Agents and ontologies for e-business

2002 ◽  
Vol 17 (1) ◽  
pp. 81-85 ◽  
Author(s):  
YANNIS LABROU

Academic work on agents and ontologies is often oblivious to the complexities and realities of enterprise computing. At the same time, the practitioners of enterprise computing, although they are adept at the building of robust, real-life enterprise applications, are unaware of the academic body of work and the opportunities of applying novel approaches of academic origin. Enterprise applications are very complex systems that are designed to support critical business operations. This article outlines the technical and business foundations of enterprise application software and briefly discusses viable opportunities for agents and ontology research.

After a truly comprehensive discussion on a variety of integration patterns and technologies in preceding chapters, it becomes exceedingly clear that the integrated CPM, BPM, SOA, and service computing approach should be used to fully leverage disparate and distributed enterprise applications, global connectivity, and underlying enterprise application integration technologies in organizations. The conducted enterprise integration in an organization, thus, can deliver a performance-driven, business-oriented, and agile IT solution for the organization to strive for competitive advantages.


Author(s):  
Ahmet Doğan ◽  
Emin Sertaç Arı

Today, a company continues its activities in a highly competitive environment regardless of the sector in which it operates. An important point has been emphasized in many developments by experienced managers and academics which have been released to the public. From marketing to finance, human resource management, auditing and planning, all business processes have entered an incredible innovative process. One of the topics in this process is big data. When cumulative data are not used, they cannot transcend being huge piles of garbage. However, it is not possible to analyze such large, complex, and dynamic data via conventional methods. At this point, the concept of big data has emerged. In this study, after the explanation and definition of the concept, a vast literature review was conducted in order to present the relationship of big data with IoT, big data-related topics, and academic researches on big data. Afterwards, real-life enterprise applications were exemplified from various industries.


2019 ◽  
Vol 25 (1) ◽  
pp. 54-64 ◽  
Author(s):  
Sudhanshu Aggarwal

PurposeThe purpose of this paper is to present an efficient heuristic algorithm based on the 3-neighborhood approach. In this paper, search is made from sides of both feasible and infeasible regions to find near-optimal solutions.Design/methodology/approachThe algorithm performs a series of selection and exchange operations in 3-neighborhood to see whether this exchange yields still an improved feasible solution or converges to a near-optimal solution in which case the algorithm stops.FindingsThe proposed algorithm has been tested on complex system structures which have been widely used. The results show that this 3-neighborhood approach not only can obtain various known solutions but also is computationally efficient for various complex systems.Research limitations/implicationsIn general, the proposed heuristic is applicable to any coherent system with no restrictions on constraint functions; however, to enforce convergence, inferior solutions might be included only when they are not being too far from the optimum.Practical implicationsIt is observed that the proposed heuristic is reasonably proficient in terms of various measures of performance and computational time.Social implicationsReliability optimization is very important in real life systems such as computer and communication systems, telecommunications, automobile, nuclear, defense systems, etc. It is an important issue prior to real life systems design.Originality/valueThe utilization of 3-neighborhood strategy seems to be encouraging as it efficiently enforces the convergence to a near-optimal solution; indeed, it attains quality solutions in less computational time in comparison to other existing heuristic algorithms.


Author(s):  
Bahman Zamani ◽  
Shiva Rasoulzadeh

This article describes how experience in domain specific modeling can be captured and abstracted in a domain specific modeling language (DSML). Modeling with a DSML results in quality models. Patterns of enterprise application architecture (PofEAA) is a rich set of patterns that can be used by designers when designing (modeling) web-based enterprise applications. This article aims at defining a DSML based on PofEAA patterns, as well as providing tool support for designing web-based enterprise applications that use these patterns. The authors have built a DSML using the profile extension mechanism of UML, by defining stereotypes. In addition to the proposed profile, this article has implemented the structure and behavior of PofEAA patterns in Rational Software Architecture (RSA) which is resulted in a tool that facilitates the design of software for designers. To show the usefulness of the tool, it is used for modeling two small systems based on the PofEAA patterns. The results show that many of the design is automated and the modeling speed is increased.


2019 ◽  
Vol 109 (4) ◽  
pp. 1486-1529 ◽  
Author(s):  
Gabrielle Fack ◽  
Julien Grenet ◽  
Yinghua He

We propose novel approaches to estimating student preferences with data from matching mechanisms, especially the Gale-Shapley deferred acceptance. Even if the mechanism is strategy-proof, assuming that students truthfully rank schools in applications may be restrictive. We show that when students are ranked strictly by some ex ante known priority index (e.g., test scores), stability is a plausible and weaker assumption, implying that every student is matched with her favorite school/college among those she qualifies for ex post. The methods are illustrated in simulations and applied to school choice in Paris. We discuss when each approach is more appropriate in real-life settings. (JEL D11, D12, D82, I23)


2021 ◽  
Vol 2 ◽  
Author(s):  
Helena Bascuñana-Ambrós ◽  
Mª Josep Nadal-Castells ◽  
Eliot Ramírez-Mirabal ◽  
Marta Beranuy-Rodriguez ◽  
Alberto Pintor-Ojeda ◽  
...  

There is a strong recommendation for the use of intramuscular botulinum toxin in patients with persistent or progressive spasticity affecting one or more joints and who have an identifiable therapeutic target. After a botulinum toxin injection, a stretching intervention improves the results of the treatment, and it should be performed by patients and/or caregivers after being trained by a therapist. Adherence to this recommendation remains low once the therapist stops following the patient. The COVID-19 pandemic has increased the use of telemedicine with different approaches to treat patients. There has been an increased use of motivational applications, with virtual reality software and real-life videos, which provide a gaming experience that increases adherence. There are programs with synchronous telehealth exercises guided by physical therapists or software with sensor-based technology that shows the range of motion (ROM) and strength of the muscles of a particular joint. These new approaches to patient follow-up appear to increase adherence to exercise because they need to be “watched and controlled” is achieved.


Sign in / Sign up

Export Citation Format

Share Document