{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T05:22:45Z","timestamp":1741324965052,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":34,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642222023"},{"type":"electronic","value":"9783642222030"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22203-0_56","type":"book-chapter","created":{"date-parts":[[2011,6,28]],"date-time":"2011-06-28T00:26:28Z","timestamp":1309220788000},"page":"659-676","source":"Crossref","is-referenced-by-count":1,"title":["Mining Optimal Utility Incorporated Sequential Pattern from RFID Data Warehouse Using Genetic Algorithm"],"prefix":"10.1007","author":[{"given":"Barjesh","family":"Kochar","sequence":"first","affiliation":[]},{"given":"Rajender Singh","family":"Chhillar","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"56_CR1","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1145\/276305.276374","volume":"27","author":"B. Li","year":"1998","unstructured":"Li, B., Shasha, D.: Free Parallel Data Mining. ACM SIGMOD Record\u00a027(2), 541\u2013543 (1998)","journal-title":"ACM SIGMOD Record"},{"issue":"3","key":"56_CR2","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1016\/0169-023X(95)00038-T","volume":"18","author":"S.S. Anand","year":"1996","unstructured":"Anand, S.S., Bell, D.A., Hughes, J.G.: EDM: A general framework for data mining based on evidence theory. Data and Knowledge Engineering\u00a018(3), 189\u2013223 (1996)","journal-title":"Data and Knowledge Engineering"},{"issue":"6","key":"56_CR3","doi-asserted-by":"publisher","first-page":"914","DOI":"10.1109\/69.250074","volume":"5","author":"R. Agrawal","year":"1993","unstructured":"Agrawal, R., Imielinsk, T., Swami, A.: Database Mining: A Performance Perspective. IEEE Transaction Knowledge and Data Engineering\u00a05(6), 914\u2013925 (1993)","journal-title":"IEEE Transaction Knowledge and Data Engineering"},{"issue":"1","key":"56_CR4","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1504\/IJBIDM.2005.007315","volume":"1","author":"S.Y. Chen","year":"2005","unstructured":"Chen, S.Y., Liu, X.: Data mining from 1994 to 2004: an application-oriented review. International Journal of Business Intelligence and Data Mining\u00a01(1), 4\u201311 (2005)","journal-title":"International Journal of Business Intelligence and Data Mining"},{"issue":"6","key":"56_CR5","first-page":"36","volume":"5","author":"D.R.Y. Singh","year":"2009","unstructured":"Singh, D.R.Y., Chauhan, A.S.: Neural Networks In Data Mining. Journal of Theoretical and Applied Information Technology\u00a05(6), 36\u201342 (2009)","journal-title":"Journal of Theoretical and Applied Information Technology"},{"key":"56_CR6","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.cose.2005.12.003","volume":"25","author":"C.M. Roberts","year":"2006","unstructured":"Roberts, C.M.: Radio frequency identification (RFID). Computers & Security\u00a025, 18\u201326 (2006)","journal-title":"Computers & Security"},{"issue":"8","key":"56_CR7","first-page":"1352","volume":"7","author":"H.A. Aboalsamh","year":"2008","unstructured":"Aboalsamh, H.A.: A novel Boolean algebraic framework for association and pattern mining. WSEAS Transactions on Computers\u00a07(8), 1352\u20131361 (2008)","journal-title":"WSEAS Transactions on Computers"},{"issue":"3","key":"56_CR8","first-page":"1","volume":"2","author":"V. Sathiyamoorthi","year":"2009","unstructured":"Sathiyamoorthi, V., Bhaskaran, V.M.: Data Mining for Intelligent Enterprise Resource Planning System. International Journal of Recent Trends in Engineering\u00a02(3), 1\u20135 (2009)","journal-title":"International Journal of Recent Trends in Engineering"},{"key":"56_CR9","doi-asserted-by":"crossref","unstructured":"Ranjan, J., Bhatnagar, V.: A Review of Data Mining Tools In Customer Relationship Management. Journal of Knowledge Management Practice\u00a09(1) (2008)","DOI":"10.1504\/IJECRM.2008.021103"},{"issue":"1","key":"56_CR10","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1016\/S0167-9236(00)00123-8","volume":"31","author":"M.J. Shaw","year":"2001","unstructured":"Shaw, M.J., Subramaniam, C.S., Tan, G.W., Welge, M.E.: Knowledge management and data mining for marketing. Decision support systems\u00a031(1), 127\u2013137 (2001)","journal-title":"Decision support systems"},{"issue":"2","key":"56_CR11","doi-asserted-by":"publisher","first-page":"71","DOI":"10.4067\/S0718-18762008000100007","volume":"3","author":"A. Sabbaghi","year":"2008","unstructured":"Sabbaghi, A., Vaidyanathan, G.: Effectiveness and Efficiency of RFID technology in Supply Chain Management: Strategic values and Challenges. Journal of Theoretical and Applied Electronic Commerce Research\u00a03(2), 71\u201381 (2008) ISSN 0718\u20131876","journal-title":"Journal of Theoretical and Applied Electronic Commerce Research"},{"issue":"24","key":"56_CR12","first-page":"393","volume":"15","author":"Z. Asif","year":"2005","unstructured":"Asif, Z., Mandviwalla, M.: Integrating the supply chain with RFID: a technical and business analysis. Communications of the Association for Information Systems\u00a015(24), 393\u2013427 (2005)","journal-title":"Communications of the Association for Information Systems"},{"issue":"10","key":"56_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TKDE.2004.54","volume":"16","author":"J. Pei","year":"2004","unstructured":"Pei, J., Han, J., Asl, B.M., Wang, J., Pinto, H., Chen, Q., Dayal, U., Hsum, M.C.: Mining Sequential Patterns by Pattern-Growth: The PrefixSpan Approach. IEEE Transactions on Knowledge and Data Engineering\u00a016(10), 1\u201317 (2004)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"6","key":"56_CR14","doi-asserted-by":"publisher","first-page":"866","DOI":"10.1109\/69.553155","volume":"8","author":"M.S. Chen","year":"1996","unstructured":"Chen, M.S., Han, J., Yu, P.S.: Data mining: an overview from a database perspective. IEEE Transactions on Knowledge and Data Engineering\u00a08(6), 866\u2013883 (1996)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"56_CR15","doi-asserted-by":"publisher","first-page":"1203","DOI":"10.1016\/j.dss.2005.10.006","volume":"42","author":"Y.L. Chen","year":"2006","unstructured":"Chen, Y.L., Hu, Y.H.: Constraint-based sequential pattern mining: The consideration of recency and compactness. Decision Support Systems\u00a042, 1203\u20131215 (2006)","journal-title":"Decision Support Systems"},{"key":"56_CR16","unstructured":"Jea, K.F., Lin, K.C., Liao, I.E.: Mining hybrid sequential patterns by hierarchical mining technique. International Journal of Innovative Computing, Information and Control\u00a05(8) (2009)"},{"issue":"2","key":"56_CR17","first-page":"49","volume":"2","author":"D. Saputra","year":"2008","unstructured":"Saputra, D., Rambli, D.R.A., Foong, O.M.: Mining Sequential Patterns Using I-PrefixSpan. International Journal of Computer Science and Engineering\u00a02(2), 49\u2013554 (2008)","journal-title":"International Journal of Computer Science and Engineering"},{"key":"56_CR18","doi-asserted-by":"publisher","first-page":"3317","DOI":"10.1016\/j.patcog.2007.02.003","volume":"40","author":"J. Hu","year":"2007","unstructured":"Hu, J., Mojsilovic, A.: High-utility pattern mining: A method for discovery of high-utility item sets. Pattern Recognition\u00a040, 3317\u20133324 (2007)","journal-title":"Pattern Recognition"},{"issue":"2","key":"56_CR19","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/s10844-006-0006-z","volume":"28","author":"J. Pei","year":"2007","unstructured":"Pei, J., Han, J., Wang, W.: Constraint-based sequential pattern mining: The pattern-growth methods. Journal of Intelligent Information Systems\u00a028(2), 133\u2013160 (2007)","journal-title":"Journal of Intelligent Information Systems"},{"issue":"4","key":"56_CR20","first-page":"252","volume":"4","author":"S. Sakurai","year":"2008","unstructured":"Sakurai, S., Kitahara, Y., Orihara, R.: A Sequential Pattern Mining Method based on Sequential Interestingness. International Journal of Computational Intelligence\u00a04(4), 252\u2013260 (2008)","journal-title":"International Journal of Computational Intelligence"},{"key":"56_CR21","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1016\/j.datak.2008.05.007","volume":"66","author":"T.P. Exarchos","year":"2008","unstructured":"Exarchos, T.P., Tsipouras, M.G., Papaloukas, C., Fotiadis, D.I.: A two-stage methodology for sequence classification based on sequential pattern mining and optimization. Data & Knowledge Engineering\u00a066, 467\u2013487 (2008)","journal-title":"Data & Knowledge Engineering"},{"issue":"4","key":"56_CR22","first-page":"81","volume":"10","author":"S. Shankar","year":"2009","unstructured":"Shankar, S., Purusothaman, T.: Utility Sentient Frequent Itemset Mining and Association Rule Mining: A Literature Survey and Comparative Study. International Journal of Soft Computing Applications\u00a010(4), 81\u201395 (2009)","journal-title":"International Journal of Soft Computing Applications"},{"key":"56_CR23","first-page":"863","volume":"60","author":"M. Ykhlef","year":"2009","unstructured":"Ykhlef, M., ElGibreen, H.: Mining Sequential Patterns Using Hybrid Evolutionary Algorithm. World Academy of Science, Engineering and Technology\u00a060, 863\u2013870 (2009)","journal-title":"World Academy of Science, Engineering and Technology"},{"issue":"11","key":"56_CR24","doi-asserted-by":"publisher","first-page":"9","DOI":"10.5120\/956-1333","volume":"5","author":"J. Pillai","year":"2010","unstructured":"Pillai, J., Vyas, O.P.: Overview of Itemset Utility Mining and its Applications. International Journal of Computer Applications\u00a05(11), 9\u201313 (2010)","journal-title":"International Journal of Computer Applications"},{"key":"56_CR25","unstructured":"Sedighizadeh, M., Rezazadeh, A.: Using Genetic Algorithm for Distributed Generation Allocation to Reduce Losses and Improve Voltage Profile. World Academy of Science, Engineering and Technology\u00a037 (2008)"},{"issue":"3","key":"56_CR26","doi-asserted-by":"publisher","first-page":"233","DOI":"10.3844\/jcssp.2009.233.241","volume":"5","author":"P. Radhakrishnan","year":"2009","unstructured":"Radhakrishnan, P., Prasad, V.M., Gopalan, M.R.: Optimizing Inventory Using Genetic Algorithm for Efficient Supply Chain Management. Journal of Computer Science\u00a05(3), 233\u2013241 (2009)","journal-title":"Journal of Computer Science"},{"key":"56_CR27","first-page":"43","volume":"11","author":"B.M. Al-Maqaleh","year":"2005","unstructured":"Al-Maqaleh, B.M., Bharadwaj, K.K.: Genetic Programming Approach to Hierarchical Production Rule Discovery. World Academy of Science, Engineering and Technology\u00a011, 43\u201346 (2005)","journal-title":"World Academy of Science, Engineering and Technology"},{"key":"56_CR28","unstructured":"Mantere, T.: A Min-Max Genetic Algorithm with Alternating Multiple Sorting for Solving Constrained Problems. In: Proceedings of the Ninth Scandinavian Conference on Artificial Intelligence (2006)"},{"key":"56_CR29","doi-asserted-by":"crossref","unstructured":"Diaz-Gomez, P.A., Hougen, D.F.: Improved Off-Line Intrusion Detection Using A Genetic Algorithm. In: Proceedings of the Seventh International Conference on Enterprise Information Systems, Miami, USA, May 25-28, pp. 66\u201373 (2005)","DOI":"10.5220\/0002553100660073"},{"issue":"6","key":"56_CR30","first-page":"29","volume":"6","author":"S.R. Reddy","year":"2006","unstructured":"Reddy, S.R.: Selection of RTOS for an Efficient Design of Embedded Systems. International Journal of Computer Science and Network Security\u00a06(6), 29\u201337 (2006)","journal-title":"International Journal of Computer Science and Network Security"},{"key":"56_CR31","doi-asserted-by":"crossref","unstructured":"Schenk, S., Hanke, K.: Combining Genetic Algorithms With Imperfect And Subdivided Features For The Automatic Registration Of Point Clouds (GAREG-ISF). In: Proceedings of the 3rd ISPRS International Workshop, vol.\u00a038 (2009)","DOI":"10.1127\/0935-1221\/2009\/0003"},{"key":"56_CR32","unstructured":"Korejo, I., Yang, S., Li, C.: A Comparative Study of Adaptive Mutation Operators for Genetic Algorithms. In: Proceedings of the 8th Metaheuristic International Conference, July 13-16 (2009)"},{"key":"56_CR33","unstructured":"Sewell, M., Samarabandu, J., Rodrigo, R., McIsaac, K.: The Rank-scaled Mutation Rate for Genetic Algorithms. International Journal of Information Technology\u00a03(1) (2006)"},{"key":"56_CR34","first-page":"192","volume":"4","author":"Z. Bankovic","year":"2009","unstructured":"Bankovic, Z., Moya, J.M., Araujo, A., Bojanic, S., Taladriz, O.N.: A Genetic Algorithm-based Solution for Intrusion Detection. Journal of Information Assurance and Security\u00a04, 192\u2013199 (2009)","journal-title":"Journal of Information Assurance and Security"}],"container-title":["Communications in Computer and Information Science","Software Engineering and Computer Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22203-0_56","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,6]],"date-time":"2025-03-06T19:26:19Z","timestamp":1741289179000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22203-0_56"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642222023","9783642222030"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22203-0_56","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}