An introduction to knowledge computing

To develop an extension to a traditional RDF model of describing knowledge graph in accordance with the standards of the Semantic Web. The concept of Executable Knowledge for Protege based on traditional types of properties within the RDF model.

Подобные документы

  • Ubiquitous computing - filling the real world with computers. Challenging HCI Assumptions. Implications for device size as well as relationship to people. Defining the Interaction Experience. Multi-scale and distributed output. Merging Digital Worlds.

    презентация, добавлен 28.12.2013

  • The development of the knowledge society, digital technologies, digital society, all that is called the "digital era" of civilization. In the modern world, a new interpretation of the information society, namely smart-society and technologies, has spread.

    статья, добавлен 09.04.2022

  • Basics of Contemporary Cryptography. Codes for Error Detection. Advances in Coding Theory and Cryptography. Encryption Basics. Authentication Codes in the Query Model. Collision in the DSA Function. Fuzzy Identity-based Encryption: Efficient Schemes.

    учебное пособие, добавлен 08.03.2014

  • The research paper aims to develop an Search Engine Optimization for commercial site. The paper considers a model of analysis of Search Engine Optimization examples for competing sites. The level of relevance of Search Engine Optimization is determined.

    статья, добавлен 22.09.2022

  • The creating and operating an arbitrary Database in computer mathematics. The conceptual design acts as the construction of an information model of the subject area of the. The definition of the objects of the subject area of the DB, their properties.

    статья, добавлен 17.02.2021

  • The values of indicators of the quality of TCP connections specific to each type of Slow HTTP-attacks. A mathematical model formalizing the behavior of the web server when implementing Slow HTTP-attacks of various types, architecture of detection.

    статья, добавлен 14.01.2017

  • Analysis of the model of dynamic classification software applications included in the business critical systems for security access. Information technology, allowing to distinguish three basic classes of safety-critical access software applications.

    статья, добавлен 22.12.2016

  • Human Insulin, PDB entry 1AIO. Image produced with PDB Structure Explorer, which is based on MolScript. Virus structure, superimposed over its PDB summary information. Image produced with PDB Structure Explorer, which is based on MolScript and Raster3D.

    учебное пособие, добавлен 25.11.2013

  • Технология Semantic Web. Построение онтологии, формирование словаря без централизованного управления. Проблемы навигации в сети. Разработка алгоритмов ранжирования объектов Semantic Web на трех уровнях детализации: документов, терминов и RDF графов.

    статья, добавлен 26.05.2017

  • Способ получения конкурентных преимуществ за счет увеличения скорости обработки больших объемов данных при помощи технологии in-memory computing. Роль инновационной технологии в создании конкурентного преимущества для фирмы в борьбе с оппонентами.

    статья, добавлен 18.03.2018

  • Consideration of four major requirements when a biometric template protection algorithm is designed. The definition of a secure authentication model, based on fingerprint template protection by using the approaches of cryptography and watermarking.

    статья, добавлен 26.01.2018

  • Comparison of several common approaches to the analysis of system logs and streaming data generated en masse by the company's IT infrastructure. Characteristics of model-based anomaly search algorithms and hierarchical temporary memory algorithms.

    статья, добавлен 28.05.2021

  • Изучение способов поиска информации в онтологии, разработанной в Protege. Создание запросов в соответствии с дескрипционной логикой на языке OWL. Создание запросов на языке SPARQL. Пример выполнения запроса "по умолчанию" с применением данных о литералах.

    лабораторная работа, добавлен 29.10.2021

  • Формальные языки онтологии в пространстве Semantic Web и современных системах искусственного интеллекта. Semantic Web - сеть информационных узлов, связанных друг с другом таким образом, чтобы имеющаяся информация могла легко обрабатываться компьютером.

    курсовая работа, добавлен 04.05.2012

  • Математичний підхід з використанням нечітких моделей для опису об’єктів житлового середовища з використанням сучасних інформаційних технологій. Показники у вигляді онтологічної системи, представленої за допомогою інструментального засобу Protege.

    статья, добавлен 14.01.2017

  • Factoring and discrete logarithm. One-way trapdoor permutations are sufficient for non-trivial single-server private information retrieval. Authenticate key exchange secure against dictionary attacks. Computing inverses over a shared secret modulus.

    курс лекций, добавлен 08.03.2014

  • A proposed public key distribution protocol, which is based on diffie-hellman problem is a two-pass protocol and has many of desirable secrity; the protocol is an extension diffie-hellman key exchange using random numbers and establishes a shared key K.

    курс лекций, добавлен 08.03.2014

  • Designing for maximum usability. The essential characteristics of rules in the form of standards and guidelines in order to enhance the interactive properties of the system. Principles of flexibility and robustness. HCI design patterns and golden rules.

    презентация, добавлен 28.12.2013

  • Об игре Spider2 и начало ее разработки. Схема работы приложения, представление в виде блок схемы. Изучение операционной системы Android. Разработка класса Graph, рисование с помощью android.graph. Класс GameLogic и техника разработка логики игры.

    курсовая работа, добавлен 25.12.2014

  • Digital transformation is a concept that introduces the state and companies to the application of technologies and processes that include data digitization, cloud computing. An assessment of how the digital conversion program is being implemented in RF.

    дипломная работа, добавлен 01.12.2019

  • Perform the comprehensive analysis of the GraphQL field by first outlining the GraphQL concept and its structure, followed by an organized mapping analysis of main studies. Delves and highlights the importance of adept testing in the GraphQL era.

    статья, добавлен 24.02.2024

  • Characteristics of the segment of cloud technologies in Russia, an analysis of their advantages and disadvantages. The main types of cloud services models, the problems of their use (confidentiality, security). Preferences of using clouds in Russia.

    статья, добавлен 06.05.2018

  • Computing the Cassels pairing classes in Tate group. The calculation of the pairing on twisted Edwards in the form of elliptic curves. Control malicious proxy re-encryption. Security and anonymity-based encryption with trusted certification authorities.

    материалы конференции, добавлен 08.03.2014

  • Clustering algorithms for very large database used in image processing and video. Search for groups (classes, clusters, segments) of the objects surveyed in the analyzed information arrays. Multidimensional vectors forming a traditional data table.

    статья, добавлен 14.01.2017

  • This history on key moments of evolution electronic digital computer: the transformation of the computer from a specialized scientific instrument to a commercial product; the beginning of personal computing and the spread of networking after 1980s.

    книга, добавлен 25.11.2013

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.