{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T00:47:53Z","timestamp":1743122873101,"version":"3.40.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031008276"},{"type":"electronic","value":"9783031008283"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-00828-3_17","type":"book-chapter","created":{"date-parts":[[2022,5,3]],"date-time":"2022-05-03T20:04:11Z","timestamp":1651608251000},"page":"171-183","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Telecommunication Network Interference Analysis Using Naive Bayes Classifier Algorithm"],"prefix":"10.1007","author":[{"given":"Marisa","family":"Marisa","sequence":"first","affiliation":[]},{"given":"Azizul Azhar","family":"Ramli","sequence":"additional","affiliation":[]},{"given":"Suhadi","family":"Suhadi","sequence":"additional","affiliation":[]},{"given":"Suslistyowati","family":"Sulistyowati","sequence":"additional","affiliation":[]},{"given":"Ismail Hanif","family":"Robbani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,5,4]]},"reference":[{"key":"17_CR1","doi-asserted-by":"crossref","unstructured":"Chyzhmar, K., Dniprov, O., Korotiuk, O., Shapoval, R., Sydorenko, O.: State information security as a challenge of information and computer technology development. J. Secur. Sustain. Issues 9(3) (2020)","DOI":"10.9770\/jssi.2020.9.3(8)"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Votinova, E., Votinov, M.: Information society: analyzing problems and prospects of using information technologies, computers and communication networks. Webology 16(1) (2019)","DOI":"10.14704\/WEB\/V16I1\/a181"},{"issue":"22","key":"17_CR3","doi-asserted-by":"publisher","first-page":"8139","DOI":"10.3390\/app10228139","volume":"10","author":"A Tomasov","year":"2020","unstructured":"Tomasov, A., Holik, M., Oujezsky, V., Horvath, T., Munster, P.: GPON PLOAMd message analysis using supervised neural networks. Appl. Sci. (Switz.) 10(22), 8139 (2020)","journal-title":"Appl. Sci. (Switz.)"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"E-commerce-businnes-technology-society. Int. J. Eng. Technol. Manag. Res. 4(10) (2020)","DOI":"10.29121\/ijetmr.v4.i10.2017.103"},{"key":"17_CR5","doi-asserted-by":"publisher","first-page":"198691","DOI":"10.1109\/ACCESS.2020.3034685","volume":"8","author":"A Gupta","year":"2020","unstructured":"Gupta, A., Srivastava, A., Bohara, V.: Resource allocation in solar-powered FiWi networks. IEEE Access 8, 198691\u2013198705 (2020)","journal-title":"IEEE Access"},{"key":"17_CR6","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1016\/j.scico.2018.04.006","volume":"163","author":"A Furda","year":"2018","unstructured":"Furda, A., Fidge, C., Barros, A.: A practical approach for detecting multi-tenancy data interference. Sci. Comput. Program. 163, 160\u2013173 (2018)","journal-title":"Sci. Comput. Program."},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Ain, K., Hidayati, H., Aulia Nastiti, O.: Expert system for stroke classification using naive bayes classifier and certainty factor as diagnosis supporting device. J. Phys.: Conf. Ser. 1\u20137 (2020)","DOI":"10.1088\/1742-6596\/1445\/1\/012026"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Putri, N., Apriono, C., Natali, Y.: Increasing residential capacity in gigabit-capable passive optical network using high splitting ratio. In: 2020 3rd International Conference on Information and Communications Technology, ICOIACT 2020 (2020)","DOI":"10.1109\/ICOIACT50329.2020.9332009"},{"key":"17_CR9","unstructured":"Amaya, L., et al.: Implementation of the pineaplle tetra module for an audit process through impersonation of aps in the 2.4 and 5 GHz band in the telecommunications laboratory of the electronics and telecommunications career. RISTI \u2013 Rev. Iberica Sist. Tecnol. Inform. 2020(E27) (2020)"},{"key":"17_CR10","unstructured":"Rusek, J.: The point nuisance method as a decision-support system based on Bayesian inference approach. Arch. Min. Sci. 65(1) (2020)"},{"issue":"1","key":"17_CR11","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/s10845-018-1433-8","volume":"31","author":"E Oztemel","year":"2020","unstructured":"Oztemel, E., Gursev, S.: Literature review of Industry 4.0 and related technologies. J. Intell. Manuf. 31(1), 127\u2013182 (2020)","journal-title":"J. Intell. Manuf."},{"issue":"3","key":"17_CR12","doi-asserted-by":"publisher","first-page":"1662","DOI":"10.1109\/TCOMM.2019.2960339","volume":"68","author":"J Dehkordi","year":"2020","unstructured":"Dehkordi, J., Tralli, V.: Interference analysis for optical wireless communications in network-on-chip (NoC) Scenarios. IEEE Trans. Commun. 68(3), 1662\u20131674 (2020)","journal-title":"IEEE Trans. Commun."},{"issue":"4","key":"17_CR13","doi-asserted-by":"publisher","first-page":"2093","DOI":"10.1109\/TWC.2019.2898655","volume":"18","author":"I Randrianantenaina","year":"2019","unstructured":"Randrianantenaina, I., Elsawy, H., Dahrouj, H., Kaneko, M., Alouini, M.: Uplink power control and ergodic rate characterization in FD cellular networks: A stochastic geometry approach. IEEE Trans. Wirel. Commun. 18(4), 2093\u20132110 (2019)","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"2","key":"17_CR14","doi-asserted-by":"publisher","first-page":"807","DOI":"10.1109\/TWC.2018.2883465","volume":"18","author":"M Safari","year":"2019","unstructured":"Safari, M., Haas, H., Kazemi, H.: A wireless optical backhaul solution for optical attocell networks. IEEE Trans. Wirel. Commun. 18(2), 807\u2013823 (2019)","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Mane, N., Verma, A., Arya, A.: A pragmatic optimal approach for detection of cyber attacks using genetic programming. In: 20th IEEE International Symposium on Computational Intelligence and Informatics, CINTI 2020 \u2013 Proceedings (2020)","DOI":"10.1109\/CINTI51262.2020.9305844"},{"issue":"3","key":"17_CR16","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/s12599-020-00642-3","volume":"62","author":"P Zschech","year":"2020","unstructured":"Zschech, P., Horn, R., H\u00f6schele, D., Janiesch, C., Heinrich, K.: Intelligent user assistance for automated data mining method selection. Bus. Inf. Syst. Eng. 62(3), 227\u2013247 (2020)","journal-title":"Bus. Inf. Syst. Eng."},{"key":"17_CR17","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1016\/j.procs.2020.04.018","volume":"171","author":"P Svec","year":"2020","unstructured":"Svec, P., Benko, L., Kadlecik, M., Kratochvil, J., Munk, M.: Web usage mining: data pre-processing impact on found knowledge in predictive modelling. Proc. Comput. Sci. 171, 168\u2013178 (2020)","journal-title":"Proc. Comput. Sci."},{"issue":"2","key":"17_CR18","doi-asserted-by":"publisher","first-page":"1843","DOI":"10.3233\/JIFS-179956","volume":"39","author":"X Guan","year":"2020","unstructured":"Guan, X., Fan, Y., Qin, Q., Deng, K., Yang, G.: Construction of science and technology achievement transfer and transformation platform based on deep learning and data mining technology. J. Intell. Fuzzy Syst. 39(2), 1843\u20131854 (2020)","journal-title":"J. Intell. Fuzzy Syst."},{"key":"17_CR19","doi-asserted-by":"publisher","first-page":"139537","DOI":"10.1109\/ACCESS.2019.2943462","volume":"7","author":"A Wang","year":"2019","unstructured":"Wang, A., Gao, X.: Multi-tasks discovery method based on the concept network for data mining. IEEE Access 7, 139537\u2013139547 (2019)","journal-title":"IEEE Access"},{"issue":"1","key":"17_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41597-020-00624-w","volume":"7","author":"V Maus","year":"2020","unstructured":"Maus, V., et al.: A global-scale data set of mining areas. Sci. Data 7(1), 1\u201313 (2020)","journal-title":"Sci. Data"},{"issue":"6","key":"17_CR21","doi-asserted-by":"publisher","first-page":"700","DOI":"10.3390\/electronics8060700","volume":"8","author":"M Holik","year":"2019","unstructured":"Holik, M., Horvath, T., Oujezsky, V.: Application for GPON frame analysis. Electron. (Switz.) 8(6), 700 (2019)","journal-title":"Electron. (Switz.)"},{"issue":"9","key":"17_CR22","doi-asserted-by":"publisher","first-page":"1428","DOI":"10.1049\/iet-com.2019.0313","volume":"14","author":"W Hassan","year":"2020","unstructured":"Hassan, W., Idrus, S., King, H., Ahmed, S., Faulkner, M.: Idle sense with transmission priority in fibre-wireless networks. IET Commun. 14(9), 1428\u20131437 (2020)","journal-title":"IET Commun."},{"issue":"4","key":"17_CR23","doi-asserted-by":"publisher","first-page":"100044","DOI":"10.1016\/j.jnlest.2020.100044","volume":"18","author":"T Thangappan","year":"2020","unstructured":"Thangappan, T., Therese, B., Suvarnamma, A., Swapna, G.: Review on dynamic bandwidth allocation of GPON and EPON. J. Electron. Sci. Technol. 18(4), 100044 (2020)","journal-title":"J. Electron. Sci. Technol."},{"key":"17_CR24","unstructured":"Huang, D., Zhang, Y., Lin, H., Zou, L., Liu, Z.: Rule inference network model for classification. Ruan Jian Xue Bao\/J. Softw. 31(4) (2020)"},{"key":"17_CR25","unstructured":"Ehrhardt, A., et al.: Maintenance and deployment of fibre infrastructure in the access domain for FTTH networks. Photonische Netze - 13. ITG-Fachtagung (2020)"},{"key":"17_CR26","doi-asserted-by":"crossref","unstructured":"Castellano, J., Moral-Garc\u00eda, S., Mantas, C., Abell\u00e1n, J.: On the use of m-probability-estimation and imprecise probabilities in the na\u00efve bayes classifier. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 28(4), 661-682 (2020)","DOI":"10.1142\/S0218488520500282"},{"issue":"1","key":"17_CR27","first-page":"178","volume":"8","author":"N Rezaeian","year":"2020","unstructured":"Rezaeian, N., Novikova, G.: Persian text classification using naive bayes algorithms and support vector machine algorithm. Indon. J. Electr. Eng. Inform. 8(1), 178\u2013188 (2020)","journal-title":"Indon. J. Electr. Eng. Inform."},{"issue":"3","key":"17_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3385656","volume":"14","author":"A Tuomo","year":"2020","unstructured":"Tuomo, A., Suutala, J., R\u00f6ning, J., Koskim\u00e4ki, H.: Better classifier calibration for small datasets. ACM Trans. Knowl. Discov. Data 14(3), 1\u201319 (2020)","journal-title":"ACM Trans. Knowl. Discov. Data"},{"key":"17_CR29","doi-asserted-by":"crossref","unstructured":"Mahanama, B., Mendis, W., Jayasooriya, A., Malaka, V., Thayasivam, U., Umashanger, T.: Educational data mining: a review on data collection process. In: 18th International Conference on Advances in ICT for Emerging Regions, ICTer 2018 \u2013 Proceedings (2019)","DOI":"10.1109\/ICTER.2018.8615532"},{"issue":"5","key":"17_CR30","first-page":"561","volume":"32","author":"M El Mohadab","year":"2020","unstructured":"El Mohadab, M., Bouikhalene, B., Safi, S.: Automatic CV processing for scientific research using data mining algorithm. J. King Saud Univ. \u2013 Comput. Inf. Sci. 32(5), 561\u2013567 (2020)","journal-title":"J. King Saud Univ. \u2013 Comput. Inf. Sci."}],"container-title":["Lecture Notes in Networks and Systems","Recent Advances in Soft Computing and Data Mining"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-00828-3_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,3]],"date-time":"2022-05-03T20:28:03Z","timestamp":1651609683000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-00828-3_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031008276","9783031008283"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-00828-3_17","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"4 May 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SCDM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Soft Computing and Data Mining","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 May 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 May 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"scdm2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/scdm.uthm.edu.my\/scdm2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}