126 research outputs found

    Mind the Gap!:Learning Missing Constraints from Annotated Conceptual Model Simulations

    Get PDF
    Conceptual modeling plays a fundamental role to capture information about complex business domains (e.g., finance, healthcare) and enables semantic interoperability. To fulfill their role, conceptual models must contain the exact set of constraints that represent the worldview of the relevant domain stakeholders. However, as empirical results show, modelers are subject to cognitive limitations and biases and, hence, in practice, they produce models that fall short in that respect. Moreover, the process of formally designing conceptual models is notoriously hard and requires expertise that modelers do not always have. This paper falls in the general area concerned with the development of artificial intelligence techniques for the enterprise. In particular, we propose an approach that leverages model finding and inductive logic programming (ILP) techniques. We aim to move towards supporting modelers in identifying domain constraints that are missing from their models, and thus improving their precision w.r.t. their intended worldviews. Firstly, we describe how to use the results produced by the application of model finding as input to an inductive learning process. Secondly, we test the approach with the goal of demonstrating its feasibility and illustrating some key design issues to be considered while using these techniques.</p

    An Ontology-Driven Approach for Process-Aware Risk Propagation

    Get PDF
    Risk Propagation (RP) is a central technique that allows the calculation of the cascading effect of risk within a system. At the current state, there is a lack of risk propagation solutions that can be used to assess the impact of risk at different levels of abstraction, accounting for actors, processes, physical-digital objects, and their relations. To fill this gap, in this paper, we propose a process-aware risk propagation approach that builds on two main components: i. an ontology, which supports functionalities typical of Semantic Web technologies (SWT), and ii. an ad hoc method to calculate the propagation of risk within the given system. We implemented our approach in a proof-of-concept tool, which was validated in the cybersecurity domain.</p

    Ontology-Driven Cross-Domain Transfer Learning.

    Get PDF
    The aim of transfer learning is to reuse learnt knowledge across different contexts. In the particular case of cross-domain transfer (also known as domain adaptation), reuse happens across different but related knowledge domains. While there have been promising first results in combining learning with symbolic knowledge to improve cross-domain transfer results, the singular ability of ontologies for providing classificatory knowledge has not been fully exploited so far by the machine learning community. We show that ontologies, if properly designed, are able to support transfer learning by improving generalization and discrimination across classes. We propose an architecture based on direct attribute prediction for combining ontologies with a transfer learning framework, as well as an ontology-based solution for cross-domain generalization based on the integration of top-level and domain ontologies. We validate the solution on an experiment over an image classification task, demonstrating the system's improved classification performance

    Ontology-based security modeling in ArchiMate

    Get PDF
    Enterprise Risk Management involves the process of identification, evaluation, treatment, and communication regarding risks throughout the enterprise. To support the tasks associated with this process, several frameworks and modeling languages have been proposed, such as the Risk and Security Overlay (RSO) of ArchiMate. An ontological investigation of this artifact would reveal its adequacy, capabilities, and limitations w.r.t. the domain of risk and security. Based on that, a language redesign can be proposed as a refinement. Such analysis and redesign have been executed for the risk elements of the RSO grounded in the Common Ontology of Value and Risk. The next step along this line of research is to address the following research problems: What would be the outcome of an ontological analysis of security-related elements of the RSO? That is, can we identify other semantic deficiencies in the RSO through an ontological analysis? Once such an analysis is provided, can we redesign the security elements of the RSO accordingly, in order to produce an improved artifact? Here, with the aid of the Reference Ontology for Security Engineering (ROSE) and the ontological theory of prevention behind it, we address the remaining gap by proceeding with an ontological analysis of the security-related constructs of the RSO. The outcome of this assessment is an ontology-based redesign of the ArchiMate language regarding security modeling. In a nutshell, we report the following contributions: (1) an ontological analysis of the RSO that identifies six limitations concerning security modeling; (2) because of the key role of the notion of prevention in security modeling, the introduction of the ontological theory of prevention in ArchiMate; (3) a well-founded redesign of security elements of ArchiMate; and (4) ontology-based security modeling patterns that are logical consequences of our proposal of redesign due to its underlying ontology of security. As a form of evaluation, we show that our proposal can describe risk treatment options, according to ISO 31000. Finally, besides presenting multiple examples, we proceed with a real-world illustrative application taken from the cybersecurity domain.</p

    Ages of massive galaxies at 0.5<z<2.00.5 < z < 2.0 from 3D-HST rest-frame optical spectroscopy

    Full text link
    We present low-resolution near-infrared stacked spectra from the 3D-HST survey up to z=2.0z=2.0 and fit them with commonly used stellar population synthesis models: BC03 (Bruzual & Charlot, 2003), FSPS10 (Flexible Stellar Population Synthesis, Conroy & Gunn 2010), and FSPS-C3K (Conroy, Kurucz, Cargile, Castelli, in prep). The accuracy of the grism redshifts allows the unambiguous detection of many emission and absorption features, and thus a first systematic exploration of the rest-frame optical spectra of galaxies up to z=2z=2. We select massive galaxies (log(M/M)>10.8\rm log(M_{*} / M_{\odot}) > 10.8), we divide them into quiescent and star-forming via a rest-frame color-color technique, and we median-stack the samples in 3 redshift bins between z=0.5z=0.5 and z=2.0z=2.0. We find that stellar population models fit the observations well at wavelengths below 6500A˚\rm 6500 \AA rest-frame, but show systematic residuals at redder wavelengths. The FSPS-C3K model generally provides the best fits (evaluated with a χred2\chi^2_{red} statistics) for quiescent galaxies, while BC03 performs the best for star-forming galaxies. The stellar ages of quiescent galaxies implied by the models, assuming solar metallicity, vary from 4 Gyr at z0.75z \sim 0.75 to 1.5 Gyr at z1.75z \sim 1.75, with an uncertainty of a factor of 2 caused by the unknown metallicity. On average the stellar ages are half the age of the Universe at these redshifts. We show that the inferred evolution of ages of quiescent galaxies is in agreement with fundamental plane measurements, assuming an 8 Gyr age for local galaxies. For star-forming galaxies the inferred ages depend strongly on the stellar population model and the shape of the assumed star-formation history.Comment: 13 pages, 15 figures, accepted for publication in Ap
    corecore