{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T04:03:56Z","timestamp":1745985836479,"version":"3.40.4"},"reference-count":48,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"name":"Zhongguancun Science Park Xicheng Park Man-Agement Committee (Beijing Xicheng District Science and Technology Commission) Xicheng District Science and Technology Special Project","award":["XCSTS-TI2024-31"],"award-info":[{"award-number":["XCSTS-TI2024-31"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/access.2025.3562926","type":"journal-article","created":{"date-parts":[[2025,4,21]],"date-time":"2025-04-21T17:39:37Z","timestamp":1745257177000},"page":"70650-70662","source":"Crossref","is-referenced-by-count":0,"title":["Tunnel Crack Segmentation Algorithm Based on Feature Enhancement"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-4890-2771","authenticated-orcid":false,"given":"Lihua","family":"Feng","sequence":"first","affiliation":[{"name":"College of Architecture and Civil Engineering, Beijing University of Technology, Beijing, China"}]},{"given":"Aijun","family":"Yao","sequence":"additional","affiliation":[{"name":"College of Architecture and Civil Engineering, Beijing University of Technology, Beijing, China"}]},{"given":"An","family":"Huang","sequence":"additional","affiliation":[{"name":"College of Architecture and Civil Engineering, Beijing University of Technology, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2023.3348812"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.engfailanal.2023.107327"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3279888"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC57777.2023.10421958"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC58415.2024.10919563"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2015.2509278"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2006.313007"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1002\/tee.22056"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1061\/(ASCE)CP.1943-5487.0000447"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2011.267"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2015.2477675"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2023.3307751"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT62078.2024.10811219"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/I2MTC53148.2023.10175972"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3390\/s24134124"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SAS60918.2024.10636583"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2015.2437384"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.169"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2016.2577031"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.322"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2209.02976"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00721"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-72751-1_1"},{"key":"ref24","article-title":"YOLOv10: Real-time end-to-end object detection","author":"Wang","year":"2024","journal-title":"arXiv:2405.14458"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46448-0_2"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.3390\/s23135992"},{"key":"ref27","article-title":"Batch normalization: Accelerating deep network training by reducing internal covariate shift","author":"Ioffe","year":"2015","journal-title":"arXiv:1502.03167"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3135006"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/SAS58821.2023.10254126"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/SAS54819.2022.9881386"},{"key":"ref31","article-title":"Survey of quantization techniques for on-device vision-based crack detection","author":"Zhang","year":"2025","journal-title":"arXiv:2502.02269"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.autcon.2022.104346"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2022.3147669"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.autcon.2022.104275"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2023.3272052"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.jrmge.2023.02.025"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.3233\/JIFS-201296"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1111\/mice.13003"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00745"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01155"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00813"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1807.06521"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3459588"},{"key":"ref44","article-title":"An image is worth 16\u00d716 words: Transformers for image recognition at scale","author":"Dosovitskiy","year":"2020","journal-title":"arXiv:2010.11929"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00986"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24574-4_28"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.660"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2017.2699184"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10820123\/10971940.pdf?arnumber=10971940","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T04:36:13Z","timestamp":1745901373000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10971940\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":48,"URL":"https:\/\/doi.org\/10.1109\/access.2025.3562926","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2025]]}}}