{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T20:40:41Z","timestamp":1761165641627,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030013127"},{"type":"electronic","value":"9783030013134"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-01313-4_43","type":"book-chapter","created":{"date-parts":[[2018,10,1]],"date-time":"2018-10-01T07:36:05Z","timestamp":1538379365000},"page":"401-411","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["UAV Assisted Bridge Defect Inspection System"],"prefix":"10.1007","author":[{"given":"Shuzhan","family":"Yang","sequence":"first","affiliation":[]},{"given":"Zhen","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Xiao","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Tianxiang","family":"Bai","sequence":"additional","affiliation":[]},{"given":"Yingliang","family":"Ji","sequence":"additional","affiliation":[]},{"given":"Yuyi","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Xiwei","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Xisong","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Chuanfu","family":"Li","sequence":"additional","affiliation":[]},{"given":"Qi","family":"Han","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Gang","family":"Xiong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,2]]},"reference":[{"key":"43_CR1","unstructured":"Technical code of maintenance for city bridges, China, CJJ"},{"issue":"7","key":"43_CR2","first-page":"1","volume":"2014","author":"L Li","year":"2014","unstructured":"Li, L., Sun, L., Ning, G.: Deterioration prediction of urban bridges on network level using Markov-chain model. Math. Probl. Eng. 2014(7), 1\u201310 (2014)","journal-title":"Math. Probl. Eng."},{"issue":"1","key":"43_CR3","first-page":"194","volume":"17","author":"J Irizarry","year":"2012","unstructured":"Irizarry, J., Gheisari, M., Walker, B.N.: Usability assessment of drone technology as safety inspection tools. J. Inf. Technol. Constr. 17(1), 194\u2013212 (2012)","journal-title":"J. Inf. Technol. Constr."},{"key":"43_CR4","unstructured":"Civil UAV Real-name Registration Regulation by Civil Aviation Administration of China: http:\/\/www.caac.gov.cn\/XXGK\/XXGK\/GFXWJ\/201705\/P020170517409761154678.pdf"},{"key":"43_CR5","unstructured":"Civil UAV Application Regulation by Civil Aviation Administration of China: http:\/\/www.caac.gov.cn\/HDJL\/YJZJ\/201708\/t20170809_46115.html"},{"key":"43_CR6","unstructured":"Civil UAV Manufacturing Standards by Ministry of Industry and Information Technology of the People\u2019s Republic of China: http:\/\/www.miit.gov.cn\/n1146285\/n1146352\/n3054355\/n3057585\/n3057590\/c5653876\/content.html"},{"key":"43_CR7","unstructured":"Civil UAV Traffic Rules by Ministry of Transport of the People\u2019s Republic of China: http:\/\/zizhan.mot.gov.cn\/sj\/fazhs\/zongheyshlf_fzhs\/201711\/t20171128_2942432.html"},{"issue":"3","key":"43_CR8","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1002\/rob.20235","volume":"25","author":"RR Murphy","year":"2008","unstructured":"Murphy, R.R., Steimle, E., Griffin, C., Cullins, C., Hall, M., Pratt, K.: Cooperative use of unmanned sea surface and micro aerial vehicles at Hurricane Wilma. J. Field Robot. 25(3), 164\u2013180 (2008)","journal-title":"J. Field Robot."},{"key":"43_CR100","doi-asserted-by":"crossref","unstructured":"Campoy, P., Correa, J.F., Mondrag\u00f3n, I., Mart\u00ednez, C., Olivares, M., Mej\u00edas, L., Artieda, J.: Computer vision onboard UAVs for civilian tasks. J. Intell. Robot. Syst. 54(1\u20133), 105\u2013135 (2009)","DOI":"10.1007\/s10846-008-9256-z"},{"key":"43_CR9","doi-asserted-by":"crossref","unstructured":"Alighanbari, M., Kuwata, Y., How, J.P.: Coordination and control of multiple UAVs with timing constraints and loitering. In: Proceedings of the 2003 American Control Conference, vol. 6, pp. 5311\u20135316 (2003)","DOI":"10.1109\/ACC.2003.1242572"},{"issue":"6","key":"43_CR10","doi-asserted-by":"publisher","first-page":"563","DOI":"10.1109\/TPAMI.1983.4767445","volume":"5","author":"BR Suresh","year":"1983","unstructured":"Suresh, B.R.: A real-time automated visual inspection system for hot steel slabs. IEEE Trans. Pattern Anal. Mach. Intell. 5(6), 563\u2013572 (1983)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"3","key":"43_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5565\/rev\/elcvia.268","volume":"7","author":"X Xie","year":"2008","unstructured":"Xie, X.: A review of recent advances in surface defect detection using texture analysis techniques. Electron. Lett. Comput. Vis. Image Anal. 7(3), 1\u201322 (2008)","journal-title":"Electron. Lett. Comput. Vis. Image Anal."},{"issue":"1","key":"43_CR12","first-page":"22","volume":"1","author":"GMA Rahaman","year":"2009","unstructured":"Rahaman, G.M.A., Hossain, M.M.: Automatic defect detection and classification technique from image: a special case using ceramic tiles. Int. J. Comput. Sci. Inf. Secur. 1(1), 22\u201330 (2009)","journal-title":"Int. J. Comput. Sci. Inf. Secur."},{"issue":"2","key":"43_CR13","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1109\/28.993164","volume":"38","author":"A Kumar","year":"2002","unstructured":"Kumar, A., Pang, G.K.H.: Defect detection in textural materials using Gabor filters. IEEE Trans. Ind. Appl. 38(2), 425\u2013440 (2002)","journal-title":"IEEE Trans. Ind. Appl."},{"key":"43_CR14","unstructured":"Mak, K.L., Peng, P., Lau, H.Y.K.: A real time computer vision systems for detecting defects in textile fabrics. IEEE Trans. (2005)"},{"issue":"10","key":"43_CR15","first-page":"5187","volume":"2","author":"KN Sivabalan","year":"2010","unstructured":"Sivabalan, K.N., Ghanadurai, D.: Detection of defects in digital texture images using segmentation. Int. J. Eng. Sci. Technol. 2(10), 5187\u20135191 (2010)","journal-title":"Int. J. Eng. Sci. Technol."},{"key":"43_CR16","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1109\/TED.2010.2089987","volume":"1","author":"G Zhang","year":"2011","unstructured":"Zhang, G., Chen, S., Liao, J.: Otsu image segmentation algorithm based on morphology and wavelet transformation. IEEE Trans. 1, 279\u2013283 (2011)","journal-title":"IEEE Trans."}],"container-title":["IFIP Advances in Information and Communication Technology","Intelligence Science II"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-01313-4_43","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T20:06:58Z","timestamp":1761077218000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-01313-4_43"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030013127","9783030013134"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-01313-4_43","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"2 October 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligence Science","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Beijing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icis2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.intsci.ac.cn\/icis2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}