Bolton et al., 2023 - Google Patents
Comparing object recognition models and studying hyperparameter selection for the detection of boltsBolton et al., 2023
- Document ID
- 11261355352874064037
- Author
- Bolton T
- Bass J
- Gaber T
- Mansouri T
- Publication year
- Publication venue
- International Conference on Applications of Natural Language to Information Systems
External Links
Snippet
The commonly-used method of bolting, used to secure parts of apparatus together, relies on the bolts having a sufficient preload force in order to the ensure mechanical strength. Failing to secure bolted connections to a suitable torque rating can have dangerous consequences …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6268—Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30244—Information retrieval; Database structures therefor; File system structures therefor in image databases
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/02—Computer systems based on biological models using neural network models
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T7/00—Image analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2207/00—Indexing scheme for image analysis or image enhancement
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Zoph et al. | Learning data augmentation strategies for object detection | |
| Li et al. | Cifar10-dvs: an event-stream dataset for object classification | |
| Zhang et al. | Fruit classification by biogeography‐based optimization and feedforward neural network | |
| Stöckl | Evaluating a synthetic image dataset generated with stable diffusion | |
| CN109816032A (en) | Zero sample classification method and apparatus of unbiased mapping based on production confrontation network | |
| Bomatter et al. | When pigs fly: Contextual reasoning in synthetic and natural scenes | |
| Bolton et al. | Comparing object recognition models and studying hyperparameter selection for the detection of bolts | |
| Biswas et al. | Classification of Indian dance forms using pre-trained model-VGG | |
| CN117132763A (en) | Power image anomaly detection method, device, computer equipment and storage medium | |
| Bolton et al. | A comparison of deep learning techniques for corrosion detection | |
| Ferdousi et al. | Generative model-driven synthetic training image generation: An approach to cognition in railway defect detection | |
| Santoso et al. | Detection of Children's Facial Expressions on The Effects of Playing Games Using CNN Algorithm | |
| Alam et al. | Holographic global convolutional networks for long-range prediction tasks in malware detection | |
| Kushwaha et al. | Analysis of CNN Model with Traditional Approach and Cloud AI based Approach | |
| Nayim et al. | Detection of Leading CNN Models for AI Image Accuracy and Efficiency | |
| Kiran et al. | A novel approach for model interpretability and domain aware fine-tuning in AdaBoost | |
| El Asry et al. | Intrusion detection system, a new approach to R2L and U2R attack classification | |
| Lavania | A Deep Learning Framework to identify real-world stego images | |
| Chen et al. | Adaptive neural trees for attack detection in cyber physical systems | |
| Schulz et al. | Human-in-the-loop extension to stream classification for labeling of low altitude drone imagery | |
| Abhinandhan et al. | From Pixels to Truth: Unveiling Deepfakes with a Meso-5 and XceptionNet Fusion Network | |
| Yang et al. | Accident-clip: Text-video benchmarking for fine-grained accident classification in driving scenes | |
| Mallidi et al. | Deep Learning in Cartoon Moderation: Distinguishing Child-Friendly Content with CNN Architectures | |
| Kuo et al. | Malware Detection Based on Image Conversion | |
| Hari Prasad et al. | Advanced Detection Techniques for Deep-Fake Images Using GANs: A Comprehensive Study on CNN, CAT-NET, and Buster-NET Models |