{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:19:58Z","timestamp":1750220398318,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,10,23]],"date-time":"2021-10-23T00:00:00Z","timestamp":1634947200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,10,23]]},"DOI":"10.1145\/3495018.3495373","type":"proceedings-article","created":{"date-parts":[[2022,3,14]],"date-time":"2022-03-14T17:33:51Z","timestamp":1647279231000},"page":"1240-1243","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Application of Data Mining Technology in Investigation"],"prefix":"10.1145","author":[{"given":"Ge","family":"Li","sequence":"first","affiliation":[{"name":"Sichuan University Law School, China"}]}],"member":"320","published-online":{"date-parts":[[2022,3,14]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Research on the application of DMT in network security . Journal of Xi'an University of Arts and Sciences (NATURAL SCIENCE EDITION)","author":"Rui Zhang","year":"2017","unstructured":"Zhang Rui , Qi Xiaoxia . Research on the application of DMT in network security . Journal of Xi'an University of Arts and Sciences (NATURAL SCIENCE EDITION) , 2017 , 020 (002): 29-33 Zhang Rui, Qi Xiaoxia. Research on the application of DMT in network security . Journal of Xi'an University of Arts and Sciences (NATURAL SCIENCE EDITION), 2017, 020 (002): 29-33"},{"key":"e_1_3_2_1_2_1","volume-title":"Research on the application of Data Mining Technologyin medical big data . Computer knowledge and technology","author":"Xiujuan Zheng","year":"2020","unstructured":"Zheng Xiujuan . Research on the application of Data Mining Technologyin medical big data . Computer knowledge and technology , 2020 , v.16 (32): 32-33 + 41 Zheng Xiujuan. Research on the application of Data Mining Technologyin medical big data . Computer knowledge and technology, 2020, v.16 (32): 32-33 + 41"},{"key":"e_1_3_2_1_3_1","volume-title":"Review of online learning behavior based on Data Mining Technology . Computer application research","author":"Yanmei Chai","year":"2018","unstructured":"Chai Yanmei , Lei Chenfang . Review of online learning behavior based on Data Mining Technology . Computer application research , 2018 , 035 (005): 1287-1293 Chai Yanmei, Lei Chenfang. Review of online learning behavior based on Data Mining Technology . Computer application research, 2018, 035 (005): 1287-1293"},{"key":"e_1_3_2_1_4_1","volume-title":"Research on Key Technologies of natural resources big data mining and analysis . Geological and mineral mapping","author":"Shanchi Li","year":"2020","unstructured":"Li Shanchi . Research on Key Technologies of natural resources big data mining and analysis . Geological and mineral mapping , 2020 , 3 (5): 42-43 Li Shanchi. Research on Key Technologies of natural resources big data mining and analysis . Geological and mineral mapping, 2020, 3 (5): 42-43"},{"key":"e_1_3_2_1_5_1","first-page":"38","article-title":"Technologyin medical big data","volume":"11","author":"Chen","year":"2017","unstructured":"Chen mintao, Kuang Fangjun , Chen, Application of Data Mining Technologyin medical big data . Computer and Telecom , 2017 , 11 (No. 255): 38 - 40 + 43 Chen mintao, Kuang Fangjun, Chen, Application of Data Mining Technologyin medical big data . Computer and Telecom, 2017, 11 (No. 255): 38-40 + 43","journal-title":"Computer and Telecom"},{"key":"e_1_3_2_1_6_1","volume-title":"Application of Data Mining Technologyin medical records of traditional Chinese medicine . Chinese Journal of traditional Chinese medicine information","author":"Fang Zhong","year":"2020","unstructured":"Zhong Fang , Yang Wei , Zhao Dan , Application of Data Mining Technologyin medical records of traditional Chinese medicine . Chinese Journal of traditional Chinese medicine information , 2020 , 027 (002): 141-144 Zhong Fang, Yang Wei, Zhao Dan, Application of Data Mining Technologyin medical records of traditional Chinese medicine . Chinese Journal of traditional Chinese medicine information, 2020, 027 (002): 141-144"},{"key":"e_1_3_2_1_7_1","volume-title":"Research on the application of Data Mining Technologyin the design of e-learning platform . Computer knowledge and technology: academic exchange","author":"Yanxin Wang","year":"2016","unstructured":"Wang Yanxin , Wang Hong . Research on the application of Data Mining Technologyin the design of e-learning platform . Computer knowledge and technology: academic exchange , 2016 , 012 (009): 26-28 Wang Yanxin, Wang Hong. Research on the application of Data Mining Technologyin the design of e-learning platform . Computer knowledge and technology: academic exchange, 2016, 012 (009): 26-28"},{"issue":"06","key":"e_1_3_2_1_8_1","first-page":"183","article-title":"Research on the application of Data Mining Technologybased on Python in public security intelligence analysis . Electronic world, 2020","volume":"588","author":"Ning Li","unstructured":"Li Ning . Research on the application of Data Mining Technologybased on Python in public security intelligence analysis . Electronic world, 2020 , No . 588 ( 06 ): 183 - 184 Li Ning. Research on the application of Data Mining Technologybased on Python in public security intelligence analysis . Electronic world, 2020, No.588 (06): 183-184","journal-title":"No"},{"issue":"10","key":"e_1_3_2_1_9_1","first-page":"254","article-title":"Application and research of big Data Mining Technologyin network security . Information technology and informatization, 2020","volume":"247","author":"Guannan Ji","unstructured":"Ji Guannan . Application and research of big Data Mining Technologyin network security . Information technology and informatization, 2020 , No . 247 ( 10 ): 254 - 255 Ji Guannan. Application and research of big Data Mining Technologyin network security . Information technology and informatization, 2020, No.247 (10): 254-255","journal-title":"No"},{"issue":"23","key":"e_1_3_2_1_10_1","first-page":"63","article-title":"Application and research of big Data Mining Technologyin network security . Electronic world, 2019","volume":"581","author":"Yanhua Wang","unstructured":"Wang Yanhua . Application and research of big Data Mining Technologyin network security . Electronic world, 2019 , No . 581 ( 23 ): 63 - 64 Wang Yanhua. Application and research of big Data Mining Technologyin network security . Electronic world, 2019, No.581 (23): 63-64","journal-title":"No"}],"event":{"name":"AIAM2021: 2021 3rd International Conference on Artificial Intelligence and Advanced Manufacture","acronym":"AIAM2021","location":"Manchester United Kingdom"},"container-title":["2021 3rd International Conference on Artificial Intelligence and Advanced Manufacture"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3495018.3495373","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3495018.3495373","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:18:46Z","timestamp":1750191526000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3495018.3495373"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,23]]},"references-count":10,"alternative-id":["10.1145\/3495018.3495373","10.1145\/3495018"],"URL":"https:\/\/doi.org\/10.1145\/3495018.3495373","relation":{},"subject":[],"published":{"date-parts":[[2021,10,23]]},"assertion":[{"value":"2022-03-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}