Computer Science ›› 2024, Vol. 51 ›› Issue (7): 362-372.doi: 10.11896/jsjkx.230800034

• Artificial Intelligence • Previous Articles     Next Articles

Schema Validation Approach for Constraint-enhanced RDFS Ontology

ZHAO Xiaofei1, CHAI Zhengyi1, YUAN Chao2, ZHANG Zhen2   

  1. 1 School of Computer Science and Technology,Tiangong University,Tianjin 300387,China
    2 School of Software Engineering,Tiangong University,Tianjin 300387,China
  • Received:2023-08-07 Revised:2024-01-14 Online:2024-07-15 Published:2024-07-10
  • About author:ZHAO Xiaofei,born in 1978,Ph.D,associate professor.His main research interests include knowledge engineering and distributed intelligence.
  • Supported by:
    National Natural Science Foundation of China(62172298,61972456) and Open Foundation of Jiangsu Provincial Key Laboratory for Computer Information Processing Technology(KJS1737).

Abstract: The constraint-enhanced RDFS(RDFS(c)) ontology overcomes the deficiency of RDFS's ability to describe constraints.However,the introduction of constraints brings challenges to ontology validation.This paper proposes a decidable schema validation approach for RDFS(c) ontology.This approach is based on analyzing the dependency between constraints.First,the RDFS(c) schema is transformed into the first-order predicate logic expressions,and the checking tasks of the characteristics are transformed into the satisfiability checking of the first-order expressions.On this basis,a constraint dependence graph reflecting the mend-violation relationships between constraints is established and made necessary reductions,we then derive the decidability of the schema validation tasks by identifying the finite loops in the graph,and finally validate the schema by reasoning on the constraint dependency.The contribution of this paper is twofold.On the one hand,through the transformation to the first-order expressions and the reasoning based on the dependency of the corresponding first-order constraints,the proposed approach has strong applicability,especially the constraint dependency analysis can minimize the number of backtracking,thereby ensuring the efficiency of the validation process;on the other hand,because it is independent of any specific constraint modeling language,this approach is also a general solution for analyzing the decidability of the RDFS(c) schema validation tasks.

Key words: RDFS, Ontology validation, Constraint dependency, Decidability

CLC Number: 

  • TP182
[1]TOMASZUK D,HAUDEBOURG T.RDF Schema 1.2.W3CRecommendation [EB/OL].www.w3.org/TR/2023/WD-rdf12-schema-20230615.
[2]JOSE E L,HERMINIO G,DANIEL F,et al.Challenges in RDF Validation[C]//Current Trends in Semantic Web Technologies:Theory and Practice.Berlin:Springer-Verlag,2019:121-151.
[3]MEESTER B D,HEYVAERT P,ARNDT D,et al.RDF graph validation using rule-based reasoning[J].Semantic Web,2021,12(1):117-142.
[4]WEYNS M,BONTE P,STEENWINCKEL B,et al.Conditional Constraints for Knowledge Graph Embeddings[C]//Procee-dings of the 17th Extended Semantic Web Conference(ESWC 2020).Berlin:Springer-Verlag,2020:1-10.
[5]LIEBER S,DEMEESTER B,HEYVAERT P.Visual notations for viewing RDF constraints with UnSHACLed [J].Semantic Web,2022,13(5):757-792.
[6]LE N L,ABEL M H,GOUSPILLOU P.A Constraint-basedRecommender System via RDF Knowledge Graphs[C]//Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design(CSCWD2023).New York:IEEE Press,2023:849-854.
[7]NANDANA M.A framework for linked data quality based on data profiling and rdf shape induction [D].Madrid:Universidad Politécnica de Madrid,2020.
[8]CHMUROVIC A,SIMKUS M.Well-founded Semantics for Recursive SHACL[C]//Proceedings of the 4th International Workshop on the Resurgence of Datalog in Academia and Industry.Berlin:Springer-Verlag,2022:2-13.
[9]GARCIA-GONZALEZ H,LABRA-GAYO J E.XMLSchema2-ShEx:Converting XML validation to RDF validation [J].Semantic Web,2020,11(2):235-253.
[10]FERNANDEZ-ALVAREZ D,LABRA-GAYO J E,GAYO-AVEL-LO D.Automatic extraction of shapes using sheXer [J].Know-ledge-Based Systems,2022,238:107975.
[11]ROBALDO L,PACENZA F,ZANGARI J,et al.Efficient compliance checking of RDF data[J].Journal of Logic and Computation,2023,34(6):98-121.
[12]PRUDHOMMEAUX E,COLLINS J,BOOTH D,et al.Development of a FHIR RDF data transformation and validation framework and its evaluation[J].Journal of Biomedical Informatics,2021,117:103755.
[13]PUBLIO G C,GAYO J E L,COLUNGA G F.Ontolo-CI:Continuous Data Validation With ShEx[C]//Proceedings of the 18th International Conference on Semantic Systems.Germany:CEUR-WS.org,2022:32-37.
[14]LENZERINI M,NOBILI P.On the satisfiability of dependency constraints in entity-relationship schemata[C]//Proceedings of the 13th International Conference on Very Large Databases(VLDB 1987).Brighton:Morgan Kaufmann,1987:147-154.
[15]FITTING M.First-order logic and automated theorem proving [M].Berlin:Springer Science & Business Media,2012.
[1] YAN Xue-xiong, WANG Qing-xian (Institute of Information Engineering, Information Engineering University, Zhengzhou 450002, China). [J]. Computer Science, 2009, 36(4): 42-46.
[2] YAN Feng ,CHEN Tao-Lue, HAN Ting-Ting ,LU Jian (State Key Laboratory for Novel Software Teehnology,Nanjing University,Nanjing 210093). [J]. Computer Science, 2006, 33(6): 7-10.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!