当前位置:网站首页>Human bone point detection: top-down (part of the theory)
Human bone point detection: top-down (part of the theory)
2022-07-06 18:41:00 【Deer holding grass】
Human bone point detection : The top-down
1. Datasets

2. Human Pose Estimation
Top Down: The top-down → Find someone first Find some later
Bottom Up: Bottom up → Find some first After induction 
3. Keypoints Evaluation Metric


Precision measures how accurate is your predictions. i.e. the percentage of your predictions are
correct.
Recall measures how good you find all the positives. For example, we can find 80% of the
possible positive cases in our top K predictions.
Format of real joint points :[𝑥1, 𝑦1, 𝑣1, … 𝑥𝑘, 𝑦𝑘, 𝑣𝑘]
Coordinates [𝑥, 𝑦] visible: 𝑣 𝑣 = 0: Unmarked points
𝑣 = 1: Marked but not visible
𝑣 = 2: Marked and image visible
𝑑i Is the Euclidean distance between the annotation and prediction joint points

4. Standard Deviation per Keypoint Type

5. Human Pose Estimation: Top Down
Human target detection :
One Stage: Yolo, SSD etc. ;
Two Stages: Faster RCNN, Mask RCNN etc. ;
Anchor Free: CornerNet, CenterNet;
Key point detection :
6. FPN:Feature Pyramid Network
C1-C5 The size of the feature map is different ;
Use 1×1 Convolution assurance depth Get the same first P5,
Then up sampling ensures that the size of the characteristic matrix matches ,
Then add the characteristic matrix , Do the same and get P4,P3,P2.

边栏推荐
- Collection of penetration test information -- use with nmap and other tools
- Distiller les connaissances du modèle interactif! L'Université de technologie de Chine & meituan propose Virt, qui a à la fois l'efficacité du modèle à deux tours et la performance du modèle interacti
- Brief description of SQL optimization problems
- Nuc11 cheetah Canyon setting U disk startup
- C language college laboratory reservation registration system
- 使用block实现两个页面之间的传统价值观
- Recursive way
- STM32+ESP8266+MQTT协议连接OneNet物联网平台
- 使用cpolar建立一个商业网站(1)
- Jdbc driver, c3p0, druid and jdbctemplate dependent jar packages
猜你喜欢

涂鸦智能在香港双重主板上市:市值112亿港元 年营收3亿美元

爬虫玩得好,牢饭吃到饱?这3条底线千万不能碰!

Tree-LSTM的一些理解以及DGL代码实现

使用cpolar建立一个商业网站(1)

UDP protocol: simple because of good nature, it is inevitable to encounter "city can play"

win10系统下插入U盘有声音提示却不显示盘符

The third season of Baidu online AI competition is coming in midsummer, looking for you who love AI!

287. 寻找重复数

This article discusses the memory layout of objects in the JVM, as well as the principle and application of memory alignment and compression pointer

Collection of penetration test information -- use with nmap and other tools
随机推荐
Virtual machine VirtualBox and vagrant installation
With the implementation of MapReduce job de emphasis, a variety of output folders
Reprint: defect detection technology of industrial components based on deep learning
随着MapReduce job实现去加重,多种输出文件夹
【剑指 Offer】 60. n个骰子的点数
UFIDA OA vulnerability learning - ncfindweb directory traversal vulnerability
Cobra 快速入门 - 专为命令行程序而生
图片缩放中心
测试1234
Hongke shares | plate by plate ar application in Beijing Winter Olympics
Docker安装Redis
用友OA漏洞学习——NCFindWeb 目录遍历漏洞
Automatic reservation of air tickets in C language
【中山大学】考研初试复试资料分享
C语言高校实验室预约登记系统
287. 寻找重复数
Recursive way
使用block实现两个页面之间的传统价值观
Ms-tct: INRIA & SBU proposed a multi-scale time transformer for motion detection. The effect is SOTA! Open source! (CVPR2022)...
epoll()无论涉及wait队列分析