D. Howe, M. Costanzo, P. Fey, T. Gojobori, L. Hannick, W. Hide, D. P. Hill, R. Kania, M. Schaeffer, S. St Pierre, S. Twigger, O. White, and S. Y. Rhee, “The future of biocuration,” Nature, vol. 455, pp. 47–50, 2008. [Google Scholar][Crossref]
5.
“IBM aglets software development kit.” http://www.trl.ibm.co.jp/aglets [Google Scholar]
6.
J. C. Zhou, H. Y. Zhang, W. L. Zha, and Y. B. Chen, “User-aware resource provision policy for cloud computing,” J. Comput. Res. Dev., vol. 51, no. 5, pp. 1108–1119, 2014. [Google Scholar]
7.
S. Ghemawat, H. Gobioff, and S. T. Leung, “The Google file system,” in Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles, Bolton Landing, NY, USA, 2003, pp. 29–43. [Google Scholar][Crossref]
8.
S. Gilbert and N. Lynch, “Brewer’s conjecture and the feasibility of consistent, available, partition-tolerant web services,” ACM SIGACT News, vol. 33, no. 2, pp. 51–59, 2002. [Google Scholar][Crossref]
9.
P. A. Slcigh, P. H. Gaskell, M. Berzins, and N. G. Wright, “An unstructured finite-volume algorithm for predicting flow in rivers and estuaries,” Comput. Fluids, vol. 27, no. 4, pp. 479–508, 1998. [Google Scholar][Crossref]
10.
H. R. Seddighi and A. L. Theocharous, “A model of tourism destination choice: A theoretical and empirical analysis,” Tour. Manag., vol. 23, no. 5, pp. 475–487, 2002. [Google Scholar][Crossref]
11.
R. O. Reid and B. R. Bodine, “Numerical model for storm surges in Galveston Bay,” J. Waterw. Harb. Div., vol. 94, no. 1, pp. 33–57, 1968. [Google Scholar][Crossref]
12.
G. A. Morgan and O. V. Griego, Easy Use and Interpretation of SPSS for Windows: Answering Research Questions with Statistics. New Jersey: Lawrence Erlbaum Associations, Inc., 1998. [Google Scholar]
13.
D. Cramer, Introducing Statistics for Social Research: Step-by-Step Calculations and Computer Techniques Using SPSS. United States: Routledge, 1994. [Google Scholar]
14.
J. J. K. Ó Ruanaidh, W. J. Dowling, and F. M. Boland, “Watermarking digital images for copyright protection,” IEEE Proc. Vis. Image Signal Process., vol. 143, pp. 250–256, 1996. [Google Scholar]
15.
R. Barnett and D. E. Pearson, “Frequency mode LR attack operator for digitally watermarking images,” Electron. Lett., vol. 34, no. 19, pp. 1837–1839, 1998. [Google Scholar][Crossref]
S. F. A, N. N. Liu, S. C. Yu, G. X. Yu, and S. C. Yu, “A new method to improve the speed and accuracy of intruder detection in cloud computing environment,” Comput. Appl. Softw., vol. 38, no. 4, pp. 311–317, 2021. [Google Scholar]
18.
F. Li, L. M. Sun, J. X. Wei, J. L. Huang, S. C. Yu, H. Guo, and X. J. Wang, “Research on automatic identification method of mine water source based on artificial intelligence,” J. North China Inst. Sci. Technol., vol. 10, no. 2, pp. 17–21, 2013. [Google Scholar]
19.
J. J. Li, Y. Xue, G. X. Yu, G. L. Yu, and S. C. Yu, “Research on method of automatic recognition of water sources based on support vector machine,” J. North China Inst. Sci. Technol., vol. 12, no. 2, pp. 25–29, 2015. [Google Scholar]
20.
N. B. Yin, J. Hao, and S. C. Yu, “Research on establishment method of mine water source identification model base based on artificial intelligence,” J. North China Inst. Sci. Technol., vol. 14, no. 4, pp. 24–28, 2017. [Google Scholar]
21.
S. F. A, N. N. Liu, S. C. Yu, and Q. Shi, “Research on relative technologies of automatic recognition of water sources based on back propagation neural network improved by immune algorithm,” J. North China Inst. Sci. Technol., vol. 14, no. 1, pp. 34–39, 2017. [Google Scholar]
22.
H. Q. Chen, Y. Zhai, S. L. Hui, X. M. Liu, and X. Y. Wang, “Evaluation on water inrush danger from aquifer under seam floor and water inrush prevention and control countermeasures,” Coal Sci. Technol., vol. 39, no. 7, pp. 122–115, 2011. [Google Scholar][Crossref]
23.
Y. L. Fu, Z. J. Luo, and Z. H. Wang, “Application of cluster analysis and fuzzy comprehensive judgment in geological environment quality evaluation,” Coal Geol. Explor., vol. 27, no. 6, pp. 47–50, 1999. [Google Scholar]
24.
W. J. Li, R. L. An, Y. F. Fang, and J. L. Han, “Coalmine water inrush source analysis based on biasing weighting method fuzzy integrated evaluation,” Coal Geol. China, vol. 24, no. 4, pp. 35–37, 2012. [Google Scholar]
25.
B. S. Yang, C. S. Wang, and C. Y. Yan, “Causes of water inrush in Qidong Coal Mine,” Coal Geol. Explor., vol. 31, no. 1, pp. 41–43, 2003. [Google Scholar]
26.
W. D. Gao, Y. D. He, and X. S. Li, “Application of hydrochemical method in judging the source of water inrush in mines,” Min. Saf. Environ. Prot., vol. 28, no. 5, pp. 44–45, 2011. [Google Scholar]
27.
J. Zhou, X. Z. Shi, and H. Y. Wang, “Water-bursting source determination of mine based on distance discriminant analysis model,” J. Cent. South Univ., vol. 35, no. 2, pp. 278–282, 2010. [Google Scholar][Crossref]