{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T19:04:18Z","timestamp":1730228658576,"version":"3.28.0"},"reference-count":7,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T00:00:00Z","timestamp":1676851200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T00:00:00Z","timestamp":1676851200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,2,20]]},"DOI":"10.1109\/icaiic57133.2023.10067059","type":"proceedings-article","created":{"date-parts":[[2023,3,23]],"date-time":"2023-03-23T17:38:05Z","timestamp":1679593085000},"page":"533-538","source":"Crossref","is-referenced-by-count":0,"title":["Data Pipeline Design for Dangerous Driving Behavior Detection System"],"prefix":"10.1109","author":[{"given":"Hyeonjun","family":"Jo","sequence":"first","affiliation":[{"name":"Interdisciplinary program of Information Security,Gwangju,South Korea"}]},{"given":"Sungwoong","family":"Yeom","sequence":"additional","affiliation":[{"name":"Chonnam National University,Department of Artificial Intelligence Convergence,Gwangju,South Korea"}]},{"given":"Haoyu","family":"Chen","sequence":"additional","affiliation":[{"name":"Chonnam National University,Department of Artificial Intelligence Convergence,Gwangju,South Korea"}]},{"given":"Kyungbaek","family":"Kim","sequence":"additional","affiliation":[{"name":"Chonnam National University,Department of Artificial Intelligence Convergence,Gwangju,South Korea"}]}],"member":"263","reference":[{"volume-title":"Korean International Semiconductor Conference on Manufacturing Technology","author":"Yeom","article-title":"Design of Driver Trustiness assessing system with dangerous driving behavior detection","key":"ref1"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/TITS.2021.3076140"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1007\/s11263-020-01400-4"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.3390\/s20216076"},{"key":"ref5","first-page":"2495","article-title":"A review of IoT sensing applications and challenges using RFID and wireless sensor networks","volume":"9","author":"Hugo","year":"2020","journal-title":"Sensors 20"},{"key":"ref6","article-title":"Yolov3: An incremental improvement","volume":"02767","author":"Joseph","year":"2018","journal-title":"arXiv preprint"},{"volume-title":"Proceedings of the IEEE conference on computer vision and pattern recognition","author":"Bolei","article-title":"Learning deep features for discriminative localization","key":"ref7"}],"event":{"name":"2023 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","start":{"date-parts":[[2023,2,20]]},"location":"Bali, Indonesia","end":{"date-parts":[[2023,2,23]]}},"container-title":["2023 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10066849\/10066958\/10067059.pdf?arnumber=10067059","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,3]],"date-time":"2024-03-03T04:35:53Z","timestamp":1709440553000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10067059\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,20]]},"references-count":7,"URL":"https:\/\/doi.org\/10.1109\/icaiic57133.2023.10067059","relation":{},"subject":[],"published":{"date-parts":[[2023,2,20]]}}}