{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T15:57:45Z","timestamp":1765209465839,"version":"3.46.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,17]],"date-time":"2023-11-17T00:00:00Z","timestamp":1700179200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,17]]},"DOI":"10.1145\/3652628.3652759","type":"proceedings-article","created":{"date-parts":[[2024,5,23]],"date-time":"2024-05-23T10:36:46Z","timestamp":1716460606000},"page":"787-792","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Application of lightweight method based on YOLOv5s+mobileV3 on edge computing platform"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-7824-0328","authenticated-orcid":false,"given":"Sen","family":"Shen","sequence":"first","affiliation":[{"name":"Naval University of Engineering, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-9026-1222","authenticated-orcid":false,"given":"Renkai","family":"Xiao","sequence":"additional","affiliation":[{"name":"Naval University of Engineering, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-1856-7759","authenticated-orcid":false,"given":"Min","family":"Li","sequence":"additional","affiliation":[{"name":"Naval University of Engineering, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2804-6740","authenticated-orcid":false,"given":"Shengzhi","family":"Yuan","sequence":"additional","affiliation":[{"name":"School of Weapon Engineering, Naval University of Engineering, China"}]}],"member":"320","published-online":{"date-parts":[[2024,5,23]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.3969\/j.issn.1673-629X.2022.11.020"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.3778\/j.issn.1002-8331.2206-0231"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.3969\/j.issn.1671-637X.2023.02.005"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.3969\/j.issn.1672-9528.2023.01.021"},{"key":"e_1_3_2_1_5_1","volume-title":"China Electric Power Construction, 2023","author":"Yuehua Huang","year":"2023","unstructured":"Huang Yuehua, Chen Zhaoyuan, Chen Qing, 2023. Transmission line fault real-time detection Method based on Edge computing and improved YOLOv5s algorithm [J]. China Electric Power Construction, 2023, 44(1):91-99. DOI:1 0.12204\/j.issn.1000-7229.2023.01.011."},{"key":"e_1_3_2_1_6_1","article-title":"Small target detection algorithm based on improved YOLOv5 [J]","volume":"2022","author":"Lei Guo","year":"2022","unstructured":"Guo Lei, Wang Qiulong, Xue Wei, 2022. Small target detection algorithm based on improved YOLOv5 [J]. Journal of University of Electronic Science and Technology of China, 2022, 51 (2): 251-258.","journal-title":"Journal of University of Electronic Science and Technology of China"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00745"},{"key":"e_1_3_2_1_8_1","volume-title":"Generative Adversarial Nets for Fragmentary Data Imputation and Predictio [J]","author":"Fang","year":"2022","unstructured":"Fang F, Bao S. 2022. Generative Adversarial Nets for Fragmentary Data Imputation and Predictio [J]. 2022. The DOI: 10.48550 \/ arXiv. 2203.04692."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"REDMON J DIVVALA S GIRSHICK R 2016. You only look once: Unified real-time object detection[C]\/\/Pro- ceedings of the IEEE conference on computer vision and pattern recognition. 2016: 779-788.","DOI":"10.1109\/CVPR.2016.91"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"REDMON J 2017. A. YOLO9000: better faster stronger[C]\/\/Proceedings of the IEEE conference on computer vision and pattern recognition. 2017: 7263-7271.","DOI":"10.1109\/CVPR.2017.690"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.12204\/j.issn.1000-7229.2023.01.01"}],"event":{"name":"ICAICE 2023: The 4th International Conference on Artificial Intelligence and Computer Engineering","acronym":"ICAICE 2023","location":"Dalian China"},"container-title":["Proceedings of the 4th International Conference on Artificial Intelligence and Computer Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3652628.3652759","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3652628.3652759","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T15:27:40Z","timestamp":1765207660000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3652628.3652759"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,17]]},"references-count":11,"alternative-id":["10.1145\/3652628.3652759","10.1145\/3652628"],"URL":"https:\/\/doi.org\/10.1145\/3652628.3652759","relation":{},"subject":[],"published":{"date-parts":[[2023,11,17]]},"assertion":[{"value":"2024-05-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}