{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T07:46:23Z","timestamp":1743147983150,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":9,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819932993"},{"type":"electronic","value":"9789819933006"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-981-99-3300-6_3","type":"book-chapter","created":{"date-parts":[[2023,5,30]],"date-time":"2023-05-30T15:04:01Z","timestamp":1685459041000},"page":"25-36","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Research on Day-Ahead Scheduling Strategy of the Power System Includes Wind Power Plants and Photovoltaic Power Stations Based on Big Data Clustering and Filling"],"prefix":"10.1007","author":[{"given":"Feng","family":"Qi","sequence":"first","affiliation":[]},{"given":"Qiang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xiaoqiang","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Yiping","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Wenbin","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Donyang","family":"He","sequence":"additional","affiliation":[]},{"given":"Taicheng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Suyang","family":"Shen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,31]]},"reference":[{"issue":"06","key":"3_CR1","first-page":"647","volume":"27","author":"G Li","year":"2012","unstructured":"Li, G., Cheng, X.: Big Data Research: a major strategic field of future technology and economic and social development \u2013 research status and scientific thinking of big data. Proc. Chin. Acad. Sci. 27(06), 647\u2013657 (2012)","journal-title":"Proc. Chin. Acad. Sci."},{"issue":"04","key":"3_CR2","first-page":"927","volume":"37","author":"Y Song","year":"2013","unstructured":"Song, Y., Zhou, G., Zhu, Y.: Current status and challenges of smart grid big data processing technology. Power Grid Technol. 37(04), 927\u2013935 (2013)","journal-title":"Power Grid Technol."},{"issue":"08","key":"3_CR3","first-page":"43","volume":"29","author":"Y Xu","year":"2017","unstructured":"Xu, Y., Cheng, X., Li, Y., Zhang, H., Yu, W., He, B.: Medium and long-term load forecasting of power system based on big data clustering. J. Electr. Power Syst. Autom. 29(08), 43\u201348 (2017)","journal-title":"J. Electr. Power Syst. Autom."},{"issue":"12","key":"3_CR4","first-page":"2499","volume":"38","author":"J Yuan","year":"2015","unstructured":"Yuan, J., Zhong, L., Yang, G., Chen, M., Gu, J., Li, T.: Research on filling and classification algorithm of incomplete energy consuming big data in green data center. Chin. J. Comput. 38(12), 2499\u20132516 (2015)","journal-title":"Chin. J. Comput."},{"key":"3_CR5","unstructured":"Tang, L., Wang, R., Wu, R., Fan, B.: Missing data filling algorithm for panoramic regulation unified data model. Autom. Electr. Power Syst. 41(01), 25\u201330+87 (2017)"},{"key":"3_CR6","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/j.neucom.2021.01.142","volume":"484","author":"P Mallick","year":"2017","unstructured":"Mallick, P., Chen, Z., Zamani, M.: Reinforcement learning using expectation maximization based guided policy search for stochastic dynamics. Neurocomputing 484, 79\u201388 (2017)","journal-title":"Neurocomputing"},{"issue":"5","key":"3_CR7","doi-asserted-by":"publisher","first-page":"e0267908","DOI":"10.1371\/journal.pone.0267908","volume":"17","author":"YK Kim","year":"2017","unstructured":"Kim, Y.K., Kim, H.J., Lee, H., Chang, J.W.: Privacy-preserving parallel kNN classification algorithm using index-based filtering in cloud computing. PLoS ONE 17(5), e0267908 (2017)","journal-title":"PLoS ONE"},{"issue":"09","key":"3_CR8","first-page":"77","volume":"2007","author":"Y Lang","year":"2007","unstructured":"Lang, Y., Zhang, X., Xu, D., Ma, H., Hadianmrei, S.R.: Reactive power analysis and control strategy for doubly-fed wind farm. Proc. CSEE 2007(09), 77\u201382 (2007)","journal-title":"Proc. CSEE"},{"issue":"10","key":"3_CR9","doi-asserted-by":"publisher","first-page":"5111","DOI":"10.1007\/s00521-020-05304-9","volume":"33","author":"N Hematpour","year":"2020","unstructured":"Hematpour, N., Ahadpour, S.: Execution examination of chaotic S-box dependent on improved PSO algorithm. Neural Comput. Appl. 33(10), 5111\u20135133 (2020)","journal-title":"Neural Comput. Appl."}],"container-title":["Communications in Computer and Information Science","Big Data and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-3300-6_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,30]],"date-time":"2023-05-30T15:04:40Z","timestamp":1685459080000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-3300-6_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9789819932993","9789819933006"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-3300-6_3","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"31 May 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICBDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Big Data and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xiamen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icbds2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icbds.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}