当前位置:网站首页>Human bone point detection: top-down (part of the theory)
Human bone point detection: top-down (part of the theory)
2022-07-06 18:41:00 【Deer holding grass】
Human bone point detection : The top-down
1. Datasets
2. Human Pose Estimation
Top Down: The top-down → Find someone first Find some later
Bottom Up: Bottom up → Find some first After induction
3. Keypoints Evaluation Metric
Precision measures how accurate is your predictions. i.e. the percentage of your predictions are
correct.
Recall measures how good you find all the positives. For example, we can find 80% of the
possible positive cases in our top K predictions.
Format of real joint points :[𝑥1, 𝑦1, 𝑣1, … 𝑥𝑘, 𝑦𝑘, 𝑣𝑘]
Coordinates [𝑥, 𝑦] visible: 𝑣 𝑣 = 0: Unmarked points
𝑣 = 1: Marked but not visible
𝑣 = 2: Marked and image visible
𝑑i Is the Euclidean distance between the annotation and prediction joint points
4. Standard Deviation per Keypoint Type
5. Human Pose Estimation: Top Down
Human target detection :
One Stage: Yolo, SSD etc. ;
Two Stages: Faster RCNN, Mask RCNN etc. ;
Anchor Free: CornerNet, CenterNet;
Key point detection :
6. FPN:Feature Pyramid Network
C1-C5 The size of the feature map is different ;
Use 1×1 Convolution assurance depth Get the same first P5,
Then up sampling ensures that the size of the characteristic matrix matches ,
Then add the characteristic matrix , Do the same and get P4,P3,P2.
边栏推荐
- Maixll dock camera usage
- Prophet模型的简介以及案例分析
- 美庐生物IPO被终止:年营收3.85亿 陈林为实控人
- MySQL查询请求的执行过程——底层原理
- [sword finger offer] 60 Points of N dice
- Stm32+hc05 serial port Bluetooth design simple Bluetooth speaker
- 具体说明 Flume介绍、安装和配置
- epoll()无论涉及wait队列分析
- Wchars, coding, standards and portability - wchars, encodings, standards and portability
- 涂鸦智能在香港双重主板上市:市值112亿港元 年营收3亿美元
猜你喜欢
Distill knowledge from the interaction model! China University of science and Technology & meituan proposed virt, which combines the efficiency of the two tower model and the performance of the intera
SQL injection - access injection, access offset injection
Execution process of MySQL query request - underlying principle
被疫情占据的上半年,你还好么?| 2022年中总结
[Matlab] Simulink 同一模块的输入输出的变量不能同名
Maixll-Dock 摄像头使用
Mathematics in machine learning -- common probability distribution (XIII): Logistic Distribution
涂鸦智能在香港双重主板上市:市值112亿港元 年营收3亿美元
Use cpolar to build a business website (1)
Docker installation redis
随机推荐
测试1234
Celery best practices
基于ppg和fft神经网络的光学血压估计【翻译】
巨杉数据库首批入选金融信创解决方案!
Collection of penetration test information -- use with nmap and other tools
Reprint: defect detection technology of industrial components based on deep learning
CSRF vulnerability analysis
CSRF漏洞分析
Recommend easy-to-use backstage management scaffolding, everyone open source
Atcoder a mountaineer
Cocos2d Lua 越来越小样本 内存游戏
UFIDA OA vulnerability learning - ncfindweb directory traversal vulnerability
C语言自动预订飞机票问题
图之广度优先遍历
The role of applet in industrial Internet
安装及管理程序
【剑指 Offer】 60. n个骰子的点数
C语言高校实验室预约登记系统
STM32+ENC28J60+UIP协议栈实现WEB服务器示例
[sword finger offer] 60 Points of N dice