Search Results - (( business prevention. ) OR ((( business rerepresentations. ) OR ( business representation. ))))

Refine Results
  1. 1
  2. 2

    Business ethics : a managerial approach / by Wicks, Andrew C.

    Published 2010
    Table of Contents: “…The language of ethics -- A look at the sources of ethical problems in business and how to prevent them -- Ethics, stakeholders, corporate strategy, and value creation -- Business ethics in the global marketplace -- Appendix: List of industry benchmarks and international agreements -- Leadership -- Marketing and operations -- Finance and accounting -- Management -- Environmental sustainability and its challenges -- Managing on the ethical frontier.…”
    View in OPAC
    Book
  3. 3
  4. 4
  5. 5

    Semantic Web Implications for Technologies and Business Practices /

    Published 2016
    Table of Contents: “…-- Unnatural Language Processing: Characterizing the Challenges in Translating Natural Language Semantics into Ontology Semantics -- The Lexical Bridge: A Methodology for Bridging the Semantic Gaps between a Natural Language and an Ontology -- Reliable Semantic Systems For Decision Making: Defining A Business Rules Ontology For A Survey Decision System -- University Ontology: A Case study at Ahlia University -- Semantic Enrichment of Event Stream for Semantic Situation Awareness -- Semantic Web and Business:Reaching a tipping point?.…”
    Full-text access
    View in OPAC
    e-Book
  6. 6
  7. 7

    Advances in Business ICT: New Ideas from Ongoing Research

    Published 2017
    Table of Contents: “…Advances in Business ICT: New Ideas from Ongoing Research -- Verification of Temporal Knowledge Bases as an Important Aspect of Knowledge Management Processes in Organization -- The role of simulation performance in software-in-the-loop simulations -- Cognitum Ontorion: Knowledge Representation and Reasoning System -- Overview of Selected Business Process Semantization Techniques -- Selected Approaches Towards Taxonomy of Business Process Anomalies -- Hybrid framework for investment project portfolio selection -- Towards Predicting Stock Price Moves with Aid of Sentiment Analysis of Twitter Social Network Data and Big Data Processing Environment -- On a Property of Phase Correlation and Possibilities to Reduce the Walsh Function System.…”
    Full-text access
    View in OPAC
    e-Book
  8. 8
  9. 9

    Pharmaceutical Supply Chains - Medicines Shortages

    Published 2019
    Full-text access
    View in OPAC
    e-Book
  10. 10
  11. 11

    Proceedings of the 23rd International Conference on Industrial Engineering and Engineering Management 2016 Theory and Application of Industrial Engineering /

    Published 2017
    Table of Contents: “…1.Selection Of Port Enterprise Logistics Service Providers Based On The Combination Weighting-Grey Synthetic Decision-Making Method -- 2.Application of evaluation of aircraft material demand forecasting method and mining of association rules -- 3.Research on the Selection of Business-to-Customer e-commerce Logistics Model Based on Analytic Hierarchy Process Method -- 4.Content Framework and Evaluating Method of the Energy Efficiency Assessment Standard for Machining period -- 5.Combining Problem and Lecture Based Learning for Production System Modeling and Simulation Course in Industrial Engineering Education -- 6.Schedule Risk Management of IT Outsourcing Project Using Negotiation Mechanism -- 7.The Effect of Reciprocity on Revenue Sharing Contract Coordination and its Dynamics -- 8.Intelligent Rescheduling System for Steelmaking and Continuous Casting Production -- 9.Application of RCA to the Data Analysis in Medication Errors of the TPR System -- 10.An Investigation of Adverse Events in Medication Processes by HFACS and Conditional Probability -- 11.Adaptive Grasping and Adjusting Method of Virtual Hand Gestures with Semantics Information for Virtual Assembly -- 12.Dynamic Medical Risk Assessment based on Bow-tie Approach and Bayesian Network -- 13.Rational Thinking of the Marketing Strategy Based on Customer Equity -- 14.An Empirical Study on Manufacturing Strategy Formulation in Turbulent Environment: Dealing with Changes and Uncertainties -- 15.The Impacts of Trust Relationship on Knowledge Absorptive Capacity: An Empirical Study from Service Outsourcing Enterprises -- 16.Determination of price and warranty length under claim rate of customer -- 17.Research on Module Construction based on Product Lifecycle Management -- 18.Logistics Distribution Path Planning Based On Genetic Algorithm -- 19.Research on the Mechanism of Risk Cascading Propagation across Interdependent R&D Networks -- 20.Research on Capabilities-based Optimization Matching of Vessel Maintenance Support Equipment -- 21.Analysis on Warship Technology Supportability Equipment System-of-Systems Based on System Dynamics -- 22.Simulation Model of Rail Transshipment System in Hydropower Development Project -- 23.The Application Of Six Sigma Theory In The Secondary Hospital Management -- 24.Research on Parameter Optimization of ant colony algorithm based on genetic algorithm -- 25.Multi-objective Integrated Optimization Problem of Preventive Maintenance Planning and Flexible Job-Shop Scheduling -- 26.Cost-sensitive Association Rule Modeling for Predicting Sequential Event -- 27.Study on the Improved PSO Algorithm Used in Coal Mine Safety Resource Allocation -- 28.Research on the Improving Design of Laminating Machine Based on Lean Six Sigma -- 29.A Method of Quality Evaluation for Complexity Equipment Manufacturing and Service Based on Process Area and its Reliability & Validity Analysis -- 30.Analyzing "Made in China 2025" Under theBackground of "Industry 4.0" -- 31.Study on the Implementation Strategy of Liaoning Manufacturing Collaborative Innovation System Based on "Made in China 2025" -- 32.Layout Analysis and Design of the Spindle Box Processing Workshop -- 33.Empirical Research on Production Leveling of Domestic Car -- 34.Exploration and Practice of Car Industry Lean Culture Construction -- 35.The study about intelligent manufacturing resource allocation efficiency based on mutual information criterion -- 36.Social Insurance Expenditure and Future Trend in China -- 37.A Two-Level Principal-Agent Model for Schedule Risk Control of IT Outsourcing Project Based on Genetic Algorithm -- 38.An Empirical Analysis of Influence of Capital Allocation Efficiency on Performance in Listing Corporation -- 39.The Game about Competition and Cooperation in Port Group -- 40.The factors Influencing Dwelling-Type Choices of residents in the Old Industrial District: an Investigation based on the Logistic Model -- 41.A management method ofaccounts receivable based on credit rating for rail equipment manufacturing industry -- 42.The Research of Doctors Recommendation Algorithm -- 43.Resource Constrained Project Scheduling Optimization With Robust Objective Under Stochastic Duration Of Activities -- 44.Dynamic scheduling of public bicycles based on artificial bee colony algorithm -- 45.Web service classification approach with an integrated similarity measure -- 46.How to Optimize Production and Carbon Resources under Cap and Trade -- 47.The Development About Social Network Analysis And The Review About Its -- 48.Gallbladder Diagnosis and Importance Analysis based on Bayesian Network -- 49.The Effect of Dynamic Capabilities on International Performance of Chinese Universities -- 50.Researching The Role Of Online Movie Reviews Based On User Classification -- 51.Analysis and Simulation Application for Enterprise Populations M&A Based on Predator-prey Model -- 52.Research on Mechanism of Early Warning of Health Management Based onCloud Computing and Big Data -- 53.Research on Early Safety Warning Evaluation Based on Multi-hierarchy Fuzzy AHP in Civil Aviation Airport -- 54.Modeling and Analysis of the Customer Checkout Process with Flexible Servers for a Retail Store -- 55.An Integrated Strategy for Information Security:Outsourcing and In-house.…”
    Full-text access
    View in OPAC
    e-Book
  12. 12
  13. 13

    Intellectual Property and Financing Strategies for Technology Startups by Halt, Jr., Gerald B., Donch, Jr., John C., Stiles, Amber R., Fesnak, Robert

    Published 2017
    Table of Contents: “…Introduction -- Part I: Startup Funding Sources, Stages of the Life Cycle of a Business, and The Corresponding Intellectual Property Strategies for Each Stage -- Sources of Company Funding -- Early Stage Strategy -- Growth and Expansion Stage -- Mature, Exit and Rebirth Stage -- Achieving Success Stage -- Part II: Overview of Intellectual Property Rights for Startups -- Trademarks and Trade Dress -- Domain Names -- Patents -- Trade Secrets -- Copyrights -- Intellectual Property Issues in Labeling and Marketing -- Enforcement and Infringement of Intellectual Property Rights -- Part III: Implementation of IP Strategies for Startups -- Successful Implementation of a Startup's IP Strategy -- Developing and Managing an Intellectual Property Portfolio -- Valuing Startup Companies -- Licensing of Intellectual Property Rights for Startups -- Startup Tips for Avoiding and Preventing Intellectual Property Problems -- Appendices.…”
    Full-text access
    View in OPAC
    e-Book
  14. 14
  15. 15

    Engineering Digital Transformation Proceedings of the 11th International Conference on Industrial Engineering and Industrial Management /

    Published 2019
    Table of Contents: “…-- Chapter 5. Business Model Innovation from a Technology Perspective: A Review -- Chapter 6. …”
    Full-text access
    View in OPAC
    e-Book
  16. 16

    Applied Computing and Information Technology

    Published 2017
    Table of Contents: “…Business Sustainability Conceptualization -- A Replicated Study on Relationship between Code Quality and Method Comments -- A Predictive Model for Standardized Test Performance in Michigan Schools -- A Development Technique for Mobile Applications Program -- Identification Method Applications Development using Adapting Component Model -- Development of Guiding Walking Support Device for Visually Impaired People with the GPS -- User Evaluation Prediction Models Based on Conjoint Analysis and Neural Networks for Interactive Evolutionary Computation -- Emotional Video Scene Retrieval Using Multilayer Convolutional Network -- Proactive Approach for the Prevention of DDoS Attacks in Cloud Computing Environments -- Practical Uses of Memory Storage Extension -- How to Build a High Quality Mobile Applications Based on Improved Process -- A New Hybrid Discrete Firefly Algorithm for Solving the Traveling Salesman Problem.…”
    Full-text access
    View in OPAC
    e-Book
  17. 17

    Social Dialogue and Democracy in the Workplace Trade Union and Employer Perspectives from Turkey / by Cam, Erdem

    Published 2019
    Table of Contents: “…Workers representation -- 4.3.1.2. Workplace union representation -- 4.3.2. …”
    Full-text access
    View in OPAC
    e-Book
  18. 18

    Modeling with Rules Using Semantic Knowledge Engineering by Nalepa, Grzegorz J.

    Published 2018
    Table of Contents: “…Part I Domain of Rule-Based Systems -- Rules as a Knowledge Representation Paradigm -- Knowledge Engineering with Rules -- Selected Applications of Rule -- Part II Formal Models for Rules -- Formalism for Description of Decision Rules -- Formalized Integration of Rules and Processes -- Prototyping Structure of Rule Bases -- Handling Uncertainty in Rules -- Formalizing Interoperability in Rule Bases -- Part III Practical Studies in Semantic Knowledge Engineering -- Semantic Knowledge Engineering Approach -- Rule Interoperability with Expert System Shells -- Visual Software Modeling with Rules -- Using Rules to Support Software Testing -- Integrating Business Process Models with Rules -- Rule-Based Systems and Semantic Web -- Collaborative Knowledge Engineering with Wikis -- Designing Robot Control Logic with Rules -- Rules in Mobile Context-Aware Systems -- Index.…”
    Full-text access
    View in OPAC
    e-Book
  19. 19

    Advances in Knowledge Discovery and Management Volume 8 /

    Published 2019
    Full-text access
    View in OPAC
    e-Book
  20. 20

    Information Technology - New Generations 15th International Conference on Information Technology /

    Published 2018
    Table of Contents: “…Part I Cybersecurity -- Safeguarding Personal Health Information: Case Study -- Cybersecurity as People Powered Perpetual Innovation -- Performance Study of the Impact of Security on 802.11ac Networks -- Training Neural Tensor Networks with the Never Ending Language Learner -- PERIA-Framework: A Prediction Extension Revision Image Annotation Framework -- The Modern State and the Further Development Prospects of Information Security in the Republic of Kazakhstan -- Evaluating Cyber Threats to the United Kingdom's National Health Service (NHS) Spine Network -- A Virtual Animated Commentator Architecture for Cybersecurity Competitions -- Malicious Software Classification using VGG16 Deep Neural Network's Bottleneck Features -- Cybersecurity Vulnerabilities Assessment (A Systematic Review Approach) -- A Self Proxy Signature Scheme over NTRU Lattices -- Towards an Ontology of Security Assessment: a core model proposal -- Integration of Mobile Forensic Tool Capabilities -- Deep Packet Inspection: A Key Issue for Network Security -- What Petya/NotPetya Ransomware is and What its Remidiations are -- Analysis of Security Vulnerability and Analytics of Internet of Things (IOT) Platform -- New Techniques for Public Key Encryption with Sender Recovery -- Cloud Intrusion Detection and Prevention system for M-voting application in South Africa -- Protecting Personal Data with Blockchain Technology -- The Role of CAE-CDE in Cybersecurity Education for Workforce Development -- Software Optimizations for DES -- Part II Networking and Wireless Communications -- Design and Development of VXLAN based Cloud Overlay Network Monitoring System and Environment -- End to End Delay Analysis in a Two Tier Cluster Hierarchical Wireless Sensor Networks -- Tools to Support SMEs to Migrate to the Cloud: Opportunities and Challenges -- A Dual canister medicine IoT Dispenser -- Local Clock Synchronization without Transmission Delay Estimation of Control Messages in Wireless Sensor Networks -- Denial of service attacks inwireless sensor networks with proposed countermeasures -- Part III Education and Technology -- Internet-Based Education: A New Milestone for Formal Language and Automata Courses -- Teaching Communication Management in Software Projects through Serious Educational Games -- Gamification applied in the teaching of agile Scrum methodology -- An Experience of Using a Board Serious Virtual Game for Teaching the SCRUM Framework -- Part IV Agile Software Testing and Development -- Teaching Scrum by Doing Scrum in Internships in South Africa to Prepare Interns for Agile Projects -- Alignment of Requirements and Testing in Agile: an Industrial Experience -- Health Care Information Systems: A Crisis Approach -- Using Correct-by-Construction Software Agile Development -- Service-Centered Operation Methodology (MOCA) application supported by computer science to improve continuously care quality in public services -- Improving Agile Software Development with Domain Ontologies -- A Stratified Sampling Algorithmfor Artificial Neural Networks -- Part V Data Mining/Machine Learning -- Mining ENADE Data from the Ulbra Network Institution -- Fault diagnostic of variance shifts in clinical monitoring using an Artificial Neural Network Input Gain Measurement Approximation (ANNIGMA) -- Investigating Attribute Assessment for Credit Granting on a Brazilian Retail Enterprise -- Cross-language approach for sentiment classification in Brazilian Portuguese with ConvNets -- Thematic Spatiotemporal Association Rules to Track the Evolving of Visual Features and their Meaning in Satellite Image Time Series -- DeRis: Information system supporting the prediction of default risk in companies -- Taking a Steppe towards optimizing Note-Taking Software by creation of a Note Classification Algorithm -- Pattern Recognition for Time Series Forecasting: A Case Study of a Helicopter's Flight Dynamics -- A model for hour-wise prediction of mobile device energy availability -- Enhancing Lipstick Try-On with Augmented Reality and Color Prediction Model -- A Traffic Light Recognition Device -- An Approach to Prepare Data to Feed Visual Metaphors in a Multiple View Interactive Environment -- Reproducible Research in Document Analysis and Recognition -- Music Genre Classification using Data Mining and Machine Learning -- Improving word representations using Paraphrase dataset -- A Initial Experimental Evaluation of the NeuroMessenger: A Collaborative Tool to Improve the Empathy of Text Interactions -- Dual Long Short-Term Memory Networks for Sub-Character Representation Learning -- Business Intelligence Dashboard Application for Insurance Cross Selling -- Speech Features Analysis for Tone Language Speaker Discrimination Systems -- Selection of Transformations of Continuous Predictors in Logistic Regression -- Part VI Software Engineering -- A Generic Approach to Efficiently Parallelize Legacy Sequential Software -- Clustering and Combinatorial Methods for Test Suite Prioritization of GUI and Web Applications -- A Timed Petri NetModel to Specify Scenarios of Video Games -- Survey of Biometric Techniques for Automotive Applications -- A Survey on adoption Good Practices for ICT Governance at Enhanced Organizations -- Budget and User Feedback Control Strategy-based PRMS Scenario Web Application -- A Controlled Natural Language Editor for Semantic of Business Vocabulary and Rules -- An Approach Based on Possibilistic WorkFlow Nets to Model Multiplayer Video Games -- A Requirements Engineering-based Approach for evaluating Security Requirements Engineering Methodologies -- Increasing the prediction quality of software defective modules with automatic feature engineering -- Part VII High Performance Computing Architectures -- NSF Noyce Recruitment and Mentorship -- Mining Associations between Two Categories using Unstructured Text Data in Cloud -- A Note on Computational Science Curriculum -- Development of a Local Cloud-Based Bioinformatics Architecture -- Part VIII Computer Vision, Image Processing/Analysis -- AComputer Vision Based Algorithm for Obstacle Avoidance -- The ST-Vis tool for SpatioTemporal Visualization -- Detection of early gastric cancer from endoscopic images using Wavelet Transform Modulus Maxima -- Detection method of early esophageal cancer from endoscopic image using dyadic wavelet transform and four-layer neural network -- Study of Specific Location of Exhaustive Matching in Order to Improve the Optical Flow Estimation -- Solarpowered UAV Platform System: a Case Study for Ground Change Detection in BRIC Countries -- Part IX Health, Bioinformatics, Pattern Detection and Optimization -- Benefits of Establishing Makerspaces in Distributed Development Environment -- Semantic Description of Healthcare Devices to Enable Data Integration -- Applying transfer learning to QSAR regression models -- Investigating the Recognition of Non-Articulatory Sounds by using Statistical Tests and Support Vector Machine -- A Complete Diabetes Management and Care System -- On the use of van der PauwTechnique to Monitor Skin Burning in Patients Undergoing Interferential Current Therapy (IFC) with Extension to Other E-Stim Monitoring -- Part X Potpourri -- Smart Lighting Controlling System: Case Study of Yarmouk University Museum -- Incremental Topology Generated for ANN A Case Study on a Helicopter's Flight Simulation -- Degree Aware Triangulation of Annular Regions -- Heuristic Approaches for the Open-Shop Scheduling Problem -- Continuous State Power-down Systems for Renewable Energy Management -- Extracting Timing Models from Component-based Multi-criticality Vehicular Embedded Systems -- Part XI Short Papers -- Customer services management and satisfaction of Internet-related banking of First National Bank -- BIG IoT - Interconnecting IoT Platforms from different domains - First success story -- Cross-Cultural Perspective of E-Commerce -- Website Usability Requirements: Through the Lens of Individual's Perception -- Methods of Ensuring the Reliability and Fault Tolerance of Information Systems -- Applying a Method for Credit Limit Reviews in a Brazilian Retail Enterprise -- Application of an Effective Methodology for Analysis of Fragility and Its Components in the Elderly -- A Classifier Evaluation for Payments' Default Predictions in a Brazilian Retail Company -- Confidentiality, Integrity & Availability in Electronic Health Records:An Integrative Review -- Operating System Security Management and…”
    Full-text access
    View in OPAC
    e-Book