An introduction to knowledge computing

To develop an extension to a traditional RDF model of describing knowledge graph in accordance with the standards of the Semantic Web. The concept of Executable Knowledge for Protege based on traditional types of properties within the RDF model.

Подобные документы

  • The terms of the security of critical infrastructure. Construction and characterization of a model of security management of critical infrastructure, allowing you to easily determine how the criticality of certain infrastructure, General infrastructure.

    статья, добавлен 28.02.2016

  • The conclusions of our previous and other ongoing experiments to create a knowledge base on a given topic. Development of remote control system for home automation, forming a wireless connection for remote control of the position of the servomotor.

    статья, добавлен 26.08.2020

  • A new model of the take-off weight of the aircraft determining process and the weight distribution of passengers’ law. A simulation of the operations in the preparation for departure process. The effect of weight on the passenger aircraft alignment.

    статья, добавлен 27.06.2016

  • Ubiquitous computing - filling the real world with computers. Challenging HCI Assumptions. Implications for device size as well as relationship to people. Defining the Interaction Experience. Multi-scale and distributed output. Merging Digital Worlds.

    презентация, добавлен 28.12.2013

  • The development of the knowledge society, digital technologies, digital society, all that is called the "digital era" of civilization. In the modern world, a new interpretation of the information society, namely smart-society and technologies, has spread.

    статья, добавлен 09.04.2022

  • Basics of Contemporary Cryptography. Codes for Error Detection. Advances in Coding Theory and Cryptography. Encryption Basics. Authentication Codes in the Query Model. Collision in the DSA Function. Fuzzy Identity-based Encryption: Efficient Schemes.

    учебное пособие, добавлен 08.03.2014

  • The creating and operating an arbitrary Database in computer mathematics. The conceptual design acts as the construction of an information model of the subject area of the. The definition of the objects of the subject area of the DB, their properties.

    статья, добавлен 17.02.2021

  • The research paper aims to develop an Search Engine Optimization for commercial site. The paper considers a model of analysis of Search Engine Optimization examples for competing sites. The level of relevance of Search Engine Optimization is determined.

    статья, добавлен 22.09.2022

  • The values of indicators of the quality of TCP connections specific to each type of Slow HTTP-attacks. A mathematical model formalizing the behavior of the web server when implementing Slow HTTP-attacks of various types, architecture of detection.

    статья, добавлен 14.01.2017

  • Analysis of the model of dynamic classification software applications included in the business critical systems for security access. Information technology, allowing to distinguish three basic classes of safety-critical access software applications.

    статья, добавлен 22.12.2016

  • Human Insulin, PDB entry 1AIO. Image produced with PDB Structure Explorer, which is based on MolScript. Virus structure, superimposed over its PDB summary information. Image produced with PDB Structure Explorer, which is based on MolScript and Raster3D.

    учебное пособие, добавлен 25.11.2013

  • Технология Semantic Web. Построение онтологии, формирование словаря без централизованного управления. Проблемы навигации в сети. Разработка алгоритмов ранжирования объектов Semantic Web на трех уровнях детализации: документов, терминов и RDF графов.

    статья, добавлен 26.05.2017

  • Способ получения конкурентных преимуществ за счет увеличения скорости обработки больших объемов данных при помощи технологии in-memory computing. Роль инновационной технологии в создании конкурентного преимущества для фирмы в борьбе с оппонентами.

    статья, добавлен 18.03.2018

  • Consideration of four major requirements when a biometric template protection algorithm is designed. The definition of a secure authentication model, based on fingerprint template protection by using the approaches of cryptography and watermarking.

    статья, добавлен 26.01.2018

  • Изучение способов поиска информации в онтологии, разработанной в Protege. Создание запросов в соответствии с дескрипционной логикой на языке OWL. Создание запросов на языке SPARQL. Пример выполнения запроса "по умолчанию" с применением данных о литералах.

    лабораторная работа, добавлен 29.10.2021

  • Comparison of several common approaches to the analysis of system logs and streaming data generated en masse by the company's IT infrastructure. Characteristics of model-based anomaly search algorithms and hierarchical temporary memory algorithms.

    статья, добавлен 28.05.2021

  • Формальные языки онтологии в пространстве Semantic Web и современных системах искусственного интеллекта. Semantic Web - сеть информационных узлов, связанных друг с другом таким образом, чтобы имеющаяся информация могла легко обрабатываться компьютером.

    курсовая работа, добавлен 04.05.2012

  • Математичний підхід з використанням нечітких моделей для опису об’єктів житлового середовища з використанням сучасних інформаційних технологій. Показники у вигляді онтологічної системи, представленої за допомогою інструментального засобу Protege.

    статья, добавлен 14.01.2017

  • Factoring and discrete logarithm. One-way trapdoor permutations are sufficient for non-trivial single-server private information retrieval. Authenticate key exchange secure against dictionary attacks. Computing inverses over a shared secret modulus.

    курс лекций, добавлен 08.03.2014

  • A proposed public key distribution protocol, which is based on diffie-hellman problem is a two-pass protocol and has many of desirable secrity; the protocol is an extension diffie-hellman key exchange using random numbers and establishes a shared key K.

    курс лекций, добавлен 08.03.2014

  • Об игре Spider2 и начало ее разработки. Схема работы приложения, представление в виде блок схемы. Изучение операционной системы Android. Разработка класса Graph, рисование с помощью android.graph. Класс GameLogic и техника разработка логики игры.

    курсовая работа, добавлен 25.12.2014

  • Designing for maximum usability. The essential characteristics of rules in the form of standards and guidelines in order to enhance the interactive properties of the system. Principles of flexibility and robustness. HCI design patterns and golden rules.

    презентация, добавлен 28.12.2013

  • Digital transformation is a concept that introduces the state and companies to the application of technologies and processes that include data digitization, cloud computing. An assessment of how the digital conversion program is being implemented in RF.

    дипломная работа, добавлен 01.12.2019

  • Perform the comprehensive analysis of the GraphQL field by first outlining the GraphQL concept and its structure, followed by an organized mapping analysis of main studies. Delves and highlights the importance of adept testing in the GraphQL era.

    статья, добавлен 24.02.2024

  • Characteristics of the segment of cloud technologies in Russia, an analysis of their advantages and disadvantages. The main types of cloud services models, the problems of their use (confidentiality, security). Preferences of using clouds in Russia.

    статья, добавлен 06.05.2018

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.