{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T10:10:11Z","timestamp":1743156611446,"version":"3.40.3"},"publisher-location":"Cham","reference-count":10,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031505706"},{"type":"electronic","value":"9783031505713"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-50571-3_22","type":"book-chapter","created":{"date-parts":[[2024,2,20]],"date-time":"2024-02-20T08:02:33Z","timestamp":1708416153000},"page":"308-322","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Intelligent Mining Method of Distributed Data Based on Multi-agent Technology"],"prefix":"10.1007","author":[{"given":"Zhongwei","family":"Chen","sequence":"first","affiliation":[]},{"given":"Xiaofeng","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,21]]},"reference":[{"issue":"15","key":"22_CR1","first-page":"208","volume":"153","author":"A Jl","year":"2020","unstructured":"Jl, A., Yuan, T.A., Yu, Z.A., et al.: Privacy preserving distributed data mining based on secure multi-party computation. Comput. Commun. 153(15), 208\u2013216 (2020)","journal-title":"Comput. Commun."},{"key":"22_CR2","unstructured":"Bai, J., Du, Y.: Data mining framework for sensitive information of large-scale social online games based on blockchain. J. Xi\u2019an Univ. Technol. 37(03), 397\u2013402 (2021)"},{"issue":"9","key":"22_CR3","first-page":"179","volume":"56","author":"S Baloch","year":"2021","unstructured":"Baloch, S., Muhammad, M.S.: An intelligent data mining-based fault detection and classification strategy for microgrid. IEEE Access 56(9), 179\u2013185 (2021)","journal-title":"IEEE Access"},{"key":"22_CR4","unstructured":"Yan, N., Huang, Y., Wang, Q.: Incremental mining method of dynamic data based on deep learning. Inf. Technol. 56(03), 114\u2013119 (2022)"},{"issue":"21","key":"22_CR5","doi-asserted-by":"publisher","first-page":"16593","DOI":"10.1007\/s00500-020-04962-0","volume":"24","author":"J Zhang","year":"2020","unstructured":"Zhang, J.: Interaction design research based on large data rule mining and blockchain communication technology. Soft. Comput. 24(21), 16593\u201316604 (2020)","journal-title":"Soft. Comput."},{"key":"22_CR6","unstructured":"He, B.: Simulation of time series data mining algorithm based on multi-objective decision. Comput. Simul. 36(11), 243\u2013246 (2019)"},{"key":"22_CR7","doi-asserted-by":"crossref","unstructured":"Nagoev, Z., Pshenokova, I., Nagoeva, O., et al.: Learning algorithm for an intelligent decision making system based on multi-agent neurocognitive architectures. Cognit. Syst. Res. 66(12), 82\u201388 (2021)","DOI":"10.1016\/j.cogsys.2020.10.015"},{"issue":"2","key":"22_CR8","doi-asserted-by":"publisher","first-page":"1200","DOI":"10.1109\/TII.2021.3076513","volume":"18","author":"K Cai","year":"2021","unstructured":"Cai, K., Chen, H., Ai, W., et al.: Feedback convolutional network for intelligent data fusion based on near-infrared collaborative IoT technology. IEEE Trans. Ind. Inf. 18(2), 1200\u20131209 (2021)","journal-title":"IEEE Trans. Ind. Inf."},{"issue":"2","key":"22_CR9","doi-asserted-by":"publisher","first-page":"17170","DOI":"10.1109\/ACCESS.2020.2966803","volume":"8","author":"C Wang","year":"2020","unstructured":"Wang, C., Di, X.: Research on integrity check method of cloud storage multi-copy data based on multi-agent. IEEE Access 8(2), 17170\u201317178 (2020)","journal-title":"IEEE Access"},{"key":"22_CR10","unstructured":"Ye, M., Zhang, G.: A parallel computing pattern oriented data mining method based on hadoop technology. Electron. Technol. Softw. Eng. 23(15), 159\u2013161 (2021)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Multimedia Technology and Enhanced Learning"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-50571-3_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,27]],"date-time":"2024-05-27T13:05:22Z","timestamp":1716815122000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-50571-3_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031505706","9783031505713"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-50571-3_22","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"21 February 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICMTEL","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Multimedia Technology and Enhanced Learning","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Leicester","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 April 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 April 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icmtel2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icmtel.eai-conferences.org\/2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confy Plus","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"285","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"121","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"42% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.1","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6.5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}