{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T15:57:45Z","timestamp":1765209465950,"version":"3.46.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,17]],"date-time":"2023-11-17T00:00:00Z","timestamp":1700179200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,17]]},"DOI":"10.1145\/3652628.3652638","type":"proceedings-article","created":{"date-parts":[[2024,5,23]],"date-time":"2024-05-23T10:36:46Z","timestamp":1716460606000},"page":"59-64","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Enhancing Coal Mine Safety Monitoring Algorithm using Graph Computing Techniques"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-1163-2106","authenticated-orcid":false,"given":"Licai","family":"Wang","sequence":"first","affiliation":[{"name":"Shandong Energy Group, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-6421-3523","authenticated-orcid":false,"given":"Bo","family":"Liu","sequence":"additional","affiliation":[{"name":"Yunding TECHNOLOGY CO..LTD, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-7052-6849","authenticated-orcid":false,"given":"Butang","family":"Wang","sequence":"additional","affiliation":[{"name":"Yunding TECHNOLOGY CO..LTD, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-1881-2273","authenticated-orcid":false,"given":"Lei","family":"Wang","sequence":"additional","affiliation":[{"name":"Yunding TECHNOLOGY CO..LTD, China"}]}],"member":"320","published-online":{"date-parts":[[2024,5,23]]},"reference":[{"volume-title":"2010 5th International Conference on Computer Science & Education (pp. 1344-1349)","author":"Srinivas K.","key":"e_1_3_2_1_1_1","unstructured":"Srinivas, K., Rao, G. R., and Govardhan, A. 2010. Analysis of coronary heart disease and prediction of heart attack in coal mining regions using data mining techniques. In 2010 5th International Conference on Computer Science & Education (pp. 1344-1349). IEEE."},{"key":"e_1_3_2_1_2_1","unstructured":"Jun Yang. 2013. Research on Coal Mine Safety Risk Assessment and Early Warning. Ph.D. dissertation China University of Mining and Technology."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.26945\/d.cnki.gbjku.2022.000369"},{"key":"e_1_3_2_1_4_1","unstructured":"Liu Nianping. 2012. Research on Risk Early Warning of Coal Mine Safety Production. Ph.D. dissertation Chongqing University."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.13225\/j.cnki.jccs.2020.0915"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.13195\/j.kzyjc.2020.0325"},{"issue":"03","key":"e_1_3_2_1_7_1","first-page":"132","article-title":". Gas Safety Situation Prediction Method in Coal Mine Based on BN-ELM","volume":"38","author":"Li Shuang","year":"2020","unstructured":"Li, Shuang, Dingwei Li, Mengjie You, 2020. Gas Safety Situation Prediction Method in Coal Mine Based on BN-ELM. Systems Engineering, 38(03), 132-140.","journal-title":"Systems Engineering"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","unstructured":"Huang Guangqiu Qiuqin Lu Qingxia Yun. 1995. Method for Establishing a Dynamic Early Warning System for Major Decisions in Mines. Chemical Engineering & Machinery (05) 19-23. DOI: 10.16283\/j.cnki.hgkwyjg.1995.05.013.","DOI":"10.16283\/j.cnki.hgkwyjg.1995.05.013"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.16265\/j.cnki.issn1003-3033.2017.01.016"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.13199\/j.cnki.cst.2021.07.017"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.13225\/j.cnki.jccs.YG19.0903"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","unstructured":"Yang Yuzhong Changgen Feng Liyun Wu. 2008. Research on Coal Mine Safety Early Warning Model Based on Rough Set Theory. China Safety Science Journal (01) 40-45+181. DOI: 10.16265\/j.cnki.issn1003-3033.2008.01.011.","DOI":"10.16265\/j.cnki.issn1003-3033.2008.01.011"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.13637\/j.issn.1009-6094.2017.04.009"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.19708\/j.ckjs.2018.06.004"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.13272\/j.issn.1671-251x.2015.03.001"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.13225\/j.cnki.jccs.dz20.0686"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.13199\/j.cnki.cst.2019.10.015"},{"volume-title":"Semi-supervised classification with graph convolutional networks[J]. arXiv preprint arXiv:1609.02907","year":"2016","key":"e_1_3_2_1_18_1","unstructured":"Kipf T N, Welling M. Semi-supervised classification with graph convolutional networks[J]. arXiv preprint arXiv:1609.02907, 2016."},{"volume-title":"Inductive representation learning on large graphs[J]. Advances in neural information processing systems","year":"2017","key":"e_1_3_2_1_19_1","unstructured":"Hamilton W, Ying Z, Leskovec J. Inductive representation learning on large graphs[J]. Advances in neural information processing systems, 2017, 30."},{"volume-title":"Graph attention networks[J]. arXiv preprint arXiv:1710.10903","year":"2017","key":"e_1_3_2_1_20_1","unstructured":"Veli\u010dkovi\u0107 P, Cucurull G, Casanova A, Graph attention networks[J]. arXiv preprint arXiv:1710.10903, 2017."},{"issue":"09","key":"e_1_3_2_1_21_1","first-page":"1","article-title":". Network Anomaly Detection Based on Dual-Graph Neural Network and Autoencoder","volume":"23","author":"Qin Zhongyuan","year":"2023","unstructured":"Qin, Zhongyuan, Nan Ma, Yacong Yu, 2023. Network Anomaly Detection Based on Dual-Graph Neural Network and Autoencoder. Information Network Security, 23(09), 1-11.","journal-title":"Information Network Security"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.26944\/d.cnki.gbfju.2022.002124"},{"volume-title":"Heterogeneous graph transformer[C]\/\/Proceedings of the web conference","year":"2020","key":"e_1_3_2_1_23_1","unstructured":"Hu Z, Dong Y, Wang K, Heterogeneous graph transformer[C]\/\/Proceedings of the web conference 2020. 2020: 2704-2710."}],"event":{"name":"ICAICE 2023: The 4th International Conference on Artificial Intelligence and Computer Engineering","acronym":"ICAICE 2023","location":"Dalian China"},"container-title":["Proceedings of the 4th International Conference on Artificial Intelligence and Computer Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3652628.3652638","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3652628.3652638","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T15:27:40Z","timestamp":1765207660000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3652628.3652638"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,17]]},"references-count":23,"alternative-id":["10.1145\/3652628.3652638","10.1145\/3652628"],"URL":"https:\/\/doi.org\/10.1145\/3652628.3652638","relation":{},"subject":[],"published":{"date-parts":[[2023,11,17]]},"assertion":[{"value":"2024-05-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}