CN117197787A - Intelligent security inspection method, device, equipment and medium based on improved YOLOv5 - Google Patents
Intelligent security inspection method, device, equipment and medium based on improved YOLOv5 Download PDFInfo
- Publication number
- CN117197787A CN117197787A CN202310996175.1A CN202310996175A CN117197787A CN 117197787 A CN117197787 A CN 117197787A CN 202310996175 A CN202310996175 A CN 202310996175A CN 117197787 A CN117197787 A CN 117197787A
- Authority
- CN
- China
- Prior art keywords
- security inspection
- model
- improved
- data set
- ray
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000007689 inspection Methods 0.000 title claims abstract description 92
- 238000000034 method Methods 0.000 title claims abstract description 33
- 238000012549 training Methods 0.000 claims abstract description 36
- 238000001514 detection method Methods 0.000 claims abstract description 18
- 238000004590 computer program Methods 0.000 claims description 17
- 238000010586 diagram Methods 0.000 claims description 9
- 238000012545 processing Methods 0.000 claims description 9
- 238000003860 storage Methods 0.000 claims description 8
- 238000012795 verification Methods 0.000 claims description 8
- 238000002372 labelling Methods 0.000 claims description 7
- 238000000605 extraction Methods 0.000 claims description 5
- 238000005070 sampling Methods 0.000 claims description 5
- 238000005516 engineering process Methods 0.000 description 6
- 238000003384 imaging method Methods 0.000 description 3
- 230000001360 synchronised effect Effects 0.000 description 3
- 238000009826 distribution Methods 0.000 description 2
- 230000035515 penetration Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000007405 data analysis Methods 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 235000013399 edible fruits Nutrition 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 239000011344 liquid material Substances 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
- 238000011179 visual inspection Methods 0.000 description 1
Classifications
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02T—CLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
- Y02T10/00—Road transport of goods or passengers
- Y02T10/10—Internal combustion engine [ICE] based vehicles
- Y02T10/40—Engine management systems
Landscapes
- Analysing Materials By The Use Of Radiation (AREA)
Abstract
The application discloses an intelligent security inspection method, device, equipment and medium based on improved YOLOv 5. The method comprises the following steps of constructing an improved YOLOv5 model based on a Biformer attention module and a decoupling head, inputting a data set into the improved YOLOv5 model for training until the iteration times are reached or preset requirements are met, outputting an identification model and storing the identification model; and acquiring an X-ray security inspection image to be identified, inputting the X-ray security inspection image to be identified into an identification model, and outputting an identification result, wherein the identification result comprises position information and category information of contraband in the X-ray security inspection image. The application improves the detection speed and the detection accuracy of security inspection and reduces the cost of security inspection personnel for enterprises and units.
Description
Technical Field
The application relates to the technical field of image processing, in particular to an intelligent security inspection method, device, equipment and medium based on improved YOLOv 5.
Background
With the development of various public transportation technologies, the travel safety of passengers is also receiving extensive attention from the society. The security inspection is a firewall which is required to be arranged in order to protect the safety of passengers in the industry nowadays, but under the condition of more people flow, the traditional security inspection depends on manual work, the working strength of staff is high, unavoidable bottlenecks can occur in the inspection speed, the congestion of the staff in stations and airports is caused, the travel efficiency of the passengers is greatly influenced, and the hidden danger of omission inspection and false inspection also exists. If the target detection technology and the security inspection technology can be combined, the efficiency and the accuracy of detection can be improved, the labor cost is saved for airports and stations, and better travel experience is provided for passengers.
The existing security inspection technology mainly comprises the steps that security personnel carry out visual inspection, passengers place baggage on a conveyor belt of a security inspection machine, the baggage is waited to be sent into an X-ray detection area, the security inspection machine uses X-ray imaging for the baggage of the passengers to obtain an X-ray image of the baggage, and the security inspection personnel carry out visual identification and detection for the X-ray image of the baggage to judge whether contraband exists in the X-ray image of the baggage. The detection is completely dependent on manual work, the personnel culture cost is high, under the high-strength working condition, the detection efficiency has the bottleneck, the possibility of missed detection and false detection, and the high-efficiency and accurate detection under a small sample is difficult to realize by using the current model when the automatic security inspection is carried out based on the machine vision method.
Disclosure of Invention
In order to solve the technical problems, the intelligent security inspection method, device, equipment and medium based on the improved YOLOv5 are provided, so that the detection speed and the detection accuracy of security inspection can be improved, and the cost of security inspection personnel for enterprises and institutions is reduced.
In order to achieve the above purpose, the technical scheme of the application is as follows:
an intelligent security inspection method based on improved YOLOv5 comprises the following steps:
constructing an improved YOLOv5 model based on a Biformer attention module and a decoupling head, inputting a data set into the improved YOLOv5 model for training until the iteration number is reached or the preset requirement is met, outputting an identification model and storing the identification model;
and acquiring an X-ray security inspection image to be identified, inputting the X-ray security inspection image to be identified into an identification model, and outputting an identification result, wherein the identification result comprises position information and category information of contraband in the X-ray security inspection image.
Preferably, the training process further comprises the steps of:
and carrying out data enhancement processing on the data set by adopting a Mixup algorithm.
Preferably, the data set obtaining method includes the following steps:
collecting a plurality of X-ray security inspection images, and labeling the plurality of X-ray security inspection images;
and constructing a data set based on the marked X-ray security inspection image, wherein the data set comprises a training set and a verification set.
Preferably, the improved YOLOv5 model is based on a YOLOv5s model, and a Biformer attention module is introduced into a backbone network and is used for performing sparse sampling type feature extraction on contraband in an input image; and introducing a decoupling head into the detection head for respectively carrying out different convolution operations on the input characteristic diagrams.
Based on the above, the application also discloses an intelligent security inspection device based on improved YOLOv5 and based on improved YOLOv5, which comprises a training module and a security inspection identification module, wherein,
the training module is used for constructing an improved YOLOv5 model based on the Biformer attention module and the decoupling head, inputting a preset data set into the improved YOLOv5 model for training until the iteration times are reached or the preset requirements are met, outputting an identification model and storing the identification model;
the security inspection identification module is used for acquiring an X-ray security inspection image to be identified, inputting the X-ray security inspection image to be identified into the identification model, and outputting an identification result, wherein the identification result comprises position information and category information of contraband.
Preferably, the training module is further configured to perform data enhancement processing on the data set by adopting a mix up algorithm.
Preferably, the data set obtaining method includes the following steps:
collecting a plurality of X-ray security inspection images, and labeling the plurality of X-ray security inspection images;
and constructing a data set based on the marked X-ray security inspection image, wherein the data set comprises a training set and a verification set.
Preferably, the improved YOLOv5 model is based on a YOLOv5s model, and a Biformer attention module is introduced into a backbone network and is used for performing sparse sampling type feature extraction on contraband in an input image; and introducing a decoupling head into the detection head for respectively carrying out different convolution operations on the input characteristic diagrams.
Based on the above, the present application also discloses a computer device, including: a memory for storing a computer program; a processor for implementing a method as claimed in any one of the preceding claims when executing the computer program.
Based on the foregoing, the present application also discloses a readable storage medium having stored thereon a computer program which, when executed by a processor, implements a method as described in any of the above.
Based on the technical scheme, the application has the beneficial effects that: an improved YOLOv5 model based on a BiFormer attention module and a decoupling head is constructed based on an intelligent security inspection method of the improved YOLOv5, a data set is input into the improved YOLOv5 model for training until the iteration times are reached or preset requirements are met, and an identification model is output and stored; the method comprises the steps of obtaining an X-ray security inspection image to be identified, inputting the X-ray security inspection image to be identified into an identification model, and outputting an identification result, wherein the identification result comprises position information and category information of contraband articles in the X-ray security inspection image, and can accurately identify the contraband articles such as tools, lighters, charging treasures and the like in the X-ray image. The application can clearly obtain the position information and the category information of the contraband, and is convenient for security check personnel to carry out unpacking check work on the luggage.
Drawings
FIG. 1 is a schematic illustration of an application environment of an intelligent security method based on improved YOLOv5 in one embodiment;
FIG. 2 is a flow diagram of an intelligent security method based on improved YOLOv5 in one embodiment;
FIG. 3 is a schematic diagram of the structure of an improved YOLOv5 model in one embodiment;
FIG. 4 is a schematic diagram of the structure of an intelligent security apparatus based on improved YOLOv5 in one embodiment;
FIG. 5 is an internal block diagram of a computer device in one embodiment.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present application.
The intelligent security inspection method based on the improved YOLOv5 provided by the embodiment of the application can be applied to an application environment shown in figure 1. As shown in FIG. 1, the application environment includes a computer device 110. The computer device 110 may construct an improved YOLOv5 model based on the BiFormer attention module and the decoupling head, input the dataset into the improved YOLOv5 model for training until the number of iterations is reached or the preset requirement is met, output the recognition model and save; the computer device 110 may acquire an X-ray security image to be identified and input the X-ray security image to be identified into an identification model, and output an identification result, where the identification result includes location information and category information of contraband in the X-ray security image. The computer device 110 may be, but is not limited to, a security check machine, various personal computers, notebook computers, smart phones, robots, unmanned aerial vehicles, tablet computers, and the like.
In one embodiment, as shown in fig. 2, an improved YOLOv 5-based intelligent security method is provided, comprising the steps of:
step 210, constructing an improved YOLOv5 model based on a Biformer attention module and a decoupling head, inputting a data set into the improved YOLOv5 model for training until the iteration times are reached or preset requirements are met, outputting an identification model and storing the identification model.
The computer device can build an improved YOLOv5 model based on the bifomer attention mechanism module and the Dcoupled decoupling head. The improved YOLOv5 model is based on the YOLOv5s model, a BiFormer attention mechanism is introduced, sparse sampling type feature extraction is carried out on contraband, a target area with the contraband as the center is strengthened and highlighted, a directed graph of the relevant area is constructed, and the recognition capability of the model to small targets is improved; the tasks of classification and positioning in the model identification are separated by the decomplexed decoupling heads, different convolution operations are respectively carried out on the feature graphs input by the upper network to highlight the features required by the respective tasks, so that different tasks are served, and the model reasoning confidence and positioning accuracy are improved, as shown in fig. 3.
The security inspection X-ray contraband images are of 12 types in total and are respectively a pistol, a fruit knife, a blade, a screwdriver, scissors, a liquid material, pliers, a lighter, a spanner, a mobile power supply, a hammer and a fork. The computer device can acquire X-ray contraband images or X-ray imaging generated by security inspection machine histories aiming at the detected object from the website, and the images are marked to construct a data set. Training the improved YOLOv5 model based on the data set until the iteration times are reached or the preset requirements are met, and obtaining an identification model for security inspection contraband identification.
Step 220, acquiring an X-ray security inspection image to be identified, inputting the X-ray security inspection image to be identified into an identification model, and outputting an identification result, wherein the identification result comprises position information and category information of contraband in the X-ray security inspection image.
In the embodiment, the identification model is embedded in security inspection equipment such as a security inspection machine, after the security inspection machine performs X-ray imaging on a detected object, one image is intercepted and input into the identification model, synchronous detection and identification are performed on the obtained image, the position of contraband and class information thereof are highlighted by a square frame, and the result is output on a monitor for workers to perform next inspection work.
In one embodiment, a training process based on the intelligent security inspection method of improved YOLOv5 is also provided, and specifically includes the following steps: and carrying out data enhancement processing on the data set by adopting a Mixup algorithm.
According to the embodiment, a Mixup data enhancement technology is adopted, two pictures can be mixed in proportion, the penetration characteristic of an X-ray picture is simulated, the distribution situation of contraband of model training is expanded, and the recognition capability of images is enhanced.
The competition data set of the challenge competition is identified by using the X-ray security check image held by the scientific mass-information flyer in 2020 for training and testing, and the comparison with the original model is shown in a table-1.
Table-1 comparison of effects before and after improvement
Scheme for the production of a semiconductor device | Precision | Recall | [email protected] | [email protected]:.95 |
Yolov5 | 0.811 | 0.629 | 0.705 | 0.489 |
Improved YOLOv5 | 0.832 | 0.679 | 0.742 | 0.509 |
Precision (Precision), recall (Recall), and average Precision (mAP) were used as evaluation indexes for improving the YOLOv5 model. According to experimental data analysis, the improved Yolov5 and the original model Yolov5 are obviously improved in Precision, recall, mAP@5 and mAP@5:95 indexes.
In one embodiment, a process for providing a data set acquisition mode in the intelligent security inspection method based on improved YOLOv5 is further provided, which specifically includes the following steps: collecting a plurality of X-ray security inspection images, and labeling the plurality of X-ray security inspection images; and constructing a data set based on the marked X-ray security inspection image, wherein the data set comprises a training set and a verification set.
As shown in fig. 4, in one embodiment, an improved YOLOv 5-based intelligent security apparatus 300 is provided that is based on improved YOLOv5, including a training module 310 and a security identification module 320, wherein,
the training module 310 is configured to construct an improved YOLOv5 model based on the BiFormer attention module and the decoupling head, input a preset data set into the improved YOLOv5 model for training until the iteration number is reached or the preset requirement is met, output an identification model and store the identification model;
the security inspection identification module 320 is configured to obtain an X-ray security inspection image to be identified, input the X-ray security inspection image to be identified into an identification model, and output an identification result, where the identification result includes location information and category information of contraband.
In one embodiment, the training module 310 is further configured to perform data enhancement processing on the data set using a mix up algorithm. By adopting the Mixup data enhancement technology, two pictures can be mixed in proportion, the penetration characteristic of an X-ray picture is simulated, the distribution situation of contraband of model training is expanded, and the recognition capability of images is enhanced.
In one embodiment, the training module 310 is further configured to collect a plurality of X-ray security images and label the plurality of X-ray security images; and constructing a data set based on the marked X-ray security inspection image, wherein the data set comprises a training set and a verification set.
In one embodiment, a computer device is provided, which may be a terminal, and the internal structure of which may be as shown in fig. 5. The computer device includes a processor, a memory, a network interface, a display screen, and an input device connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program, when executed by a processor, implements an improved YOLOv 5-based intelligent security method. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, can also be keys, a track ball or a touch pad arranged on the shell of the computer equipment, and can also be an external keyboard, a touch pad or a mouse and the like.
It will be appreciated by those skilled in the art that the structure shown in FIG. 5 is merely a block diagram of some of the structures associated with the present inventive arrangements and is not limiting of the computer device to which the present inventive arrangements may be applied, and that a particular computer device may include more or fewer components than shown, or may combine some of the components, or have a different arrangement of components.
In one embodiment, a computer device is provided comprising a memory and a processor, the memory having stored therein a computer program, the processor when executing the computer program performing the steps of:
constructing an improved YOLOv5 model based on a Biformer attention module and a decoupling head, inputting a data set into the improved YOLOv5 model for training until the iteration number is reached or the preset requirement is met, outputting an identification model and storing the identification model;
and acquiring an X-ray security inspection image to be identified, inputting the X-ray security inspection image to be identified into an identification model, and outputting an identification result, wherein the identification result comprises position information and category information of contraband in the X-ray security inspection image.
In one embodiment, the processor when executing the computer program further performs the steps of: and carrying out data enhancement processing on the data set by adopting a Mixup algorithm.
In one embodiment, the processor when executing the computer program further performs the steps of: collecting a plurality of X-ray security inspection images, and labeling the plurality of X-ray security inspection images; and constructing a data set based on the marked X-ray security inspection image, wherein the data set comprises a training set and a verification set.
In one embodiment, a computer readable storage medium is provided having a computer program stored thereon, which when executed by a processor, performs the steps of:
constructing an improved YOLOv5 model based on a Biformer attention module and a decoupling head, inputting a data set into the improved YOLOv5 model for training until the iteration number is reached or the preset requirement is met, outputting an identification model and storing the identification model;
and acquiring an X-ray security inspection image to be identified, inputting the X-ray security inspection image to be identified into an identification model, and outputting an identification result, wherein the identification result comprises position information and category information of contraband in the X-ray security inspection image.
In one embodiment, the computer program when executed by the processor further performs the steps of: and carrying out data enhancement processing on the data set by adopting a Mixup algorithm.
In one embodiment, the computer program when executed by the processor further performs the steps of: collecting a plurality of X-ray security inspection images, and labeling the plurality of X-ray security inspection images; and constructing a data set based on the marked X-ray security inspection image, wherein the data set comprises a training set and a verification set.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in embodiments provided herein may include non-volatile and/or volatile memory. The nonvolatile memory can include Read Only Memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), memory bus direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), among others.
The technical features of the above embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The above examples illustrate only a few embodiments of the application, which are described in detail and are not to be construed as limiting the scope of the application. It should be noted that it will be apparent to those skilled in the art that several variations and modifications can be made without departing from the spirit of the application, which are all within the scope of the application. Accordingly, the scope of protection of the present application is to be determined by the appended claims.
Claims (10)
1. The intelligent security inspection method based on the improved YOLOv5 is characterized by comprising the following steps of:
constructing an improved YOLOv5 model based on a Biformer attention module and a decoupling head, inputting a data set into the improved YOLOv5 model for training until the iteration number is reached or the preset requirement is met, outputting an identification model and storing the identification model;
and acquiring an X-ray security inspection image to be identified, inputting the X-ray security inspection image to be identified into an identification model, and outputting an identification result, wherein the identification result comprises position information and category information of contraband in the X-ray security inspection image.
2. The improved YOLOv 5-based intelligent security method of claim 1, wherein the training process further comprises the steps of:
and carrying out data enhancement processing on the data set by adopting a Mixup algorithm.
3. The intelligent security inspection method based on improved YOLOv5 of claim 2, wherein the data set acquisition mode comprises the following steps:
collecting a plurality of X-ray security inspection images, and labeling the plurality of X-ray security inspection images;
and constructing a data set based on the marked X-ray security inspection image, wherein the data set comprises a training set and a verification set.
4. The intelligent security inspection method based on improved YOLOv5 of claim 3, wherein the improved YOLOv5 model is based on YOLOv5s model, and a bifomer attention module is introduced into a backbone network for sparse sampling feature extraction of contraband in an input image; and introducing a decoupling head into the detection head for respectively carrying out different convolution operations on the input characteristic diagrams.
5. The intelligent security inspection device based on the improved YOLOv5 is characterized by comprising a training module and a security inspection identification module, wherein,
the training module is used for constructing an improved YOLOv5 model based on the Biformer attention module and the decoupling head, inputting a preset data set into the improved YOLOv5 model for training until the iteration times are reached or the preset requirements are met, outputting an identification model and storing the identification model;
the security inspection identification module is used for acquiring an X-ray security inspection image to be identified, inputting the X-ray security inspection image to be identified into the identification model, and outputting an identification result, wherein the identification result comprises position information and category information of contraband.
6. The improved YOLOv 5-based intelligent security apparatus of claim 5, wherein the training module is further configured to perform data enhancement processing on the data set using a mix up algorithm.
7. The intelligent security apparatus based on improved YOLOv5 of claim 6, wherein the data set acquisition mode comprises the following steps:
collecting a plurality of X-ray security inspection images, and labeling the plurality of X-ray security inspection images;
and constructing a data set based on the marked X-ray security inspection image, wherein the data set comprises a training set and a verification set.
8. The intelligent security inspection device based on improved YOLOv5 of claim 6, wherein the improved YOLOv5 model is based on YOLOv5s model, and a bifomer attention module is introduced into a backbone network for sparse sampling feature extraction of contraband in an input image; and introducing a decoupling head into the detection head for respectively carrying out different convolution operations on the input characteristic diagrams.
9. A computer device, comprising: a memory for storing a computer program; a processor for implementing the method according to any one of claims 1 to 4 when executing the computer program.
10. A readable storage medium, characterized in that it has stored thereon a computer program which, when executed by a processor, implements the method according to any of claims 1 to 4.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310996175.1A CN117197787A (en) | 2023-08-09 | 2023-08-09 | Intelligent security inspection method, device, equipment and medium based on improved YOLOv5 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310996175.1A CN117197787A (en) | 2023-08-09 | 2023-08-09 | Intelligent security inspection method, device, equipment and medium based on improved YOLOv5 |
Publications (1)
Publication Number | Publication Date |
---|---|
CN117197787A true CN117197787A (en) | 2023-12-08 |
Family
ID=88993194
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310996175.1A Pending CN117197787A (en) | 2023-08-09 | 2023-08-09 | Intelligent security inspection method, device, equipment and medium based on improved YOLOv5 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN117197787A (en) |
Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110543857A (en) * | 2019-09-05 | 2019-12-06 | 安徽启新明智科技有限公司 | Contraband identification method, device and system based on image analysis and storage medium |
US20190391080A1 (en) * | 2016-12-08 | 2019-12-26 | Nuctech Company Limited | Non-contact type security inspection system and method |
WO2020187077A1 (en) * | 2019-03-21 | 2020-09-24 | 长安大学 | Deep neural network-based security check system and method |
CN112766344A (en) * | 2021-01-12 | 2021-05-07 | 南京信息工程大学 | Improved contraband detection method based on YOLOv5 optimizer |
CN114821154A (en) * | 2022-03-28 | 2022-07-29 | 浙江大学 | Grain depot ventilation window state detection algorithm based on deep learning |
CN114862837A (en) * | 2022-06-02 | 2022-08-05 | 西京学院 | Human body security check image detection method and system based on improved YOLOv5s |
CN115035088A (en) * | 2022-06-28 | 2022-09-09 | 中国石油大学(华东) | Helmet wearing detection method based on yolov5 and posture estimation |
CN115187842A (en) * | 2022-07-13 | 2022-10-14 | 南京大学 | Target detection method of passive terahertz security inspection image based on mode conversion |
CN115272204A (en) * | 2022-07-15 | 2022-11-01 | 中国石油大学(华东) | Bearing surface scratch detection method based on machine vision |
CN115359345A (en) * | 2022-09-16 | 2022-11-18 | 湖南苏科智能科技有限公司 | Different-class meta-learning-based overlapped object identification method under X-ray |
CN115423743A (en) * | 2022-07-21 | 2022-12-02 | 韶关学院 | Hot-rolled strip steel surface defect detection method based on improved YOLOv5 |
CN115457415A (en) * | 2022-09-19 | 2022-12-09 | 云南电网有限责任公司电力科学研究院 | Target detection method and device based on YOLO-X model, electronic equipment and storage medium |
CN115861956A (en) * | 2022-12-23 | 2023-03-28 | 合肥工业大学 | Yolov3 road garbage detection method based on decoupling head |
CN116342894A (en) * | 2023-05-29 | 2023-06-27 | 南昌工程学院 | GIS infrared feature recognition system and method based on improved YOLOv5 |
CN116468663A (en) * | 2023-03-14 | 2023-07-21 | 重庆邮电大学 | Method for detecting surface micro defects based on improved YOLOv5 |
-
2023
- 2023-08-09 CN CN202310996175.1A patent/CN117197787A/en active Pending
Patent Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20190391080A1 (en) * | 2016-12-08 | 2019-12-26 | Nuctech Company Limited | Non-contact type security inspection system and method |
WO2020187077A1 (en) * | 2019-03-21 | 2020-09-24 | 长安大学 | Deep neural network-based security check system and method |
CN110543857A (en) * | 2019-09-05 | 2019-12-06 | 安徽启新明智科技有限公司 | Contraband identification method, device and system based on image analysis and storage medium |
CN112766344A (en) * | 2021-01-12 | 2021-05-07 | 南京信息工程大学 | Improved contraband detection method based on YOLOv5 optimizer |
CN114821154A (en) * | 2022-03-28 | 2022-07-29 | 浙江大学 | Grain depot ventilation window state detection algorithm based on deep learning |
CN114862837A (en) * | 2022-06-02 | 2022-08-05 | 西京学院 | Human body security check image detection method and system based on improved YOLOv5s |
CN115035088A (en) * | 2022-06-28 | 2022-09-09 | 中国石油大学(华东) | Helmet wearing detection method based on yolov5 and posture estimation |
CN115187842A (en) * | 2022-07-13 | 2022-10-14 | 南京大学 | Target detection method of passive terahertz security inspection image based on mode conversion |
CN115272204A (en) * | 2022-07-15 | 2022-11-01 | 中国石油大学(华东) | Bearing surface scratch detection method based on machine vision |
CN115423743A (en) * | 2022-07-21 | 2022-12-02 | 韶关学院 | Hot-rolled strip steel surface defect detection method based on improved YOLOv5 |
CN115359345A (en) * | 2022-09-16 | 2022-11-18 | 湖南苏科智能科技有限公司 | Different-class meta-learning-based overlapped object identification method under X-ray |
CN115457415A (en) * | 2022-09-19 | 2022-12-09 | 云南电网有限责任公司电力科学研究院 | Target detection method and device based on YOLO-X model, electronic equipment and storage medium |
CN115861956A (en) * | 2022-12-23 | 2023-03-28 | 合肥工业大学 | Yolov3 road garbage detection method based on decoupling head |
CN116468663A (en) * | 2023-03-14 | 2023-07-21 | 重庆邮电大学 | Method for detecting surface micro defects based on improved YOLOv5 |
CN116342894A (en) * | 2023-05-29 | 2023-06-27 | 南昌工程学院 | GIS infrared feature recognition system and method based on improved YOLOv5 |
Non-Patent Citations (3)
Title |
---|
JING ZHANG等: "A Lightweight Crop Pest Detection Algorithm Based on Improved Yolov5s", 《AGRONOMY》, 30 June 2023 (2023-06-30), pages 1 - 23 * |
QI WANG等: "YOLOv5 UAV Detection Algorithm Based on Attention Mechanism", 《2023 5TH INTERNATIONAL ON ARTIFICIAL INTELLIGENCE TECHNOLOGIES AND APPLICATION》, 2 July 2023 (2023-07-02), pages 1 - 5 * |
樊新川等: "基于YOLO 框架的轻量化高精度目标检测算法", 《液晶与显示》, vol. 38, no. 7, 15 July 2023 (2023-07-15), pages 945 - 953 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110390269B (en) | PDF document table extraction method, device, equipment and computer readable storage medium | |
Li et al. | Simultaneously detecting and counting dense vehicles from drone images | |
CN110580475A (en) | line diagnosis method based on unmanned aerial vehicle inspection, electronic device and storage medium | |
CN111860510B (en) | X-ray image target detection method and device | |
CN110049121B (en) | Data center inspection system based on augmented reality technology | |
CN111127452A (en) | Container intelligent OCR recognition method based on cloud processing | |
CN116167596B (en) | Distribution path analysis method and system based on big data | |
CN110633751A (en) | Training method of car logo classification model, car logo identification method, device and equipment | |
Kim et al. | SHOMY: Detection of Small Hazardous Objects using the You Only Look Once Algorithm. | |
CN110717449A (en) | Vehicle annual inspection personnel behavior detection method and device and computer equipment | |
CN114972880A (en) | Label identification method and device, electronic equipment and storage medium | |
CN112308069A (en) | Click test method, device, equipment and storage medium for software interface | |
CN103235791B (en) | A kind of fingerprint matching optimum position method based on rank | |
CN117197787A (en) | Intelligent security inspection method, device, equipment and medium based on improved YOLOv5 | |
CN115757075A (en) | Task abnormity detection method and device, computer equipment and storage medium | |
Liu et al. | A Lightweight Dangerous Liquid Detection Method Based on Depthwise Separable Convolution for X‐Ray Security Inspection | |
CN114782411A (en) | Hazardous article identification method and identification system based on neural network | |
CN114155471A (en) | Design drawing and object verification method, device, computer equipment and system | |
CN115389532A (en) | Article safety inspection method and device, computer equipment and storage medium | |
CN112257525A (en) | Logistics vehicle card punching identification method, device, equipment and storage medium | |
CN106327080A (en) | Damage assessment request scheduling method and damage assessment request scheduling system based on multiple queues | |
CN113706503B (en) | Whole vehicle point cloud image analysis method, device, equipment and storage medium | |
Binomairah et al. | Detection of microcracks and dark spots in monocrystalline PERC cells using photoluminescene imaging and YOLO-based CNN with spatial pyramid pooling | |
CN104537442A (en) | Spatio-temporal data user social connection strength predicating method | |
CN117058432B (en) | Image duplicate checking method and device, electronic equipment and readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |