Computer Science ›› 2019, Vol. 46 ›› Issue (6A): 153-157.

• Pattern Recognition & Image Processing • Previous Articles     Next Articles

Realization of “Uncontrolled” Object Recognition Algorithm Based on Mobile Terminal

PANG Yu1, LIU Ping2, LEI Yin-jie1   

  1. College of Electronics and Information Engineering,Sichuan University,Chengdu 610065,China1;
    Heavy Rain and Drought-Flood Disasters in Plateau and Basin Key Laboratory of Sichuan Province,Chengdu 610065,China2
  • Online:2019-06-14 Published:2019-07-02

Abstract: Aiming at the problems that the existing object recognition methods are easy to be influenced by “uncontrolled” factors such as illumination,angle,size and complex environment,and have the problems such as low recognition rate,poor real-time performance and large memory consumption,this paper proposed a new object recognition algorithm,on which the object recognition system based on mobile terminal was realized.This method first employs particle filter algorithm to track the detection range by adding windows,and then applies the watershed segmentation algorithm to segment objects,then uses the HOG(Histogram of Oriented Gradient) algorithm to extract object features.Finally,the random forest algorithm is utilized to recognize objects.The experimental results show that this method can be used to identify the mobile terminal quickly and accurately in an “uncontrolled” environment.

Key words: Mobile terminal, Object recognition, Random forest, Real time, Uncontrolled

CLC Number: 

  • TP391.41
[1]SHAH S A A,BENNAMOUN M,BOUSSAID F.Automatic object detection using objectness measure[C]∥International Conference on Communications,Signal Processing,and Their Applications.IEEE,2013:1-6.
[2]徐晓.计算机视觉中物体识别综述[J].电脑与信息技术,2013,21(5):4-6.
[3]黄凯奇,任伟强,谭铁牛.图像物体分类与检测算法综述[J].计算机学报,2014,36(6):1225-1240.
[4]林志强,陈小平.一种结合多特征的实时物体识别系统[J].小型微型计算机系统,2015,36(6):1310-1315.
[5]刘曦,史忠植,石志伟,等.一种基于特征捆绑计算模型的物体识别方法[J].软件学报,2010,21(3):452-460.
[6]卢良锋,谢志军,叶宏武.基于RGB特征与深度特征融合的物体识别算法[J].计算机工程,2016,42(5):186-193.
[7]孙利娟,张继栋,杨新锋.基于多稀疏分布特征和最近邻分类的物体识别方法[J].计算机应用研究,2016,33(10):3156-3159.
[8]尚俊.基于HOG特征的目标识别算法研究[D].武汉:华中科技大学,2012.
[9]唐发明,王仲东,陈绵云.一种新的二叉树多类支持向量机算法[J].计算机工程与应用,2005,41(7):24-26.
[10]苏亚麟,吕开云.基于随机森林算法的特征选择的水稻分类——以南昌市为例[J]江西科学,2018(1):161-167.
[11]周雪晴,张占松,张超谟,等.基于粗糙集—随机森林算法的复杂岩性识别[J].大庆石油地质与开发,2017,36(6):127-133.
[12]闫月影.非受控场景下的二维人脸识别研究[J].数码世界,2017(11):394-395.
[13]李安平.复杂环境下的视频目标跟踪算法研究[D].上海:上海交通大学,2007.
[14]陈代武.基于移动终端的多角度实物识别方法[D].北京:北京邮电大学,2015.
[15]FRIEDMAN N,RUSSELL S.Image Segmentation in Video Sequences:A Probabilistic Approach,Uncertainty in Artificial Intelligence[J].arXiv:1302.1539,1997.
[16]HALEVY G,WEINSHALL D.Motion of Disturbances:Detection and Tracking of Multi-Body Non-Rigid Motion.Machine Vision and Applications,1999,11(3):122-137.
[17]KUMAR S,DAI Y,LI H.Spatio-Temporal Union of subspaces for Multi-body Non-rigid Structure-from-Motion[J].Pattern Recognition,2017,71:428-443.
[18]曹正凤.随机森林算法优化研究[D].北京:首都经济贸易大学,2014.
[19]许保勋.面向高维数据的随机森林算法优化研究[D].哈尔滨:哈尔滨工业大学,2013.
[20]程广涛,陈雪,郭照庄.基于HOG特征的行为人视觉检测方法[J].传感器与微系统,2011,30(7):68-70.
[21]赵桂儒.较大规模数据应用PCA降维的一种方法[J].电脑知识与技术,2014(8):1835-1837.
[22]杨彪,倪蓉蓉,江大鹏.一种对光照变化鲁棒的移动目标前景提取方法[J].计算机科学,2016,43(s2):186-189.
[23]郭宇,郝晓燕,张兴忠.基于预测的多特征融合Mean-Shift跟踪算法[J].计算机科学,2018,45(s1):171-173.
[1] YU Bin, LI Xue-hua, PAN Chun-yu, LI Na. Edge-Cloud Collaborative Resource Allocation Algorithm Based on Deep Reinforcement Learning [J]. Computer Science, 2022, 49(7): 248-253.
[2] GAO Zhen-zhuo, WANG Zhi-hai, LIU Hai-yang. Random Shapelet Forest Algorithm Embedded with Canonical Time Series Features [J]. Computer Science, 2022, 49(7): 40-49.
[3] HU Yan-yu, ZHAO Long, DONG Xiang-jun. Two-stage Deep Feature Selection Extraction Algorithm for Cancer Classification [J]. Computer Science, 2022, 49(7): 73-78.
[4] QUE Hua-kun, FENG Xiao-feng, LIU Pan-long, GUO Wen-chong, LI Jian, ZENG Wei-liang, FAN Jing-min. Application of Grassberger Entropy Random Forest to Power-stealing Behavior Detection [J]. Computer Science, 2022, 49(6A): 790-794.
[5] WANG Wen-qiang, JIA Xing-xing, LI Peng. Adaptive Ensemble Ordering Algorithm [J]. Computer Science, 2022, 49(6A): 242-246.
[6] YAO Ye, ZHU Yi-an, QIAN Liang, JIA Yao, ZHANG Li-xiang, LIU Rui-liang. Android Malware Detection Method Based on Heterogeneous Model Fusion [J]. Computer Science, 2022, 49(6A): 508-515.
[7] ZHANG Xiao-qing, FANG Jian-sheng, XIAO Zun-jie, CHEN Bang, Risa HIGASHITA, CHEN Wan, YUAN Jin, LIU Jiang. Classification Algorithm of Nuclear Cataract Based on Anterior Segment Coherence Tomography Image [J]. Computer Science, 2022, 49(3): 204-210.
[8] LI Jia-rui, LING Xiao-bo, LI Chen-xi, LI Zi-mu, YANG Jia-hai, ZHANG Lei, WU Cheng-nan. Dynamic Network Security Analysis Based on Bayesian Attack Graphs [J]. Computer Science, 2022, 49(3): 62-69.
[9] LIU Zhen-yu, SONG Xiao-ying. Multivariate Regression Forest for Categorical Attribute Data [J]. Computer Science, 2022, 49(1): 108-114.
[10] YANG Xiao-qin, LIU Guo-jun, GUO Jian-hui, MA Wen-tao. Full Reference Color Image Quality Assessment Method Based on Spatial and Frequency Domain Joint Features with Random Forest [J]. Computer Science, 2021, 48(8): 99-105.
[11] ZHENG Jian-hua, LI Xiao-min, LIU Shuang-yin, LI Di. Improved Random Forest Imbalance Data Classification Algorithm Combining Cascaded Up-sampling and Down-sampling [J]. Computer Science, 2021, 48(7): 145-154.
[12] YUAN Xiao-lei, YUE Xiao-feng, FANG Bo, MA Guo-yuan. Three-dimensional Target Recognition Method Based on Pair Point Feature and HierarchicalComplete-linkage Clustering [J]. Computer Science, 2021, 48(6A): 127-131.
[13] CAO Yang-chen, ZHU Guo-sheng, QI Xiao-yun, ZOU Jie. Research on Intrusion Detection Classification Based on Random Forest [J]. Computer Science, 2021, 48(6A): 459-463.
[14] LI Na-na, WANG Yong, ZHOU Lin, ZOU Chun-ming, TIAN Ying-jie, GUO Nai-wang. DDoS Attack Random Forest Detection Method Based on Secondary Screening of Feature Importance [J]. Computer Science, 2021, 48(6A): 464-467.
[15] XU Jia-qing, HU Xiao-yue, TANG Fu-qiao, WANG Qiang, HE Jie. Detecting Blocking Failure in High Performance Interconnection Networks Based on Random Forest [J]. Computer Science, 2021, 48(6): 246-252.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!