{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T03:00:35Z","timestamp":1730343635724,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,2]]},"DOI":"10.23919\/icact.2018.8323790","type":"proceedings-article","created":{"date-parts":[[2018,4,11]],"date-time":"2018-04-11T21:11:35Z","timestamp":1523481095000},"page":"448-453","source":"Crossref","is-referenced-by-count":4,"title":["Applying business intelligence technology for equipment maintenance and repair plan of telecommunications services provider"],"prefix":"10.23919","author":[{"given":"Sasiwimon","family":"Tanphet","sequence":"first","affiliation":[]},{"given":"Paweena","family":"Wanchai","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Data mining algorithms","author":"chattamvelli","year":"2011","journal-title":"Alpha Science International"},{"key":"ref11","first-page":"236","article-title":"Business Intelligence and Development Challenge in the Organization","author":"pensiri","year":"2014","journal-title":"Panyapiwat Journal"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"739","DOI":"10.1016\/j.eswa.2007.07.049","article-title":"Business intelligence approach to supporting strategy-making of ISP service management","volume":"35","author":"sheng-tun","year":"2008","journal-title":"Expert Syst Appl"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2015.09.047"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"431","DOI":"10.18178\/ijmlc.2015.5.6.547","article-title":"Network Security Analysis by Using Business Intelligence","volume":"5","author":"yu","year":"2015","journal-title":"International Journal of Machine Learning and Computing"},{"key":"ref15","first-page":"220","article-title":"Association Rules in Innovative Technology Collaboration","author":"irem","year":"2015","journal-title":"Proc PICMET"},{"key":"ref16","first-page":"36","article-title":"Plausible Characteristics of Association Rule Mining Algorithms for E-Commerce","author":"kumar","year":"2017","journal-title":"2017 Advances in Electrical Third International Conference on"},{"journal-title":"Data Mining Concepts and Technique","year":"2012","author":"han","key":"ref17"},{"journal-title":"Study Means Business Intelligence System with Cognos Program in Fund Management","year":"2008","author":"supaporn","key":"ref4"},{"key":"ref3","first-page":"3","article-title":"Business Intelligence with management, planning and decision making","volume":"36","author":"srisomruk","year":"2013","journal-title":"Journal of Business Administration Faculty of Commerce and Accountancy Thammasat University"},{"key":"ref6","first-page":"477","article-title":"Epidemiological Alert System by Using Business Intelligence","author":"chatchawan","year":"2013","journal-title":"Department of Computer Science Khon Kaen University"},{"journal-title":"Business Intelligence Model","year":"0","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1142\/S0219622008003204"},{"journal-title":"Data Mining for Business Analytics Concepts Techniques and Applications in R","year":"2017","author":"shmueli","key":"ref7"},{"key":"ref2","first-page":"503","article-title":"An Analysis on Business Intelligence Models to Improve Business Performance","author":"martini","year":"2012","journal-title":"Advances in Engineering Science and Management (ICAESM)"},{"journal-title":"PEA and CAT sign MOU for development of communications network","year":"2017","key":"ref1"},{"journal-title":"Data Mining Concepts and Techniques","year":"2012","author":"jiawei","key":"ref9"}],"event":{"name":"2018 20th International Conference on Advanced Communications Technology (ICACT)","start":{"date-parts":[[2018,2,11]]},"location":"Chuncheon-si Gangwon-do, Korea (South)","end":{"date-parts":[[2018,2,14]]}},"container-title":["2018 20th International Conference on Advanced Communication Technology (ICACT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8318543\/8323471\/08323790.pdf?arnumber=8323790","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T06:11:28Z","timestamp":1598249488000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8323790\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2]]},"references-count":17,"URL":"https:\/\/doi.org\/10.23919\/icact.2018.8323790","relation":{},"subject":[],"published":{"date-parts":[[2018,2]]}}}