{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T15:49:32Z","timestamp":1778168972861,"version":"3.51.4"},"reference-count":387,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3425166","type":"journal-article","created":{"date-parts":[[2024,7,8]],"date-time":"2024-07-08T17:41:32Z","timestamp":1720460492000},"page":"94250-94295","source":"Crossref","is-referenced-by-count":181,"title":["A Comprehensive Review of Convolutional Neural Networks for Defect Detection in Industrial Applications"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-5596-507X","authenticated-orcid":false,"given":"Rahima","family":"Khanam","sequence":"first","affiliation":[{"name":"Department of Computer Science, School of Computing and Engineering, University of Huddersfield, Huddersfield, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8458-6202","authenticated-orcid":false,"given":"Muhammad","family":"Hussain","sequence":"additional","affiliation":[{"name":"Department of Computer Science, School of Computing and Engineering, University of Huddersfield, Huddersfield, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0105-7730","authenticated-orcid":false,"given":"Richard","family":"Hill","sequence":"additional","affiliation":[{"name":"Department of Computer Science, School of Computing and Engineering, University of Huddersfield, Huddersfield, U.K."}]},{"given":"Paul","family":"Allen","sequence":"additional","affiliation":[{"name":"Department of Computer Science, School of Computing and Engineering, University of Huddersfield, Huddersfield, U.K."}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1177\/0008125619864925"},{"issue":"1","key":"ref2","first-page":"1","article-title":"The emerging role of artificial intelligence in modern society","volume":"1","author":"Nadikattu","year":"2016","journal-title":"Int. J. Creative Res. Thoughts"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/computers12080151"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26485-1_33"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-020-09825-6"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/7068349"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/BF02459570"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2020.3004171"},{"key":"ref9","volume-title":"Deep Learning","author":"Goodfellow","year":"2016"},{"key":"ref10","volume-title":"Deep Learning","volume":"1","author":"Bengio","year":"2017"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3084827"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2017.10.013"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICEngTechnol.2017.8308186"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3390\/info12020052"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3390\/info8040142"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICISCAE.2018.8666928"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICCWAMTIP.2018.8632576"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2019.08.096"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/W14-2405"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2567948.2577348"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/P14-1062"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1181"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1390156.1390177"},{"key":"ref24","article-title":"Efficient estimation of word representations in vector space","author":"Mikolov","year":"2013","journal-title":"arXiv:1301.3781"},{"key":"ref25","first-page":"2493","article-title":"Natural language processing (almost) from scratch","volume":"12","author":"Collobert","year":"2493","journal-title":"J. Mach. Learn. Res."},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICBDA.2017.8078730"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2018.05.198"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1162\/neco_a_00990"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.3390\/app10103443"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2015.7178920"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.3390\/app12126223"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.3390\/s22041414"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.3390\/sym11091185"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1186\/s13636-014-0047-0"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2016.2584107"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2017.2688340"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/PDP.2010.43"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2015.09.116"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ITT59889.2023.10184244"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ITT59889.2023.10184236"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.3390\/s23136235"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3426826.3426832"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.3390\/jimaging9100193"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.3390\/coatings13010017"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.12700\/APH.19.3.2022.3.14"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2020.110512"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-023-09041-7"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.solener.2023.112186"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8189403"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/9948808"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1177\/00405175221130773"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3116131"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11060945"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.3390\/fi12070113"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46478-7_29"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/CTEMS.2018.8769211"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1117\/12.2512087"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2020.10.004"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11081266"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1080\/09540091.2020.1841111"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1016\/j.protcy.2014.09.007"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.3390\/a15110391"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.2991\/ijcis.d.200120.002"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.3389\/fnbot.2023.1278986"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.117833"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2913620"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/2318\/1\/012013"},{"issue":"3","key":"ref68","first-page":"636","article-title":"Research of facial beauty prediction based on deep convolutional features using double activation layer","volume":"47","author":"Gan","year":"2019","journal-title":"Acta Electonica Sinica"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.23919\/FPL.2017.8056771"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/ICECS53924.2021.9665520"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/6348424"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2022.108797"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/asru.2015.7404828"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/WACV.2016.7477624"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6798-3"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/eStream.2019.8732160"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.5555\/3045118.3045167"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-08453-9"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.2478\/amns.2022.1.00011"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/NCC48643.2020.9055989"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1088\/1757-899X\/1125\/1\/012049"},{"key":"ref82","article-title":"Improving neural networks by preventing co-adaptation of feature detectors","author":"Hinton","year":"2012","journal-title":"arXiv:1207.0580"},{"issue":"1","key":"ref83","first-page":"1929","article-title":"Dropout: A simple way to prevent neural networks from overfitting","volume":"15","author":"Srivastava","year":"2014","journal-title":"J. Mach. Learn. Res."},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2023.110229"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.3390\/app11114940"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-021-99975-6"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2851942"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1049\/iet-rsn.2018.5549"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2018.01.036"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2018.10.512"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/ITCA52113.2020.00096"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1016\/j.compbiomed.2022.106183"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-022-19020-y"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIT57492.2022.10055091"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11223799"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-49430-8_2"},{"key":"ref97","first-page":"3304","article-title":"End-to-end text recognition with convolutional neural networks","volume-title":"Proc. 21st Int. Conf. Pattern Recognit. (ICPR)","author":"Wang"},{"key":"ref98","article-title":"Empirical evaluation of rectified activations in convolutional network","author":"Xu","year":"2015","journal-title":"arXiv:1505.00853"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1710.05941"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488598000094"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1811.03378"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1145\/3446212"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1007\/s11554-021-01147-2"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/ICAC3N56670.2022.10074346"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-32213-6_16"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/ICCEREC.2018.8712086"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2020.2985727"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-14603-x"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-19-6893-8_13"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6861-0"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2018.2858232"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2022.3145820"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/CSASE48920.2020.9142089"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1037\/h0042519"},{"key":"ref115","volume-title":"Principles of Neurodynamics: Perceptrons and the Theory of Brain Mechanisms","author":"Rosenblatt","year":"1962"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.21236\/AD0241531"},{"key":"ref117","volume-title":"The Roots of Backpropagation: From Ordered Derivatives to Neural Networks and Political Forecasting","author":"Werbos","year":"1994"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1113\/jphysiol.1962.sp006837"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1007\/BF00344251"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref121","first-page":"1","article-title":"Handwritten digit recognition with a back-propagation network","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"LeCun"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/7503.003.0024"},{"key":"ref123","first-page":"1","article-title":"Imagenet classification with deep convolutional neural networks","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Krizhevsky"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1145\/3065386"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.5555\/3104322.3104425"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10590-1_53"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.13140\/RG.2.2.18893.74727"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2017.10.006"},{"key":"ref130","article-title":"Very deep convolutional networks for large-scale image recognition","author":"Simonyan","year":"2014","journal-title":"arXiv:1409.1556"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10202470"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.243"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/WACV48630.2021.00359"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.5555\/3298023.3298188"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.5244\/C.30.87"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.634"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.415"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.668"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.683"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1807.06521"},{"key":"ref143","article-title":"A new channel boosted convolutional neural network using transfer learning","author":"Khan","year":"2018","journal-title":"arXiv:1804.08528"},{"key":"ref144","article-title":"MobileNets: Efficient convolutional neural networks for mobile vision applications","author":"Howard","year":"2017","journal-title":"arXiv:1704.04861"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00474"},{"key":"ref146","first-page":"6105","article-title":"EfficientNet: Rethinking model scaling for convolutional neural networks","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Tan"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2022.3152247"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00986"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01548"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.3390\/foods11233914"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-21199-7_12"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1145\/3593588"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-009-0275-4"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-015-0816-y"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2017.05.025"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1109\/tpami.2016.2577031"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298932"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.5555\/3045118.3045336"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2017.2708709"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10584-0_20"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298642"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.343"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2010.05.006"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1007\/s10846-011-9611-3"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2017.2736553"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2001.990517"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1023\/B:VISI.0000013087.49260.fb"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.177"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.1999.790410"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1023\/b:visi.0000029664.99615.94"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1109\/34.993558"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2008.4587597"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2010.5539906"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2011.6126229"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04174-7_2"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2014.42"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.81"},{"key":"ref178","first-page":"1","article-title":"Object detection with grammar models","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Girshick"},{"key":"ref179","volume-title":"From Rigid Templates to Grammars: Object Detection With Structured Models","author":"Girshick","year":"2012"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2015.2437384"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-013-0620-5"},{"key":"ref182","volume-title":"Discriminatively Trained Deformable Part Models","author":"Girshick","year":"2012"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2015.2389824"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.169"},{"key":"ref185","first-page":"1","article-title":"R-FCN: Object detection via region-based fully convolutional networks","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Dai"},{"key":"ref186","article-title":"Light-head R-CNN: In defense of two-stage object detector","author":"Li","year":"2017","journal-title":"arXiv:1711.07264"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.106"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.322"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.91"},{"key":"ref190","volume-title":"Darknet: Open Source Neural Networks in C","author":"Redmon","year":"2013"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.690"},{"key":"ref192","article-title":"YOLOv3: An incremental improvement","author":"Redmon","year":"2018","journal-title":"arXiv:1804.02767"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10602-1_48"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2004.10934"},{"key":"ref195","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01215"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1908.08681"},{"key":"ref197","volume-title":"Ultralytics\/YOLOv5: V3.0","author":"Jocher","year":"2020"},{"key":"ref198","volume-title":"Ultralytics\/YOLOv5: V4.0\u2014Activations, Weights & Biases Logging, PyTorch Hub Integration, 2021","author":"Jocher","year":"2021"},{"key":"ref199","doi-asserted-by":"publisher","DOI":"10.3390\/machines11070677"},{"key":"ref200","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2209.02976"},{"key":"ref201","volume-title":"YOLOv6 Object Detection Tutorial","author":"Rath","year":"2022"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00721"},{"key":"ref203","volume-title":"Ultralytics Github Repository","year":"2023"},{"key":"ref204","volume-title":"What is YOLOv8? The Ultimate Guide","author":"Solawetz","year":"2023"},{"key":"ref205","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46448-0_2"},{"key":"ref206","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.324"},{"key":"ref207","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2017.60"},{"key":"ref208","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1602.07360"},{"key":"ref209","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00418"},{"key":"ref210","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01264-9_45"},{"key":"ref211","article-title":"Objects as points","author":"Zhou","year":"2019","journal-title":"arXiv:1904.07850"},{"key":"ref212","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2017.2745563"},{"key":"ref213","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58452-8_13"},{"key":"ref214","article-title":"Deformable DETR: Deformable transformers for end-to-end object detection","author":"Zhu","year":"2020","journal-title":"arXiv:2010.04159"},{"key":"ref215","volume-title":"Theano","year":"2024"},{"key":"ref216","volume-title":"Berkeley Vision and Learning Center","year":"2024"},{"key":"ref217","volume-title":"Deeplearning4j","year":"2024"},{"key":"ref218","volume-title":"TensorFlow","year":"2024"},{"key":"ref219","volume-title":"Keras","year":"2024"},{"key":"ref220","volume-title":"Chainer","year":"2024"},{"key":"ref221","volume-title":"Apache","year":"2024"},{"key":"ref222","volume-title":"MXnet","year":"2024"},{"key":"ref223","volume-title":"Microsoft Cognitive Toolkit CNTK","year":"2024"},{"key":"ref224","volume-title":"PyTorch","year":"2024"},{"key":"ref225","volume-title":"Neon","year":"2024"},{"key":"ref226","volume-title":"BigDL","year":"2024"},{"key":"ref227","volume-title":"Clarifai","year":"2024"},{"key":"ref228","volume-title":"Cloud Sight","year":"2024"},{"key":"ref229","volume-title":"Microsoft Cognitive Service","year":"2024"},{"key":"ref230","volume-title":"Google Cloud Vision API","year":"2024"},{"key":"ref231","volume-title":"IBM Watson Vision Recognition Service","year":"2024"},{"key":"ref232","volume-title":"Amazon Recognition","year":"2024"},{"key":"ref233","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-014-0733-5"},{"key":"ref234","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-020-01316-z"},{"key":"ref235","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.01197"},{"key":"ref236","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00852"},{"issue":"3","key":"ref237","first-page":"18","article-title":"OpenImages: A public dataset for large-scale multi-label and multi-class image classification","volume":"2","author":"Krasin","year":"2017","journal-title":"Dataset"},{"key":"ref238","article-title":"Roboflow 100: A rich, multi-domain object detection benchmark","author":"Ciaglia","year":"2022","journal-title":"arXiv:2211.13523"},{"key":"ref239","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206631"},{"key":"ref240","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2011.155"},{"key":"ref241","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2015.7363748"},{"key":"ref242","doi-asserted-by":"publisher","DOI":"10.1145\/2366231.2337216"},{"key":"ref243","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2011.77"},{"key":"ref244","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1047.2012.00149"},{"key":"ref245","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2012.04.003"},{"key":"ref246","doi-asserted-by":"publisher","DOI":"10.21105\/joss.02367"},{"key":"ref247","doi-asserted-by":"publisher","DOI":"10.1515\/nleng-2022-0027"},{"key":"ref248","doi-asserted-by":"publisher","DOI":"10.1109\/MCSE.2010.69"},{"key":"ref249","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2008.57"},{"key":"ref250","article-title":"Hardware acceleration of convolutional neural networks","author":"Halvorsen","year":"2015"},{"key":"ref251","article-title":"CuDNN: Efficient primitives for deep learning","author":"Chetlur","year":"2014","journal-title":"arXiv:1410.0759"},{"key":"ref252","volume-title":"CUDA Convnet2","year":"2024"},{"key":"ref253","doi-asserted-by":"publisher","DOI":"10.1145\/2647868.2654889"},{"key":"ref254","first-page":"1","article-title":"Torch7: A MATLAB-like environment for machine learning","volume-title":"Proc. BigLearn, NIPS Workshop","author":"Collobert"},{"key":"ref255","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2019.01.011"},{"key":"ref256","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/7321394"},{"key":"ref257","volume-title":"Raspberry Pi 4 Model B","year":"2024"},{"key":"ref258","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.11.025"},{"key":"ref259","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijpe.2019.01.004"},{"key":"ref260","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-3594-5_2"},{"key":"ref261","doi-asserted-by":"publisher","DOI":"10.1145\/2847263.2847265"},{"key":"ref262","doi-asserted-by":"publisher","DOI":"10.1145\/3020078.3021740"},{"key":"ref263","doi-asserted-by":"publisher","DOI":"10.1080\/00207217.2010.512017"},{"key":"ref264","doi-asserted-by":"publisher","DOI":"10.1109\/NEUREL.2014.7011454"},{"key":"ref265","volume-title":"Digital System Design With FPGA: Implementation Using Verilog and VHDL","author":"\u00dcnsalan","year":"2017"},{"key":"ref266","doi-asserted-by":"publisher","DOI":"10.1145\/3020078.3021741"},{"key":"ref267","first-page":"1","article-title":"Overcoming data transfer bottlenecks in FPGA-based DNN accelerators via layer conscious memory management","volume-title":"Proc. 56th ACM\/IEEE Design Autom. Conf. (DAC)","author":"Wei"},{"key":"ref268","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2018.2825145"},{"key":"ref269","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2019.2941250"},{"key":"ref270","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.435"},{"key":"ref271","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPSW.2016.182"},{"key":"ref272","doi-asserted-by":"crossref","DOI":"10.1137\/1.9781611970364","volume-title":"Arithmetic Complex. Computations","author":"Winograd","year":"1980"},{"key":"ref273","doi-asserted-by":"publisher","DOI":"10.1109\/FPT.2016.7929549"},{"key":"ref274","doi-asserted-by":"publisher","DOI":"10.1109\/ASAP.2009.25"},{"key":"ref275","doi-asserted-by":"publisher","DOI":"10.1145\/1815961.1815993"},{"key":"ref276","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2011.5981829"},{"key":"ref277","doi-asserted-by":"publisher","DOI":"10.1145\/2684746.2689060"},{"key":"ref278","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2017.7927162"},{"key":"ref279","doi-asserted-by":"publisher","DOI":"10.1145\/3154839"},{"key":"ref280","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44687-7_41"},{"key":"ref281","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298681"},{"key":"ref282","article-title":"Training deep neural networks with low precision multiplications","author":"Courbariaux","year":"2014","journal-title":"arXiv:1412.7024"},{"key":"ref283","doi-asserted-by":"publisher","DOI":"10.23919\/FPL.2017.8056833"},{"key":"ref284","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.643"},{"key":"ref285","doi-asserted-by":"publisher","DOI":"10.1145\/3005448"},{"key":"ref286","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2013.355"},{"key":"ref287","doi-asserted-by":"publisher","DOI":"10.1145\/2847263.2847276"},{"key":"ref288","doi-asserted-by":"publisher","DOI":"10.1145\/3020078.3021736"},{"key":"ref289","article-title":"Binarized neural networks: Training deep neural networks with weights and activations constrained to + or -","author":"Courbariaux","year":"2016","journal-title":"arXiv:1602.02830"},{"key":"ref290","doi-asserted-by":"publisher","DOI":"10.1177\/15589250221101382"},{"key":"ref291","doi-asserted-by":"publisher","DOI":"10.1109\/TMAG.2022.3210067"},{"key":"ref292","volume-title":"Huawei Reveals the Future of Mobile AI at IFA","year":"2017"},{"key":"ref293","doi-asserted-by":"publisher","DOI":"10.1145\/3079856.3080246"},{"key":"ref294","volume-title":"The Iphone X\u2019s New Neural Engine Exemplifies Apple\u2019s Approach To AI","author":"Vincent","year":"2017"},{"key":"ref295","doi-asserted-by":"publisher","DOI":"10.1145\/3361682"},{"key":"ref296","doi-asserted-by":"publisher","DOI":"10.1145\/1117201.1117205"},{"issue":"11","key":"ref297","first-page":"1","article-title":"Accelerating deep convolutional neural networks using specialized hardware","volume":"2","author":"Ovtcharov","year":"2015","journal-title":"Microsoft Res. Whitepaper"},{"key":"ref298","volume-title":"Groq Rocks Neural Networks","author":"Gwennap","year":"2020"},{"key":"ref299","doi-asserted-by":"publisher","DOI":"10.1145\/3093336.3037749"},{"key":"ref300","volume-title":"Supply Chain Management: A Logistics Perspective","author":"Coyle","year":"2021"},{"key":"ref301","doi-asserted-by":"publisher","DOI":"10.23919\/ICAC50006.2021.9594180"},{"key":"ref302","doi-asserted-by":"publisher","DOI":"10.3390\/jmmp6040075"},{"key":"ref303","doi-asserted-by":"publisher","DOI":"10.3390\/s22186927"},{"key":"ref304","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3283596"},{"key":"ref305","doi-asserted-by":"publisher","DOI":"10.3390\/bdcc7020120"},{"issue":"1","key":"ref306","first-page":"169","article-title":"Attention-based automated pallet racking damage detection","volume":"1","author":"Alif","year":"2024","journal-title":"Int. J. Innov. Sci. Res. Technol."},{"key":"ref307","doi-asserted-by":"publisher","DOI":"10.1007\/s10723-023-09738-y"},{"key":"ref308","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2019.2963555"},{"key":"ref309","doi-asserted-by":"publisher","DOI":"10.1002\/srin.201600068"},{"key":"ref310","doi-asserted-by":"publisher","DOI":"10.1111\/mice.12263"},{"key":"ref311","doi-asserted-by":"publisher","DOI":"10.1111\/mice.12334"},{"key":"ref312","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2019.2915404"},{"key":"ref313","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2945403"},{"key":"ref314","doi-asserted-by":"publisher","DOI":"10.3390\/s21217264"},{"key":"ref315","doi-asserted-by":"publisher","DOI":"10.1109\/CCDC52312.2021.9602435"},{"key":"ref316","doi-asserted-by":"publisher","DOI":"10.3390\/sym13040706"},{"key":"ref317","doi-asserted-by":"publisher","DOI":"10.1080\/08839514.2021.1975391"},{"key":"ref318","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2023.01.172"},{"key":"ref319","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-14249-4_64"},{"key":"ref320","doi-asserted-by":"publisher","DOI":"10.1109\/WCICA.2018.8630525"},{"key":"ref321","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2016.2644615"},{"key":"ref322","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2958826"},{"key":"ref323","doi-asserted-by":"publisher","DOI":"10.23919\/ICACT.2018.8323641"},{"key":"ref324","doi-asserted-by":"publisher","DOI":"10.1109\/CAC.2018.8623082"},{"key":"ref325","doi-asserted-by":"publisher","DOI":"10.1109\/VPPC46532.2019.8952236"},{"key":"ref326","doi-asserted-by":"publisher","DOI":"10.1007\/s00371-018-1588-5"},{"key":"ref327","doi-asserted-by":"publisher","DOI":"10.3390\/en15228667"},{"key":"ref328","doi-asserted-by":"publisher","DOI":"10.1109\/TSM.2019.2921951"},{"key":"ref329","volume-title":"World\u2019s Largest Nighttime Solar Module Electroluminescence (EL) Testing Identifies Causes of Six-Figure Losses for Major O&M","year":"2024"},{"key":"ref330","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3178588"},{"key":"ref331","doi-asserted-by":"publisher","DOI":"10.1088\/1755-1315\/354\/1\/012106"},{"key":"ref332","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3008021"},{"key":"ref333","doi-asserted-by":"publisher","DOI":"10.1049\/iet-rpg.2019.1342"},{"key":"ref334","volume-title":"Textile Handbook","year":"2000"},{"key":"ref335","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2011.02.002"},{"key":"ref336","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2022.111665"},{"key":"ref337","doi-asserted-by":"publisher","DOI":"10.1177\/0040517520955229"},{"key":"ref338","doi-asserted-by":"publisher","DOI":"10.1177\/15589250211008346"},{"key":"ref339","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-7305-2_16"},{"key":"ref340","doi-asserted-by":"publisher","DOI":"10.1109\/TSM.2017.2777499"},{"key":"ref341","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2018.03.013"},{"key":"ref342","doi-asserted-by":"publisher","DOI":"10.1109\/SIPROCESS.2019.8868737"},{"key":"ref343","doi-asserted-by":"publisher","DOI":"10.3390\/app8091575"},{"key":"ref344","doi-asserted-by":"publisher","DOI":"10.3390\/a14090257"},{"key":"ref345","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3068256"},{"key":"ref346","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1827\/1\/012167"},{"key":"ref347","doi-asserted-by":"publisher","DOI":"10.1109\/TCPMT.2022.3147319"},{"issue":"1","key":"ref348","first-page":"1","article-title":"Development of PCB defect detection system using image processing with YOLO CNN method","volume":"6","author":"Santoso","year":"2022","journal-title":"Int. J. Artif. Intell. Res."},{"key":"ref349","doi-asserted-by":"publisher","DOI":"10.1109\/SmartIoT.2019.00075"},{"key":"ref350","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2021.3059105"},{"key":"ref351","doi-asserted-by":"publisher","DOI":"10.1109\/ICAMechS.2017.8316494"},{"key":"ref352","doi-asserted-by":"publisher","DOI":"10.3390\/electronics8050481"},{"key":"ref353","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2022.112208"},{"key":"ref354","doi-asserted-by":"publisher","DOI":"10.1007\/s10845-018-1415-x"},{"key":"ref355","doi-asserted-by":"publisher","DOI":"10.1007\/s10845-020-01563-4"},{"key":"ref356","doi-asserted-by":"publisher","DOI":"10.1155\/2023\/4096164"},{"key":"ref357","doi-asserted-by":"publisher","DOI":"10.1109\/RI2C48728.2019.8999883"},{"key":"ref358","doi-asserted-by":"publisher","DOI":"10.1049\/icp.2021.0415"},{"key":"ref359","doi-asserted-by":"publisher","DOI":"10.1109\/ICT4DA56482.2022.9971271"},{"key":"ref360","doi-asserted-by":"publisher","DOI":"10.1145\/3297156.3297190"},{"key":"ref361","doi-asserted-by":"publisher","DOI":"10.1117\/12.2540562"},{"key":"ref362","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-08407-1"},{"key":"ref363","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11010055"},{"key":"ref364","doi-asserted-by":"publisher","DOI":"10.1002\/int.22935"},{"key":"ref365","doi-asserted-by":"publisher","DOI":"10.1016\/j.ceramint.2021.12.328"},{"key":"ref366","doi-asserted-by":"publisher","DOI":"10.3390\/s20164398"},{"key":"ref367","doi-asserted-by":"publisher","DOI":"10.1007\/s00226-021-01316-3"},{"key":"ref368","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3266737"},{"key":"ref369","doi-asserted-by":"publisher","DOI":"10.1109\/IWSSIP48289.2020.9145130"},{"key":"ref370","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-022-13644-y"},{"key":"ref371","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07386-6_2"},{"key":"ref372","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2022.01.135"},{"key":"ref373","doi-asserted-by":"publisher","DOI":"10.3390\/s22093537"},{"key":"ref374","article-title":"Real time object detection system with YOLO and CNN models: A review","author":"Chandana","year":"2022","journal-title":"arXiv:2208.00773"},{"key":"ref375","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3229767"},{"key":"ref376","doi-asserted-by":"publisher","DOI":"10.1109\/TAI.2024.3377147"},{"key":"ref377","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2019.11.041"},{"key":"ref378","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.06.037"},{"key":"ref379","doi-asserted-by":"publisher","DOI":"10.1016\/j.promfg.2019.06.115"},{"key":"ref380","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2023.103911"},{"issue":"12","key":"ref381","first-page":"1","article-title":"Ensuring data privacy and security in healthcare computer vision and AI applications: Investigating techniques for anonymization, encryption, and federated learning","volume":"13","author":"Ismail","year":"2023","journal-title":"Int. J. Appl. Mach. Learn. Comput. Intell."},{"key":"ref382","doi-asserted-by":"publisher","DOI":"10.1145\/3502287"},{"key":"ref383","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-023-00727-2"},{"key":"ref384","article-title":"Overcoming data scarcity with transfer learning","author":"Hutchinson","year":"2017","journal-title":"arXiv:1711.05099"},{"key":"ref385","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2023.101866"},{"key":"ref386","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.113710"},{"key":"ref387","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-023-10438-y"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10380310\/10589380.pdf?arnumber=10589380","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,19]],"date-time":"2024-07-19T04:50:58Z","timestamp":1721364658000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10589380\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":387,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3425166","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}