The whole process of deploying yolov to iPhone or terminal practice
The long-awaited detection classic has another wave of attacks - YOLOv5. Among them, YOLOv5 does not have complete files. The most important thing now is to figure out YOLOv4, which will benefit a lot in the field of target detection and can be highly improved in certain scenarios. Today we will analyze YOLOv4 for you. In the next issue, we will practice deploying YOLOv5 to Apple mobile phones or detect it in real time through the camera on the terminal!
1. Technology Review
There are a large number of features that are considered to improve the accuracy of convolutional neural networks (CNN). Combinations of these features need to be practically tested on large datasets and the results theoretically validated. Some functions operate only on certain models, on certain problems, or on small datasets; while some functions, such as batch normalization and residual joins, work on most Models, tasks, and datasets. This paper assumes that these common features include weighted residual connections (WRC), cross-stage connections (CSP), cross-minibatch normalization (CMbN), self-adversarial training (SAT), and Mish activation. This paper uses new features: WRC, CSP, CMbN, SAT, error activation, mosaic data augmentation, CMbN, DropBlock regularization and CIoU loss, and combines some of them to achieve the following effect: 43.5% AP (65.7% AP50), using MS+COCO dataset, real-time speed of 65 FPS on Tesla V100.
2. Innovation point analysis
Mosaic data enhancement
Putting four pictures into one picture for training is equivalent to increasing the mini-batch in disguise. This is an improvement based on CutMix mixing two pictures;
Self-Adversarial Training
On a picture, let the neural network update the picture in reverse, make changes and perturbations to the picture, and then train on this picture. This method is the main method of image stylization, allowing the network to reversely update the image to stylize the image.
Self-Adversarial Training (SAT) also represents a new data augmentation technique that operates in 2 forward backward stages. In the 1st stage the neural network alters the original image instead of the network weights . In this way the neural network executes an adversarial attack on itself, altering the original image to create the deception that there is no desired object on the image. In the 2nd stage, the neural network is trained to detect an object on this modified image in the normal way.
Cross mini-batch Normal
CmBN means CBN modification The version, as shown in the figure below, is defined as Cross mini-Batch Normalization (CMBN). This only collects statistics between the smallest batches within a single batch.
modify SAM
##From SAM's space-by-space attention to point-by-point attention; The modified PAN changes the channel from addition (add) to concat.
Experiment
Take the data enhancement method as an example. Although it increases the training time, it can make the model generalize. Better performance and robustness. For example, the following common enhancement methods:
- Image disturbance,
- Change brightness, contrast, saturation, hue
- Add noise
- Random scaling
- Random crop
- Flip
- Rotation
- Random erase
- Cutout
- MixUp
- CutMix
Through experiments, we can see that using a lot of tricks, it is simply the most powerful kaleidoscope for target detection, as shown in the table below It is an experiment on classification networks:
CSPResNeXt-50 classifier accuracy
CSPDarknet-53 classifier accuracy
On the YOLOv4 detection network, four losses (GIoU, CIoU, DIoU, MSE), label smoothing, Cosine learning rate, genetic algorithm hyperparameter selection, Mosaic data enhancement and other methods were compared. . The following table is the ablation experiment results on the YOLOv4 detection network:
CSPResNeXt50-PANet-SPP, 512x512
Use models with different training weights for training:
Different mini-batch size results:
Finally, on three different series of GPUs: Maxwell, Pascal, and Volta, in the COCO data set Comparison of results on:
The most exciting thing is that in the COCO data set, compared with other frameworks (speed and accuracy):
The above is the detailed content of The whole process of deploying yolov to iPhone or terminal practice. For more information, please follow other related articles on the PHP Chinese website!

Cyberattacks are evolving. Gone are the days of generic phishing emails. The future of cybercrime is hyper-personalized, leveraging readily available online data and AI to craft highly targeted attacks. Imagine a scammer who knows your job, your f

In his inaugural address to the College of Cardinals, Chicago-born Robert Francis Prevost, the newly elected Pope Leo XIV, discussed the influence of his namesake, Pope Leo XIII, whose papacy (1878-1903) coincided with the dawn of the automobile and

This tutorial demonstrates how to integrate your Large Language Model (LLM) with external tools using the Model Context Protocol (MCP) and FastAPI. We'll build a simple web application using FastAPI and convert it into an MCP server, enabling your L

Explore Dia-1.6B: A groundbreaking text-to-speech model developed by two undergraduates with zero funding! This 1.6 billion parameter model generates remarkably realistic speech, including nonverbal cues like laughter and sneezes. This article guide

I wholeheartedly agree. My success is inextricably linked to the guidance of my mentors. Their insights, particularly regarding business management, formed the bedrock of my beliefs and practices. This experience underscores my commitment to mentor

AI Enhanced Mining Equipment The mining operation environment is harsh and dangerous. Artificial intelligence systems help improve overall efficiency and security by removing humans from the most dangerous environments and enhancing human capabilities. Artificial intelligence is increasingly used to power autonomous trucks, drills and loaders used in mining operations. These AI-powered vehicles can operate accurately in hazardous environments, thereby increasing safety and productivity. Some companies have developed autonomous mining vehicles for large-scale mining operations. Equipment operating in challenging environments requires ongoing maintenance. However, maintenance can keep critical devices offline and consume resources. More precise maintenance means increased uptime for expensive and necessary equipment and significant cost savings. AI-driven

Marc Benioff, Salesforce CEO, predicts a monumental workplace revolution driven by AI agents, a transformation already underway within Salesforce and its client base. He envisions a shift from traditional markets to a vastly larger market focused on

The Rise of AI in HR: Navigating a Workforce with Robot Colleagues The integration of AI into human resources (HR) is no longer a futuristic concept; it's rapidly becoming the new reality. This shift impacts both HR professionals and employees, dem


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

MantisBT
Mantis is an easy-to-deploy web-based defect tracking tool designed to aid in product defect tracking. It requires PHP, MySQL and a web server. Check out our demo and hosting services.

SublimeText3 English version
Recommended: Win version, supports code prompts!

MinGW - Minimalist GNU for Windows
This project is in the process of being migrated to osdn.net/projects/mingw, you can continue to follow us there. MinGW: A native Windows port of the GNU Compiler Collection (GCC), freely distributable import libraries and header files for building native Windows applications; includes extensions to the MSVC runtime to support C99 functionality. All MinGW software can run on 64-bit Windows platforms.

DVWA
Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software

EditPlus Chinese cracked version
Small size, syntax highlighting, does not support code prompt function
