当前位置:网站首页>Yolov5 face+tensorrt: deployment based on win10+tensorrt8.2+vs2019
Yolov5 face+tensorrt: deployment based on win10+tensorrt8.2+vs2019
2022-06-13 03:26:00 【Mr Qu Mo Han】
about genjuV5-Face Always wanted to use it . And it may also be used in subsequent projects, so it will be used for the time being .
In recent years ,CNN It has been widely used in face detection . But many face detectors need to use specially designed face detectors to detect faces , and YOLOv5 The author regards face detection as a general target detection task .
YOLOv5Face stay YOLOv5 Added a 5-Point Landmark Regression Head( Key point regression ), Also on Landmark Regression Head Used Wing loss Constraint .YOLOv5Face Detectors with different model sizes are designed , From large model to ultra small model , To achieve real-time detection on embedded or mobile devices .

YoloV5-Face Network model structure :

Enclosed YoloV5-Face have to github link :
边栏推荐
- [JVM series 8] overview of JVM knowledge points
- English grammar_ Frequency adverb
- MySQL learning summary Xi: detailed explanation of the use of stored procedures and stored functions
- MySQL learning summary 9: non empty constraints, uniqueness constraints, primary key, auto_ Increment, foreign key, default, etc
- A data modeling optimization solution for graph data super nodes
- Implode and explode in golang
- Least recently used cache (source force deduction)
- Azure SQL db/dw series (13) -- using query store (2) -- report Introduction (2)
- 开源-校园论坛和资源共享小程序
- Patrick Pichette, partner of inovia, former chief financial officer of Google and current chairman of twitter, joined the board of directors of neo4j
猜你喜欢

QML connecting to MySQL database

Video playback has repeatedly broken 1000w+, how to use the second dimension to create a popular model in Kwai

Azure SQL db/dw series (10) -- re understanding the query store (3) -- configuring the query store

MASA Auth - 从用户的角度看整体设计

MySQL transactions and locks (V)

技术博客,经验分享宝典
![[JVM Series 2] runtime data area](/img/6c/82cc0ff9e14507f57492ed3f67a7f6.jpg)
[JVM Series 2] runtime data area

Typical application of ACL

Feign based remote service invocation
![Data Governance Series 1: data governance framework [interpretation and analysis]](/img/d9/1476d0ee2c82f5cdd70b4cffaba423.jpg)
Data Governance Series 1: data governance framework [interpretation and analysis]
随机推荐
[JVM series 4] common JVM commands
Peking University HP financial index - matching enterprise green innovation index 2011-2020: enterprise name, year, industry classification and other multi indicator data
How to write product requirements documents
Aggregation analysis of research word association based on graph data
MMAP usage in golang
C # simple understanding - method overloading and rewriting
MySQL transactions and locks (V)
视频播放屡破1000W+,在快手如何利用二次元打造爆款
[JVM Series 7] garbage collector
Simple use of qtreeview of QT (including source code + comments)
Typical application of ACL
[azure data platform] ETL tool (5) -- use azure data factory data stream to convert data
Common command records of redis client
(九)详解广播机制
The use of curl in PHP
Understanding the ongdb open source map data foundation from the development of MariaDB
Environmental pollution, enterprises, highways, fixed assets, foreign investment in all prefecture level cities in China - latest panel data
DTCC | 2021 China map database technology conference link sharing
C method parameter: ref
Data from the first to seventh census (to counties)