• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Liu Fan, Wang Junfeng, Chen Zhiyu, Xu Feng. Parallel Attention Based UNet for Crack Detection[J]. Journal of Computer Research and Development, 2021, 58(8): 1718-1726. DOI: 10.7544/issn1000-1239.2021.20210335
Citation: Liu Fan, Wang Junfeng, Chen Zhiyu, Xu Feng. Parallel Attention Based UNet for Crack Detection[J]. Journal of Computer Research and Development, 2021, 58(8): 1718-1726. DOI: 10.7544/issn1000-1239.2021.20210335

Parallel Attention Based UNet for Crack Detection

Funds: This work was supported by the Natural Science Foundation of Jiangsu Province (BK20191298), the Fundamental Research Funds for the Central Universities (B200202175), and the Open Project of the Key Laboratory of Coastal Disaster and Protection (Hohai University) of Ministry of Euducation (20150009).
More Information
  • Published Date: July 31, 2021
  • Cracks have hidden safety hazards to public facilities, so crack detection is essential for the maintenance of public facilities. Due to the interference of noise, light, shadow, and other factors in the crack images, the neural network is easily affected during the training process, which causes deviations in the prediction results and reduces the prediction effect. To suppress these disturbances, a parallel attention mechanism is designed and then the parallel attention based UNet(PA-UNet) is proposed by embedding this attention mechanism into UNet. The parallel attention mechanism increases the weights of crack features from the two dimensions of channel and space to suppress interference, then fuses the features generated by these two dimensions to obtain more complementary crack features. To verify the effectiveness of the proposed method, we have conducted experiments on four data sets. Experimental results show that our method outperforms the existing popular methods. Meanwhile, to demonstrate the effectiveness of the parallel attention mechanism, we conduct a comparative experiment with other four attention mechanisms. The results show that the parallel attention mechanism performs better than others.
  • Related Articles

    [1]Chen Ruoxi, Chen Jinyin, Zheng Haibin, Yang Xueyan, Ji Shouling, Chen Tieming. Security of Deep Neural Network Supply Chains: A Survey[J]. Journal of Computer Research and Development. DOI: 10.7544/issn1000-1239.202440327
    [2]Liu Feng, Yang Jie, Li Zhibin, Qi Jiayin. A Secure Multi-Party Computation Protocol for Universal Data Privacy Protection Based on Blockchain[J]. Journal of Computer Research and Development, 2021, 58(2): 281-290. DOI: 10.7544/issn1000-1239.2021.20200751
    [3]Wei Lifei, Chen Congcong, Zhang Lei, Li Mengsi, Chen Yujiao, Wang Qin. Security Issues and Privacy Preserving in Machine Learning[J]. Journal of Computer Research and Development, 2020, 57(10): 2066-2085. DOI: 10.7544/issn1000-1239.2020.20200426
    [4]Chen Dongdong, Cao Zhenfu, Dong Xiaolei. Online/Offline Ciphertext-Policy Attribute-Based Searchable Encryption[J]. Journal of Computer Research and Development, 2016, 53(10): 2365-2375. DOI: 10.7544/issn1000-1239.2016.20160416
    [5]Lin Hui, Tian Youliang, Xu Li, Hu Jia. A Novel Privacy Aware Secure Routing Protocol for HWMN[J]. Journal of Computer Research and Development, 2015, 52(8): 1883-1892. DOI: 10.7544/issn1000-1239.2015.20140606
    [6]Ma Zhuo, Zhang Junwei, Ma Jianfeng, and Ji Wenjiang. Provably Secure Certificateless Trusted Access Protocol for WLAN Without Pairing[J]. Journal of Computer Research and Development, 2014, 51(2): 325-333.
    [7]Xin Wei, Sun Huiping, Chen Zhong. Analysis and Design of Distance-Bounding Protocols for RFID[J]. Journal of Computer Research and Development, 2013, 50(11): 2358-2366.
    [8]Wang Shaohui, Liu Sujuan, Chen Danwei. Scalable RFID Mutual Authentication Protocol with Backward Privacy[J]. Journal of Computer Research and Development, 2013, 50(6): 1276-1284.
    [9]Zhang Xiaoliang, Tu Yongce, Ma Hengtai, Yang Zhian, Hu Xiaohui. An End-to-End Authentication Protocol for Satellite Communication Network[J]. Journal of Computer Research and Development, 2013, 50(3): 540-547.
    [10]Ding Zhenhua, Li Jintao, Feng Bo. Research on Hash-Based RFID Security Authentication Protocol[J]. Journal of Computer Research and Development, 2009, 46(4): 583-592.

Catalog

    Article views (770) PDF downloads (562) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return