当前位置:网站首页>Yolov4 trains its own data set
Yolov4 trains its own data set
2022-07-24 15:44:00 【reset2021】
yolov4 yes yolo The fourth version in the series is improved from the previous three versions
yolov4 Run weighted residual connection (WRC), Cross phase partial connection (CSP), Standardization across small batches (CmBN), Self confrontation training (SAT),Mish Activate , Mosaic data enhancement ,CmBN,DropBlock Regularization ,CIoU Loss And other optimization methods to improve convolutional neural network (CNN) The accuracy of the .
This topic focuses on operation , Next, we will talk about how to use this yolov4 Algorithm to achieve their own data set training and detection .
Source code address :
https://github.com/bubbliiiing/yolov4-pytorch
The code structure

among ,
① img Stored are test pictures
② logs Stored training logs and training models
③ model_data Stored model configuration files and pre training models
④ nets Network related code
⑤ utils Other common interface files stored
⑥ utils_coco Stored for disposal coco Interface of format data
⑦ kmeans_for_anchors.py Computing data sets anchors
⑧ predict.py tr
边栏推荐
- 收益率在百分之六以上的理财产品,请说一下
- Yolo5face: why reinvent the face detector
- LaneATT
- Using JS to implement click events
- Is it safe for Huatai Securities to open an account? I don't know how to operate it
- Arduino ide esp32 firmware installation and upgrade tutorial
- You can't just focus on flex layout and elaborate animation to explain all flex layout methods! Easy to understand dry goods tutorial
- R语言ggplot2可视化:ggplot2可视化基本散点图(scatter plot)、通过在theme_bw中指定参数base_size来改变轴标签的大小、并控制网格线和轴标签的大小
- 维护香港服务器安全的9个关键措施
- Netease email (126/163): authorization code acquisition strategy
猜你喜欢

C - partial keyword

Join parameter processing and @param

PyTorch的自动求导

There are more than 20 categories of the four operators in MySQL. It took three days and three nights to sort them out. Don't collect them quickly

Nine key measures to maintain server security in Hong Kong

Leetcode 231. 2 的幂

Arduino IDE ESP32固件安装和升级教程

Kubectl_好用的命令行工具:oh-my-zsh_技巧和窍门

Error: pidfile (celerybeat.pid) already exists when celery starts beat

Memorythrashing: Tiktok live broadcast to solve memory dithering practice
随机推荐
中信证券账户开通流程,手机上开户安全吗
华为无线设备配置WAPI-证书安全策略
Kubectl_好用的命令行工具:oh-my-zsh_技巧和窍门
How to deal with being attacked? Advanced anti DDoS IP protection strategy
狗牙根植物介绍
简化理解:发布订阅
YOLO5Face:为什么要重新发明人脸检测器
Dynamics 365: how to get the threshold value of executemullerequest in batch requests
With this machine learning drawing artifact, papers and blogs can get twice the result with half the effort!
[tf.keras]: a problem encountered in upgrading the version from 1.x to 2.x: invalidargumenterror: cannot assign a device for operation embedding_
Class assignment (6) - 575. Word division (word)
[fluent -- layout] flow layout (flow and wrap)
Reentrantlock reentrant lock
从哪些维度评判代码质量的好坏?如何具备写出高质量代码的能力?
在LAMP架构中部署Zabbix监控系统及邮件报警机制
[shaders realize pixelate mosaic effect _shader effect Chapter 7]
【TA-霜狼_may-《百人计划》】图形3.4 延迟渲染管线介绍
After taking aiyouteng's medicine, Naifei's condition improved
You are only one SQL statement away from the tdengine Developer Conference!
Netease email (126/163): authorization code acquisition strategy