An optimization method for mutual blog intelligence evolution between multiple groups of convolutional neural networks
A convolutional neural network and neural network technology, applied in the field of artificial intelligence deep learning, can solve the problems of consuming manpower and material resources, heavy workload of collecting and labeling labels, and closed data sets
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0032] An optimization method for mutual blog intelligence evolution between multiple groups of convolutional neural networks, such as figure 1 shown, including:
[0033] (1) Select m convolutional neural networks, including net1,...,neti,...,netm, m≥2 and m is an integer, 1≤i≤m, neti refers to any volume in m convolutional neural networks Convolutional neural network; the initialization states of m convolutional neural networks are all trained based on the same data set, which has n categories, and one category has multiple training pictures, including 1,...,j,...,n; j refers to any one of the n categories;
[0034] (2) Use m convolutional networks to infer and classify the single images collected by the camera, and the convolutional neural network neti obtains the classification results, that is, n probability values X i1 ,...,X ij …X in ,X ij It refers to the probability that the currently collected image is category j, and the maximum value is selected from n probab...
Embodiment 2
[0039] An optimization method for mutual blog intelligence evolution between multiple groups of convolutional neural networks, such as figure 2 shown, including:
[0040] (1) Select AlexNet and GoogleNet, which won the category recognition champions in the ImageNet Large Scale Visual Recognition Challenge in 2012 and 2014, respectively, and apply them to embedded device security monitoring. These two convolutional neural networks The networks are all trained on the IamgeNet training dataset with 1000 categories.
[0041] (2) Security monitoring captures images at a limited time point, and at a certain moment, an image A is captured by monitoring and sent to AlexNet and GoogleNet for real-time recognition. AlexNet calculates that the target in image A is the probability of 1000 classifications in the IamgeNet data set. x 1 , X 2 , X 3 …X 1000 , where the largest probability value is X i , that is, AlexNet believes that the target in the A image is most similar to the i-t...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

