An introduction to knowledge computing
To develop an extension to a traditional RDF model of describing knowledge graph in accordance with the standards of the Semantic Web. The concept of Executable Knowledge for Protege based on traditional types of properties within the RDF model.
Подобные документы
The accuracy and noise immunity of the interpolation method of nonlinear dynamical systems identification based on the Volterra model in the frequency domain. The algorithmic and software toolkit in Matlab is developed for the identification procedure.
??????, добавлен 23.06.2016The concept of image segmentation as one of the topics of computer vision. The features of the process of dividing the image into segments that contain pixels of similar color. The implementation of the algorithm based on Kruskal's algorithm in C++.
??????, добавлен 23.02.2016The model and structure of the intrusion detection system, which is built on the basis of immunological principles. Detecting the network traffic status. The decision rules for the classification of States of network traffic of a computer network.
??????, добавлен 24.03.2016Make translation of paper-based procedures to networked digital ones hard. Specific non-repudiation services. General contribution to multi-party problem. Summary of MPNR protocol properties. Supporting legal framework. Main model simulation event.
?????, добавлен 08.03.2014Analysis of the widespread approach to modeling and verification of systems, known as Model Checking, which allows to identify errors at different stages of development and maintenance of territorial development programs in order to eliminate them.
??????, добавлен 30.04.2018Data warehouse base theory. The description of Extract Transform Load processes. Introduction into OpenStreetMap, base knowledge. Extract Transform Load process planning. Extracting and transformation data. Analysis of the developed data warehouse.
???????????? ??????, добавлен 13.02.2016Instructional design model is approaching creating rules to address into learning. The model was designed for simulation and that may easy to utilize by adept and beginner. The Ausubel’s Assimilation Theory is theory focus on "meaningful learning".
???????, добавлен 06.02.2014??????????? ???????? ?????????? ????????? ????????? ??? ???????? ? ??????? ????????? Protege. ?????????????? ?????? ???????? ???????, ?????? ? ????????. ?????? ????????? Protege ? ???????? ?????? ???????, ?????????????? ????????? ????? ??? ?????? ??????.
??????, добавлен 07.11.2018Modeling an optoelectronic fire smoke alarm detector at the functional diagram level by means of Matlab tools. Characteristics of developed detector model and evaluating the ability of the logic unit to distinguishing between fire signals and noise.
??????, добавлен 26.06.2016Characteristics of the model research cyber-physical systems in industrial production. Description of the hardware installation process and software environment. Consideration of modern approaches to modeling distributed software and semantic data.
??????, добавлен 23.02.2016Synthesis SIS model with a uniform two-dimensional spatial distribution of individuals who are in the evolution of such discrete time Markov. The simple square lattice. Computer simulations of a stochastic model for the non-immune disease spread.
??????, добавлен 14.01.2017Analysis of the model for creating irregular 3D objects. Structural model of a compact reverse engineering system. The possibilities of formalizing and automating the creation of complex 3D objects. Mathematical model of digitization of complex objects.
??????, добавлен 03.02.2019Course determination algorithm that proposed based on the correlation of pairs of images. The errors of course determination that are investigated for different threshold values of normalized correlation coefficient. Components of course errors.
??????, добавлен 26.10.2016Features of testing on the usability, functionality and acceptability of an interactive system. Some approaches, based on expert evaluation: review, query techniques, analytic and model-based methods. Principles of choosing ways of measurements.
???????????, добавлен 28.12.2013Faster explicit formulas for computing pairings over ordinary curves. Secure authentication from a weak key, without leaking information. Towards a game theoretic view of secure computation. Concurrent composition in the bounded quantum storage model.
?????, добавлен 08.03.2014Suggestion information model of environment of computer-aided design, consisting of a ?ontrol processor, thematic coprocessors and executing processors. The scheme of processors control in the information model. Interaction of thematic coprocessors.
??????, добавлен 22.12.2016- 42. ICARE model
Using the ICARE Format for Structuring Online Courses. Instructional design is a system of procedures for developing education and training programs in a consistent and reliable fashion. Model concentrates on the connection between content, context.
???????, добавлен 06.02.2014 - 43. ?????????? ?????? ??????????? ?? ??????????? ? ????? "???????" ??? ??????? ?????? ???????????????
?????????? ????????? ? ??????? ???????????? ???????? Protege. ??????? ????????????? ????????? ??????????? ?????????? Protege-Frames ? ProtegeOWL. ???????? ??????????? ????? ???????? ???????? ??????? ? ??????????. ??????????? ??????? ??????????? ???????.
??????, добавлен 12.04.2019 - 44. ????????? CYC
Cyc ? ?????????. ?????????: ???? ??????????. ?????????? ??????? ? ?????. ??????? ???????: ???????. CycL: ??????????????. ASK ????????. ???????? ???????? Cyc Knowledge Server Cyc Answers. ?????????? ??????????. ??????????? top ontology. ????? ????????.
???????????, добавлен 01.09.2013 ??????? ???????? ??? (knowledge discovery in databases - ??????????? ?????? ? ????? ??????) ? ??? ???????? ?????. ?????? ?????? ??? ?????????? ?????????????? ??????????, ??????????? ??? ????????. ?????????? ??? ? ??????-????????????? ?????????????.
??????, добавлен 17.10.2014The Random Oracle Model and the Ideal Cipher Model Are Equivalent. Programmable Hash Functions and Their Applications. Adaptive One-Way Functions and Applications. Bits Security of the Elliptic Curve Diffie–Hellman Secret Keys. Cryptanalysis of MinRank.
?????, добавлен 08.03.2014- 47. Algorithms of selection of essential features of signals, which are invariant to move and rotation
Development of the mathematical model of invariant image processing in the visual system. The principles of constructing a functional that reaches a maximum when the values of the transformations are equal to the hidden transformations of the signal.
??????, добавлен 22.12.2016 Digital signatures: background and definitions. Cryptographic hardness assumptions and constructions based on general assumptions, signature schemes based on the (strong) RSA assumption. The random oracle model and full-domain hash (related) schemes.
?????, добавлен 08.03.2014???????????? ???-???????? ? ??????????? ??? ???????? ???????? ? ??????? ??’???? ??????????? ?????. ???????? ?????????? ?????????, ???????? ?? ????????????? ?????????????? ??’?????. ???????? ?????????? Knowledge Mining. ??????? ?????????? ????????.
??????, добавлен 12.08.2022???????????? ???????????? ??????? ?????????? ???????????? ???????????. ????????????? ????, ??????????, ???????????? ???????????, ??????? ?????????, ??????????? ? ??????? ?????????? ????? ???????, ??? Waterfall, V-Model, Rad Model, Spiral, Kanban, Scrum.
???????????, добавлен 16.02.2018