{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:03:55Z","timestamp":1750309435728,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,6,21]],"date-time":"2024-06-21T00:00:00Z","timestamp":1718928000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,6,21]]},"DOI":"10.1145\/3690407.3690440","type":"proceedings-article","created":{"date-parts":[[2024,10,24]],"date-time":"2024-10-24T18:55:28Z","timestamp":1729796128000},"page":"194-200","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Research and Application of Security Control Technology Based on AGX ORIN"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-0069-4449","authenticated-orcid":false,"given":"Qianqian","family":"Wen","sequence":"first","affiliation":[{"name":"Xuchang XJ Software Technology Co.,Ltd., Xuchang, Henan, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-8040-1283","authenticated-orcid":false,"given":"Xu","family":"Zhang","sequence":"additional","affiliation":[{"name":"Xuchang XJ Software Technology Co.,Ltd., Xuchang, Henan, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-8833-6600","authenticated-orcid":false,"given":"Yongqiang","family":"Lv","sequence":"additional","affiliation":[{"name":"Xuchang XJ Software Technology Co.,Ltd., Xuchang, Henan, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-2027-4605","authenticated-orcid":false,"given":"Dulin","family":"Li","sequence":"additional","affiliation":[{"name":"Xuchang XJ Software Technology Co.,Ltd., Xuchang, Henan, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-0912-3897","authenticated-orcid":false,"given":"Fangyu","family":"Gao","sequence":"additional","affiliation":[{"name":"China Electric Equipment Group Co.,Ltd., Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-0156-8381","authenticated-orcid":false,"given":"Lijun","family":"Huang","sequence":"additional","affiliation":[{"name":"Xuchang XJ Software Technology Co.,Ltd., Xuchang, Henan, China"}]}],"member":"320","published-online":{"date-parts":[[2024,10,24]]},"reference":[{"key":"e_1_3_3_1_1_2","unstructured":"Le Xing. 2023. Research on Preventive Measures for Habitual Violations in Substation Operation and Maintenance Management. China Electrical Equipment Industry (02): 78-80."},{"issue":"24","key":"e_1_3_3_1_2_2","first-page":"178","article-title":"Formation Method of Counter-Violation Safety Awareness in Power Safety Production Management","volume":"16","author":"Wu Rong","year":"2019","unstructured":"Rong Wu. 2019. Formation Method of Counter-Violation Safety Awareness in Power Safety Production Management. Science and Technology Innovation Herald, 16(24): 178-179.","journal-title":"Science and Technology Innovation Herald"},{"key":"e_1_3_3_1_3_2","unstructured":"Ruisheng Li Yanlong Zhang Denghui Zhai et al. 2021. Pin Defect Detection of Transmission Line Based on Improved SSD. High Voltage Engineering 47(11): 3795-3802."},{"issue":"05","key":"e_1_3_3_1_4_2","first-page":"22","article-title":"The Application of Video Recognition Technology in the Prediction of Illegal Behaviors at Work Site","volume":"21","author":"Liu Yulin","year":"2021","unstructured":"Yulin Liu. 2021. The Application of Video Recognition Technology in the Prediction of Illegal Behaviors at Work Site. Safety, Health and Environment, 21(05): 22-26.","journal-title":"Safety, Health and Environment"},{"issue":"02","key":"e_1_3_3_1_5_2","first-page":"172","article-title":"Alarm Method of Illegal Operation in Substation Based on Digital Twins","volume":"39","author":"Zhang Hua","year":"2023","unstructured":"Hua Zhang, Lei Tang, Li Gu, et al. 2023. Alarm Method of Illegal Operation in Substation Based on Digital Twins. Microcomputer Applications, 39(02): 172-175.","journal-title":"Microcomputer Applications"},{"issue":"08","key":"e_1_3_3_1_6_2","first-page":"40","article-title":"Research and Application of Substation Operation Safety Intelligent Early Warning System","volume":"2021","author":"Yin Qi","year":"2021","unstructured":"Qi Yin, Shenghua He, Zuojian Zhou. 2021. Research and Application of Substation Operation Safety Intelligent Early Warning System. Rural Electricification, 2021(08): 40-42.","journal-title":"Rural Electricification"},{"key":"e_1_3_3_1_7_2","unstructured":"Taiping Yuan Wen He. 2019. Application and Practice of Violation Point Mechanism for Power Construction Personnel. Enterprise Reform and Management (08): 65-66."},{"issue":"01","key":"e_1_3_3_1_8_2","first-page":"77","article-title":"Construction and Application of Remote Security Inspection System in Work Site Based on Concept of Ubiquitous Electric Internet of Things","volume":"43","author":"Yao Jinsong","year":"2020","unstructured":"Jinsong Yao, Wei Ji, Xin Yin, et al. 2020. Construction and Application of Remote Security Inspection System in Work Site Based on Concept of Ubiquitous Electric Internet of Things. Sichuan Electric Power Technology, 43(01): 77-81.","journal-title":"Sichuan Electric Power Technology"},{"volume-title":"Research and Application of Paperboard Defect Detection Control System Based on Machine Vision. Thesis","author":"Jiang Xuhui","key":"e_1_3_3_1_9_2","unstructured":"Xuhui Jiang. 2021. Research and Application of Paperboard Defect Detection Control System Based on Machine Vision. Thesis, Qingdao University of Science and Technology."},{"volume-title":"Research on Pipeline Leakage Magnetic Inner Inspection Defect Recognition Method Based on Target Detection. Thesis","author":"Xuan Li.","key":"e_1_3_3_1_10_2","unstructured":"Xuan Li. 2022. Research on Pipeline Leakage Magnetic Inner Inspection Defect Recognition Method Based on Target Detection. Thesis, Shenyang University of Technology."},{"issue":"10","key":"e_1_3_3_1_11_2","first-page":"137","article-title":"Research on Traffic Sign Recognition Technology Based on YOLOv5 Algorithm","volume":"35","author":"L\u00fc Hefeng","year":"2021","unstructured":"Hefeng L\u00fc, Huacai Lu. 2021. Research on Traffic Sign Recognition Technology Based on YOLOv5 Algorithm. Journal of Electronic Measurement and Instrumentation, 35(10): 137-144.","journal-title":"Journal of Electronic Measurement and Instrumentation"},{"issue":"05","key":"e_1_3_3_1_12_2","first-page":"866","article-title":"Sea Ship Identification Algorithm Based on Improved YOLOv5 Deep Learning","volume":"37","author":"Zhang Xiaopeng","year":"2022","unstructured":"Xiaopeng Zhang, Zhiyuan Xu, Sheng Qu, Wenxuan Qiu, Zeyu Zhai. 2022. Sea Ship Identification Algorithm Based on Improved YOLOv5 Deep Learning. Journal of Dalian Ocean University, 37(05): 866-872.","journal-title":"Journal of Dalian Ocean University"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.16768\/j.issn.1004-874X.2022.10.018"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/HPEC55821.2022.9926369"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"publisher","unstructured":"M. G. Gorodnichev M. D. Gromov K. A. Polyantseva and M. S. Moseva. 2022. Research and Development of a System for Determining Abnormal Human Behavior by Video Image Based on Deepstream Technology.\u00a02022 Wave Electronics and its Application in Information and Telecommunication Systems (WECONF) St. Petersburg Russian Federation pp. 1-9 doi: 10.1109\/WECONF55058.2022.9803767. 10.1109\/WECONF55058.2022.9803767","DOI":"10.1109\/WECONF55058.2022.9803767"},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"publisher","unstructured":"H. Amirpour M. Ghanbari and C. Timmerer. 2022. DeepStream: Video Streaming Enhancements using Compressed Deep Neural Networks. in\u00a0IEEE Transactions on Circuits and Systems for Video Technology doi: 10.1109\/TCSVT.2022.3229079. 10.1109\/TCSVT.2022.3229079","DOI":"10.1109\/TCSVT.2022.3229079"}],"event":{"name":"CAIBDA 2024: 2024 4th International Conference on Artificial Intelligence, Big Data and Algorithms","acronym":"CAIBDA 2024","location":"Zhengzhou China"},"container-title":["Proceedings of the 2024 4th International Conference on Artificial Intelligence, Big Data and Algorithms"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3690407.3690440","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3690407.3690440","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:09:37Z","timestamp":1750295377000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3690407.3690440"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,21]]},"references-count":16,"alternative-id":["10.1145\/3690407.3690440","10.1145\/3690407"],"URL":"https:\/\/doi.org\/10.1145\/3690407.3690440","relation":{},"subject":[],"published":{"date-parts":[[2024,6,21]]},"assertion":[{"value":"2024-10-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}