A Survey on Ontology Creation Methodologies

Author(s):  
Matteo Cristani ◽  
Roberta Cuel

In the current literature of knowledge management and artificial intelligence, several different approaches to the problem have been carried out of developing domain ontologies from scratch. All these approaches deal fundamentally with three problems: (1) providing a collection of general terms describing classes and relations to be employed in the description of the domain itself; (2) organizing the terms into a taxonomy of the classes by the ISA relation; and (3) expressing in an explicit way the constraints that make the ISA pairs meaningful. Though a number of such approaches can be found, no systematic analysis of them exists which can be used to understand the inspiring motivation, the applicability context, and the structure of the approaches. In this paper, we provide a framework for analyzing the existing methodologies that compares them to a set of general criteria. In particular, we obtain a classification based upon the direction of ontology construction; bottom-up are those methodologies that start with some descriptions of the domain and obtain a classification, while top-down ones start with an abstract view of the domain itself, which is given a priori. The resulting classification is useful not only for theoretical purposes but also in the practice of deployment of ontologies in Information Systems, since it provides a framework for choosing the right methodology to be applied in the specific context, depending also on the needs of the application itself.

Author(s):  
Vinay Kulkarni ◽  
Sreedhar Reddy ◽  
Tony Clark

Modern enterprises are large complex systems operating in dynamic environments and are therefore required to respond quickly to a variety of change drivers. Moreover, they are systems of systems wherein understanding is only available in localized contexts and is partial and uncertain. Given that the overall system behaviour is hard to know a-priori and that conventional techniques for systemwide analysis either lack rigour or are defeated by the scale of the problem, the current practice often exclusively relies on human expertise for adaptation. This chapter outlines the concept of model-driven adaptive enterprise that leverages principles from modeling, artificial intelligence, control theory, and information systems design leading to a knowledge-guided simulation-aided data-driven model-based evidence-backed approach to impart adaptability to enterprises. At the heart of a model-driven adaptive enterprise lies a digital twin (i.e., a simulatable digital replica of the enterprise). The authors discuss how the digital twin can be used to analyze, control, adapt, transform, and design enterprises.


2021 ◽  
Vol 23 (4) ◽  
pp. 457-484
Author(s):  
Niovi Vavoula

Abstract Since the past three decades, an elaborate legal framework on the operation of EU-Schengen information systems has been developed, whereby in the near future a series of personal data concerning almost all third-country nationals (TCN s) with an administrative or criminal law link with the EU/Schengen area will be monitored through at least one information system. This article provides a legal analysis on the embedment of Artificial Intelligence (AI) tools at the EU level in information systems for TCN s and critically examines the fundamental rights concerns that ensue from the use AI to manage and control migration. It discusses automated risk assessment and algorithmic profiling used to examine applications for travel authorisations and Schengen visas, the shift towards the processing of facial images of TCN s and the creation of future-proof information systems that anticipate the use of facial recognition technology. The contribution understands information systems as enabling the datafication of mobility and as security tools in an era whereby a foreigner is risky by default. It is argued that a violation of the right to respect for private life is merely the gateway for a series of other fundamental rights which are impacted, such as non-discrimination and right to effective remedies.


2011 ◽  
pp. 12-30 ◽  
Author(s):  
Brian Lehaney ◽  
Steve Clarke ◽  
Elayne Coakes ◽  
Gillian Jack

The previous chapter provided a broad introduction to knowledge management. As you might imagine, this is a complex area. This chapter begins to peel away the layers bit by bit to examine knowledge management in greater depth. Knowledge management has various approaches and definitions according to the perspective and discipline of the individual or organisation that engages with the concept. These include management, individual and organisational learning, communications, information systems and technology, artificial intelligence, intellectual assets, and so on. Each discipline approaches KM with a different perception, for example, computer science focuses heavily on technology, human resources takes an individual and organisational approach emphasising learning and reward factors, and intellectual assets focus on the explicit capture and registration of knowledge.


2009 ◽  
Vol 7 (1) ◽  
pp. 232-243
Author(s):  
Marly Cavalcanti

The purpose of this article is to emphasize the importance of corporate governance, information systems and their theoretical and practical knowledge in the upcoming years. It does not only offer an analysis of the use of information and knowledge in universities, but also explains its main significance. Another objective is to join some specific fields such as artificial intelligence, information systems, marketing, marketing research and knowledge management so that sharing, distribution and creation can be transmitted to the undergraduate student of business administration as well. In order to write this paper, the available bibliography was reviewed and a quantitative exploratory research was conducted in some universities in São Paulo, Brazil. The study showed that students of the undergraduate courses in Business Administration had low level of knowledge in Information System and Marketing Research while they are in the school and this fact permit analytical vision of risks in the treatment of governance.


2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Mohammad Kamel Alomari ◽  
Habib Ullah Khan ◽  
Sulaiman Khan ◽  
Alanoud Ali Al-Maadid ◽  
Zaki Khalid Abu-Shawish ◽  
...  

Artificial intelligence (AI) has become omnipotent with its variety of applications and advantages. Considering the other side of the coin, the eruption of technology has created situations that need more caution about the safety and security of data and systems at all levels. Thus, to hedge against the growing threats of cybersecurity, the need for a robust AI platform supported by machine learning and other supportive technologies is well recognized by organizations. AI is a much sought-after topic, and there is extolling literature available in repositories. Hence, a systematic arrangement of the literature that can help identify the right AI platform that can provide identity governance and access control is the need of the hour. Having this background, the present study is commissioned a Systematic Literature Review (SLR) to accomplish the necessity. Literature related to AI and Identity and Access Management (IAM) is collected from renowned peer-reviewed digital libraries for systematic analysis and assessment purposes using the systematic review guidelines. Thus, the final list of articles relevant to the framed research questions related to the study topic is fetched and is reviewed thoroughly. For the proposed systematic research work, the literature reported during the period ranging from 2016 to 2021 (a portion of 2021 is included) is analyzed and a total of 43 papers were depicted more relevant to the selected research domain. These articles were accumulated from ProQuest, Scopus, Taylor & Franics, Science Direct, and Wiley online repositories. The article's contribution can supplement the AI-based IAM information and steer the entities of diverse sectors concerning seamless implementation. Appropriate suggestions are proposed to encourage research work in the required fields.


2020 ◽  
Vol 4 (3(12)) ◽  
pp. 1-15
Author(s):  
Samira Ilgarovna Proshkina ◽  

The work is devoted to an urgent problem — the study of the evolutionary dynamics of web advertising, its assessment and effectiveness, as well as the problem of legal support and security of information systems. The goal is a systematic analysis of web advertising in an unsafe information field, its relevance and criteria for assessing marketing efforts, minimizing risks, maximizing additional profits and image. Research hypothesis — the effectiveness of web advertising is determined by the form of advertising, place of display, location of the block, model of calculation of the advertising campaign. An approach based on the establishment of preferences, partnership between the state and business structures is emphasized. It takes into account the COVID-19 pandemic, a slowdown in the pace and features of the evolution of business companies in self-isolation. The subtasks of influence on the advertising efficiency of the site’s features and web advertising are highlighted. A comprehensive analysis of information and logical security and computational models of web advertising companies was also carried out.


Author(s):  
Ian Park

There is a difference between a State’s substantive and procedural right to life obligations. This chapter explores what amount to a state’s substantive right to life obligations with reference to Article 2, ECHR and Article 6, ICCPR. The respective provisions are analysed to determine the extent of a state’s substantive right to life obligations during armed conflict and then a comparison between the two international law instruments is undertaken. In order to undertake such a comparison, the exceptions to the right to life in both the ECHR and ICCPR are examined. Once determined, the planning and conduct of a military operation are considered, to assess the extent to which, in general terms, right to life obligations are considered in these areas.


2003 ◽  
Vol 10 (3) ◽  
pp. 401-410
Author(s):  
M. S. Agranovich ◽  
B. A. Amosov

Abstract We consider a general elliptic formally self-adjoint problem in a bounded domain with homogeneous boundary conditions under the assumption that the boundary and coefficients are infinitely smooth. The operator in 𝐿2(Ω) corresponding to this problem has an orthonormal basis {𝑢𝑙} of eigenfunctions, which are infinitely smooth in . However, the system {𝑢𝑙} is not a basis in Sobolev spaces 𝐻𝑡 (Ω) of high order. We note and discuss the following possibility: for an arbitrarily large 𝑡, for each function 𝑢 ∈ 𝐻𝑡 (Ω) one can explicitly construct a function 𝑢0 ∈ 𝐻𝑡 (Ω) such that the Fourier series of the difference 𝑢 – 𝑢0 in the functions 𝑢𝑙 converges to this difference in 𝐻𝑡 (Ω). Moreover, the function 𝑢(𝑥) is viewed as a solution of the corresponding nonhomogeneous elliptic problem and is not assumed to be known a priori; only the right-hand sides of the elliptic equation and the boundary conditions for 𝑢 are assumed to be given. These data are also sufficient for the computation of the Fourier coefficients of 𝑢 – 𝑢0. The function 𝑢0 is obtained by applying some linear operator to these right-hand sides.


2021 ◽  
pp. 152660282110250
Author(s):  
Yun Chul Park ◽  
Hyoung Ook Kim ◽  
Nam Yeol Yim ◽  
Byung Chan Lee ◽  
Chan Park ◽  
...  

Purpose The treatment of suprahepatic inferior vena cava (IVC) ruptures results in high mortality rates due to difficulty in performing the surgical procedure. Here, we present a case of successful endovascular management of a life-threatening suprahepatic IVC rupture with top-down placement of a stent graft. Case Report A 33-year-old woman was involved in a traffic accident and presented to our emergency department due to unstable hemodynamics after blunt abdominal wall trauma. Computed tomography (CT) revealed massive extravasation of contrast agent from the suprahepatic IVC, which suggested traumatic suprahepatic IVC rupture. To seal the IVC, to salvage major hepatic veins, and to prevent migration of the stent graft into the right side of the heart after placement, an aortic cuff with a proximal hook was introduced in a top-down direction via the right internal jugular vein. After closure of the injured IVC, the patient’s hemodynamics improved, and additional laparotomy was performed. After 3 months of trauma care, the patient recovered and was discharged. Follow-up CT after 58 months showed a patent stent graft within the IVC. Conclusion Endovascular management with top-down placement of a stent graft is a viable option for emergent damage control in patients with life-threatening hemorrhage from IVC rupture.


Sign in / Sign up

Export Citation Format

Share Document