Ontology Matching Euzenat, Jérôme; Shvaiko, Pavel
2007, 2007-07-02
eBook
Ontologies tend to be found everywhere. They are viewed as the silver bullet for many applications, such as database integration, peer-to-peer systems, e-commerce, semantic web services, or social ...networks. However, in open or evolving systems, such as the semantic web, different parties would, in general, adopt different ontologies. Thus, merely using ontologies, like using XML, does not reduce heterogeneity: it just raises heterogeneity problems to a higher level. Euzenat and Shvaikos book is devoted to ontology matching as a solution to the semantic heterogeneity problem faced by computer systems. Ontology matching aims at finding correspondences between semantically related entities of different ontologies. These correspondences may stand for equivalence as well as other relations, such as consequence, subsumption, or disjointness, between ontology entities. Many different matching solutions have been proposed so far from various viewpoints, e.g., databases, information systems, artificial intelligence. With Ontology Matching, researchers and practitioners will find a reference book which presents currently available work in a uniform framework. In particular, the work and the techniques presented in this book can equally be applied to database schema matching, catalog integration, XML schema matching and other related problems. The objectives of the book include presenting (i) the state of the art and (ii) the latest research results in ontology matching by providing a detailed account of matching techniques and matching systems in a systematic way from theoretical, practical and application perspectives.
Block-oriented Nonlinear System Identification deals with an area of research that has been very active since the turn of the millennium. The book makes a pedagogical and cohesive presentation of the ...methods developed in that time.
This study aims to determine and analyze network performance with quality of service parameters in realizing good and optimal network performance quality so that it can be adjusted between the ...efficiency of network needs and the effectiveness of user access at the Communication and Informatics Office of West Sumbawa Regency. The process of accumulating data is obtained by measuring the quality of service parameters using the quality of service method and measuring bandwidth load distribution with the load set at 30 Mbps. The quality of service method on the network, the influence between the variables of network performance quality on the internet connection, and the bandwidth capacity of each user are known. The study results from the quality of service analysis at the Communication and Informatics Service of West Sumbawa Regency entered the excellent category with an average throughput value ranging from 10,320-1,026,454 kbps from the fourth index being in the excellent category. The average packet loss value of 0-1.5% of the third index is in a good category, with the highest value occurring on the fifth day, 1.5%. The average delay value ranges from 7-150 ms, with the highest delay value occurring on the first day due to the user's distance from the remote network access source and queues in dense packet transmission. The average jitter value of 1-12 ms from the third index is in a good category, and the maximum result of the bandwidth value set in size is 9,092,407 bps
Pemerintah merintis pembelajaran daring agar akses mahasiswa mempelajari mata kuliah bermutu dari dosen-dosen bermutu se-Indonesia meningkat. Seperti halnya pendidikan tradisional, pendidikan daring ...juga memiliki kelebihan dan kekurangan, meskipun pelaksanaannya lebih menarik. Pada pelaksanaannya, pembelajaran daring tidak berjalan lancar karena pendidik masih memiliki keraguan tentang apakah ada perbedaan antara hasil belajar mahasiswa yang menggunakan pembelajaran moda daring dan moda tatap muka. Tujuan penelitian ini adalah untuk membuktikan hipotesis bahwa ada perbedaan antara hasil belajar mahasiswa yang menggunakan pembelajaran moda daring dan moda tatap muka. Penelitian ini adalah true experimental design dengan the randomized pretest-posttest control group design. Subyek penelitian adalah Kelas TI-A dan TI-B. Kedua kelompok tersebut diukur melalui pretest dan posttest. Kelas TI-A adalah kelas eksperimen yang menggunakan pembelajaran moda daring, sedangkan kelas TI-B adalah kelas kontrol yang menggunakan pembelajaran tatap muka. Melalui uji independent sampel T test, diperoleh t Test for Equality of Means dengan sig.(2 tailed) adalah 0.017. Sehingga dapat disimpulkan bahwa bahwa terdapat perbedaan hasil belajar mahasiswa yang menerapkan pembelajaran moda daring dan pembelajaran tatap muka. Besarnya perbedaan hasil belajar kedua kelompok bernilai positif, yaitu 10.67. Artinya, hasil belajar mahasiswa dengan pembelajaran moda daring lebih baik dari hasil belajar mahasiswa dengan pembelajaran tatap muka.
Automated Planning Ghallab, Malik; Nau, Dana; Traverso, Paolo
2004, 2004-05-21
eBook, Book
Automated planning technology now plays a significant role in a variety of demanding applications, ranging from controlling space vehicles and robots to playing the game of bridge. These real-world ...applications create new opportunities for synergy between theory and practice: observing what works well in practice leads to better theories of planning, and better theories lead to better performance of practical applications. Automated Planning mirrors this dialogue by offering a comprehensive, up-to-date resource on both the theory and practice of automated planning. The book goes well beyond classical planning, to include temporal planning, resource scheduling, planning under uncertainty, and modern techniques for plan generation, such as task decomposition, propositional satisfiability, constraint satisfaction, and model checking. The authors combine over 30 years experience in planning research and development to offer an invaluable text to researchers, professionals, and graduate students. *Comprehensively explains paradigms for automated planning. *Provides a thorough understanding of theory and planning practice, and how they relate to each other. *Presents case studies of applications in space, robotics, CAD/CAM, process control, emergency operations, and games.
*Provides a thorough understanding of AI planning theory and practice, and how they relate to each other. *Covers all the contemporary topics of planning, as well as important practical applications of planning, such as model checking and game playing. *Presents case studies and applications in planning engineering, space, robotics, CAD/CAM, process control, emergency operations, and games.*Provides lecture notes, examples of programming assignments, pointers to downloadable planning systems and related information online.
Complexity theory is a central field of the theoretical foundations of computer science. It is concerned with the general study of the intrinsic complexity of computational tasks; that is, it ...addresses the question of what can be achieved within limited time (and/or with other limited natural computational resources). This book offers a conceptual perspective on complexity theory. It is intended to serve as an introduction for advanced undergraduate and graduate students, either as a textbook or for self-study. The book will also be useful to experts, since it provides expositions of the various sub-areas of complexity theory such as hardness amplification, pseudorandomness and probabilistic proof systems. In each case, the author starts by posing the intuitive questions that are addressed by the sub-area and then discusses the choices made in the actual formulation of these questions, the approaches that lead to the answers, and the ideas that are embedded in these answers.
Signal detection theory describes how an observer makes decisions about weak, uncertain, or ambiguous events or signals. It is widely applied in psychology, medicine, and other related fields. This ...book describes the theory, explains its mathematical basis, and shows how to separate the observer's sensitivity to a signal from his or her tendency to say “yes” or “no.” Both detection of an event and discrimination between two events are treated. Chapters 1-4 describe the basic form of the signal-detection model and how to use it; Chapters 5-7 extend the model to different procedures such as identification of a signal; Chapters 8-10 expand it to other methods and distributions; and Chapter 11 describes the statistical treatment of detection data.
This textbook is ideally suited for classes on business process management, information systems architecture, and workflow management. It is also valuable for project managers and IT professionals, ...since it provides a vendor-independent view on the topic.
Pap László portréja a Neumann János Számítógép-tudományi Társaság (NJSZT) Informatikatörténeti Fóruma (iTF) szervezésében készített "Arcképek a magyar informatika történetéből" sorozatában.