• Title/Summary/Keyword: domain ontology

Search Result 269, Processing Time 0.025 seconds

Design and Implementation of Search System Using Domain Ontology (도메인 온톨로지를 이용한 검색 시스템 설계 및 구현)

  • Kang, Rae-Goo;Jung, Chai-Yeoung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.7
    • /
    • pp.1318-1324
    • /
    • 2007
  • TSP(Traveling Salesman Problem) is a problem finding out the shortest distance out of many courses where given cities of the number of N, one starts a certain city and turns back to a starting city, visiting every city only once. As the number of cities having visited increases, the calculation rate increases geometrically. This problem makes TSP classified in NP-Hard Problem and genetic algorithm is used representatively. To obtain a better result in TSP, various operators have been developed and studied. This paper suggests new method of population initialization and of sequential transformation, and then proves the improvement of capability by comparing them with existing methods.

Content Recommendation System Using User Context-aware based Knowledge Filtering in Smart Environments (스마트 환경에서의 사용자 상황인지 기반 지식 필터링을 이용한 콘텐츠 추천 시스템)

  • Lee, Dongwoo;Kim, Ungsoo;Yeom, Keunhyuk
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.13 no.2
    • /
    • pp.35-48
    • /
    • 2017
  • There are many and various devices like sensors, displays, smart phone, etc. in smart environment. And contents can be provided by using these devices. Vast amounts of contents are provided to users, but in most environments, there are no regard for user or some simple elements like location and time are regarded. So there's a limit to provide meaningful contents to users. In this paper, I suggest the contents recommendation system that can recommend contents to users by reasoning context of users, devices and contents. The contents recommendation system suggested in this paper recommend the contents by calculating the user preferences using the situation reasoned with the contextual data acquired from various devices and the user profile received from the user directly. To organize this process, the method on how to model ontology with domain knowledge and how to design and develop the contents recommendation system are discussed in this paper. And an application of the contents recommendation system in Centum City, Busan is introduced. Then, the evaluation methods how the contents recommendation system is evaluated are explained. The evaluation result shows that the mean absolute error is 0.8730, which shows the excellent performance of the proposed contents recommendation system.

A Dynamic Service Supporting Model for Semantic Web-based Situation Awareness Service (시맨틱 웹 기반 상황인지 서비스를 위한 동적 서비스 제공 모델)

  • Choi, Jung-Hwa;Park, Young-Tack
    • Journal of KIISE:Software and Applications
    • /
    • v.36 no.9
    • /
    • pp.732-748
    • /
    • 2009
  • The technology of Semantic Web realizes the base technology for context-awareness that creates new services by dynamically and flexibly combining various resources (people, concepts, etc). According to the realization of ubiquitous computing technology, many researchers are currently working for the embodiment of web service. However, most studies of them bring about the only predefined results those are limited to the initial description by service designer. In this paper, we propose a new service supporting model to provide an automatic method for plan related tasks which achieve goal state from initial state. The inputs on an planner are intial and goal descriptions which are mapped to the current situation and to the user request respectively. The idea of the method is to infer context from world model by DL-based ontology reasoning using OWL domain ontology. The context guide services to be loaded into planner. Then, the planner searches and plans at least one service to satisfy the goal state from initial state. This is STRIPS-style backward planner, and combine OWL-S services based on AI planning theory that enabling reduced search scope of huge web-service space. Also, when feasible service do not find using pattern matching, we give user alternative services through DL-based semantic searching. The experimental result demonstrates a new possibility for realizing dynamic service modeler, compared to OWLS-XPlan, which has been known as an effective application for service composition.

Improving Bidirectional LSTM-CRF model Of Sequence Tagging by using Ontology knowledge based feature (온톨로지 지식 기반 특성치를 활용한 Bidirectional LSTM-CRF 모델의 시퀀스 태깅 성능 향상에 관한 연구)

  • Jin, Seunghee;Jang, Heewon;Kim, Wooju
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.1
    • /
    • pp.253-266
    • /
    • 2018
  • This paper proposes a methodology applying sequence tagging methodology to improve the performance of NER(Named Entity Recognition) used in QA system. In order to retrieve the correct answers stored in the database, it is necessary to switch the user's query into a language of the database such as SQL(Structured Query Language). Then, the computer can recognize the language of the user. This is the process of identifying the class or data name contained in the database. The method of retrieving the words contained in the query in the existing database and recognizing the object does not identify the homophone and the word phrases because it does not consider the context of the user's query. If there are multiple search results, all of them are returned as a result, so there can be many interpretations on the query and the time complexity for the calculation becomes large. To overcome these, this study aims to solve this problem by reflecting the contextual meaning of the query using Bidirectional LSTM-CRF. Also we tried to solve the disadvantages of the neural network model which can't identify the untrained words by using ontology knowledge based feature. Experiments were conducted on the ontology knowledge base of music domain and the performance was evaluated. In order to accurately evaluate the performance of the L-Bidirectional LSTM-CRF proposed in this study, we experimented with converting the words included in the learned query into untrained words in order to test whether the words were included in the database but correctly identified the untrained words. As a result, it was possible to recognize objects considering the context and can recognize the untrained words without re-training the L-Bidirectional LSTM-CRF mode, and it is confirmed that the performance of the object recognition as a whole is improved.

Research on User-Centric Inter-Organizational Collaboration (UCICOIn) framework (사용자 제어 기반 다중 도메인 접근 제어에 대한 연구)

  • Sunghyuck Hong
    • Journal of Industrial Convergence
    • /
    • v.21 no.12
    • /
    • pp.37-43
    • /
    • 2023
  • In today's business landscape, collaboration and interoperability are crucial for organizational success and profitability. However, integrating operations across multiple organizations is challenging due to differing roles and policies in Identity and Access Management (IAM). User-centric identity (UCI) adopts a personalized approach to digital identity management, centering on the end-user for authentication and access control. It provides a decentralized system that ensures secure and customized access for each user. UCI aims to address complex security challenges by aligning access privileges with individual user requirements. This research delves into UCI's ability to streamline resource access amidst conflicting IAM roles and protocols across various organizations. The study presents a UCI-based multi-domain access control (MDAC) framework, which encompasses an ontology, a unified method for articulating access roles and policies across domains, and software services melding with UCI infrastructure. The goal is to enhance organizational resource management and decision-making by offering clear guidelines on access roles and policy management across diverse domains, ultimately boosting companies' return on investment.

Extensible Hierarchical Method of Detecting Interactive Actions for Video Understanding

  • Moon, Jinyoung;Jin, Junho;Kwon, Yongjin;Kang, Kyuchang;Park, Jongyoul;Park, Kyoung
    • ETRI Journal
    • /
    • v.39 no.4
    • /
    • pp.502-513
    • /
    • 2017
  • For video understanding, namely analyzing who did what in a video, actions along with objects are primary elements. Most studies on actions have handled recognition problems for a well-trimmed video and focused on enhancing their classification performance. However, action detection, including localization as well as recognition, is required because, in general, actions intersect in time and space. In addition, most studies have not considered extensibility for a newly added action that has been previously trained. Therefore, proposed in this paper is an extensible hierarchical method for detecting generic actions, which combine object movements and spatial relations between two objects, and inherited actions, which are determined by the related objects through an ontology and rule based methodology. The hierarchical design of the method enables it to detect any interactive actions based on the spatial relations between two objects. The method using object information achieves an F-measure of 90.27%. Moreover, this paper describes the extensibility of the method for a new action contained in a video from a video domain that is different from the dataset used.

MULTI-LAYERED PRODUCT KNOWLEDGE MODEL (다중 레이어 기반 제품 지식 모델)

  • Lee J.H.;Suh H.W.
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2005.06a
    • /
    • pp.65-70
    • /
    • 2005
  • This paper introduces an approach to multi-layered product knowledge model for collaborative engineering environment. The participants in collaborative engineering want to share and reason product knowledge through internet without any heterogeneity and ambiguity. However the previous knowledge models are limited in providing those aspects. In this paper, the collaborative engineering domain is analyzed and then the product knowledge is organized into four levels such as product context model, product specific model, product design model and product manufacturing model. The four levels are represented by first-order logic in layered fashion. The concepts and the instances of a formal ontology are used for recursive representation of the four levels. The instances of the concepts of an upper level like product context model are considered as the concepts of an adjacent lower level like product specific model, and this mechanism is applied to the other levels. These logic representations are integrated with the schema and the instances of a relational database. OWL representation of the four levels is defined through the integration of the logic representation and OWL primitives. The four product knowledge models have their major representation according to the characteristics of each model. This approach enables engineer to share product knowledge through internet without any ambiguity and utilize it as basis for additional reasoning.

  • PDF

A Study of Developing and Evaluating a Pansoree Retrieval System Using Topic Maps (토픽맵-기반 판소리 검색시스템 구축 및 평가에 관한 연구)

  • Oh Sam Gyun;Park Ok-Nam
    • Journal of Korean Library and Information Science Society
    • /
    • v.36 no.4
    • /
    • pp.77-98
    • /
    • 2005
  • The purpose of this research is to propose a powerful alternative in designing knowledge portals using Topic Maps(TM). To demonstrate the power of TM In constructing knowledge portals. we designed a TM-based korean folk music(pansori) site, tested It with an existing pansoree site (pansoree.com ) employing diverse query patterns : simple, advanced, associative, and cross referential Queries. The results show that the TM-based site outperforms the pansoree.com in searching time and steps. The TM-based site also provide novice users who do not know pansori domain with easy access to Information that they need.

  • PDF

Building Domain Ontology for Semantic Web (시맨틱 웹에서의 도메인 온톨로지 구축 및 적용)

  • Kong, Hyun-Jang;Jung, Kwan-Ho;Shin, Ju-Hyun;Kim, Won-Pil;Kim, Pan-Koo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.05b
    • /
    • pp.919-922
    • /
    • 2003
  • 1990년대 중반부터 최근까지 시맨틱 웹에 대한 많은 관심과 더불어 많은 연구가 진행중이다. 무한한 정보 자원을 가지고 있는 인터넷에서 자원에 대한 효율적 처리가 더욱더 강조된다. 그렇지만 시맨틱 웹에 대한 뚜렷한 결론을 내리기 힘들뿐만 아니라, 지금의 연구들에서는 시맨틱 웹에 대한 전체적 구상에 치중하고 있을 뿐, 세부적인 기술에 관한 연구는 미흡하다 최근까지의 연구의 초점은 주로 XML, XML Schema에서 RDF, RDF Schema 그리고 DAML+OIL에 이르기까지 다양한 마크업 언어의 개발 및 적용에 대한 연구이다. 이러한 연구의 결과 시맨틱 웹에서의 표현을 위한 마크업 언어에 대한 많은 성과를 가져왔지만, 시맨틱 웹의 핵심이 되는 정보의 의미적 표현은 더 많은 연구들이 요구된다. 본 논문은 시맨틱 웹의 핵심적인 부분을 차지하고 있는 온톨로지에 대한 연구이다. 최근 널리 사용되어지고 있는 온톨로지 중 하나인 WordNet을 시맨틱 웹의 온톨로지로 적용함에 있어, 발생하는 문제점을 해결하기 위한 방법을 제시한다. WordNet에 기반 한 도메인 온톨로지의 구축 및 적용에 대한 내용이 이 문제점을 해결하기 위한 본 논문의 요지이다.

  • PDF

A Novel Approach for Integrating Security in Business Rules Modeling Using Agents and an Encryption Algorithm

  • Houari, Nawal Sad;Taghezout, Noria
    • Journal of Information Processing Systems
    • /
    • v.12 no.4
    • /
    • pp.688-710
    • /
    • 2016
  • Our approach permits to capitalize the expert's knowledge as business rules by using an agent-based platform. The objective of our approach is to allow experts to manage the daily evolutions of business domains without having to use a technician, and to allow them to be implied, and to participate in the development of the application to accomplish the daily tasks of their work. Therefore, the manipulation of an expert's knowledge generates the need for information security and other associated technologies. The notion of cryptography has emerged as a basic concept in business rules modeling. The purpose of this paper is to present a cryptographic algorithm based approach to integrate the security aspect in business rules modeling. We propose integrating an agent-based approach in the framework. This solution utilizes a security agent with domain ontology. This agent applies an encryption/decryption algorithm to allow for the confidentiality, authenticity, and integrity of the most important rules. To increase the security of these rules, we used hybrid cryptography in order to take advantage of symmetric and asymmetric algorithms. We performed some experiments to find the best encryption algorithm, which provides improvement in terms of response time, space memory, and security.