Design Optimization of Food Safety Monitoring System With Social Network Analysis
暂无分享,去创建一个
[1] Xia Cao,et al. Risk assessment in Chinese food safety , 2013 .
[2] Richard F. Deckro,et al. A Flow Model Social Network Analysis of the Iranian Government , 2003 .
[3] Richard F. Deckro,et al. Gains, losses and thresholds of influence in social networks , 2007 .
[4] A. Marucheck,et al. Product safety and security in the global supply chain: Issues, challenges and research opportunities , 2011 .
[5] T. Drezner,et al. Competitive supply chain network design: An overview of classifications, models, solution techniques and applications , 2014 .
[6] Ryan M. McGuire. Weighted Key Player Problem for Social Network Analysis , 2012 .
[7] R. Narasimhan,et al. The Assurance of Food Safety in Supply Chains via Relational Networking: A Social Network Perspective , 2015 .
[8] Mehmet Soysal,et al. Modelling food logistics networks with emission considerations: The case of an international beef supply chain , 2014 .
[9] Richard F. Deckro,et al. An Analytical Comparison of Social Network Measures , 2014, IEEE Transactions on Computational Social Systems.
[10] Stanley Wasserman,et al. Social Network Analysis: Methods and Applications , 1994, Structural analysis in the social sciences.
[11] Thomas Y. Choi,et al. Structural investigation of supply networks: A social network analysis approach , 2011 .
[12] Kishan G. Mehrotra,et al. Multi-objective optimization to identify key players in large social networks , 2015, Social Network Analysis and Mining.
[13] Haiyun Liu,et al. Designing Independent Regulatory System of Food Safety in China , 2010 .
[14] Jiehong Zhou,et al. Adoption of HACCP system in the Chinese food industry: A comparative analysis , 2008 .
[15] J. Wolfert,et al. Virtualization of food supply chains with the internet of things , 2016 .
[16] Stephen P. Borgatti,et al. Identifying sets of key players in a social network , 2006, Comput. Math. Organ. Theory.
[17] S. Borgatti,et al. On Social Network Analysis in a Supply Chain Context , 2009 .
[18] Shuai Wang,et al. Constructing Robust Cooperative Networks using a Multi-Objective Evolutionary Algorithm , 2017, Scientific Reports.
[19] Judith M. Whipple,et al. Global supply chain design considerations: Mitigating product safety and security risks , 2011 .
[20] Hsiang‐Lin Cheng,et al. Seeking knowledge or gaining legitimacy? Role of social networks on new practice adoption by OEM suppliers , 2010 .
[21] José Rui Figueira,et al. Modeling centrality measures in social network analysis using bi-criteria network flow optimization problems , 2013, Eur. J. Oper. Res..
[22] Rafal Drezewski,et al. The application of social network analysis algorithms in a system supporting money laundering detection , 2015, Inf. Sci..
[23] L. Unnevehr,et al. Food safety management and regulation: International experiences and lessons for China , 2015 .
[24] William A. Kerr,et al. A review of Chinese food safety strategies implemented after several food safety incidents involving export of Chinese aquatic products , 2012 .
[25] Jing Liu,et al. A Two-Phase Multiobjective Evolutionary Algorithm for Enhancing the Robustness of Scale-Free Networks Against Multiple Malicious Attacks , 2017, IEEE Transactions on Cybernetics.
[26] Dong-Young Kim,et al. Understanding supplier structural embeddedness: A social network perspective , 2014 .
[27] Alireza Aliahmadi,et al. Introducing a procedure for developing a novel centrality measure (Sociability Centrality) for social networks using TOPSIS method and genetic algorithm , 2016, Comput. Hum. Behav..
[28] E. Roghanian,et al. Supply chain network optimization: A review of classification, models, solution techniques and future research , 2013 .
[29] Xuefeng He,et al. Analysis of Algorithm for Reachable Matrix of ISM , 2012 .
[30] F. Destefano,et al. Safety monitoring in the Vaccine Adverse Event Reporting System (VAERS). , 2015, Vaccine.
[31] M. Nauta,et al. Relevance of microbial finished product testing in food safety management , 2016 .
[32] Jacky S. L. Ting,et al. Design of Supply-chain Pedigree Interactive Dynamic Explore (SPIDER) for food safety and implementation of Hazard Analysis and Critical Control Points (HACCPs) , 2013 .
[33] Yusoon Kim,et al. Supply network disruption and resilience: A network structural perspective , 2015 .
[34] Weili Wu,et al. Effector Detection in Social Networks , 2016, IEEE Transactions on Computational Social Systems.
[35] Operation and performance of a National Monitoring Network for Radioactivity in Food , 2016 .
[36] Christian Prins,et al. Models for optimization and performance evaluation of biomass supply chains: An Operations Research perspective , 2016 .
[37] S. Borgatti. The Key Player Problem , 2002 .
[38] Bruce L. Golden,et al. Optimization Algorithms for Networks and Graphs. By Edward Minieka, Marcel Dekker, Inc. New York, New York, 1978, $19.75, 356 Pages , 1979, Networks.
[39] Alejandro Alvarez-Melcon,et al. Advanced traceability system in aquaculture supply chain , 2014 .
[40] Ali Hamzeh,et al. Discovering the Hidden Structure of a Social Network: A Semi Supervised Approach , 2017, IEEE Transactions on Computational Social Systems.
[41] Jacqueline M. Bloemhof,et al. Systems for sustainability and transparency of food supply chains - Current status and challenges , 2011, Adv. Eng. Informatics.
[42] M E J Newman. Assortative mixing in networks. , 2002, Physical review letters.
[43] H. S. Ramaswamy,et al. Analysis of critical control points in deviant thermal processes using artificial neural networks , 2003 .