scholarly journals Using ontology merging for the integration of information systems and the production capacity planning system

Author(s):  
N Yarushkina ◽  
A Romanov ◽  
A Filippov ◽  
A Dolganovskaya ◽  
M Grigoricheva

This article describes the method of integrating information systems of an aircraft factory with the production capacity planning system based on the ontology merging. The ontological representation is formed for each relational database (RDB) of integrated information systems. The ontological representation is formed in the process of analyzing the structure of the relational database of the information system (IS). Based on the ontological representations merging the integrating data model is formed. The integrating data model is a mechanism for semantic integration of data sources.

2006 ◽  
Vol 35 (3) ◽  
Author(s):  
Bronius Paradauskas ◽  
Aurimas Laurikaitis

This article discusses the process of enterprise knowledge extraction from relational database and source code of legacy information systems. Problems of legacy systems and main solutions for them are briefly described here. The uses of data reverse engineering and program understanding techniques to automatically infer as much as possible the schema and semantics of a legacy information system is analyzed. Eight step data reverse engineering algorithm for knowledge extraction from legacy systems is provided. A hypothetical example of knowledge extraction from legacy information system is presented.


Author(s):  
Aleksandrs Gorbunovs ◽  
Dainis Gorbunovs ◽  
Atis Kapenieks

An importance of creating of efficacious information systems, which would enhance learning outcomes, leads to development of appropriate models.Modelling process with further validation and verification of developed information system or technological solution is essential. This paper displays the considerations and efforts made to work out such model in a form of reflection stimulating and learning outcomes enhancing ePortfolio information system. The authors introduce architecture of developed system from a view of used technologies, system’s algorithmic model and data model, as well its approbation results in Living Lab.


Author(s):  
Sergiy Gnatyuk ◽  
Zhengbing Hu ◽  
Viktoriia Sydorenko ◽  
Marek Aleksander ◽  
Yuliia Polishchuk ◽  
...  

This chapter is devoted to developing formalization methods for identification and security objects of critical information infrastructure (CII) in civil aviation. The analysis of modern approaches to the CII identification was carried out that gave a possibility to determine weaknesses and to formalize a scientific researches task. As a result, the unified data model was developed for formalizing the process of a list of CII objects forming in certain field and at the state level. Moreover, the specialized technique was developed. Besides, the identification method was proposed, and it gives a possibility to determine elements of CII field, mutual influences, and influence on functional operations of critical aviation information system. Furthermore, special software was developed and implemented that can be useful for CII elements identification and also for determining its influences on functional operations. Also, the basic aspects of cybersecurity ensuring for identified critical aviation information system were described in this chapter.


Author(s):  
Remigijus Gustas

Most information systems development methodologies are based on conceptual modeling of static and dynamic views, which are represented by totally different types of diagrams. Understanding of the interplay among interactive, behavioral and structural aspects of specifications is necessary for identification of semantic integrity problems between business process and business data. Typically, semantic inconsistencies and discontinuities between collections of conceptual representations are not easy to detect and to comprehend for information system designers due to static and dynamic aspects of models being visualized in isolation. The goal of this paper is to present a modeling approach for semantic integration and evolution of static and dynamic aspects of conceptual models. Visualization of interplay among structural, interactive and behavioral aspects of computation-neutral representations helps to understand crosscutting concerns and integrity problems of information system conceptualizations. The main advantage of the presented conceptual modeling approach is stability and flexibility of diagrams in dealing with the evolutionary changes of requirements. Therefore, the developed modeling foundation is targeted to both business managers and information system designers for the purpose of computation-neutral integration and evolution of information systems specifications.


2012 ◽  
Vol 160 ◽  
pp. 234-239
Author(s):  
Xiao Xiao Liang

With the deeply development of campus information technology, it needs to store and manage vast amounts of information. However, the information is often stored in different structures of information systems, how to achieve the integration of heterogeneous data sources is the problem to be solved in university information system. In this article, the most commonly used integration technology of heterogeneous data sources is described, and then data source integration patterns which could be used in campus are studied, the design of XML-based integration of heterogeneous data sources and some key technology are in-depth studied.


Author(s):  
Rizqi Ari Putra ◽  
Muhammad Fahmi Alauddin ◽  
Islam Nur Alam ◽  
Muhammad Ainul Yaqin

The purpose of this study is to design a School Information System database architecture based on National School Standards. National School Standards are used as a reference in determining business processes in a school, especially elementary and midle-high school. These processes then describe the entity and its attributes. The database used is a Relational Database so that entities and attributes are drawn as a table that has relationships between entities. To model relationships between entities, use Entity Relational Diagrams. The results of this study are the realization of database architecture with national school standards. This database architecture design is expected to be a reference in building School Information Systems that are in accordance with National School Standards.


1970 ◽  
Vol 16 (2) ◽  
Author(s):  
Khrystyna V. Sereda

The problem of construction of modern information systems in education branch is actual in modern conditions of informatization of society. In the article one of aspects of construction of such systems, as the analysis of requirements to information supply of information systems and construction of conceptual data model of information system planning of scientific researches in Academy of Pedagogical Sciences of Ukraine on the Internet basis» (further – IS "Planning") on the basis of the spent analysis is considered. Article materials reflect results of research which was conducted within the frames of research work «Scientifically-methodical maintenance of information system of planning of scientific researches in Academy of Pedagogical Sciences of Ukraine on the Internet basis», № 0109U002139.


Author(s):  
Sergiy Gnatyuk ◽  
Zhengbing Hu ◽  
Viktoriia Sydorenko ◽  
Marek Aleksander ◽  
Yuliia Polishchuk ◽  
...  

This chapter is devoted to developing formalization methods for identification and security objects of critical information infrastructure (CII) in civil aviation. The analysis of modern approaches to the CII identification was carried out that gave a possibility to determine weaknesses and to formalize a scientific researches task. As a result, the unified data model was developed for formalizing the process of a list of CII objects forming in certain field and at the state level. Moreover, the specialized technique was developed. Besides, the identification method was proposed, and it gives a possibility to determine elements of CII field, mutual influences, and influence on functional operations of critical aviation information system. Furthermore, special software was developed and implemented that can be useful for CII elements identification and also for determining its influences on functional operations. Also, the basic aspects of cybersecurity ensuring for identified critical aviation information system were described in this chapter.


Sign in / Sign up

Export Citation Format

Share Document