Computer Science ›› 2024, Vol. 51 ›› Issue (11A): 240100003-6.doi: 10.11896/jsjkx.240100003
• Image Processing & Multimedia Technology • Previous Articles Next Articles
SONG Shangze1, LI Li1, TIAN Ye2, BAI Jie2
CLC Number:
[1]LIU Z Y,ZHAO X D,QI H C,et al.Prospects of UAV Power Inspection Technology in the New Era [J].Southern Energy Construction,2019,6(4):1-5. [2]TONG W G,YUAN J S,LI B S.A Review on the Application of Image Processing Technology in Helicopter Inspection of Transmission Lines [J].Power Grid Technology,2010,34(12):204-208. [3]JIANG P,ERGU D,LIU F,et al.A Review of Yolo algorithm developments[J].Procedia Computer Science,2022,199:1066-1073. [4]ABOAH A,WANG B,BAGCI U,et al.Real-time multi-class helmet violation detection using few-shot data sampling technique and yolov8[C]//Proceedings of the IEEE/CVF Confe-rence on Computer Vision and Pattern Recognition.2023:5349-5357. [5]YUAN Y F,ZHOU Z C,ZHANG C,et al.Research on Lightweight Object Detection and Fault Recognition Methods for Power Inspection [J].Electric Power Information and Communication Technology,2022,20(8):29-37. [6]XUE K T,SAVKINE J,GAO J L.Power Inspection Image Super-Resolution Reconstruction Algorithm Based on VDRCNN [J].Journal of Jilin University (Information Science Edition),2023,41(3):530-538. [7]HU N,HUANG Z H.Power Tower Key Point Detection Based on Deep Learning [J].Science and Innovation,2022(7):69-74. [8]HUANG W W,YUAN B,WANG B,et al.Unattended Power Inspection System Based on Image Fusion and H.265 [J].Mo-dern Electronic Technology,2022,45(6):131-136. [9]ZHANG W H,ZHANG Z Z,XIE F g,et al.Research on Fault Recognition Algorithm for Photovoltaic Panels Based on SSD and Infrared Video [J].Computer Knowledge and Technology,2022,18(35):90-92. [10]LIU Y,SUN P,WERGELES N,et al.A survey and performance evaluation of deep learning methods for small object detection[J].Expert Systems with Applications,2021,172:114602. [11]QI Y,HE Y,QI X,et al.Dynamic Snake Convolution based on Topological Geometric Constraints for Tubular Structure Segmentation[C]//Proceedings of the IEEE/CVF International Conference on Computer Vision.2023:6070-6079. [12]HAN K,XIAO A,WU E,et al.Transformer in transformer[J].Advances in Neural Information Processing Systems,2021,34:15908-15919. [13]ZHU L,WANG X,KE Z,et al.BiFormer:Vision Transformer with Bi-Level Routing Attention[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.2023:10323-10333. [14]MISRA D.Mish:A self regularized non-monotonic activationfunction[J].arXiv:1908.08681,2019. [15]JOCHER G,STOKEN A,BOROVEC J,et al.ultralytics/yolov5:v4.0-nn.SiLU () activations,Weights & Biases logging,PyTorch Hub integration [EB/OL].https://github.com/ultralytics/yolov5. [16]LI H,LI J,WEI H,et al.Slim-neck by GSConv:A better design paradigm of detector architectures for autonomous vehicles[J].arXiv:2206.02424,2022. [17]TONG Z,CHEN Y,XU Z,et al.Wise-IoU:Bounding Box Regression Loss with Dynamic Focusing Mechanism[J].arXiv:2301.10051,2023. [18]CHEN X,LIANG C,HUANG D,et al.Symbolic discovery of optimization algorithms[J].arXiv:2302.06675,2023. [19]FAN Y L.Research on Deep Learning-based Foreign Object Detection Methods in Power Inspection Images [D].Hubei University of Technology,2020. [20]LI B,QU L Y,ZHU X S,et al.Insulator Defect Detection Based on Multi-scale Feature Fusion [J].Transactions of Electrical Engineering,2023,38(1):60-70. [21]KANG T A,WANG B L,LIU S H,et al.A Review on Deep Learning Detection Methods for Transmission Line Fittings and Their Defects [J].Electric Power Information and Communication Technology,2022,20(11):1-12. [22]DING N N,HU X X,WU Y C,et al.Research on Deep Learning-based Detection Methods for External Force Damage to Transmission Lines [J].Software Engineering,2022,25(1):14-17. [23]GU X D,TANG D H,HUANG X H.Defect Detection and Recognition in Power Grid Inspection Images Based on Deep Learning [J].Power System Protection and Control,2021,49(5):7. [24]TAN M,PANG R,LE Q V.Efficientdet:Scalable and efficient object detection[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.2020:10781-10790. [25]BENJUMEA A,TEETI I,CUZZOLIN F,et al.YOLO-Z:Improving small object detection in YOLOv5 for autonomous vehicles[J].arXiv:2112.11798,2021. [26]WANG G,LIU Z,SUN H,et al.Yolox-BTFPN:An anchor-free conveyor belt damage detector with a biased feature extraction network[J].Measurement,2022,200:111675. [27]ZHU X,SU W,LU L,et al.Deformable DETR:DeformableTransformers for End-to-End Object Detection[C]//International Conference on Learning Representations.2021. [28]YE G,QU J,TAO J,et al.Autonomous surface crack identification of concrete structures based on the YOLOv7 algorithm[J].Journal of Building Engineering,2023,73:106688. [29]YU H,YUN L,CHEN Z,et al.A Small Object Detection Algorithm Based on Modulated Deformable Convolution and Large Kernel Convolution[J/OL].Computational Intelligence and Neuroscience,2023.https://pubmed.ncbi.nlm.nih.gov/36733786/. [30]LI K,WANG Y,HU Z.Improved YOLOv7 for Small Object Detection Algorithm Based on Attention and Dynamic Convolution[J].Applied Sciences,2023,13(16):9316. |
[1] | DU Yu, YU Zishu, PENG Xiaohui, XU Zhiwei. Padding Load:Load Reducing Cluster Resource Waste and Deep Learning Training Costs [J]. Computer Science, 2024, 51(9): 71-79. |
[2] | XU Jinlong, GUI Zhonghua, LI Jia'nan, LI Yingying, HAN Lin. FP8 Quantization and Inference Memory Optimization Based on MLIR [J]. Computer Science, 2024, 51(9): 112-120. |
[3] | SUN Yumo, LI Xinhang, ZHAO Wenjie, ZHU Li, LIANG Ya’nan. Driving Towards Intelligent Future:The Application of Deep Learning in Rail Transit Innovation [J]. Computer Science, 2024, 51(8): 1-10. |
[4] | KONG Lingchao, LIU Guozhu. Review of Outlier Detection Algorithms [J]. Computer Science, 2024, 51(8): 20-33. |
[5] | TANG Ruiqi, XIAO Ting, CHI Ziqiu, WANG Zhe. Few-shot Image Classification Based on Pseudo-label Dependence Enhancement and NoiseInterferenceReduction [J]. Computer Science, 2024, 51(8): 152-159. |
[6] | XIAO Xiao, BAI Zhengyao, LI Zekai, LIU Xuheng, DU Jiajin. Parallel Multi-scale with Attention Mechanism for Point Cloud Upsampling [J]. Computer Science, 2024, 51(8): 183-191. |
[7] | ZHANG Junsan, CHENG Ming, SHEN Xiuxuan, LIU Yuxue, WANG Leiquan. Diversified Label Matrix Based Medical Image Report Generation [J]. Computer Science, 2024, 51(8): 200-208. |
[8] | GUO Fangyuan, JI Genlin. Video Anomaly Detection Method Based on Dual Discriminators and Pseudo Video Generation [J]. Computer Science, 2024, 51(8): 217-223. |
[9] | CHEN Siyu, MA Hailong, ZHANG Jianhui. Encrypted Traffic Classification of CNN and BiGRU Based on Self-attention [J]. Computer Science, 2024, 51(8): 396-402. |
[10] | YANG Heng, LIU Qinrang, FAN Wang, PEI Xue, WEI Shuai, WANG Xuan. Study on Deep Learning Automatic Scheduling Optimization Based on Feature Importance [J]. Computer Science, 2024, 51(7): 22-28. |
[11] | LI Jiaying, LIANG Yudong, LI Shaoji, ZHANG Kunpeng, ZHANG Chao. Study on Algorithm of Depth Image Super-resolution Guided by High-frequency Information ofColor Images [J]. Computer Science, 2024, 51(7): 197-205. |
[12] | SHI Dianxi, GAO Yunqi, SONG Linna, LIU Zhe, ZHOU Chenlei, CHEN Ying. Deep-Init:Non Joint Initialization Method for Visual Inertial Odometry Based on Deep Learning [J]. Computer Science, 2024, 51(7): 327-336. |
[13] | FAN Yi, HU Tao, YI Peng. Host Anomaly Detection Framework Based on Multifaceted Information Fusion of SemanticFeatures for System Calls [J]. Computer Science, 2024, 51(7): 380-388. |
[14] | GAN Run, WEI Xianglin, WANG Chao, WANG Bin, WANG Min, FAN Jianhua. Backdoor Attack Method in Autoencoder End-to-End Communication System [J]. Computer Science, 2024, 51(7): 413-421. |
[15] | HUANG Haixin, CAI Mingqi, WANG Yuyao. Review of Point Cloud Semantic Segmentation Based on Graph Convolutional Neural Networks [J]. Computer Science, 2024, 51(6A): 230400196-7. |
|