{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T23:46:41Z","timestamp":1740181601661,"version":"3.37.3"},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T00:00:00Z","timestamp":1726012800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T00:00:00Z","timestamp":1726012800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-024-03076-w","type":"journal-article","created":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T13:05:02Z","timestamp":1726059902000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Optimized Operation Methods of the Wafer Surface Defect Detection"],"prefix":"10.1007","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4628-6895","authenticated-orcid":false,"given":"Dongyung","family":"Kim","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,11]]},"reference":[{"issue":"8725","key":"3076_CR1","first-page":"1","volume":"10","author":"S-H Chen","year":"2020","unstructured":"Chen S-H, Kang C-H, Perng DB. Detecting and measuring defects in wafer die using GAN and YOLOv3. Appl Sci. 2020;10(8725):1\u201315.","journal-title":"Appl Sci"},{"key":"3076_CR2","doi-asserted-by":"publisher","unstructured":"Kim D. An optimized discrete data classification method in N-dimensional. Comput Math Methods. 2022. https:\/\/doi.org\/10.1155\/2022\/8199872.","DOI":"10.1155\/2022\/8199872"},{"key":"3076_CR3","doi-asserted-by":"publisher","unstructured":"Kim D. Computational optimized monitoring methodology to avoid crowd crush accidents with scattered data. Appl Math. 2022. https:\/\/doi.org\/10.3390\/appliedmath2040042.","DOI":"10.3390\/appliedmath2040042"},{"key":"3076_CR4","doi-asserted-by":"publisher","unstructured":"Kim D. Numerical subgrid Bi-cubic methods of partial differential equations in image segmentation, Scientific Reports 14, Article number :8387 (2024). https:\/\/doi.org\/10.1038\/s41598-024-54855-7","DOI":"10.1038\/s41598-024-54855-7"},{"key":"3076_CR5","doi-asserted-by":"crossref","unstructured":"Lin J, Keogh E, Lonardi S, Chiu B. A symbolic representation of time series with implications for streaming algorithms. In: Proceedings of 8th ACMSIGMOD workshop research issues data mining knowledge, discovery. 2003. p. 211.","DOI":"10.1145\/882082.882086"},{"key":"3076_CR6","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1016\/S0022-0000(68)80034-0","volume":"2","author":"VF Demjanov","year":"1968","unstructured":"Demjanov VF. Algorithms for some minimax problems. J Comput Syst Sci. 1968;2:342\u201380.","journal-title":"J. Comput. Syst. Sci."},{"issue":"6","key":"3076_CR7","doi-asserted-by":"publisher","first-page":"1218","DOI":"10.1287\/opre.29.6.1218","volume":"29","author":"Zvi Drezner","year":"1981","unstructured":"Drezner Zvi. On location dominance on spherical surfaces. Oper Res. 1981;29(6):1218\u20139.","journal-title":"Oper. Res."},{"key":"3076_CR8","doi-asserted-by":"publisher","first-page":"637","DOI":"10.1016\/S0305-0548(99)00105-7","volume":"29","author":"Z Drezner","year":"2002","unstructured":"Drezner Z, Steiner S, Wesolowsky GO. On the circle closest to a set of points. Comput Oper Res. 2002;29:637\u201350.","journal-title":"Comput. Oper. Res."},{"issue":"1","key":"3076_CR9","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1287\/opre.1040.0137","volume":"53","author":"SP Fekete","year":"2005","unstructured":"Fekete SP, Mitchell J, Beurer K. On the continuous Fermat Weber problem. Oper Res. 2005;53(1):61\u201376.","journal-title":"Oper. Res."},{"issue":"3","key":"3076_CR10","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1007\/s00186-007-0165-x","volume":"66","author":"M Gugat","year":"2007","unstructured":"Gugat M, Pfeiffer B. Weber problems with mixed distances and regional demand. Math Methods Oper Res. 2007;66(3):419\u201349.","journal-title":"Math. Methods Oper. Res."},{"issue":"2","key":"3076_CR11","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1016\/j.ejor.2007.02.043","volume":"187","author":"J-L Jiang","year":"2008","unstructured":"Jiang J-L, Yuan X-M. A heuristic algorithm for constrained multi-source Weber problem\u2013the variational inequality approach. Eur J Oper Res. 2008;187(2):357\u201370.","journal-title":"Eur. J. Oper. Res."},{"key":"3076_CR12","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.engappai.2008.04.003","volume":"22","author":"AK Morales","year":"2009","unstructured":"Morales AK, Erazo FR. A search space reduction methodology for data mining in large databases. Eng Appl Artif Intell. 2009;22:57\u201365.","journal-title":"Eng. Appl. Artif. Intell."},{"key":"3076_CR13","doi-asserted-by":"crossref","unstructured":"Kotyza J. Machacek Z, Koziorek J. Detection of directions in an image as a method for circle detection, IFAC PapersOnline. 2018;51(6):496\u2013501.","DOI":"10.1016\/j.ifacol.2018.07.109"},{"issue":"2","key":"3076_CR14","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1016\/j.cor.2006.03.001","volume":"35","author":"B Pfeiffer","year":"2008","unstructured":"Pfeiffer B, Klamroth K. A unified model for Weber problems with continuous and network distances. Comput Oper Res. 2008;35(2):312\u201326.","journal-title":"Comput. Oper. Res."},{"issue":"1","key":"3076_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/net.3230240102","volume":"24","author":"C-S Sung","year":"1994","unstructured":"Sung C-S, Joo C-M. Locating an obnoxious facility on a Euclidean network to minimize neighborhood damage. Networks. 1994;24(1):1\u20139.","journal-title":"Networks"},{"key":"3076_CR16","volume-title":"Machine learning models and algorithms for big optimization","author":"S Shan","year":"2016","unstructured":"Shan S. Machine learning models and algorithms for big optimization. Boston: Springer; 2016."},{"key":"3076_CR17","doi-asserted-by":"crossref","unstructured":"Varuna S, Natesan P. An integration of k-means clustering and naive Bayes classifier for Intrusion detection. In: Proceedings of 3rd international conference on signal processing and communication network. 2015. p. 15.","DOI":"10.1109\/ICSCN.2015.7219835"},{"key":"3076_CR18","volume-title":"Uber den Standort der Industrien: Erster Teil","author":"A Weber","year":"1909","unstructured":"Weber A. Uber den Standort der Industrien: Erster Teil. Tubingen: Mohr; 1909."},{"key":"3076_CR19","doi-asserted-by":"crossref","unstructured":"Zhao Q-H, Ha M-H, Peng G-B, Zhang X-K., Support vector machine based on half-suppressed fuzzy c-means clustering. In: Proceedings of international conference on machine learning cybernetics, vol. 2. 2009. pp. 1236\u201340.","DOI":"10.1109\/ICMLC.2009.5212363"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-024-03076-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-024-03076-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-024-03076-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T13:11:18Z","timestamp":1726060278000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-024-03076-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,11]]},"references-count":19,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2024,10]]}},"alternative-id":["3076"],"URL":"https:\/\/doi.org\/10.1007\/s42979-024-03076-w","relation":{},"ISSN":["2661-8907"],"issn-type":[{"type":"electronic","value":"2661-8907"}],"subject":[],"published":{"date-parts":[[2024,9,11]]},"assertion":[{"value":"20 April 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 June 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 September 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The author declares that I have no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"873"}}