47 resultados para Geo-ontology
em Doria (National Library of Finland DSpace Services) - National Library of Finland, Finland
Resumo:
Software plays an important role in our society and economy. Software development is an intricate process, and it comprises many different tasks: gathering requirements, designing new solutions that fulfill these requirements, as well as implementing these designs using a programming language into a working system. As a consequence, the development of high quality software is a core problem in software engineering. This thesis focuses on the validation of software designs. The issue of the analysis of designs is of great importance, since errors originating from designs may appear in the final system. It is considered economical to rectify the problems as early in the software development process as possible. Practitioners often create and visualize designs using modeling languages, one of the more popular being the Uni ed Modeling Language (UML). The analysis of the designs can be done manually, but in case of large systems, the need of mechanisms that automatically analyze these designs arises. In this thesis, we propose an automatic approach to analyze UML based designs using logic reasoners. This approach firstly proposes the translations of the UML based designs into a language understandable by reasoners in the form of logic facts, and secondly shows how to use the logic reasoners to infer the logical consequences of these logic facts. We have implemented the proposed translations in the form of a tool that can be used with any standard compliant UML modeling tool. Moreover, we authenticate the proposed approach by automatically validating hundreds of UML based designs that consist of thousands of model elements available in an online model repository. The proposed approach is limited in scope, but is fully automatic and does not require any expertise of logic languages from the user. We exemplify the proposed approach with two applications, which include the validation of domain specific languages and the validation of web service interfaces.
Resumo:
A growing concern for organisations is how they should deal with increasing amounts of collected data. With fierce competition and smaller margins, organisations that are able to fully realize the potential in the data they collect can gain an advantage over the competitors. It is almost impossible to avoid imprecision when processing large amounts of data. Still, many of the available information systems are not capable of handling imprecise data, even though it can offer various advantages. Expert knowledge stored as linguistic expressions is a good example of imprecise but valuable data, i.e. data that is hard to exactly pinpoint to a definitive value. There is an obvious concern among organisations on how this problem should be handled; finding new methods for processing and storing imprecise data are therefore a key issue. Additionally, it is equally important to show that tacit knowledge and imprecise data can be used with success, which encourages organisations to analyse their imprecise data. The objective of the research conducted was therefore to explore how fuzzy ontologies could facilitate the exploitation and mobilisation of tacit knowledge and imprecise data in organisational and operational decision making processes. The thesis introduces both practical and theoretical advances on how fuzzy logic, ontologies (fuzzy ontologies) and OWA operators can be utilized for different decision making problems. It is demonstrated how a fuzzy ontology can model tacit knowledge which was collected from wine connoisseurs. The approach can be generalised and applied also to other practically important problems, such as intrusion detection. Additionally, a fuzzy ontology is applied in a novel consensus model for group decision making. By combining the fuzzy ontology with Semantic Web affiliated techniques novel applications have been designed. These applications show how the mobilisation of knowledge can successfully utilize also imprecise data. An important part of decision making processes is undeniably aggregation, which in combination with a fuzzy ontology provides a promising basis for demonstrating the benefits that one can retrieve from handling imprecise data. The new aggregation operators defined in the thesis often provide new possibilities to handle imprecision and expert opinions. This is demonstrated through both theoretical examples and practical implementations. This thesis shows the benefits of utilizing all the available data one possess, including imprecise data. By combining the concept of fuzzy ontology with the Semantic Web movement, it aspires to show the corporate world and industry the benefits of embracing fuzzy ontologies and imprecision.
Resumo:
Presentation at Open Repositories 2014, Helsinki, Finland, June 9-13, 2014
Resumo:
This study examines information security as a process (information securing) in terms of what it does, especially beyond its obvious role of protector. It investigates concepts related to ‘ontology of becoming’, and examines what it is that information securing produces. The research is theory driven and draws upon three fields: sociology (especially actor-network theory), philosophy (especially Gilles Deleuze and Félix Guattari’s concept of ‘machine’, ‘territory’ and ‘becoming’, and Michel Serres’s concept of ‘parasite’), and information systems science (the subject of information security). Social engineering (used here in the sense of breaking into systems through non-technical means) and software cracker groups (groups which remove copy protection systems from software) are analysed as examples of breaches of information security. Firstly, the study finds that information securing is always interruptive: every entity (regardless of whether or not it is malicious) that becomes connected to information security is interrupted. Furthermore, every entity changes, becomes different, as it makes a connection with information security (ontology of becoming). Moreover, information security organizes entities into different territories. However, the territories – the insides and outsides of information systems – are ontologically similar; the only difference is in the order of the territories, not in the ontological status of entities that inhabit the territories. In other words, malicious software is ontologically similar to benign software; they both are users in terms of a system. The difference is based on the order of the system and users: who uses the system and what the system is used for. Secondly, the research shows that information security is always external (in the terms of this study it is a ‘parasite’) to the information system that it protects. Information securing creates and maintains order while simultaneously disrupting the existing order of the system that it protects. For example, in terms of software itself, the implementation of a copy protection system is an entirely external addition. In fact, this parasitic addition makes software different. Thus, information security disrupts that which it is supposed to defend from disruption. Finally, it is asserted that, in its interruption, information security is a connector that creates passages; it connects users to systems while also creating its own threats. For example, copy protection systems invite crackers and information security policies entice social engineers to use and exploit information security techniques in a novel manner.
Resumo:
Janamittakaava: Russian wersts.
Resumo:
1:25000.
Resumo:
Arkit: 1 arkintunnukseton lehti, A-B4. - S. [2] tyhjä.
Resumo:
Ontology matching is an important task when data from multiple data sources is integrated. Problems of ontology matching have been studied widely in the researchliterature and many different solutions and approaches have been proposed alsoin commercial software tools. In this survey, well-known approaches of ontologymatching, and its subtype schema matching, are reviewed and compared. The aimof this report is to summarize the knowledge about the state-of-the-art solutionsfrom the research literature, discuss how the methods work on different application domains, and analyze pros and cons of different open source and academic tools inthe commercial world.
Resumo:
Kokouksen esitysten verkko-osoite: http://www.geoinfo.tuwien.ac.at/events/Euresco2000/gdgis.htm
Resumo:
Tämän diplomityön tarkoituksena on kuvata tiettyjen kunnallisten palvelujen rakenne ja prosessikuvaukset. Rakenne kuvataan OWL-mallinnuskielellä ja palvelun käyttäjien suorittamat toiminnot BPML-mallinnuskielen avulla. Työssä on tarkoituksena esittää, kuinka sekä rakenne että toiminnot pystytään kuvaamaan XML-pohjaisen esitystavan avulla, joita nämä OWL- ja BPML-mallinnuskielet ovat. Ensin esitellään työssä käytetyt mallinnuskielet ja ne ominaisuudet, jotka liittyvät tähän tutkimukseen. Tämän jälkeen esitellään työtä varten tehdyt työnkulkukaaviot ja rakennekaaviot,sekä näiden jalostus lopulliseen OWL-muotoon ja BPMN-muotoon . Työ jakautuu kahteen eri osavaiheeseen, joissa ensimmäisessä kerrotaan kuinka kunnallisen palvelun käsitemalli esitetään UML -luokkakaavioiden avulla ja kuinka tämä jalostetaan lopulliseen OWL-muotoon. Toinen osa työstä keskittyy palvelun prosessien mallintamiseen UML-työnkulkukaavioilla ja näiden kaavioiden muokkaamiseen BPMN-muotoon eli liiketoimintaprosessidiagrammeiksi. Kunnallisista palveluista valittiin tähän diplomityöhän tilanvaraus, jonka toimintaa on tarkasteltu haastattelemalla kuntien toimijoita, jotka ovat työssään tekemisissä tilanvaraustoimintojen kanssa. Tilanvarauksen osalta haastattelutiedot olivat valmiiksi saatavilla projektin avulla Päijät-Hämeen osalta, tosin tietojatäydennettiin haastattelemalla Kouvolan tilanvarauksesta huolehtivia henkilöitä.
Resumo:
Työn tavoitteena oli luoda sähkö- ja automaatiokunnossapidon markkinoinnin yhteistyö- ja toimintamalli sekä arvioida sähkö- ja automaatiokunnossapidon markkinoita rajatulla alueella. Kohdeyrityksenä työssä oli ABB Oy, Service. Ensin selvitettiin markkinoinnin nykytila kohdeyrityksessä sähkö- ja automaatiokunnossapidon osalta sisäisiä haastatteluja hyväksi käyttäen. Tämän jälkeen tutkittiin markkinoita ja soveltuvaa toimintatapaa sisäisten myyntilastojen ja asiakastietokantojen, sisäisten haastattelujen ja alueellisen vertailun avulla. Diplomityössä tutustuttiin haastattelujen ja seminaarien avulla myös alueen myyntikonsepteihin ja yhdistettiin olemassa olevista konsepteista myyntikonsepti, joka tukee sähkö- ja automaatiokunnossapidon markkinoinnin yhteistyötä. Työssä luotiin malli ABB Oy, Servicen Etelä-Suomen alueen sähkö- ja automaatiokunnossapidon markkinointiin. Mallissa käsiteltiin neljää osa-aluetta: toimintaa yhdistävää palvelukonseptia, organisaatiota ja organisaation muutosta, konsepteille soveltuvia asiakkaita ja markkinointitoimenpiteitä. Diplomityössä todettiin, että mallin käyttöönotto vaatii muutosjohtamista yrityksen sisällä ja mallissa ehdotettiinkin sisäisen markkinoinnin ja muutosjohtamisen keinoja mallin käyttöönottamiseksi. Toimenpide-ehdotuksena esitetään mallin pilotointia valituille asiakkaille. Lisätutkimusta tarvitaan muutamilta diplomityössä sivutuilta osa-alueilta. Näihin kuuluvat esimerkiksi tarkan asiakaskohtaisen kunnossapidon tarpeen määrittäminen eri asiakasyrityksissä sekä yhteistyökuvion määrittäminen niiden konseptiin liittyvien ABB:n sisäisten tahojen kanssa, joiden osuutta ei tässä työssä käsitelty.
Resumo:
Olavi Granö (s. 1925) on ollut Turun yliopiston maantieteen professorina 1962–88 ja kanslerina 1984–94. Hän on tutkinut Suomen ja Pohjanmeren rannikoita sekä maantieteen teoriaa ja historiaa. Olavi Granön rannikkomaantiedettä käsittelevä avokokoelma on sijoitettu Turun yliopiston Bio-geotieteiden kirjastoon. Hän on itse lahjoittanut kokoelmansa ja lahjoitus jatkuu edelleen. Kokoelma on luetteloitu Turun yliopiston Volter-tietokantaan.
Resumo:
Kirjallisuusarvostelu
Resumo:
Increasing usage of Web Services has been result of efforts to automate Web Services discovery and interoperability. The Semantic Web Service descriptions create basis for automatic Web Service information management tasks such as discovery and interoperability. The discussion of opportunities enabled by service descriptions have arisen in recent years. The end user has been considered only as a consumer of services and information sharing occurred from one service provider to public in service distribution. The social networking has changed the nature of services. The end user cannot be seen anymore only as service consumer, because by enabling semantically rich environment and right tools, the end user will be in the future the producer of services. This study investigates the ways to provide for end users the empowerment to create service descriptions on mobile device. Special focus is given to the changed role of the end user in service creation. In addition, the Web Services technologies are presented as well as different Semantic Web Service description approaches are compared. The main focus in the study is to investigate tools and techniques to enable service description creation and semantic information management on mobile device.