SPARQL evaluation of the case study.

SPARQL evaluation of the case study.

Source publication
Article
Full-text available
Valuable knowledge in every community is changed frequently. It often remains closely inside a community, even though it has huge potential to promote problem-solving in the wider community. Our research aims to increase the capability of communities in capturing, sharing and maintaining knowledge from any domain. We utilize an ontology, a shareabl...

Contexts in source publication

Context 1
... our evaluation, four SPARQL [25] queries are executed against the case study. These queries are detailed in Table 4. Query 1 results in there being only one instance having the 'Oils' value, since the 'Oils' attribute value from the instance with ID 13110120 has been deleted. ...
Context 2
... combined results of the updated ontology in Figure 4(b) and the SPARQL query results in Table 4 demonstrate that the delta script is complete and it contains accurate semantic information to update the base ontology. In other words, there is no information loss during the propagation process. ...

Similar publications

Article
Full-text available
Despite the proliferation of Mobile Instant Messaging (MIM) platforms, such as WhatsApp, studies that examine their role for learning and knowledge sharing are still rare. Using the context of global health, this study seeks to examine the ways in which MIM platforms are being used for learning and knowledge sharing and identify associated potentia...
Article
Full-text available
Organizational level studies of knowledge management have been hampered by the lack of measures of individual level knowledge management practices and outcomes that can be used as success criteria to determine whether, or to what degree, specific organizational knowledge management practices enhance individual knowledge creation, sharing, and appli...
Conference Paper
Full-text available
This paper presents a reflective case study of the introduction of Learning Toolbox as an ePoster solution for conferences. The Learning Toolbox ePoster platform is designed to overcome practical knowledge sharing and communication problems encountered in both the traditional paper poster and standard, screen-based ePoster approaches. Additionally...
Conference Paper
Full-text available
Knowledge management is an essential key in order to obtain competitive advantages in organizations. In this scenario, an interesting study about the first global power, China, is presented. The paper analyzes how Chinese enterprises manage their knowledge using variables linked to knowledge sharing and knowledge creation. Data were extracted by Wo...
Article
Full-text available
This study aims to explore the influence of co-author network on team knowledge creation. Integrating the two traditional perspectives of network relationship and network structure, we examine the direct and interactive effects of tie stability and structural holes on team knowledge creation. Tracking scientific articles published by 111 scholars i...

Citations

... Pemodelan pengetahuan menggunakan ontologi dapat diterapkan guna memodelkan proses yang terjadi antar setiap konsep (concept) yang terlibat dalam suatu pengetahuan serta membuat hubungan (relationship) antar konsep. Representasi pengetahuan pada ontologi menggunakan deskripsi berbasis bahasa OWL berbasis RDF [12], [13]. Pada penelitian ini, dikembangkan sebuah model ontologi untuk merepresentasikan pengetahuan mengenai big data analytics di perguruan tinggi berdasarkan tiga aspek yaitu: 1) Analytics, 2) Data sources, dan 3) Platforms. ...
Article
Full-text available
The big data phenomenon is also having an impact on the higher education sector. The readiness of education sector is non-negotiable for the face of the big data era so that organizations are able to adapt. Thus, knowledge to utilize big data needs to be owned by higher education institutions in order to innovate. Basically, there are quite a lot of studies that produce models as knowledge to take advantage of big data. However, reviewing the research that has been done previously, it is also necessary to conduct research that discusses the development of models to represent knowledge about big data analytics in higher education institutions. Knowledge that has been represented as a knowledge model can then be interpreted and stored as a knowledge base in a knowledge management system so that knowledge can be managed and utilized better. Based on these problems, ontology can be used to model knowledge. This research will develop an ontology-based knowledge model related to the use of big data in the education sector, especially higher education based on the concepts of analytics, data sources, and platforms. The ontology modeling process in this study is divided into 3 (three) phases: 1) Conceptualization; 2) Implementation; and 3) Evaluation. Based on the evaluation results of ontology measurements using schema metrics, the RR (Relationship Richness) value is 0.62, meaning that the ontology model contains a variety of information; the IR (Inheritance Richness) value is 1.78, meaning that the ontology model belongs to a fairly specific category, and the AR (Attribute Richness) value is 0.06, meaning that the information contained can be improved further. Based on the results of the query test analysis, the ontology is considered capable of retrieving the knowledge stored in it accurately based on validation that adjusts the query results with the ontology.
... Second, we assess the correctness of the policy ontology [29] against the healthcare case study. As such, we add some new domain-specific concepts into the ontology and specify the relevant context-aware access control policies. ...
Article
In today's dynamic ICT environments, the ability to control users’ access to information resources and services has become ever important. On the one hand, it should provide flexibility to adapt to the users’ changing needs, while on the other hand, it should not be compromised. The user is often faced with different contexts and environments that may change the user’s information needs. To allow for this, it is essential to incorporate the dynamically changing context information into the access control policies to reflect different contexts and environments through the use of a new context-aware access control (CAAC) approach with both dynamic associations of user-role and role-permission capabilities. Our proposed CAAC framework differs from the existing access control frameworks in that it supports context-sensitive access control to information resources and dynamically re-evaluates the access control decisions when there are dynamic changes to the context. It uses the dynamic context information to specify the user-role and role-permission assignment policies. We first present a formal policy model for our framework, specifying CAAC policies. Using this model, we then introduce a policy ontology for modeling CAAC policies and a policy enforcement architecture which supports access to resources according to the dynamically changing context information. In addition, we demonstrate the feasibility of our framework by considering (i) the completeness, correctness and consistency of the ontology concepts through application to healthcare scenarios and (ii) the performance and usability testing of the framework when using desktop and mobile-based prototypes.
... Second, we assess the correctness of the policy ontology [28]. As such, we add some new domain-specific concepts into the ontology and specify the relevant context-aware access control policies. ...
Article
Full-text available
In today's dynamic ICT environments, the ability to control users' access to resources becomes ever important. On the one hand, it should adapt to the users' changing needs; on the other hand, it should not be compromised. Therefore, it is essential to have a flexible access control model, incorporating dynamically changing context information. Towards this end, this paper introduces a policy framework for context-aware access control (CAAC) applications that extends the role-based access control model with both dynamic associations of user-role and role-permission capabilities. We first present a formal model of CAAC policies for our framework. Using this model, we then introduce an ontology-based approach and a software prototype for modelling and enforcing CAAC policies. In addition, we evaluate our policy ontology model and framework by considering (i) the completeness of the ontology concepts, specifying different context-aware user-role and role-permission assignment policies from the healthcare scenarios; (ii) the correctness and consistency of the ontology semantics, assessing the core and domain-specific ontologies through the healthcare case study; and (iii) the performance of the framework by means of response time. The evaluation results demonstrate the feasibility of our framework and quantify the performance overhead of achieving context-aware access control to information resources.
... We proposed a concept in building sharable common ontologies from community knowledge, which has two phases: (i) creating the common ontology and (ii) maintaining the knowledge within the common ontology. We have some initial studies for the second phase with the concept of propagation [14] and enrichment and validation [10] to maintain knowledge within common ontologies. In this paper, we stress on the first phase by presenting a framework of valid and rich common ontology development from different community knowledge representation. ...
... To maintain the validity and the richness of the common ontology at all times, we will integrate this work with our previous works in knowledge maintenance [10,14]. ...
... This works along with our work in [23,24] will be further developed to grant us with a whole framework of a data-driven dynamic common ontology. ...
Article
A pre-planned production workflow may need to adapt to instantaneous states of resources, materials, and workpieces. This adaptation poses an additional challenge when multiple custom workpieces are enmeshed in complex processes. This paper presents a novel framework, Cognitive Engine Process Controller (CEPC), which realizes a human-centric manufacturing system by augmenting the human in workflow selection and providing the flexibility in using alternative methods in the workflow. The CEPC streamlines overwhelming information for the human to select the next manufacturing steps via dynamic web ontology language (OWL) ontologies, a conflict checker, and a learner. The CEPC can monitor the completion of each step, determine the effect of a failed step, and suggest a set of suitable steps. Simulation results showed the potential of the CEPC via demonstrations. The CEPC has also been compared with an existing cognitive engine framework for workflow planning.
Article
Infection disease have been national or international problem. The prevalence rate of meaning is high for death. Infection disease difficulties to controlling. The occurrence of inequality ratio medical professionals is one of the things that became lack of control of infection disease. Information technology is needed to support the achievement of control, it became the base for building a modeling system that can detect the presence of infection disease, especially infectious disease with tropical infection categories. Ontology as a concept in building a system with using jaccard similarity method for calculation of the case. The result a system accuracy in this study, typhoid fever disease as much as 88%, dengue fever as much as 96% and malaria disease as much as 77%. System can be able to use by paramedic as reference the beginning for anamneses also patients can be able to use as an early warning to determine the condition health.
Conference Paper
Since the RFID technology has been found couple of decades ago, there was much involvement of this emerging technology in the improvement of supply chain management. As this technology made the industry more reliable and faster to process, yet there were always some technical issues and security threats that emerged from the heavy use of the RFID tags in the SCM, or other industries. Hereby we represent a new protocol based on a new idea that can be used to manage and organize tags as well as the objects attached to them in SCM, to prevent counterfeiting and reduce the security threats taking into consideration the security and privacy concerns that faces the industry today. This new approach will open a new horizon to the supply chain management as well as the RFID systems technology since it will handle multi- tags attached to objects managed in one location as an entity of one in one. We called our approach the MATRYOSHKA approach since it has the same idea of the russian doll, in managing multi-tags as one entity and prevent counterfeiting. We also added extra authentication process based on a mathematical exchange key formation to increase the security during communication to prevent threats and attacks and to provide a secure mutual authentication method.
Research
Full-text available
Infection disease has been a national or international problem. The prevalence rate of meaning is high for death. Infection disease difficulties in controlling. The occurrence of inequality ratio medical professionals is one of the things that became lack of control of infectious disease. Information technology is needed to support the achievement of control, it became the base for building a modeling system that can detect the presence of infectious disease, especially infectious disease with tropical infection categories. Ontology as a concept in building a system with using Jaccard similarity method for calculation of the case. The result a system accuracy in this study, typhoid fever disease as much as 88%, dengue fever as much as 96% and malaria disease as much as 77%. A system can be able to use by a paramedic as reference the beginning for anamneses also patients can be able to use as an early warning to determine the condition health.