OSL commands are to be interpreted for the retrieval of database information or in order to be re-formatted and re-directed to an expansion module. This is achieved by a parser, and a lexer that produces SQL code for those commands that reqest data directly from the database.
DETAILS OF OWN BACKGROUND USE FOR WHICH ACCESS WILL BE REQUIRED
%
DETAILS OF THIRD PARTY SOFTWARE INCLUDING CREATOR, TYPE (I.E.OPEN SOURCE), LICENCE TERMS AND CONDITIONS
Open Source tools are used in the creation of the parser and lexer (Protégé), but are not part of the run-time solution.
The backend is the implementation of the defined architecture. It’s composed of a modular framework, auditing, auditing, sensitive-data handling and database access.
DETAILS OF OWN BACKGROUND USE FOR WHICH ACCESS WILL BE REQUIRED
0%
DETAILS OF THIRD PARTY SOFTWARE INCLUDING CREATOR, TYPE (I.E.OPEN SOURCE), LICENCE TERMS AND CONDITIONS
Some modules where created by other partners in the Odyssey consortium, such as the security module (ATOS) and Knowledge Extraction (MIP), yet these are not considered part of the backend but additional modules.
The Odyssey Semantic Language is a non-formal language for the definition of information queries that hides the actual implementation of the data store and information processes giving an additional level of security, and defining a common language for all requests for consistency
DETAILS OF OWN BACKGROUND USE FOR WHICH ACCESS WILL BE REQUIRED
0%
OTHER PARTNERS BACKGROUND USED
The language definition is the result of cooperation between partners, mainly but not exclusively by XLAB and SHU.
60%
DETAILS OF OTHER THIRD PARTY IPR INCLUDING CREATOR INCLUDING SOURCE AND STATUS (PUBLIC DOMAIN)
The system’s architecture is be based on open standard components that provide services in a customer's extended enterprise bus that combines multiple sources of information by considering security implications in terms of integrity and trustworthiness of data from source to source and securely deliver the information whenever and wherever it is needed, in the right context for the people or systems using that information
DETAILS OF OWN BACKGROUND USE FOR WHICH ACCESS WILL BE REQUIRED
0%
OTHER PARTNERS BACKGROUND USED
The architecture definition is the result of cooperation between partners, mainly but not exclusively by XLAB and SHU.
60%
DETAILS OF OTHER THIRD PARTY IPR INCLUDING CREATOR INCLUDING SOURCE AND STATUS (PUBLIC DOMAIN)
0%
NEW CONTENT
40%
TOTAL
100%
27.4 MIP
Organisation Information
Name of Organisation: MIP
Name of Person responsible for completing IPR Report:
Paola Fantini
Date Completed: 01/072010
Project Software
TITLE IQ4CSI
DESCRIPTION OF FUNCTIONS
IQ4CSI is a Java software for:
- mining frequent association rules from the Odyssey Postgres dataset: the Odyssey Postgres dataset is analyzed by using A-priori and the mined association rules are stored in a second Postgres dataset of rules.
- directly querying the mined association rules to obtain synthetic answers to WHAT ABOUT queries about an “entity” (e.g. “What about crime in Italy?”). The answer is a set of frequent association rules describing the “entity” specified in the query.
- obtaining an intensional answer to a query the user has applied to the Postgres dataset: the answers will be a list of association rules describing the frequent properties of the query extensional answer.
DETAILS OF OWN BACKGROUND USE FOR WHICH ACCESS WILL BE REQUIRED
0%
DETAILS OF THIRD PARTY SOFTWARE INCLUDING CREATOR, TYPE (I.E.OPEN SOURCE), LICENCE TERMS AND CONDITIONS
PostgreSQL, DBMS used to manage data storage.
PostgreSQL is released under the PostgreSQL License, a liberal Open Source license
Apriori and Rules, support modules in the mining analysis.
This modules have been based on the apriori algorithm (Agrawal et al., 1996), developed for free use and distributed as they are (see http://www.adrem.ua.ac.be/~goethals/software/)
Description of reactive and proactive crime management processes (from evidence analysis to investigation to crimes analysis) and relevant analysis and investigation questions, contribution to Odyssey system design and development
DETAILS OF OWN BACKGROUND USE FOR WHICH ACCESS WILL BE REQUIRED
Know-how on i) business process management methodologies (Business Processes Reengineering -BPR, ARIS BPM framework, etc ) and business modeling standards (Business Process Modeling Notation –BPMN, Unified Modeling Notation-UML etc.) and ii) software development life cycles management methodologies.
Previous research projects methodologies and know how
15%%
OTHER PARTNERS BACKGROUND USED
50%
DETAILS OF OTHER THIRD PARTY IPR INCLUDING CREATOR INCLUDING SOURCE AND STATUS (PUBLIC DOMAIN)
0%
NEW CONTENT
35%
TOTAL
100%
TITLE Contribution to Odyssey IPR management
DESCRIPTION OF FUNCTIONS
Support to development of Odyssey IPR management methodology
DETAILS OF OWN BACKGROUND USE FOR WHICH ACCESS WILL BE REQUIRED
Guidelines to IPR management as per previous research projects methodologies and know how
5%
OTHER PARTNERS BACKGROUND USED
95%
DETAILS OF OTHER THIRD PARTY IPR INCLUDING CREATOR INCLUDING SOURCE AND STATUS (PUBLIC DOMAIN)
DETAILS OF OWN BACKGROUND USE FOR WHICH ACCESS WILL BE REQUIRED
None used
0 %
DETAILS OF THIRD PARTY SOFTWARE INCLUDING CREATOR, TYPE (I.E.OPEN SOURCE), LICENCE TERMS AND CONDITIONS
Built on top of the Netbeans platform version 6.8. Licenses for this include
GNU Lesser General Public License version 2.1 (LGPL)
GNU General Public License Version 2 with Classpath Exception (GPL2 with classpath exception)
Common Development and Distribution License (CDDL)
0 %
NEW CONTENT
100 %
TOTAL
100%
1 Examples of Controlled Licenses include (without limitation) the GNU General Public License (GPL), the GNU Lesser/Library GPL (LGPL), the Mozilla Public License (MPL), and the Common Public License (CPL).