An introduction to knowledge computing

To develop an extension to a traditional RDF model of describing knowledge graph in accordance with the standards of the Semantic Web. The concept of Executable Knowledge for Protege based on traditional types of properties within the RDF model.

Подобные документы

  • The concept of image segmentation as one of the topics of computer vision. The features of the process of dividing the image into segments that contain pixels of similar color. The implementation of the algorithm based on Kruskal's algorithm in C++.

    статья, добавлен 23.02.2016

  • Make translation of paper-based procedures to networked digital ones hard. Specific non-repudiation services. General contribution to multi-party problem. Summary of MPNR protocol properties. Supporting legal framework. Main model simulation event.

    книга, добавлен 08.03.2014

  • The model and structure of the intrusion detection system, which is built on the basis of immunological principles. Detecting the network traffic status. The decision rules for the classification of States of network traffic of a computer network.

    статья, добавлен 24.03.2016

  • Analysis of the widespread approach to modeling and verification of systems, known as Model Checking, which allows to identify errors at different stages of development and maintenance of territorial development programs in order to eliminate them.

    статья, добавлен 30.04.2018

  • Data warehouse base theory. The description of Extract Transform Load processes. Introduction into OpenStreetMap, base knowledge. Extract Transform Load process planning. Extracting and transformation data. Analysis of the developed data warehouse.

    практическая работа, добавлен 13.02.2016

  • Instructional design model is approaching creating rules to address into learning. The model was designed for simulation and that may easy to utilize by adept and beginner. The Ausubel’s Assimilation Theory is theory focus on "meaningful learning".

    реферат, добавлен 06.02.2014

  • Особенности процесса разработки фреймовой онтологии для компании с помощью программы Protege. Характеристика этапов создания классов, слотов и запросов. Запуск программы Protege и создание нового проекта, автоматическая генерация формы для любого класса.

    статья, добавлен 07.11.2018

  • Modeling an optoelectronic fire smoke alarm detector at the functional diagram level by means of Matlab tools. Characteristics of developed detector model and evaluating the ability of the logic unit to distinguishing between fire signals and noise.

    статья, добавлен 26.06.2016

  • Characteristics of the model research cyber-physical systems in industrial production. Description of the hardware installation process and software environment. Consideration of modern approaches to modeling distributed software and semantic data.

    статья, добавлен 23.02.2016

  • Synthesis SIS model with a uniform two-dimensional spatial distribution of individuals who are in the evolution of such discrete time Markov. The simple square lattice. Computer simulations of a stochastic model for the non-immune disease spread.

    статья, добавлен 14.01.2017

  • Analysis of the model for creating irregular 3D objects. Structural model of a compact reverse engineering system. The possibilities of formalizing and automating the creation of complex 3D objects. Mathematical model of digitization of complex objects.

    статья, добавлен 03.02.2019

  • Course determination algorithm that proposed based on the correlation of pairs of images. The errors of course determination that are investigated for different threshold values of normalized correlation coefficient. Components of course errors.

    статья, добавлен 26.10.2016

  • Features of testing on the usability, functionality and acceptability of an interactive system. Some approaches, based on expert evaluation: review, query techniques, analytic and model-based methods. Principles of choosing ways of measurements.

    презентация, добавлен 28.12.2013

  • Faster explicit formulas for computing pairings over ordinary curves. Secure authentication from a weak key, without leaking information. Towards a game theoretic view of secure computation. Concurrent composition in the bounded quantum storage model.

    книга, добавлен 08.03.2014

  • Suggestion information model of environment of computer-aided design, consisting of a сontrol processor, thematic coprocessors and executing processors. The scheme of processors control in the information model. Interaction of thematic coprocessors.

    статья, добавлен 22.12.2016

  • Using the ICARE Format for Structuring Online Courses. Instructional design is a system of procedures for developing education and training programs in a consistent and reliable fashion. Model concentrates on the connection between content, context.

    реферат, добавлен 06.02.2014

  • Разработка онтологии с помощью программного средства Protege. Способы моделирования онтологий посредством редакторов Protege-Frames и ProtegeOWL. Создание прецедентов после создания иерархии классов и параметров. Составление списков экземпляров классов.

    статья, добавлен 12.04.2019

  • Cyc и онтологии. Предикаты: типы аргументов. Переменные формулы и термы. Атомные формулы: примеры. CycL: квантификаторы. ASK операция. Продукты компании Cyc Knowledge Server Cyc Answers. Разрешение референции. Организация top ontology. Имена констант.

    презентация, добавлен 01.09.2013

  • Понятие процесса КДД (knowledge discovery in databases - обнаружение знаний в базах данных) и его основные этапы. Анализ данных как инструмент искусственного интеллекта, перспективы его развития. Технология КДД в медико-биологических исследованиях.

    статья, добавлен 17.10.2014

  • The Random Oracle Model and the Ideal Cipher Model Are Equivalent. Programmable Hash Functions and Their Applications. Adaptive One-Way Functions and Applications. Bits Security of the Elliptic Curve Diffie–Hellman Secret Keys. Cryptanalysis of MinRank.

    книга, добавлен 08.03.2014

  • Digital signatures: background and definitions. Cryptographic hardness assumptions and constructions based on general assumptions, signature schemes based on the (strong) RSA assumption. The random oracle model and full-domain hash (related) schemes.

    книга, добавлен 08.03.2014

  • Development of the mathematical model of invariant image processing in the visual system. The principles of constructing a functional that reaches a maximum when the values of the transformations are equal to the hidden transformations of the signal.

    статья, добавлен 22.12.2016

  • Використання веб-сервісів і фреймворків для розробки шаблонів з великих об’ємів просторових даних. Розробка алгоритмів розподілу, ієрархії та кластеризації геопросторових об’єктів. Переваги технології Knowledge Mining. Утиліти управління сховищем.

    статья, добавлен 12.08.2022

  • Рассмотрение существующих моделей разработки программного обеспечения. Представление схем, требований, особенностей методологии, базовых концепций, преимуществ и условий применения таких моделей, как Waterfall, V-Model, Rad Model, Spiral, Kanban, Scrum.

    презентация, добавлен 16.02.2018

  • General characteristics of the comparator model of text correspondence and objective situations described by them. Acquaintance with the most important tasks of the theory of intelligence. Analysis of functional and target models of intellectual activity.

    статья, добавлен 11.10.2018

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.