{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,4]],"date-time":"2025-10-04T00:44:31Z","timestamp":1759538671740,"version":"build-2065373602"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"15","license":[{"start":{"date-parts":[[2025,10,3]],"date-time":"2025-10-03T00:00:00Z","timestamp":1759449600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,3]],"date-time":"2025-10-03T00:00:00Z","timestamp":1759449600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Programs for Natural Science Foundation of Xinjiang Uygur Autonomous Region","award":["2022D01C54","2022D01C54","2022D01C54","2022D01C54","2022D01C54"],"award-info":[{"award-number":["2022D01C54","2022D01C54","2022D01C54","2022D01C54","2022D01C54"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"DOI":"10.1007\/s11227-025-07862-y","type":"journal-article","created":{"date-parts":[[2025,10,3]],"date-time":"2025-10-03T16:53:45Z","timestamp":1759510425000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["RIG-YOLOv8n: lightweight wind turbine blade damage detection based on YOLOv8n"],"prefix":"10.1007","volume":"81","author":[{"given":"Yajun","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Jingwen","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Kun","family":"Liang","sequence":"additional","affiliation":[]},{"given":"Ying","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Hao","family":"Meng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,3]]},"reference":[{"key":"7862_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.neucom.2019.09.071","volume":"376","author":"Yu Yajie","year":"2020","unstructured":"Yajie Yu et al (2020) Defect identification of wind turbine blades based on defect semantic features with transfer feature extractor. Neurocomputing 376:1\u20139","journal-title":"Neurocomputing"},{"key":"7862_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.aei.2023.102018","volume":"56","author":"Yang Zhao","year":"2023","unstructured":"Zhao Yang et al (2023) AI-enabled and multimodal data driven smart health monitoring of wind power systems: a case study. Adv Eng Inf 56:102018","journal-title":"Adv Eng Inf"},{"key":"7862_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2023.113261","volume":"178","author":"AS Verma","year":"2023","unstructured":"Verma AS et al (2023) A review of impact loads on composite wind turbine blades: impact threats and classification. Renew Sustain Energy Rev 178:113261","journal-title":"Renew Sustain Energy Rev"},{"issue":"6","key":"7862_CR4","doi-asserted-by":"publisher","DOI":"10.1111\/str.12290","volume":"54","author":"K Yang","year":"2018","unstructured":"Yang K, Rongong JA, Worden K (2018) Damage detection in a laboratory wind turbine blade using techniques of ultrasonic NDT and SHM. Strain 54(6):e12290","journal-title":"Strain"},{"key":"7862_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.rineng.2022.100570","volume":"15","author":"Chen Wang","year":"2022","unstructured":"Wang Chen, Yongqiang Gu (2022) Research on infrared nondestructive detection of small wind turbine blades. Results Eng 15:100570","journal-title":"Results Eng"},{"key":"7862_CR6","doi-asserted-by":"publisher","DOI":"10.1109\/TSTE.2025.3544247","author":"D Wang","year":"2025","unstructured":"Wang D et al (2025) Torsional vibration analysis of virtual-synchronous-controlled DFIG-based wind turbines. IEEE Trans Sustain Energy. https:\/\/doi.org\/10.1109\/TSTE.2025.3544247","journal-title":"IEEE Trans Sustain Energy"},{"issue":"2","key":"7862_CR7","doi-asserted-by":"publisher","first-page":"227","DOI":"10.3390\/electronics14020227","volume":"14","author":"Seong-Jun Heo","year":"2025","unstructured":"Heo Seong-Jun, Na Wongi S (2025) Review of Drone-Based Technologies for Wind Turbine Blade Inspection. Electronics 14(2):227","journal-title":"Electronics"},{"key":"7862_CR8","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2024.3525192","author":"L Ji","year":"2025","unstructured":"Ji L, Liu F, Zhu D (2025) CMFCANet: A wind turbine blade damage recognition network based on color-multiscale dual-feature fusion and channel attention mechanism. IEEE Trans Geosci Remote Sens. https:\/\/doi.org\/10.1109\/TGRS.2024.3525192","journal-title":"IEEE Trans Geosci Remote Sens"},{"key":"7862_CR9","doi-asserted-by":"crossref","unstructured":"Girshick R (2015) Fast R-CNN. In: Proceedings of the IEEE International Conference on Computer Vision, pp\u00a01440\u20131448","DOI":"10.1109\/ICCV.2015.169"},{"key":"7862_CR10","doi-asserted-by":"crossref","unstructured":"He K et al (2017) Mask R-CNN. In: Proceedings of the IEEE International Conference on Computer Vision, pp\u00a02961\u20132969","DOI":"10.1109\/ICCV.2017.322"},{"key":"7862_CR11","doi-asserted-by":"crossref","unstructured":"Cai Z, Vasconcelos N (2018) Cascade R-CNN: Delving into high quality object detection. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp\u00a06154\u20136162","DOI":"10.1109\/CVPR.2018.00644"},{"key":"7862_CR12","unstructured":"Dai J et al (2016) R-FCN: Object detection via region-based fully convolutional networks. Adv Neural Inf Process Syst 29"},{"key":"7862_CR13","doi-asserted-by":"crossref","unstructured":"Redmon J et al (2016) You only look once: unified, real-time object detection. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp\u00a0779\u2013788","DOI":"10.1109\/CVPR.2016.91"},{"key":"7862_CR14","doi-asserted-by":"crossref","unstructured":"Liu W et al (2016) SSD: Single shot multibox detector. In: Computer Vision\u2013ECCV 2016: 14th European Conference, Amsterdam, The Netherlands, October 11\u201314, 2016, Proceedings, Part I 14. Springer, pp\u00a021\u201337","DOI":"10.1007\/978-3-319-46448-0_2"},{"key":"7862_CR15","doi-asserted-by":"crossref","unstructured":"Varghese R, Sambath M (2024) Yolov8: A novel object detection algorithm with enhanced performance and robustness. In: 2024 International Conference on Advances in Data Engineering and Intelligent Computing Systems (ADICS). IEEE, pp\u00a01\u20136","DOI":"10.1109\/ADICS58448.2024.10533619"},{"issue":"2","key":"7862_CR16","doi-asserted-by":"publisher","first-page":"508","DOI":"10.1080\/10589759.2024.2324373","volume":"40","author":"X Zhu","year":"2025","unstructured":"Zhu X et al (2025) Damage identification of wind turbine blades based on deep learning and ultrasonic testing. Nondestr Test Eval 40(2):508\u2013533","journal-title":"Nondestr Test Eval"},{"issue":"8","key":"7862_CR17","doi-asserted-by":"publisher","first-page":"8727","DOI":"10.1109\/JSEN.2023.3257824","volume":"23","author":"Yu Junfeng","year":"2023","unstructured":"Junfeng Yu et al (2023) An infrared image stitching method for wind turbine blade using UAV flight data and U-Net. IEEE Sens J 23(8):8727\u20138736","journal-title":"IEEE Sens J"},{"key":"7862_CR18","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1016\/j.compstruct.2018.06.100","volume":"203","author":"H Zuo","year":"2018","unstructured":"Zuo H et al (2018) Damage identification for plate-like structures using ultrasonic guided wave based on improved music method. Compos Struct 203:164\u2013171","journal-title":"Compos Struct"},{"issue":"1","key":"7862_CR19","doi-asserted-by":"publisher","first-page":"40","DOI":"10.3390\/en9010040","volume":"9","author":"Carlos Quiterio Gomez Munoz","year":"2016","unstructured":"Munoz Carlos Quiterio Gomez, Marquez Fausto Pedro Garcia (2016) A new fault location approach for acoustic emission techniques in wind turbines. Energies 9(1):40","journal-title":"Energies"},{"key":"7862_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.ymssp.2024.111592","volume":"219","author":"Yan He","year":"2024","unstructured":"He Yan et al (2024) An adaptive detection approach for multi-scale defects on wind turbine blade surface. Mech Syst Signal Process 219:111592","journal-title":"Mech Syst Signal Process"},{"issue":"3","key":"7862_CR21","doi-asserted-by":"publisher","first-page":"1271","DOI":"10.1109\/TMECH.2019.2908233","volume":"24","author":"Long Wang","year":"2019","unstructured":"Wang Long, Zhang Zijun, Luo Xiong (2019) A two-stage data-driven approach for image-based wind turbine blade crack inspections. IEEE\/ASME Trans Mechatron 24(3):1271\u20131281","journal-title":"IEEE\/ASME Trans Mechatron"},{"issue":"4","key":"7862_CR22","doi-asserted-by":"publisher","first-page":"676","DOI":"10.3390\/en12040676","volume":"12","author":"ASM Shihavuddin","year":"2019","unstructured":"Shihavuddin ASM et al (2019) Wind turbine surface damage detection by deep learning aided drone inspection analysis. Energies 12(4):676","journal-title":"Energies"},{"issue":"3","key":"7862_CR23","doi-asserted-by":"publisher","first-page":"46","DOI":"10.3390\/jimaging7030046","volume":"7","author":"Jiajun Zhang","year":"2021","unstructured":"Zhang Jiajun, Cosma Georgina, Watkins Jason (2021) Image enhanced mask R-CNN: a deep learning pipeline with new evaluation measures for wind turbine blade defect detection and classification. J Imaging 7(3):46","journal-title":"J Imaging"},{"issue":"20","key":"7862_CR24","doi-asserted-by":"publisher","first-page":"32804","DOI":"10.1109\/JIOT.2024.3409823","volume":"11","author":"H Zhao","year":"2024","unstructured":"Zhao H, Gao Y, Deng W (2024) Defect detection using shuffle Net-CA-SSD lightweight network for turbine blades in IoT. IEEE Internet Things J 11(20):32804\u201332812","journal-title":"IEEE Internet Things J"},{"issue":"17","key":"7862_CR25","doi-asserted-by":"publisher","first-page":"28409","DOI":"10.1109\/JSEN.2024.3430351","volume":"24","author":"YL Ma","year":"2024","unstructured":"Ma YL et al (2024) Wind Turbine Blade Defect Detection Algorithm Based on Lightweight MES-YOLOv8n. IEEE Sens J 24(17):28409\u201328418","journal-title":"IEEE Sens J"},{"key":"7862_CR26","doi-asserted-by":"crossref","unstructured":"Yan X, Wu G, Zuo Y (2022) YOLOV4-based wind turbine blade crack defect detection. In: Proceedings of IncoME-VI and TEPEN 2021: Performance Engineering and Maintenance Engineering. Springer, pp\u00a0293\u2013305","DOI":"10.1007\/978-3-030-99075-6_25"},{"key":"7862_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2023.113222","volume":"220","author":"Yinsheng Zhang","year":"2023","unstructured":"Zhang Yinsheng et al (2023) Surface defect detection of wind turbine based on lightweight YOLOv5s model. Measurement 220:113222","journal-title":"Measurement"},{"issue":"1","key":"7862_CR28","doi-asserted-by":"publisher","first-page":"205","DOI":"10.3390\/pr12010205","volume":"12","author":"Yu Hang","year":"2024","unstructured":"Hang Yu et al (2024) Research on an intelligent identification method for wind turbine blade damage based on CBAM-BiFPN-YOLOV8. Processes 12(1):205","journal-title":"Processes"},{"issue":"9","key":"7862_CR29","doi-asserted-by":"publisher","first-page":"1904","DOI":"10.1109\/TPAMI.2015.2389824","volume":"37","author":"Kaiming He","year":"2015","unstructured":"He Kaiming et al (2015) Spatial pyramid pooling in deep convolutional networks for visual recognition. IEEE Trans Pattern Anal Mach Intell 37(9):1904\u20131916","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"7862_CR30","doi-asserted-by":"crossref","unstructured":"Wang C et al (2020) CSPNet: a new backbone that can enhance learning capability of CNN. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops. pp\u00a0390\u2013391","DOI":"10.1109\/CVPRW50498.2020.00203"},{"key":"7862_CR31","doi-asserted-by":"crossref","unstructured":"Liu S et al (2018) Path aggregation network for instance segmentation. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp\u00a08759\u20138768","DOI":"10.1109\/CVPR.2018.00913"},{"key":"7862_CR32","unstructured":"Zhang X et al (2023) RFAConv: Innovating spatial attention and standard convolutional operation. arXiv preprint arXiv:2304.03198"},{"key":"7862_CR33","doi-asserted-by":"crossref","unstructured":"Rajput R et al (2025) A novel light weight neural network using depth-wise separable convolutions for plant disease classification. In: AIP Conference Proceedings, vol\u00a03253, p 1. AIP Publishing","DOI":"10.1063\/5.0249077"},{"key":"7862_CR34","doi-asserted-by":"crossref","unstructured":"He K et al (2016) Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp\u00a0770\u2013778","DOI":"10.1109\/CVPR.2016.90"},{"issue":"5","key":"7862_CR35","first-page":"5436","volume":"45","author":"Meng-Hao Guo","year":"2022","unstructured":"Guo Meng-Hao et al (2022) Beyond self-attention: external attention using two linear layers for visual tasks. IEEE Trans Pattern Anal Mach Intell 45(5):5436\u20135447","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"7862_CR36","unstructured":"Howard AG et al (2017) Mobilenets: Efficient convolutional neural networks for mobile vision applications. arXiv preprint arXiv:1704.04861"},{"key":"7862_CR37","unstructured":"volkan (2023) wind turbine balade damage Dataset. https:\/\/universe.roboflow.com\/volkan-frvmg\/wind-turbine-balade-damage. Open Source Dataset. visited on 2025-03-15. https:\/\/universe.roboflow.com\/volkan-frvmg\/wind-turbine-balade-damage"},{"key":"7862_CR38","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2025.3551459","author":"Z Lin","year":"2025","unstructured":"Lin Z et al (2025) FFDDNet: flexible focused defect detection network. IEEE Trans Instrum Meas. https:\/\/doi.org\/10.1109\/TIM.2025.3551459","journal-title":"IEEE Trans Instrum Meas"},{"key":"7862_CR39","first-page":"1","volume":"1804","author":"A Farhadi","year":"2018","unstructured":"Farhadi A, Redmon J (2018) Yolov3: an incremental improvement. Comput Vis Pattern Recognit 1804:1\u20136","journal-title":"Comput Vis Pattern Recognit"},{"key":"7862_CR40","unstructured":"Jocher G et al (2020) ultralytics\/yolov5: v3. 0. In: Zenodo"},{"key":"7862_CR41","unstructured":"Li C et al (2022) YOLOv6: A single-stage object detection framework for industrial applications. arXiv preprint arXiv:2209.02976"},{"issue":"3","key":"7862_CR42","doi-asserted-by":"publisher","first-page":"492","DOI":"10.1007\/s11227-025-06991-8","volume":"81","author":"H Zhang","year":"2025","unstructured":"Zhang H, Peng Y, Yl Liu (2025) UAV aerial photography target detection based on improved YOLOv9. J Supercomput 81(3):492","journal-title":"J Supercomput"},{"key":"7862_CR43","first-page":"107984","volume":"37","author":"A Wang","year":"2024","unstructured":"Wang A et al (2024) Yolov10: real-time end-to-end object detection. Adv Neural Inf Process Syst 37:107984\u2013108011","journal-title":"Adv Neural Inf Process Syst"},{"key":"7862_CR44","unstructured":"Khanam R, Hussain M (2024) Yolov11: An overview of the key architectural enhancements. arXiv preprint arXiv:2410.17725"},{"key":"7862_CR45","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1007\/s11263-019-01228-7","volume":"128","author":"Ramprasaath R Selvaraju","year":"2020","unstructured":"Selvaraju Ramprasaath R et al (2020) Grad-CAM: visual explanations from deep networks via gradient-based localization. Int J Comput Vis 128:336\u2013359","journal-title":"Int J Comput Vis"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-025-07862-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-025-07862-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-025-07862-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,3]],"date-time":"2025-10-03T16:53:51Z","timestamp":1759510431000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-025-07862-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,3]]},"references-count":45,"journal-issue":{"issue":"15","published-online":{"date-parts":[[2025,10]]}},"alternative-id":["7862"],"URL":"https:\/\/doi.org\/10.1007\/s11227-025-07862-y","relation":{},"ISSN":["1573-0484"],"issn-type":[{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,3]]},"assertion":[{"value":"16 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 September 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 October 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"1406"}}