An introduction to knowledge computing

To develop an extension to a traditional RDF model of describing knowledge graph in accordance with the standards of the Semantic Web. The concept of Executable Knowledge for Protege based on traditional types of properties within the RDF model.

Подобные документы

  • The accuracy and noise immunity of the interpolation method of nonlinear dynamical systems identification based on the Volterra model in the frequency domain. The algorithmic and software toolkit in Matlab is developed for the identification procedure.

    ??????, добавлен 23.06.2016

  • The concept of image segmentation as one of the topics of computer vision. The features of the process of dividing the image into segments that contain pixels of similar color. The implementation of the algorithm based on Kruskal's algorithm in C++.

    ??????, добавлен 23.02.2016

  • The model and structure of the intrusion detection system, which is built on the basis of immunological principles. Detecting the network traffic status. The decision rules for the classification of States of network traffic of a computer network.

    ??????, добавлен 24.03.2016

  • Make translation of paper-based procedures to networked digital ones hard. Specific non-repudiation services. General contribution to multi-party problem. Summary of MPNR protocol properties. Supporting legal framework. Main model simulation event.

    ?????, добавлен 08.03.2014

  • Analysis of the widespread approach to modeling and verification of systems, known as Model Checking, which allows to identify errors at different stages of development and maintenance of territorial development programs in order to eliminate them.

    ??????, добавлен 30.04.2018

  • Data warehouse base theory. The description of Extract Transform Load processes. Introduction into OpenStreetMap, base knowledge. Extract Transform Load process planning. Extracting and transformation data. Analysis of the developed data warehouse.

    ???????????? ??????, добавлен 13.02.2016

  • Instructional design model is approaching creating rules to address into learning. The model was designed for simulation and that may easy to utilize by adept and beginner. The Ausubel’s Assimilation Theory is theory focus on "meaningful learning".

    ???????, добавлен 06.02.2014

  • ??????????? ???????? ?????????? ????????? ????????? ??? ???????? ? ??????? ????????? Protege. ?????????????? ?????? ???????? ???????, ?????? ? ????????. ?????? ????????? Protege ? ???????? ?????? ???????, ?????????????? ????????? ????? ??? ?????? ??????.

    ??????, добавлен 07.11.2018

  • Modeling an optoelectronic fire smoke alarm detector at the functional diagram level by means of Matlab tools. Characteristics of developed detector model and evaluating the ability of the logic unit to distinguishing between fire signals and noise.

    ??????, добавлен 26.06.2016

  • Characteristics of the model research cyber-physical systems in industrial production. Description of the hardware installation process and software environment. Consideration of modern approaches to modeling distributed software and semantic data.

    ??????, добавлен 23.02.2016

  • Synthesis SIS model with a uniform two-dimensional spatial distribution of individuals who are in the evolution of such discrete time Markov. The simple square lattice. Computer simulations of a stochastic model for the non-immune disease spread.

    ??????, добавлен 14.01.2017

  • Analysis of the model for creating irregular 3D objects. Structural model of a compact reverse engineering system. The possibilities of formalizing and automating the creation of complex 3D objects. Mathematical model of digitization of complex objects.

    ??????, добавлен 03.02.2019

  • Course determination algorithm that proposed based on the correlation of pairs of images. The errors of course determination that are investigated for different threshold values of normalized correlation coefficient. Components of course errors.

    ??????, добавлен 26.10.2016

  • Features of testing on the usability, functionality and acceptability of an interactive system. Some approaches, based on expert evaluation: review, query techniques, analytic and model-based methods. Principles of choosing ways of measurements.

    ???????????, добавлен 28.12.2013

  • Faster explicit formulas for computing pairings over ordinary curves. Secure authentication from a weak key, without leaking information. Towards a game theoretic view of secure computation. Concurrent composition in the bounded quantum storage model.

    ?????, добавлен 08.03.2014

  • Suggestion information model of environment of computer-aided design, consisting of a ?ontrol processor, thematic coprocessors and executing processors. The scheme of processors control in the information model. Interaction of thematic coprocessors.

    ??????, добавлен 22.12.2016

  • Using the ICARE Format for Structuring Online Courses. Instructional design is a system of procedures for developing education and training programs in a consistent and reliable fashion. Model concentrates on the connection between content, context.

    ???????, добавлен 06.02.2014

  • ?????????? ????????? ? ??????? ???????????? ???????? Protege. ??????? ????????????? ????????? ??????????? ?????????? Protege-Frames ? ProtegeOWL. ???????? ??????????? ????? ???????? ???????? ??????? ? ??????????. ??????????? ??????? ??????????? ???????.

    ??????, добавлен 12.04.2019

  • Cyc ? ?????????. ?????????: ???? ??????????. ?????????? ??????? ? ?????. ??????? ???????: ???????. CycL: ??????????????. ASK ????????. ???????? ???????? Cyc Knowledge Server Cyc Answers. ?????????? ??????????. ??????????? top ontology. ????? ????????.

    ???????????, добавлен 01.09.2013

  • ??????? ???????? ??? (knowledge discovery in databases - ??????????? ?????? ? ????? ??????) ? ??? ???????? ?????. ?????? ?????? ??? ?????????? ?????????????? ??????????, ??????????? ??? ????????. ?????????? ??? ? ??????-????????????? ?????????????.

    ??????, добавлен 17.10.2014

  • The Random Oracle Model and the Ideal Cipher Model Are Equivalent. Programmable Hash Functions and Their Applications. Adaptive One-Way Functions and Applications. Bits Security of the Elliptic Curve Diffie–Hellman Secret Keys. Cryptanalysis of MinRank.

    ?????, добавлен 08.03.2014

  • Development of the mathematical model of invariant image processing in the visual system. The principles of constructing a functional that reaches a maximum when the values of the transformations are equal to the hidden transformations of the signal.

    ??????, добавлен 22.12.2016

  • Digital signatures: background and definitions. Cryptographic hardness assumptions and constructions based on general assumptions, signature schemes based on the (strong) RSA assumption. The random oracle model and full-domain hash (related) schemes.

    ?????, добавлен 08.03.2014

  • ???????????? ???-???????? ? ??????????? ??? ???????? ???????? ? ??????? ??’???? ??????????? ?????. ???????? ?????????? ?????????, ???????? ?? ????????????? ?????????????? ??’?????. ???????? ?????????? Knowledge Mining. ??????? ?????????? ????????.

    ??????, добавлен 12.08.2022

  • ???????????? ???????????? ??????? ?????????? ???????????? ???????????. ????????????? ????, ??????????, ???????????? ???????????, ??????? ?????????, ??????????? ? ??????? ?????????? ????? ???????, ??? Waterfall, V-Model, Rad Model, Spiral, Kanban, Scrum.

    ???????????, добавлен 16.02.2018

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.