Mostrando 1,561 - 1,580 Resultados de 1,762 Para Buscar '"Ontology"', tiempo de consulta: 0.10s Limitar resultados
  1. 1561
    Publicado 2023
    Libro electrónico
  2. 1562
    Publicado 2025
    Tabla de Contenidos: “…Agonistic Peacebuilding -- Introduction -- Transformation as Agonistic Praxis -- Ontological (In)security -- Agonistic Recognition -- Agonistic Dialogue -- Embodied Practices of Transforming -- Agonistic Peacebuilders -- Conclusion -- References -- Part III: Issues and Approaches -- 12. …”
    Libro electrónico
  3. 1563
    Publicado 2024
    Tabla de Contenidos: “…2.3.5 Creating 3D models/sketches using VR -- 2.3.6 Continuous development and optimisation -- 2.4 Conclusions -- Acknowledgements -- Bibliography -- Chapter 3: Innovations in healthcare product development: Exploring AR/VR/MR technologies -- 3.1 Introduction -- 3.2 Medical and healthcare education -- 3.2.1 Human anatomy using AR -- 3.2.2 Human anatomy using MR -- 3.2.3 Human anatomy using VR -- 3.3 Diagnostics -- 3.4 Surgery -- 3.4.1 Examining complex dynamics using AR -- 3.4.2 VR in surgery -- 3.4.3 Broadcasting and recording VR surgery -- 3.5 Dentistry -- 3.6 AR-based technologies to improve physical rehabilitation -- 3.7 Discussion (Challenges and future of AR in healthcare) -- References -- Part 2: Enhancing manufacturing with virtual, augmented, and mixed reality -- Chapter 4: Transforming manufacturing with digital twins and metrology in VR -- 4.1 Introduction -- 4.1.1 Background and driving forces -- 4.2 Ontological modeling of geometry -- 4.2.1 Geometrical features and parameters -- 4.2.2 EO and CAD geometry -- 4.3 Measuring path modeling -- 4.3.1 Mathematical modeling of initial measuring path -- 4.3.2 Collision avoidance principle -- 4.3.3 PW setup and probe configuration -- 4.3.4 Initial measuring path -- 4.3.5 Optimal measuring path -- 4.4 Simulation models -- 4.4.1 PTC Creo -- 4.4.2 PC-DMIS -- 4.5 Digital measuring twin -- 4.6 Conclusions -- Acknowledgements -- References -- Chapter 5: Enhancing human-robot collaboration: Augmented reality interfaces for smarter path planning -- 5.1 Introduction -- 5.2 Research method -- 5.2.1 Human-robot interaction -- 5.2.2 Path planning -- 5.2.3 Augmented reality for human-robot collaboration -- 5.3 Implementations and results -- 5.3.1 Augmented reality interfaces for path planning -- 5.3.2 System architecture -- 5.3.3 Interfaces for handheld devices -- 5.3.4 Interfaces for head-mounted devices…”
    Libro electrónico
  4. 1564
    Publicado 2023
    Libro electrónico
  5. 1565
    Publicado 2019
    Tabla de Contenidos: “…Template-Based Technique -- 7.3.1.3. Ontology-Based Technique -- 7.3.1.4. Lead and Body Phrase Technique -- 7.3.1.5. …”
    Libro electrónico
  6. 1566
    Publicado 2020
    Tabla de Contenidos: “…- Gabriel Diniz Junqueira Barbosa and Simone Diniz Junqueira Barbosa 203 -- 5.4 Building a Trustworthy Explainable AI in Healthcare - Retno Larasati and Anna DeLiddo 209 -- 5.5 A View from Outside the Loop - Anders Hedman 215 -- 5.6 Nonverbal Communication in Human-AI Interaction: Opportunities and Challenges - Joshua Newn, Ronal Singh, Fraser Allison, Prashan Madumal, Eduardo Velloso and Frank Vetere 221 -- 5.7 MARVIN: Identifying Design Requirements for an AI powered Conversational User Interface for Extraterrestrial Space Habitats - Youssef Nahas, Christiane Heinicke and Johannes Schoning ̈ 227 -- 5.8 You should not control what you do not understand: the risks of controllability in AI - Gabriel Diniz Junqueira Barbosa and Simone Diniz Junqueira Barbosa 231 -- 5.9 Using AI to Improve Product Teams' Customer Empathy - Valentina Grigoreanu, Monty Hammontree and Travis Lowdermilk 237 -- 5.10 Supporting the Experience of Stakeholders of Multimedia Art Towards an Ontology - Danzhu Li and Gerrit C. van der Veer 243 -- 6 Handling Security, Usability, User Experience and Reliability in User-Centered Development Processes 253 -- 6.1 Characterizing Sets of Systems: Across-Systems Properties and their Representation - Elodie Bouzekri, Alexandre Canny, C`elia Martinie and Philippe Palanque 255 -- 6.2 Aligning Security, Usability, User Experience: A Pattern Approach - Bilal Naqvi, Jari Porras, Shola Oyedeji and Mehar Ullah 267 -- 6.3 Towards Intelligent User Interfaces to Prevent Phishing Attacks - Joseph Aneke, Carmelo Ardito and Giuseppe Desolda 279 -- vi Human Computer Interaction and Emerging Technologies 6.4 Selecting the Best Agile Team for Developing a Web Service - Marta Kristin Larusdottir and Marcel Kyas 289 -- 6.5 A Model-based Framework for Context-aware Augmented Reality Applications - Enes Yigitbas, Ivan Jovanovikj, Stefan Sauer and Gregor Engels 303 -- 7 Pushing the Boundaries of Participatory Design 313 -- 7.1 Adapting UCD for Designing Learning Experiences for Romanian Preschoolers. …”
    Libro electrónico
  7. 1567
    Publicado 2023
    Tabla de Contenidos: “…4.4.1 Mathematical Model -- 4.4.2 Advantages of the Proposed Model -- 4.5 Discussion and Conclusion -- References -- Chapter 5 Integrating IoT and Deep Learning-The Driving Force of Industry 4.0 -- 5.1 Motivation and Background -- 5.2 Bringing Intelligence Into IoT Devices -- 5.3 The Foundation of CR-IoT Network -- 5.3.1 Various AI Technique in CR-IoT Network -- 5.3.2 Artificial Neural Network (ANN) -- 5.3.3 Metaheuristic Technique -- 5.3.4 Rule-Based System -- 5.3.5 Ontology-Based System -- 5.3.6 Probabilistic Models -- 5.4 The Principles of Deep Learning and Its Implementation in CR-IoT Network -- 5.5 Realization of CR-IoT Network in Daily Life Examples -- 5.6 AI-Enabled Agriculture and Smart Irrigation System-Case Study -- 5.7 Conclusion -- References -- Chapter 6 A Systematic Review on Blockchain Security Technology and Big Data Employed in Cloud Environment -- 6.1 Introduction -- 6.2 Overview of Blockchain -- 6.3 Components of Blockchain -- 6.3.1 Data Block -- 6.3.2 Smart Contracts -- 6.3.3 Consensus Algorithms -- 6.4 Safety Issues in Blockchain Technology -- 6.5 Usage of Big Data Framework in Dynamic Supply Chain System -- 6.6 Machine Learning and Big Data -- 6.6.1 Overview of Shallow Models -- 6.6.1.1 Support Vector Machine (SVM) -- 6.6.1.2 Artificial Neural Network (ANN) -- 6.6.1.3 K-Nearest Neighbor (KNN) -- 6.6.1.4 Clustering -- 6.6.1.5 Decision Tree -- 6.7 Advantages of Using Big Data for Supply Chain and Blockchain Systems -- 6.7.1 Replenishment Planning -- 6.7.2 Optimizing Orders -- 6.7.3 Arranging and Organizing -- 6.7.4 Enhanced Demand Structuring -- 6.7.5 Real-Time Management of the Supply Chain -- 6.7.6 Enhanced Reaction -- 6.7.7 Planning and Growth of Inventories -- 6.8 IoT-Enabled Blockchains -- 6.8.1 Securing IoT Applications by Utilizing Blockchain -- 6.8.2 Blockchain Based on Permission -- 6.8.3 Blockchain Improvements in IoT…”
    Libro electrónico
  8. 1568
    Publicado 2017
    Tabla de Contenidos: “…3.3.3 - Multisource Manufacturing Information Processing and Sharing -- 3.4 - Deployment of multisensors -- 3.4.1 - Description of Multisource Manufacturing Information -- 3.4.2 - Multiple Sensors Selection -- 3.5 - Multiple sensors manager -- 3.6 - Multisource manufacturing information capturing and sharing -- 3.6.1 - Data Preprocessing -- 3.6.2 - Information Encapsulation -- 3.6.3 - Manufacturing Information Sharing -- 3.7 - Case study -- 3.7.1 - Hardware Device -- 3.7.2 - Software System -- References -- Chapter 4 - IoT-Enabled Smart Assembly Station -- 4.1 - Introduction -- 4.2 - Related works -- 4.2.1 - RFID-Based Applications in Assembly Line -- 4.2.2 - Assistant Services for Assembly Line -- 4.3 - Overall architecture of IoT-enabled smart assembly station -- 4.4 - Real-time status monitoring -- 4.5 - Real-time production guiding -- 4.6 - Real-time production data sharing -- 4.7 - Real-time production requeuing -- References -- Chapter 5 - Cloud Computing-Based Manufacturing Resources Configuration Method -- 5.1 - Introduction -- 5.2 - Related works -- 5.2.1 - Cloud Manufacturing -- 5.2.2 - Real-Time Production Information Perception and Capturing -- 5.2.3 - Cloud Service Selection and Composition -- 5.3 - Overall architecture of manufacturing resources configuration method -- 5.4 - Cloud machine model -- 5.4.1 - The Information Model of Manufacturing Service -- 5.4.2 - The Ontology Model of Manufacturing Service -- 5.5 - MS-UDDI -- 5.5.1 - UDDI -- 5.5.2 - The Framework of MS-UDDI -- 5.6 - Manufacturing service registration and publication -- 5.7 - Task-driven manufacturing service configuration model -- 5.7.1 - Task-Driven Service Proactive Discovery -- 5.7.2 - Service Optimal Configuration Method -- References -- Chapter 6 - IoT-Enabled Smart Trolley -- 6.1 - Introduction -- 6.2 - Related works -- 6.2.1 - Material Handling…”
    Libro electrónico
  9. 1569
    Publicado 2024
    Tabla de Contenidos: “…3.2 Chapter Contributions -- 3.3 Related Work -- 3.4 IoT Information Security -- 3.4.1 Background -- 3.4.2 System Model -- 3.5 Zero-Determinant Strategies -- 3.6 Game-Theoretic Transmission Strategy -- 3.6.1 Transmission Probability -- 3.6.2 Transmission Strategy -- 3.7 Extension to Multiple IoT Users -- 3.7.1 Zero-Determinant Strategies -- 3.7.2 Generalized Transmission Strategy -- 3.8 Numerical Results -- 3.8.1 Model Dynamics -- 3.8.2 Simulated Use Cases -- 3.9 Discussions -- 3.9.1 About the Game-Theoretic Approach -- 3.9.2 Conclusions -- References -- Chapter 4 Policy-Driven Security Architecture for Internet of Things (IoT) Infrastructure -- 4.1 Introduction -- 4.2 Related Work -- 4.2.1 Policies and SDN -- 4.2.2 Automatic Device Provisioning -- 4.2.3 Secure Device Provisioning -- 4.2.4 Machine Learning-based Classification of Devices -- 4.2.5 IoT Security and Attacks -- 4.3 Fundamentals of Policy-Based Network and Security Management -- 4.3.1 Policy -- 4.3.2 Policy-Based Network and Security Management -- 4.3.3 Policy-Based Management Architecture -- 4.3.4 Benefits of a Policy-Based Management Architecture -- 4.4 IoT Network Scenario -- 4.4.1 Types of Devices and Device Ontology -- 4.5 Policy-Driven Security Architecture -- 4.5.1 Device Provisioning? …”
    Libro electrónico
  10. 1570
    Tabla de Contenidos: “…-- Farah Magrabi, Ibrahim Habli, Mark Sujan, David Wong, Harold Thimbleby, Maureen Baker, Enrico Coiera -- Technologies that transform: digital solutions for optimising medicines use in the NHS -- Stephen John Goundrey-Smith -- Communications -- Human factors challenges for the safe use of artificial intelligence in patient care -- Mark Sujan, Dominic Furniss, Kath Grundy, Howard Grundy, David Nelson, Matthew Elliott, Sean White, Ibrahim Habli, Nick Reynolds -- Recording problems and diagnoses in clinical care: developing guidance for healthcare professionals and system designers -- Anoop Dinesh Shah, Nicola J Quinn, Afzal Chaudhry, Ralph Sullivan, Julian Costello, Dermot O'Riordan, Jan Hoogewerf, Martin Orton, Lorraine Foley, Helene Feger, John G Williams -- Editorial -- Welcome to BMJ Health & Care Informatics -- Philip Scott -- Original Article -- Large retrospective analysis on frailty assessment in primary care: electronic Frailty Index versus frailty coding -- Pablo Millares-Martin -- Original Research -- Patient perceptions and interactions with their web portal-based laboratory results -- Sean Robinson, Melissa Reed, Travis Quevillon, Ed Hirvi -- Small interface changes have dramatic impacts: how mandatory fields in electronic medical records increased pertussis vaccination rates in Australian obstetric patients -- Roberto Orefice, Julie A Quinlivan -- Potential impact of data source and interoperability messaging on health information technology (HIT) users: a study series from the United States Department of Veterans Affairs -- Jennifer Herout, Donna Baggetta, Amanda Cournoyer, Aaron S Dietz, Jane Robbins, Kyle Maddox, Jolie Dobre -- Clinician preferences for computerised clinical decision support for medications in primary care: a focus group study -- Katy E Trinkley, Weston W Blakeslee, Daniel D Matlock, David P Kao, Amanda G Van Matre, Robert Harrison, Cynthia L Larson, Nic Kostman, Jennifer A Nelson, Chen-Tan Lin, Daniel C Malone -- Reliability of comorbidity scores derived from administrative data in the tertiary hospital intensive care setting: a cross-sectional study -- Michael Hua-Gen Li, Anastasia Hutchinson, Mark Tacey, Graeme Duke -- Conformity of Diabetes Mobile apps with the Chronic Care Model -- Raheleh Salari, Sharareh R Niakan Kalhori, Marjan Ghazisaeidi, Farhad Fatehi -- Digital innovation evaluation: user perceptions of innovation readiness, digital confidence, innovation adoption, user experience and behaviour change -- Tim Benson -- Dietitians can improve accuracy of prescribing by interacting with electronic prescribing systems -- Susan De Waal, Laurie Lucas, Simon Ball, Tanya Pankhurst -- Lessons learned from a comprehensive electronic patient record procurement process-implications for healthcare organisations -- W Priestman, R Collins, H Vigne, S Sridharan, L Seamer, D Bowen, N J Sebire -- Trend of intestinal infectious diseases recorded at a tertiary care hospital in India: an ICD-10 analysis -- P N Roopalekha Jathanna, Ramya Vijeta, Vinod R Jathanna -- Developing a telerehabilitation programme for postoperative recovery from knee surgery: specifications and requirements -- MReza Naeemabadi, Birthe Dinesen, Ole Kæseler Andersen, Niels Kragh Madsen, Ole Højgaard Simonsen, John Hansen -- Interventions to improve the use of EMRs in primary health care: a systematic review and meta-analysis -- Noura Hamade, Amanda Terry, Monali Malvankar-Mehta -- Web and mobile-based technologies for monitoring high-risk pregnancies -- Haleh Ayatollahi, Malihe Ghalandar Abadi, Morteza Hemmat -- Characteristics of patients with body mass index recorded within the Kent Integrated Dataset (KID) -- Zara Cuccu, Gerrard Abi-Aad, Allison Duggal -- Growth of health literacy research activity in three Middle Eastern countries -- Soheila Bazm, Reihaneh Bazm, Farzaneh Sardari -- Effectiveness of the eCARE programme: a short message service for asthma monitoring -- Lathy Prabhakaran, Yap Chun Wei -- Design and virtual implementation of a biomedical registry framework for the enhancement of clinical trials: colorectal cancer example -- Athanasios Kotoulas, George Lambrou, Dimitrios-Dionysios Koutsouris -- Coding and classifying GP data: the POLAR project -- Christopher Pearce, Adam McLeod, Jon Patrick, Jason Ferrigi, Michael Michael Bainbridge, Natalie Rinehart, Anna Fragkoudi -- Ontology to identify pregnant women in electronic health records: primary care sentinel network database study -- Harshana Liyanage, John Williams, Rachel Byford, Simon de Lusignan -- An intervention study to assess potential effect and user experience of an mHealth intervention to reduce sedentary behaviour among older office workers -- Simone Boerema, Lex van Velsen, Hermie Hermens -- Availability and usage of clinical decision support systems (CDSSs) in office-based primary care settings in the USA -- Xia Jing, Lina Himawan, Timothy Law -- NHS Scotland's Decision Support Platform: a formative qualitative evaluation -- Kathrin Cresswell, Margaret Callaghan, Hajar Mozaffar, Aziz Sheikh -- Two algorithms for the reorganisation of the problem list by organ system -- Daniel B Hier, Joshua Pearson -- Design and implementation of the stacked, synchronised and iconographic timeline-structured electronic patient record in a UK NHS Global Digital Exemplar hospital -- Alan Arthur Hales, David Cable, Eleanor Crossley, Callum Findlay, David Anthony Rew -- e-Therapies in England for stress, anxiety or depression: how are apps developed? …”
    Revista digital
  11. 1571
    Publicado 2019
    Tabla de Contenidos: “…The Operational/Data Warehouse Interface -- The Classical ETL Interface -- The ODS and the ETL Interface -- The Staging Area -- Changed Data Capture -- Inline Transformation -- ELT Processing -- Chapter 8.4: Data Architecture: A High-Level Perspective -- A High Level Perspective -- Redundancy -- The System of Record -- Different Types of Questions -- Different Communities -- Chapter 9.1: Repetitive Analytics: Some Basics -- Different Kinds of Analysis -- Looking for Patterns -- Heuristic Processing -- Freezing Data -- The Sandbox -- The ``Normal ́ ́ Profile -- Distillation, Filtering -- Subsetting Data -- Bias of the Sample -- Filtering Data -- Repetitive Data and Context -- Linking Repetitive Records -- Log Tape Records -- Analyzing Points of Data -- Outliers -- Data Over Time -- Chapter 9.2: Analyzing Repetitive Data -- Log Data -- Active/Passive Indexing of Data -- Summary/Detailed Data -- Metadata in Big Data -- Linking Data -- Chapter 9.3: Repetitive Analysis -- Internal, External Data -- Universal Identifiers -- Security -- Filtering, Distillation -- Archiving Results -- Metrics -- Chapter 10.1: Nonrepetitive Data -- Inline Contextualization -- Taxonomy/Ontology Processing -- Custom Variables -- Homographic Resolution -- Acronym Resolution -- Negation Analysis -- Numeric Tagging -- Date Tagging -- Date Standardization -- List Processing -- Associative Word Processing -- Stop Word Processing -- Word Stemming -- Document Metadata -- Document Classification -- Proximity Analysis -- Functional Sequencing Within Textual ETL -- Internal Referential Integrity -- Preprocessing, Postprocessing -- Chapter 10.2: Mapping -- Chapter 10.3: Analytics From Nonrepetitive Data -- Call Center Information -- Medical Records -- Chapter 11.1: Operational Analytics: Response Time -- Transaction Response Time -- Chapter 12.1: Operational Analytics…”
    Libro electrónico
  12. 1572
    Publicado 2016
    Tabla de Contenidos: “…-- 7.2.3 Deep Transformations Required in Energy Systems -- 7.2.4 Sectoral Potentials of the Low-Carbon Transition -- 7.3 GLOBAL EVALUATION OF ENERGY SECURITY CHALLENGES IN LOW-CARBON PATHWAYS -- 7.3.1 Interactions Between Energy Security and Climate Change Policies: A Review -- 7.3.2 A Rising Interest of Co-benefits Analysis in IPCC Assessment Report 5 -- 7.3.2.1 The Global Energy Assessment -- 7.3.3 Co-benefits and Climate Negotiations: Some Perspectives -- 7.3.3.1 A Potential Hook for Multiobjective Policies -- 7.3.3.2 Challenges of Representing Multiple Objectives in Integrated Assessment Models -- 7.4 CONCLUSION -- ACKNOWLEDGEMENT -- REFERENCES -- 8 - Towards Governance of Energy Security -- 8.1 INTRODUCTION: TRANSITION AS AN UNSTRUCTURED PROBLEM -- 8.2 THE CONCEPTUAL BABYLON OF ENERGY SECURITY -- 8.2.1 A Geopolitical Perspective on Energy Security -- 8.2.2 An Economic Perspective on Energy Security -- 8.2.3 Normative Ambiguity -- 8.3 THE IMPOSSIBILITY OF REDUCING FACTUAL UNCERTAINTY -- 8.3.1 Reductionist Ontologies -- 8.3.2 Disregarding Dynamics -- 8.4 UNSTRUCTURED PROBLEMS -- 8.4.1 Dealing With Unstructured Problems -- 8.4.2 Numbers Beat No Numbers -- 8.5 GOVERNANCE FOR ENERGY SECURITY -- 8.6 CONCLUSIONS -- REFERENCES -- 9 - Reducing Uncertainty Through a Systemic Risk-Management Approach -- 9.1 INTRODUCTION: STRUCTURING ENERGY SECURITY -- 9.2 TOWARDS A SYSTEMIC VIEW ON ENERGY SECURITY -- 9.3 SECURE ENERGY SYSTEMS IN PRACTICE…”
    Libro electrónico
  13. 1573
    Publicado 2014
    Tabla de Contenidos: “…-- 7.1.2 (Parametric) statistical models and i.i.d. samples -- 7.1.3 Basic tasks and procedures of statistical inference -- 7.1.4 Some methodological distinctions -- 7.1.5 Examples: Multinomial and normal distribution -- 7.2 Imprecision in statistics, some general sources and motives -- 7.2.1 Model and data imprecision -- sensitivity analysis and ontological views on imprecision -- 7.2.2 The robustness shock, sensitivity analysis -- 7.2.3 Imprecision as a modelling tool to express the quality of partial knowledge -- 7.2.4 The law of decreasing credibility -- 7.2.5 Imprecise sampling models: Typical models and motives -- 7.3 Some basic concepts of statistical models relying on imprecise probabilities -- 7.3.1 Most common classes of models and notation -- 7.3.2 Imprecise parametric statistical models and corresponding i.i.d. samples -- 7.4 Generalized Bayesian inference -- 7.4.1 Some selected results from traditional Bayesian statistics -- 7.4.1.1 Conjugate families of distributions -- 7.4.2 Sets of precise prior distributions, robust Bayesian inference and the generalized Bayes rule…”
    Libro electrónico
  14. 1574
    Publicado 2016
    Tabla de Contenidos: “…Intro -- Evolutionary Computation in Gene Regulatory Network Research -- Contents -- Preface -- Acknowledgments -- Contributors -- I Preliminaries -- 1 A Brief Introduction to Evolutionary and other Nature-Inspired Algorithms -- 1.1 Introduction -- 1.2 Classes of Evolutionary Computation -- 1.2.1 Genetic Algorithms -- 1.2.2 Genetic Programming -- 1.2.3 Evolution Strategy -- 1.2.4 Differential Evolution -- 1.2.5 Swarm Intelligence -- 1.2.6 Multi-Objective EA's -- 1.3 Advantages/Disadvantages of Evolutionary Computation -- 1.4 Application Areas Of EC -- 1.5 Conclusion -- References -- 2 Mathematical Models and Computational Methods for Inference of Genetic Networks -- 2.1 Introduction -- 2.2 Boolean Networks -- 2.3 Probabilistic Boolean Network -- 2.4 Bayesian Network -- 2.5 Graphical Gaussian Modeling -- 2.6 Differential Equations -- 2.7 Time-Varying Network -- 2.8 Conclusion -- References -- 3 Gene Regulatory Networks: Real Data Sources and Their Analysis -- 3.1 Introduction -- 3.2 Biological Data Sources -- 3.2.1 Gene Expression Data -- 3.2.2 Protein-Protein Interaction Data -- 3.2.3 Protein-DNA Interaction Data -- 3.2.4 Gene Ontology -- 3.3 Topological Analysis of Gene Regulatory Networks -- 3.3.1 Node Degree -- 3.3.2 Neighborhood Connectivity -- 3.3.3 Shortest Paths -- 3.3.4 Reconstruction of Transcriptional Regulatory Network -- 3.4 GRN Inference by Integration of Multi-Source Biological Data -- 3.4.1 Gene Module Selection -- 3.4.2 Network Motif Discovery -- 3.4.3 Gene Regulatory Module Inference -- 3.5 Conclusions and Future Directions -- Acknowledgment -- References -- II EAs for Gene Expression Data Analysis and GRN Reconstruction -- 4 Biclustering Analysis of Gene Expression Data Using Evolutionary Algorithms -- 4.1 Introduction -- 4.2 Bicluster Analysis of Data -- 4.3 Biclustering Techniques -- 4.3.1 Distance-Based Techniques…”
    Libro electrónico
  15. 1575
    Publicado 2024
    Tabla de Contenidos: “…-- 9.2.1.7 What Is an Ontology? -- 9.2.1.8 Language and Taxonomies -- 9.2.1.9 Textual ETL and Taxonomies -- 9.2.2 Two Examples of Analysis Types -- 9.2.3 Correlative Analysis-An Introduction -- 9.2.4 Sentiment Analysis-An Introduction -- 9.2.5 The Semantic Layer -- 9.3 Less Tech Is Often Better than More Tech in Pricing Solutions -- 9.4 Data + Planning Is the Key to COVID Vaccine Center -- 9.5 Data Science Provider-Partner Relationships Greatly More Productive than Adversarial…”
    Libro electrónico
  16. 1576
    Publicado 2023
    “…Drawing together long traditions in Caribbean scholarship with Afro-pessimist thought, Pugh and Chandler illustrate how the search for more emancipatory ontologies - relational ontologies, indigenous ontologies, non-human ontologies, etc. - not only misunderstands the problem of modernity but (more importantly) works to veil the negative force that marks both the limit and cause of all such knowledge practices: what they term the abyss. …”
    Libro electrónico
  17. 1577
    Publicado 2005
    “…In this book, Keekok Lee asks the question, 'what is an animal, and how does our treatment of it within captivity affect its status as a being ?' This ontological treatment marks the first such approach in looking at animals in captivity. …”
    Clic para texto completo. Acceso restringido UPSA.
    Clic para texto completo desde fuera UPSA.
    Libro electrónico
  18. 1578
    Publicado 2022
    “…The book argues that the value of ontological equality has played an important role in creating and affirming the diverse society which characterises India. …”
    Libro electrónico
  19. 1579
    Publicado 2017
    Tabla de Contenidos: “…I.6.6 Sharp: Selective Combination -- I.7 Indexing Language -- I.8 Indexing Process -- I.9 Effectiveness of Index -- I.10 Advantages of Index/Indexing -- References -- J Indexing Language -- J.1 Introduction -- J.2 Natural Language (NL) -- J.3 Indexing Language (IL) -- J.3.1 Difference from NL -- J.4 Types of SIL -- J.5 Attributes of SIL -- J.5.1 Vocabulary Control -- J.5.2 Concept Coordination -- J.5.3 Multiple Accesses -- J.5.4 Syndetic Devices -- J.5.5 Relation Manifestation -- J.5.5.1 Paradigmatic Relation -- J.5.5.2 Syntagmatic Relation -- J.5.6 Structural Presentation -- J.6 Theory of SIL -- J.6.1 SIL as Classificatory Language -- J.6.2 Features of SIL -- J.6.3 Postulates and Working Concepts -- J.6.4 Deep Structure of SIL -- J.6.4.1 Postulates of Deep Structure -- J.6.5 Implications of General Theory of SIL -- References -- K Controlled Vocabulary (CV) -- K.1 Introduction -- K.2 Definition of CV -- K.3 Characteristics of CV -- K.4 Types of CV -- K.4.1 Subject Authority List -- K.4.2 Taxonomy -- K.4.3 Subject Heading List -- K.4.4 Classification Scheme -- K.4.5 Thesaurus -- K.4.5.1 Definition of Thesaurus -- K.4.5.2 Difference from S H List -- K.4.5.3 Similar Tools and Concepts -- K.4.5.4 Scope and Size of Thesaurus -- K.4.5.5 Need and Characteristics of Thesaurus -- K.4.5.6 Types of Thesaurus -- K.4.5.7 Internal Structure of Thesaurus -- K.4.5.8 Relationships Between Terms -- K.4.5.9 Display of Relations -- Display Using Abbreviations -- Display Using Symbols -- Graphic Display -- Tree Structure -- Arrowgraph -- Euler Diagram -- Format of Display -- K.4.5.10 Method of Compilation -- K.4.5.11 Advantages of Thesaurus -- K.4.5.12 Use of Thesaurus -- K.4.5.13 Evaluation of Thesaurus -- K.4.6 Ontology -- K.4.7 Synonym Ring List -- K.4.8 Folksonomy -- K.5 Advantages of CV -- K.6 Disadvantages of CV -- References -- L Indexing Methods…”
    Libro electrónico
  20. 1580
    Publicado 2021
    “…We can combine a modest sense of unity with pluralism and give an ontological analysis of unity in terms of natural kind monism…”
    Libro electrónico