{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T15:40:03Z","timestamp":1755877203698,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,3,22]],"date-time":"2024-03-22T00:00:00Z","timestamp":1711065600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,3,22]]},"DOI":"10.1145\/3654823.3654912","type":"proceedings-article","created":{"date-parts":[[2024,5,29]],"date-time":"2024-05-29T16:20:33Z","timestamp":1716999633000},"page":"450-455","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Images Data Set Improvement Using Mathematical Morphology Operators"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-6112-0838","authenticated-orcid":false,"given":"Dumitru","family":"Abrudan","sequence":"first","affiliation":[{"name":"National University of Sciences and Technology Politehnica Bucharest, Romania"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7294-1585","authenticated-orcid":false,"given":"Ioana Manuela","family":"Marcu","sequence":"additional","affiliation":[{"name":"Telecommunications, National University of Sciences and Technology Politehnica Bucharest, Romania"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6096-5793","authenticated-orcid":false,"given":"Ana-Maria Claudia","family":"Dragulinescu","sequence":"additional","affiliation":[{"name":"Telecommunications, National University of Sciences and Technology Politehnica Bucharest, Romania"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9315-6818","authenticated-orcid":false,"given":"Nicolae","family":"Vizireanu","sequence":"additional","affiliation":[{"name":"Telecommunications, National University of Sciences and Technology Politehnica Bucharest, Romania"}]}],"member":"320","published-online":{"date-parts":[[2024,5,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","unstructured":"Mohammad Rahai Akbar Esfandiari Ali Bakhshi. 2020. Detection of structural damages by model updating based on singular value decomposition of transfer function subsets. Struct. Control Health Monit. DOI: https:\/\/doi.org\/10.1002\/stc.2622","DOI":"10.1002\/stc.2622"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1061\/(ASCE)CP.1943-5487.0000918"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2104.02548"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","unstructured":"Maryam M Najafabadi Flavio Villanustre Taghi M Khoshgoftaar Naeem Seliya Randall Wald & Edin Muharemagic. 2015. Deep learning applications and challenges in big data analytics. J. Big Data. DOI: https:\/\/doi.org\/10.1186\/s40537-014-0007-7","DOI":"10.1186\/s40537-014-0007-7"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","unstructured":"J\u00fcrgen Schmidhuber. 2015. Deep learning in neural networks: An overview. Neural Netw. DOI: https:\/\/doi.org\/10.1016\/j.neunet.2014.09.003","DOI":"10.1016\/j.neunet.2014.09.003"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","unstructured":"Jieun Baek and Yosoon Choi. 2020. Deep Neural Network for Predicting Ore Production by Truck-Haulage Systems in Open-Pit Mines. Applied Sciences. DOI: https:\/\/doi.org\/10.3390\/app10051657","DOI":"10.3390\/app10051657"},{"key":"e_1_3_2_1_7_1","first-page":"315","volume-title":"Proceedings of the 14th International Conference on Artificial Intelligence and Statistics","volume":"15","author":"Glorot Xavier","year":"2011","unstructured":"Xavier Glorot, Antoine Bordes, Yoshua Bengio. 2011. Deep Sparse Rectifier Neural Networks. In Proceedings of the 14th International Conference on Artificial Intelligence and Statistics, vol.15, pp. 315-323"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","unstructured":"Mohammed Oualid Attaoui Hazem Fahmy Fabrizio Pastore Lionel Briand. 2022. Black-box Safety Analysis and Retraining of DNNs based on Feature Extraction and Clustering. ACM Transactions on Software Engineering and Methodology. DOI: https:\/\/doi.org\/10.48550\/arXiv.2201.05077","DOI":"10.48550\/arXiv.2201.05077"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","unstructured":"Ganesh Kolappan Geetha Sung-Han Sim. 2022. Fast identification of concrete cracks using 1D deep learning and explainable artificial intelligence-based analysis. Automation in Construction. DOI: https:\/\/doi.org\/10.1016\/j.autcon.2022.104572","DOI":"10.1016\/j.autcon.2022.104572"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-022-04212-w"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","unstructured":"Xincong Yang Heng Li Yantao Yu Xiaochun Luo Ting Huang Xu Yang. 2018. Automatic Pixel-Level Crack Detection and Measurement Using Fully Convolutional Network. Comput. Civ. Infrastruct. Eng. DOI: https:\/\/doi.org\/10.1111\/mice.12412","DOI":"10.1111\/mice.12412"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR48806.2021.9412041"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1613\/jair.1.13974"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.conbuildmat.2017.09.110"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1155\/2011\/989354"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1155\/2008\/861701"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1117\/12.2643287"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","unstructured":"\u00c7a\u011flar F\u0131rat \u00d6zgenel 2018. Concrete Crack Images for Classification. Mendeley Data Version 2. DOI: 10.17632\/5y9wdsg2zt.2","DOI":"10.17632\/5y9wdsg2zt.2"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","unstructured":"Karen Simonyan Andrew Zisserman. 2014. Very Deep Convolutional Networks for Large-Scale Image Recognition. arXiv 1409.1556. DOI: https:\/\/doi.org\/10.48550\/arXiv.1409.1556","DOI":"10.48550\/arXiv.1409.1556"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compbiomed.2021.105031"}],"event":{"name":"CACML 2024: 2024 3rd Asia Conference on Algorithms, Computing and Machine Learning","acronym":"CACML 2024","location":"Shanghai China"},"container-title":["Proceedings of the 2024 3rd Asia Conference on Algorithms, Computing and Machine Learning"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3654823.3654912","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3654823.3654912","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T15:17:08Z","timestamp":1755875828000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3654823.3654912"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3,22]]},"references-count":20,"alternative-id":["10.1145\/3654823.3654912","10.1145\/3654823"],"URL":"https:\/\/doi.org\/10.1145\/3654823.3654912","relation":{},"subject":[],"published":{"date-parts":[[2024,3,22]]},"assertion":[{"value":"2024-05-29","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}