توضیحاتی در مورد کتاب Proceedings of the Third International Conference on Information Management and Machine Intelligence: ICIMMI 2021 (Algorithms for Intelligent Systems)
نام کتاب : Proceedings of the Third International Conference on Information Management and Machine Intelligence: ICIMMI 2021 (Algorithms for Intelligent Systems)
عنوان ترجمه شده به فارسی : مجموعه مقالات سومین کنفرانس بین المللی مدیریت اطلاعات و هوش ماشینی: ICIMMI 2021 (الگوریتم های سیستم های هوشمند)
سری :
نویسندگان : Dinesh Goyal (editor), Anil Kumar (editor), Vincenzo Piuri (editor), Marcin Paprzycki (editor)
ناشر : Springer
سال نشر : 2022
تعداد صفحات : 640
ISBN (شابک) : 9811920648 , 9789811920646
زبان کتاب : English
فرمت کتاب : pdf
حجم کتاب : 16 مگابایت
بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.
فهرست مطالب :
Preface
Contents
About the Editors
1 Analysis and Comparison of Swarm Intelligence Algorithm in IoT: A Survey
1 Introduction
2 Swarm Intelligence Algorithms in IoT
3 Literature Review
4 Application of SI Algorithms in IoT: An Overview
5 Conclusion
References
2 Implementing Client-Side Encryption for Enforcing Data Privacy on the Web Using Symmetric Cryptography: A Research Paper
1 Introduction
2 Client/Server Architecture of Web Application
2.1 Web Client and Web Server
2.2 Need for Securing the Confidential Data on the Web
3 Two Types of Research Approaches
3.1 Qualitative Approach of Research
3.2 Quantitative Approach of Research
4 Securing Data on the Web
5 Client-Side Encryption of Data on the Web
6 Conclusion
References
3 System to Analyze Electricity Consumption Using IoT and On-Demand Cloud CRM Salesforce
1 Introduction
2 Related Work
3 Methodology
4 Results
5 Conclusion
References
4 Stera—A College Enquiry Chatbot
1 Introduction
2 Related Work
3 Proposed Work
4 Performance Analysis
5 Conclusion and Future Work
References
5 Mobile Image Analysis for Detecting Melanoma
1 Introduction
2 Related Works
3 The Proposed System
4 Results and Discussions
5 Conclusion and Future Direction
References
6 Minimization of Power in Home Automation by IOT-Based Interactive Home
1 Introduction
2 Project Design
3 Security System
4 Appliance Control
4.1 Comparison in the Amount of Power Utilized
5 Observation
6 Conclusion
References
7 An Efficient Security Technique Using Steganography and Machine Learning
1 Introduction
2 Brief Literature Review
3 The Performance Measure of Steganography
3.1 Limitations of Existing Methods and Proposed Model
3.2 The Proposed Method
4 Conclusion and Future Work
References
8 An Efficient Model for IoT Security Using Adopted RSA
1 Introduction and Related Work
2 Efficient Digital Signature Using RSA Techniques
3 Proposed Model: RSA Enhanced Digital Signature Algorithm (RSAEDSA)
4 Experimental Evaluation and Performance Analysis
5 Conclusion and Future Scope
References
9 Robotic Process Automation in IT SOX Compliance
1 Introduction
2 Problem Identification
3 Solution Proposed
3.1 Life Cycle
3.2 Process Flow for Bot Establishment
4 RPA in IT General Controls (ITGCs)
5 Comparative Analysis
6 Conclusion
References
10 Analyzing the Impact of Nationwide Lockdown on Air Pollution Levels in Indian Cities—And What We Can Learn from It
1 Introduction
2 Literature Review
3 Methodology
4 Result
5 Conclusion and Future Scope
References
11 A Comparative Study of Time Series Models for Blood Glucose Prediction
1 Introduction
2 Related Works
3 Methodology
3.1 Autoregressive Moving Average Model (ARMA)
3.2 Autoregressive Integrated Moving Average Model (ARIMA)
3.3 Long Short Term Memory Network (LSTM)
3.4 Bidirectional LSTM
4 Data Collection
5 Experiment
6 Evaluation Criteria
7 Results and Discussion
8 Conclusion
References
12 Machine Learning Approaches in Mobile Data Forensic: An Overview
1 Introduction
2 Related Work
2.1 Present Technological Used in Crime Detection and Prediction
2.2 ML Techniques Used in Crime Prediction
2.3 Comparative Study of Different Forecasting Methods
3 Challenges of Digital Forensics
3.1 Advantages and Disadvantages
4 Conclusion
References
13 Generating an Extract Summary from a Document
1 Introduction
2 Related works
3 The Proposed Architecture
3.1 Module 1: Get Data and Pre-processing
3.2 Module 2: Define Sentences and Words
3.3 Module 3: Implementation of Word2Vec
3.4 Module 5: Model of Learning
4 Results
5 Conclusion
References
14 Obtrusion Detection Using Hybrid Cloud Models
1 Introduction
2 Security Issues in Cloud
3 Obtrusion Detection Schemes
4 Methodology
5 Cloud Model
5.1 Performance Metrics
6 Conclusion
References
15 Comparative Analysis of Speech Enhancement Techniques in Perceptive of Hearing Aid Design
1 Introduction
2 Related Work
3 Speech Enhancement Theory
3.1 Spectral Subtraction
3.2 Wiener Filtering
3.3 CS-Based Speech Enhancement Algorithm for Hearing Aid
4 Results and Discussion
4.1 Impact on PESQ
4.2 Impact on SEG SNR
4.3 Impact on MOS Score
5 Conclusion
References
16 Smart Walking Stick: An Aid to Visually Impaired
1 Introduction
2 Related Works
2.1 Purpose and Motivation
3 The System Architecture
3.1 Hardware Components
3.2 Mathematical Calculations
3.3 Sensing Obstacles
3.4 Circuit Diagram
3.5 Working of Hardware (Stick)
3.6 Software Implementation
4 Overviews of the Proposed Model
4.1 Problems Encountered
5 Results
5.1 Results
5.2 Future Works
6 Conclusion
References
17 Hydroponic Farming as a Contemporary, Dependable, and Efficient Agricultural System: Overview
1 Introduction
2 Related Works
3 Materials and Methods
3.1 Hydroponic Farming
3.2 Advantage of Hydroponics
4 Types of Hydroponic
4.1 Wick System
4.2 Water Culture Method
4.3 EBB and Flow Method
4.4 Drip System (Recovery and Non-recovery)
4.5 Nutrient Film Technique (NFT)
4.6 Aeroponic System
5 Nutrients Consumption
6 Conclusion
References
18 Internet of Things: The Next Generation Internet
1 Introduction
2 History of IoT
3 How IoT Works
4 Architecture of IoT
5 Technologies Used in IoT
6 Applications of IoT
7 Scope and Challenges of IoT
8 Comparative Analysis of Communication Technologies in IoT
9 Conclusion
References
19 GIS for Disaster Management: A System to Aid Users with Relevant Information
1 Introduction
2 Literature Review
3 Proposed System
3.1 Techniques/Technology
3.2 Mathematical Representation
4 Experimental Results
5 Conclusion
References
20 Recent Trends in E-Learning Using Web 4.0
1 Background Study
2 Introduction
2.1 Main Features of the Web 4.0 [8]
2.2 The Five Dimension of Web 4.0 [11]
3 Web 4.0 as an Intelligent Solution for E-learning
4 Challenges and Opportunities of Web 4.0
4.1 Opportunities [14]
5 Conclusion and Future Scope
References
21 Dosimetry Effect of Flattening Filter Free Energy Beams in Prostate Malignant Cells in Intensity Modulated RT
1 Introduction
2 VMAT
3 Flattening Filter
4 Flattening Filter-Free X-Ray Beams
5 Materials and Methods
6 Dose Circulation, PTV Inclusion, and Body Parts in Danger
7 Typical Tissue Integral Dose and Monitor Unit
8 Statistical Analysis
9 Result
10 Conclusion
References
22 Crop Disease Prediction Using Deep ConvNet Architecture Technique
1 Introduction
2 Related Works
3 Proposed System and Deployment
3.1 Data Set
3.2 Methodology
4 Performance Analysis of the Saved Models
5 Conclusion
6 Future Scope
References
23 High Dimensional Data Clustering Using Forward Feature Selection Framework for Medical Data
1 Introduction
2 Literature Review
3 Proposed High Dimensional Forward Feature Selection Clustering (HDFFSC) Framework
4 Results and Discussion
5 Conclusion and Future Work
References
24 Artificial Intelligence (AI) Startups in Health Sector in India: Challenges and Regulation in India
1 Introduction
2 Definitions of Artificial Intelligence
2.1 Artificial Narrow Intelligence (ANI)
2.2 Artificial General Intelligence (AGI)
2.3 Artificial Super Intelligence (ASI)
3 Indian AI Healthcare Startups
3.1 Effective Consultations In-Person and Virtual Mode
3.2 Competent Aid in Health and Medication
3.3 Smart Maintenance of Medical Record
4 Challenges Faced by Artificial Intelligence Startups
4.1 Lack of Adequate Business Infrastructure
4.2 Lack of Equit Talent, Expertise, and Resources
4.3 Lack of Trust and Patience
4.4 Expenses Involved in Advanced Computing Equipments
4.5 Poor IT Set Up and Swift Getting Software Outdated
4.6 Data Scarcity
5 Indian Legislative Framework on Artificial Intelligence Startup: An Overview
6 Indian Artificial Intelligence Healthcare Startups
6.1 MFine
6.2 Qure.Ai
7 Conclusion
References
25 Analysis of Deep Learning Models for Security in IoT
1 Introduction
2 Introduction to Deep Learning Classifiers
3 Security with Deep Learning in IoT
4 Conclusion
References
26 Adobe Photoshop Vulnerabilities
1 Introduction
1.1 SDLC and Its Phases
2 Literature Survey
3 Adobe Vulnerabilities
3.1 Types of Vulnerabilities
3.2 Impact of Vulnerabilities on Software
3.3 Severity of Vulnerabilities
4 Adobe Vulnerabilities Until 2021
4.1 Mitigation of the Vulnerability
5 Result and Conclusion
References
27 Digital Information Management in Agriculture—Empirical Analysis
1 Introduction
2 Literature Review
3 Research Methodology and Analysis of Data
4 Conclusion and Implications
References
28 Power of Predictive Intelligence for Service Desk
1 Introduction
2 Problems for Service Desk Agents in Organization (Without Predictive Intelligence)
3 Solutions for Service Desk Agents in Organization (With Predictive Intelligence)
4 Process of Training Solutions
5 Conclusion
References
29 Visual Studio Vulnerabilities and Its Secure Software Development
1 Introduction
1.1 Vulnerabilities
1.2 Software Development Life Cycle
2 Visual Studio
2.1 Visual Studio Functionalities
3 Vulnerabilities and Their Impacts in Visual Studio
3.1 Remote Code Execution
3.2 XSS
3.3 Privilege Escalation
3.4 Bypass Something
3.5 Tampering Vulnerability
3.6 Denial of Service
3.7 Memory Corruption
4 Mitigation of the Vulnerabilities
5 Conclusion
References
30 Global Outlook of Cyber Security
1 Introduction
2 Literature Review
3 Cyber Security on a Global Scale
4 Global Security Index Countries Score
5 GCI Ranking
5.1 Most Committed Countries Toward Cyber Security
5.2 India With Respect to GCI 2018–2019
5.3 Countries With Medium Commitment Toward Cyber Security
5.4 Least Committed Countries Toward Cyber Security
6 Conclusion
References
31 Consensus Mechanism Using Sharding Approach in Consortium Blockchain
1 Introduction
2 Blockchain as a Data Structure
3 Types of Blockchain
4 Existing Consensus Mechanism in Consortium Blockchain
5 Proposed Framework: Sharding Approach for Consortium Blockchain
5.1 Consensus Within Committee
5.2 Consensus with Other Committees
6 Results and Discussion
7 Challenges
8 Conclusion
References
32 Education Through NGOs: Challenges and Opportunities
1 Introduction
2 Education Through the NGOs
3 Challenges Faced by the NGOs
4 Effect of COVID on the NGOs Providing Education
5 Opportunities Provided by the NGOs in the Field of Education
6 Conclusion
References
33 Delay Efficient Caching in Fog Computing
1 Introduction
1.1 Motivation
2 Related Work
3 Proposed Scheme
4 Evaluation and Experiment
4.1 Experimental Setup
4.2 Results and Discussions
5 Conclusion
References
34 Optimization and Pursuance Analysis of RDBMS for Relational Algebraic Operations—MySQL
1 Introduction
2 The Objective of Research Work
3 Problems Facing in Tuning MySQL DB and Its Solution’s
4 Proposed Work
4.1 Tools and Techniques
4.2 Scope of Work
4.3 Solutions for Optimization of MYSQL DB
5 Future Work
6 Conclusion
References
35 Chatbot Farming System
1 Introduction
1.1 Decision Tree
1.2 Machine Learning
1.3 Python
2 Problem Statement
2.1 Various Plants Disease with Symptoms
3 Methodology
3.1 Research Method
4 Proposed Solution
5 Experiment and Results
6 Conclusion
References
36 Smart Cities in Emerging Economies: Opportunities, Challenges and Policy Implications
1 Introduction
2 AI: Challenges and Policy Implications for Emerging Economies
References
37 AMSS: A Novel Take on Web Page Ranking
1 Introduction
2 Literature Review
3 Research Problem
4 Research Methodology
5 Advance Meta Search System—Advanced Tool
5.1 The Proposed Model: AMSS
6 Page Positioning Algorithm
7 Experimental and Graphical Analysis
8 Conclusion and Future Work
References
38 Impact of COVID-19 Vaccination: A Machine Learning Approach
1 Introduction
2 Literature Review
3 Objectives of the Study
3.1 Primary Objective
4 Research Design
4.1 Participants
5 An Approach of Machine Learning
5.1 Decision Variables
5.2 Data Normalization
5.3 Data Scaling
5.4 Supervised Machine Learning Algorithms
5.5 Model Evaluation
5.6 Results and Conclusion
6 Findings and Recommendations
7 Conclusion
References
39 Task Allocation in IoT: A Systematic Review of Techniques and Issues
1 Introduction
1.1 Motivation
1.2 Contribution
1.3 Paper Organization
2 Literature Study
3 Research Methodology
4 Discussion and Comparison
5 Proposed Architecture
6 Conclusion
References
40 Healthcare BPM’s Rebirth: A Case of Digital Disruption Post COVID-19
1 Introduction
2 Literature Review
3 Indian Healthcare Sector
4 Why Is BPM a Good Fit for the Healthcare Industry?
5 Conclusion
References
41 Recurrent Neural Network: A Flexible Tool of Computational Neuroscience Research
1 Introduction
2 Conclusion
References
42 Data Protection and Security in Affordable Home/Remote Monitoring (MCPS) of Patients
1 Introduction
2 Problem Definition
2.1 Security
2.2 Expensive
2.3 Impact of COVID-19 on Healthcare Sector
3 Impact of Affordable Remote/Home Monitoring
4 Impact of Cyber-Attacks on Medical Cyber Physical System
5 Proposed Model
5.1 Design and Implementation
6 Conclusion
References
43 Employee Emotions on Work from Home During COVID-19: Sentiment Analysis Approach
1 Introduction
2 Review of Literature
3 Objective of the Study
4 Research Methodology
5 Data Analysis, Results and Discussion
6 Managerial Implication
7 Limitations
8 Conclusion
References
44 45 nm CMOS-Based MTSPC DFF Design for High Frequency Operation
1 Introduction
2 Literature Survey
3 Proposed D Flip Flop
3.1 Working of Existing TSPC D Flip Flop
3.2 Working of Proposed MTSPC D Flip Flop
4 Simulation Result
5 Conclusion
References
45 An Improved Convolutional Neural Network for Classification of Type-2 Diabetes Mellitus
1 Introduction
2 Functional Link Convolutional Neural Network
3 Results and Discussion
4 Conclusion
References
46 Reviewing Fake News Classification Algorithms
1 Introduction
2 Dataset and Preprocessing
3 Results and Discussion
4 Conclusion
References
47 A Review on Congestion Control Using Routing Technique and Machine Learning
1 Introduction
1.1 Causes of Network Congestion
1.2 Tackling Network Congestion
1.3 Difference Between Traditional Programming and Machine Learning
2 Routing Protocol
3 Related Work
References
48 Detecting Disorders of Ophthalmology Using Artificial Intelligence-Based Deep Learning
1 Foreign Body in Eye
2 Corneal Abrasion
3 Corneal Ulcer
4 Keratoconus
5 Kayser–Fleischer
6 Giant Papillary Conjunctivitis
7 General Eye Disorders Measuring Precautions
8 Artificial Intelligence Applications in Ophthalmolic Field
9 Result and Conclusion
49 Collaborative Learning; A Case Study at Army Institute of Technology, Pune
1 Introduction
2 Current Study
2.1 Participants
2.2 Methodology
2.3 Activity Description
2.4 The Above Mentioned Activities Aimed to Achieve the Following Skills
3 Results
3.1 Team Spirit
3.2 Improving Communication Skills
3.3 Out of Box Thinking
3.4 Increase Employability
3.5 Improving Time Management
3.6 Improving Confidence
4 Conclusions
4.1 Mute Play
4.2 Interview
4.3 Problem Solving
4.4 Debate
4.5 Video Making
4.6 Creative Writing
4.7 Time Management
References
50 Millimeter Wave SIW Antenna for 5G Application
1 Introduction
2 Proposed Antenna
3 Results and Discussion
3.1 Simulated Antenna Configuration
4 Gain at 28 and 38 GHz
4.1 Directivity at 28 and 38 GHz
5 Comparison Study
6 Conclusion
References
51 Importance of Medical Instruments in Treating COVID Patients: A Case Study of Alwar District in Rajasthan
1 Introduction
2 Medical Equipments
3 Material and Human Linkages
3.1 Cryogenic Tankers
3.2 Oxygen Beds and Ventilators
3.3 Oxygen Cylinders and Oxygen Plants
3.4 Tests Needed for Finding the Level of Corona Infection
4 Magnitude of Oxygen Requirement
5 Factors Influencing Medical Equipments
6 Conclusion and Suggestions
References
52 Sustainability Through Microfinance Among the Small Farmers of Kotdwar Bhabhar Region in Uttarakhand
1 Introduction
2 Purpose and Significance of Study
3 Literature Review
4 Research Methodology
5 Results and Discussion
5.1 General Information
5.2 Major Crops Cultivated
5.3 Sources of Irrigation Water
5.4 Response on Microfinance Loan Term
5.5 Microfinance Loan and Allied Activity
5.6 Microfinance Loan and Health
5.7 Microfinance Loan and Market Access
5.8 Microfinance Loan and Household Welfare
6 Hypothesis Test
7 Conclusion and Recommendations
References
53 Animal Accident Prevention on Railway Tracks Using Convolution Neural Network
1 Introduction
2 Literature Review
3 Proposed Method
4 Result and Discussion
5 Conclusion
References
54 Post-Pandemic Effect in Construction Industry in India and Its Remedial Measure
1 Introduction
2 Impact of Corona Virus on GDP and Construction Sector
2.1 Mismanagement
2.2 Labour Mismanagement
2.3 Financial Complication
2.4 Unemployment
2.5 Force Majeure
References
55 Organic Modifiers—Chemically Modified Dimethyltindichloride Organic–Inorganic Hybrid Product: Design and Antimicrobial Activity
1 Introduction
2 Results and Discussion
2.1 Spectroscopic Studies
2.2 Antimicrobial Activity
3 Experimental
3.1 Synthesis of 2-aminophenol and N-phthaloyl Isoleucine—Chemically Modified Me2SnCl2 Organic–Inorganic Hybrid Product, Me2SnLL′
4 Conclusion
References
56 Wireless Power Transmission via Solar Power Satellite
1 Introduction
2 Wireless Power Transmission
3 Solar Power Satellite
4 Methodology
5 Result
References
57 A Review on Carpal Tunnel Syndrome Various Terminologies
1 Introduction
2 Background
3 Pathophysiology
4 Diagnosis of CTS
4.1 Symptoms
4.2 Physical Findings
4.3 Neurophysiological Test
4.4 Role of MRI
4.5 Role of Ultrasonography
5 Treatment
6 Carpal Tunnel Syndrome in Patients with Diabetic Polyneuropathy
7 Methods
7.1 Elastography
7.2 Vibrotactile Threshold (VT)
7.3 Infrared Thermography
7.4 Combined Sensory Index Test (CSI) Versus Diagnostic Ultrasonography
7.5 Vector Machine/Naive Bayes
7.6 Single Fiber Electromyography
7.7 Fuzzy Linguistic
7.8 Thermal Images
7.9 Artificial Intelligence
8 Biosensors
9 Conclusion and Future Scope
References
58 Deep Learning Approaches for DNA Transcription and Position of Genetic Factor of Bacteria—Ralstonia solanacearum
1 Introduction
2 Transcription Process (DNA to RNA)
3 ANN (Artificial Neural Network)
4 Methodology
5 Results
6 Conclusion
References
59 Pervasive Review of Optic Biosensors-Based on Surface Plasmon Resonance and Its Development
1 Introduction
2 Measurement Techniques
2.1 Absorbance Measurements
2.2 Reflectance Measurements
2.3 Fluorescence Measurements
2.4 Chemiluminescence Measurements
3 Surface Plasmon Resonance
4 Fiber-Optic SPR Biosensor
5 Conclusion and Future Prospects
References
60 Variability Analysis of Public Transit Bus Travel Time Using GPS Logs: A Case Study
1 Introduction
2 Literature Review
3 Methodology
3.1 Data Collection
3.2 Preprocessing the Data
3.3 Travel Time Variability Analysis
4 Conclusion
References
61 Comparative Analysis of Waiting Delay Estimation Models for Signalized Intersections: A Case Study Tumakuru City
1 Introduction
2 Literature Review
3 Data Collection
4 Delay Estimation Models Used
4.1 HCM Delay Estimation Model
4.2 Webster Delay Estimation Model
4.3 Modified HCM and Webster Delay Estimation Model
5 Results
6 Comparative Analysis
7 Conclusion
References
62 Effect of Different Fine Aggregate Materials in Mechanical Properties of Concrete
1 Introduction
2 Materials and Properties
2.1 Cement
2.2 River Sand
2.3 Coarse Aggregate
2.4 M-Sand
2.5 Ferrous Slag
2.6 Copper Slag
3 Results
4 Conclusion
References
63 A Critical Analysis on Applications and Impact of Emerging Technologies in Employment and Skills Domain in e-Governance Projects
1 Introduction
2 Start-ups and Employment
3 Employment and Skills in Rajasthan
3.1 Use Cases of Emerging Technologies
4 Challenges
5 Conclusion/Recommendations
References
64 Risk and Challenges in Intelligent Systems
1 Introduction
1.1 AI is Created to Do Something Dangerous
1.2 Artificial Intelligence Is Designed to Build an Asset, But It Favors a Wrong Approach to Achieving Its Aim
2 Risk in Intelligent System
2.1 Automation-Promoting Job Losses
2.2 The Emerge of “DEEPFAKES”
2.3 Artificial Intelligence Unfairness and Inequality
3 Challenges in Artificial Intelligence
3.1 Conjecture Power
3.2 Trust Loss
3.3 Individual Level
3.4 Data Privacy and Security
3.5 The Bias Problem
3.6 Information Security
4 Conclusion
References
65 1–4D Protein Structures Prediction Using Machine Learning and Deep Learning from Amino Acid Sequences
1 Introduction
2 Literature Survey
2.1 Model Quality Assessment Programs (MQAPs) Are in Protein Tertiary Structure Prediction
2.2 Machine Learning Methods for 4-Diamensional Structure Prediction
2.3 Deep Learning Methods
3 Research Gaps in Present Work
4 Objectives of Proposed Research Work
References
66 Health Assistant Using Natural Language Processing
1 Introduction
1.1 Area with Applications
1.2 History
1.3 Description and Significance of Topic
2 Technology Specification
3 Literature Survey
4 Data Set and Preprocessing
4.1 Dataset Description
4.2 Data Preprocessing
5 Algorithms Applied/Process Model/Methods
6 Results
References
67 A Comparative Study of E-Learning Applications
1 Introduction
1.1 Use of Internet in Non-school Contexts
2 E-Learning Applications for Enriching Skills
3 Literature Review
4 Problem Statement
5 Research Methodology
5.1 Factors Related to Teachers’ Internet Use
6 Online Learning Applications
7 A Comparative Study of Top 4—Learning Applications
8 General Limitations of Online Learning Applications
9 Suggestive Measures for Online Learning Applications
10 Benefits of Online Applications
10.1 To Teachers or Educators
10.2 To the Students
11 Conclusion
References
68 Application of Ontologies in the Enterprise—Overview and Critical Analysis
1 Introduction
1.1 Problem Formulation
2 Ontologies for Business Use—Critical Overview
2.1 Business Model Ontologies
2.2 Domain-Specific Ontologies
2.3 Semantic Workflow and Process Management
2.4 Promotion of Business Use of Semantics
2.5 Summary of Findings Concerning Ontologies for Enterprise Modelling
3 Semantic Interoperability in Enterprises
4 Concluding Remarks
References
Author Index