Computer Science ›› 2024, Vol. 51 ›› Issue (6A): 230900021-6.doi: 10.11896/jsjkx.230900021

• Image Processing & Multimedia Technolog • Previous Articles     Next Articles

Container Lock Hole Recognition Algorithm Based on Lightweight YOLOv5s

LI Yuanxin, GUO Zhongfeng, YANG Junlin   

  1. School of Mechanical Engineering,Shenyang University of Technology,Shenyang 110870,China
  • Published:2024-06-06
  • About author:LI Yuanxin,born in 1995,postgra-duate.His main research interests include machine vision and deep learning.
    GUO Zhongfeng,born in 1978,Ph.D,associate professor.His main research interests include robot mechanism design,artificial intelligence machine vision inspection,etc.
  • Supported by:
    2021 Scientific Research Funding Project of Liaoning Provincial Department of Education(LJKZ0114).

Abstract: In order to improve the efficiency of container lock hole recognition and reduce the number of algorithm parameters and model size,a container lock hole recognition algorithm based on lightweight YOLOv5s is proposed.This algorithm replaces the Backbone feature extraction network of YOLOv5s with a lightweight neural network model MobileNetV3,and further optimizes the feature fusion structure of the neck part,which reduces the number of parameters and calculation amount of the model and improves the detection speed.The accuracy and efficiency of detection are improved by introducing the attention mechanism SimAM layer.After the model is reconstructed with different improvement methods,the training and testing are carried out on the self-built container lock hole data set,and the comparison test is carried out with the improved YOLOv5s.The results show that the size of the improved model is only 2.4MB,the average detection time of each image is 5.1ms,and the average detection accuracy is 97.3%.Compared with the original target detection model,the size of the model is reduced by 82.8%,and the detection speed is increased by 39%,showing strong real-time algorithm on the premise of ensuring high detection accuracy.

Key words: Machine vision, Container lock hole, YOLOv5s, Lightweight, Deep learning

CLC Number: 

  • TP181
[1]CHANG Y M,ZHU X N,WANG L.Review on integratedscheduling of container terminal[J].Journal of Transportation Engineering,2019,12(1):136-146.
[2]DONG M W,HUANG L F,GU Y.Review on green job scheduling optimization of container terminals[J].Journal of Chongqing Jiaotong University(Natural Science Edition),2022,41(11):7-14.
[3]MI W J,ZHANG Z W,MI C.Study on container hanging holesrecognition algorithm based on machine vision[J].Chinese Journal of Construction Machinery,2016,14(5):399-402.
[4]HAO Y S,LU B,LIU F,et al.Key point smoothing tracking ofcontainer keyhole based on centernet[J].Journal of Control Engineering,2021,28(11):2108-2113.
[5]ZHANG J,DIAO Y F,CHENG W M,et al.Container keyholetracking and center positioning based on video stream[J].Journal of Computer Applications,2019,39(S2):216-220.
[6]KUNIMITSU S,ASAMA H,KAWABATA K,et al.Development of crane vision for positioning container[J].Journal of Robotics and Mechatronics,2004(2):16.
[7]MI C,WANG J,MI W,et al.Research on regional clustering and two-stage SVM method for container truck recognition[J].Discrete & Continuous Dynamical Systems,2018,12(4):1117-1133.
[8]JOCHER G,STOKEN A,BOROVEC J,et al.Ultralytics/yolov5:v3.1-Bug fixes and performance improvements(Version v3.1)[EB/OL].(2020-10-29)[2021-01-19].https://gitlab.com/ultralytics/yolov5/-/releases/v3.1.
[9]REDMON J,FARHADI A.YOLOv3:An incremental improvement[J].arXiv:1804.02767,2018.
[10]BOCHKOVSKIY A,WANG C Y,LIAO H Y M.YOLOv4:Optimal speed and accuracy of object detection[J].arXiv:2004.10934,2020.
[11]HOWARD A,SANDLER M,CHEN B,et al.Searching for mobilenetv3[C]//2019 IEEE/CVF International Conference on Computer Vision(ICCV).Seoul,Korea(South).New York:IEEE Press,2019:1314-1324.
[12]SIFRE L,MALLAT,STEPHANE.Rigid-Motion scattering for texture classification[J].arXiv:1403.1687,2014.
[13]HU J,SHEN L,ALBANIE S,et al.Squeeze-and-excitation networks[J].IEEE Transactions on Pattern Analysis And Machine Intelligence,2020,42(8):2011-2023.
[14]GLOROT X,BORDES A,BENGIO Y.Deep sparse rectifierneural networks[J].Journal of Machine Learning Research,2011,15:315-323.
[15]ZI B,YIN Z Q,LI Y C,et al.Fast mobile component location method for cable-driven parallel robots based on yolo model[J].Chinese Journal of Mechanical Engineering,2019,55(3):64-72.
[16]YANG Y,DENG H.GC-YOLOv3:you only look once withglobal context block[J].Electronics,2020,9(8):1235.
[17]WOO S,PARK J,LEE J Y,et al.CBAM:convolutional block attention module[C]//2018 15th European Conference on Computer Vision.Munich,Germany,2018:3-19.
[18]YANG L,ZHANG R Y,LI L,et al.SimAM:A simple parameter-free attention module for convolutional neural networks[C]//International Conference on Machine Learning.PMLR.2021.
[1] ZHANG Le, YU Ying, GE Hao. Mural Inpainting Based on Fast Fourier Convolution and Feature Pruning Coordinate Attention [J]. Computer Science, 2024, 51(6A): 230400083-9.
[2] WU Yibo, HAO Yingguang, WANG Hongyu. Rice Defect Segmentation Based on Dual-stream Convolutional Neural Networks [J]. Computer Science, 2024, 51(6A): 230600107-8.
[3] HOU Linhao, LIU Fan. Remote Sensing Image Fusion Combining Multi-scale Convolution Blocks and Dense Convolution Blocks [J]. Computer Science, 2024, 51(6A): 230400110-6.
[4] HUANG Yuanhang, BIAN Shan, WANG Chuntao. Gaussian Enhancement Module for Reinforcing High-frequency Details in Camera ModelIdentification [J]. Computer Science, 2024, 51(6A): 230700125-5.
[5] SUN Yang, DING Jianwei, ZHANG Qi, WEI Huiwen, TIAN Bowen. Study on Super-resolution Image Reconstruction Using Residual Feature Aggregation NetworkBased on Attention Mechanism [J]. Computer Science, 2024, 51(6A): 230600039-6.
[6] SHI Songhao, WANG Xiaodan, YANG Chunxiao, WANG Yifei. SAR Image Target Recognition Based on Cross Domain Few Shot Learning [J]. Computer Science, 2024, 51(6A): 230800136-7.
[7] HE Xinyu, LU Chenxin, FENG Shuyi, OUYANG Shangrong, MU Wentao. Ship Detection and Recognition of Optical Remote Sensing Images for Embedded Platform [J]. Computer Science, 2024, 51(6A): 230700117-7.
[8] HUANG Haixin, WU Di. Steel Defect Detection Based on Improved YOLOv7 [J]. Computer Science, 2024, 51(6A): 230800018-5.
[9] WANG Yingjie, ZHANG Chengye, BAI Fengbo, WANG Zumin. Named Entity Recognition Approach of Judicial Documents Based on Transformer [J]. Computer Science, 2024, 51(6A): 230500164-9.
[10] LIANG Fang, XU Xuyao, ZHAO Kailong, ZHAO Xuanfeng, ZHANG Guijun. Remote Template Detection Algorithm and Its Application in Protein Structure Prediction [J]. Computer Science, 2024, 51(6A): 230600225-7.
[11] PENG Bo, LI Yaodong, GONG Xianfu, LI Hao. Method for Entity Relation Extraction Based on Heterogeneous Graph Neural Networks and TextSemantic Enhancement [J]. Computer Science, 2024, 51(6A): 230700071-5.
[12] ZHANG Tianchi, LIU Yuxuan. Research Progress of Underwater Image Processing Based on Deep Learning [J]. Computer Science, 2024, 51(6A): 230400107-12.
[13] WANG Guogang, DONG Zhihao. Lightweight Image Semantic Segmentation Based on Attention Mechanism and Densely AdjacentPrediction [J]. Computer Science, 2024, 51(6A): 230300204-8.
[14] MENG Xiangfu, REN Quanying, YANG Dongshen, LI Keqian, YAO Keyu, ZHU Yan. Literature Classification of Individual Reports of Adverse Drug Reactions Based on BERT and CNN [J]. Computer Science, 2024, 51(6A): 230400049-6.
[15] ZHANG Lanxin, XIANG Ling, LI Xianze, CHEN Jinpeng. Intelligent Fault Diagnosis Method for Rolling Bearing Based on SAMNV3 [J]. Computer Science, 2024, 51(6A): 230700167-6.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!