scholarly journals ONTOLOGY MERGING USING PROTÉGÉ – A CASE STUDY

2021 ◽  
Vol 6 (22) ◽  
pp. 148-157
Author(s):  
Zailan Arabee Abdul Salam ◽  
Rabiah Abdul Kadir ◽  
Azreen Azman

The exponential growth of data and the boom of online businesses necessitates the need for data to be machine-readable, as humans are no longer able to manually manage the vast amounts of data. Ontologies can define concepts and relations that are amenable to processing by machines. Ontologies are created in silos and pockets of domains, and the need to merge these resources is key to universal access to multi-domain knowledge. Merging of ontologies has been explored to an extent over the last two decades, and this paper explores the extent of the tools and techniques available with a case study of merging two ontologies which are publicly available, the Person ontology and Institutional ontology, using the latest tools available on the most popular ontology editor, Protégé. It is found that automated merging tools have not been improved much over the last two decades, and the most current merging tools provided combine the two ontologies into one but do not unite or merge any of the classes or axioms which are equivalent. This can be seen in the axiom count, which does not decrease in the merged ontology, showing that no similar classes or actual axioms were merged. Protégé plugins which used to provide the semi-automatic mapping of similar classes to assist the merging process were found to be no longer available, and manual mapping by the knowledge engineer was required. This supports further research in automated ontology merging techniques.

Author(s):  
Goran Savić ◽  
Milan Segedinac ◽  
Dušica Milenković ◽  
Tamara Hrin ◽  
Mirjana Segedinac

This paper presents research on using a model-driven approach to the development and management of electronic courses. We propose a course management system which stores a course model represented as distinct machine-readable components containing domain knowledge of different course aspects. Based on this formally defined platform-independent source course model, the system programmatically generates a final course in different platform-specific target models. Currently, our system supports the generation of IMS learning design, SCORM, LAMS and Sakai courses. The case study presents a formal model of the Web programming course and its transformation to the supported target models.


2008 ◽  
Vol 22 (2) ◽  
pp. 249-277 ◽  
Author(s):  
Tod Sedbrook ◽  
Richard I. Newmark

ABSTRACT: Enterprise modelers require tools and techniques that consistently represent and logically apply domain knowledge. Current modeling approaches rely on entity relationship or unified modeling diagrams to represent semantic descriptions of business exchanges. However, it remains difficult to transform the implicit metadata, ontologies, and logic embedded in diagrams into a coherent form that can be interpreted by machines and delivered across the web. This study explores the uniting of machine processing capabilities of semantic web technologies with resource event agent (REA) enterprise ontologies to model complex multienterprise partnerships. Web Ontology Language (OWL) and Semantic Web Rule Language (SWRL) were used to model REA policies for a distributed e-commerce partnership selling nearly new vehicles. We combine a specialized REA application ontology with semantic technologies to direct multienterprise collaborations. We present a prototype that encodes the ontology's concepts within OWL and SWRL and explore these machine-readable representations within the context of a case study.


Author(s):  
Zhigang Song ◽  
Jochonia Nxumalo ◽  
Manuel Villalobos ◽  
Sweta Pendyala

Abstract Pin leakage continues to be on the list of top yield detractors for microelectronics devices. It is simply manifested as elevated current with one pin or several pins during pin continuity test. Although many techniques are capable to globally localize the fault of pin leakage, root cause analysis and identification for it are still very challenging with today’s advanced failure analysis tools and techniques. It is because pin leakage can be caused by any type of defect, at any layer in the device and at any process step. This paper presents a case study to demonstrate how to combine multiple techniques to accurately identify the root cause of a pin leakage issue for a device manufactured using advanced technology node. The root cause was identified as under-etch issue during P+ implantation hard mask opening for ESD protection diode, causing P+ implantation missing, which was responsible for the nearly ohmic type pin leakage.


Author(s):  
Richen Liu ◽  
Hailong Wang ◽  
Chuyu Zhang ◽  
Xiaojian Chen ◽  
Lijun Wang ◽  
...  

Abstract Motivation Narrative visualization for scientific data explorations can help users better understand the domain knowledge, because narrative visualizations often present a sequence of facts and observations linked together by a unifying theme or argument. Narrative visualization in immersive environments can provide users with an intuitive experience to interactively explore the scientific data, because immersive environments provide a brand new strategy for interactive scientific data visualization and exploration. However, it is challenging to develop narrative scientific visualization in immersive environments. In this paper, we propose an immersive narrative visualization tool to create and customize scientific data explorations for ordinary users with little knowledge about programming on scientific visualization, They are allowed to define POIs (point of interests) conveniently by the handler of an immersive device. Results Automatic exploration animations with narrative annotations can be generated by the gradual transitions between consecutive POI pairs. Besides, interactive slicing can be also controlled by device handler. Evaluations including user study and case study are designed and conducted to show the usability and effectiveness of the proposed tool. Availability Related information can be accessed at: https://dabigtou.github.io/richenliu/


2014 ◽  
Vol 23 (01) ◽  
pp. 177-181 ◽  
Author(s):  
W. Hersh ◽  
A. U. Jai Ganesh ◽  
P. Otero

Summary Objective: The growing volume and diversity of health and biomedical data indicate that the era of Big Data has arrived for healthcare. This has many implications for informatics, not only in terms of implementing and evaluating information systems, but also for the work and training of informatics researchers and professionals. This article addresses the question: What do biomedical and health informaticians working in analytics and Big Data need to know? Methods: We hypothesize a set of skills that we hope will be discussed among academic and other informaticians. Results: The set of skills includes: Programming - especially with data-oriented tools, such as SQL and statistical programming languages; Statistics - working knowledge to apply tools and techniques; Domain knowledge - depending on one’s area of work, bioscience or health care; and Communication - being able to understand needs of people and organizations, and articulate results back to them. Conclusion: Biomedical and health informatics educational programs must introduce concepts of analytics, Big Data, and the underlying skills to use and apply them into their curricula. The development of new coursework should focus on those who will become experts, with training aiming to provide skills in “deep analytical talent” as well as those who need knowledge to support such individuals.


Lately, value stream mapping (VSM) is integrated with tools and techniques that belong to other areas of knowledge such as risk management (RM). It is well known tool in showing the value, value stream and the flow which represents three of lean manufacturing (LM) principles. This integration, gives more benefit in covering two of VSM issues such as considering the variability and uncertainty of production processes. In this paper, a model named variable value stream mapping (V-VSM) that integrates the two was showed, explained and tested. The model helps to generate the VSM in a dynamic way with the identification of current and potential risks. These risks might happen in the future bringing a strong impact on not reaching the main objectives in the defined time and cost. The model has been tested by conducting a case study in food sector. A current state map was built using both models, traditional VSM and VVSM. The results showed the effect of variability and uncertainty on the total cycle time (CT) and lead time (LT) values, where the traditional VSM failed to show it by being a static tool. Comparing the results of both models show the differences in presenting the real state of manufacturing environment..


2021 ◽  
Author(s):  
◽  
Jieying Huang

<p><b>As a result of globalised development and the rise of capitalism, the craft of traditional Chinese paper cutting is facing marginalisation. The loss of this craft has resulted in a loss of opportunities to share the valuable role of this art form: to bring good wishes to people. The revitalisation of paper cutting as a component of contemporary design offers a strategy to sustain the value and meaning of this craft.</b></p> <p>My research explores a potential strategy that supports the transformation of Chinese paper cutting in the contemporary context through its application in design practice. This research investigates the traditional patterns applied to Chinese paper cutting and their implication and symbolic meaning within Chinese folk culture. Through the development of a criteria-led design case study, this research aims to translate these concepts into the formation of new design outcomes applicable to product packaging.</p> <p>As an element of packaging design, this approach intends to take advantage of the democratisation of and universal access to this medium ensuring wide dissemination to the public.</p> <p>The purpose of this research is to translate traditional paper cutting into a contemporary design approach that enables the values of this special Chinese craft to prosper.</p>


2018 ◽  
Vol 8 (9) ◽  
pp. 1275-1306 ◽  
Author(s):  
Rosemary Hunter

The various feminist judgment projects (FJPs) have explored through the imagined rewriting of judgments a range of ways in which a feminist perspective may be applied to the practice of judging. But how do these imagined judgments compare to what actual feminist judges do? This article presents the results of the author’s empirical research to date on ‘real world’ feminist judging. Drawing on case study and interview data it explores the how, when and where of feminist judging, that is, the feminist resources, tools and techniques judges have drawn upon, the stages in the hearing and decision-making process at which these resources, tools and techniques have been deployed, and the areas of law in which they have been applied. The article goes on to consider observed and potential limits on feminist judicial practice, before drawing conclusions about the comparison between ‘real world’ feminist judging and the practices of FJPs. Los proyectos de sentencias feministas, a través de la reelaboración imaginaria de sentencias judiciales, han explorado multitud de vías en las que las perspectivas feministas se podrían aplicar a la práctica judicial. Pero ¿qué resulta de la comparación entre dichas sentencias y la práctica real de las juezas feministas? Este artículo presenta los resultados de la investigación empírica de la autora. Se analiza el cómo, el cuándo y el dónde de la labor judicial feminista, es decir, los recursos, herramientas y técnicas feministas que las juezas han utilizado, las fases de audiencia y toma de decisión en las que se han utilizado y las áreas del derecho en que se han aplicado. Además, se toman en consideración los límites observados y potenciales de la práctica judicial feminista, y se extraen conclusiones sobre la comparación entre la labor judicial feminista en el “mundo real” y la práctica de los proyectos de tribunales feministas.


Sign in / Sign up

Export Citation Format

Share Document