<?xml version="1.0" encoding="UTF-8"?>
<rdf:RDF xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns="http://purl.org/rss/1.0/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
<channel rdf:about="https://reunir.unir.net/handle/123456789/9280">
<title>vol. 1, nº 2, december 2009</title>
<link>https://reunir.unir.net/handle/123456789/9280</link>
<description/>
<items>
<rdf:Seq>
<rdf:li rdf:resource="https://reunir.unir.net/handle/123456789/9368"/>
<rdf:li rdf:resource="https://reunir.unir.net/handle/123456789/9366"/>
<rdf:li rdf:resource="https://reunir.unir.net/handle/123456789/9365"/>
<rdf:li rdf:resource="https://reunir.unir.net/handle/123456789/9364"/>
<rdf:li rdf:resource="https://reunir.unir.net/handle/123456789/9363"/>
<rdf:li rdf:resource="https://reunir.unir.net/handle/123456789/9362"/>
<rdf:li rdf:resource="https://reunir.unir.net/handle/123456789/9361"/>
<rdf:li rdf:resource="https://reunir.unir.net/handle/123456789/9360"/>
<rdf:li rdf:resource="https://reunir.unir.net/handle/123456789/9359"/>
<rdf:li rdf:resource="https://reunir.unir.net/handle/123456789/9358"/>
<rdf:li rdf:resource="https://reunir.unir.net/handle/123456789/9357"/>
<rdf:li rdf:resource="https://reunir.unir.net/handle/123456789/9334"/>
<rdf:li rdf:resource="https://reunir.unir.net/handle/123456789/9333"/>
<rdf:li rdf:resource="https://reunir.unir.net/handle/123456789/9330"/>
<rdf:li rdf:resource="https://reunir.unir.net/handle/123456789/9329"/>
<rdf:li rdf:resource="https://reunir.unir.net/handle/123456789/9328"/>
</rdf:Seq>
</items>
<dc:date>2024-11-03T08:47:30Z</dc:date>
</channel>
<item rdf:about="https://reunir.unir.net/handle/123456789/9368">
<title>Collaborative Geographic Information Systems for Business Intelligence</title>
<link>https://reunir.unir.net/handle/123456789/9368</link>
<description>Collaborative Geographic Information Systems for Business Intelligence
Ramirez, Juan José
This paper shows a number of sceneries where&#13;
information (specifically, geographical-related information) is&#13;
lost because there is no method for storing or sharing it. This&#13;
research has been done with the aim to solve those scenery&#13;
problems in a general way, by means of a geographical&#13;
information system that can store geographical-related&#13;
information and publish it in order to avoid loss of information&#13;
and enabling geographical information sharing
Submitted by Administrador Re-UNIR Re-UNIR (reunir@unir.net) on 2019-09-30T11:12:46Z
No. of bitstreams: 1
IJIMAI1-2-16.pdf: 199490 bytes, checksum: c3b7f7f43e6437e74ea5c75a2893058f (MD5); Made available in DSpace on 2019-09-30T11:12:46Z (GMT). No. of bitstreams: 1
IJIMAI1-2-16.pdf: 199490 bytes, checksum: c3b7f7f43e6437e74ea5c75a2893058f (MD5)
</description>
</item>
<item rdf:about="https://reunir.unir.net/handle/123456789/9366">
<title>Route planning algorithms: Planific@ Project</title>
<link>https://reunir.unir.net/handle/123456789/9366</link>
<description>Route planning algorithms: Planific@ Project
Martín García, Carlos; Martín Ortega, Gonzalo
Planific@ is a route planning project for the city of&#13;
Madrid (Spain). Its main aim is to develop an intelligence system&#13;
capable of routing people from one place in the city to any other&#13;
using the public transport. In order to do this, it is necessary to&#13;
take into account such things as: time, traffic, user preferences,&#13;
etc. Before beginning to design the project is necessary to make&#13;
a comprehensive study of the variety of main known route&#13;
planning algorithms suitable to be used in this project
Submitted by Administrador Re-UNIR Re-UNIR (reunir@unir.net) on 2019-09-30T10:21:37Z
No. of bitstreams: 1
IJIMAI1-2-11.pdf: 1087183 bytes, checksum: 35681f3a3d69d15e6c4063daf37424da (MD5); Made available in DSpace on 2019-09-30T10:21:37Z (GMT). No. of bitstreams: 1
IJIMAI1-2-11.pdf: 1087183 bytes, checksum: 35681f3a3d69d15e6c4063daf37424da (MD5)
</description>
</item>
<item rdf:about="https://reunir.unir.net/handle/123456789/9365">
<title>Business Process Re-engineering in Saudi Arabia: A Survey of Understanding and Attitudes</title>
<link>https://reunir.unir.net/handle/123456789/9365</link>
<description>Business Process Re-engineering in Saudi Arabia: A Survey of Understanding and Attitudes
Rahali, Essam; Chaczko, Zenon; Agbinya, Johnson; Chiu, Christopher
This survey was conducted in the Kingdom of Saudi Arabia (KSA) to investigate the level of awareness of BPR. Respondents (customers, employees, and Managers) had different educational backgrounds and were from private and public sectors. Findings of the study indicate a general awareness of BPR in KSA
Submitted by Administrador Re-UNIR Re-UNIR (reunir@unir.net) on 2019-09-30T09:51:11Z
No. of bitstreams: 1
IJIMAI1-2-6.pdf: 461452 bytes, checksum: 835058dfff5a05a1e99e0a8e37b57c79 (MD5); Made available in DSpace on 2019-09-30T09:51:11Z (GMT). No. of bitstreams: 1
IJIMAI1-2-6.pdf: 461452 bytes, checksum: 835058dfff5a05a1e99e0a8e37b57c79 (MD5)
</description>
</item>
<item rdf:about="https://reunir.unir.net/handle/123456789/9364">
<title>Ontology of a scene based on Java 3D architecture</title>
<link>https://reunir.unir.net/handle/123456789/9364</link>
<description>Ontology of a scene based on Java 3D architecture
Bolívar Barón, Holman; González-Crespo, Rubén; Sanjuán Martínez, Óscar
The present article seeks to make an approach to the class hierarchy of a scene built with the architecture Java 3D, to develop an ontology of a scene as from the semantic essential components for the semantic structuring of the Web3D. Java was selected because the language recommended by the W3C Consortium for the Development of the Web3D oriented applications as from X3D standard is Xj3D which compositionof their Schemas is based the architecture of Java3D In first instance identifies the domain and scope of the ontology, defining classes and subclasses that comprise from Java3D architecture and the essential elements of a scene, as its point of origin, the field of rotation, translation The limitation of the scene and the definition of shaders, then define the slots that are declared in RDF as a framework for describing the properties of the classes established from identifying the domain and range of each class, then develops composition of the OWL ontology on SWOOP Finally, be perform instantiations of the ontology building for a Iconosphere object as from class expressions defined.
Submitted by Administrador Re-UNIR Re-UNIR (reunir@unir.net) on 2019-09-30T09:10:51Z&#13;
No. of bitstreams: 1&#13;
IJIMAI1-2-3.pdf: 324262 bytes, checksum: d697c24d7ab2f2a1360618d9230197f7 (MD5); Made available in DSpace on 2019-09-30T09:10:51Z (GMT). No. of bitstreams: 1&#13;
IJIMAI1-2-3.pdf: 324262 bytes, checksum: d697c24d7ab2f2a1360618d9230197f7 (MD5)
</description>
</item>
<item rdf:about="https://reunir.unir.net/handle/123456789/9363">
<title>WoT model for authenticity contents in virtual learning platforms</title>
<link>https://reunir.unir.net/handle/123456789/9363</link>
<description>WoT model for authenticity contents in virtual learning platforms
Gaona-García, Paulo Alonso; Soto-Carrión, Jesús
The following research proposal seeks to bring a model of security software on virtual learning platforms LCMS under all SCORM specifications to ensure the authenticity of content created under concepts of digital signature and identification of protocols and mechanisms to ensure such activities.
Submitted by Administrador Re-UNIR Re-UNIR (reunir@unir.net) on 2019-09-27T12:38:53Z&#13;
No. of bitstreams: 1&#13;
IJIMAI1-2-13.pdf: 698948 bytes, checksum: ce01562863f13eaee02a1e66b6c00f9b (MD5); Made available in DSpace on 2019-09-27T12:38:53Z (GMT). No. of bitstreams: 1&#13;
IJIMAI1-2-13.pdf: 698948 bytes, checksum: ce01562863f13eaee02a1e66b6c00f9b (MD5)
</description>
</item>
<item rdf:about="https://reunir.unir.net/handle/123456789/9362">
<title>Prototype of assignment intelligent adaptive of service providers inside of ESB with data mining</title>
<link>https://reunir.unir.net/handle/123456789/9362</link>
<description>Prototype of assignment intelligent adaptive of service providers inside of ESB with data mining
Castaño, Andrés Paolo
The SOA philosophy can address new business challenges, become more competitive and provide integrated information systems. In addition, technologies such as BPM, BAM and Web Services are essential complements to SOA. This work aims to use several of these technologies integrated into a single application that will allow in a phase of a previously defined business process, to perform the analysis of input suppliers to the company through the generation of a decision tree using embedded code of the free tool Weka for data mining in order to feedback the business process and evaluate these results to improve the process. For the realization of this prototype we worked with the jBPM suite, the API from Weka to get the J48 algorithm, the postgresql database, the format for data exchange JSON and the web service.
Submitted by Administrador Re-UNIR Re-UNIR (reunir@unir.net) on 2019-09-27T12:20:29Z
No. of bitstreams: 1
IJIMAI1-2-7.pdf: 545152 bytes, checksum: c71b6d4c9e5740ca270567833ae48682 (MD5); Made available in DSpace on 2019-09-27T12:20:29Z (GMT). No. of bitstreams: 1
IJIMAI1-2-7.pdf: 545152 bytes, checksum: c71b6d4c9e5740ca270567833ae48682 (MD5)
</description>
</item>
<item rdf:about="https://reunir.unir.net/handle/123456789/9361">
<title>Using Recommendation System for E-learning Environments at degree level</title>
<link>https://reunir.unir.net/handle/123456789/9361</link>
<description>Using Recommendation System for E-learning Environments at degree level
Sanjuán Martínez, Óscar; Pelayo García-Bustelo, B. Cristina; González-Crespo, Rubén; Torres Franco, Enrique
Nowadays, new technologies and the fast growth of the Internet have made access to information easier for all kind of people, raising new challenges to education when using Internet as a medium. One of the best examples is how to guide students in their learning processes. The need to look for guidance from their teachers or other companions that many Internet users experience when endeavoring to choose their readings, exercises o practices is a very common reality. In order to cater for this need many different information and recommendation strategies have been developed. Recommendation Systems is one of these. Recommendation Systems try to help the user, presenting him those objects he could be more interested in, based on his known preferences or on those of other users with similar characteristics.This document tries to present the current situation with regards to Recommendation Systems and their application on distance education over the Internet.
Submitted by Administrador Re-UNIR Re-UNIR (reunir@unir.net) on 2019-09-27T11:38:21Z&#13;
No. of bitstreams: 1&#13;
IJIMAI1-2-12.pdf: 263181 bytes, checksum: 8a0167e783556b8b2ae4971dfa81a34b (MD5); Made available in DSpace on 2019-09-27T11:38:21Z (GMT). No. of bitstreams: 1&#13;
IJIMAI1-2-12.pdf: 263181 bytes, checksum: 8a0167e783556b8b2ae4971dfa81a34b (MD5)
</description>
</item>
<item rdf:about="https://reunir.unir.net/handle/123456789/9360">
<title>Security Guidelines for the Development of Accessible Web Applications through the implementation of intelligent systems</title>
<link>https://reunir.unir.net/handle/123456789/9360</link>
<description>Security Guidelines for the Development of Accessible Web Applications through the implementation of intelligent systems
Núñez Valdez, Edward Rolando; Sanjuán Martínez, Óscar; García Fernández, Gloria; Joyanes Aguilar, Luis; Cuevas Lovelle, Juan Ml.
Due to the significant increase in threats, attacks&#13;
and vulnerabilities that affect the Web in recent years has&#13;
resulted the development and implementation of tools and&#13;
methods to ensure security measures in the privacy,&#13;
confidentiality and data integrity of users and businesses. Under&#13;
certain circumstances, despite the implementation of these tools&#13;
do not always get the flow of information which is passed in a&#13;
secure manner. Many of these security tools and methods cannot&#13;
be accessed by people who have disabilities or assistive&#13;
technologies which enable people to access the Web efficiently.&#13;
Among these security tools that are not accessible are the virtual&#13;
keyboard, the CAPTCHA and other technologies that help to&#13;
some extent to ensure safety on the Internet and are used in&#13;
certain measures to combat malicious code and attacks that have&#13;
been increased in recent times on the Web. Through the&#13;
implementation of intelligent systems can detect, recover and&#13;
receive information on the characteristics and properties of the&#13;
different tools and hardware devices or software with which the&#13;
user is accessing a web application and through analysis and&#13;
interpretation of these intelligent systems can infer and&#13;
automatically adjust the characteristics necessary to have these&#13;
tools to be accessible by anyone regardless of disability or&#13;
navigation context. This paper defines a set of guidelines and&#13;
specific features that should have the security tools and methods&#13;
to ensure the Web accessibility through the implementation of&#13;
intelligent systems.
Submitted by Administrador Re-UNIR Re-UNIR (reunir@unir.net) on 2019-09-27T10:31:35Z&#13;
No. of bitstreams: 1&#13;
IJIMAI1-2-14.pdf: 256695 bytes, checksum: cc702e83ed938fc3d342d4e052ace51b (MD5); Made available in DSpace on 2019-09-27T10:31:35Z (GMT). No. of bitstreams: 1&#13;
IJIMAI1-2-14.pdf: 256695 bytes, checksum: cc702e83ed938fc3d342d4e052ace51b (MD5)
</description>
</item>
<item rdf:about="https://reunir.unir.net/handle/123456789/9359">
<title>SALCER´s Project</title>
<link>https://reunir.unir.net/handle/123456789/9359</link>
<description>SALCER´s Project
Espinós, Bosco; Pérez, Carlos
SALCER (in Spanish: Sistema de Asesoramiento y&#13;
Localización de Centrales de EnergíaRenovables) could be&#13;
translated as Counseling and Location of Renewable Energy&#13;
Power Station´s System. Its objective is to develop a system&#13;
capable of finding the most suitable place for the construction of&#13;
renewable power stations, taking into account such things as:&#13;
budget, topography, amount of energy needed, among others.&#13;
The most relevant aims of the project are: study of a certain&#13;
variety of renewable energy technologies, designing an accurate&#13;
topology system, restraining decisions to demand forecasts and&#13;
finally performance of an energy plan for a specific region.
Submitted by Administrador Re-UNIR Re-UNIR (reunir@unir.net) on 2019-09-27T09:47:56Z
No. of bitstreams: 1
IJIMAI1-2-8.pdf: 868442 bytes, checksum: 1513f19d55fc2c6fc2cee9ec91b08900 (MD5); Made available in DSpace on 2019-09-27T09:47:56Z (GMT). No. of bitstreams: 1
IJIMAI1-2-8.pdf: 868442 bytes, checksum: 1513f19d55fc2c6fc2cee9ec91b08900 (MD5)
</description>
</item>
<item rdf:about="https://reunir.unir.net/handle/123456789/9358">
<title>Mapping Persian Words to WordNet Synsets</title>
<link>https://reunir.unir.net/handle/123456789/9358</link>
<description>Mapping Persian Words to WordNet Synsets
Dehkharghani, Rahim; Shamsfard, Mehrnoush
Lexical ontologies are one of the main resources&#13;
for developing natural language processing and semantic web&#13;
applications. Mapping lexical ontologies of different languages&#13;
is very important for inter-lingual tasks. On the other hand&#13;
mapping approaches can be implied to build lexical ontologies&#13;
for a new language based on pre-existing resources of other&#13;
languages. In this paper we propose a semantic approach for&#13;
mapping Persian words to Princeton WordNet Synsets. As&#13;
there is no lexical ontology for Persian, our approach helps not&#13;
only in building one for this language but also enables semantic&#13;
web applications on Persian documents. To do the mapping, we&#13;
calculate the similarity of Persian words and English synsets&#13;
using their features such as super-classes and subclasses,&#13;
domain and related words. Our approach is an improvement of&#13;
an existing one applying in a new domain, which increases the&#13;
recall noticeably.
Submitted by Administrador Re-UNIR Re-UNIR (reunir@unir.net) on 2019-09-27T09:35:33Z
No. of bitstreams: 1
IJIMAI1-2-2.pdf: 789896 bytes, checksum: 13815ada453cbd7f7af59e8d38b469f0 (MD5); Made available in DSpace on 2019-09-27T09:35:33Z (GMT). No. of bitstreams: 1
IJIMAI1-2-2.pdf: 789896 bytes, checksum: 13815ada453cbd7f7af59e8d38b469f0 (MD5)
</description>
</item>
<item rdf:about="https://reunir.unir.net/handle/123456789/9357">
<title>Automated code generation support for BI with MDA TALISMAN</title>
<link>https://reunir.unir.net/handle/123456789/9357</link>
<description>Automated code generation support for BI with MDA TALISMAN
García-Díaz, Vicente; Fernández-Fernández, Héctor; Palacios-González, Elías; Pelayo García-Bustelo, B. Cristina; Sanjuán Martínez, Óscar; Cueva Lovelle, Juan Manuel
Model Driven Engineering (MDE) is gaining ever&#13;
more strength due to the fact that with MDE the software&#13;
development can be much more productive and this is the way to&#13;
go closer to real software industrialization. With MDA&#13;
TALISMAN, we have succeeded in creating complex software&#13;
solutions for food traceability adapted to different customers,&#13;
ready to be deployed. We rely on the approach to MDE most&#13;
extended at present, MDA (Model-Driven Development) but as&#13;
we shall see, we also use the main pillars that support the&#13;
Software Factories, The proposal from Microsoft to MDE.&#13;
Besides, in this paper we present five cases of success with MDA&#13;
TALISMAN.
Submitted by Administrador Re-UNIR Re-UNIR (reunir@unir.net) on 2019-09-27T09:16:48Z&#13;
No. of bitstreams: 1&#13;
IJIMAI1-2-15.pdf: 501872 bytes, checksum: 8f5e3265bc18789641246aab63209d24 (MD5); Made available in DSpace on 2019-09-27T09:16:48Z (GMT). No. of bitstreams: 1&#13;
IJIMAI1-2-15.pdf: 501872 bytes, checksum: 8f5e3265bc18789641246aab63209d24 (MD5)
</description>
</item>
<item rdf:about="https://reunir.unir.net/handle/123456789/9334">
<title>Uncoolness factor of collaborative Web Mining Tools (WMT)</title>
<link>https://reunir.unir.net/handle/123456789/9334</link>
<description>Uncoolness factor of collaborative Web Mining Tools (WMT)
Chulilla, Juan Luis; Azagra, Pilar
The recent development of social mining is a useful and direct analogy to talking about the less visible part of the adoption of successive waves of social software. The striking fact of visibility decrease as each type of social software matures should be taken into account for any comprehensive analysis of the relation between collectives and Internet technologies. One of the main results of this relation is the social data mining of Internet, which both gives sense to virtual communities and produces contents via feedback. We are just at the beginning of the adoption of new ways of social data mining, which will be significant when grow mature and become invisible.
Submitted by Administrador Re-UNIR Re-UNIR (reunir@unir.net) on 2019-09-23T12:34:11Z
No. of bitstreams: 1
IJIMAI1-2-9.pdf: 43438 bytes, checksum: bf26ec862bec54ad180df037922d2043 (MD5); Made available in DSpace on 2019-09-23T12:34:11Z (GMT). No. of bitstreams: 1
IJIMAI1-2-9.pdf: 43438 bytes, checksum: bf26ec862bec54ad180df037922d2043 (MD5)
</description>
</item>
<item rdf:about="https://reunir.unir.net/handle/123456789/9333">
<title>A Mix Model of Discounted Cash-Flow and OWA Operators for Strategic Valuation</title>
<link>https://reunir.unir.net/handle/123456789/9333</link>
<description>A Mix Model of Discounted Cash-Flow and OWA Operators for Strategic Valuation
Doña, Jesús M.; la Red, David L.; Peláez, José I.
The stock market volatility and the actual stock Exchange activity have increased the need of counting with effective methods on the part of financial analysts to achieve a division in relation to the investment actions, being also growing the demand of methodological instruments that reduce and minimize the risks and uncertainty when valuating financial actives and companies. These systems not only must use quantitative information but the inclusion of qualitative information must also bear heavily on them, as an improvement element in the adjustment of these valuating methods, with the aim of throwing a more well-conceived or less mistaken decision. In this work, the use of Discounted Cash-Flow model is proposed, with quantitative information together with the OWA operators as an inclusion method of  ualitative information in the traditional valuating models, with the aim of generating an strategic valuating system which allows to develop more agreed and less mistaken valuations.
Submitted by Administrador Re-UNIR Re-UNIR (reunir@unir.net) on 2019-09-23T12:21:40Z
No. of bitstreams: 1
IJIMAI1-2-4.pdf: 336581 bytes, checksum: f818a96708d5b6670d55315ef5030b9c (MD5); Made available in DSpace on 2019-09-23T12:21:40Z (GMT). No. of bitstreams: 1
IJIMAI1-2-4.pdf: 336581 bytes, checksum: f818a96708d5b6670d55315ef5030b9c (MD5)
</description>
</item>
<item rdf:about="https://reunir.unir.net/handle/123456789/9330">
<title>PredicForex. A tool for a reliable market. Playing with currencies</title>
<link>https://reunir.unir.net/handle/123456789/9330</link>
<description>PredicForex. A tool for a reliable market. Playing with currencies
Aguilera Collar, J.; González-Cebrián Toba, R.; Cortés Velasco, C.
The Forex market is a very interesting market. Finding a suitable tool to forecast currency behavior will be of great interest. It is almost impossible to find a 100 % reliable tool. This market is like any other one, unpredictable. However we developed a very interesting tool that makes use of WebCrawler, data mining and web services to offer and forecast an advice to any user or broker.
Submitted by Administrador Re-UNIR Re-UNIR (reunir@unir.net) on 2019-09-20T12:54:11Z
No. of bitstreams: 1
IJIMAI1-2-10.pdf: 329672 bytes, checksum: 16f9939599316341158ac478626de3f5 (MD5); Made available in DSpace on 2019-09-20T12:54:11Z (GMT). No. of bitstreams: 1
IJIMAI1-2-10.pdf: 329672 bytes, checksum: 16f9939599316341158ac478626de3f5 (MD5)
</description>
</item>
<item rdf:about="https://reunir.unir.net/handle/123456789/9329">
<title>Developing a Business Application with BPM and MDE</title>
<link>https://reunir.unir.net/handle/123456789/9329</link>
<description>Developing a Business Application with BPM and MDE
Fernández-Fernández, Héctor; Palacios-González, E.; García-Díaz, Vicente; Pelayo García-Bustelo, B. Cristina; Sanjuán Martínez, Óscar; Cueva Lovelle, Juan Manuel
In this paper we have designed an architecture for&#13;
the generation of a business application, that allows to business&#13;
users to adapt their processes to the constant change. At the&#13;
moment all the architectures based to a great extent on SOA&#13;
allow to modify the processes in a short period of time, but we&#13;
go beyond and give the possibility to the business user of&#13;
modifying their processes. To design this architecture, we rely&#13;
on the fundamental use of two technologies: BPM (Business&#13;
Process Modeling) and MDE (Model Driven Engineering).&#13;
Inside these technologies we focus on the creation of a business&#13;
process notation extended from BPMN that is agile, easy to&#13;
learn and design, and capable to provide semantic information&#13;
about the process. Therefore this notation allows business&#13;
process to modify their processes to achieve the proposed goal.
Submitted by Administrador Re-UNIR Re-UNIR (reunir@unir.net) on 2019-09-20T12:25:04Z&#13;
No. of bitstreams: 1&#13;
IJIMAI1-2-5.pdf: 487051 bytes, checksum: f6ee44c63901934e23b1f9b2b887c76d (MD5); Made available in DSpace on 2019-09-20T12:25:04Z (GMT). No. of bitstreams: 1&#13;
IJIMAI1-2-5.pdf: 487051 bytes, checksum: f6ee44c63901934e23b1f9b2b887c76d (MD5)
</description>
</item>
<item rdf:about="https://reunir.unir.net/handle/123456789/9328">
<title>Prospecting the future with AI</title>
<link>https://reunir.unir.net/handle/123456789/9328</link>
<description>Prospecting the future with AI
Miguel Castillo, Jose; Cortes, Conchi; Gonzalez, Julian; Benito, Armando
If we were able to foresee the future, we could be prepared to reduce the impact of bad situations as well as getting the most of profiting periods. Our world is a dynamic system that evolves as time goes by. The number of variables that can influence in future situations outnumbers our capacity of prediction at a first glance. This article will show an alternative way to foresee potential future scenarios based on human experts’ opinion, what can be considered as a knowledge modeling tool.
Submitted by Administrador Re-UNIR Re-UNIR (reunir@unir.net) on 2019-09-20T12:00:14Z
No. of bitstreams: 1
IJIMAI1-2-1.pdf: 457589 bytes, checksum: 5552da678a871746e4fa181b223bf5e1 (MD5); Made available in DSpace on 2019-09-20T12:00:14Z (GMT). No. of bitstreams: 1
IJIMAI1-2-1.pdf: 457589 bytes, checksum: 5552da678a871746e4fa181b223bf5e1 (MD5)
</description>
</item>
</rdf:RDF>
