当前位置:网站首页>Detr introduction
Detr introduction
2022-07-07 13:27:00 【Name of algorithm】
DETR yes facebook Published in ECCV2020 Use Transformers A framework for end-to-end target detection .
DETR Just use CNN Extraction of image features , And then use it alone Transformer You can predict the target bounding box and classification . It does not require non maximum suppression , Don't need to, Anchor Mechanism .
Above, DETR The network architecture of ,DETR Use CNN Extraction of image features , And then use it alone Transformer Get the predicted target bounding box , Bounding box and ground truth As a geometric prediction problem . It's a binary match (bipartite matching), There is no matching object homing no object This kind of .
The above figure is a more detailed description DETR Network structure , The image passes by CNN Get the feature , Plus the location code (poositioonal encoding), Then flatten and feed into transformer encoder,encoder The output of is sent to transformer decoder, stay decoder There is also object queries The input of ,decoder The output of is sent to the prediction head (prediction heads), There is a feedforward neural network in the prediction head FFN Predict object categories and bounding boxes .
Above, DETR in Transformer Specific architecture , It has Encoder and Decoder Two parts ,Encoder The input is CNN Extracted image features plus position coding , Send it to the multi head self attention module , Then it is sent to the feedforward neural network module . In this way Encoder There can be multiple layers , Then send it to Decoder,Decoder Yes Object queries, Is a learnable location embedded as input , After the multi head self attention module , after Encoder and Decoder Multi head mutual attention module , Then it is sent to the feedforward neural network for processing .Decoder Layers can also stack multiple , Finally, it is sent to the feedforward neural network FFN Carry out object category prediction and boundary box prediction .
边栏推荐
- About how appium closes apps (resolved)
- Pay close attention to the work of safety production and make every effort to ensure the safety of people's lives and property
- 聊聊伪共享
- Why can basic data types call methods in JS
- 人均瑞数系列,瑞数 4 代 JS 逆向分析
- Some principles of mongodb optimization
- [untitled]
- Practical example of propeller easydl: automatic scratch recognition of industrial parts
- Esp32 construction engineering add components
- Write it down once Net a new energy system thread surge analysis
猜你喜欢
cmake 学习使用笔记(一)
Isprs2021/ remote sensing image cloud detection: a geographic information driven method and a new large-scale remote sensing cloud / snow detection data set
DHCP 动态主机设置协议 分析
[learning notes] agc010
【学习笔记】zkw 线段树
Esp32 ① compilation environment
xshell连接服务器把密钥登陆改为密码登陆
Per capita Swiss number series, Swiss number 4 generation JS reverse analysis
将数学公式在el-table里面展示出来
Awk of three swordsmen in text processing
随机推荐
Flink | 多流转换
【黑马早报】华为辟谣“军师”陈春花;恒驰5预售价17.9万元;周杰伦新专辑MV 3小时播放量破亿;法华寺回应万元月薪招人...
Unity build error: the name "editorutility" does not exist in the current context
Per capita Swiss number series, Swiss number 4 generation JS reverse analysis
DHCP 动态主机设置协议 分析
Ogre入门尝鲜
xshell连接服务器把密钥登陆改为密码登陆
Practical example of propeller easydl: automatic scratch recognition of industrial parts
Test next summary
User management summary of mongodb
MongoDB优化的几点原则
My "troublesome" subordinates after 00: not bad for money, against leaders, and resist overtime
Grep of three swordsmen in text processing
How far can it go to adopt a cow by selling the concept to the market?
Introduce six open source protocols in detail (instructions for programmers)
Initialization script
cmake 学习使用笔记(一)
Write it down once Net a new energy system thread surge analysis
LIS 最长上升子序列问题(动态规划、贪心+二分)
PACP学习笔记三:PCAP方法说明