Search Results - (( business prevention. ) OR ( business representation. ))
Suggested Topics within your search.
Suggested Topics within your search.
- Computational Intelligence 19
- Computational intelligence 19
- Artificial Intelligence 16
- Artificial intelligence 16
- Industrial Management 6
- Communications Engineering, Networks 5
- Telecommunication 5
- Application software 4
- Computer and Information Systems Applications 4
- Business information services 3
- Industrial and Production Engineering 3
- Industrial engineering 3
- Innovation and Technology Management 3
- Production engineering 3
- Signal processing 3
- Signal, Speech and Image Processing 3
- Technological innovations 3
- Automated Pattern Recognition 2
- Building Construction and Design 2
- Buildings 2
- Business & Economics 2
- Business Information Systems 2
- Business ethics 2
- Business logistics 2
- Computer Modelling 2
- Computer simulation 2
- Control engineering 2
- Data Mining and Knowledge Discovery 2
- Data mining 2
- Design and construction 2
-
1
Imprecision and Uncertainty in Information Representation and Processing New Tools Based on Intuitionistic Fuzzy Sets and Generalized Nets /
Published Springer International Publishing : Imprint: Springer, 2016.Full-text access
e-Book -
2
Business ethics : a managerial approach /
Published Prentice Hall, 2010.Table of Contents: “…The language of ethics -- A look at the sources of ethical problems in business and how to prevent them -- Ethics, stakeholders, corporate strategy, and value creation -- Business ethics in the global marketplace -- Appendix: List of industry benchmarks and international agreements -- Leadership -- Marketing and operations -- Finance and accounting -- Management -- Environmental sustainability and its challenges -- Managing on the ethical frontier.…”
Book -
3
Data-Centric Business and Applications Evolvements in Business Information Processing and Management-Volume 1 /
Published Springer International Publishing : Imprint: Springer, 2019.Full-text access
e-Book -
4
Business Information Systems and Technology 4.0 New Trends in the Age of Digital Change /
Published Springer International Publishing : Imprint: Springer, 2018.Full-text access
e-Book -
5
Semantic Web Implications for Technologies and Business Practices /
Published Springer International Publishing : Imprint: Springer, 2016.Table of Contents: “…-- Unnatural Language Processing: Characterizing the Challenges in Translating Natural Language Semantics into Ontology Semantics -- The Lexical Bridge: A Methodology for Bridging the Semantic Gaps between a Natural Language and an Ontology -- Reliable Semantic Systems For Decision Making: Defining A Business Rules Ontology For A Survey Decision System -- University Ontology: A Case study at Ahlia University -- Semantic Enrichment of Event Stream for Semantic Situation Awareness -- Semantic Web and Business:Reaching a tipping point?.…”
Full-text access
e-Book -
6
Funeral Rites in Contemporary Korea The Business of Death /
Published Springer Nature Singapore : Imprint: Springer, 2019.Full-text access
e-Book -
7
Advances in Business ICT: New Ideas from Ongoing Research
Published Springer International Publishing : Imprint: Springer, 2017.Table of Contents: “…Advances in Business ICT: New Ideas from Ongoing Research -- Verification of Temporal Knowledge Bases as an Important Aspect of Knowledge Management Processes in Organization -- The role of simulation performance in software-in-the-loop simulations -- Cognitum Ontorion: Knowledge Representation and Reasoning System -- Overview of Selected Business Process Semantization Techniques -- Selected Approaches Towards Taxonomy of Business Process Anomalies -- Hybrid framework for investment project portfolio selection -- Towards Predicting Stock Price Moves with Aid of Sentiment Analysis of Twitter Social Network Data and Big Data Processing Environment -- On a Property of Phase Correlation and Possibilities to Reduce the Walsh Function System.…”
Full-text access
e-Book -
8
The dark side of leadership : identifying and overcoming unethical practice in organizations /
Published Emerald Group Publishing Limited, 2016.Full-text access
e-Book -
9
Pharmaceutical Supply Chains - Medicines Shortages
Published Springer International Publishing : Imprint: Springer, 2019.Full-text access
e-Book -
10
Identifying Patterns in Financial Markets New Approach Combining Rules Between PIPs and SAX /
Published Springer International Publishing : Imprint: Springer, 2018.Full-text access
e-Book -
11
Proceedings of the 23rd International Conference on Industrial Engineering and Engineering Management 2016 Theory and Application of Industrial Engineering /
Published Atlantis Press : Imprint: Atlantis Press, 2017.Table of Contents: “…1.Selection Of Port Enterprise Logistics Service Providers Based On The Combination Weighting-Grey Synthetic Decision-Making Method -- 2.Application of evaluation of aircraft material demand forecasting method and mining of association rules -- 3.Research on the Selection of Business-to-Customer e-commerce Logistics Model Based on Analytic Hierarchy Process Method -- 4.Content Framework and Evaluating Method of the Energy Efficiency Assessment Standard for Machining period -- 5.Combining Problem and Lecture Based Learning for Production System Modeling and Simulation Course in Industrial Engineering Education -- 6.Schedule Risk Management of IT Outsourcing Project Using Negotiation Mechanism -- 7.The Effect of Reciprocity on Revenue Sharing Contract Coordination and its Dynamics -- 8.Intelligent Rescheduling System for Steelmaking and Continuous Casting Production -- 9.Application of RCA to the Data Analysis in Medication Errors of the TPR System -- 10.An Investigation of Adverse Events in Medication Processes by HFACS and Conditional Probability -- 11.Adaptive Grasping and Adjusting Method of Virtual Hand Gestures with Semantics Information for Virtual Assembly -- 12.Dynamic Medical Risk Assessment based on Bow-tie Approach and Bayesian Network -- 13.Rational Thinking of the Marketing Strategy Based on Customer Equity -- 14.An Empirical Study on Manufacturing Strategy Formulation in Turbulent Environment: Dealing with Changes and Uncertainties -- 15.The Impacts of Trust Relationship on Knowledge Absorptive Capacity: An Empirical Study from Service Outsourcing Enterprises -- 16.Determination of price and warranty length under claim rate of customer -- 17.Research on Module Construction based on Product Lifecycle Management -- 18.Logistics Distribution Path Planning Based On Genetic Algorithm -- 19.Research on the Mechanism of Risk Cascading Propagation across Interdependent R&D Networks -- 20.Research on Capabilities-based Optimization Matching of Vessel Maintenance Support Equipment -- 21.Analysis on Warship Technology Supportability Equipment System-of-Systems Based on System Dynamics -- 22.Simulation Model of Rail Transshipment System in Hydropower Development Project -- 23.The Application Of Six Sigma Theory In The Secondary Hospital Management -- 24.Research on Parameter Optimization of ant colony algorithm based on genetic algorithm -- 25.Multi-objective Integrated Optimization Problem of Preventive Maintenance Planning and Flexible Job-Shop Scheduling -- 26.Cost-sensitive Association Rule Modeling for Predicting Sequential Event -- 27.Study on the Improved PSO Algorithm Used in Coal Mine Safety Resource Allocation -- 28.Research on the Improving Design of Laminating Machine Based on Lean Six Sigma -- 29.A Method of Quality Evaluation for Complexity Equipment Manufacturing and Service Based on Process Area and its Reliability & Validity Analysis -- 30.Analyzing "Made in China 2025" Under theBackground of "Industry 4.0" -- 31.Study on the Implementation Strategy of Liaoning Manufacturing Collaborative Innovation System Based on "Made in China 2025" -- 32.Layout Analysis and Design of the Spindle Box Processing Workshop -- 33.Empirical Research on Production Leveling of Domestic Car -- 34.Exploration and Practice of Car Industry Lean Culture Construction -- 35.The study about intelligent manufacturing resource allocation efficiency based on mutual information criterion -- 36.Social Insurance Expenditure and Future Trend in China -- 37.A Two-Level Principal-Agent Model for Schedule Risk Control of IT Outsourcing Project Based on Genetic Algorithm -- 38.An Empirical Analysis of Influence of Capital Allocation Efficiency on Performance in Listing Corporation -- 39.The Game about Competition and Cooperation in Port Group -- 40.The factors Influencing Dwelling-Type Choices of residents in the Old Industrial District: an Investigation based on the Logistic Model -- 41.A management method ofaccounts receivable based on credit rating for rail equipment manufacturing industry -- 42.The Research of Doctors Recommendation Algorithm -- 43.Resource Constrained Project Scheduling Optimization With Robust Objective Under Stochastic Duration Of Activities -- 44.Dynamic scheduling of public bicycles based on artificial bee colony algorithm -- 45.Web service classification approach with an integrated similarity measure -- 46.How to Optimize Production and Carbon Resources under Cap and Trade -- 47.The Development About Social Network Analysis And The Review About Its -- 48.Gallbladder Diagnosis and Importance Analysis based on Bayesian Network -- 49.The Effect of Dynamic Capabilities on International Performance of Chinese Universities -- 50.Researching The Role Of Online Movie Reviews Based On User Classification -- 51.Analysis and Simulation Application for Enterprise Populations M&A Based on Predator-prey Model -- 52.Research on Mechanism of Early Warning of Health Management Based onCloud Computing and Big Data -- 53.Research on Early Safety Warning Evaluation Based on Multi-hierarchy Fuzzy AHP in Civil Aviation Airport -- 54.Modeling and Analysis of the Customer Checkout Process with Flexible Servers for a Retail Store -- 55.An Integrated Strategy for Information Security:Outsourcing and In-house.…”
Full-text access
e-Book -
12
The management and leadership of educational marketing research, practice and applications /
Published Emerald, 2012.Full-text access
e-Book -
13
Intellectual Property and Financing Strategies for Technology Startups
Published Springer International Publishing : Imprint: Springer, 2017.Table of Contents: “…Introduction -- Part I: Startup Funding Sources, Stages of the Life Cycle of a Business, and The Corresponding Intellectual Property Strategies for Each Stage -- Sources of Company Funding -- Early Stage Strategy -- Growth and Expansion Stage -- Mature, Exit and Rebirth Stage -- Achieving Success Stage -- Part II: Overview of Intellectual Property Rights for Startups -- Trademarks and Trade Dress -- Domain Names -- Patents -- Trade Secrets -- Copyrights -- Intellectual Property Issues in Labeling and Marketing -- Enforcement and Infringement of Intellectual Property Rights -- Part III: Implementation of IP Strategies for Startups -- Successful Implementation of a Startup's IP Strategy -- Developing and Managing an Intellectual Property Portfolio -- Valuing Startup Companies -- Licensing of Intellectual Property Rights for Startups -- Startup Tips for Avoiding and Preventing Intellectual Property Problems -- Appendices.…”
Full-text access
e-Book -
14
Earthquake Disaster Simulation of Civil Infrastructures From Tall Buildings to Urban Areas /
Published Springer Nature Singapore : Imprint: Springer, 2017.Full-text access
e-Book -
15
Engineering Digital Transformation Proceedings of the 11th International Conference on Industrial Engineering and Industrial Management /
Published Springer International Publishing : Imprint: Springer, 2019.Table of Contents: “…-- Chapter 5. Business Model Innovation from a Technology Perspective: A Review -- Chapter 6. …”
Full-text access
e-Book -
16
Applied Computing and Information Technology
Published Springer International Publishing : Imprint: Springer, 2017.Table of Contents: “…Business Sustainability Conceptualization -- A Replicated Study on Relationship between Code Quality and Method Comments -- A Predictive Model for Standardized Test Performance in Michigan Schools -- A Development Technique for Mobile Applications Program -- Identification Method Applications Development using Adapting Component Model -- Development of Guiding Walking Support Device for Visually Impaired People with the GPS -- User Evaluation Prediction Models Based on Conjoint Analysis and Neural Networks for Interactive Evolutionary Computation -- Emotional Video Scene Retrieval Using Multilayer Convolutional Network -- Proactive Approach for the Prevention of DDoS Attacks in Cloud Computing Environments -- Practical Uses of Memory Storage Extension -- How to Build a High Quality Mobile Applications Based on Improved Process -- A New Hybrid Discrete Firefly Algorithm for Solving the Traveling Salesman Problem.…”
Full-text access
e-Book -
17
Social Dialogue and Democracy in the Workplace Trade Union and Employer Perspectives from Turkey /
Published Springer Nature Singapore : Imprint: Springer, 2019.Table of Contents: “…Workers representation -- 4.3.1.2. Workplace union representation -- 4.3.2. …”
Full-text access
e-Book -
18
Modeling with Rules Using Semantic Knowledge Engineering
Published Springer International Publishing : Imprint: Springer, 2018.Table of Contents: “…Part I Domain of Rule-Based Systems -- Rules as a Knowledge Representation Paradigm -- Knowledge Engineering with Rules -- Selected Applications of Rule -- Part II Formal Models for Rules -- Formalism for Description of Decision Rules -- Formalized Integration of Rules and Processes -- Prototyping Structure of Rule Bases -- Handling Uncertainty in Rules -- Formalizing Interoperability in Rule Bases -- Part III Practical Studies in Semantic Knowledge Engineering -- Semantic Knowledge Engineering Approach -- Rule Interoperability with Expert System Shells -- Visual Software Modeling with Rules -- Using Rules to Support Software Testing -- Integrating Business Process Models with Rules -- Rule-Based Systems and Semantic Web -- Collaborative Knowledge Engineering with Wikis -- Designing Robot Control Logic with Rules -- Rules in Mobile Context-Aware Systems -- Index.…”
Full-text access
e-Book -
19
Advances in Knowledge Discovery and Management Volume 8 /
Published Springer International Publishing : Imprint: Springer, 2019.Full-text access
e-Book -
20
Information Technology - New Generations 15th International Conference on Information Technology /
Published Springer International Publishing : Imprint: Springer, 2018.Table of Contents: “…Part I Cybersecurity -- Safeguarding Personal Health Information: Case Study -- Cybersecurity as People Powered Perpetual Innovation -- Performance Study of the Impact of Security on 802.11ac Networks -- Training Neural Tensor Networks with the Never Ending Language Learner -- PERIA-Framework: A Prediction Extension Revision Image Annotation Framework -- The Modern State and the Further Development Prospects of Information Security in the Republic of Kazakhstan -- Evaluating Cyber Threats to the United Kingdom's National Health Service (NHS) Spine Network -- A Virtual Animated Commentator Architecture for Cybersecurity Competitions -- Malicious Software Classification using VGG16 Deep Neural Network's Bottleneck Features -- Cybersecurity Vulnerabilities Assessment (A Systematic Review Approach) -- A Self Proxy Signature Scheme over NTRU Lattices -- Towards an Ontology of Security Assessment: a core model proposal -- Integration of Mobile Forensic Tool Capabilities -- Deep Packet Inspection: A Key Issue for Network Security -- What Petya/NotPetya Ransomware is and What its Remidiations are -- Analysis of Security Vulnerability and Analytics of Internet of Things (IOT) Platform -- New Techniques for Public Key Encryption with Sender Recovery -- Cloud Intrusion Detection and Prevention system for M-voting application in South Africa -- Protecting Personal Data with Blockchain Technology -- The Role of CAE-CDE in Cybersecurity Education for Workforce Development -- Software Optimizations for DES -- Part II Networking and Wireless Communications -- Design and Development of VXLAN based Cloud Overlay Network Monitoring System and Environment -- End to End Delay Analysis in a Two Tier Cluster Hierarchical Wireless Sensor Networks -- Tools to Support SMEs to Migrate to the Cloud: Opportunities and Challenges -- A Dual canister medicine IoT Dispenser -- Local Clock Synchronization without Transmission Delay Estimation of Control Messages in Wireless Sensor Networks -- Denial of service attacks inwireless sensor networks with proposed countermeasures -- Part III Education and Technology -- Internet-Based Education: A New Milestone for Formal Language and Automata Courses -- Teaching Communication Management in Software Projects through Serious Educational Games -- Gamification applied in the teaching of agile Scrum methodology -- An Experience of Using a Board Serious Virtual Game for Teaching the SCRUM Framework -- Part IV Agile Software Testing and Development -- Teaching Scrum by Doing Scrum in Internships in South Africa to Prepare Interns for Agile Projects -- Alignment of Requirements and Testing in Agile: an Industrial Experience -- Health Care Information Systems: A Crisis Approach -- Using Correct-by-Construction Software Agile Development -- Service-Centered Operation Methodology (MOCA) application supported by computer science to improve continuously care quality in public services -- Improving Agile Software Development with Domain Ontologies -- A Stratified Sampling Algorithmfor Artificial Neural Networks -- Part V Data Mining/Machine Learning -- Mining ENADE Data from the Ulbra Network Institution -- Fault diagnostic of variance shifts in clinical monitoring using an Artificial Neural Network Input Gain Measurement Approximation (ANNIGMA) -- Investigating Attribute Assessment for Credit Granting on a Brazilian Retail Enterprise -- Cross-language approach for sentiment classification in Brazilian Portuguese with ConvNets -- Thematic Spatiotemporal Association Rules to Track the Evolving of Visual Features and their Meaning in Satellite Image Time Series -- DeRis: Information system supporting the prediction of default risk in companies -- Taking a Steppe towards optimizing Note-Taking Software by creation of a Note Classification Algorithm -- Pattern Recognition for Time Series Forecasting: A Case Study of a Helicopter's Flight Dynamics -- A model for hour-wise prediction of mobile device energy availability -- Enhancing Lipstick Try-On with Augmented Reality and Color Prediction Model -- A Traffic Light Recognition Device -- An Approach to Prepare Data to Feed Visual Metaphors in a Multiple View Interactive Environment -- Reproducible Research in Document Analysis and Recognition -- Music Genre Classification using Data Mining and Machine Learning -- Improving word representations using Paraphrase dataset -- A Initial Experimental Evaluation of the NeuroMessenger: A Collaborative Tool to Improve the Empathy of Text Interactions -- Dual Long Short-Term Memory Networks for Sub-Character Representation Learning -- Business Intelligence Dashboard Application for Insurance Cross Selling -- Speech Features Analysis for Tone Language Speaker Discrimination Systems -- Selection of Transformations of Continuous Predictors in Logistic Regression -- Part VI Software Engineering -- A Generic Approach to Efficiently Parallelize Legacy Sequential Software -- Clustering and Combinatorial Methods for Test Suite Prioritization of GUI and Web Applications -- A Timed Petri NetModel to Specify Scenarios of Video Games -- Survey of Biometric Techniques for Automotive Applications -- A Survey on adoption Good Practices for ICT Governance at Enhanced Organizations -- Budget and User Feedback Control Strategy-based PRMS Scenario Web Application -- A Controlled Natural Language Editor for Semantic of Business Vocabulary and Rules -- An Approach Based on Possibilistic WorkFlow Nets to Model Multiplayer Video Games -- A Requirements Engineering-based Approach for evaluating Security Requirements Engineering Methodologies -- Increasing the prediction quality of software defective modules with automatic feature engineering -- Part VII High Performance Computing Architectures -- NSF Noyce Recruitment and Mentorship -- Mining Associations between Two Categories using Unstructured Text Data in Cloud -- A Note on Computational Science Curriculum -- Development of a Local Cloud-Based Bioinformatics Architecture -- Part VIII Computer Vision, Image Processing/Analysis -- AComputer Vision Based Algorithm for Obstacle Avoidance -- The ST-Vis tool for SpatioTemporal Visualization -- Detection of early gastric cancer from endoscopic images using Wavelet Transform Modulus Maxima -- Detection method of early esophageal cancer from endoscopic image using dyadic wavelet transform and four-layer neural network -- Study of Specific Location of Exhaustive Matching in Order to Improve the Optical Flow Estimation -- Solarpowered UAV Platform System: a Case Study for Ground Change Detection in BRIC Countries -- Part IX Health, Bioinformatics, Pattern Detection and Optimization -- Benefits of Establishing Makerspaces in Distributed Development Environment -- Semantic Description of Healthcare Devices to Enable Data Integration -- Applying transfer learning to QSAR regression models -- Investigating the Recognition of Non-Articulatory Sounds by using Statistical Tests and Support Vector Machine -- A Complete Diabetes Management and Care System -- On the use of van der PauwTechnique to Monitor Skin Burning in Patients Undergoing Interferential Current Therapy (IFC) with Extension to Other E-Stim Monitoring -- Part X Potpourri -- Smart Lighting Controlling System: Case Study of Yarmouk University Museum -- Incremental Topology Generated for ANN A Case Study on a Helicopter's Flight Simulation -- Degree Aware Triangulation of Annular Regions -- Heuristic Approaches for the Open-Shop Scheduling Problem -- Continuous State Power-down Systems for Renewable Energy Management -- Extracting Timing Models from Component-based Multi-criticality Vehicular Embedded Systems -- Part XI Short Papers -- Customer services management and satisfaction of Internet-related banking of First National Bank -- BIG IoT - Interconnecting IoT Platforms from different domains - First success story -- Cross-Cultural Perspective of E-Commerce -- Website Usability Requirements: Through the Lens of Individual's Perception -- Methods of Ensuring the Reliability and Fault Tolerance of Information Systems -- Applying a Method for Credit Limit Reviews in a Brazilian Retail Enterprise -- Application of an Effective Methodology for Analysis of Fragility and Its Components in the Elderly -- A Classifier Evaluation for Payments' Default Predictions in a Brazilian Retail Company -- Confidentiality, Integrity & Availability in Electronic Health Records:An Integrative Review -- Operating System Security Management and…”
Full-text access
e-Book