{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T16:31:29Z","timestamp":1771518689898,"version":"3.50.1"},"reference-count":91,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"7","license":[{"start":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T00:00:00Z","timestamp":1648771200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T00:00:00Z","timestamp":1648771200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T00:00:00Z","timestamp":1648771200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Major Research and Development Program of China","award":["2020YFB1807601"],"award-info":[{"award-number":["2020YFB1807601"]}]},{"name":"Young Elite Scientists Sponsorship Program by CAST","award":["2018QNRC001"],"award-info":[{"award-number":["2018QNRC001"]}]},{"name":"Innovation Project of Guangdong Educational Department","award":["2019KTSCX147"],"award-info":[{"award-number":["2019KTSCX147"]}]},{"DOI":"10.13039\/501100001381","name":"National Research Foundation, Singapore","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001381","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Infocomm Media Development Authority under its Future Communications Research and Development Programme"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2022,4,1]]},"DOI":"10.1109\/jiot.2021.3107902","type":"journal-article","created":{"date-parts":[[2021,8,26]],"date-time":"2021-08-26T20:49:12Z","timestamp":1630010952000},"page":"4958-4972","source":"Crossref","is-referenced-by-count":13,"title":["Hybrid-Learning-Based Operational Visual Quality Inspection for Edge-Computing-Enabled IoT System"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2457-8264","authenticated-orcid":false,"given":"Yinghao","family":"Chu","sequence":"first","affiliation":[{"name":"Shenzhen Key Laboratory of Digital Creative Technology, Guangdong Province Engineering Laboratory for Digital Creative Technology, College of Electronics and Information Engineering, Shenzhen University, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0667-1150","authenticated-orcid":false,"given":"Daquan","family":"Feng","sequence":"additional","affiliation":[{"name":"Shenzhen Key Laboratory of Digital Creative Technology, Guangdong Province Engineering Laboratory for Digital Creative Technology, College of Electronics and Information Engineering, Shenzhen University, Shenzhen, China"}]},{"given":"Zuozhu","family":"Liu","sequence":"additional","affiliation":[{"name":"ZJU&#x2013;UIUC Institute, Zhejiang University, Hangzhou, China"}]},{"given":"Zizhou","family":"Zhao","sequence":"additional","affiliation":[{"name":"Research and Development Department, AIATOR Company, Ltd., Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5953-1824","authenticated-orcid":false,"given":"Zhenzhong","family":"Wang","sequence":"additional","affiliation":[{"name":"Technical Management Center, China Media Group, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5599-7683","authenticated-orcid":false,"given":"Xiang-Gen","family":"Xia","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Delaware, Newark, DE, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4037-3149","authenticated-orcid":false,"given":"Tony Q. S.","family":"Quek","sequence":"additional","affiliation":[{"name":"Information Systems Technology and Design Pillar, Singapore University of Technology and Design, Singapore"}]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1982.1056489"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1002\/9780470382776"},{"key":"ref71","author":"kingma","year":"2014","journal-title":"Adam A method for stochastic optimization"},{"key":"ref70","first-page":"161","article-title":"The tradeoffs of large scale learning","author":"bottou","year":"2008","journal-title":"Proc Adv Neural Inform Process Syst"},{"key":"ref76","author":"harris","year":"2010","journal-title":"Digital Design and computer Architecture"},{"key":"ref77","first-page":"2825","article-title":"Scikit-learn: Machine learning in Python","volume":"12","author":"pedregosa","year":"2011","journal-title":"J Mach Learn Res"},{"key":"ref74","author":"bengio","year":"2012","journal-title":"Unsupervised Feature Learning and Deep Learning A Review and New Perspectives"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICDIP.2009.33"},{"key":"ref75","first-page":"547","article-title":"Effectiveness of normalization pre-processing of big data to the machine learning performance","volume":"14","author":"jo","year":"2019","journal-title":"J Korean Inst Comm Sci"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-14249-4_64"},{"key":"ref78","first-page":"1","article-title":"Machine learning from imbalanced data sets 101","volume":"68","author":"provost","year":"2000","journal-title":"Proc Workshop Imbalanced Data Sets"},{"key":"ref79","author":"howard","year":"2017","journal-title":"Mobilenets Efficient convolutional neural networks for mobile vision applications"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2014.2388435"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2668438"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2984887"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2579198"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICRAMET.2017.8253139"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.aei.2020.101037"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2015.2417676"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1561\/2000000039"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/3195970.3195997"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1561\/9781601982957"},{"key":"ref28","first-page":"740","article-title":"Microsoft COCO: Common objects in context","author":"lin","year":"2014","journal-title":"Proc Europ Conf Comp Vis (ECCV)"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1995.7.1.108"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-019-0197-0"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1204375"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/212094.212114"},{"key":"ref67","first-page":"3320","article-title":"How transferable are features in deep neural networks?","author":"yosinski","year":"2014","journal-title":"Proc Adv Neural Inform Process Syst"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01424-7_27"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1049\/cje.2016.11.016"},{"key":"ref69","first-page":"265","article-title":"TensorFlow: A system for large-scale machine learning","author":"abadi","year":"2016","journal-title":"Proc of USENIX Symp on Operating Systems Design and Implementation (OSDI)"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s40684-016-0015-5"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2996784"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmsy.2018.01.006"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmsy.2016.03.001"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2017.2668395"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2337336"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s40684-016-0039-x"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2012.6252468"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.4028\/www.scientific.net\/AMM.433-435.1752"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ICGCIoT.2015.7380718"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.74"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.319"},{"key":"ref59","author":"gulli","year":"2017","journal-title":"Deep Learning with Keras"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.pecs.2013.06.002"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.123"},{"key":"ref56","first-page":"249","article-title":"Understanding the difficulty of training deep feedforward neural networks","author":"glorot","year":"2010","journal-title":"Proc Int Conf Artif Intell Stat (ICAIS)"},{"key":"ref55","first-page":"807","article-title":"Rectified linear units improve restricted Boltzmann machines","author":"nair","year":"2010","journal-title":"Proc Int Conf Mach Learn (ICML)"},{"key":"ref54","first-page":"1","article-title":"Very deep convolutional networks for large-scale image recognition","author":"simonyan","year":"2015","journal-title":"Proc Int Conf Learn Represent (ICLR)"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2983050"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1115\/MSEC2020-8261"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmsy.2018.01.003"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1038\/nature14539","article-title":"Deep learning","volume":"521","author":"lecun","year":"2015","journal-title":"Nature"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.3390\/s18113837"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2958962"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2896120"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.1700442"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2019.01.028"},{"key":"ref82","author":"thrun","year":"2012","journal-title":"Learning to Learn"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2875926"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1145\/2818346.2830593"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.2762725"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1175\/JTECH-D-13-00209.1"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2918275"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1016\/j.renene.2016.05.041"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2995162"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2873426"},{"key":"ref89","first-page":"818","article-title":"Visualizing and understanding convolutional networks","author":"zeiler","year":"2014","journal-title":"Proc Eur Conf Comp Vis (ECCV)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2017.1700030"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2950048"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2017.1351644"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1186\/1687-5281-2014-50"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2018.2886017"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cirp.2016.04.072"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2019.2890858"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.3390\/app10030933"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.3390\/app9050909"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.cirp.2012.03.131"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.322"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/s12541-019-00074-4"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.rcim.2018.08.003"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmsy.2019.02.004"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.3390\/s20164505"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmsy.2020.06.020"},{"key":"ref41","article-title":"Automatic detection and location of weld beads with deep convolutional neural networks","volume":"70","author":"yang","year":"2020","journal-title":"IEEE Trans Instrum Meas"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/s00170-017-0461-4"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1115\/ESDA2010-24797"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/9741355\/09523588.pdf?arnumber=9523588","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,2]],"date-time":"2022-05-02T20:28:52Z","timestamp":1651523332000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9523588\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,1]]},"references-count":91,"journal-issue":{"issue":"7"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2021.3107902","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,4,1]]}}}