Classical knowledge representation methods traditionally work with established relations such as synonymy, hierarchy and unspecified associations. Recent developments like
ontologies and folksonomies show new forms of collaboration, indexing and knowledge representation and encourage the reconsideration of standard knowledge relationships. In a
summarizing overview we show which relations are currently utilized in elaborated knowledge representation methods and which may be inherently hidden in folksonomies and ontologies.
Source vs. Resource Ontology The notion of a resource is fundamental in current networked information systems. The term "resource" is used often, specifically in relation the World Wide Web and the W3C's semantic web activity, in standards such as Resour
FreePharma is a software plug-in that analyzes drug prescription information expressed in free natural language (written or spoken) and structures it automatically for integration in host applications. FreePharma can derive the dose, route, frequency etc.
M. Ryabinin, S. Popov, L. Prokhorenkova, und E. Voita. Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing (EMNLP), Seite 7317--7331. Online, Association for Computational Linguistics, (November 2020)
J. Zhang, Y. Dong, Y. Wang, J. Tang, und M. Ding. Proceedings of the 28th International Joint Conference on Artificial Intelligence, Seite 4278–4284. AAAI Press, (10.08.2019)
Z. Zhang, X. Han, Z. Liu, X. Jiang, M. Sun, und Q. Liu. Proceedings of the 57th Annual Meeting of the Association for Computational Linguistics, Seite 1441--1451. Florence, Italy, Association for Computational Linguistics, (Juli 2019)
Z. Zhang, X. Han, Z. Liu, X. Jiang, M. Sun, und Q. Liu. Proceedings of the 57th Annual Meeting of the Association for Computational Linguistics, Seite 1441--1451. Florence, Italy, Association for Computational Linguistics, (Juli 2019)
Gayrat, und Avazjon. IJIRIS:: International Journal of Innovative Research in Information Security, Volume VI (Issue III):
38-42(März 2019)1 Federal Agency on Technical Regulation and Metrology: Block ciphers (2015). http://www.tc26.ru/en/standard/draft/ENG_GOST_R_bsh.pdf. 2 Information technology. Cryptographic data security. Block ciphers operation modes. URL: http://www.tc26.ru/standard/ gost/GOST_R_ 3413-2015.pdf. 3 E. Biham, A. Shamir. Differential cryptanalysis of DES-like cryptosystems // Journal Cryptology. 1991. V. 4. P. 3–72. 4 R. AlTawy, A. Youssef, Meet in the Middle Attack on Reduced Round Kuznyechik, https://eprint.iacr.org/2015/ 096.pdf, pp. 9-12. 5 A. Biryukov, L. Perrin, A. Udovenko, Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1 (Full Version), https://eprint.iacr.org/ 2016/071.pdf, p. 3. 6 V. Dolmatov, GOST R 34.12-2015: Block Cipher "Kuznyechik. http://www.protocols.ru/WP/wp-content/ uploads/2016 /03/ rfc7801.pdf, pp. 3-4. 7 G.U. Juraev, A.A. Ikramov, A.R. Marakhimov, About differential cryptanalysis algorithm of block encryption Kuznyechik //International Journal of Advanced Research in Science, Engineering and Technology. Vol. 6, Issue 2, Feb 2019. –P. 8164-8169. http://www.ijarset.com/upload/2019/february/26-IJARSET-gjuraev.pdf..