Schema and SHACL

Author(s):  
Kurt Cagle

XSD Schema is a foundational technology for XML. In the RDF space, OWL has long established constraints for the language, but with the advent of more sophisticated SPARQL processes, OWL's weight and complexity is often seen as being to heavy for many business applications. SHACL, the Shape Constraint Language, is a SPARQL friendly validation language that bears a lot of resemblance to XSD. This paper examines SHACL and its relationship to XSD, and maps out how this technology may be an effective bridge not only between XML and RDF but between XML and JSON.

Author(s):  
Eter Basar ◽  
Ankur Pan Saikia ◽  
L. P. Saikia

Data Technology industry has been utilizing the customary social databases for around 40 years. Be that as it may, in the latest years, there was a generous transformation in the IT business as far as business applications. Remain solitary applications have been supplanted with electronic applications, conferred servers with different proper servers and committed stockpiling with framework stockpiling. Lower expense, adaptability, the model of pay-as-you-go are the fundamental reasons, which caused the conveyed processing are transformed into reality. This is a standout amongst the hugest upsets in Information Technology, after the development of the Internet. Cloud databases, Big Table, Sherpa, and SimpleDB are getting the opportunity to be more natural to groups. They featured the hindrances of current social databases as far as convenience, adaptability, and provisioning. Cloud databases are basically utilized for data raised applications, for example, stockpiling and mining of gigantic information or business information. These applications are adaptable and multipurpose in nature. Various esteem based data organization applications, such as managing an account, online reservation, e-exchange and stock organization, and so on are delivered. Databases with the help of these sorts of uses need to incorporate four essential highlights: Atomicity, Consistency, Isolation, and Durability (ACID), in spite of the fact that utilizing these databases isn't basic for utilizing as a part of the cloud. The objective of this paper is to discover the points of interest and disservices of databases generally utilized in cloud frameworks and to survey the difficulties in creating cloud databases


Author(s):  
Priya Mathur ◽  
Amit Kumar Gupta ◽  
Prateek Vashishtha

Cloud computing is an emerging technique by which anyone can access the applications as utilities over the internet. Cloud computing is the technology which comprises of all the characteristics of the technologies like distributed computing, grid computing, and ubiquitous computing. Cloud computing allows everyone to create, to configure as well as to customize the business applications online. Cryptography is the technique which is use to convert the plain text into cipher text using various encryption techniques. The art and science used to introduce the secrecy in the information security in order to secure the messages is defined as cryptography. In this paper we are going to review few latest Cryptographic algorithms which are used to enhance the security of the data on the cloud servers. We are comparing Short Range Natural Number Modified RSA (SRNN), Elliptic Curve Cryptography Algorithm, Client Side Encryption Technique and Hybrid Encryption Technique to secure the data in cloud.


1969 ◽  
Author(s):  
William M. Zani

2021 ◽  
Vol 31 (2) ◽  
Author(s):  
Michael Herrmann ◽  
Karsten Matthies

AbstractWe study the eigenvalue problem for a superlinear convolution operator in the special case of bilinear constitutive laws and establish the existence and uniqueness of a one-parameter family of nonlinear eigenfunctions under a topological shape constraint. Our proof uses a nonlinear change of scalar parameters and applies Krein–Rutman arguments to a linear substitute problem. We also present numerical simulations and discuss the asymptotics of two limiting cases.


2012 ◽  
Vol 4 (1) ◽  
pp. 71-96 ◽  
Author(s):  
Nor Shahniza Kamal Bashah ◽  
Natalia Kryvinska ◽  
Do van Thanh

2006 ◽  
Vol 41 (10) ◽  
pp. 753-762 ◽  
Author(s):  
Binsheng Zhao ◽  
Lawrence H. Schwartz ◽  
Li Jiang ◽  
Jane Colville ◽  
Chaya Moskowitz ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document