Virtual Knowledge Graphs (VKGs) constitute one of the most promising paradigms for integrat-ing and accessing legacy data sources. A critical bottleneck in the integration process involves the definition, validation, ...
详细信息
Virtual Knowledge Graphs (VKGs) constitute one of the most promising paradigms for integrat-ing and accessing legacy data sources. A critical bottleneck in the integration process involves the definition, validation, and maintenance of mapping assertions that link data sources to a domain ontology. To support the management of mappings throughout their entire lifecycle, we identify a comprehensive catalog of sophisticated mapping patterns that emerge when linking databases to ontologies. To do so, we build on well-established methodologies and patterns studied in data management, data analysis, and conceptual modeling. These are extended and refined through the analysis of concrete VKG benchmarks and real-world use cases, and considering the inherent impedance mismatch between data sources and ontologies. We validate our catalog on the considered VKG scenarios, showing that it covers the vast majority of mappings present therein.
Background: The clinical target volume (CTV) for postoperative radiotherapy for thoracic esophageal squamous cell carcinoma (TESCC) needs to be defined. The study aim was to map metastatic lymph nodes (LNMs) in a comp...
详细信息
Background: The clinical target volume (CTV) for postoperative radiotherapy for thoracic esophageal squamous cell carcinoma (TESCC) needs to be defined. The study aim was to map metastatic lymph nodes (LNMs) in a computed tomography (CT)-based atlas and delineate the postoperative radiotherapy target area. Methods: Sixty-nine TESCC patients with first recurrent regional LNMs after esophagectomy were included. The LNM epicenters were registered onto corresponding anatomic axial CT images of a standard patient in the treatment position, with reference to the surrounding vascular and bony structures. The LNM sites were based on lymph node map of esophageal cancer, AJCC 8th. The lymph metastasis risk for different segments of thoracic esophagus was assessed. Results: One hundred and seventy-nine LNMs were mapped onto standard axial CT images. The upper-middle mediastinum region (station 1 to 8 M) contained 97% of metastases in the upper segment of thoracic esophagus, 90% in the middle segment, and 66% in the lower one. Advanced pathological stage (>==IIIB) might be a predictive factor for upper abdominal region (UAR) relapse in lower TESCC. Lower cervical para-tracheal LNMs were within a 4.3-cm bilaterally expanded area from the midline of the body and a 2.2-cm expanded area from the anterior of vertebral body, from the superior border of the C7, to the inferior border of the first thoracic vertebra. Conclusion: A modified target from the upper border of C7 to the lower border of caudal margin of the inferior pulmonary vein level could cover the high-risk area of TESCC underwent postoperative radiotherapy. UAR seems to be an elective irradiation target for lower TESCC at pathological IIIB stage and higher.
We describe the RDB2OWL Lite language for relational database to RDF/OWL mapping specification and discuss the architectural and content specification patterns arising in mapping definition. RDB2OWL Lite is a simplifi...
详细信息
ISBN:
(纸本)9783319401805;9783319401799
We describe the RDB2OWL Lite language for relational database to RDF/OWL mapping specification and discuss the architectural and content specification patterns arising in mapping definition. RDB2OWL Lite is a simplification of original RDB2OWL with aggregation possibilities and order-based filters removed, while providing in-mapping SQL view definition possibilities. The mapping constructs and their usage patterns are illustrated on mapping examples from medical domain: medicine registries and hospital information system. The RDB2OWL Lite mapping implementation is offered both via translation into D2RQ and into standard R2RML mapping notations.
The synaesthetic mapping pattern of modern Chinese lexicon have long been a focal point in both national and international linguistic studies. However, issues at the morpheme level are scarce, and there is rarely inco...
详细信息
ISBN:
(纸本)9789819705825;9789819705832
The synaesthetic mapping pattern of modern Chinese lexicon have long been a focal point in both national and international linguistic studies. However, issues at the morpheme level are scarce, and there is rarely incorporating psychological sensations into mapping models. This paper meticulously analyzes 279 synaesthetic cases, derived from 190 adjectival sensory words in the Modern Chinese Dictionary (7th Edition). Through this analysis, 27 synaesthesia patterns are identified. It is discovered that the phenomenon of synaesthesia in modern Chinese significantly differs at the morpheme level and lexicon level. Notably, psychological feeling in Chinese synaesthesia is frequently mapped as destination, becoming a distinctive feature of these metaphors. This finding provides new perspectives and methods for research in lexicology, etymology, and machine translation. Studying sensory metaphors within words in the Chinese lexicon and comparing them with those within phrases revealed the characteristics of sensory word formation in modern Chinese, offering fresh insights and examples for research in etymology and semantic evolution.
The Network Functions Virtualization (NFV) technology is a network architecture that virtualizes traditional network services into virtualized network functions (VNFs) which are dependent on the reliability and securi...
详细信息
The Network Functions Virtualization (NFV) technology is a network architecture that virtualizes traditional network services into virtualized network functions (VNFs) which are dependent on the reliability and security of standard hardware appliances (HAs). The mapping relationship between VNFs and HAs is very complicated, and designing secure routing for the multi-layer NFV network to defend against attacks such as Sybil attack is challenging. In this work, we first designed the mapping patterns of VNFs and HAs in the NFV network. Secondly, we propose a security capacity formulation model which profoundly relies on the mapping patterns. Thirdly, a new multi-path secure routing referred to as SecRouting is suggested to navigate data packets to avoid the Sybil attackers. Finally, we systematically evaluate the security capacity and traffic capacity of the proposed SecRouting compared with many baselines.
暂无评论