skip to main content
10.1145/3647649.3647652acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicigpConference Proceedingsconference-collections
research-article

The Tire Sidewall Key Information Region Detection Algorithm based on the Improvement of YOLOv5

Authors Info & Claims
Published:03 May 2024Publication History

ABSTRACT

The recognition of tire sidewall text refers to the technology that automatically detects and extracts textual information on tire sidewalls in dark background. This article explores the importance of tire sidewall text recognition and proposes a lightweight network for detecting key imprint text regions based on You Only Look Once v5 (YOLOv5). To enhance detection accuracy whilst minimizing parameter and computational complexity, this article replaces the backbone network of YOLOv5 with the EMO network and introduces the C3Faster module proposed in this article to replace the original C3 module in YOLOv5's Neck network, because convolution operations in the C3 module introduce a lot of computation. This accelerates inference while mitigating parameters and computational complexity. Additionally, the number of detection heads is changed to provide more suitable scale outputs on the dataset. Experimental results demonstrate that the refined algorithm yields a 12.1% enhancement in accuracy when compared to YOLOv5s.

References

  1. Zeng Y, Xiang A, Mou X. Research on an image acquisition System based on Camera Link [J]. Computer Application and Software, 2010, 27(11): 245-249.Google ScholarGoogle Scholar
  2. Florian Spiess, Lucas Reinhart, Norbert Strobel, Dennis Kaiser, Samuel Kounev, and Tobias Kaupp, "People Detection with Depth Silhouettes and Convolutional Neural Networks on a Mobile Robot," Journal of Image and Graphics, Vol. 9, No. 4, pp. 135-139, December 2021. doi: 10.18178/joig.9.4.135-139Google ScholarGoogle ScholarCross RefCross Ref
  3. Edisanter Lo, "Target Detection Algorithms in Hyperspectral Imaging Based on Discriminant Analysis," Journal of Image and Graphics, Vol. 7, No. 4, pp. 140-144, December 2019. doi: 10.18178/joig.7.4.140-144Google ScholarGoogle ScholarCross RefCross Ref
  4. Girshick R, Donahue J, Darrell T, Rich feature hierarchies for accurate object detection and semantic segmentation[C]//Proceedings of the IEEE conference on computer vision and pattern recognition. 2014: 580-587.Google ScholarGoogle Scholar
  5. Ren S, He K, Girshick R, (2015)Faster r-cnn: Towards real-time object detection with region proposal networks[J]. Advances in neural information processing systems. 9199(10.5555): 2969239-2969250.Google ScholarGoogle Scholar
  6. Cai Z, Vasconcelos N.(2018) Cascade r-cnn: Delving into high quality object detection[C]//Proceedings of the IEEE conference on computer vision and pattern recognition. 2018: 6154-6162.Google ScholarGoogle Scholar
  7. Liu W, Anguelov D, Erhan D, Ssd: Single shot multibox detector[C]//Computer Vision–ECCV 2016: 14th European Conference, Amsterdam, The Netherlands, October 11–14, 2016, Proceedings, Part I 14. Springer International Publishing, 2016: 21-37.doi: 10.1007/978-3-319-46448-0_2Google ScholarGoogle ScholarCross RefCross Ref
  8. Redmon J, Divvala S, Girshick R, You only look once: Unified, real-time object detection[C]//Proceedings of the IEEE conference on computer vision and pattern recognition. 2016: 779-788,doi: 10.1109/CVPR.2016.91..Google ScholarGoogle ScholarCross RefCross Ref
  9. Zhao J, Zhang X, Yan J, A wheat spike detection method in UAV images based on improved YOLOv5[J]. Remote Sensing, 2021, 13(16): 3095.Google ScholarGoogle ScholarCross RefCross Ref
  10. Zhu L, Geng X, Li Z, Improving YOLOv5 with attention mechanism for detecting boulders from planetary images[J]. Remote Sensing, 2021, 13(18): 3776.Google ScholarGoogle ScholarCross RefCross Ref
  11. Zhang K; Zhang P; Chen J; Long M; Lin W. Dangerous Goods Detection based on improved YOLOv5s X-ray image [J]. Journal of Shaanxi University of Science and Technology, 2023, 41 (06): 176-183+200. doi:10.19481/j.cnki.issn2096-398x.2023.06.006Google ScholarGoogle ScholarCross RefCross Ref
  12. Liu Z, Lin Y, Cao Y, Swin transformer: Hierarchical vision transformer using shifted windows[C]//Proceedings of the IEEE/CVF international conference on computer vision. 2021: 10012-10022.doi: 10.1109/ICCV48922.2021.00986.Google ScholarGoogle ScholarCross RefCross Ref
  13. Li J, Xia X, Li W, Next-vit: Next generation vision transformer for efficient deployment in realistic industrial scenarios[J]. arXiv preprint arXiv:2207.05501, 2022.Google ScholarGoogle Scholar
  14. Zhang J, Li X, Li J, Rethinking mobile block for efficient neural models[J]. arXiv preprint arXiv:2301.01146, 2023.Google ScholarGoogle Scholar
  15. Chen J, Kao S, He H, Run, Don't Walk: Chasing Higher FLOPS for Faster Neural Networks[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. 2023: 12021-12031.doi: 10.1109/CVPR52729.2023.01157.Google ScholarGoogle ScholarCross RefCross Ref
  16. Chollet F. Xception: Deep learning with depthwise separable convolutions[C]//Proceedings of the IEEE conference on computer vision and pattern recognition. 2017: 1251-1258.Google ScholarGoogle Scholar

Index Terms

  1. The Tire Sidewall Key Information Region Detection Algorithm based on the Improvement of YOLOv5

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICIGP '24: Proceedings of the 2024 7th International Conference on Image and Graphics Processing
      January 2024
      480 pages
      ISBN:9798400716720
      DOI:10.1145/3647649

      Copyright © 2024 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 3 May 2024

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited
    • Article Metrics

      • Downloads (Last 12 months)1
      • Downloads (Last 6 weeks)1

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format