Semantic Interoperability Sample Clauses

Semantic Interoperability. The goal of data or information interoperability is to provide a way to access to data or information in multiple or heterogenous sources. Many researchers and prototypes have been done in the eld of information interoperability. Traditional approach was contributed by researchers from database area, and include ANSI/SPARC architecture, Federated Architecture and Dataware- house architecture. However, it based on point to point translation/convertion or developing global as view (GAV). This approach has problems in hetero- geneity of sources, dynamic of environment, and huge number of sources. Integration and interoperability is the important keys for the modern in- formation systems. However, the information sources are more heterogeneity (syntactic, structure, ad semantic), large number, dynamic of content and lo- cation, autonomy and open. Therefore, information interoperability requires di erence in modeling, representation, and accessing of sources. Researchers and practitioners in the elds of database and information integration have produced a large e ort to facilitate interoperability [96]. The sub-chapter on semantic interoperability consist of three sections. First, we introduce the main problems in information integration or inter- operability, including approach in schema and ontology mapping. Next, we present a classi cation of the approaches in semantic integration or interop- erability. Generic solution of semantic integration and interoperability can be categorized in two models: tightly coupled solution and loosely coupled solution. Main part of sub-chapter is review of implementation semantic web for integration or interoperability of heterogeneous information sources. Se- mantic integration or interoperability is an active area of research in several disciplines. Results of state of the art are comparison of related approaches and as a research foundation.
AutoNDA by SimpleDocs
Semantic Interoperability. 2.2.1 The main problems Xxxxxxx-Xxx et al. write [13]: "Some low-level service-discovery schemes are currently available such as Microsoft's Universal Plug and Play, which fo- cuses on connecting di erent types of devices, and Sun Microsystems's Jini, which aims to connect services. These initiatives, however, attack the prob- lem at a structural or syntactic level and rely heavily on standardization of a predetermined set of functionality descriptions. Standardization can only go so far, because it can not anticipate all possible future needs. The Semantic Web, in contrast, is more exible." Internet and the World Wide Web is increasing the number of information sources, the need of data exchange, the need of integration / interoperability and introducing new problems. The problems can be categorized in informa- tion sources and information exchange. Information sources in Internet introduces problems as follows [52]: the product of many individuals who have di erent domain and inter- est. Di erent domain can use di erent 'vocabulary', the main factor of the di erences of vocabulary is less of control in content and catalog. Furthermore, con icts can be occurred among the web as information sources. Increasing of autonomy will give other problem for integration. There are many kind of autonomy according to Xxxx [80] as follows: design autonomy (own data representation, own domain), communi- cation autonomy (communicate to others), execution autonomy (local operation without in uenced by external operation), and association autonomy (share degree of sources). According to Xxxxx [89] there are 2 groups of heterogeneity: information and system heterogeneity. Many types of heterogeneity are due to technolog- ical di erences. Researchers and developers have been working on resolving the heterogeneity for many years. Information heterogeneity has lead to dif- ferent level in interoperability of system, syntactic, structure, and semantic. Table 2.1 present diversity of information system. Syntactic heterogeneity is concerned with di erences in the representation and encoding of data. It also referred to as format, such as: data format heterogeneity. Schemas are de nitions that specify the structure of data and are the result of a database design phase. For example: homonyms, synonyms or di erent attributes in database tables Hakimpour [49] distinguishes two types of heterogeneity: data hetero- geneity and semantic heterogeneity. Data heterogeneity refers to di er...
Semantic Interoperability. Public data, i.e. all information that public authorities in the EU produce, process or purchase, represent one of the key sources of smart growth. Certain partial results have been achieved at the EU level, creating an implementation framework at the national level32. From the viewpoint of the data domain for the pan-European digital single market architecture, the biggest challenge represents transition to a new paradigm for data storage and management. For this purpose, the key pan-European platform is the “open data” initiative based on the relevant EU Directive33 and the ISA programme34. The open-data issue will also be addressed by the new Connecting Europe Facility (CEF) which, among other things, will support the implementation of the data (Open Data Digital Service Infrastructure), including the pan-European open data portal, in keeping with the steps taken so far35. The SR is among countries with the lowest level of openness in terms of availability of public data, including reference data administered in public administration registers36, which are needed for the exercise of public authority. Lacking quality in the current standard and openness of public data is evident from the level of sophistication of e- Government services37 in Slovakia. The problem is that electronic services require the availability of reference registers, which do not exist, and some basic registers (register of legal entities, natural persons, spatial information) are only in the implementation phase under the Operational Programme “Informatisation of Society” (hereinafter “OPIS”) and their availability is envisaged for 2015. Despite the fact that sufficient amount of data is available to public administration in the SR, administration is unable to use them effectively, in particular due to technical and legal reasons.
Semantic Interoperability using controlled vocabularies: Due to the project’s user centric design, clear and effective communication among the participating partners is essential. Medical staff tends to use a very specific kind of language that is hardly understandable for patients, especially for less educated users. Therefore, it is important to provide non ambiguous feedback and instructions to avoid unwanted harmful consequences from using the system. Controlled vocabularies have proven as a means for providing standardized communication between medical staff, system developers and users patients. This module assists essentially the Virtual Individual Model.
Semantic Interoperability. Today there are islands of well-defined semantics for use in e-commerce, such as universal classification schemas (EAN/UCC, UNSPSC …) and standard e-commerce frameworks (RosettaNet, OAGIS, ebXML, xCBL …). But there is no generally available, overall and unified business semantics across existing standards. Similar business concepts are being expressed differently, using different semantic depth, which results in ambiguous and overlapping concepts when considered in an integration scenario. This in turn leads to drastic increase in complexity and cost of integration. This also prevents ad-hoc collaboration scenarios between partners using different e-commerce frameworks. Well-established older standards will linger, so that this aspect of integration will not go away any time soon. The ECIMF project group has identified the need for better and more effective methods for semantic mapping. Some of the most promising methods use upper- level shared ontologies – however, there is no such common unified ontology available at the moment. Readers are encouraged to review Annex 3, where this problem is discussed in depth. Some of the existing projects are working intensively in this area, specifically: • ISO TC/154 Basic Semantic Register: provides a cross-linked reference to key concepts across several existing e-commerce standards. • ECIMF Semantic Mapping Tool: provides a prototype tool to facilitate semantic translation process, with use of shared ontology. • OntoWeb projects: several projects, e.g. on ontology-based integration of content standards (SIG1), and industrial applications of ontologies (SIG4) And other similar projects. However, there is still much to be done before the average e-commerce user begins to benefit from this work. The ECIMF project clearly identifies this issue as a fundamental integration problem, and recommends both further basic research into efficient methods of semantic mapping, and a development of upper-level shared e-commerce ontology for the purpose of such mapping.
Semantic Interoperability 

Related to Semantic Interoperability

  • Interoperability To the extent required by applicable law, Cisco shall provide You with the interface information needed to achieve interoperability between the Software and another independently created program. Cisco will provide this interface information at Your written request after you pay Cisco’s licensing fees (if any). You will keep this information in strict confidence and strictly follow any applicable terms and conditions upon which Cisco makes such information available.

  • Registry Interoperability and Continuity Registry Operator shall comply with the Registry Interoperability and Continuity Specifications as set forth in Specification 6 attached hereto (“Specification 6”).

  • Network Interface Device 4.1 The NID is defined as any means of interconnection of end-user customer premises wiring to BellSouth’s distribution plant, such as a cross-connect device used for that purpose. The NID is a single-line termination device or that portion of a multiple-line termination device required to terminate a single line or circuit at the premises. The NID features two independent xxxxxxxx or divisions that separate the service provider’s network from the End User’s on-premises wiring. Each chamber or division contains the appropriate connection points or posts to which the service provider and the End User each make their connections. The NID provides a protective ground connection and is capable of terminating cables such as twisted pair cable. 4.1.1 BellSouth shall permit Al-Call to connect Al-Call ’s loop facilities to on-premises wiring through the BellSouth NID or at any other technically feasible point.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CSTC chooses to subtend a Verizon access Tandem, CSTC’s NPA/NXX must be assigned by CSTC to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG. 9.2.2 CSTC shall establish Access Toll Connecting Trunks pursuant to applicable access Tariffs by which it will provide Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic to and from CSTC’s Customers. 9.2.3 The Access Toll Connecting Trunks shall be two-way trunks. Such trunks shall connect the End Office CSTC utilizes to provide Telephone Exchange Service and Switched Exchange Access to its Customers in a given LATA to the access Tandem(s) Verizon utilizes to provide Exchange Access in such LATA. 9.2.4 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access to allow CSTC’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier which is connected to a Verizon access Tandem.

  • Network Interconnection Architecture Each Party will plan, design, construct and maintain the facilities within their respective systems as are necessary and proper for the provision of traffic covered by this Agreement. These facilities include but are not limited to, a sufficient number of trunks to the point of interconnection with the tandem company, and sufficient interoffice and interexchange facilities and trunks between its own central offices to adequately handle traffic between all central offices within the service areas at a P.01 grade of service or better. The provisioning and engineering of such services and facilities will comply with generally accepted industry methods and practices, and will observe the rules and regulations of the lawfully established tariffs applicable to the services provided.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes. 11.2 We may (i) compile statistical and other information related to the performance, operation and use of the Services, and (ii) use data from the Services in aggregated form for security and operations management, to create statistical analyses, and for research and development purposes (clauses i and ii are collectively referred to as “Service Analyses”). We may make Service Analyses publicly available; however, Service Analyses will not incorporate Your Content, Personal Data or Confidential Information in a form that could serve to identify You or any individual. We retain all intellectual property rights in Service Analyses. 11.3 We may provide You with the ability to obtain certain Oracle Software (as defined below) for use with the Services. If we provide Oracle Software to You and do not specify separate terms for such software, then such Oracle Software is provided as part of the Services and You have the non-exclusive, worldwide, limited right to use such Oracle Software, subject to the terms of this Agreement and Your order (except for separately licensed elements of the Oracle Software, which separately licensed elements are governed by the applicable separate terms), solely to facilitate Your use of the Services. You may allow Your Users to use the Oracle Software for this purpose, and You are responsible for their compliance with the license terms. Your right to use any Oracle Software will terminate upon the earlier of our notice (by web posting or otherwise) or the end of the Services associated with the Oracle Software. Notwithstanding the foregoing, if Oracle Software is licensed to You under separate terms, then Your use of such software is governed by the separate terms. Your right to use any part of the Oracle Software that is licensed under the separate terms is not restricted in any way by this Agreement.

  • Antivirus software All workstations, laptops and other systems that process and/or store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have installed and actively use comprehensive anti-virus software solution with automatic updates scheduled at least daily.

  • One-Way Interconnection Trunks 2.3.1 Where the Parties use One-Way Interconnection Trunks for the delivery of traffic from Onvoy to Frontier, Onvoy, at Xxxxx’s own expense, shall: 2.3.1.1 provide its own facilities for delivery of the traffic to the technically feasible Point(s) of Interconnection on Frontier’s network in a LATA; and/or 2.3.1.2 obtain transport for delivery of the traffic to the technically feasible Point(s) of Interconnection on Frontier’s network in a LATA (a) from a third party, or, (b) if Frontier offers such transport pursuant to a Frontier access Tariff, from Frontier. 2.3.2 For each Tandem or End Office One-Way Interconnection Trunk group for delivery of traffic from Onvoy to Frontier with a utilization level of less than sixty percent (60%) for final trunk groups and eighty-five percent (85%) for high usage trunk groups, unless the Parties agree otherwise, Onvoy will promptly submit ASRs to disconnect a sufficient number of Interconnection Trunks to attain a utilization level of approximately sixty percent (60%) for all final trunk groups and eighty-five percent (85%) for all high usage trunk groups. In the event Onvoy fails to submit an ASR to disconnect One-Way Interconnection Trunks as required by this Section, Frontier may disconnect the excess Interconnection Trunks or bill (and Onvoy shall pay) for the excess Interconnection Trunks at the rates set forth in the Pricing Attachment. 2.3.3 Where the Parties use One-Way Interconnection Trunks for the delivery of traffic from Frontier to Onvoy, Frontier, at Frontier’s own expense, shall provide its own facilities for delivery of the traffic to the technically feasible Point(s) of Interconnection on Frontier’s network in a LATA.

  • Loop Provisioning Involving Integrated Digital Loop Carriers 2.6.1 Where Xxxx has requested an Unbundled Loop and BellSouth uses IDLC systems to provide the local service to the End User and BellSouth has a suitable alternate facility available, BellSouth will make such alternative facilities available to Xxxx. If a suitable alternative facility is not available, then to the extent it is technically feasible, BellSouth will implement one of the following alternative arrangements for Xxxx (e.g. hairpinning): 1. Roll the circuit(s) from the IDLC to any spare copper that exists to the customer premises. 2. Roll the circuit(s) from the IDLC to an existing DLC that is not integrated. 3. If capacity exists, provide "side-door" porting through the switch. 4. If capacity exists, provide "Digital Access Cross Connect System (DACS)- door" porting (if the IDLC routes through a DACS prior to integration into the switch). 2.6.2 Arrangements 3 and 4 above require the use of a designed circuit. Therefore, non- designed Loops such as the SL1 voice grade and UCL-ND may not be ordered in these cases. 2.6.3 If no alternate facility is available, and upon request from Xxxx, and if agreed to by both Parties, BellSouth may utilize its Special Construction (SC) process to determine the additional costs required to provision facilities. Xxxx will then have the option of paying the one-time SC rates to place the Loop.

  • Hardware and Software Requirements In order to access and retain Disclosures electronically, you must satisfy the following computer hardware and software requirements: access to the Internet; an email account and related software capable of receiving email through the Internet; a web browser which is SSL-compliant and supports secure sessions, and hardware capable of running this software.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!