• Title/Summary/Keyword: Software knowledge

Search Result 1,060, Processing Time 0.023 seconds

Semantic-based Mashup Platform for Contents Convergence

  • Yongju Lee;Hongzhou Duan;Yuxiang Sun
    • International journal of advanced smart convergence
    • /
    • v.12 no.2
    • /
    • pp.34-46
    • /
    • 2023
  • A growing number of large scale knowledge graphs raises several issues how knowledge graph data can be organized, discovered, and integrated efficiently. We present a novel semantic-based mashup platform for contents convergence which consists of acquisition, RDF storage, ontology learning, and mashup subsystems. This platform servers a basis for developing other more sophisticated applications required in the area of knowledge big data. Moreover, this paper proposes an entity matching method using graph convolutional network techniques as a preliminary work for automatic classification and discovery on knowledge big data. Using real DBP15K and SRPRS datasets, the performance of our method is compared with some existing entity matching methods. The experimental results show that the proposed method outperforms existing methods due to its ability to increase accuracy and reduce training time.

Role of Database Management Systems in Selected Engineering Institutions of Andhra Pradesh: An Analytical Survey

  • Kumar, Kutty
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.6 no.1
    • /
    • pp.41-68
    • /
    • 2016
  • This paper aims to analyze the function of database management systems from the perspective of librarians working in engineering institutions in Andhra Pradesh. Ninety-eight librarians from one hundred thirty engineering institutions participated in the study. The paper reveals that training by computer suppliers and software packages are the significant mode of acquiring DBMS skills by librarians; three-fourths of the librarians are postgraduate degree holders. Most colleges use database applications for automation purposes and content value. Electrical problems and untrained staff seem to be major constraints faced by respondents for managing library databases.

Design and Development of a Web Based Digital Repository for Scholarly Communication: A Case of NM-AIST Tanzania

  • Mgonzo, Wasiwasi J.;Yonah, Zaipuna O.
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.4 no.2
    • /
    • pp.97-108
    • /
    • 2014
  • Institutional repositories are essential research infrastructures for research-based universities. A properly dimensioned institutional repository has the potential to increase research impact and enhance the visibility of an institution through its scholarly outputs. The aim of the study reported in this paper was to design and develop a web-based digital repository for scholarly communications using NM-AIST as a case study. The system was developed using open source software. Findings obtained from system validation tests show that the system is a viable solution to the major challenges encountered in the management and sharing of scholarly information at the institution.

Anonymous Authentication Scheme based on NTRU for the Protection of Payment Information in NFC Mobile Environment

  • Park, Sung-Wook;Lee, Im-Yeong
    • Journal of Information Processing Systems
    • /
    • v.9 no.3
    • /
    • pp.461-476
    • /
    • 2013
  • Recently, smart devices for various services have been developed using converged telecommunications, and the markets for near field communication mobile services is expected to grow rapidly. In particular, the realization of mobile NFC payment services is expected to go commercial, and it is widely attracting attention both on a domestic and global level. However, this realization would increase privacy infringement, as personal information is extensively used in the NFC technology. One example of such privacy infringement would be the case of the Google wallet service. In this paper, we propose an zero-knowledge proof scheme and ring signature based on NTRU for protecting user information in NFC mobile payment systems without directly using private financial information of the user.

Design Requirements-Driven Process for Developing Human-System Interfaces (설계 요건 중심의 인간-시스템 인터페이스 개발 프로세스)

  • Ham, Dong-Han
    • Journal of the Korea Safety Management & Science
    • /
    • v.10 no.1
    • /
    • pp.83-90
    • /
    • 2008
  • Development of human-system interfaces (HSI) supporting the interaction between human and automation-based systems, particularly safety-critical sociotechnial systems, entails a wide range of design and evaluation problems. To help HSI designers deal with these problems, many methodologies from traditional human-computer interaction, software engineering, and systems engineering have been applied; however, they have been proved inadequate to develop cognitively well engineered HSI. This paper takes a viewpoint that HSI development is itself a cognitive process consisting of various decision making and problem solving activities and then proposes a design requirements-driven process for developing HSI. High-level design problems and their corresponding design requirements for visual information display are explained to clarify the concept of design requirements. Lastly, conceptual design of software system to support the requirements-driven process and designers' knowledge management is described.

Information Retrieval Tools as Predictors for Information Resources Utilization in Academic Libraries in Nigeria

  • David-West, Boma Torukwein
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.10 no.3
    • /
    • pp.21-31
    • /
    • 2020
  • The study examined information retrieval tools as predictors for information resources utilization, four research questions, and four hypotheses were made to guide the study. A descriptive survey was adopted for the study. Random sampling technique was used to select sample of 393 from a population of 557 academic staff registered in the University of Port Harcourt library. The questionnaire was adopted as a data collection instrument titled Information retrieval as predictors for information resources utilization (IRPIRUQ). Data were analyzed using both simple and multiple regression while analysis of variance (ANOVA) associate with regression was used for testing the hypotheses at 0.05 alpha level. The study revealed that information resources are under utilized as the OPAC and Online Databases are not easily accessed. Further findings showed that the academic staff made use of internet search engines more often than the OPAC and online databases. It was recommended among others that a new library software be installed in place of KOHA for wider connectivity and adequate distribution of software that will aid usage of the online databases and OPAC.

Automation of Academic Libraries and Web Development: A Reverie or Reality

  • Emasealu, Helen Uzoezi
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.9 no.1
    • /
    • pp.43-56
    • /
    • 2019
  • The intricacies of web development have orchestrated a paradigm shift in academic libraries. The study explored literature on the status of automation of academic libraries and web development in Nigeria. It was established that the functions of library management software are abysmally under-utilized in academic libraries in Nigeria, thus, progression of automation projects remain a swinging pendulum. The paper, therefore, recommends that librarians should acquire the relevant training and plan strategically for all automation projects aimed at incorporating the intricacies of the web and ICTs into library services to fully utilize the functions of the library management systems in line with web developmental stages, thus, be able to compete globally.

Knowledge Distributed Robot Control Framework

  • Chong, Nak-Young;Hongu, Hiroshi;Ohba, Kohtaro;Hirai, Shigeoki;Tanie, Kazuo
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.1071-1076
    • /
    • 2003
  • In this work, we propose a new framework of robot control for a variety of applications to our unstructured everyday environments. Programming robots can be a very time-consuming process and seems almost impossible for ordinary end users. To cope with this, this work is to provide a software framework for building robot application programs automatically, where we have robots learn how to accomplish a commanded task from the object. An integrated sensing and computing tag is embedded into every single object in the environment. In the robot controller, only the basic software libraries for low-level robot motion control are provided from the robot manufacturer. The main contributions of this work is to develop a server platform that we call Omniscient Server that generates the application programs and send them to the robot controller through the network. The object-related information from the object server merges into robot control software to generate a detailed application program based on the task commands from the human. We have built a test bed and demonstrated that a robot can perform a common household task within the proposed framework.

  • PDF

A Four-Layer Robust Storage in Cloud using Privacy Preserving Technique with Reliable Computational Intelligence in Fog-Edge

  • Nirmala, E.;Muthurajkumar, S.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.9
    • /
    • pp.3870-3884
    • /
    • 2020
  • The proposed framework of Four Layer Robust Storage in Cloud (FLRSC) architecture involves host server, local host and edge devices in addition to Virtual Machine Monitoring (VMM). The goal is to protect the privacy of stored data at edge devices. The computational intelligence (CI) part of our algorithm distributes blocks of data to three different layers by partially encoded and forwarded for decoding to the next layer using hash and greed Solomon algorithms. VMM monitoring uses snapshot algorithm to detect intrusion. The proposed system is compared with Tiang Wang method to validate efficiency of data transfer with security. Hence, security is proven against the indexed efficiency. It is an important study to integrate communication between local host software and nearer edge devices through different channels by verifying snapshot using lamport mechanism to ensure integrity and security at software level thereby reducing the latency. It also provides thorough knowledge and understanding about data communication at software level with VMM. The performance evaluation and feasibility study of security in FLRSC against three-layered approach is proven over 232 blocks of data with 98% accuracy. Practical implications and contributions to the growing knowledge base are highlighted along with directions for further research.

A Data Quality Measuring Tool (데이타 품질 측정 도구)

  • 양자영;최병주
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.3
    • /
    • pp.278-288
    • /
    • 2003
  • Quality of the software is affected by quality of data required for operating the actual software. Especially, it is important that assure the quality of data in a knowledge-engineering system that extracts the meaningful knowledge from stored data. In this paper, we developed DAQUM tool that can measure quality of data. This paper shows: 1) main contents for implement of DAQUM tool; 2) detection of dirty data via DAQUM tool through case study and measurement of data quality which is quantifiable from end-user's point of view. DAQUM tool will greatly contribute to improving quality of software product that processes mainly the data through control and measurement of data quality.