Computer Science ›› 2024, Vol. 51 ›› Issue (11A): 240100003-6.doi: 10.11896/jsjkx.240100003

• Image Processing & Multimedia Technology • Previous Articles     Next Articles

PS YOLOv8:Enhancing Detection of Small-scale Damage in Power Lines Inspection

SONG Shangze1, LI Li1, TIAN Ye2, BAI Jie2   

  1. 1 Department of Electrical and Control Engineering,Shanxi Institute of Engineering and Technology,Yangquan,Shanxi 045000,China
    2 Department of Big Data and Intelligent Engineering,Shanxi Institute of Engineering and Technology,Yangquan,Shanxi 045000,China
  • Online:2024-11-16 Published:2024-11-13
  • About author:SONG Shangze,born in 2001,undergraduate.His main research interests include electrical engineering and artificial intelligence.
    LI Li,born in 1981,master,associate professor.Her main research interests include electrical engineering and electronic design.
  • Supported by:
    College Student Innovation and Entrepreneurship Training Program Project(202314527003).

Abstract: In the field of power line inspection,accurately detecting minute cracks and small damages,which are often overlooked due to their scale and background complexity,is crucial.If not identified and addressed timely,these minor damages can escalate into major safety hazards.To address this challenge,this paper introduces the PowerScreen-YOLOv8(PS-YOLOv8) model.Compared to the original YOLOv8,this model has made significant advancements in detecting small objects.It integrates six key improvements to enhance detection accuracy in complex environments.The model's superiority has been demonstrated through rigo-rous testing and benchmarking against leading algorithms.With an impressive accuracy rate of 90.3% and validated robustness in real-world drone-captured scenarios,PS-YOLOv8 represents a significant leap in power line inspection technology.It offers a more reliable,efficient,and safer approach to infrastructure maintenance.

Key words: Power inspection, YOLOv8, Small object detection, Deep learning

CLC Number: 

  • TP391
[1]LIU Z Y,ZHAO X D,QI H C,et al.Prospects of UAV Power Inspection Technology in the New Era [J].Southern Energy Construction,2019,6(4):1-5.
[2]TONG W G,YUAN J S,LI B S.A Review on the Application of Image Processing Technology in Helicopter Inspection of Transmission Lines [J].Power Grid Technology,2010,34(12):204-208.
[3]JIANG P,ERGU D,LIU F,et al.A Review of Yolo algorithm developments[J].Procedia Computer Science,2022,199:1066-1073.
[4]ABOAH A,WANG B,BAGCI U,et al.Real-time multi-class helmet violation detection using few-shot data sampling technique and yolov8[C]//Proceedings of the IEEE/CVF Confe-rence on Computer Vision and Pattern Recognition.2023:5349-5357.
[5]YUAN Y F,ZHOU Z C,ZHANG C,et al.Research on Lightweight Object Detection and Fault Recognition Methods for Power Inspection [J].Electric Power Information and Communication Technology,2022,20(8):29-37.
[6]XUE K T,SAVKINE J,GAO J L.Power Inspection Image Super-Resolution Reconstruction Algorithm Based on VDRCNN [J].Journal of Jilin University (Information Science Edition),2023,41(3):530-538.
[7]HU N,HUANG Z H.Power Tower Key Point Detection Based on Deep Learning [J].Science and Innovation,2022(7):69-74.
[8]HUANG W W,YUAN B,WANG B,et al.Unattended Power Inspection System Based on Image Fusion and H.265 [J].Mo-dern Electronic Technology,2022,45(6):131-136.
[9]ZHANG W H,ZHANG Z Z,XIE F g,et al.Research on Fault Recognition Algorithm for Photovoltaic Panels Based on SSD and Infrared Video [J].Computer Knowledge and Technology,2022,18(35):90-92.
[10]LIU Y,SUN P,WERGELES N,et al.A survey and performance evaluation of deep learning methods for small object detection[J].Expert Systems with Applications,2021,172:114602.
[11]QI Y,HE Y,QI X,et al.Dynamic Snake Convolution based on Topological Geometric Constraints for Tubular Structure Segmentation[C]//Proceedings of the IEEE/CVF International Conference on Computer Vision.2023:6070-6079.
[12]HAN K,XIAO A,WU E,et al.Transformer in transformer[J].Advances in Neural Information Processing Systems,2021,34:15908-15919.
[13]ZHU L,WANG X,KE Z,et al.BiFormer:Vision Transformer with Bi-Level Routing Attention[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.2023:10323-10333.
[14]MISRA D.Mish:A self regularized non-monotonic activationfunction[J].arXiv:1908.08681,2019.
[15]JOCHER G,STOKEN A,BOROVEC J,et al.ultralytics/yolov5:v4.0-nn.SiLU () activations,Weights & Biases logging,PyTorch Hub integration [EB/OL].https://github.com/ultralytics/yolov5.
[16]LI H,LI J,WEI H,et al.Slim-neck by GSConv:A better design paradigm of detector architectures for autonomous vehicles[J].arXiv:2206.02424,2022.
[17]TONG Z,CHEN Y,XU Z,et al.Wise-IoU:Bounding Box Regression Loss with Dynamic Focusing Mechanism[J].arXiv:2301.10051,2023.
[18]CHEN X,LIANG C,HUANG D,et al.Symbolic discovery of optimization algorithms[J].arXiv:2302.06675,2023.
[19]FAN Y L.Research on Deep Learning-based Foreign Object Detection Methods in Power Inspection Images [D].Hubei University of Technology,2020.
[20]LI B,QU L Y,ZHU X S,et al.Insulator Defect Detection Based on Multi-scale Feature Fusion [J].Transactions of Electrical Engineering,2023,38(1):60-70.
[21]KANG T A,WANG B L,LIU S H,et al.A Review on Deep Learning Detection Methods for Transmission Line Fittings and Their Defects [J].Electric Power Information and Communication Technology,2022,20(11):1-12.
[22]DING N N,HU X X,WU Y C,et al.Research on Deep Learning-based Detection Methods for External Force Damage to Transmission Lines [J].Software Engineering,2022,25(1):14-17.
[23]GU X D,TANG D H,HUANG X H.Defect Detection and Recognition in Power Grid Inspection Images Based on Deep Learning [J].Power System Protection and Control,2021,49(5):7.
[24]TAN M,PANG R,LE Q V.Efficientdet:Scalable and efficient object detection[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.2020:10781-10790.
[25]BENJUMEA A,TEETI I,CUZZOLIN F,et al.YOLO-Z:Improving small object detection in YOLOv5 for autonomous vehicles[J].arXiv:2112.11798,2021.
[26]WANG G,LIU Z,SUN H,et al.Yolox-BTFPN:An anchor-free conveyor belt damage detector with a biased feature extraction network[J].Measurement,2022,200:111675.
[27]ZHU X,SU W,LU L,et al.Deformable DETR:DeformableTransformers for End-to-End Object Detection[C]//International Conference on Learning Representations.2021.
[28]YE G,QU J,TAO J,et al.Autonomous surface crack identification of concrete structures based on the YOLOv7 algorithm[J].Journal of Building Engineering,2023,73:106688.
[29]YU H,YUN L,CHEN Z,et al.A Small Object Detection Algorithm Based on Modulated Deformable Convolution and Large Kernel Convolution[J/OL].Computational Intelligence and Neuroscience,2023.https://pubmed.ncbi.nlm.nih.gov/36733786/.
[30]LI K,WANG Y,HU Z.Improved YOLOv7 for Small Object Detection Algorithm Based on Attention and Dynamic Convolution[J].Applied Sciences,2023,13(16):9316.
[1] DU Yu, YU Zishu, PENG Xiaohui, XU Zhiwei. Padding Load:Load Reducing Cluster Resource Waste and Deep Learning Training Costs [J]. Computer Science, 2024, 51(9): 71-79.
[2] XU Jinlong, GUI Zhonghua, LI Jia'nan, LI Yingying, HAN Lin. FP8 Quantization and Inference Memory Optimization Based on MLIR [J]. Computer Science, 2024, 51(9): 112-120.
[3] SUN Yumo, LI Xinhang, ZHAO Wenjie, ZHU Li, LIANG Ya’nan. Driving Towards Intelligent Future:The Application of Deep Learning in Rail Transit Innovation [J]. Computer Science, 2024, 51(8): 1-10.
[4] KONG Lingchao, LIU Guozhu. Review of Outlier Detection Algorithms [J]. Computer Science, 2024, 51(8): 20-33.
[5] TANG Ruiqi, XIAO Ting, CHI Ziqiu, WANG Zhe. Few-shot Image Classification Based on Pseudo-label Dependence Enhancement and NoiseInterferenceReduction [J]. Computer Science, 2024, 51(8): 152-159.
[6] XIAO Xiao, BAI Zhengyao, LI Zekai, LIU Xuheng, DU Jiajin. Parallel Multi-scale with Attention Mechanism for Point Cloud Upsampling [J]. Computer Science, 2024, 51(8): 183-191.
[7] ZHANG Junsan, CHENG Ming, SHEN Xiuxuan, LIU Yuxue, WANG Leiquan. Diversified Label Matrix Based Medical Image Report Generation [J]. Computer Science, 2024, 51(8): 200-208.
[8] GUO Fangyuan, JI Genlin. Video Anomaly Detection Method Based on Dual Discriminators and Pseudo Video Generation [J]. Computer Science, 2024, 51(8): 217-223.
[9] CHEN Siyu, MA Hailong, ZHANG Jianhui. Encrypted Traffic Classification of CNN and BiGRU Based on Self-attention [J]. Computer Science, 2024, 51(8): 396-402.
[10] YANG Heng, LIU Qinrang, FAN Wang, PEI Xue, WEI Shuai, WANG Xuan. Study on Deep Learning Automatic Scheduling Optimization Based on Feature Importance [J]. Computer Science, 2024, 51(7): 22-28.
[11] LI Jiaying, LIANG Yudong, LI Shaoji, ZHANG Kunpeng, ZHANG Chao. Study on Algorithm of Depth Image Super-resolution Guided by High-frequency Information ofColor Images [J]. Computer Science, 2024, 51(7): 197-205.
[12] SHI Dianxi, GAO Yunqi, SONG Linna, LIU Zhe, ZHOU Chenlei, CHEN Ying. Deep-Init:Non Joint Initialization Method for Visual Inertial Odometry Based on Deep Learning [J]. Computer Science, 2024, 51(7): 327-336.
[13] FAN Yi, HU Tao, YI Peng. Host Anomaly Detection Framework Based on Multifaceted Information Fusion of SemanticFeatures for System Calls [J]. Computer Science, 2024, 51(7): 380-388.
[14] GAN Run, WEI Xianglin, WANG Chao, WANG Bin, WANG Min, FAN Jianhua. Backdoor Attack Method in Autoencoder End-to-End Communication System [J]. Computer Science, 2024, 51(7): 413-421.
[15] HUANG Haixin, CAI Mingqi, WANG Yuyao. Review of Point Cloud Semantic Segmentation Based on Graph Convolutional Neural Networks [J]. Computer Science, 2024, 51(6A): 230400196-7.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!