{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T20:06:45Z","timestamp":1760731605399,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,7,5]],"date-time":"2023-07-05T00:00:00Z","timestamp":1688515200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"BMBF","award":["02L19C602"],"award-info":[{"award-number":["02L19C602"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,7,5]]},"DOI":"10.1145\/3594806.3596558","type":"proceedings-article","created":{"date-parts":[[2023,8,10]],"date-time":"2023-08-10T17:38:12Z","timestamp":1691689092000},"page":"535-542","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Anomaly Detection in the Metal-Textile Industry for the Reduction of the Cognitive Load of Quality Control Workers"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-6142-3253","authenticated-orcid":false,"given":"Tobias","family":"Arndt","sequence":"first","affiliation":[{"name":"FH Aachen University of Applied Sciences, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-4907-529X","authenticated-orcid":false,"given":"Max","family":"Conzen","sequence":"additional","affiliation":[{"name":"FH Aachen University of Applied Sciences, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3488-3855","authenticated-orcid":false,"given":"Ingo","family":"Elsen","sequence":"additional","affiliation":[{"name":"FH Aachen University of Applied Sciences, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0643-5422","authenticated-orcid":false,"given":"Alexander","family":"Ferrein","sequence":"additional","affiliation":[{"name":"FH Aachen University of Applied Sciences, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-6044-3606","authenticated-orcid":false,"given":"Oskar","family":"Galla","sequence":"additional","affiliation":[{"name":"FH Aachen University of Applied Sciences, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-4453-1385","authenticated-orcid":false,"given":"Hakan","family":"K\u00f6Se","sequence":"additional","affiliation":[{"name":"FH Aachen University of Applied Sciences, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1343-7140","authenticated-orcid":false,"given":"Stefan","family":"Schiffer","sequence":"additional","affiliation":[{"name":"iTec | RWTH Aachen University, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-0872-2835","authenticated-orcid":false,"given":"Matteo","family":"Tschesche","sequence":"additional","affiliation":[{"name":"FH Aachen University of Applied Sciences, Germany"}]}],"member":"320","published-online":{"date-parts":[[2023,8,10]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.26417\/ejes.v10i1.p248-252"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","unstructured":"Niv Cohen and Yedid Hoshen. 2020. Sub-Image Anomaly Detection with Deep Pyramid Correspondences. https:\/\/doi.org\/10.48550\/ARXIV.2005.02357","DOI":"10.48550\/ARXIV.2005.02357"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","unstructured":"Yajie Cui Zhaoxiang Liu and Shiguo Lian. 2022. A Survey on Unsupervised Visual Industrial Anomaly Detection Algorithms. https:\/\/doi.org\/10.48550\/ARXIV.2204.11161","DOI":"10.48550\/ARXIV.2204.11161"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","unstructured":"Thomas Defard Aleksandr Setkov Angelique Loesch and Romaric Audigier. 2020. PaDiM: a Patch Distribution Modeling Framework for Anomaly Detection and Localization. https:\/\/doi.org\/10.48550\/ARXIV.2011.08785","DOI":"10.48550\/ARXIV.2011.08785"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-8141(96)00040-6"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3234745"},{"key":"e_1_3_2_1_7_1","unstructured":"Jin-Hwa Kim Do-Hyeong Kim Saehoon Yi and Taehoon Lee. 2021. Semi-orthogonal embedding for efficient unsupervised anomaly segmentation. (2021)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","unstructured":"Ning Li Kaitao Jiang Zhiheng Ma Xing Wei Xiaopeng Hong and Yihong Gong. 2021. Anomaly Detection via Self-organizing Map. https:\/\/doi.org\/10.48550\/ARXIV.2107.09903","DOI":"10.48550\/ARXIV.2107.09903"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","unstructured":"Jiaqi Liu Guoyang Xie Jingbao Wang Shangnian Li Chengjie Wang Feng Zheng and Yaochu Jin. 2023. Deep Industrial Image Anomaly Detection: A Survey. https:\/\/doi.org\/10.48550\/ARXIV.2301.11514","DOI":"10.48550\/ARXIV.2301.11514"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1006\/cviu.1995.1017"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/tim.2021.3098381"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","unstructured":"Nicolae-Catalin Ristea Neelu Madan Radu\u00a0Tudor Ionescu Kamal Nasrollahi Fahad\u00a0Shahbaz Khan Thomas\u00a0B. Moeslund and Mubarak Shah. 2021. Self-Supervised Predictive Convolutional Attentive Block for Anomaly Detection. https:\/\/doi.org\/10.48550\/ARXIV.2111.09099","DOI":"10.48550\/ARXIV.2111.09099"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","unstructured":"Karsten Roth Latha Pemula Joaquin Zepeda Bernhard Sch\u00f6lkopf Thomas Brox and Peter Gehler. 2021. Towards Total Recall in Industrial Anomaly Detection. https:\/\/doi.org\/10.48550\/ARXIV.2106.08265","DOI":"10.48550\/ARXIV.2106.08265"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1108\/IJLSS-12-2013-0059"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/tim.2022.3196436"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1108\/20401461011075017"},{"key":"e_1_3_2_1_18_1","unstructured":"Guodong Wang Shumin Han Errui Ding and Di Huang. 2021. Student-Teacher Feature Pyramid Matching for Anomaly Detection. arXiv:arXiv:2103.04257"},{"key":"e_1_3_2_1_19_1","unstructured":"R\u00fcdiger Wirth and Jochen Hipp. 2000. Crisp-dm: towards a standard process modell for data mining."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.3923\/jas.2014.3464.3471"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Vitjan Zavrtanik Matej Kristan and Danijel Sko\u010daj. 2021. DRAEM \u2013 A discriminatively trained reconstruction embedding for surface anomaly detection. arXiv:arXiv:2108.07610","DOI":"10.1016\/j.patcog.2020.107706"}],"event":{"name":"PETRA '23: Proceedings of the 16th International Conference on PErvasive Technologies Related to Assistive Environments","acronym":"PETRA '23","location":"Corfu Greece"},"container-title":["Proceedings of the 16th International Conference on PErvasive Technologies Related to Assistive Environments"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3594806.3596558","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3594806.3596558","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:07Z","timestamp":1750182547000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3594806.3596558"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,5]]},"references-count":20,"alternative-id":["10.1145\/3594806.3596558","10.1145\/3594806"],"URL":"https:\/\/doi.org\/10.1145\/3594806.3596558","relation":{},"subject":[],"published":{"date-parts":[[2023,7,5]]},"assertion":[{"value":"2023-08-10","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}