{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,30]],"date-time":"2024-06-30T20:27:36Z","timestamp":1719779256630},"reference-count":30,"publisher":"Elsevier BV","issue":"8","license":[{"start":{"date-parts":[[2011,12,1]],"date-time":"2011-12-01T00:00:00Z","timestamp":1322697600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Applied Soft Computing"],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1016\/j.asoc.2011.05.043","type":"journal-article","created":{"date-parts":[[2011,6,26]],"date-time":"2011-06-26T00:14:00Z","timestamp":1309047240000},"page":"5165-5180","source":"Crossref","is-referenced-by-count":24,"title":["Developing a T\u03c9 (the weakest t-norm) fuzzy GERT for evaluating uncertain process reliability in semiconductor manufacturing"],"prefix":"10.1016","volume":"11","author":[{"given":"Kuo-Ping","family":"Lin","sequence":"first","affiliation":[]},{"given":"Ming-Jia","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Kuo-Chen","family":"Hung","sequence":"additional","affiliation":[]},{"given":"Yiyo","family":"Kuo","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.asoc.2011.05.043_bib0005","doi-asserted-by":"crossref","first-page":"2071","DOI":"10.1016\/j.jmatprotec.2004.04.387","article-title":"A simulation model to characterize the photolithography process of a semiconductor wafer fabrication","volume":"155\u2013156","author":"Arisha","year":"2004","journal-title":"Journal of Materials Processing Technology"},{"key":"10.1016\/j.asoc.2011.05.043_bib0010","doi-asserted-by":"crossref","first-page":"532","DOI":"10.1016\/j.ejor.2003.07.001","article-title":"Fuzzy strategic replacement analysis","volume":"160","author":"Chang","year":"2005","journal-title":"European Journal of Operational Research"},{"key":"10.1016\/j.asoc.2011.05.043_bib0015","doi-asserted-by":"crossref","first-page":"1797","DOI":"10.1016\/j.camwa.2004.10.042","article-title":"Applying the fuzzy-weighted-average approach to evaluate network security systems","volume":"49","author":"Chang","year":"2005","journal-title":"Computers and Mathematics with Applications"},{"key":"10.1016\/j.asoc.2011.05.043_bib0020","doi-asserted-by":"crossref","first-page":"496","DOI":"10.1109\/TFUZZ.2006.876743","article-title":"\u03b1-Cut fuzzy arithmetic: simplifying rules and a fuzzy function optimization with a decision variable","volume":"14","author":"Chang","year":"2006","journal-title":"IEEE Transactions on Fuzzy Systems"},{"key":"10.1016\/j.asoc.2011.05.043_bib0025","doi-asserted-by":"crossref","first-page":"673","DOI":"10.1080\/00207720600774222","article-title":"Applying fuzzy arithmetic to system dynamics for the customer-producer-employment model","volume":"37","author":"Chang","year":"2006","journal-title":"International Journal of Systems Science"},{"key":"10.1016\/j.asoc.2011.05.043_bib0030","doi-asserted-by":"crossref","first-page":"1910","DOI":"10.1016\/0026-2714(94)90286-0","article-title":"Fuzzy consecutive-k-out-of-n: F system reliability","volume":"34","author":"Cheng","year":"1994","journal-title":"Microelectronics and Reliability"},{"key":"10.1016\/j.asoc.2011.05.043_bib0035","doi-asserted-by":"crossref","first-page":"1557","DOI":"10.1016\/0026-2714(95)00200-6","article-title":"Fuzzy repairable reliability based on fuzzy GERT","volume":"36","author":"Cheng","year":"1996","journal-title":"Microelectronics and Reliability"},{"key":"10.1016\/j.asoc.2011.05.043_bib0040","series-title":"Fuzzy Sets and Systems: Theory and Applications","author":"Dubois","year":"1980"},{"key":"10.1016\/j.asoc.2011.05.043_bib0045","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1016\/S0165-0114(97)00140-1","article-title":"A parametric representation of fuzzy numbers and their arithmetic operators","volume":"91","author":"Giachetti","year":"1997","journal-title":"Fuzzy Sets and Systems"},{"key":"10.1016\/j.asoc.2011.05.043_bib0050","doi-asserted-by":"crossref","first-page":"349","DOI":"10.1016\/S0165-0114(00)00005-1","article-title":"Some results on the addition of fuzzy intervals","volume":"122","author":"Hong","year":"2001","journal-title":"Fuzzy Sets and Systems"},{"key":"10.1016\/j.asoc.2011.05.043_bib0055","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1016\/S0165-0114(00)00107-X","article-title":"Shape preserving multiplications of fuzzy numbers","volume":"123","author":"Hong","year":"2001","journal-title":"Fuzzy Sets and Systems"},{"key":"10.1016\/j.asoc.2011.05.043_bib0060","doi-asserted-by":"crossref","first-page":"150","DOI":"10.1016\/j.ins.2004.11.005","article-title":"Fuzzy measures for a correlation coefficient of fuzzy numbers under TW (the weakest t-norm)-based fuzzy arithmetic operations","volume":"176","author":"Hong","year":"2006","journal-title":"Information Sciences"},{"key":"10.1016\/j.asoc.2011.05.043_bib0065","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1016\/S0165-0114(96)00125-X","article-title":"Fuzzy system reliability analysis by the use of (the weakest t-norm) on fuzzy number arithmetic operations","volume":"90","author":"Hong","year":"1997","journal-title":"Fuzzy Sets and System"},{"key":"10.1016\/j.asoc.2011.05.043_bib0070","doi-asserted-by":"crossref","first-page":"931","DOI":"10.1016\/j.ijhydene.2004.11.004","article-title":"Evaluation of polymer electrolyte fuel cell application technology R&Ds by GERT analysis","volume":"30","author":"Hayashi","year":"2005","journal-title":"International Journal of Hydrogen Energy"},{"key":"10.1016\/j.asoc.2011.05.043_bib0075","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1016\/0165-0114(84)90094-0","article-title":"Fuzzy network technique for technological forecasting","volume":"14","author":"Itakura","year":"1984","journal-title":"Fuzzy Sets and Systems"},{"key":"10.1016\/j.asoc.2011.05.043_bib0080","doi-asserted-by":"crossref","first-page":"1006","DOI":"10.1016\/j.microrel.2005.08.003","article-title":"Critical dimension control in photolithography based on the yield by a simulation program","volume":"46","author":"Kang","year":"2006","journal-title":"Microelectronics Reliability"},{"key":"10.1016\/j.asoc.2011.05.043_bib0085","first-page":"75","article-title":"Additive preserving the linearity of fuzzy intervals","volume":"6","author":"Koles\u00e1rov\u00e1","year":"1995","journal-title":"Tatra Mountains Mathematical Publications"},{"key":"10.1016\/j.asoc.2011.05.043_bib0090","doi-asserted-by":"crossref","first-page":"1297","DOI":"10.1016\/j.energy.2004.03.088","article-title":"Time to realization: evaluation of CO2 capture technology R&Ds by GERT (Graphical Evaluation and Review Technique) analyses","volume":"29","author":"Kosugi","year":"2004","journal-title":"Energy"},{"key":"10.1016\/j.asoc.2011.05.043_bib0095","doi-asserted-by":"crossref","first-page":"521","DOI":"10.1016\/S0360-8352(02)00050-5","article-title":"Efficient Monte Carlo simulation method of GERT-type network for project management","volume":"42","author":"Kurihara","year":"2002","journal-title":"Computers & Industrial Engineering"},{"key":"10.1016\/j.asoc.2011.05.043_bib0100","series-title":"Fuzzy Mathematical Models in Engineering and Management Science","author":"Kaufmann","year":"1988"},{"key":"10.1016\/j.asoc.2011.05.043_bib0105","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1080\/10170660409509397","article-title":"Model formulation and development of fuzzy GERT networks","volume":"21","author":"Liu","year":"2004","journal-title":"Journal of the Chinese Institute of Industrial Engineers"},{"key":"10.1016\/j.asoc.2011.05.043_bib0110","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1016\/S0165-0114(97)00310-2","article-title":"A new fuzzy arithmetic","volume":"108","author":"Ma","year":"1999","journal-title":"Fuzzy Sets and Systems"},{"key":"10.1016\/j.asoc.2011.05.043_bib0115","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1016\/0165-0114(95)00401-7","article-title":"Shape preserving additions of fuzzy intervals","volume":"86","author":"Mesiar","year":"1997","journal-title":"Fuzzy Sets and System"},{"key":"10.1016\/j.asoc.2011.05.043_bib0120","first-page":"73","article-title":"The four operations of arithmetic on fuzzy numbers","volume":"7","author":"Mizumoto","year":"1976","journal-title":"Systems-Computers-Controls"},{"key":"10.1016\/j.asoc.2011.05.043_bib0125","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1016\/0165-0114(78)90011-8","article-title":"Fuzzy variables","volume":"1","author":"Nahmias","year":"1978","journal-title":"Fuzzy Sets and Systems"},{"key":"10.1016\/j.asoc.2011.05.043_bib0130","first-page":"293","article-title":"GERT: graphical evaluation and review technique: part II, probabilistic and industrial engineering application","volume":"17","author":"Pritsker","year":"1996","journal-title":"The Journal of Industrial Engineering"},{"key":"10.1016\/j.asoc.2011.05.043_bib0135","doi-asserted-by":"crossref","first-page":"292","DOI":"10.1109\/TSM.2004.831930","article-title":"300-mm full-factory simulations for 90-and 65-nm IC manufacturing","volume":"17","author":"Pillai","year":"2004","journal-title":"IEEE Transactions on Semiconductor Manufacturing"},{"key":"10.1016\/j.asoc.2011.05.043_bib0140","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1016\/S0165-0114(00)00096-8","article-title":"Computational aspects of fuzzy arithmetic based on Archimedean t-norms","volume":"123","author":"Wagenknecht","year":"2001","journal-title":"Fuzzy Sets and Systems"},{"key":"10.1016\/j.asoc.2011.05.043_bib0145","doi-asserted-by":"crossref","first-page":"80","DOI":"10.2307\/3001968","article-title":"Individual comparisons by ranking methods","volume":"1","author":"Wilcoxon","year":"1945","journal-title":"Biometrics Bulletin"},{"key":"10.1016\/j.asoc.2011.05.043_bib0150","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1016\/S0019-9958(65)90241-X","article-title":"Fuzzy sets","volume":"8","author":"Zadeh","year":"1965","journal-title":"Information and Control"}],"container-title":["Applied Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1568494611002031?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1568494611002031?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2018,12,1]],"date-time":"2018-12-01T23:22:55Z","timestamp":1543706575000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1568494611002031"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12]]},"references-count":30,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2011,12]]}},"alternative-id":["S1568494611002031"],"URL":"https:\/\/doi.org\/10.1016\/j.asoc.2011.05.043","relation":{},"ISSN":["1568-4946"],"issn-type":[{"value":"1568-4946","type":"print"}],"subject":[],"published":{"date-parts":[[2011,12]]}}}