Self-adaptive scale pedestrian detection algorithm based on deep residual network

被引:4
|
作者
Liu, Shuang-Shuang [1 ]
机构
[1] Jiangxi Agr Univ, Nanchang Business Coll, Dept Comp Sci, Nanchang, Jiangxi, Peoples R China
关键词
Deep residual network; Edge boxes; Pedestrian detection; Self-adaptive scale; Weight function;
D O I
10.1108/IJICC-12-2018-0167
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Purpose The conventional pedestrian detection algorithms lack in scale sensitivity. The purpose of this paper is to propose a novel algorithm of self-adaptive scale pedestrian detection, based on deep residual network (DRN), to address such lacks. Design/methodology/approach First, the "Edge boxes" algorithm is introduced to extract region of interests from pedestrian images. Then, the extracted bounding boxes are incorporated to different DRNs, one is a large-scale DRN and the other one is the small-scale DRN. The height of the bounding boxes is used to classify the results of pedestrians and to regress the bounding boxes to the entity of the pedestrian. At last, a weighted self-adaptive scale function, which combines the large-scale results and small-scale results, is designed for the final pedestrian detection. Findings To validate the effectiveness and feasibility of the proposed algorithm, some comparison experiments have been done on the common pedestrian detection data sets: Caltech, INRIA, ETH and KITTI. Experimental results show that the proposed algorithm is adapted for the various scales of the pedestrians. For the hard detected small-scale pedestrians, the proposed algorithm has improved the accuracy and robustness of detections. Originality/value By applying different models to deal with different scales of pedestrians, the proposed algorithm with the weighted calculation function has improved the accuracy and robustness for different scales of pedestrians.
引用
收藏
页码:318 / 332
页数:15
相关论文
共 50 条
  • [1] A self-adaptive sampling algorithm based on network delay jitter
    Li, Xiali
    Cao, Yongcun
    Wen, Huimin
    Pan, Xiuqin
    [J]. 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 2, 2008, : 548 - 551
  • [2] A self-adaptive edge detection method based on LoG algorithm
    Wang, Sifeng
    Zhao, Jingxiu
    [J]. 2008 INTERNATIONAL CONFERENCE ON AUDIO, LANGUAGE AND IMAGE PROCESSING, VOLS 1 AND 2, PROCEEDINGS, 2008, : 1009 - 1011
  • [3] A self-adaptive wildfire detection algorithm by fusing physical and deep learning schemes
    Jin, Shuting
    Wang, Tianxing
    Huang, Huabing
    Zheng, Xiaopo
    Li, Tongwen
    Guo, Zhou
    [J]. INTERNATIONAL JOURNAL OF APPLIED EARTH OBSERVATION AND GEOINFORMATION, 2024, 127
  • [4] A self-adaptive burst-detection algorithm
    David Tam
    [J]. BMC Neuroscience, 8 (Suppl 2)
  • [5] Introducing Deep Learning Self-Adaptive Misuse Network Intrusion Detection Systems
    Papamartzivanos, Dimitrios
    Gomez Marmol, Felix
    Kambourakis, Georgios
    [J]. IEEE ACCESS, 2019, 7 : 13546 - 13560
  • [6] Small-Scale Pedestrian Detection Based on Deep Neural Network
    Han, Bing
    Wang, Yunhao
    Yang, Zheng
    Gao, Xinbo
    [J]. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2020, 21 (07) : 3046 - 3055
  • [7] An online self-adaptive RBF network algorithm based on the Levenberg-Marquardt algorithm
    Zhang, ZhaoZhao
    Liu, Yue
    Zhu, YingQin
    Zhao, XiaoFei
    [J]. APPLIED ARTIFICIAL INTELLIGENCE, 2022, 36 (01)
  • [8] SAR Images Change Detection Based on Self-Adaptive Network Architecture
    Shi, Jiao
    Liu, Xiaodong
    Lei, Yu
    [J]. IEEE GEOSCIENCE AND REMOTE SENSING LETTERS, 2021, 18 (07) : 1204 - 1208
  • [9] Self-Adaptive Deep Asymmetric Network for Imbalanced Recommendation
    Zhu, Yi
    Geng, Yishuai
    Li, Yun
    Qiang, Jipeng
    Yuan, Yunhao
    Wu, Xindong
    [J]. IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE, 2024, 8 (01): : 968 - 980
  • [10] Anomaly Detection of Network Traffic Based on Prediction and Self-Adaptive Threshold
    Wang, Haiyan
    [J]. INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2015, 8 (06): : 205 - 214