Computer Science ›› 2018, Vol. 45 ›› Issue (6A): 502-505.

• Interdiscipline & Application • Previous Articles     Next Articles

Process Modeling on Knowledge Graph of Equipment and Standard

YIN Liang1,HE Ming-li1,XIE Wen-bo2,CHEN Duan-bing2,3,4   

  1. The Academy of Armored Forces Engineering,Beijing 100072,China1
    School of Computer Science and Engineering,University of Electronic Science and Technology of China,Chengdu 611731,China2
    Center for Big Data,University of Electronic Science and Technology of China,Chengdu 611731,China3
    The Center for Digitized Culture and Media,University of Electronic Science and Technology of China,Chengdu 611731,China4
  • Online:2018-06-20 Published:2018-08-03

Abstract: In order to clearly describe the complex association between equipment,standards,and standardized elements,it is an importantly analytical tool to construct a knowledge graph of equipment-standard.Using the constructed knowledge graph of equipment-standard,the transformation of standardization research can be achieved from model following to system leading,from qualitative analysis to quantitative analysis,and from individual evaluation to system ve-rification.The process modeling is a key step in the knowledge graph modeling.The IDEF3 method is applied to model the main structure of knowledge graph and the sub-processes involved.A heterogeneous network model of equipment-standard knowledge graph is obtained through process modeling.

Key words: Knowledge graph, Process modeling, Heterogeneous network model

CLC Number: 

  • TP391
[1]LIN Y,LIU Z,SUN M,et al.Learning entity and relation embeddings for knowledge graph completion[C]∥Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence.2015:2181-2187.
[2]JI G,LIU K,HE S,et al.Knowledge graph Completion with adaptive sparse transfer matrix[C]∥Proceedings of the Thir-tieth AAAI Conference on Artificial Intelligence.2016:985-991.
[3]YANG S,ZOU L,WANG Z,et al.Efficiently answering technical questions-A knowledge graph approach[C]∥Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence.2017:3111-3118.
[4]HEIKO P.Knowledge graph refinement:A survey of approaches and evaluation methods[J].Semantic Web,2017,8(3):489-508.
[5]NIKOLAEV F,KOTOV A,ZHILTSOV N.Parameterized fielded term dependence models for Ad-hoc entity retrieval from knowledge graph[C]∥Proceedings of the 39th International ACM SIGIR Conference on Research and Development in Information Retrieval.Pisa,Italy,2016:435-444.
[6]BRACHMAN R J.What IS-A is and isn’t:An analysis of taxonomic links in semantic networks [J].Computer,1983,10:30-36.
[7]STEINER T,VERBORGH R,TRONCY R,et al.Adding realtime coverage to the Google knowledge graph[C]∥Proceedings of the 2012th International Conference on Posters & Demonstrations Track-Volume,2012:65-68.
[8]WANG Z,WANG Z,LI J,et al.Knowledge extraction from Chinese wiki encyclopedias[J].Journal of Zhejiang University Scien-ce C,2012,13(4):268-280.
[9]ZENG Y,WANG H,HAO H,et al.Statistical and structural analysis of web-based collaborative knowledge bases generated from Wiki Encyclopedia[C]∥Proceedings of the 2012 IEEE/WIC/ACM International Joint Conferences on Web Intelligence and Intelligent Agent Technology-Volume 01.IEEE Computer Society,2012:553-557.
[10]HUANG Z,CHUANG W,ONG T H,et al.A graph-based re- commender system for digital library[C]∥Proceedings of the 2nd ACM/IEEE-CS Joint Conference on Digital Libraries.ACM,2002:65-73.
[11]SIEK J G,LEE L Q,LUMSDAINE A.The boost graph library:user guide and reference manual,portable documents[M].Pearson Education,2001.
[12]DAI X,LI J,LIU T,et al.HRGRN:A graph search-empowered integrative database of Arabidopsis signaling transduction,metabolism and gene regulation networks[J].Plant and Cell Phy-siology,2016,57(1):e12.
[18]张树玲,孙波,田艳琴.过程建模技术研究综述[C]∥2010 Third International Conference on Education Technology and Trai-ning.Wuhan,Hubei,2010:542-547.
[19]PLAIA A,CARRIE A.Application and assessment of IDEF3‐process flow description capture method[J].International Journal of Operations & Production Management,1995,15(1):63-73.
[21]SCHEER A W.Architecture of integrated information system- foundations of enterprise modelling[M].Berlin:Springer-Verlag,1992.
[1] CHEN Xiao-jun, XIANG Yang. STransH:A Revised Translation-based Model for Knowledge Representation [J]. Computer Science, 2019, 46(9): 184-189.
[2] GUANJian, WANG Jing-bin, BIAN Qian-hong. Multi-keyword Streaming Parallel Retrieval Algorithm Based on Urban Security Knowledge Graph [J]. Computer Science, 2019, 46(2): 35-41.
[3] SUN Wen-ping, CHANG Liang, BIN Chen-zhong, GU Tian-long, SUN Yan-peng. Travel Route Recommendation Based on Knowledge Graph and Frequent Sequence Mining [J]. Computer Science, 2019, 46(2): 56-61.
[4] ZHU Feng, GU Min, ZHENG Hao, GU Yan-hui, ZHOU Jun-sheng and QU Wei-guang. Research on Sense Guessing of Chinese Unknown Words Based on Knowledge Graph [J]. Computer Science, 2017, 44(1): 95-99, 127.
[5] LIU Da-wei, WANG Zhi-xue and YU Ming-gang. Modeling and Validation of Capability Requirement Process Based on Activity Diagram [J]. Computer Science, 2015, 42(Z11): 473-478, 507.
[6] NI Shan-shan, ZHANG Xuan, LI Tong and ZHANG Rui-yun. Aspect Tracing in Aspect Oriented Business Process Modeling [J]. Computer Science, 2015, 42(8): 215-219.
[7] ZHONG Ming-yang,FU Yun-qing,JIANG Pan. Business Process Optimization Modeling Based on Leveled-lanes [J]. Computer Science, 2011, 38(4): 192-195.
[8] . [J]. Computer Science, 2008, 35(7): 191-194.
[9] . [J]. Computer Science, 2007, 34(2): 91-94.
[10] CHEN Ying-Xin, LIU Qun (School of Computer Science and Technology, Harbin Engineering University, Harbin 150001). [J]. Computer Science, 2005, 32(11): 218-222.
Full text



[1] . [J]. Computer Science, 2018, 1(1): 1 .
[2] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[3] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[4] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[5] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[6] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[7] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[8] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[9] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[10] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .