Journal:Informatica
Volume 18, Issue 4 (2007), pp. 511–534
Abstract
The advance of the Web has significantly and rapidly changed the way of information organization, sharing and distribution. The next generation of the web, the semantic web, seeks to make information more usable by machines by introducing a more rigorous structure based on ontologies. In this context we try to propose a novel and integrated approach for a semi-automated extraction of ontology-based semantic web from data-intensive web application and thus, make the web content machine-understandable. Our approach is based on the idea that semantics can be extracted by applying a reverse engineering technique on the structures and the instances of HTML-forms which are the most convenient interface to communicate with relational databases on the current data-intensive web application. This semantics is exploited to produce over several steps, a personalised ontology.
Journal:Informatica
Volume 15, Issue 1 (2004), pp. 3–22
Abstract
The paper deals with the intelligent functional model for optimizing the product design and its manufacturing process in hybrid manufacturing systems consisting of people, machines and computers. The knowledge‐based framework of an intelligent functional model has been developed. It furnishes the possibility for a product designer and manufacturer to find an optimal production plan in the early stage of the product design. The mathematical model formalization is provided. A consecutive optimization scheme has been applied for selecting an optimal alternative of a product design and its production plan. The proposed model is being implemented both in industry and university education process.
Journal:Informatica
Volume 4, Issues 1-2 (1993), pp. 199–216
Abstract
An analysis of an event driven local area network protocol for special purposes in industrial applications is represented. The analysis is performed using the specification language ESTELLE/Ag and protocol analysis tool PRANAS-2. Validation was focused on the correctness media access algorithm, initialization of the protocol and recovery from error situations. The obtained simulation results can be used for comparison of the effectiveness of this protocol with other protocols.