{"id":"https://openalex.org/W4390816046","doi":"https://doi.org/10.3233/faia231242","title":"Research on Criminal Clues Analysis Model of Illegally Added Toxic and Harmful Substances in Food","display_name":"Research on Criminal Clues Analysis Model of Illegally Added Toxic and Harmful Substances in Food","publication_year":2024,"publication_date":"2024-01-12","ids":{"openalex":"https://openalex.org/W4390816046","doi":"https://doi.org/10.3233/faia231242"},"language":"en","primary_location":{"id":"doi:10.3233/faia231242","is_oa":true,"landing_page_url":"http://dx.doi.org/10.3233/faia231242","pdf_url":"https://ebooks.iospress.nl/pdf/doi/10.3233/FAIA231242","source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://ebooks.iospress.nl/pdf/doi/10.3233/FAIA231242","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100741273","display_name":"Yutian Wang","orcid":"https://orcid.org/0000-0002-8033-8727"},"institutions":[{"id":"https://openalex.org/I4210090357","display_name":"Nanjing Forest Police College","ror":"https://ror.org/00adax290","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210090357"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yutian Wang","raw_affiliation_strings":["School of information technology, Nanjing Forest Police College, Nanjing 210023, China","School of Information Technology, Nanjing Forest Police College, Nanjing 210023, China,"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of information technology, Nanjing Forest Police College, Nanjing 210023, China","institution_ids":["https://openalex.org/I4210090357"]},{"raw_affiliation_string":"School of Information Technology, Nanjing Forest Police College, Nanjing 210023, China,","institution_ids":["https://openalex.org/I4210090357"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027480503","display_name":"Qianye Yang","orcid":"https://orcid.org/0000-0003-4401-5311"},"institutions":[{"id":"https://openalex.org/I4210090357","display_name":"Nanjing Forest Police College","ror":"https://ror.org/00adax290","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210090357"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qianye Yang","raw_affiliation_strings":["School of information technology, Nanjing Forest Police College, Nanjing 210023, China","School of Information Technology, Nanjing Forest Police College, Nanjing 210023, China,"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of information technology, Nanjing Forest Police College, Nanjing 210023, China","institution_ids":["https://openalex.org/I4210090357"]},{"raw_affiliation_string":"School of Information Technology, Nanjing Forest Police College, Nanjing 210023, China,","institution_ids":["https://openalex.org/I4210090357"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100772075","display_name":"Hao\u2010Wei Chen","orcid":"https://orcid.org/0000-0001-7924-8399"},"institutions":[{"id":"https://openalex.org/I4210090357","display_name":"Nanjing Forest Police College","ror":"https://ror.org/00adax290","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210090357"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haowei Chen","raw_affiliation_strings":["School of information technology, Nanjing Forest Police College, Nanjing 210023, China","School of Information Technology, Nanjing Forest Police College, Nanjing 210023, China,"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of information technology, Nanjing Forest Police College, Nanjing 210023, China","institution_ids":["https://openalex.org/I4210090357"]},{"raw_affiliation_string":"School of Information Technology, Nanjing Forest Police College, Nanjing 210023, China,","institution_ids":["https://openalex.org/I4210090357"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000601275","display_name":"Jiongkai Chen","orcid":"https://orcid.org/0000-0001-9545-3333"},"institutions":[{"id":"https://openalex.org/I4210090357","display_name":"Nanjing Forest Police College","ror":"https://ror.org/00adax290","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210090357"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiongkai Chen","raw_affiliation_strings":["School of information technology, Nanjing Forest Police College, Nanjing 210023, China","School of Information Technology, Nanjing Forest Police College, Nanjing 210023, China,"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of information technology, Nanjing Forest Police College, Nanjing 210023, China","institution_ids":["https://openalex.org/I4210090357"]},{"raw_affiliation_string":"School of Information Technology, Nanjing Forest Police College, Nanjing 210023, China,","institution_ids":["https://openalex.org/I4210090357"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100741273"],"corresponding_institution_ids":["https://openalex.org/I4210090357"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.00858511,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12388","display_name":"Identification and Quantification in Food","score":0.41780000925064087,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},"topics":[{"id":"https://openalex.org/T12388","display_name":"Identification and Quantification in Food","score":0.41780000925064087,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ontology","display_name":"Ontology","score":0.5719398260116577},{"id":"https://openalex.org/keywords/order","display_name":"Order (exchange)","score":0.5486942529678345},{"id":"https://openalex.org/keywords/theme","display_name":"Theme (computing)","score":0.4895404279232025},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.48348861932754517},{"id":"https://openalex.org/keywords/food-safety","display_name":"Food safety","score":0.4755953252315521},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.46911266446113586},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4250562787055969},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.42492833733558655},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.41686180233955383},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.3581305146217346},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.16744747757911682},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.141985684633255}],"concepts":[{"id":"https://openalex.org/C25810664","wikidata":"https://www.wikidata.org/wiki/Q44325","display_name":"Ontology","level":2,"score":0.5719398260116577},{"id":"https://openalex.org/C182306322","wikidata":"https://www.wikidata.org/wiki/Q1779371","display_name":"Order (exchange)","level":2,"score":0.5486942529678345},{"id":"https://openalex.org/C33566652","wikidata":"https://www.wikidata.org/wiki/Q1065927","display_name":"Theme (computing)","level":2,"score":0.4895404279232025},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.48348861932754517},{"id":"https://openalex.org/C516717267","wikidata":"https://www.wikidata.org/wiki/Q909821","display_name":"Food safety","level":2,"score":0.4755953252315521},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.46911266446113586},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4250562787055969},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.42492833733558655},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.41686180233955383},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3581305146217346},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.16744747757911682},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.141985684633255},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/faia231242","is_oa":true,"landing_page_url":"http://dx.doi.org/10.3233/faia231242","pdf_url":"https://ebooks.iospress.nl/pdf/doi/10.3233/FAIA231242","source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"}],"best_oa_location":{"id":"doi:10.3233/faia231242","is_oa":true,"landing_page_url":"http://dx.doi.org/10.3233/faia231242","pdf_url":"https://ebooks.iospress.nl/pdf/doi/10.3233/FAIA231242","source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4390816046.pdf","grobid_xml":"https://content.openalex.org/works/W4390816046.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4390608645","https://openalex.org/W4247566972","https://openalex.org/W2960264696","https://openalex.org/W3090563135","https://openalex.org/W2497432351","https://openalex.org/W4206777497","https://openalex.org/W4233347783","https://openalex.org/W2910064364","https://openalex.org/W4255224757","https://openalex.org/W2499527417"],"abstract_inverted_index":{"With":[0],"the":[1,5,11,15,37,44,52,66,136,140,144,163,169,191,197],"continuous":[2],"development":[3],"of":[4,7,39,54,70,102,143,147,151,154,176,179,182,185,193],"era":[6],"big":[8,85],"data":[9,19,86,113],"and":[10,21,24,33,50,68,104,119,122,139,156,162,168,172,187],"corresponding":[12],"technical":[13,16],"means,":[14],"demand":[17],"for":[18,99],"mining":[20],"analysis":[22,88,97,145],"research":[23],"judgment":[25,171],"in":[26,61,73,190],"maintaining":[27],"food":[28,47,75,108,148,180,194],"safety":[29,48,195],"is":[30,57,132,159,166,199],"also":[31],"increasing,":[32],"how":[34],"to":[35,42,63,93,107,135],"combine":[36],"trend":[38],"The":[40],"Times":[41],"strengthen":[43],"fight":[45],"against":[46],"crimes":[49,196],"innovate":[51],"means":[53,92],"handling":[55],"cases":[56],"particularly":[58],"important.":[59],"Therefore,":[60],"order":[62],"further":[64],"improve":[65],"ability":[67,175],"efficiency":[69],"relevant":[71],"departments":[72],"investigating":[74],"cases,":[76],"this":[77],"paper,":[78],"based":[79],"on":[80],"actual":[81],"case":[82,117],"data,":[83],"uses":[84,124],"police":[87],"technology":[89],"as":[90],"a":[91,95,111],"build":[94],"clue":[96],"model":[98,146,198],"illegal":[100,152,183],"addition":[101,153,184],"toxic":[103,155,186],"harmful":[105,157,188],"substances":[106,158,189],"crimes,":[109],"establishes":[110],"multi-channel":[112],"collection":[114],"system,":[115],"preprocesses":[116],"texts":[118],"defines":[120],"standards,":[121],"innovatively":[123],"knowledge":[125],"ontology":[126],"database":[127],"construction":[128],"technology.":[129],"Then":[130],"it":[131],"classified":[133],"according":[134],"business":[137],"theme,":[138],"overall":[141],"framework":[142],"crime":[149,181],"clues":[150],"reused":[160],"vertically,":[161],"horizontal":[164],"expansion":[165],"flexible,":[167],"analysis,":[170],"comprehensive":[173],"treatment":[174],"hot":[177],"issues":[178],"disposal":[192],"greatly":[200],"improved.":[201]},"counts_by_year":[],"updated_date":"2026-05-03T08:25:01.440150","created_date":"2025-10-10T00:00:00"}
