Next Article in Journal
A Novel Passive Tracking Scheme Exploiting Geometric and Intercept Theorems
Next Article in Special Issue
Robust Spacecraft Component Detection in Point Clouds
Previous Article in Journal
A Collaborative Approach for Surface Inspection Using Aerial Robots and Computer Vision
Previous Article in Special Issue
Multi-Target Angle Tracking Algorithm for Bistatic Multiple-Input Multiple-Output (MIMO) Radar Based on the Elements of the Covariance Matrix
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Fusion of an Ensemble of Augmented Image Detectors for Robust Object Detection

1
Mississippi State University, Electrical and Computer Engineering Department, Starkville, MS 39759, USA
2
University of Missouri-Columbia, Electrical Engineering and Computer Science Department, Columbia, MO 65211, USA
*
Author to whom correspondence should be addressed.
Sensors 2018, 18(3), 894; https://doi.org/10.3390/s18030894
Submission received: 6 February 2018 / Revised: 14 March 2018 / Accepted: 15 March 2018 / Published: 17 March 2018
(This article belongs to the Special Issue Sensor Signal and Information Processing)

Abstract

:
A significant challenge in object detection is accurate identification of an object’s position in image space, whereas one algorithm with one set of parameters is usually not enough, and the fusion of multiple algorithms and/or parameters can lead to more robust results. Herein, a new computational intelligence fusion approach based on the dynamic analysis of agreement among object detection outputs is proposed. Furthermore, we propose an online versus just in training image augmentation strategy. Experiments comparing the results both with and without fusion are presented. We demonstrate that the augmented and fused combination results are the best, with respect to higher accuracy rates and reduction of outlier influences. The approach is demonstrated in the context of cone, pedestrian and box detection for Advanced Driver Assistance Systems (ADAS) applications.

1. Introduction

Object detection is an important and active area in machine learning research. In many instances, especially for Advanced Driver Assistance Systems (ADAS), it is important to accurately localize objects in real time. Due to the development of deep learning, the localization accuracy for object detection has largely been improved. However, in our experimenting with deep learning for object detection (such as detecting pedestrians), we noticed that even with a well-trained network with image augmentation (such as translation, rotation, stretching) during training, changes in the image characteristics such as brightness or contrast can still have a large effect on the detection result. Based on these observations, we hypothesize that presenting a deep network with multiple augmented images during testing and fusing the results could result in a more robust detection system. Herein, we develop a system utilizing image augmentation combined with Axis-Aligned Bounding Box Fuzzy Integral (AABBFI)-based fusion to enhance the detection results. The fusion method applied in this paper originates from the field of computational intelligence. This method analyses the agreement among object detection outputs and fuses them dynamically. We choose not to use a supervised learning-based method (learn the fusion from training data), because the fusion method in this scenario cannot be learned in general, as the “optimal” fusion result changes from case to case. Specifically, even with the same inputs are to be fused, the expected fusion result is different when the environmental surroundings and/or detection object type changes. Instead, the method we apply in this paper automatically evaluates the characteristics among inputs for each case and fuses the detection results dynamically.
The primary research task we were investigating for this paper is developing a robust detection sub-system for ADAS. During road construction, street repairs and accidents, often, traffic lanes are quarantined with barrels or cones. Furthermore, ADAS detect pedestrians to estimate their locations and help with collision avoidance. In our specific industrial project, we also need to detect boxes. This motivated the study of cone, pedestrian and box detection herein, and a dataset consisting of traffic cones, pedestrians and boxes has been collected and analyzed. In the experimental results, we also include results using the PASCAL VOC (Visual Object Classes) dataset [1] for generalization purposes.
This paper shows that the proposed method gives better detection results than both the original non-fusion results and the average/median fusion results. Specifically, the contributions of this work are:
  • A detection fusion system is proposed, which uses online image augmentation before the detection stage (i.e., during testing) and fusion after to increase detection accuracy and robustness.
  • The proposed fusion method is a computationally-intelligent approach, based on the dynamic analysis of agreement among inputs for each case.
  • The proposed system produces more accurate detection results in real time; therefore, it helps with developing an accurate and fast object detection sub-system for robust ADAS.
  • The Choquet Integral (ChI) is extended from a one-dimensional interval to a two-dimensional axis-aligned bounding box (AABB).
The following acronyms and mathematical nomenclature, shown in Table 1, are used in the paper.
This paper is organized as follows: Section 2 introduces basic concepts related to the Fuzzy Integral (FI). Furthermore, it introduces recent developments in object detection for ADAS, image augmentation in deep learning and model ensembles. Section 3 discusses the proposed fusion system, and Section 4 gives synthetic and ADAS experimental examples showing how fusion and the system work. Finally, Section 5 contains conclusions and future work.

2. Background

In the proposed detection fusion system, a fusion method from the field of computational intelligence is applied after the detection stage to increase the detection accuracy. There are various methods performing fusion in a computationally-intelligent way, and one example is in [2,3]. Herein, the Fuzzy Integral (FI), a parametric nonlinear aggregation operator, is used for fusion [4,5,6]. To facilitate a better understanding of this fusion method, in this section, the definitions of Fuzzy Measure (FM), Choquet Integral (ChI), interval-valued fuzzy integral and FM of agreement are reviewed. Next, object detection for ADAS, image augmentation in deep learning and model ensembles are discussed.

2.1. Fuzzy Measure

The ChI is defined with respect to the Fuzzy Measure (FM). The FM is the modeling of the worth of the individual inputs and their various interactions. Ultimately, once we select an FM, the ChI becomes a specific operator.
Let X = { x 1 , . . . , x n } be a set of n information inputs (e.g., experts, sensors, algorithms, etc.), where x i represents the i-th input. For example, in our application, x i is the i-th AABB. The definition of FM is as follows,
Definition 1 (Fuzzy measure).
For a finite set X, a measure g: 2 X [0,1] is an FM if it has the following properties:
  • (Normality) g ( ) = 0 ,
  • (Monotonicity) If A , B 2 X and A B X , then g ( A ) g ( B ) 1 .
Note, often, g ( X ) = 1 for problems like confidence/decision fusion. Property 2 of the FM states that g is monotone. For example, if there are three inputs { x 1 , x 2 , x 3 } , then the FM g ( { x 1 , x 2 , x 3 } ) m a x g ( { x 1 , x 2 } ) , g ( { x 1 , x 3 } ) , g ( { x 2 , x 3 } ) and g ( { x 1 , x 2 } ) m a x ( g ( { x 1 } ) , g ( { x 2 } ) ) . What this means is adding inputs never decreases the measure.
The FM (g) lattice (a graph that shows the variables and the minimal set of required monotonicity constraints as edges) for three inputs ( N = 3 ) is shown in Figure 1. In the first layer, the variables are only for a single input. In the second layer, variables are for two inputs, and so forth.

2.2. Choquet Integral

Many variants of the fuzzy integral have been put forth to date [6], e.g., the Sugeno FI [4], the Choquet Integral (ChI) [5], etc. Herein, we use the ChI, as it produces results anywhere between the minimum and maximum inputs. The Sugeno FI only yields one of the N inputs or 2 N FM variable values due to its min/max formulation.
Definition 2 (Choquet integral).
Let h ( x i ) represent real-valued evidence from input x i . Let g ( { x i , . . . , x j } ) represent the FM on inputs x i , . . . , x j . Let π be a permutation of X, such that h ( x π ( 1 ) ) h ( x π ( 2 ) ) , . . . , h ( x π ( n ) ) , A i = { x π ( 1 ) , . . . , x π ( i ) } and g ( A 0 ) = 0 . Let h : X be a real-valued function that represents inputs. The ChI is:
c h g = C g ( h ) = i = 1 n h ( x π ( i ) ) [ g ( A i ) g ( A i 1 ) ] .
An example showing this calculation is shown in Section 4.1.

2.3. Interval-Valued Fuzzy Integral

In some cases, evidence h is not represented as a single value, but as an interval. Intervals capture uncertainty at a level of granularity that is acceptable for many applications. For example, a radar might measure range and give a value, but this value has uncertainty, so it could be represented as an interval.
Definition 3 (Interval-valued fuzzy integral).
Let h ¯ i I be the continuous interval-valued evidence from input x i , and let [ h ¯ i ] [ h ¯ i ] + be the left and right endpoints of interval h ¯ i , respectively. The interval-valued FI is [6]:
h ¯ g = [ [ h ¯ ] g , [ h ¯ ] + g ] .
This equation means that interval-valued input breaks down into the extreme (interval boundaries) case. This is the same for set-valued input, as well. In [7], there is a review of different extensions of the FI for uncertain h and/or g.

2.4. Fuzzy Measure of Agreement

The FM can be (i) specified by an expert, (ii) learned from the training data, (iii) input from densities or (iv) extracted from the current observation (this paper). One example to extract the FM from the current observation is the FM of agreement proposed in [8,9,10].
The motivation for the proposal of the FM of agreement is that sometimes, experts’ estimation or the ground-truth can be challenging to obtain, and all we have is the data themselves. This means that we have the inputs, but we do not know their “worth”. How the FM of agreement decides the “worth” of each input is by calculating the amount of agreement between each input and other inputs. Herein, agreement means the amount of overlap among different inputs. In the extreme case, if one input has no overlap with any other inputs, the FM of agreement for two-tuples is zero.
The following demonstrates the way to calculate the FM of agreement when the available evidence h ¯ = { h ¯ 1 , . . . , h ¯ n } is interval-valued.
Let A ¯ i = { h ¯ π ( 1 ) , . . . , h ¯ π ( i ) } be the permuted set of intervals and z i be the weight of each term, where z 2 z 3 . . . z n . In [8], z i = i / n and:
g ˜ A G ( A ¯ 0 ) = g ˜ A G ( A ¯ 1 ) = 0 ,
g ˜ A G ( A ¯ i ) = | k 1 = 1 i 1 k 2 = k 1 + 1 i h ¯ π ( k 1 ) h ¯ π ( k 2 ) | z 2 + | k 1 = 1 i 2 k 2 = k 1 + 1 i 1 k 3 = k 2 + 1 i h ¯ π ( k 1 ) h ¯ π ( k 2 ) h ¯ π ( k 3 ) | z 3 + . . . + | h ¯ π ( 1 ) h ¯ π ( 2 ) . . . h ¯ π ( i ) | z i ,
g A G ( A ¯ i ) = g ˜ A G ( A ¯ i ) g ˜ A G ( h ¯ ) , i = [ 2 : n ] .
Equation (3a) means that there is no “worth” for the empty and one-element set, because we need at least two elements to compare. An example showing the calculation of the FM using Equations (3a)–(3c) is given in Section 4.1.

2.5. Object Detection Using Deep Learning in ADAS

In recent years, deep learning has become the focus of much research. The beginning of the surge in deep learning was the winning of the ImageNet Large-Scale Visual Recognition Challenge (ILSVRC) [11] by AlexNet [12] developed by Alex Krizhevsky et al. Since then, deep learning has been integrated in many systems with outstanding performance, as shown in [13,14,15,16].
Due to the development of deep learning, the accuracy of object detection in images has largely been improved. Examples of these object detectors includes: YOLO [17,18], Faster R-CNN [19], Multibox [20], Region-based Fully Convolutional Networks (R-FCN) [21] and the Single Shot multibox Detector (SSD) [22]. Furthermore, there are various methods focusing on improving localization accuracy. One approach utilizes a probabilistic method. One example of this approach is called an object Localization Network (LocNet) [23], which relies on assigning conditional probabilities to rows and columns of the bounding box. LocNet exceeds the performance of Fast R-CNN [24], but it has been surpassed by Faster R-CNN [19]. A second approach focuses on improvement of Non-Maximum Suppression (NMS) [25]. One example is the so–called Gossip Net (Gnet) [26], which incorporates NMS into the detection network, but requires a large number of training data. In another example, the authors gave slight modification to NMS, but the improvement typically only happens in some specific cases [27]. A third type of approach uses neural networks to refine the localization. One example is RefineNet [28], which iteratively pools features from previous predictions. However, its performance using deeper networks is yet to be studied. Our approach is different from these three types. We use a computationally-intelligent method to fuse different detection results obtained from augmented images.
For ADAS, two of the most important metrics for the object detection sub-system are accuracy and speed. When using ADAS to help a driver in the process of driving, we first need the system to accurately detect objects near or far, big or small in various environmental conditions. Misdetection or false detection could possibly lead to disasters. Second, the detection needs to be in real time. In our application for an industrial collision avoidance system, the maximum speed of the vehicle is about 5 m per second, which is roughly 18 km/h. To guarantee a safe stop for collision avoidance, the maximum computational time is 0.2 s, so real time in our application is defined as having a detection rate of 5 Hz or above. Other systems with different parameters will have different requirements.

2.6. Image Augmentation

In many deep learning systems, there is a large number of parameters to be estimated, and thus, a large amount of training data is required. Often, augmentation techniques such as image translation, rotation, stretching, shearing, rescaling, etc., are utilized to provide augmented imagery for training, and these image augmentation techniques during training often help the system be more robust. After performing a thorough literature search, we found that there were rarely any previously published systems that utilized multiple augmentations and fusion for processing test images. One system is Howard’s [29] entry for ILSVRC [11] in 2013, in which he modified the winning 2012 entry [12] by adding augmentations in both training and testing. The training augmentations were (1) extended pixel crops, (2) horizontal flips and (3) manipulating the contrast, brightness and color. For testing, a combination of 5 translations, 2 flips, 3 scales and 3 views yielded 90 enhanced images. A greedy algorithm then down-selected this to the top ten predictions, which were combined to form the final result. However, this augmentation employed during testing [29] yielded an increased classification accuracy, but did not improve detection localization accuracy.

2.7. Model Ensembles

In order to improve performance during testing and add some robustness to the system, one idea is to utilize ensembles of multiple models. In this approach, one would train multiple models and average their predictions during the test time. One example is in a YOLO paper [17], where the authors combined Faster R-CNN and YOLO together and obtained some performance improvement. In [30], rather than training separate models independently, the authors kept multiple snapshots of the model during training. At test time, they averaged the predictions of these multiple snapshots.
Malisiewicz et al. [31] trained a linear SVM for each class in the training set. The main disadvantage is each class requires millions of negative examples to train. Szegedy et al. [20] demonstrated that proposal generation can be learned from data (vs. hand-crafted) and utilized an ensemble approach to aggregate detections. Their solution was limited to one object per grid entry with a course grid, vs. YOLO, which has a finer grid and allows multiple objects to be detected per grid location. Maree et al. [32] utilized ensembles of extremely randomized decision trees and randomly extracted subwindows for object detection. The tree sizes were very large, and this method may not be appropriate for a real-time system. There are also unsupervised methods such as applying an ensemble clustering to extract ROIs from low depth of field images by Rafiee et al. [33]. Performance improvements could be obtained if this were a supervised method.
There are two major differences between the model ensemble approach and our proposed method. First, instead of using multiple models, we use one model, and we change the inputs of the model instead of the model itself. Second, instead of averaging all predictions, we propose a computationally-intelligent method to fuse all predictions together.

3. Proposed System

3.1. Overview

For the proposed system, during the in-line (testing) phase, the input goes through three stages. First, the input is augmented to produce several variations, so we can have augmented inputs for future stages. Second, a detector is applied to obtain AABBs and related labels in each augmented image. Practically, this would be implemented by applying multiple detectors in parallel, one for each of the augmented images. This system can handle multiple objects in the input image. The largest number of detected objects in the augmented inputs is chosen as the number of objects (S) in the input. For example, suppose three augmented images provide 3, 2 and 2 detections; we then choose the conservative approach and set S = 3 . All AABBs are grouped for each object using k-means clustering [34], where k equals S. Third, for each object, a certain number of AABBs with the top T confidence scores in augmented inputs is selected, where T can be any integer that is equal to or smaller than the number of augmented inputs (M). Then, the AABBFI fusion method is used to fuse the T AABBs to obtain one AABB for each object in the input. In the ADAS examples in Section 4, we use three AABBs for tractability, but more AABBs can be fused using the method proposed in [35].
In summary, the system produces variations of each input, detects objects in each variation and fuses the top T results for each object, with the expectation of getting a more accurate AABB for each object in the input. The overview of the proposed system is shown in Figure 2, and Algorithm 1 is a formal description of the proposed system.
In the following paragraphs, each part of the proposed system, including augmentation, detection and fusion, is discussed in detail.
Algorithm 1 Algorithm for the proposed detection fusion system.
  • input: input: i m a g e I
  • output: fused AABBs for S objects: { B ^ 1 , B ^ 2 , . . . , B ^ S }
  • global: augmentation methods: { P 1 , P 2 , . . . , P M }
  • global: augmented inputs: { I ^ 1 , I ^ 2 , . . . , I ^ M }
  • global: number of objects in input: S
  • global: AABBs for all objects: { B 1 , B 2 , . . . , B X }
  • global: labels for all objects: { l 1 , l 2 , . . . , l X }
  • global: AABBs for each object: { B 1 , B 2 , . . . , B N } , N may vary
  • global: labels for each object: { l 1 , l 2 , . . . , l N } , N may vary
  • global: Number of AABBs to be fused: T
  • start:
  • for each augmentation method in { P 1 , P 2 , . . . , P M } do
  •     Use the augmentation method on I to obtain augmented inputs { I ^ 1 , I ^ 2 , . . . , I ^ M } .
  • Use the detector to get { B 1 , B 2 , . . . , B X } and { l 1 , l 2 , . . . , l X } for all objects of all augmented inputs.
  • Choose the largest number of detection in each variation as S.
  • Group the detection into S object groups using k-means clustering [34], where k equals S.
  • for k from 1 to S do
  •     Choose the grouped detection results { B 1 , B 2 , . . . , B N } and { l 1 , l 2 , . . . , l N } for each object, where these N detection results from N augmented images correspond to the same object. Here, N may vary.
  •     Choose the majority in { l 1 , l 2 , . . . , l N } as the object label.
  •     if N 3 then
  •         Fuse T AABBs with the top T confidence scores using AABBFI to get B ^ k
  •     else if N = 2 then.
  •         Average the AABBs to get B ^ k .
  •     else if N = 1 then
  •         Use only this detection AABB as B ^ k .
  •     else if N = 0 then
  •          B ^ k = N o n e .
  • return { B ^ 1 , B ^ 2 , . . . , B ^ S } .

3.2. Augmentation

For augmentation of each input, the goal is to produce a range of inputs. The “optimal” augmentation cannot be determined algorithmically, and it varies depending on the type of objects detected, the image background, etc. Instead, a range of images of varying quality is generated and presented to the detector. The augmentation methods used herein include changing brightness, contrast, edge enhancement, global histogram equalization, Gaussian blurring and adding independent and identically distributed (IID) Gaussian noise to simulate different scenarios. Although there are other augmentation methods, in this initial work, we choose to focus on basic operations, which we have already shown lead to success. Future investigations can study other more complicated local and global operators.
In order to see whether all these basic augmentation methods work for the final result, we choose 17 of them to test on 572 images of traffic cones and summarize the choice of each augmentation method. During testing, each augmentation method that is chosen by the proposed algorithm as the top three choices is tallied. Detection algorithms usually output confidence scores (as in YOLO [17,18]) or objectness scores (as in Faster R-CNN [19]) for each detected object. Herein, we use these scores to determine the top choices.
We run our system and count how many times each enhancement method is chosen. The results are as shown in Figure 3. The number of times selected for each augmentation method is shown on the x-axis. The different augmentation methods are listed on the y-axis, including the parameters for each method. For example, “brightness with factor 0.25” means the image is darker than the original image, while “brightness with factor 2” is two times brighter than the original image.
From Figure 3, we can see that each augmentation method is chosen in certain scenarios as one of the top three choices. For each method, if it is chosen equally, the average number of chosen times would be around 95, as shown in the figure as a red line. In Figure 3, the highest number of chosen times is 188, when using contrast with factor 1.5. The lowest chosen times is 21, when using contrast with factor 0.25. However, all these numbers fluctuate around the average 95, which means that each augmentation method has a certain influence on the final result, which cannot be ignored. This figure also shows that there is really no overall “magic-bullet” method that universally helps for all images and the detection of all objects.
As the computational time scales linearly with the number of augmentation methods, we want to evaluate how the performance of the fusion system changes as the number of augmentation methods increases. In order to do this, the methods shown in Figure 3 are sorted in descending order based on the number of times each was selected during training. The original image without any augmentation is used as a starting point. For M augmented images, the M methods that were selected the most often are utilized. For instance, when using M = 3 augmented images, the contrast with factor 1.5 and contrast with factor 2 methods are chosen. Together with the original image, we can have three input images. The results are shown in Figure 4. From this figure, we can see that the performance reaches the highest point when we choose all 18 augmentation methods. However, the results also show fluctuations between one and 11 methods. It is important to note that when the number of augmentation methods is three, the performance reaches a local maximum point. This means that although the general trend line is going up, when computational resources are limited or there is higher speed requirement, we can choose three methods instead of 18 and still get improved performance. In Figure 4, the number of augmented methods is varied, and the IoU fusion result is calculated. The fusion really only occurs when M 3 methods are used. The dashed vertical lines show the limits of what was examined in this paper, the M = 3 to M = 18 cases. The dashed blue line shows a trend line fitted to the data. The red dashed lines show the minimum (3) and maximum (18) number of augmentation methods investigated. The solid blue line shows the data trend (the data points are blue dots).

3.3. Detection

There are basically two types of detection (localization) methods using deep learning. One type is based on region proposals, and one example is Faster R-CNN [19]. For Faster R-CNN, the input image first runs through some convolutional layers to obtain a feature map representing the entire image, then there is a separate region proposal network, which works on top of the convolutional feature map and predicts its region proposals. Once we have these predicted region proposals, we pass them up to the rest of the network to get a classification of these regions. Therefore, there are two parts in the network; one is for proposing regions, and the other is for classification.
The other type of detection method detects without proposing possible regions. Instead, it localizes and classifies objects using one giant convolutional network. One typical example for this type of detector is called YOLO [17,18]. Given an input image, YOLO first divides it into some coarse grids. Within each of these grid cells, YOLO assigns some base bounding boxes. For each of these base bounding boxes, YOLO predicts an offset off the base bounding box to predict what is the true location of the object off this base bounding box, a confidence score for the location and classification scores. To summarize, YOLO uses a single neural network for simultaneously predicting the location of the object, the confidence score for the location and classification scores.
Compared with methods based on region proposals, YOLO is considered to be real time, but it also has relatively high detection accuracy. One version of YOLO training on the PASCAL VOC dataset [1] can achieve 40 Frames Per Second (FPS) and 78.6 mean Average Precision (mAP), while with the same training dataset, Faster R-CNN obtains 70 mAP and 0.5 FPS. In the YOLO paper [17], the authors admitted that they struggled to localize small objects, which can be mitigated by training special detectors for small objects, as shown in [36].
One thing we observe from the experiment is that YOLO is more sensitive to input changes than Faster R-CNN, which means that there would be more variety in YOLO’s outputs. This variety is a good fit for our proposed AABBFI method to produce a more accurate result. Therefore, YOLOv2 [18] is chosen in our proposed system to achieve real-time accurate detection for robust ADAS.

3.4. Fusion

For the fusion part, the FM of agreement as defined in Section 2.4 is used. Herein, the AABB Fuzzy Integral (AABBFI) is proposed to fuse AABBs.
In this paper, evidence is represented as an AABB. In other words, evidence is an AABB indicating where the network delineated the detected object’s boundaries. For example, an AABB can be represented by the coordinates of upper-left and bottom-right vertices, such as [ 1 , 2 , 3 , 4 ] , which means that the coordinates for the upper-left vertex are [ 1 , 2 ] , and the coordinates for the bottom-right vertex are [ 3 , 4 ] . However, the FI have only been extended to one-dimensional interval-valued information. Herein, we extended it to two dimensions and specifically AABBs. Note, the advantages of an AABB are that (i) it is a convex and normal set and (ii) it can easily be decomposed without loss into two separate intervals, one on the row and one on the column axis. Hereby, the AABBFI is defined as follows:
Definition 4 (AABB fuzzy integral).
Let h i ¯ ¯ be the AABB evidence from the i-th input. Let h x , i ¯ ¯ I be the interval-valued evidence for the x-axis of the i-th AABB from the i-th input. Furthermore, let [ h x , i ¯ ¯ ] and [ h x , i ¯ ¯ ] + be the left and right endpoints of interval h x , i ¯ ¯ . In the same way, let h y , i ¯ ¯ I be the interval-valued evidence from AABB’s y-axis from the i-th input, and let [ h y , i ¯ ¯ ] and [ h y , i ¯ ¯ ] + be the top and bottom endpoints of interval h y , i ¯ ¯ . Herein, the membership at each location of the AABB is assumed to be one. The AABBFI can be computed as follows,
h ¯ ¯ g = [ [ h x ¯ ¯ ] g , [ h y ¯ ¯ ] g , [ h x ¯ ¯ ] + g , [ h y ¯ ¯ ] + g ] .
Because an AABB is convex and the heights of all of our sets are one, we can disregard the third dimension (the “value” at each location in the AABB). These AABBs are assumed herein to be binary sets. Furthermore, the axis-aligned convexity makes proving Equation (4) trivial because it is easily decomposed; meaning each AABB can clearly be represented by the union of two closed intervals, and one can compute that as two separate individual interval-valued integrals and union the result (verifiable by the extension principle [37]).

4. Examples and Discussion

In order to explain and validate the AABBFI fusion method, three synthetic examples are given. Then real-world ADAS examples are analyzed to reinforce the proposed system’s efficacy.
For comparison with the proposed fusion method, two expected value operations, average and median, are chosen. They are two of the most commonly-used methods for summarizing multiple inputs into one output, and median operation is supposed to be robust to noise.

4.1. Synthetic Examples

The following are three synthetic examples of different scenarios, where the first example has three similar AABBs; the second example has three AABBs with one outlier; and third example has three AABBs with one extreme outlier. These three different synthetic examples show how this fusion process works and give us some intuition about why the proposed AABBFI method works better than average and median operations.
Example 1.
Three similar AABBs:
In the first example, there are three AABBs to be fused. The reason these AABBs are chosen is that they have the same size, and they overlap, which means that they are similar. The top and bottom vertices’ coordinates ( [ x t o p , y t o p , x b o t t o m , y b o t t o m ] ) are used to represent each AABB. The coordinates of the three AABBs are [ 1 , 1 , 4 , 6 ] , [ 2 , 2 , 5 , 7 ] , [ 3 , 3 , 6 , 8 ] , as shown in Figure 5. Note that the x and y axes units are arbitrary units of measure. The lattice of the FM of agreement is shown in Figure 6. The result using the proposed AABBFI method is shown in Figure 5 with the red dashed line, while the average result is shown with the yellow dashed line, and the median result is shown with the purple dashed line for comparison. The coordinates of the AABB obtained from the proposed AABBFI method are [ 1.44 , 1.42 , 4.44 , 6.42 ] ; the average AABB’s coordinates are [ 2 , 2 , 5 , 7 ] ; and the median AABB’s coordinates are [ 2 , 2 , 5 , 7 ] .
For the calculation of the FM of agreement, take the calculation of g ( { x 1 , x 2 } ) as an example. For the x-axis, the three intervals to be fused are x 1 = [ 1 , 4 ] , x 2 = [ 2 , 5 ] and x 3 = [ 3 , 6 ] . From Equation (3b), we have:
g ˜ A G ( { x 1 , x 2 } ) = | [ 1 , 4 ] [ 2 , 5 ] | × 2 3 = | [ 2 , 4 ] | × 2 3 = 2 × 2 3 = 4 3
g ˜ A G ( { x 1 , x 2 , x 3 } ) = | ( [ 1 , 4 ] [ 2 , 5 ] ) ( [ 1 , 4 ] [ 3 , 6 ] ) ( [ 2 , 5 ] [ 3 , 6 ] ) | × 2 3 + | [ 1 , 4 ] [ 2 , 5 ] [ 3 , 6 ] | × 3 3 = | [ 2 , 4 ] [ 3 , 4 ] [ 3 , 5 ] | × 2 3 + | [ 3 , 4 ] | × 3 3 = | [ 2 , 5 ] | × 2 3 + 1 × 3 3 = 3 × 2 3 + 1 = 3
From Equation (3c), the calculation is:
g A G ( { x 1 , x 2 } ) = 4 3 3 = 4 9 0.44 .
This value is shown in the shaded box in Figure 6a.
Next, we show how to calculate the x t o p coordinate using the proposed method. The x t o p coordinates from the three AABBs are 1, 2 and 3, which means that the permutation sorting gives [ h ¯ ¯ ( x π ( 1 ) ) ] = 3 ,   [ h ¯ ¯ ( x π ( 2 ) ) ] = 2 ,   [ h ¯ ¯ ( x π ( 3 ) ) ] = 1 . By using the FM in Figure 6a, we can calculate the x t o p using Equations (1) and (4) as follows:
x t o p = [ h x ¯ ¯ ] g = 3 × [ g ( { x 3 } ) 0 ] + 2 × [ g ( { x 2 , x 3 } ) g ( { x 3 } ) ] + 1 × [ g ( { x 1 , x 2 , x 3 } ) g ( { x 2 , x 3 } ) ] = 3 × ( 0 0 ) + 2 × ( 0.44 0 ) + 1 × ( 1 0.44 ) = 1.44 .
In this example, three AABBs are similar, with the same size and overlapping with each other. Therefore, we expect the fused AABB to be influenced by all three AABBs, both in shape and position. From the result, we can see that the majority of the proposed AABB is the overlapping area of the three AABBs, and it has the same size, just like our expectation. On the other hand, the average AABB and median AABB are exactly the same as AABB 2, which may be or may not be influenced by AABB 1 and AABB 3. In the case of fusing three similar AABBs, the proposed method gives a result that fits our natural expectations.
Example 2.
Three AABBs with one outlier:
In the second example, there are three AABBs to be fused, with one possible outlier being AABB 3, as AABB 3 has no overlapping area with AABBs 1 and 2. The three AABBs are [ 1 , 1 , 4 , 6 ] , [ 2 , 2 , 5 , 7 ] , [ 7 , 4 , 10 , 9 ] , as shown in Figure 7. The lattice of the FM of agreement is shown in Figure 8. The proposed AABBFI result is shown in Figure 7 with the red dashed line, with the average result with the yellow dashed line and median result with the purple dashed line. The proposed AABB’s coordinates are [ 1 , 1.38 , 4 , 6.38 ] ; the average AABB’s coordinates are [ 3.33 , 2.33 , 6.33 , 7.33 ] ; and the median AABB’s coordinates are [ 2 , 2 , 5 , 7 ] .
In this example, AABB 3 has no overlap with the other two AABBs, and it seems like an outlier even though it is the same size. We expect that the fused result should have more agreement with the first two AABBs. From the result, it is shown that the AABB from the proposed AABBFI method is most similar to AABB 1 and influenced by AABB 2 without any overlap with possible outlier AABB 3. On the other hand, if averaging the three AABBs, the result is shifted towards AABB 3, which means that the average result is influenced heavily by AABB 3. The median result is again the same as AABB 2, without any influence from either AABB 1 or AABB 3. The two results by average and median operations do not fit our expectation, while the result produced by the AABBFI method fits our expectation that the fused result is largely influenced by AABB 1 and AABB 2, with little influence from AABB 3.
Example 3.
Three AABBs with one extreme outlier:
In the third example, there are three AABBs to be fused with one obvious outlier AABB 3, which has a much smaller size than the other two and has no overlapping area. The three AABBs are [ 1 , 1 , 4 , 6 ] , [ 2 , 2 , 5 , 7 ] , [ 7 , 8 , 8 , 9 ] , as shown in Figure 9. The lattice of the FM of agreement is shown in Figure 10. The result from the proposed AABBFI method is shown in Figure 9 with the red dashed line. The average result is shown with the yellow dashed line and the median result with the purple dashed line. The proposed AABB’s coordinates are [ 1 , 1 , 4 , 6 ] ; the average AABB’s coordinates are [ 3.33 , 3.66 , 5.67 , 7.33 ] ; and the median AABB’s coordinates are [ 2 , 2 , 5 , 7 ] .
In this example, AABB 3 looks like an obvious outlier and should not influence the final fused result at all. From the fused result using the AABBFI method, we can see that the fused AABB is the same as AABB 1, without any influence from AABB 3, which is the same as our expectation. On the other hand, the average AABB is largely influenced by AABB 3. The average AABB not only shifts towards AABB 3, but also shrinks in size, which is different from our expectation. Once again, the median result is the same as AABB 2. Comparing the three fusion results, AABB by the proposed AABBFI fits our expectation most.

4.2. ADAS Examples

In the ADAS examples, we focus on the accurate detection of three types of objects: cones, pedestrians and boxes. The proposed system is also tested on all of the PASCAL VOC 2007 testing dataset, and mAP is calculated to show general improvement on detection [1,38].
One metric for measuring the accuracy of an object detector is called Intersection over Union (IoU), also known as the Jaccard index [39]. This index is used to compute the similarity between finite sets. Suppose we have two sets A and B, which could be two AABBs. To measure similarity between them, IoU can be used and is calculated as follows,
I o U = J ( A , B ) = A r e a o f O v e r l a p A r e a o f U n i o n = | A B | | A B | .
Herein, we use IoU as the primary metric for detection accuracy. We also utilize mAP to provide a metric that can be compared to many results in the literature.

4.2.1. Augmentation Methods

In the experiments performed, the Python Imaging Library (PIL) is utilized [40] to obtain augmented images. In PIL brightness and contrast enhancement classes, a factor is used for the change of brightness and contrast. When this factor is one, it gives the original image. Based on the experimental evaluation, in ADAS examples, factor values are chosen to be 1, 0.25, 0.5, 1.5, 2.0 and 2.5 for brightness and contrast. To add Gaussian noise, the noise variance is chosen to be 0.001, 0.003 and 0.005. This is based on qualitative image assessment, since these noise levels do not drastically alter the appearance of the input image. Other augmentation methods, including edge enhancement, global histogram equalization and Gaussian blurring (radius = 2), are predefined image operations in PIL.

4.2.2. Datasets

The primary research task is developing a robust system for ADAS, and two of the major objects that are crucial for detection in ADAS are traffic cones and pedestrians. In our specific industrial application, we also need to detect boxes, because they are commonplace items in our project’s industrial setting. Therefore, we collect cone, pedestrian and box images in controlled scenarios, which produce variations in different angles and distances. Specifically, the image dataset is collected using an FLIR Chameleon3 USB camera with a Fujinon 6-mm lens. Training images also include images taken by a Nikon D7000 camera and images from the PASCAL VOC dataset [1]. The total number of training images is around 22,000. For testing images, one cone, pedestrian or box is randomly placed or stands at different locations from 5 m to 20 m away and −20 degrees to +20 degrees in azimuth (left to right) from the camera, which covers the FLIR camera’s full field of view horizontally and the detection range. For traffic cones, there are 287 testing images; for pedestrian, there are 208 testing images; and for boxes, there are 200 testing images. For generalization purposes, we also show results for the PASCAL VOC 2007 test dataset [1].

4.2.3. Training Parameters

The network structure for YOLO is basically the same as the default structure of YOLOv2 [18] except the last layer. YOLOv2 divides each image into 13 by 13 grids. For our application, we predict five base bounding boxes for each grid in the image. For each box, there are 4 numbers (for the top left and bottom right coordinates of the AABB), 1 confidence score and 5 class scores. Therefore, we change the filter size to 13 × 13 × 50 ( 5 × ( 4 + 1 + 5 ) = 50 ) in the last layer. We also change the learning rate to 10 5 to avoid divergence. We use a batch size of 64, a momentum of 0.9 and a decay of 0.0005, which are the same as those in the original YOLOv2 configuration.
For Faster R-CNN, the model is trained with a VGG net. Most parameters are set to be the same as the original Faster R-CNN [19]. The changes are as follows: the number of classes is modified to five; the number of outputs in the class score layer is modified to five; the number of outputs in the bounding box prediction layer is modified to 20 ( 4 × 5 ).

4.2.4. Results

Figure 11 is one example image for pedestrian detection with ground-truth AABB, three AABBs from different augmented images and fused AABB using the proposed method. In this image, the yellow AABB is the ground-truth, which is human-determined and hand-labeled. Three augmentation methods are chosen, which are global histogram equalization, changing contrast with factor two and changing brightness with factor 2.5. The AABBs obtained from these augmented images are shown in white. The fused AABB using the proposed AABBFI method is shown in pink.
The value of g ( { x 2 , x 3 } ) for the FM of agreement on the x-axis for cone detection is shown in Figure 12. From this figure, we can see that the value of the FM of agreement substantially changes from case to case. In other words, for each detection, the proposed fusion method gives different “weight” to each AABB, unlike the average operation, which gives the same “weight” around 0 . 33 when the number of AABBs to be fused is three.
In the experiment, we use a PC with an Intel i5-4460 dual-core CPU and one Nvidia GTX 1080 GPU. The computational overhead for AABBFI-based fusion is around 2.15 milliseconds (466 FPS), while for processing 10 augmented inputs, it is around 142.86 milliseconds (7 FPS). The fusion overhead is small compared to the overhead for using multiple inputs. The computational load is linear with the number of given inputs. More discussion about computational complexity is given in Section 4.3.
All ADAS experiment results are shown in Table 2. In this table, the “No fusion” column means that the results are detection outputs from the original images without any fusion method applied. Under the “With fusion” section, four fusion methods are listed: NMS, average, median and the proposed AABBFI. For all five fusion/non-fusion methods, the average IoU obtained and the number of detections are listed. We find that for cones, pedestrians and boxes, the highest accuracy and detection happen when using the proposed AABBFI method together with YOLO. For the PASCAL VOC dataset [1], we use the threshold of 0.25 for the confidence score to calculate mAP, and we find that after fusion, not only the average IoU increases, but also mAP increases.
In Table 2, we also include results on detecting pedestrians using Faster R-CNN [19]. Comparing the results, it is shown that YOLO outperforms Faster R-CNN both in accuracy and detection. Moreover, in the case that we choose Faster R-CNN as the detector, the AABBFI method does not help with accuracy compared with the average and median methods. Furthermore, Table 2 shows that mAP improves by using fusion. The mAP improved the most by using the proposed method. In Table 2, the best results are shown in bold.

4.3. Discussion

From the synthetic results, it is clear that with the presence of possible or obvious outliers, the proposed AABBFI method can fuse the AABBs in a way more similar to our expectation, and it also can reduce or eliminate the effects of possible or obvious outliers.
From the ADAS experimental results, there is improvement both on IoU and detection by using the proposed AABBFI method together with YOLO. Specifically, in most cases, fusion methods help with increasing detection. It is also shown that comparing with input images’ average IoU without fusion, by using the average, median and proposed fusion methods, the average IoU results increase. Comparing NMS, average, median and the proposed fusion operation, the proposed AABBFI method gives the average IoU the most improvement.
From Figure 12, we can see that unlike the static operations such as average and median, the proposed fusion method is dynamic. The FM of agreement substantially changes from case to case. Consequently, the fusion is done in a detection-by-detection and object-by-object manner. For fusion, we evaluate the FM of agreement among AABBs for each detection and fuse them using a computationally-intelligent method named AABBFI. As mentioned in Section 1, the fusion for detection in this scenario cannot be learned in general and is done in a case-by-case manner in this paper.
For the proposed AABBFI method, it works when the networks have variety in the results. Faster R-CNN is a region proposal-based method, which means that it uses part of its network to propose possible regions that could have objects we want to detect, and this may reduce the variety in the output. On the other hand, YOLO predicts both AABBs and labels through one giant network, which makes it fast. Furthermore, this kind of one-shot network design may produce more variations, which leads to more accurate output by using the AABBFI method. As a result, we choose YOLO together with the AABBFI method in the proposed system. The results from the ADAS experiments show that in cone, pedestrian and box detection, the proposed method gives the best results.
In the ADAS examples, the improvement of both detection and IoU could come from two aspects. First, variation can lead to detection. In the original image, the detector might not be able to detect cones, pedestrians or boxes, but in its variations, the detector may work. Second, fusion based on agreement stabilizes the finally AABB. AABBFI is a dynamic fusion method that produces different result when the “agreement” among inputs changes. NMS is also a dynamic fusion method, but the results using it are not as good as the proposed fusion method. On the other hand, the average and median operations are both static, which means that they do not consider the specific characteristics of each input.
To guarantee a real-time ADAS, we expect that the fusion adds as little computational complexity as possible to the original detection system. The computational complexity of the proposed AABBFI (fusion only) is actually tiny, which is O ( n ) , where n stands for the number of input images. It is the same as NMS, average and median operation. This means that the four fusion methods all have the same low computational complexity and do not add much computational burden to the system. Another thing that may slow down the system is there are multiple augmented inputs that need to be processed. We can avoid the slowdown either via multiple processing units or a more powerful processing unit. This highlight a trade-off in many systems: there are multiple approaches, some more computationally complexity, and some less computationally complexity. Given sufficient hardware resources to keep an appropriate frame rate, the proposed solution is feasible. The computational overhead in Section 4.2.4 shows that with ten augmented images, using our hardware configuration, we can achieve real-time performance in our definition (5 Hz or above).
In summary, from ADAS examples, we find that AABB-based fusion with YOLO produces the highest accuracy and detection results compared with other methods listed. From the synthetic example, we could obtain some rationality behind this improvement. The proposed system increases the accuracy in the detection stage while maintaining the real-time characteristic in the original detection system, which makes this a realistic solution for a real-time domain like ADAS.

5. Conclusions and Future Work

This paper proposed a computational intelligence system for more accurate object detection in real time. This system uses augmentation methods before a deep learning detector and then an AABB fuzzy integral (AABBFI) on the resultant AABBs. Three synthetic examples show the rationality of using the AABBFI rather than NMS/average/median operation. Experimental ADAS examples show that for real-world datasets, the proposed system gives the highest accuracy and detection results, without adding much computational complexity for real-time purposes. Our proposed system is not only fast, but also accurate, which are two important criteria in ADAS. By using this computational intelligence system, we are able to build a more robust object detection sub-system for ADAS applications, with the proposed system showing improvement in both IoU and mAP metrics. Furthermore, very good results were obtained when only utilizing three combined inputs, making the computational load roughly three-times the load for only using one input (the original image).
In the future, our next planned effort includes: (i) exploring different deep learning-based methods, (ii) studying why deep learning-based methods have such sensitivity to input variations, (iii) incorporating the detector’s confidence score in the detection result as height, (iv) non-AABB region fusion (non-convex and non-normal) and (v) using various FMs beyond the FM of agreement.
Finally, we wish to thank the anonymous reviewers for their constructive comments, which have strengthened our paper.

Author Contributions

Pan Wei conceived the proposed algorithm, designed and executed experiments, and wrote a majority of the paper. John Ball and Derek Anderson reviewed experimental results, provided technical guidance, reviewed and authored parts of the paper.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Everingham, M.; Van Gool, L.; Williams, C.K.; Winn, J.; Zisserman, A. The pascal visual object classes (voc) challenge. Int. J. Comput. Vis. 2010, 88, 303–338. [Google Scholar] [CrossRef]
  2. Wei, P.; Ball, J.E.; Anderson, D.T.; Harsh, A.; Archibald, C. Measuring conflict in a Multi-source environment as a normal measure. In Proceedings of the 2015 IEEE 6th International Workshop on Computational Advances in Multi-Sensor Adaptive Processing (CAMSAP), Cancun, Mexico, 13–16 December 2015; pp. 225–228. [Google Scholar]
  3. Wei, P.; Ball, J.E.; Anderson, D.T. Multi-sensor conflict measurement and information fusion. In Signal Processing, Sensor/Information Fusion, and Target Recognition XXV; International Society for Optics and Photonics: Baltimore, MD, USA, 2016; Volume 9842, p. 98420F. [Google Scholar]
  4. Sugeno, M. Theory of Fuzzy Integrals and Its Applications. Ph.D. Thesis, Tokyo Institute of Technology, Tokyo, Japan, 1974. [Google Scholar]
  5. Murofushi, T.; Sugeno, M. An interpretation of fuzzy measures and the Choquet integral as an integral with respect to a fuzzy measure. Fuzzy Sets Syst. 1989, 29, 201–227. [Google Scholar] [CrossRef]
  6. Grabisch, M.; Murofushi, T.; Sugeno, M. Fuzzy Measures and Integrals: Theory and Applications; Physica-Verlag: New York, NY, USA, 2000. [Google Scholar]
  7. Anderson, D.T.; Havens, T.C.; Wagner, C.; Keller, J.M.; Anderson, M.F.; Wescott, D.J. Extension of the fuzzy integral for general fuzzy set-valued information. IEEE Trans. Fuzzy Syst. 2014, 22, 1625–1639. [Google Scholar] [CrossRef]
  8. Wagner, C.; Anderson, D. Extracting meta-measures from data for fuzzy aggregation of crowd sourced information. In Proceedings of the 2012 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), Brisbane, QLD, Australia, 10–15 June 2012; pp. 1–8. [Google Scholar]
  9. Havens, T.; Anderson, D.; Wagner, C.; Deilamsalehy, H.; Wonnacott, D. Fuzzy integrals of crowd-sourced intervals using a measure of generalized accord. In Proceedings of the 2013 IEEE International Conference on Fuzzy Systems (FUZZ), Hyderabad, India, 7–10 July 2013; pp. 1–8. [Google Scholar]
  10. Havens, T.; Anderson, D.; Wagner, C. Data-Informed Fuzzy Measures for Fuzzy Integration of Intervals and Fuzzy Numbers. IEEE Trans. Fuzzy Syst. 2015, 23, 1861–1875. [Google Scholar] [CrossRef]
  11. Deng, J.; Dong, W.; Socher, R.; Li, L.J.; Li, K.; Fei-Fei, L. Imagenet: A large-scale hierarchical image database. In Proceedings of the 2009 IEEE Conference on Computer Vision and Pattern Recognition, Miami, FL, USA, 20–25 June 2009; pp. 248–255. [Google Scholar]
  12. Krizhevsky, A.; Sutskever, I.; Hinton, G.E. Imagenet classification with deep convolutional neural networks. In Advances in Neural Information Processing Systems; NIPS: Stateline, NV, USA, 2012; pp. 1097–1105. [Google Scholar]
  13. Zeiler, M.D.; Fergus, R. Visualizing and understanding convolutional networks. In Proceedings of the European Conference on Computer Vision, Zurich, Switzerland, 6–12 September 2014; Springer: Cham, Switzerland, 2014; pp. 818–833. [Google Scholar]
  14. Simonyan, K.; Zisserman, A. Very deep convolutional networks for large-scale image recognition. arXiv, 2014; arXiv:1409.1556. [Google Scholar]
  15. Szegedy, C.; Liu, W.; Jia, Y.; Sermanet, P.; Reed, S.; Anguelov, D.; Erhan, D.; Vanhoucke, V.; Rabinovich, A. Going deeper with convolutions. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Boston, MA, USA, 7–12 June 2015; pp. 1–9. [Google Scholar]
  16. He, K.; Zhang, X.; Ren, S.; Sun, J. Deep residual learning for image recognition. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Seattle, WA, USA, 27–30 June 2016; pp. 770–778. [Google Scholar]
  17. Redmon, J.; Divvala, S.; Girshick, R.; Farhadi, A. You only look once: Unified, real-time object detection. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Seattle, WA, USA, 27–30 June 2016; pp. 779–788. [Google Scholar]
  18. Redmon, J.; Farhadi, A. YOLO9000: Better, Faster, Stronger. arXiv, 2016; arXiv:1612.08242. [Google Scholar]
  19. Ren, S.; He, K.; Girshick, R.; Sun, J. Faster r-cnn: Towards real-time object detection with region proposal networks. In Advances in Neural Information Processing Systems; NIPS: Montreal, Quebec, Canada, 2015; pp. 91–99. [Google Scholar]
  20. Szegedy, C.; Reed, S.; Erhan, D.; Anguelov, D.; Ioffe, S. Scalable, high-quality object detection. arXiv, 2014; arXiv:1412.1441. [Google Scholar]
  21. Li, Y.; He, K.; Sun, J. R-fcn: Object detection via region-based fully convolutional networks. In Advances in Neural Information Processing Systems; NIPS: Barcelona, Spain, 2016; pp. 379–387. [Google Scholar]
  22. Liu, W.; Anguelov, D.; Erhan, D.; Szegedy, C.; Reed, S.; Fu, C.Y.; Berg, A.C. SSD: Single shot multibox detector. In Proceedings of the European Conference on Computer Vision, Amsterdam, The Netherlands, 8–16 October 2016; Springer: Cham, Switzerland, 2016; pp. 21–37. [Google Scholar]
  23. Gidaris, S.; Komodakis, N. Locnet: Improving localization accuracy for object detection. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Seattle, WA, USA, 27–30 June 2016; pp. 789–798. [Google Scholar]
  24. Girshick, R. Fast r-cnn. arXiv, 2015; arXiv:1504.08083. [Google Scholar]
  25. Felzenszwalb, P.F.; Girshick, R.B.; McAllester, D.; Ramanan, D. Object detection with discriminatively trained part-based models. IEEE Trans. Pattern Anal. Mach. Intel. 2010, 32, 1627–1645. [Google Scholar] [CrossRef] [PubMed]
  26. Hosang, J.; Benenson, R.; Schiele, B. Learning non-maximum suppression. arXiv, 2017; arXiv:1705.02950. [Google Scholar]
  27. Bodla, N.; Singh, B.; Chellappa, R.; Davis, L.S. Improving object detection with one line of code. arXiv, 2017; arXiv:1704.04503. [Google Scholar]
  28. Lin, G.; Milan, A.; Shen, C.; Reid, I. Refinenet: Multi-path refinement networks for high-resolution semantic segmentation. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Hawaii Convention Center, HI, USA, 21–26 July 2017. [Google Scholar]
  29. Howard, A.G. Some improvements on deep convolutional neural network based image classification. arXiv, 2013; arXiv:1312.5402. [Google Scholar]
  30. Huang, G.; Li, Y.; Pleiss, G.; Liu, Z.; Hopcroft, J.E.; Weinberger, K.Q. Snapshot ensembles: Train 1, get M for free. arXiv, 2017; arXiv:1704.00109. [Google Scholar]
  31. Malisiewicz, T.; Gupta, A.; Efros, A.A. Ensemble of exemplar-svms for object detection and beyond. In Proceedings of the 2011 IEEE International Conference on Computer Vision (ICCV), Barcelona, Spain, 6–13 November 2011; pp. 89–96. [Google Scholar]
  32. Maree, R.; Geurts, P.; Piater, J.; Wehenkel, L. Random subwindows for robust image classification. In Proceedings of the 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, San Diego, CA, USA, 20–25 June 2005; Volume 1, pp. 34–40. [Google Scholar]
  33. Rafiee, G.; Dlay, S.S.; Woo, W.L. Region-of-interest extraction in low depth of field images using ensemble clustering and difference of Gaussian approaches. Pattern Recognit. 2013, 46, 2685–2699. [Google Scholar] [CrossRef]
  34. Lloyd, S. Least squares quantization in PCM. IEEE Trans. Inf. Theory 1982, 28, 129–137. [Google Scholar] [CrossRef]
  35. Islam, M.A.; Anderson, D.T.; Pinar, A.J.; Havens, T.C. Data-Driven Compression and Efficient Learning of the Choquet Integral. IEEE Trans. Fuzzy Syst. 2017. [Google Scholar] [CrossRef]
  36. Hu, P.; Ramanan, D. Finding tiny faces. In Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Hawaii Convention Center, HI, USA, 21–26 July 2017; pp. 1522–1530. [Google Scholar]
  37. De Barros, L.C.; Bassanezi, R.C.; Lodwick, W.A. The Extension Principle of Zadeh and Fuzzy Numbers. In A First Course in Fuzzy Logic, Fuzzy Dynamical Systems, and Biomathematics; Springer: Berlin/Heidelberg, Germany, 2017; pp. 23–41. [Google Scholar]
  38. Everingham, M.; Winn, J. The PASCAL Visual Object Classes Challenge 2012 (VOC2012) Development Kit. Available online: http://host.robots.ox.ac.uk/pascal/VOC/voc2012/#devkit (accessed on 13 November 2017).
  39. Jaccard, P. Étude comparative de la distribution florale dans une portion des Alpes et des Jura. Bull. Soc. Vaud. Sci. Nat. 1901, 37, 547–579. [Google Scholar]
  40. Lundh, F.; Contributors. Python Imaging Library. 2016. Available online: http://pillow.readthedocs.io/en/3.1.x/index.html (accessed on 13 November 2017).
Figure 1. Fuzzy measure shown for three information inputs.
Figure 1. Fuzzy measure shown for three information inputs.
Sensors 18 00894 g001
Figure 2. Proposed system for detection fusion.
Figure 2. Proposed system for detection fusion.
Sensors 18 00894 g002
Figure 3. Augmentation analysis.
Figure 3. Augmentation analysis.
Sensors 18 00894 g003
Figure 4. Changes of performance with the increase of the number of augmentation methods.
Figure 4. Changes of performance with the increase of the number of augmentation methods.
Sensors 18 00894 g004
Figure 5. First example of fusing three similar AABBs.
Figure 5. First example of fusing three similar AABBs.
Sensors 18 00894 g005
Figure 6. Lattice of the FM of agreement for the first example of three similar AABBs. See the text for an example of how to calculate g ( { x 1 , x 2 } ) . (a) Lattice of the FM of agreement on the x-axis for the first example; (b) lattice of the FM of agreement on the y-axis for the first example.
Figure 6. Lattice of the FM of agreement for the first example of three similar AABBs. See the text for an example of how to calculate g ( { x 1 , x 2 } ) . (a) Lattice of the FM of agreement on the x-axis for the first example; (b) lattice of the FM of agreement on the y-axis for the first example.
Sensors 18 00894 g006
Figure 7. Second example of fusing three AABBs with one outlier.
Figure 7. Second example of fusing three AABBs with one outlier.
Sensors 18 00894 g007
Figure 8. Lattice of the FM of agreement for the second example of three AABBs with one outlier. (a) Lattice of the FM of agreement on the x-axis for the second example; (b) lattice of the FM of agreement on the y-axis for the second example.
Figure 8. Lattice of the FM of agreement for the second example of three AABBs with one outlier. (a) Lattice of the FM of agreement on the x-axis for the second example; (b) lattice of the FM of agreement on the y-axis for the second example.
Sensors 18 00894 g008
Figure 9. Third example of fusing three AABBs with one extreme outlier.
Figure 9. Third example of fusing three AABBs with one extreme outlier.
Sensors 18 00894 g009
Figure 10. Lattice of the FM of agreement for the third example of three AABBs with one extreme outlier. (a) Lattice of the FM of agreement on the x-axis for the third example; (b) lattice of the FM of agreement on the y-axis for the third example.
Figure 10. Lattice of the FM of agreement for the third example of three AABBs with one extreme outlier. (a) Lattice of the FM of agreement on the x-axis for the third example; (b) lattice of the FM of agreement on the y-axis for the third example.
Sensors 18 00894 g010
Figure 11. Fusion of three detection AABBs (white) into one AABB (pink), compared with the ground-truth (yellow).
Figure 11. Fusion of three detection AABBs (white) into one AABB (pink), compared with the ground-truth (yellow).
Sensors 18 00894 g011
Figure 12. Value changes of g ( { x 2 , x 3 } ) for the FM of agreement on the x-axis for cone detection.
Figure 12. Value changes of g ( { x 2 , x 3 } ) for the FM of agreement on the x-axis for cone detection.
Sensors 18 00894 g012
Table 1. Acronyms and mathematical nomenclature.
Table 1. Acronyms and mathematical nomenclature.
Variable/SymbolDescription
AABBAxis-Aligned Bounding Box
AABBFIAxis-Aligned Bounding Box Fuzzy Integral
ADASAdvanced Driver Assistance Systems
ChIChoquet Integral
FIFuzzy Integral
FMFuzzy Measure
FPSFrames Per Second
IoUIntersection over Union
NMSNon-Maxima Suppression
x i i-th data/information input
X = { x 1 , . . . , x n } Finite set of n data/information inputs
ISet of intervals, { [ i l , i r ] I , i l i r , i l , i r }
gFuzzy measure g: 2 X → [0,1]
g ( { x i } ) Fuzzy measure on input x i
g ( { x i , . . . , x j } ) Fuzzy measure on inputs x i , . . . , x j
hReal-valued evidence function h : X
h ( x i ) , h i Real-valued evidence from input x i
h ¯ i Interval-valued evidence from input x i
[ h ¯ i ] Left endpoint of h ¯ i
[ h ¯ i ] + Right endpoint of h ¯ i
h g Fuzzy integral of h with respect to g
h ( x π ( i ) ) π is a permutation of X, such that h ( x π ( 1 ) ) h ( x π ( 2 ) ) , . . . , h ( x π ( n ) )
Table 2. ADAS experimental results. Baseline means there is no fusion performed, that is only the original image is processed.
Table 2. ADAS experimental results. Baseline means there is no fusion performed, that is only the original image is processed.
No FusionWith Fusion
Fusion MethodBaselineNMSAverageMedianProposed
YOLO Cone
Average IoU0.61990.66760.66760.67170.6763
Detection260/287287/287287/287287/287287/287
YOLO Box
Average IoU0.67220.67560.69250.68720.7031
Detection200/200200/200200/200200/200200/200
YOLO Pedestrian
Average IoU0.77270.70230.79950.79660.8141
Detection208/208208/208208/208208/208208/208
Faster R-CNN Pedestrian
Average IoU0.74020.73770.76600.75810.7499
Detection206/208206/208206/208206/208206/208
YOLO VOC 2007 All
Average IoU0.61060.66540.66780.67280.6746
mAP71.10%72.36%72.82%72.41%72.87%

Share and Cite

MDPI and ACS Style

Wei, P.; Ball, J.E.; Anderson, D.T. Fusion of an Ensemble of Augmented Image Detectors for Robust Object Detection. Sensors 2018, 18, 894. https://doi.org/10.3390/s18030894

AMA Style

Wei P, Ball JE, Anderson DT. Fusion of an Ensemble of Augmented Image Detectors for Robust Object Detection. Sensors. 2018; 18(3):894. https://doi.org/10.3390/s18030894

Chicago/Turabian Style

Wei, Pan, John E. Ball, and Derek T. Anderson. 2018. "Fusion of an Ensemble of Augmented Image Detectors for Robust Object Detection" Sensors 18, no. 3: 894. https://doi.org/10.3390/s18030894

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop