{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:51:27Z","timestamp":1742914287144,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319948447"},{"type":"electronic","value":"9783319948454"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-94845-4_2","type":"book-chapter","created":{"date-parts":[[2018,7,5]],"date-time":"2018-07-05T02:37:27Z","timestamp":1530758247000},"page":"12-20","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Behavior Analysis Method Towards Product Quality Management"],"prefix":"10.1007","author":[{"given":"Congcong","family":"Ye","sequence":"first","affiliation":[]},{"given":"Chun","family":"Li","sequence":"additional","affiliation":[]},{"given":"Guoqiang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Lihong","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Hongming","family":"Cai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,6]]},"reference":[{"key":"2_CR1","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/978-3-319-05461-2_2","volume-title":"Business Intelligence","author":"WMP van der Aalst","year":"2014","unstructured":"van der Aalst, W.M.P.: Process mining in the large: a tutorial. In: Zim\u00e1nyi, E. (ed.) eBISS 2013. LNBIP, vol. 172, pp. 33\u201376. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-05461-2_2"},{"key":"2_CR2","volume-title":"National Highways and Motorway Police in Pakistan: An Illuminative Study","author":"SM Arain","year":"2016","unstructured":"Arain, S.M., Arain, A.M.: National Highways and Motorway Police in Pakistan: An Illuminative Study. Lulu.com, Morrisville (2016)"},{"issue":"5","key":"2_CR3","doi-asserted-by":"publisher","first-page":"2785","DOI":"10.1016\/j.eswa.2014.09.054","volume":"42","author":"A Bouguettaya","year":"2015","unstructured":"Bouguettaya, A., Yu, Q., Liu, X., et al.: Efficient agglomerative hierarchical clustering. Expert Syst. Appl. 42(5), 2785\u20132797 (2015)","journal-title":"Expert Syst. Appl."},{"issue":"1","key":"2_CR4","doi-asserted-by":"publisher","first-page":"49","DOI":"10.14257\/ijdta.2014.7.1.05","volume":"7","author":"W Dai","year":"2014","unstructured":"Dai, W., Ji, W.: A mapreduce implementation of C4. 5 decision tree algorithm. Int. J. Database Theory Appl. 7(1), 49\u201360 (2014)","journal-title":"Int. J. Database Theory Appl."},{"issue":"2","key":"2_CR5","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1023\/A:1007607513941","volume":"40","author":"TG Dietterich","year":"2000","unstructured":"Dietterich, T.G.: An experimental comparison of three methods for constructing ensembles of decision trees: Bagging, boosting, and randomization. Mach. Learn. 40(2), 139\u2013157 (2000)","journal-title":"Mach. Learn."},{"key":"2_CR6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10247-4","volume-title":"Data Preprocessing in Data Mining","author":"S Garc\u00eda","year":"2015","unstructured":"Garc\u00eda, S., Luengo, J., Herrera, F.: Data Preprocessing in Data Mining. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-10247-4"},{"key":"2_CR7","doi-asserted-by":"publisher","first-page":"1418","DOI":"10.1109\/ACCESS.2014.2373335","volume":"2","author":"SH Hawkins","year":"2014","unstructured":"Hawkins, S.H., Korecki, J.N., Balagurunathan, Y., et al.: Predicting outcomes of nonsmall cell lung cancer using CT image features. IEEE Access 2, 1418\u20131426 (2014)","journal-title":"IEEE Access"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Kesavaraj, G., Sukumaran, S.: A study on classification techniques in data mining. In: 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT), pp. 1\u20137. IEEE (2013)","DOI":"10.1109\/ICCCNT.2013.6726842"},{"key":"2_CR9","first-page":"6764","volume":"5","author":"M Mundada","year":"2014","unstructured":"Mundada, M., Gawali, B., Kayte, S.: Recognition and classification of speech and its related fluency disorders. Int. J. Comput. Sci. Inf. Technol. (IJCSIT) 5, 6764\u20136767 (2014)","journal-title":"Int. J. Comput. Sci. Inf. Technol. (IJCSIT)"},{"issue":"5","key":"2_CR10","doi-asserted-by":"publisher","first-page":"894","DOI":"10.1109\/TNNLS.2013.2283140","volume":"25","author":"T Rumbell","year":"2014","unstructured":"Rumbell, T., Denham, S.L., Wennekers, T.: A spiking self-organizing map combining stdp, oscillations, and continuous learning. IEEE Trans. Neural Netw. Learn. Syst. 25(5), 894\u2013907 (2014)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"2_CR11","unstructured":"Satyanarayanan, K.S., Srikanth, B., Murugesan, M.: Tree dataset extraction using HAC based algorithm (2016)"},{"key":"2_CR12","series-title":"Integrated Series in Information Systems","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4899-7641-3","volume-title":"Machine Learning Models and Algorithms for Big Data Classification: Thinking with Examples for Effective Learning","author":"S Suthaharan","year":"2016","unstructured":"Suthaharan, S.: Machine Learning Models and Algorithms for Big Data Classification: Thinking with Examples for Effective Learning. ISIS, vol. 36. Springer, Boston, MA (2016). https:\/\/doi.org\/10.1007\/978-1-4899-7641-3"},{"key":"2_CR13","unstructured":"Basu, S., Banerjee, A., Mooney, R.: Semi-supervised clustering by seeding. In: Proceedings of 19th International Conference on Machine Learning (ICML-2002) (2002)"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Horn, J.T.H., Krokstad, J.R., Amdahl, J.: Joint probability distribution of environmental conditions for design of offshore wind turbines. In: ASME 2017 36th International Conference on Ocean, Offshore and Arctic Engineering. American Society of Mechanical Engineers, p. V010T09A068 (2017)","DOI":"10.1115\/OMAE2017-61451"},{"key":"2_CR15","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1016\/j.jhydrol.2015.12.014","volume":"534","author":"O Kisi","year":"2016","unstructured":"Kisi, O., Parmar, K.S.: Application of least square support vector machine and multivariate adaptive regression spline models in long term prediction of river water pollution. J. Hydrol. 534, 104\u2013112 (2016)","journal-title":"J. Hydrol."},{"key":"2_CR16","unstructured":"Nazeer, K.A.A., Sebastian, M.P.: Improving the accuracy and efficiency of the k-means clustering algorithm. In: Proceedings of the World Congress on Engineering, vol. 1, p. 1\u20133 (2009)"}],"container-title":["Lecture Notes in Business Information Processing","Research and Practical Issues of Enterprise Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-94845-4_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,5]],"date-time":"2022-07-05T00:07:56Z","timestamp":1656979676000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-94845-4_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319948447","9783319948454"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-94845-4_2","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"6 July 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CONFENIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Research and Practical Issues of Enterprise Information Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shanghai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 October 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 October 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"confenis2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}