{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T00:39:11Z","timestamp":1768523951194,"version":"3.49.0"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2021,11,15]],"date-time":"2021-11-15T00:00:00Z","timestamp":1636934400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,11,15]],"date-time":"2021-11-15T00:00:00Z","timestamp":1636934400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/100014718","name":"innovative research group project of the national natural science foundation of china","doi-asserted-by":"publisher","award":["61972097"],"award-info":[{"award-number":["61972097"]}],"id":[{"id":"10.13039\/100014718","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100014718","name":"innovative research group project of the national natural science foundation of china","doi-asserted-by":"publisher","award":["U1705262"],"award-info":[{"award-number":["U1705262"]}],"id":[{"id":"10.13039\/100014718","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003392","name":"natural science foundation of fujian province","doi-asserted-by":"publisher","award":["2020J01494"],"award-info":[{"award-number":["2020J01494"]}],"id":[{"id":"10.13039\/501100003392","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003392","name":"natural science foundation of fujian province","doi-asserted-by":"publisher","award":["2018J07005"],"award-info":[{"award-number":["2018J07005"]}],"id":[{"id":"10.13039\/501100003392","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2022,3]]},"DOI":"10.1007\/s12083-021-01258-4","type":"journal-article","created":{"date-parts":[[2021,11,15]],"date-time":"2021-11-15T12:02:43Z","timestamp":1636977763000},"page":"950-972","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["100+\u2009FPS detector of personal protective equipment for worker safety: A deep learning approach for green edge computing"],"prefix":"10.1007","volume":"15","author":[{"given":"Xiao","family":"Ke","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1689-8105","authenticated-orcid":false,"given":"Wenyao","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Wenzhong","family":"Guo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,11,15]]},"reference":[{"key":"1258_CR1","unstructured":"United States Census Bureau. Construction spending. https:\/\/www.census.gov\/construction\/c30\/prpdf.html. Accessed 1 Jul 2021"},{"key":"1258_CR2","unstructured":"Bureau of Labor Statistics. Industries at a glance: Construction. https:\/\/www.bls.gov\/iag\/tgs\/iag23.htm. Accessed 1 Jul 2021"},{"key":"1258_CR3","unstructured":"Bureau of Labor Statistics. Fatal occupational injuries counts and rates by selected industries. https:\/\/www.bls.gov\/news.release\/cfoi.t04.htm. Accessed 1 Jul 2021"},{"key":"1258_CR4","unstructured":"OSHA. Commonly used statistics. https:\/\/www.osha.gov\/oshstats\/commonstats.html. Accessed 1 Jul 2021"},{"key":"1258_CR5","unstructured":"OSHA. Worker safety series: construction. https:\/\/www.osha.gov\/Publications\/OSHA3252\/3252.html. Accessed 1 Jul 2021"},{"key":"1258_CR6","unstructured":"Centers for Disease Control and Prevention. Traumatic brain injuries in construction. https:\/\/blogs.cdc.gov\/niosh-science-blog\/2016\/03\/21\/constructiontbi\/. Accessed 1 Jul 2021"},{"issue":"2","key":"1258_CR7","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/s12083-013-0234-2","volume":"8","author":"J Kim","year":"2015","unstructured":"Kim J, Mesmakhosroshahi M (2015) Stereo-based region of interest generation for real-time pedestrian detection. Peer-to-Peer Netw Appl 8(2):181\u2013188","journal-title":"Peer-to-Peer Netw Appl"},{"key":"1258_CR8","doi-asserted-by":"crossref","unstructured":"Sudha M (2021) Traffic sign detection and recognition using RGSM and a novel feature extraction method. Peer-to-Peer Netw Appl 1\u201312","DOI":"10.1007\/s12083-021-01138-x"},{"issue":"4","key":"1258_CR9","doi-asserted-by":"publisher","first-page":"1260","DOI":"10.1007\/s12083-019-00861-w","volume":"13","author":"S Jin","year":"2020","unstructured":"Jin S, Gao Y, Chen L (2020) Improved deep distance learning for visual loop closure detection in smart city. Peer-to-Peer Netw Appl 13(4):1260\u20131271","journal-title":"Peer-to-Peer Netw Appl"},{"issue":"2","key":"1258_CR10","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1007\/s12083-016-0428-5","volume":"10","author":"Z Sun","year":"2017","unstructured":"Sun Z, Tang S, Huang H et al (2017) SOS: Real-time and accurate physical assault detection using smartphone. Peer-to-Peer Netw Appl 10(2):395\u2013410","journal-title":"Peer-to-Peer Netw Appl"},{"issue":"3","key":"1258_CR11","doi-asserted-by":"publisher","first-page":"1816","DOI":"10.1007\/s12083-020-01041-x","volume":"14","author":"F Yang","year":"2021","unstructured":"Yang F, Li F, Zhang K et al (2021) Influencing factors analysis in pear disease recognition using deep learning. Peer-to-Peer Netw Appl 14(3):1816\u20131828","journal-title":"Peer-to-Peer Netw Appl"},{"key":"1258_CR12","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1016\/j.pmcj.2018.01.007","volume":"45","author":"T Meng","year":"2018","unstructured":"Meng T, Wolter K, Wu H et al (2018) A secure and cost-efficient offloading policy for mobile cloud computing against timing attacks. Pervasive Mob Comput 45:4\u201318","journal-title":"Pervasive Mob Comput"},{"key":"1258_CR13","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1016\/j.neucom.2017.06.023","volume":"267","author":"Y Lu","year":"2017","unstructured":"Lu Y, Yi S, Zeng N et al (2017) Identification of rice diseases using deep convolutional neural networks. Neurocomputing 267:378\u2013384","journal-title":"Neurocomputing"},{"issue":"3","key":"1258_CR14","doi-asserted-by":"publisher","first-page":"04019006","DOI":"10.1061\/(ASCE)CO.1943-7862.0001629","volume":"145","author":"H Zhang","year":"2019","unstructured":"Zhang H, Yan X, Li H et al (2019) Real-time alarming, monitoring, and locating for non-hard-hat use in construction. J Constr Eng Manag 145(3):04019006","journal-title":"J Constr Eng Manag"},{"key":"1258_CR15","doi-asserted-by":"crossref","unstructured":"Dong S, He Q, Li H et al (2015) Automated PPE misuse identification and assessment for safety performance enhancement. In ICCREM 2015 204\u2013214","DOI":"10.1061\/9780784479377.024"},{"key":"1258_CR16","doi-asserted-by":"crossref","unstructured":"Zhang C, Tian Z, Song J et al (2021) Construction worker hardhat-wearing detection based on an improved BiFPN. 2020 25th International Conference on Pattern Recognition (ICPR), IEEE, p 8600\u20138607","DOI":"10.1109\/ICPR48806.2021.9412103"},{"issue":"7","key":"1258_CR17","doi-asserted-by":"publisher","first-page":"1868","DOI":"10.3390\/s20071868","volume":"20","author":"L Wang","year":"2020","unstructured":"Wang L, Xie L, Yang P et al (2020) Hardhat-wearing detection based on a lightweight convolutional neural network with multi-scale features and a top-down module. Sensors 20(7):1868","journal-title":"Sensors"},{"key":"1258_CR18","doi-asserted-by":"crossref","unstructured":"Filatov N, Maltseva N, Bakhshiev A (2020) Development of hard hat wearing monitoring system using deep neural networks with high inference speed. International Russian Automation Conference (RusAutoCon), IEEE, p 459\u2013463","DOI":"10.1109\/RusAutoCon49822.2020.9208155"},{"key":"1258_CR19","doi-asserted-by":"crossref","unstructured":"Wu J, Cai N, Chen W et al (2019) Automatic detection of hardhats worn by construction personnel: A deep learning approach and benchmark dataset. Autom Constr 106:102894","DOI":"10.1016\/j.autcon.2019.102894"},{"issue":"2","key":"1258_CR20","doi-asserted-by":"publisher","first-page":"04018066","DOI":"10.1061\/(ASCE)CP.1943-5487.0000813","volume":"33","author":"BE Mneymneh","year":"2019","unstructured":"Mneymneh BE, Abbas M, Khoury H (2019) Vision-based framework for intelligent monitoring of hardhat wearing on construction sites. J Comput Civ Eng 33(2):04018066","journal-title":"J Comput Civ Eng"},{"key":"1258_CR21","unstructured":"W\u00f3jcik B, \u017barski M, Ksi\u0105\u017cek K et al (2021) Hard hat wearing detection based on head keypoint localization. arXiv preprint:\u00a0arXiv:2106.10944"},{"key":"1258_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.autcon.2017.09.018","volume":"85","author":"Q Fang","year":"2018","unstructured":"Fang Q, Li H, Luo X et al (2018) Detecting non-hardhat-use by a deep learning method from far-field surveillance videos. Autom Constr 85:1\u20139","journal-title":"Autom Constr"},{"key":"1258_CR23","first-page":"91","volume":"28","author":"S Ren","year":"2015","unstructured":"Ren S, He K, Girshick R et al (2015) Faster r-cnn: Towards real-time object detection with region proposal networks. Adv Neural Inf Process Syst 28:91\u201399","journal-title":"Adv Neural Inf Process Syst"},{"issue":"11","key":"1258_CR24","doi-asserted-by":"publisher","first-page":"4254","DOI":"10.1007\/s12205-017-1730-3","volume":"22","author":"H Seong","year":"2018","unstructured":"Seong H, Son H, Kim C (2018) A comparative study of machine learning classification for color-based safety vest detection on construction-site images. KSCE J Civ Eng 22(11):4254\u20134262","journal-title":"KSCE J Civ Eng"},{"issue":"9","key":"1258_CR25","doi-asserted-by":"publisher","first-page":"3263","DOI":"10.3390\/s21093263","volume":"21","author":"J Yu","year":"2021","unstructured":"Yu J, Zhang W (2021) Face mask wearing detection algorithm based on improved YOLO-v4. Sensors 21(9):3263","journal-title":"Sensors"},{"key":"1258_CR26","doi-asserted-by":"crossref","unstructured":"Loey M, Manogaran G, Taha MHN et al (2021) A hybrid deep transfer learning model with machine learning methods for face mask detection in the era of the COVID-19 pandemic. Measurement 167:108288","DOI":"10.1016\/j.measurement.2020.108288"},{"key":"1258_CR27","doi-asserted-by":"crossref","unstructured":"Nagrath P, Jain R, Madan A et al (2021) SSDMNV2: A real time DNN-based face mask detection system using single shot multibox detector and MobileNetV2. Sustain Cities Soc 66:102692","DOI":"10.1016\/j.scs.2020.102692"},{"issue":"8","key":"1258_CR28","doi-asserted-by":"publisher","first-page":"1792","DOI":"10.3390\/s17081792","volume":"17","author":"H Li","year":"2017","unstructured":"Li H, Liu J, Liu RW, Xiong N, Wu K, Kim T (2017) A dimensionality reduction-based multi-step clustering method for robust vessel trajectory analysis. Sensors 17(8):1792","journal-title":"Sensors"},{"key":"1258_CR29","unstructured":"Smartvid.io, Inc. Smartvid.io. https:\/\/www.smartvid.io. Accessed 1 Jul 2021"},{"key":"1258_CR30","doi-asserted-by":"crossref","unstructured":"Nath ND, Behzadan AH, Paal SG (2020) Deep learning for site safety: Real-time detection of personal protective equipment. Autom Constr 112:103085","DOI":"10.1016\/j.autcon.2020.103085"},{"issue":"4","key":"1258_CR31","doi-asserted-by":"publisher","first-page":"522","DOI":"10.1109\/TSMC.2016.2606400","volume":"48","author":"W Fang","year":"2016","unstructured":"Fang W, Yao X, Zhao X, Yin J, Xiong N (2016) A stochastic control approach to maximize profit on service provisioning for mobile cloudlet platforms. IEEE Trans Syst Man Cybern Syst 48(4):522\u2013534","journal-title":"IEEE Trans Syst Man Cybern Syst"},{"key":"1258_CR32","doi-asserted-by":"crossref","unstructured":"Kyrkou C, Plastiras G, Theocharides T et al (2018) DroNet: Efficient convolutional neural network detector for real-time UAV applications. 2018 Design, Automation & Test in Europe Conference & Exhibition (DATE), IEEE, p 967\u2013972","DOI":"10.23919\/DATE.2018.8342149"},{"key":"1258_CR33","unstructured":"Szegedy C, Toshev A, Erhan D (2013) Deep neural networks for object detection"},{"key":"1258_CR34","doi-asserted-by":"crossref","unstructured":"Girshick R (2015) Fast r-cnn. Proceedings of the IEEE international conference on computer vision, p 1440\u20131448","DOI":"10.1109\/ICCV.2015.169"},{"key":"1258_CR35","doi-asserted-by":"crossref","unstructured":"He K, Gkioxari G, Doll\u00e1r P et al (2017) Mask r-cnn. Proceedings of the IEEE international conference on computer vision, p 2961\u20132969","DOI":"10.1109\/ICCV.2017.322"},{"key":"1258_CR36","doi-asserted-by":"crossref","unstructured":"Duan K, Xie L, Qi H et al (2020) Corner proposal network for anchor-free, two-stage object detection. Computer Vision\u2013ECCV 2020: 16th European Conference, Glasgow, UK, August 23\u201328, 2020, Proceedings, Part III 16, Springer International Publishing, p 399\u2013416","DOI":"10.1007\/978-3-030-58580-8_24"},{"key":"1258_CR37","doi-asserted-by":"crossref","unstructured":"Liu W, Anguelov D, Erhan D et al (2016) Ssd: Single shot multibox detector. European conference on computer vision, Springer, Cham, p 21\u201337","DOI":"10.1007\/978-3-319-46448-0_2"},{"key":"1258_CR38","unstructured":"Bochkovskiy A, Wang CY, Liao HYM (2020) Yolov4: Optimal speed and accuracy of object detection. arXiv preprint:\u00a0arXiv:2004.10934"},{"key":"1258_CR39","doi-asserted-by":"crossref","unstructured":"Duan K, Bai S, Xie L et al (2019) Centernet: Keypoint triplets for object detection. Proceedings of the IEEE\/CVF International Conference on Computer Vision, p 6569\u20136578","DOI":"10.1109\/ICCV.2019.00667"},{"key":"1258_CR40","doi-asserted-by":"crossref","unstructured":"Chen Q, Wang Y, Yang T et al (2021) You only look one-level feature. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, p 13039\u201313048","DOI":"10.1109\/CVPR46437.2021.01284"},{"key":"1258_CR41","doi-asserted-by":"crossref","unstructured":"Wang CY, Liao HYM, Wu YH et al (2020) CSPNet: A new backbone that can enhance learning capability of CNN. Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition workshops, p 390\u2013391","DOI":"10.1109\/CVPRW50498.2020.00203"},{"key":"1258_CR42","doi-asserted-by":"crossref","unstructured":"Liu S, Qi L, Qin H et al (2018) Path aggregation network for instance segmentation. Proceedings of the IEEE conference on computer vision and pattern recognition, p 8759\u20138768","DOI":"10.1109\/CVPR.2018.00913"},{"key":"1258_CR43","unstructured":"Wang RJ, Li X, Ling CX (2018) Pelee: A real-time object detection system on mobile devices. arXiv preprint:\u00a0arXiv:1804.06882"},{"key":"1258_CR44","doi-asserted-by":"crossref","unstructured":"Liu Z, Li J, Shen Z et al (2017) Learning efficient convolutional networks through network slimming. Proceedings of the IEEE international conference on computer vision, p 2736\u20132744","DOI":"10.1109\/ICCV.2017.298"},{"key":"1258_CR45","unstructured":"Han S, Pool J, Tran J et al (2015) Learning both weights and connections for efficient neural networks. arXiv preprint:\u00a0arXiv:1506.02626"},{"key":"1258_CR46","doi-asserted-by":"crossref","unstructured":"Srinivas S, Subramanya A, Venkatesh Babu R (2017) Training sparse neural networks. Proceedings of the IEEE conference on computer vision and pattern recognition workshops, p 138\u2013145","DOI":"10.1109\/CVPRW.2017.61"},{"key":"1258_CR47","unstructured":"Li H, Kadav A, Durdanovic I et al (2016) Pruning filters for efficient convnets. arXiv preprint:\u00a0arXiv:1608.08710"},{"key":"1258_CR48","unstructured":"Changpinyo S, Sandler M, Zhmoginov A (2017) The power of sparsity in convolutional neural network. arXiv preprint:\u00a0arXiv:1702.06257"},{"key":"1258_CR49","doi-asserted-by":"crossref","unstructured":"Wang CY, Bochkovskiy A, Liao HYM (2021) Scaled-yolov4: Scaling cross stage partial network. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, p 13029\u201313038","DOI":"10.1109\/CVPR46437.2021.01283"},{"key":"1258_CR50","unstructured":"Ge Z, Liu S, Wang F et al (2021) Yolox: Exceeding yolo series in 2021. arXiv preprint:\u00a0arXiv:2107.08430"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-021-01258-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-021-01258-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-021-01258-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T10:17:32Z","timestamp":1744193852000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-021-01258-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,15]]},"references-count":50,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,3]]}},"alternative-id":["1258"],"URL":"https:\/\/doi.org\/10.1007\/s12083-021-01258-4","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,11,15]]},"assertion":[{"value":"2 August 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 October 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 November 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All authors in this work declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}