• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Chen Yaodong and Li Renfa. Learning Parts for Object Detection[J]. Journal of Computer Research and Development, 2013, 50(9): 1902-1913.
Citation: Chen Yaodong and Li Renfa. Learning Parts for Object Detection[J]. Journal of Computer Research and Development, 2013, 50(9): 1902-1913.

Learning Parts for Object Detection

More Information
  • Published Date: September 14, 2013
  • Previous work on part-based models for object detection has concentrated on searching locally discriminative features representing objects based on notion of parts. There is little research on how to select parts effectively and what kind of parts could improve the object detections. This paper investigates the learning problem of object parts with weakly labeled data, and proposes an adaptive approach for part selection. Without part-level supervision, for each training example this approach first detects seed windows of parts using single-part classifiers and then localizes parts in local regions via the image-specific distribution. The selected parts, which contain discriminative and relevant features, are used to train global parameters. Addressing the partial object occlusions in training examples, a pruning strategy is introduced to reduce the proportion of noise parts during learning iterations. The experimental results on PASCAL VOC 2007 and 2010 datasets demonstrate that the proposed part learning method gets an improvement on object detections compared with three classical part models, and the pruning strategy can speed up the convergence rates of model learning.
  • Related Articles

    [1]Wang Ting, Liu Gang. Software Defined Virtualized Access Network Supporting Network Slicing and Green Communication[J]. Journal of Computer Research and Development, 2021, 58(6): 1291-1306. DOI: 10.7544/issn1000-1239.2021.20201079
    [2]Wang Yuwei, Liu Min, Ma Cheng, Li Pengfei. High Performance Load Balancing Mechanism for Network Function Virtualization[J]. Journal of Computer Research and Development, 2018, 55(4): 689-703. DOI: 10.7544/issn1000-1239.2018.20170923
    [3]Zhou Weilin, Yang Yuan, Xu Mingwei. Network Function Virtualization Technology Research[J]. Journal of Computer Research and Development, 2018, 55(4): 675-688. DOI: 10.7544/issn1000-1239.2018.20170937
    [4]Liu Weijie, Wang Lina, Tan Cheng, Xu Lai. A Virtual Machine Introspection Triggering Mechanism Based on VMFUNC[J]. Journal of Computer Research and Development, 2017, 54(10): 2310-2320. DOI: 10.7544/issn1000-1239.2017.20170452
    [5]Shi Yuan, Zhang Huanguo, Wu Fusheng. A Method of Constructing the Model of Trusted Virtual Machine Migration[J]. Journal of Computer Research and Development, 2017, 54(10): 2284-2295. DOI: 10.7544/issn1000-1239.2017.20170465
    [6]Wang Cong, Yuan Ying, Peng Sancheng, Wang Xingwei, Wang Cuirong, Wan Cong. Fair Virtual Network Embedding Algorithm with Topology Pre-Configuration[J]. Journal of Computer Research and Development, 2017, 54(1): 212-220. DOI: 10.7544/issn1000-1239.2017.20150785
    [7]Yu Tao, Bi Jun, Wu Jianping. Research on the Virtualization of Future Internet[J]. Journal of Computer Research and Development, 2015, 52(9): 2069-2082. DOI: 10.7544/issn1000-1239.2015.20140207
    [8]Feng Lin, Fu Yong, Chen Kang, Zheng Weimin. TDDS:Task Deployment and Scheduling Based on Virtual Cluster System[J]. Journal of Computer Research and Development, 2013, 50(5): 1118-1124.
    [9]Li Xiaoling, Guo Changguo, Li Xiaoyong, Wang Huaimin. A Constraint Optimization Based Mapping Method for Virtual Network[J]. Journal of Computer Research and Development, 2012, 49(8): 1601-1610.
    [10]Wang Di, Xue Wei, Shu Jiwu, and Shen Meiming. Fault Tolerance with Virtual Disk Replicas in the Mass Storage Network[J]. Journal of Computer Research and Development, 2006, 43(10): 1849-1854.

Catalog

    Article views (933) PDF downloads (780) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return