] | TIAN Ye, SHOU Li-dan, CHEN Ke, LUO Xin-yuan, CHEN Gang. Natural Language Interface for Databases with Content-based Table Column Embeddings [J]. Computer Science, 2020, 47(9): 60-66. |
[13] | FENG An-ran, WANG Xu-ren, WANG Qiu-yun, XIONG Meng-bo. Database Anomaly Access Detection Based on Principal Component Analysis and Random Tree [J]. Computer Science, 2020, 47(9): 94-98. |
[14] | ZHANG Shan-bin, YUAN Jin-zhao, CHEN Hui, WANG Yu-rong, WANG Jie, TU Chang-he. Vehicle Self-localization Based on Standard Road Sign [J]. Computer Science, 2020, 47(7): 97-102. |
[15] | SONG Chuan-ming, HONG Xu, WANG Xiang-hai. Shadow Removal of Traffic Surveillance Video by Joint Voting in Spatial-Frequency Domain [J]. Computer Science, 2020, 47(5): 129-136. |
|