Submitted:
02 September 2024
Posted:
02 September 2024
You are already at the latest version
Abstract
Keywords:
1. Introduction
2. Problem Statement
3. Objectives
4. Methodology
5. Applications and Benefits
5.1. Enhanced Data Management and Governance
5.2. Facilitating Semantic Interoperability
5.3. Intelligent Decision-Making and Automation
5.4. Improved Knowledge Management and Discovery
5.5. Strengthening Data Security and Privacy
5.6. Supporting Data-Driven AI and Machine Learning
5.7. Enhancing Collaboration Across Diverse Systems and Domains
5.8. Promoting Scalability and Adaptability in System Design
Conclusion of Benefits
6. Conclusion
References
- Antoniou, G. (2004). A Semantic Web Primer. The MIT Press.
- Shen, X.; Zhang, Q.; Zheng, H.; Qi, W. Harnessing xgboost for robust biomarker selection of obsessive-compulsive disorder (ocd) from adolescent brain cognitive development (abcd) data. ResearchGate, May.
- Berners-Lee, T.; Hendler, J.; Lassila, O. (2001). The Semantic Web. Scientific American, 284(5), 34-43.
- Weng, Y.; Wu, J. Leveraging Artificial Intelligence to Enhance Data Security and Combat Cyber Attacks. J. Artif. Intell. Gen. Sci. (JAIGS) ISSN:3006-4023 2024, 5, 392–399. [Google Scholar] [CrossRef]
- Gangemi, A.; Presutti, V. (2009). Ontology Design Patterns. In S. Staab & R. Studer (Eds.), Handbook on Ontologies (2nd ed., pp. 221-243). Springer.
- Zheng, Q.; Yu, C.; Cao, J.; Xu, Y.; Xing, Q.; Jin, Y. (2024). Advanced Payment Security System: XGBoost, LightGBM and SMOTE Integrated. arXiv:2406.04658.
- Guarino, N.; Oberle, D.; Staab, S. (2009). What is an Ontology? In S. Staab & R. Studer (Eds.), Handbook on Ontologies (2nd ed., pp. 1-17). Springer.
- Cao, Y.; Weng, Y.; Li, M.; Yang, X. The Application of Big Data and AI in Risk Control Models: Safeguarding User Security. Int. J. Front. Eng. Technol. 2024, 6. [Google Scholar] [CrossRef]
- Gruber, T.R. Toward Principles for the Design of Ontologies Used for Knowledge Sharing, Stan ford Knowledge Systems Laboratory. Int. J. Hum. -Comput. Stud. 1995, 43, 907–928. [Google Scholar] [CrossRef]
- Gómez-Pérez, A.; Fernández-López, M.; Corcho, O. (2004). Ontological Engineering: With Examples from the Areas of Knowledge Management, E-Commerce, and the Semantic Web. Springer.
- Yu, C.; Jin, Y.; Xing, Q.; Zhang, Y.; Guo, S.; Meng, S. (2024). Advanced User Credit Risk Prediction Model using LightGBM, XGBoost and Tabnet with SMOTEENN. arXiv:2408.03497.
- Weng, Y. (2024). Big data and machine learning in defence. International Journal of Computer Science and Information Technology, 16(2), 25-35.
- Russell, S.; Norvig, P. (2021). Artificial Intelligence: A Modern Approach (4th ed.). Pearson.
- Smith, B.; Ceusters, W. Ontological realism: A methodology for coordinated evolution of scientific ontologies. Appl. Ontol. 2010, 5, 139–188. [Google Scholar] [CrossRef] [PubMed]
- Cardoso, J.; Sheth, A. (Eds.) . (2006). Semantic Web Services, Processes and Applications. Springer.
- Wang, R.Y.; Strong, D.M. Beyond Accuracy: What Data Quality Means to Data Consumers. J. Manag. Inf. Syst. 1996, 12, 5–33. [Google Scholar] [CrossRef]
- Weng, Y.; Wu, J. Fortifying the Global Data Fortress: A Multidimensional Examination of Cyber Security Indexes and Data Protection Measures across 193 Nations. Int. J. Front. Eng. Technol. 2024, 6, 13–28. [Google Scholar] [CrossRef]
- Yu, C.; Xu, Y.; Cao, J.; Zhang, Y.; Jin, Y.; Zhu, M. (2024). Credit card fraud detection using advanced transformer model. arXiv:2406.03733.
- Yan, Chao & Wang, Jinyin & Zou, Yuelin & Weng, Yijie & Zhao, Yang & Li, Zhuoying. (2024). Enhancing Credit Card Fraud Detection Through Adaptive Model Optimization. 10.13140/RG.2.2.12274.52166.
- Zhang, Q.; Qi, W.; Zheng, H.; Shen, X. (2024). CU-Net: a U-Net architecture for efficient brain-tumor segmentation on BraTS 2019 dataset. arXiv:2406.13113.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).