Object Detection Approaches in Images: A Weighted Scoring Model based Comparative Study
Computer vision is a branch of artificial intelligence that trains computers to acquire high-level understanding of images and videos. Some of the most well-known areas in Computer Vision are object detection, object tracking and motion estimation among others. Our focus in this paper concerns objec...
Gespeichert in:
| Veröffentlicht in: | International journal of advanced computer science & applications Jg. 12; H. 8 |
|---|---|
| Hauptverfasser: | , |
| Format: | Journal Article |
| Sprache: | Englisch |
| Veröffentlicht: |
West Yorkshire
Science and Information (SAI) Organization Limited
2021
|
| Schlagworte: | |
| ISSN: | 2158-107X, 2156-5570 |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Zusammenfassung: | Computer vision is a branch of artificial intelligence that trains computers to acquire high-level understanding of images and videos. Some of the most well-known areas in Computer Vision are object detection, object tracking and motion estimation among others. Our focus in this paper concerns object detection subarea of computer vision which aims at recognizing instances of predefined sets of objects classes using bounding boxes or object segmentation. Object detection relies on various algorithms belonging to various families that differs in term of speed and quality of results. Hence, we propose in this paper to provide a comparative study of these algorithms based on a set of criteria. In this comparative study we will start by presenting each of these algorithms, selecting a set of criteria for comparison and applying a comparative methodology to get results. The methodology we chose to this purpose is called WSM (Weighted Scoring Model) which fits exactly our needs. Indeed, WSM method allows us to assign a weight to each of our criterion to calculate a final score of each of our compared algorithms. The obtained results reveal the weaknesses and the strengths of each one of them and opened breaches for their future enhancement. |
|---|---|
| Bibliographie: | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ISSN: | 2158-107X 2156-5570 |
| DOI: | 10.14569/IJACSA.2021.0120831 |