A comparison of complex correspondence detection techniques
نویسندگان
چکیده
One to one correspondences between entities are not always sufficient to describe the true relationship between related entities in diverse ontologies, and complex correspondences are needed instead. We demonstrate the types of complex correspondence occurring between two LOD sources and compare techniques for discovering these complex correspondences. 1 Motivation and Background Most alignment research focuses on one-to-one correspondences between named ontology elements [1], but these are not always sufficient for performing many integration tasks [2]. Data values, for example, may need some form of translation, or some form of condition may be required to scope a broader concept to correspond with a narrower one. These correspondences, which contain conditions or transformations, are known as complex correspondences. There are many known patterns of complex correspondence [2]. Conditional correspondences – where instances of a concept in one ontology are related to a corresponding concept in the other ontology only if they have a particular value for a given attribute – include Class by Attribute Type (CAT), Class by Attribute Value (CAV), and Class by Attribute Existence (CAE). Similarly, Class by Attribute Path Correspondences (PATH) occur when some path of attributes must be followed before the scope of the more general concept can be narrowed. Correspondences where the value of an attribute must be altered in some way are called Attribute Transformation Correspondences (ATC). In a sample of 50 concepts from YAGO2 [3], six of these concepts corresponded to equivalent concepts in the DBpedia [4] ontology, and 14 concepts required a Class by Attribute Value correspondence. Twenty-one concepts from YAGO2 corresponded with DBpedia concepts with broader scope which could not be narrowed with a correspondence pattern. Six YAGO2 concepts were aligned with DBpedia instances. We found no cases of CAT or PATH correspondences. 2 Detecting Complex Correspondences Approaches to detecting complex correspondences include a pattern based approach [5], multi relational data mining (MRDM) [6] and our model based approach [7]. Each approach differs in the particular types of correspondence it can detect, and these differences are outlined in table 1. The pattern based approach is the least flexible. For attribute value based patterns it is only capable of detecting cases where attributes have Boolean values. Each of the complex correspondences we found between DBpedia and YAGO2 use non-Boolean attributes, and so it could not detect these. The MRDM approach is more flexible, and is theoretically capable of finding most correspondence patterns listed in section 1, except value transformation patterns. Only the model fitting approach is capable of detecting value transformation correspondences. The current implementation can detect numerical transformations, but the approach could be extended to also detect transformations such as string splitting. Acknowledgement: This research is supported by the Science Foundation Ireland (Grant 08/SRC/I1403) as part of the FAME Strategic Research Cluster.
منابع مشابه
The Comparison between Two Different Digital Panoramic Radiography Techniques in the Detection of Proximal Caries
Introduction: Although proximal dental caries are very common, clinical examinations cannot detect them all. Panoramic radiography has been widely used in dentistry for both diagnosis and screening. This study aimed to investigate and compare the efficacy of two digital panoramic radiography techniques in the diagnosis of proximal caries. Methods: A total number of 60 patients referred to a den...
متن کاملOverview of Intrusion Detection Techniques in Database
Data is one of the most valuable assets in today's world and is used in the everyday life of every person and organization. This data stores in a database in order to restore and maintain its efficiently. Since there is a database that can be exploited by SQL injection attacks, internal threats, and unknown threats, there are always concerns about the loss or alteration of data by unauthorized ...
متن کاملVoltammetric Detection of Dopamine and Ascorbic Acid Using a Multi-Walled Carbon Nanotubes/Schiff Base Complex of Cobalt-Modified Glassy Carbon Electrode
The surface of the glassy carbon electrode (GCE) is modified with the composite of new Cobalt complex with a tetradentate Schiff base ligand derived from 3-ethoxysalicylaldehyde and 4,5-dimethyl orthophenylenediamine (CoOEtSal) and multi-walled carbon nanotube (MWCNT). The electrochemical oxidation of ascorbic acid (AA) and dopamine (DA) at the modified electrode was studied using the cyclic an...
متن کاملFault Detection of Anti-friction Bearing using Ensemble Machine Learning Methods
Anti-Friction Bearing (AFB) is a very important machine component and its unscheduled failure leads to cause of malfunction in wide range of rotating machinery which results in unexpected downtime and economic loss. In this paper, ensemble machine learning techniques are demonstrated for the detection of different AFB faults. Initially, statistical features were extracted from temporal vibratio...
متن کاملThe Use of Aptamer in Detection of Pathogenic Bacteria-
Detection, identification and measurement of microbial pathogens is critical for protecting public health. Although microbial culture-based tests and molecular techniques are currently the most commonly used, these techniques are time-consuming and require complex tools and experienced individuals. Consequently, it is costly to analyze these techniques. The emergence of the aptamer led to the e...
متن کامل