Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Ontology

Discipline
Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 196

Full-Text Articles in Physical Sciences and Mathematics

Automatic Construction Of Ontology With Public-Domain Datasets For Personalized Tutoring With Eca, Asim Jamal Jan 2024

Automatic Construction Of Ontology With Public-Domain Datasets For Personalized Tutoring With Eca, Asim Jamal

Electronic Theses and Dissertations

E-tutoring systems have transformed remote learning and personalized education, offering potent tools for tailored instruction. The core of a personalized tutor lies in its robust ontology and knowledge base, working seamlessly to deliver captivating educational experiences. These two integral components collaborate to empower the tutor to discern learners’ needs, adapt content accordingly, and provide tailored guidance. This study introduces an automated approach for constructing an ontology utilizing publicly accessible datasets, aiming to enhance personalized tutoring through Embodied Conversational Agents (ECA). The objective is to improve the tutoring encounter by delivering bespoke, domain-specific knowledge to learners. The approach harnesses natural language …


Modified Geometries, Clifford Algebras And Graphs: Their Impact On Discreteness, Locality And Symmetr, Roma Sverdlov Jul 2023

Modified Geometries, Clifford Algebras And Graphs: Their Impact On Discreteness, Locality And Symmetr, Roma Sverdlov

Mathematics & Statistics ETDs

In this dissertation I will explore the question whether various entities commonly used in quantum field theory can be “constructed". In particular, can spacetime be “constructed" out of building blocks, and can Berezin integral be “constructed" in terms of Riemann integrals.

As far as “constructing" spacetime out of building blocks, it has been attempted by multiple scientific communities and various models were proposed. But the common downfall is they break the principles of relativity. I will explore the ways of doing so in such a way that principles of relativity are respected. One of my approaches is to replace points …


Enhancing Basic Geology Skills With Artificial Intelligence: An Exploration Of Automated Reasoning In Field Geology, Perry Ivan Quinto Houser May 2023

Enhancing Basic Geology Skills With Artificial Intelligence: An Exploration Of Automated Reasoning In Field Geology, Perry Ivan Quinto Houser

Open Access Theses & Dissertations

This thesis explores the use of Artificial Intelligence, specifically semantics, ontologies, and reasoner techniques, to improve field geology mapping. The thesis focuses on two use cases: 1) identifying a geologic formation based on observed characteristics; and 2) predicting the geologic formation that might be expected next based upon known stratigraphic sequence. The results show that the ontology was able to correctly identify the geologic formation for the majority of rock descriptions, with higher search results for descriptions that provided more detail. Similarly, the units expected next were correctly given and if incorrect, would provide a flag to the field geologist …


The Fluid Margin Between Physical Causal Closure And Non-Physical Causal Closure, Extended To The Neutrosophic Causal Closure Principle, Florentin Smarandache Jan 2023

The Fluid Margin Between Physical Causal Closure And Non-Physical Causal Closure, Extended To The Neutrosophic Causal Closure Principle, Florentin Smarandache

Branch Mathematics and Statistics Faculty and Staff Publications

We plead for a fluid margin, or mixed/indeterminate buffer zone, between Physical and Non-Physical Causal Closures, and for a Neutrosophic Causal Closure Principle claiming that the chances of all physical effects are determined by their prior partially physical and partially non-physical causes.


A Reflection Of Typology And Verification Flaws In Consideration Of Biocybersecurity/Cyberbiosecurity: Just Another Gap In The Wall, Luke Potter, Kim Mossberg, Xavier Palmer Jan 2023

A Reflection Of Typology And Verification Flaws In Consideration Of Biocybersecurity/Cyberbiosecurity: Just Another Gap In The Wall, Luke Potter, Kim Mossberg, Xavier Palmer

Electrical & Computer Engineering Faculty Publications

Verification is central to any process in a functional and enduring cyber-secure organization. This verification is how the validity or accuracy of a state of being is assessed (Schlick, 1936; Balci, 1998). Conversely, breakdown in verification procedures is core to the interruption of normal operations for an organization. A key problem for organizations that utilize biology as an interlock within their systems is that personnel lack sufficient ability to verify all practically relevant biological information for procedures such as a nurse logging a blood draw, or a molecular biology technician preparing agar to culture microbes for study. This has several …


Supporting The Discovery, Reuse, And Validation Of Cybersecurity Requirements At The Early Stages Of The Software Development Lifecycle, Jessica Antonia Steinmann Oct 2022

Supporting The Discovery, Reuse, And Validation Of Cybersecurity Requirements At The Early Stages Of The Software Development Lifecycle, Jessica Antonia Steinmann

Doctoral Dissertations and Master's Theses

The focus of this research is to develop an approach that enhances the elicitation and specification of reusable cybersecurity requirements. Cybersecurity has become a global concern as cyber-attacks are projected to cost damages totaling more than $10.5 trillion dollars by 2025. Cybersecurity requirements are more challenging to elicit than other requirements because they are nonfunctional requirements that requires cybersecurity expertise and knowledge of the proposed system. The goal of this research is to generate cybersecurity requirements based on knowledge acquired from requirements elicitation and analysis activities, to provide cybersecurity specifications without requiring the specialized knowledge of a cybersecurity expert, and …


Fuzzy Reasoning Procedure For Ontologies Based On Rough Membership Approximation, Armand Florentin Donfack Kana, Babatunde Opeoluwa Akinkunmi Jul 2022

Fuzzy Reasoning Procedure For Ontologies Based On Rough Membership Approximation, Armand Florentin Donfack Kana, Babatunde Opeoluwa Akinkunmi

Future Computing and Informatics Journal

One of the major challenges in modeling a real-world domain is how to effectively represent uncertain and incomplete knowledge of that domain. Several techniques for representing uncertainty in ontologies have been proposed with some of the techniques lacking provision for vague inference. The classical tableaux-based algorithm does not provide the flexibility for reasoning over such vague ontologies. However, several extensions of the tableaux-based algorithm have been proposed to cope with fuzzy reasoning. Similarly, several alternative reasoning methods for incomplete, inconsistent, and uncertain ontologies have been proposed. One of the major limitations of most of those techniques is that they require …


An Ontological Approach For Recommending A Feature Selection Algorithm, Aparna Nayak, Bojan Bozic, Luca Longo Jul 2022

An Ontological Approach For Recommending A Feature Selection Algorithm, Aparna Nayak, Bojan Bozic, Luca Longo

Conference papers

Feature selection plays an important role in machine learning or data mining problems. Removing irrelevant features increases model accuracy and reduces the computational cost. However, selecting important features is not a simple task as one feature selection algorithm does not perform well on all the datasets that are of interest. This paper tries to address the recommendation of a feature selection algorithm based on dataset characteristics and quality. The research uses three types of dataset characteristics along with data quality metrics. The main contribution of the work is the utilization of Semantic Web techniques to develop a novel system that …


Monolithic Ontological Methodology (Mom): An Effective Software Project Management Approach, Kamal Uddin Sarker, Aziz Deraman, Raza Hasan, Ali Abbas, Babar Shah, Abrar Ullah Jun 2022

Monolithic Ontological Methodology (Mom): An Effective Software Project Management Approach, Kamal Uddin Sarker, Aziz Deraman, Raza Hasan, Ali Abbas, Babar Shah, Abrar Ullah

All Works

Due to rapid changes in software applications, especially incorporating the demands of self-regulating technologies becomes a major challenge in software projects. This research focuses on technological, managerial, and procedural challenges, which are believed to be the most significant factors contributing to projects failure. To address these issues, this study proposes Monolithic Ontological Methodology (MOM) which addresses the weakness in the existing benchmark methodologies including PRINCE2, Extreme Programming, and Scrum in terms of project management, quality control, and stakeholder involvement. The MOM consists of seven phases and each phase has the required number of iterations until it is approved by management. …


Electronic Evidence Locker: An Ontology For Electronic Evidence, Daniel Smith Dec 2021

Electronic Evidence Locker: An Ontology For Electronic Evidence, Daniel Smith

Electronic Theses and Dissertations

With the rapid growth of crime data, overwhelming amounts of electronic evidence need to be stored and shared with the relevant agencies. Without addressing this challenge, the sharing of crime data and electronic evidence will be highly inefficient, and the resource requirements for this task will continue to increase. Relational database solutions face size limitations in storing larger amounts of crime data where each instance has unique attributes with unstructured nature.

In this thesis, the Electronic Evidence Locker (EEL) was proposed and developed to address such problems. The EEL was built using a NoSQL database and a C# website for …


Ontologies For Geospatial Information: Progress And Challenges Ahead, Christophe Claramunt Jul 2021

Ontologies For Geospatial Information: Progress And Challenges Ahead, Christophe Claramunt

Journal of Spatial Information Science

Over the past 50 years or so the representation of spatial information within computerized systems has been widely addressed and developed in order to provide suitable data manipulation, analysis, and visualisation mechanisms. The range of applications is unlimited and nowadays impacts almost all sciences and practices. However, current conceptualisations and numerical representations of geospatial information still require the development of richer abstract models that match the complexity of spatial and temporal information. Geospatial ontologies are promising modelling alternatives that might favour the implementation and sharing of geographical information. The objective of this vision paper is to provide a short introduction …


A Health Elearning Ontology And Procedural Reasoning Approach For Developing Personalized Courses To Teach Patients About Their Medical Condition And Treatment, Martin Michalowski, Szymon Wilk, Wojtek Michalowski, Dympna O'Sullivan, Silvia Bonaccio, Enea Parimbelli, Marc Carrier, Grégoire Le Gal, Stephen Kingwell, Mor Peleg Jul 2021

A Health Elearning Ontology And Procedural Reasoning Approach For Developing Personalized Courses To Teach Patients About Their Medical Condition And Treatment, Martin Michalowski, Szymon Wilk, Wojtek Michalowski, Dympna O'Sullivan, Silvia Bonaccio, Enea Parimbelli, Marc Carrier, Grégoire Le Gal, Stephen Kingwell, Mor Peleg

Articles

We propose a methodological framework to support the development of personalized courses that improve patients’ understanding of their condition and prescribed treatment. Inspired by Intelligent Tutoring Systems (ITSs), the framework uses an eLearning ontology to express domain and learner models and to create a course. We combine the ontology with a procedural reasoning approach and precompiled plans to operationalize a design across disease conditions. The resulting courses generated by the framework are personalized across four patient axes—condition and treatment, comprehension level, learning style based on the VARK (Visual, Aural, Read/write, Kinesthetic) presentation model, and the level of understanding of specific …


Spatial Knowledge Representation Model Of Simulation Scenario Based On Ontology, Zhu Jie, Hongjun Zhang Jun 2021

Spatial Knowledge Representation Model Of Simulation Scenario Based On Ontology, Zhu Jie, Hongjun Zhang

Journal of System Simulation

Abstract: Military simulation scenario has abundant spatial knowledge and is closely related to various models of combat simulation. In view of the lack of uniform specification for the description of simulation scenario knowledge, it is necessary to construct a spatial knowledge representation model in line with spatial thinking to effectively analyze the spatial entities and their interrelationships in simulation scenario. The ontology method is used to establish spatial knowledge domain ontology and form the formal description specification of spatial knowledge concept; the spatial knowledge structure is described hierarchically by using the method of concept knowledge tree, clarifying the semantic logic …


Agent-Based Semantic Role Mining For Intelligent Access Control In Multi-Domain Collaborative Applications Of Smart Cities, Rubina Ghazal, Ahmad Kamran Malik, Basit Raza, Nauman Qadeer, Nafees Qamar, Sajal Bhatia Jun 2021

Agent-Based Semantic Role Mining For Intelligent Access Control In Multi-Domain Collaborative Applications Of Smart Cities, Rubina Ghazal, Ahmad Kamran Malik, Basit Raza, Nauman Qadeer, Nafees Qamar, Sajal Bhatia

School of Computer Science & Engineering Faculty Publications

Significance and popularity of Role-Based Access Control (RBAC) is inevitable; however, its application is highly challenging in multi-domain collaborative smart city environments. The reason is its limitations in adapting the dynamically changing information of users, tasks, access policies and resources in such applications. It also does not incorporate semantically meaningful business roles, which could have a diverse impact upon access decisions in such multi-domain collaborative business environments. We propose an Intelligent Role-based Access Control (I-RBAC) model that uses intelligent software agents for achieving intelligent access control in such highly dynamic multi-domain environments. The novelty of this model lies in using …


An Automated Method To Enrich And Expand Consumer Health Vocabularies Using Glove Word Embeddings, Mohammed Ibrahim Jan 2021

An Automated Method To Enrich And Expand Consumer Health Vocabularies Using Glove Word Embeddings, Mohammed Ibrahim

Graduate Theses and Dissertations

Clear language makes communication easier between any two parties. However, a layman may have difficulty communicating with a professional due to not understanding the specialized terms common to the domain. In healthcare, it is rare to find a layman knowledgeable in medical jargon, which can lead to poor understanding of their condition and/or treatment. To bridge this gap, several professional vocabularies and ontologies have been created to map laymen medical terms to professional medical terms and vice versa. Many of the presented vocabularies are built manually or semi-automatically requiring large investments of time and human effort and consequently the slow …


Towards An Ontology-Based Approach To The "New Normality" After Covid-19:The Spanish Case During Pandemic First Wave, Evelio Gonzalez Jan 2021

Towards An Ontology-Based Approach To The "New Normality" After Covid-19:The Spanish Case During Pandemic First Wave, Evelio Gonzalez

Turkish Journal of Electrical Engineering and Computer Sciences

The impact of the pandemic caused by COVID-19 has been immense in all fields of human activity. In most of the affected countries, the authorities have decreed a series of legal measures to try to stop the growth of the disease and the number of people affected by it. These legal measures involved, in most cases, restrictions on the free movement of people and on work and trade activities, new hygiene procedures, and social distancing. In the particular case of Spain, the rapid evolution of the pandemic led to the declaration of a so-called state of alarm and a period …


Twitter Fake Account Detection And Classification Using Ontological Engineering And Semantic Web Rule Language, Mohammed Jabardi, Asaad Sabah Hadi Dec 2020

Twitter Fake Account Detection And Classification Using Ontological Engineering And Semantic Web Rule Language, Mohammed Jabardi, Asaad Sabah Hadi

Karbala International Journal of Modern Science

Nowadays, Twitter has become one of the fastest-growing Online Social Networks (OSNs) for data sharing frameworks and microblogging. It attracts millions of users worldwide where subscribers communicate with each through posts and messages known as "tweets". The open structure and behaviour of Twitter cause it to be vulnerable to attacks from fake accounts and a large number of automated software, known as 'bots'. Bots are regarded to be malicious as they send spam to users of social networks over the internet. Data security and privacy are among the most critical issues of social network users, as the protection and fulfilment …


Approximating Fol Ontologies Using Owl2, Robert W. Powell Dec 2020

Approximating Fol Ontologies Using Owl2, Robert W. Powell

Electronic Theses and Dissertations

With the amount of data collected everyday ever expanding, techniques which allow com- puters to semantically understand data are growing in importance. Ontologies are a tool to describe the relationships connecting data so that computers can correctly interpret and combine data from many sources. An ontology about water needs to describe what the term "river" may refer to: An arbitrary river or one usable for navigation; a single tributary or an entire river network; the riverbed or the water itself? Well-designed ontologies can be shared, reused, and extended across multiple applications and facilitate betters integration of different data collections.

Common …


The Operational Choi-Jamio Lkowski Isomorphism, Emily Adlam Sep 2020

The Operational Choi-Jamio Lkowski Isomorphism, Emily Adlam

Mathematics, Physics, and Computer Science Faculty Articles and Research

In this article, I use an operational formulation of the Choi–Jamiołkowski isomorphism to explore an approach to quantum mechanics in which the state is not the fundamental object. I first situate this project in the context of generalized probabilistic theories and argue that this framework may be understood as a means of drawing conclusions about the intratheoretic causal structure of quantum mechanics which are independent of any specific ontological picture. I then give an operational formulation of the Choi–Jamiołkowski isomorphism and show that, in an operational theory which exhibits this isomorphism, several features of the theory which are usually regarded …


An Approach To The Acquisition Of Tacit Knowledge Based On An Ontological Model, Wahid Chergui, Samir Zidat, Farhi Marir Sep 2020

An Approach To The Acquisition Of Tacit Knowledge Based On An Ontological Model, Wahid Chergui, Samir Zidat, Farhi Marir

All Works

© 2018 The Authors Our knowledge includes irreducible tacit elements which are related to the individual's personal nature that go beyond what we can express, which makes it very difficult to formalize, communicate and share. As this tacit knowledge consists of either actions or personal attitudes, we propose an approach to acquisition of tacit knowledge based on an ontological model. The ontology is built top down by changing the actors’ cognitive focus from the focal to the subsidiary, or from the aim of an action to its detailed objectives. We also use explicitation interviews and self-confrontation techniques to identify the …


Application Of Domain Knowledge Representation In Simulation Tutoring For Weapon Utilization, Zhang Chi, Danhua Peng, Kedi Huang Aug 2020

Application Of Domain Knowledge Representation In Simulation Tutoring For Weapon Utilization, Zhang Chi, Danhua Peng, Kedi Huang

Journal of System Simulation

Abstract: According to the requirements and characteristics of the simulation tutoring system for weapon utilization, a knowledge base depending on the domain ontology was designed. The knowledge for weapon utilization, the knowledge representation, and the method of knowledge representation were introduced. Through a combination of the ontology technology and various existing models, the key points of using specific weapon could be mastered by processing the date, information, and experience from expert. The conceptual model of knowledge was built. A knowledge base for weapon utilization was designed and implemented. The structure and function of the simulation tutoring system and rule-based expert …


Scalable Semantic Web Services Architecture Design And Service Discovery, Xiaoxing Niu, Zhixue Wang, Minggang Yu Aug 2020

Scalable Semantic Web Services Architecture Design And Service Discovery, Xiaoxing Niu, Zhixue Wang, Minggang Yu

Journal of System Simulation

Abstract: With the rapid development of computer and network technologies, the variety and quantity of Web Services on the network is also increasing. How to find the requiring services quickly and accurately becomes increasingly important. In order to solve the problems with traditional Web Services architecture, such as poor scalability and lacking of semantic information, a scalable semantic Web Services architecture was proposed, the architecture could meet the requirements to construct distributed and large-scale systems based on SOA for modern enterprises. Service publication and deletion algorithms of the architecture were studied, and dynamic adjustment algorithms of the architecture was studied …


Research On Context-Aware Model Of Combat Processes, Qiaoyu Deng, He Ming, Zhixue Wang, Zhongwei Wang Aug 2020

Research On Context-Aware Model Of Combat Processes, Qiaoyu Deng, He Ming, Zhixue Wang, Zhongwei Wang

Journal of System Simulation

Abstract: In traditional joint operations, all collaborators make collaboration rules in advance to guide the operations. The unknown battlefield environment varies constantly, and military organizations must make adjustments to guarantee the combat operations order. A model of operational processes based on context awareness is built. The ontology theory is introduced to present the context. On the basis of event calculus, the analysis is carried out to the perceived context of combat processes, and the variation of organizations ability and the situation of processes are provided to guide the self-synchronizing decision-making.


Ontology Based Devs Modeling Method, Rong Gang, Xiao Jun, Yunping Hu, Yiping Feng Jul 2020

Ontology Based Devs Modeling Method, Rong Gang, Xiao Jun, Yunping Hu, Yiping Feng

Journal of System Simulation

Abstract: In the field of modeling and simulation, it’s difficult to reuse the models because the models and simulation system are coupled seriously. The Ontology-driven modeling theory is a simulation modeling methodology for model reuse. A new DEVS modeling method was proposed based on this theory. The DEVS modeling ontology DEVSMO was built and the DEVS model could be described as the instance of the DEVSMO. This form of DEVS model was independent of the DEVS simulation environment, which improved the model reusability. A tool was developed to translate the DEVSMO instance to DEVS executable models to verify the …


Semantic Knowledge Base Constructed From Chinese Online Encyclopedia, Liu Jian, Hongbo Xu, Huifeng Tang, Yantao Jia, Xueqi Cheng Jul 2020

Semantic Knowledge Base Constructed From Chinese Online Encyclopedia, Liu Jian, Hongbo Xu, Huifeng Tang, Yantao Jia, Xueqi Cheng

Journal of System Simulation

Abstract: The traditional construction methods about semantic knowledge base cost a lot of manpower and material resources. In addition, knowledge is difficult to acquire timely updates. In view of the deficiency, a new semantic representation model was put forward based on semantic ontology and hypergraph theory which was named dynamic knowledge network. Then, this model was described in detail, which included theoretical basis and model elements. Under the guidance of the model, the extraction methods and storage structure were studied about semantic knowledge. A Chinese semantic knowledge base was semi-automatic constructed using Chinese 360 Encyclopedia data which could efficiently provide …


Research On Ontology-Meta Modeling Method For Equipments Sos (System Of System) Combat Simulation, Zhang Shen, Haohua Xu, Jingye Wang Jun 2020

Research On Ontology-Meta Modeling Method For Equipments Sos (System Of System) Combat Simulation, Zhang Shen, Haohua Xu, Jingye Wang

Journal of System Simulation

Abstract: Aiming at the strict standard and difficulties of equipments SOS combat simulation modeling, an ontology-meta modeling method was put forward. Based on the analysis of equipments SOS combat, the basic notional units were abstracted: function unit, combat organize, combat maneuver, combat event, and combat environment, and the units mapping into UOPEE (unit, organization, proceeding, event and environment) which was a maturity and combined models collect, then constituted the descriptive UOPEE architecture with the UML method, obtaining the cyber-model architecture based on component designing and realizing method. This method makes the equipments SOS combat model easy to mapping and integration …


Research And Application Of Cloud Manufacturing Service Platform For Crane, Yang Chen, Zhongjie Wang, Zhaohui Liu, Nana Yu Jun 2020

Research And Application Of Cloud Manufacturing Service Platform For Crane, Yang Chen, Zhongjie Wang, Zhaohui Liu, Nana Yu

Journal of System Simulation

Abstract: Based on the research fruits of cloud manufacturing, the cloud manufacturing platform for crane was focused on. Based on the connotation analysis of the crane manufacturing, the key technologies of manufacturing resource access and cloud service modeling were discussed. A multi-level dynamic matching model and a comprehensive matching algorithm were proposed. The construction and testing of the cloud manufacturing platform was carried out, and the future works were given.


Business Process Modeling Algorithm Based On Ontology Language, Huang Ying, Kangshun Li, Li Wei, Keqing He Jun 2020

Business Process Modeling Algorithm Based On Ontology Language, Huang Ying, Kangshun Li, Li Wei, Keqing He

Journal of System Simulation

Abstract: In the view of problem in lack of information sharing mechanisms at the semantic level among processes, a business process modeling algorithm based on ontology language using concept hierarchy as background knowledge was proposed. The business process modeling by traditional business process languages can be transferred to ontology language (OWL) description so as to realize the semantic sharing of business process. The approach has two main advantages compared with traditional methods: (1) accelerating the building process, minimizing the conversion cost; (2) background knowledge guides the extraction of knowledge resided in database. As a way of validating the approach, part …


A Neuro-Ontology For The Neurological Examination, Daniel B. Hier, Steven U. Brint Mar 2020

A Neuro-Ontology For The Neurological Examination, Daniel B. Hier, Steven U. Brint

Chemistry Faculty Research & Creative Works

Background: The Use of Clinical Data in Electronic Health Records for Machine-Learning or Data Analytics Depends on the Conversion of Free Text into Machine-Readable Codes. We Have Examined the Feasibility of Capturing the Neurological Examination as Machine-Readable Codes based on UMLS Metathesaurus Concepts. Methods: We Created a Target Ontology for Capturing the Neurological Examination using 1100 Concepts from the UMLS Metathesaurus. We Created a Dataset of 2386 Test-Phrases based on 419 Published Neurological Cases. We Then Mapped the Test-Phrases to the Target Ontology. Results: We Were Able to Map All of the 2386 Test-Phrases to 601 Unique UMLS Concepts. a …


Ontology‐Driven Perspective Of Cfraas, Victor R. Kebande, Nickson M. Karie, Richard A. Ikuesan, Hein S. Venter Jan 2020

Ontology‐Driven Perspective Of Cfraas, Victor R. Kebande, Nickson M. Karie, Richard A. Ikuesan, Hein S. Venter

Research outputs 2014 to 2021

A Cloud Forensic Readiness as a Service (CFRaaS) model allows an environment to preemptively accumulate relevant potential digital evidence (PDE) which may be needed during a post‐event response process. The benefit of applying a CFRaaS model in a cloud environment, is that, it is designed to prevent the modification/tampering of the cloud architectures or the infrastructure during the reactive process, which if it could, may end up having far‐reaching implications. The authors of this article present the reactive process as a very costly exercise when the infrastructure must be reprogrammed every time the process is conducted. This may hamper successful …