{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:01:10Z","timestamp":1750309270778,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,1,19]],"date-time":"2024-01-19T00:00:00Z","timestamp":1705622400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,1,19]]},"DOI":"10.1145\/3674225.3674244","type":"proceedings-article","created":{"date-parts":[[2024,7,31]],"date-time":"2024-07-31T18:23:05Z","timestamp":1722450185000},"page":"99-103","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Research and application of methods to prevent external force damage to underground cables based on the IoT"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-4355-9984","authenticated-orcid":false,"given":"Zijun","family":"Wu","sequence":"first","affiliation":[{"name":"Shenzhen Power Supply Bureau Company, Ltd, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-8932-5930","authenticated-orcid":false,"given":"Zhong","family":"Wu","sequence":"additional","affiliation":[{"name":"Shenzhen Power Supply Bureau Company, Ltd, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-4650-3119","authenticated-orcid":false,"given":"Wei","family":"Han","sequence":"additional","affiliation":[{"name":"Shenzhen Power Supply Bureau Company, Ltd, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-5592-8896","authenticated-orcid":false,"given":"Rui","family":"Yang","sequence":"additional","affiliation":[{"name":"Shenzhen Power Supply Bureau Company, Ltd, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-9619-1756","authenticated-orcid":false,"given":"Liang","family":"He","sequence":"additional","affiliation":[{"name":"Shenzhen Power Supply Bureau Company, Ltd, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-8258-4555","authenticated-orcid":false,"given":"Haoshu","family":"Pi","sequence":"additional","affiliation":[{"name":"Shenzhen Power Supply Bureau Company, Ltd, China"}]}],"member":"320","published-online":{"date-parts":[[2024,7,31]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Lu Zhonghua. Fire Protection Industry (Electronic Edition)","author":"Fire","year":"2022","unstructured":"Fire fighting and rescue in underground cable pipe network[J]. Lu Zhonghua. Fire Protection Industry (Electronic Edition), 2022 (07)"},{"key":"e_1_3_2_1_2_1","volume-title":"Electronic Production","author":"Design","year":"2021","unstructured":"Design of underground cable detection circuit based on electromagnetic method [J]. Xiong Zhiwen; Mo Shenghan. Electronic Production, 2021 (21)"},{"key":"e_1_3_2_1_3_1","volume-title":"Wang Cheng. Science and Technology Innovation","author":"Research","year":"2020","unstructured":"Research on data structure of underground cable lean management [J]. Wang Cheng. Science and Technology Innovation, 2020 (02)"},{"key":"e_1_3_2_1_4_1","volume-title":"Electrical Technology","author":"Research","year":"2020","unstructured":"Research and design of urban underground cable path detection system [J]. Li Yingqiao; Wang Xuedong; Xu Qinglong; Wang Fei. Electrical Technology, 2020 (08)"},{"key":"e_1_3_2_1_5_1","volume-title":"Electric Power Big Data","author":"Research","year":"2019","unstructured":"Research and application of key technologies for lean management of underground cables based on big data [J]. Yang Binbin; Fan Haibo; Liang Lei. Electric Power Big Data, 2019 (12)"},{"key":"e_1_3_2_1_6_1","volume-title":"Internal Combustion Engine and Accessories","author":"Application","year":"2017","unstructured":"Application exploration of intelligent robot inspection in power system [J]. Zhang Shengfu; Zhu Jie. Internal Combustion Engine and Accessories, 2017 (07)"},{"key":"e_1_3_2_1_7_1","volume-title":"Energy and Environment","author":"Fuzzy","year":"2013","unstructured":"Fuzzy comprehensive analysis of safety risks of urban underground cable facilities [J]. Chu Xiaojie; Yang Taihua. Energy and Environment, 2013 (06)"},{"key":"e_1_3_2_1_8_1","volume-title":"Electronic Technology and Software Engineering","author":"Research","year":"2015","unstructured":"Research and application of refined management platform for underground cables and channels [J]. Liu Tongxu; Gong Shibao; Chen Yegang. Electronic Technology and Software Engineering, 2015 (23)"},{"key":"e_1_3_2_1_9_1","volume-title":"Electrical Applications","author":"Visualized","year":"2015","unstructured":"Visualized comprehensive management of urban underground cables [J]. Lei Zhenjiang; Su Kun; Wang Pengyu; Zhang Wenguo; Liu Kun; Zhao Xiaofeng. Electrical Applications, 2015 (S1)"},{"key":"e_1_3_2_1_10_1","volume-title":"Zhejiang Electric Power","author":"Design","year":"2012","unstructured":"Design and application prospects of underground cable information standardized management model [J]. Gao Ming; Zhou Rencai; He Xianhua. Zhejiang Electric Power, 2012 (05)"},{"key":"e_1_3_2_1_11_1","first-page":"60","volume-title":"Proc. Of SPIE","volume":"1171","author":"A MENDEZ, TF","year":"1989","unstructured":"A MENDEZ, TF MERSE and F MENDEZ, \"Application of embedded optical Fiber Sensors in reinforce concrete buildings and structures [J]\", Proc. Of SPIE, vol. 1171, pp. 60-69, 1989."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2009.167"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2006.10.016"},{"key":"e_1_3_2_1_14_1","first-page":"779","article-title":"You Only Look Once: Unified","author":"Redmon J","year":"2015","unstructured":"J Redmon, S Divvala, R Girshick , \"You Only Look Once: Unified\", Real-Time Object Detection[J], pp. 779-788, 2015.","journal-title":"Real-Time Object Detection[J]"},{"key":"e_1_3_2_1_15_1","volume-title":"An Incremental Improvement[J]","author":"Redmon J","year":"2018","unstructured":"J Redmon and A Farhadi, \"YOLOv3: An Incremental Improvement[J]\", 2018."},{"key":"e_1_3_2_1_16_1","first-page":"06066","article-title":"Object detection networks on convolutional feature maps","volume":"1504","author":"Ren S.","year":"2015","unstructured":"S. Ren, K. He, R. B. Girshick, X. Zhang and J. Sun, \"Object detection networks on convolutional feature maps\", CoRR, vol. abs\/1504.06066, pp. 3-7, 2015.","journal-title":"CoRR"},{"key":"e_1_3_2_1_17_1","first-page":"3","article-title":"ImageNet Large Scale Visual Recognition Challenge","author":"Deng J.","year":"2015","unstructured":"Russakovsky, J. Deng, H. Su, J. Krause, S. Satheesh, S. Ma, , \"ImageNet Large Scale Visual Recognition Challenge\", International Journal of Computer Vision (IJCV), pp. 3, 2015.","journal-title":"International Journal of Computer Vision (IJCV)"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1523-1739.2007.00846.x"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.2193\/2007-299"},{"key":"e_1_3_2_1_20_1","volume-title":"Animal Tracking Basics","author":"Young Jon","year":"2007","unstructured":"Jon Young and Tiffany Morgan, Animal Tracking Basics, Stackpole Books, 2007."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1046\/j.1365-2664.2001.00624.x"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(01)00302-4"},{"key":"e_1_3_2_1_23_1","volume-title":"World Wireless Congress 3G Wireless 2002","author":"Gharavi H.","year":"2002","unstructured":"H. Gharavi and K. Ban, \"Vision-based ad-hoc sensor networks for tactical operations\", World Wireless Congress 3G Wireless 2002, 2002."},{"key":"e_1_3_2_1_24_1","first-page":"1947","volume-title":"2013 IEEE Conference on Computer Vision and Pattern Recognition","volume":"0","author":"Xiaobo Ren","year":"2013","unstructured":"Ren Xiaobo, Tony X. Han and Zhihai He, \"Ensemble video object cut in highly dynamic scenes\", 2013 IEEE Conference on Computer Vision and Pattern Recognition, vol. 0, pp. 1947-1954, 2013."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/944919.944937"},{"key":"e_1_3_2_1_26_1","first-page":"524","volume-title":"Proceedings of the 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR05)","volume":"2","author":"Li Fei-Fei","year":"2005","unstructured":"Fei-Fei Li and Pietro Perona, \"A bayesian hierarchical model for learning natural scene categories\", Proceedings of the 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR05) \u2013 Volume 2 \u2013 Volume 02, pp. 524-531, 2005."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2012.231"},{"key":"e_1_3_2_1_29_1","first-page":"127","volume-title":"AISTATS","author":"Bordes Antoine","year":"2012","unstructured":"Antoine Bordes, Xavier Glorot, Jason Weston and Yoshua Bengio, \"Joint learning of words and meaning representations for open-text semantic parsing\", AISTATS, pp. 127-135, 2012."},{"key":"e_1_3_2_1_30_1","first-page":"801","volume-title":"NIPS","author":"Richard Socher","year":"2011","unstructured":"Socher Richard, Eric H. Huang, Pennington Jeffrey, Andrew Y. Ng and Christopher D. Manning, \"Dynamic pooling and unfolding recursive autoencoders for paraphrase detection\", NIPS, pp. 801-809, 2011."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2012.2227738"},{"key":"e_1_3_2_1_32_1","first-page":"1106","article-title":"Ima-genet classification with deep convolutional neural networks","volume":"25","author":"Krizhevsky Alex","year":"2012","unstructured":"Alex Krizhevsky, Ilya Sutskever and Geoff Hinton, \"Ima-genet classification with deep convolutional neural networks\" in Advances in Neural Information Processing Systems 25, pp. 1106-1114, 2012.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2809544.2809561"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-19222-2_10"},{"key":"e_1_3_2_1_35_1","first-page":"5","volume-title":"Very deep convolutional networks for large-scale image recognition","author":"Simonyan K.","year":"2014","unstructured":"K. Simonyan and A. Zisserman, \"Very deep convolutional networks for large-scale image recognition\", vol. 2, pp. 5, 2014."}],"event":{"name":"PEAI 2024: 2024 International Conference on Power Electronics and Artificial Intelligence","acronym":"PEAI 2024","location":"Xiamen China"},"container-title":["2024 International Conference on Power Electronics and Artificial Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3674225.3674244","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3674225.3674244","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:57:26Z","timestamp":1750291046000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3674225.3674244"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,19]]},"references-count":35,"alternative-id":["10.1145\/3674225.3674244","10.1145\/3674225"],"URL":"https:\/\/doi.org\/10.1145\/3674225.3674244","relation":{},"subject":[],"published":{"date-parts":[[2024,1,19]]},"assertion":[{"value":"2024-07-31","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}