{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T14:40:20Z","timestamp":1766414420400,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,1,26]],"date-time":"2024-01-26T00:00:00Z","timestamp":1706227200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,1,26]]},"DOI":"10.1145\/3640824.3640826","type":"proceedings-article","created":{"date-parts":[[2024,3,8]],"date-time":"2024-03-08T12:05:28Z","timestamp":1709899528000},"page":"7-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Research and Application of Artificial Intelligence in Power Smart Constuction Site"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-5009-0679","authenticated-orcid":false,"given":"Meijie","family":"Fan","sequence":"first","affiliation":[{"name":"Inner Mongolia University, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-1284-4804","authenticated-orcid":false,"given":"Limiao","family":"Xie","sequence":"additional","affiliation":[{"name":"Inner Mongolia University, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-8724-6356","authenticated-orcid":false,"given":"Zhiduo","family":"Bai","sequence":"additional","affiliation":[{"name":"Inner Mongolia Intelligent Electronic Data Services Co.Ltd, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-4405-9162","authenticated-orcid":false,"given":"Meng","family":"Hao","sequence":"additional","affiliation":[{"name":"Inner Mongolia Power Group Co.Ltd, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-0590-1569","authenticated-orcid":false,"given":"Fengchao","family":"Yi","sequence":"additional","affiliation":[{"name":"Inner Mongolia Intelligent Electronic Data Services Co.Ltd, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-0820-0364","authenticated-orcid":false,"given":"Wenjie","family":"Wang","sequence":"additional","affiliation":[{"name":"Inner Mongolia Intelligent Electronic Data Services Co.Ltd, China"}]}],"member":"320","published-online":{"date-parts":[[2024,3,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0219877021500048"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.3390\/s23031639"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.3390\/su15118858"},{"key":"e_1_3_2_1_4_1","volume-title":"Performance and cryptographic evaluation of security protocols in distributed networks using applied pi calculus and Markov Chain. Internet of Things","author":"Edris Kamya\u00a0Kiyemba","year":"2023","unstructured":"Ed\u00a0Kamya\u00a0Kiyemba Edris, Mahdi Aiash, Mohammad\u00a0Ali Khoshkholghi, Ranesh Naha, Abdullahi Chowdhury, and Jonathan Loo. 2023. Performance and cryptographic evaluation of security protocols in distributed networks using applied pi calculus and Markov Chain. Internet of Things (2023), 100913."},{"key":"e_1_3_2_1_5_1","volume-title":"International Symposium on Computer Applications and Information Systems (ISCAIS","author":"Guo Junli","year":"2022","unstructured":"Junli Guo and Mingyang Xu. 2022. ZTESA\u2014A Zero-Trust Endogenous Safety Architecture: Gain the endogenous safety benefit, avoid insider threats. In International Symposium on Computer Applications and Information Systems (ISCAIS 2022), Vol.\u00a012250. SPIE, 192\u2013202."},{"key":"e_1_3_2_1_6_1","first-page":"1","article-title":"Automatic control model of power information system Access based on artificial intelligence technology","volume":"2022","author":"Jiang De\u00a0Yong","year":"2022","unstructured":"De\u00a0Yong Jiang, Hong Zhang, Harish Kumar, Quadri\u00a0Noorulhasan Naveed, Chandan Takhi, Vishal Jagota, and Rituraj Jain. 2022. Automatic control model of power information system Access based on artificial intelligence technology. Mathematical Problems in Engineering 2022 (2022), 1\u20136.","journal-title":"Mathematical Problems in Engineering"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s44163-022-00040-6"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.3390\/s23031341"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.15388\/22-INFOR505"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1117\/12.2668310"}],"event":{"name":"CCEAI 2024: 2024 8th International Conference on Control Engineering and Artificial Intelligence","acronym":"CCEAI 2024","location":"Shanghai China"},"container-title":["2024 8th International Conference on Control Engineering and Artificial Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3640824.3640826","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3640824.3640826","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,29]],"date-time":"2025-08-29T16:46:17Z","timestamp":1756485977000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3640824.3640826"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,26]]},"references-count":10,"alternative-id":["10.1145\/3640824.3640826","10.1145\/3640824"],"URL":"https:\/\/doi.org\/10.1145\/3640824.3640826","relation":{},"subject":[],"published":{"date-parts":[[2024,1,26]]},"assertion":[{"value":"2024-03-08","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}