Harvesting Pertinent Resources from Linked Open Data
نویسندگان
چکیده
AbstrAct: Linked Open Data (LOD) is becoming an essential part of the Semantic Web. Although LOD has amassed large quantities of structured data from diverse, openly available data sources, there is still a lack of user-friendly interfaces and mechanisms for exploring this huge resource. In this paper, we describe a methodology for harvesting relevant information from the gigantic LOD cloud. The methodology is based on combination of information: identification, extraction, integration and presentation. Relevant information is identified by using a set of heuristics. The identified information resource is extracted by employing an intelligent URI discovery technique. The extracted information is further integrated with the help of a Concept Ag-gregation Framework. Then the information is presented to end users in logical informational aspects. Thereby, the proposed system is capable of hiding complex underlying semantic mechanics from end users and reducing the users' cognitive load in locating relevant information. In this paper, we describe the methodology and its implementation in the CAF-SIAL system, and compare it with the state of the art.
منابع مشابه
Navigating learning Resources through Linked Data: a preliminary Report on the Re-Design of Organic.Edunet
Learning objects repositories have grown and matured in the last years, being currently a cornerstone for open education. Several current systems are offering metadata openly through mainstream harvesting protocols or providing standardized query interfaces. Also, the use of standardized vocabularies or ontologies is becoming more common to provide a degree of semantic interoperability. However...
متن کاملThe OAI2LOD Server: Exposing OAI-PMH Metadata as Linked Data
Many institutions grant access to their metadata repositories via the Open Archives Initiative Protocol for Metadata Harvesting (OAI-PMH). However, this protocol has two significant drawbacks: it does not make its resources accessible via dereferencable URIs, and it provides only restricted means of selective access to metadata. The OAI2LOD Server handles these shortcomings by republishing meta...
متن کاملPanning for Gold: Automatically Analysing Social Engineering Attack Surfaces
The process of social engineering targets people rather than IT infrastructure. Attackers use deceptive ploys to create compelling behavioural and cosmetic hooks, which in turn lead a target to disclose sensitive information or to interact with a malicious payload. The creation of such hooks requires background information on targets. Individuals are increasingly releasing information about the...
متن کاملEvolving LIDO based aggregations into Linked Data
During the last few years digital evolution of the Cultural Heritage field has accelerated rapidly, not least through the aggregation of cultural content into Europeana. In this process the LIDO harvesting schema has been successfully used in many EU projects (ATHENA , JUDAICA and others) due to its ability to support the full range of descriptive information about museum objects. The next step...
متن کاملInvestigating Embedded Question Reuse in Question Answering
The investigation presented in this paper is a novel method in question answering (QA) that enables a QA system to gain performance through reuse of information in the answer to one question to answer another related question. Our analysis shows that a pair of question in a general open domain QA can have embedding relation through their mentions of noun phrase expressions. We present methods f...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- JDIM
دوره 8 شماره
صفحات -
تاریخ انتشار 2010