当前位置:网站首页>The code of yolov5 model for pest identification in Title A of the 10th Teddy cup data mining challenge (has been run through, original works, continuously updated)
The code of yolov5 model for pest identification in Title A of the 10th Teddy cup data mining challenge (has been run through, original works, continuously updated)
2022-07-19 05:05:00 【Big data Da Wenxi】
2022 The 10th Teddy cup data mining challenge A Problem pest identification YOLOv5 The model code ( Has run through , Original works , Continuous updating )
One 、 Project effect :
Because there are only ten pictures available : So the effect of training is worse , After the official data is updated , Then substitute into the model , Can train a good effect .
Train first 100 round ( It is suggested that 300 round ):

results.png:

result :

Two 、 The code download :
3、 ... and 、 Adaptation projects :
1、 If you use your own computer gpu For training, please refer to the corresponding configuration tutorial :( Not recommended , Very slowly , The computer is easy to crash when running )
Simple and fast establishment pytorch Environmental Science YOLOv5 object detection
2、 If you use the server for training :( recommend )
Renting servers , And deployment in pycharm On the Professional Edition
Crab support !!

边栏推荐
猜你喜欢

md5 密码加密

Feature extraction of machine learning (digitization and discretization of category features and digitization of text features)

String字符串根据符号进行特殊截取处理

SQL statement learning
[email protected] : `node install. Problems of js`"/>solve [email protected] : `node install. Problems of js`

Use of flask

MD5 password encryption

POC——DVWA‘s SQL Injection

Harmonyos second training notes

How to upload qiniu cloud
随机推荐
三种高并发方式实现i++
Yiwen takes you to know about haproxy
浅聊全局过滤器
Simply and quickly establish a pytorch environment yolov5 target detection model to run (super simple)
NPM installation tutorial
Word2Vec原理及应用与文章相似度(推荐系统方法)
sleuth入门
MySQL fuzzy matching 1, 11111 similar string problems
The difference between junit4 and junit5
3.RestClient查询文档
02_電影推薦(ContentBased)_用戶畫像
Using circular statements to make login programs
Infinite classification
CVE-2019-14234 Django JSONField SQL注入漏洞
02_ Movie recommendation (contentbased)_ User portrait
Cve-2022-23131 ZABBIX SAML SSO authentication bypass vulnerability
Chat about global filter
Pingcap clinic data acquisition instructions
Topicexchange switch is simple to use.
How to upload qiniu cloud