🏞️
PicStork User Manual
  • Introduction to PicStork
  • 1. Dashboard
  • 2. Projects
    • 2.1 Images
    • 2.2 Annotation and Setup
    • 2.3 Report
    • 2.4 Manage Access
  • 3. Data Uploading
    • 3.1 Images
  • 4. Create a Task
    • 4.1 Create Annotation Report Task
    • 4.2 Create Training Task
      • 4.2.1 Using Image Files
      • 4.2.2 Using Orthomosaic Maps
    • 4.3 Create Detection Task
      • 4.3.1 Creation of Detection Task From Training Task
  • 5. Fine Tune Your Analytics Report
    • 5.1 Exploring Analytics Output
    • 5.2 Inspection and Manual Annotation
    • 5.3 Generating Report
  • 6. Handling Manual Annotation
    • 6.1 Define Manual Annotation Task
    • 6.2 Handling an Image Set
    • 6.3 Perform Manual Annotation
    • 6.4 Generate Report
  • 7. Teams Management
  • 8. Task Management
  • 9. Inspect Thermal Images
  • 10. Settings
Powered by GitBook
On this page
  1. 4. Create a Task

4.2 Create Training Task

Previous4.1 Create Annotation Report TaskNext4.2.1 Using Image Files

Last updated 2 years ago

To detect and identify a particular object, it should be trained in a good manner. PicStork is a powerful platform for detecting and analyzing the presence of objects selected as per requirements. The user can train the system to identify, locate, and count the presence of selected objects in the image set.

Normally, a training task is used to create a new detector. The input provided to the training task is an Annotation set whereas, the output of the training task is always a detector. The user may create a new detector for his application or he can use the predefined detectors available in PicStork. The detectors created by the user will be stored on the cloud, associated with his account, which is easily accessible. A number of detectors created will be displayed on the dashboard. The user can view the list of detectors by clicking on "View" option near to Detector on the dashboard, as shown in the following image.

The detectors created by the user may be considered "Private" detectors as these are not easily available to other users. The concerned detector can be public by allowing the access to other users.