<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>A normal form for hypergraph-based module extraction for S ROI Q</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Riku Nortje</string-name>
          <email>nortjeriku@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Katarina Britz</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Thomas Meyer</string-name>
          <email>tommie.meyerg@meraka.org.za</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Center for Arti cial Intelligence Research, University of KwaZulu-Natal and CSIR Meraka Institute</institution>
          ,
          <country country="ZA">South Africa</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Modularization is an important part of the modular design and maintenance of large scale ontologies. Syntactic locality modules, with their desirable model theoretic properties, play an ever increasing role in the design of algorithms for modularization, partitioning and reasoning tasks such as classi cation. It has been shown that, for the DL EL+, the syntactic locality module extraction problem is equivalent to the reachability problem for hypergraphs. In this paper we investigate and introduce a normal form for the DL SROIQ which allows us to map any SROIQ ontology to an equivalent hypergraph. We then show that standard hyperpath search algorithms can be used to extract modules similar to syntactic locality modules for SROIQ ontologies.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>
        The advent of the semantic web presupposes a signi cant increase in the size
of ontologies, their distributive nature and the requirement for fast reasoning
algorithms. Modularization techniques not only play an increasingly important
role in the design and maintenance of large-scale distributed ontologies, but also
in the design of algorithms that increase the e ciency of reasoning tasks such
as subsumption testing and classi cation [
        <xref ref-type="bibr" rid="ref1 ref11">11, 1</xref>
        ].
      </p>
      <p>
        Extracting minimal modules is computationally expensive and even
undecidable for expressive DLs [
        <xref ref-type="bibr" rid="ref2 ref3">2, 3</xref>
        ]. Therefore, the use of approximation techniques and
heuristics play an important role in the e ective design of algorithms. Syntactic
locality [
        <xref ref-type="bibr" rid="ref2 ref3">2, 3</xref>
        ], because of its excellent model theoretic properties, has become an
ideal heuristic and is widely used in a diverse set of algorithms [
        <xref ref-type="bibr" rid="ref1 ref11 ref4">11, 1, 4</xref>
        ].
      </p>
      <p>
        Suntisrivaraporn [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] showed that, for the DL E L+, ?-locality module
extraction is equivalent to the reachability problem in directed hypergraphs. Nortje et
al. [
        <xref ref-type="bibr" rid="ref10 ref9">9, 10</xref>
        ] extended the reachability problem to include &gt;-locality and introduced
bidirectional reachability modules as a subset of ?&gt; modules.
      </p>
      <p>In this paper we introduce a normal form for the DL SROIQ, which allows
us to map any SROIQ ontology to an equivalent syntactic locality preserving
hypergraph. We show that, given this mapping, the extraction of ?-locality
modules is equivalent to the extraction of all B-hyperpaths, &gt;-locality is similar
to extracting all F -hyperpaths and ?&gt; modules to that of extracting frontier
graphs. These similarities demonstrate a unique relationship between reasoning
tasks, based on syntactic locality, for SROIQ ontologies, and standard well
studied hypergraph algorithms.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Preliminaries</title>
      <p>2.1</p>
      <p>
        Hypergraphs
Hypergraphs are a generalization of graphs and have been extensively studied
since the 1970s as a powerful tool for modelling many problems in Discrete
Mathematics. In this paper we adapt the de nitions of hypergraphs and hyperpaths
from [
        <xref ref-type="bibr" rid="ref12 ref8">8, 12</xref>
        ].
      </p>
      <p>A (directed) hypergraph is a pair H = hV; Ei, where V is a nite set of nodes,
E 2V 2V is the set of hyperedges such that for every e = (T (e); H(e)) 2 E,
T (e) 6= ;, H(e) 6= ;, and T (e) \ H(e) = ;. A hypergraph H0 = hV0; E0i is a
subhypergraph of H if V0 V and E0 E. A hyperedge e is a B-hyperedge
if jH(e)j = 1. A B-hypergraph is a hypergraph such that each hyperedge is a
B-hyperedge. A hyperedge e is an F-hyperedge if jT (e)j = 1. An F-hypergraph is
a hypergraph such that each hyperedge is an F-hyperedge. A BF-hypergraph is
a hypergraph for which every edge is either a B- or an F-hyperedge.</p>
      <p>Let e = (T (e); H(e)) be a hyperedge in some directed hypergraph H. Then,
T (e) is known as the tail of e and H(e) is known as the head of e. Given a
directed hypergraph H = (V; E), its symmetric image H is a directed hypergraph
de ned as: V(H) = V(H) and E(H) = f(H; T ) j (T; H) 2 E(H)g. We denote by
BS(v) = fe 2 E j v 2 H(e)g and F S(v) = fe 2 E j v 2 T (e)g respectively
the backward star and forward star of a node v. Let n and m be the number of
nodes and hyperedges in a hypergraph H. We de ne the size of H as size(H) =
jVj + Pe2E (jT (e)j + jH(e)j).</p>
      <p>A simple path Qst from s 2 V(H) to t 2 V(H) in H is a sequence (v1; e1; v2; e2;
:::; vk; ek; vk+1) consisting of distinct nodes and hyperedges such that s = v1,
t = vk+1 and for every 1 i k, vi 2 T (ei) and vi+1 2 H(ei). If in addition
t 2 T (e1) then Qst is a simple cycle. A simple path is cycle free if it does not
contain any subpath that is a simple cycle.</p>
      <p>
        A node s is B-connected to itself. If there is a hyperedge e such that all nodes
vi 2 T (e) are B-connected to s, then every vj 2 H(e) is B-connected to s. A
B-hyperpath from s 2 V(H) to t 2 V(H) is a minimal subhypergraph of H where
t is B-connected to s. An F-hyperpath Qst from s 2 V(H) to t 2 V(H) in H is
a subhyperpath of H such that Qst is a B-hyperpath from t to s in H. A
BFhyperpath from s 2 V(H) to t 2 V(H) in H is a minimal (in the inclusion sense)
subhyperpath of H such that it is simultaneously both a B-hyperpath and an
Fhyperpath from s to t in H. We note that every hypergraph H can be transformed
to a BF-hypergraph H0 by replacing each hyperedge e = (T (e); H(e)) with the
two hyperedges e1 = (T (e); fnvg); e2 = (fnvg; H(e)) where nv is a new node.
Algorithm 1 (Visiting a hypergraph [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ])
Procedure Bvisit(s,H) Procedure Fvisit(t,H)
1 : for each u 2 V do blabel(u) := f alse; for each u 2 V do f label(u) := f alse;
2 : for each e 2 E do T (e) := 0; for each e 2 E do T (e) := 0;
3 : Q := fsg; blabel(s) := true; Q := ftg; f label(t) := true;
4 : while Q 6= ; do while Q 6= ; do
5 : select and remove u 2 Q; select and remove u 2 Q;
6 : for each e 2 F S(u) do for each e 2 BS(u) do
7 : T (e) := T (e) + 1; H(e) := H(e) + 1;
8 : if T (e) := jT ail(e)jthen if H(e) := jHead(e)jthen
9 : for each v 2 Head(e) do for each v 2 T ail(e) do
10 : if blabel(v) = f alse then if f label(v) = f alse then
11 : blabel(v) = true f label(v) = true
12 : Q := Q [ fvg Q := Q [ fvg
      </p>
      <p>Given some node s, Algorithm 1 can be used to nd all B-connected or
Fconnected nodes to s in O(size(H)) time. Here, the set of all B-hyperpaths from
s and F-hyperpaths to t are respectively represented by all those nodes n such
that blabel(n) = true or f label(n) = true, as well as the edges connecting those
nodes.</p>
      <p>
        De nition 1. Given a hypergraph H = (V; E), the frontier graph H0 = (V0; E0; s; t)
of H, such that V0 V, E0 E, s; t 2 V, is the maximal (in the inclusion sense)
BF -graph in which (1) s and t are the origin and destination nodes, (2) if v 2 V0
then v is B-connected to s, and t is F-connected to v in H0.
Algorithm 2 (Frontier graph Extraction Algorithm [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ])
Procedure frontier(H; H0; s; t)
1 : H0 := H; change := true
2 : while change = true do
3 : change = f alse
3 : H0 = Bvisit(s; H0); H0 = F visit(t; H0)
4 : for each v 2 V0
5 : if blabel(v) = f alse or f label(v) = f alse then
6 : change := true
7 : V0 = V0 fvg; E0 = E0 F S(v) BS(v)
8 : if s 62 V0 or t 62 V0 then
9 : H0 := ;; change := f alse;
      </p>
      <p>Algorithm 2 can be used to extract a frontier graph for any source and
destination nodes and runs in O(n size(H)) time.
2.2</p>
      <p>
        The DL SROIQ
In this section we give a brief introduction to the DL SROIQ [
        <xref ref-type="bibr" rid="ref5 ref7">5, 7</xref>
        ] with its
syntax and semantics listed in Table 1. NC , NR and NI denote disjoint sets
of atomic concept names, atomic roles names and individual names. The set
NR includes the universal role. Well-formed formulas are created by combining
concepts from the table by using the connectives :; u; t etc.
      </p>
      <p>Given R1 : : : Rn v R, where n &gt; 1 and Ri; R 2 NR, is a role inclusion
axiom (RIA). A role hierarchy is a nite set of RIAs. Here R1 : : : Rn denotes
a composition of roles where R; Ri may also be an inverse role R . A role R
is simple if it: (1) does not appear on the right-hand side of a RIA; (2) is the
inverse of a simple role; or (3) appears on the right-hand side of a RIA only if the
left-hand side consists entirely of simple roles. Ref (R), Irr(R) and Dis(R; S),
where R, S are roles other than U , are role assertions. A set of role assertions
is simple w.r.t. a role-hierarchy H if each assertion Irr(R) and Dis(R; S) uses
only simple roles w.r.t. H.</p>
      <p>A strict partial order on NR is a regular order if, and only if, for all roles
R and S: S R i S R. Let be a regular order on roles. A RIA w v R
is -regular if, and only if, R 2 NR and w has one of the following forms: (1)
R R, (2) R , (3) S1 : : : Sn, where each Si R, (4) R S1 : : : Sn, where
each Si R and (5) S1 : : : Sn R, where each Si R. A role hierarchy H is
regular if there exists a regular order such that each RIA in H is -regular.</p>
      <p>An RBox is a nite, regular role hierarchy H together with a nite set of
role assertions simple w.r.t. H. If a1; : : : ; an are in NI , then fa1; : : : ; ang is a
nominal. No is the set of all nominals. The set of SROIQ concept descriptions
is the smallest set such that: (1) ?,&gt;, each C 2 NC , and each o 2 No is a concept
description. (2) If C is a concept description, then :C is a concept description.
(3) If C and D are concept descriptions, R is a role description, S is a simple role
description, and n is a non-negative integer, then the following are all concept
descriptions: (C u D); (C t D); 9R:C; 8R:C; 6 nS:C; &gt; nS:C; 9S:Self .</p>
      <p>If C and D are concept description then C v D is a general concept inclusion
(GCI) axiom. A TBox is a nite set of GCIs. If C is a concept description,
a; B 2 NI , R; S 2 NR with S a simple role description, then C(a), R(a; b),
:S(a; b), and a 6= b, are individual assertions. An SROIQ ABox is a nite set
of individual assertions. All GCIs, RIAs, role assertions, and individual assertions
are referred to as axioms. A SROIQ-KB base is the union of a TBox, RBox
and ABox.</p>
      <p>
        De nition 2 is su ciently general so that any subset of an ontology preserving
a statement of interest is considered a module, the entire ontology is therefore
a module in itself. An important property of modules in terms of the modular
reuse of ontologies is safety [
        <xref ref-type="bibr" rid="ref2 ref3">2, 3</xref>
        ]. Intuitively, a module conforms to a safety
condition whenever an ontology T reuses concepts from an ontology T 0 in such
a way so that it does not change the meaning of any of the concepts in T 0. This
may be formalized in terms of the notion of conservative extensions:
De nition 3. (Conservative extension [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]) Let T and T1 be two ontologies
such that T1 T , and let S be a signature. Then (1) T is an S-conservative
extension of T1 if, for every with Sig( ) S, we have T j= i T1 j= . (2)
T is a conservative extension of T1 if T is an S-conservative extension of T1 for
S = Sig(T1).
      </p>
      <p>
        De nition 4. (Safety [
        <xref ref-type="bibr" rid="ref3 ref6">3, 6</xref>
        ]) An ontology T is safe for T 0 if T [ T 0 is a
conservative extension of T 0. Further let S be a signature. We say that T is safe
for S if, for every ontology T 0 with Sig(T ) \ Sig(T 0) S, we have that T [ T 0
is a conservative extension of T 0.
      </p>
      <p>
        Intuitively, given a set of terms, or seed signature, S, a S-module M based
on deductive-conservative extensions is a minimal subset of an ontology O such
that for all axioms with terms only from S, we have that M j= if, and only if,
O j= , i.e., O and M have the same entailments over S. Besides safety, reuse of
modules requires two additional properties namely coverage and independence.
De nition 5. (Module coverage [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]) Let S be a signature and T 0, T be
ontologies with T 0 T such that S Sig(T 0). Then, T 0 guarantees coverage of
S if T 0 is a module for S in T .
      </p>
      <p>
        De nition 6. (Module Independence [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]) Given an ontology T and
signatures S1, S2, we say that T guarantees module independence if, for all T1 with
Sig(T ) \ Sig(T1) S1, it holds that T [ T1 is safe for S2.
      </p>
      <p>
        Unfortunately, deciding whether or not a set of axioms is a minimal module
is computationally hard or even impossible for expressive DLs [
        <xref ref-type="bibr" rid="ref2 ref3">2, 3</xref>
        ]. However,
if the minimality requirement is dropped, good sized approximations can be
de ned that are e ciently computable, as in the case of syntactic locality, which
modules are extracted in polynomial time.
      </p>
      <p>
        Algorithm 3 (Extract a locality module [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ])
Procedure extract-module(T ; S; x)
Inputs: Tbox T ; signature S; x 2 ?; &gt;; Output x-module M
1 : M := ;; T 0 = T ;
2 : repeat
3 : change = f alse
4 : for each 2 T 0
5 : if not x-local w.r.t. S[Sig(M) then
6 : M = M + f g
7 : T 0 = T 0 n f g
8 : changed = true
9 : until changed = f alse
De nition 7. (Syntactic locality [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]) Let S be a signature and O a SROIQ
ontology. An axiom is ?-local w.r.t. S (&gt;-local w.r.t S) if 2 Ax(S), as
de ned in the grammar:
?-Locality
Ax(S) ::= C? v CjC v C&gt;jw? v RjDis(S?; S)jDis(S; S?)
Con?(S) ::= A?j:C&gt;jC? u CjC u C?jC1? t C2?j9R?:Cj9R:C?
      </p>
      <p>j9R?:Self j &gt; nR?:Cj &gt; nR:C?
Con&gt;(S) ::= :C?jC1&gt; u C2&gt;jC&gt; t CjC t C&gt;j8R:C&gt;j 6 nR:C&gt;</p>
      <p>j8R?:Cj 6 nR?:C
&gt;-Locality
Ax(S) ::= C? v CjC v C&gt;jw v R&gt;
Con?(S) ::= :C&gt;jC? u CjC u C?jC1? t C2?j9R:C?j &gt; nR:C?</p>
      <p>j8R&gt;:C?j 6 nR&gt;:C?
Con&gt;(S) ::= A&gt;j:C?jC1&gt; u C2&gt;jC&gt; t CjC t C&gt;j8R:C&gt;j</p>
      <p>9R&gt;:C&gt;j &gt; nR&gt;:C&gt;j 6 nR:C&gt;j8R?:Cj 6 nR?:C
In the grammar, we have that A?; A&gt; 62 S is an atomic concept, R?; R&gt; (resp.
S?,S&gt;) is either an atomic role (resp. a simple atomic role) not in S or the
inverse of an atomic role (resp. of a simple atomic role) not in S, C is any
concept, R is any role, S is any simple role, and C? 2 Con?(S), C&gt; 2 Con&gt;(S).
We also denote by w? a role chain w = R1 : : : Rn such that for some i with
1 i n, we have that Ri is (possibly inverse of ) an atomic role not in S. An
ontology O is ?-local (&gt;-local) w.r.t. S if is ?-local (&gt;-local) w.r.t. S for all
2 O.</p>
      <p>Algorithm 3 may be used to extract either &gt;- or ?-locality modules.
Alternating the algorithm between ?- and &gt;-locality module extraction until a
xed-point is reached results in ?&gt; modules.
3</p>
    </sec>
    <sec id="sec-3">
      <title>Normal form</title>
      <p>In this section we will introduce a normal form for any SROIQ ontology. The
normal form is required to facilitate the conversion process between a SROIQ
ontology and a hypergraph.</p>
      <p>De nition 8. Given Bi 2 NC n f?g, Ci 2 NC n f&gt;g, D 2 f9R:B; nR:B;
9R:Self g, Ri; Si 2 NR and n &gt; 1, a SROIQ ontology O is in normal form
if every axiom 2 O is in one of the following forms:
1: B1 u : : : u Bn v C1 t : : : t Cm 2: 9R:B1 v C1 t : : : t Cm
3: B1 u : : : u Bn v 9R:Bn+1 4: B1 u : : : u Bn v 9R:Self
5: 9R:Self v C1 t : : : t Cm 6: &gt; nR:B1 v C1 t : : : t Cm
7: B1 u : : : u Bn v&gt; nR:Bn+1 8: R1 : : : Rn v Rn+1
9: D1 v D2</p>
      <p>In order to normalize a SROIQ ontology O we repeatedly apply the
normalization rules from Table 2. Each application of a rule rewrites an axiom into
an equivalent normal form. Algorithm 4 illustrates the conversion process.
Algorithm 4 Given any SROIQ axiom
1. Recursively apply rules NR7 - NR11 to eliminate all equivalences, universal
restrictions, atmost restrictions and complex role llers.
2. Given that = ( L v R), recursively apply the following steps until L
contains no disjunctions and R contains no conjunctions:
(a) recursively apply rules NR1, NR3, NR6 to L,
(b) recursively apply rules NR2, NR4, NR5 to R.
3. recursively apply any applicable rules from NR12 through NR21.</p>
      <p>Theorem 1. Algorithm 4 converts any SROIQ ontology O to an ontology O0
in normal form, such that O0 is a conservative extension of O. The algorithm
terminates in linear time and adds at most a linear number of axioms to O.</p>
      <p>For every normalized ontology O0 the de nition of syntactic locality from
De nition 7 may now be simpli ed to that of De nition 9. This is possible since
for every axiom = ( L v R) 2 O0, ?-locality of is dependent solely on L
and &gt;-locality is dependent solely on R.
De nition 9. (Normal form syntactic locality) Let S be a signature and O
a normalized SROIQ ontology. Any axiom is ?-local w.r.t. S (&gt;-local w.r.t
S) if 2 Ax(S), as de ned in the grammar:
?-Locality
Ax(S) ::= C? v C j w? v R j Dis(S?; S) j Dis(S; S?)
Con?(S) ::= A? j C?u j C u C? j 9R?:C j 9R:C? j 9R?:Self j
&gt; nR?:C j&gt; nR:C?
&gt;-Locality
Ax(S) ::= C v C&gt; j w v R&gt;
Con&gt;(S) ::= A&gt; j C&gt; t C j C t C&gt;j9R&gt;:C&gt; j&gt; nR&gt;:C&gt; j</p>
      <p>9R&gt;:Self
In the grammar, we have that A?; A&gt; 62 S is an atomic concept, R?,R&gt; (resp.
S?,S&gt;) is either an atomic role (resp. a simple atomic role) not in S or the
inverse of an atomic role (resp. of a simple atomic role) not in S, C is any
concept, R is any role, S is any simple role, and C? 2 Con?(S), C&gt; 2 Con&gt;(S).
We also denote by w? a role chain w = R1 : : : Rn such that for some i with
1 i n, we have that Ri is (possibly inverse of ) an atomic role not in S. An
ontology O is ?-local(&gt;-local) w.r.t. S if is ?-local(&gt;-local) w.r.t. S for all
2 O.</p>
      <p>We note that we may denormalize a normalized ontology if we maintain a
possibly many-to-many mapping from normalized axioms to their original source
axioms. Formally, de ne a function denorm : O^ ! 2O, with O an SROIQ
ontology and O^ its normal form. For brevity, we write denorm( ), with a set
of normalized axioms, to denote S denorm( ).</p>
      <p>2
4</p>
      <p>
        SROI Q hypergraph
Suntisrivaraporn [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] showed that for the DL E L+, extracting ?-locality modules
are equivalent to the reachability problem in directed hypergraphs. This was
extended in [
        <xref ref-type="bibr" rid="ref10 ref9">9, 10</xref>
        ] to include a reachability algorithm for &gt;-locality modules. In
this section we show that a SROIQ ontology O in normal form can be mapped
to a hypergraph which preserves both ?-locality and &gt;-locality.
De nition 10. Let be a normalized axiom and ? a minimum set of symbols
from Sig( ) required to ensure that is not ?-local, and let H = (V; E ) be
a hypergraph. We say that an edge e 2 E preserves ?-locality i ? = T (e).
Similarly, e 2 E preserves &gt;-locality whenever &gt; = H(e).
      </p>
      <p>For each normal form axiom i in De nition 8 we show that i may be
mapped to a set of hyperedges, with nodes denoting symbols from Sig( i), such
that both ?-locality and &gt;-locality are simultaneously preserved.
{ Given 1 : B1 u : : : u Bn v C1 t : : : t Cm we map it to the hyperedge
e 1 = (fB1; : : : ; Bng; fC1; : : : ; Cmg). We transform the hyperedge e 1 to
two new hyperedges eB1 = (fB1; : : : ; Bng; fH1g) a B-hyperedge, eF1 =
(fH1g; fC1; : : : ; Cmg) an F-hyperedge and with H1 a new node. By de
nition each Cj is B-connected to H1 if all Bi are B-connected to H1. From
De nition 9 we know that this preserves ?-locality for 1 since it is ?-local,
w.r.t. a signature S, exactly when any of the conjuncts Bi 62 S. In other
words it is non ?-local exactly when all Bi 2 S. The same also holds for
&gt;locality, since eF1 requires every Ci 2 1 to be in S for H1 to be F-connected.
From De nition 9 we see that, w.r.t. a signature S, eF1 is &gt;-local exactly
when any of the disjuncts Ci 62 S.
{ Given 2 : 9R:B1 v C1 t : : : t Cm or 6 : &gt; nR:B1 v C1 t : : : t Cm we map it
to the two hyperedges eB2=6 = (fB1; Rg; fH2g), eF2=6 = (fH2g; fC1; : : : ; Cmg)
an F-hyperedge and with H2 a new node. This mapping preserves ?-locality
for 2=6 since by De nition 9 it is ?-local, w.r.t. a signature S, exactly when
either B1 or R is not in S. The argument for &gt;-locality follows that of 1.
{ Given 3 : B1 u : : : u Bn v 9R:Bn+1 or 7 : B1 u : : : u Bn v&gt; nR:Bn+1 we
map it to the hyperedges eB3=7 = (fB1; B2; : : : ; Bn 1; Bng; fH3g), eF13=7 =
(fH3g; fBn+1g), eF23=7 = (fH3g; fRg). This mapping preserves ?-locality for
3=7 similarly to eB1 for 1. From De nition 9 we know that &gt;-locality for
either of these axioms, w.r.t. a signature S, is dependent on neither R nor
Bn+1 being elements of S. Therefore, they are non &gt;-local exactly when
either or both of these are in S. This is represented by the two edges eF13=7
and eF23=7 for which H3 becomes F-connected exactly when either R or Bn+1
is F-connected.
{ Given 4 : B1 u : : : u Bn v 9R:Self and 5 : 9R:Self v C1 t : : : t Cm we see
that 9R:Self is both ? or &gt; local exactly when R 62 S. Therefore we map
4 to the hyperedge eB4 = (fRg; fC1; : : : ; Cmg), and 5 to the hyperedge
eF5 = (fB1; : : : ; Bng; fRg).
{ Given 8 : R1 : : : Rn v Rn+1, we see that 8 is ?-local exactly when any
to the hypernedagnedeiBs8 &gt;=-l(ofcRal1;e:x:a:c;tRlyngw;hfeRnn+R1ng+)1. 62 S. We therefore map 8
Ri 62 S; i
{ For 9 we have many forms, all variants of those discussed in the
previous mappings. Therefore 9 is mapped to any of the following: eB91 =
(fR; B1g; fH9gg), eF19 = (fH9g; fRg), eF29 = (fH9g; fBg), or e1 9 = (fR; B1g;
fRg), or eF19 = (fR1g; fR2g), eF29 = (fR1g; fBg), or e1 9 = (fR1g; fR2g).</p>
      <p>Given a SROIQ ontology O in normal form we may now map every axiom
2 O to its equivalent set of hyperedges. For each of these mappings there are
at most three hyperedges introduced, therefore mapping the whole ontology O
to an equivalent hypergraph HO will result in a hypergraph with the number of
edges at most linear in the number of axioms in O. It is easy to show that the
mapping process can be completed in linear time in the number of axioms in O.</p>
      <p>We note that, similar to the normalization process, we may maintain a
possibly many-to-many mapping from normalized axioms to their associated
hyperedges. Formally, de ne a function deedge : HO ! 2O, with O a SROIQ
ontology and HO its hypergraph. For brevity, we write deedge( ), with a set
of hyperedges, to denote Se2 deedge(e).</p>
    </sec>
    <sec id="sec-4">
      <title>Hypergraph module extraction</title>
      <p>In this section we show that, given a hypergraph HO for a SROIQ ontology O,
we may extract a frontier graph from HO which is a subset of a ?&gt; module. We
show that some of these modules guarantee safety, module coverage and module
independence. The hypergraph algorithms presented require one start node s
and a destination node t. In order to extend these algorithms to work with an
arbitrary signature S, we introduce a new node s with with an edge esi = (s; si)
for each si 2 S [ &gt;, as well as a new node t with an edge eti = (si; t) for each
si 2 S [ ?.</p>
      <p>Theorem 2. Let O be a SROIQ ontology and HO its associated hypergraph
B
and S a signature. Algorithm 1 - Bvisit extracts a set of B-hyperpaths HO
corresponding to the ?-locality module for S in O. Therefore, these modules also
guarantees safety, module coverage and module independence.</p>
      <p>Theorem 3. Let O be a SROIQ ontology and HO its associated hypergraph
F
and S a signature. Algorithm 1 - F visit extracts a set of F -hyperpaths HO
corresponding to a subset of the &gt;-locality module for S in O.</p>
      <p>Theorem 4. Let O be a SROIQ ontology and HO its associated hypergraph
BF corresponding to
and S a signature. Algorithm 2 extracts a frontier graph HO
a subset of the ?&gt; -locality module for S in O.</p>
      <p>
        The module extracted in Theorem 3 is a subset of the &gt;-locality module
for a given seed signature. It is as yet unclear whether or not these modules
provide all the model-theoretic properties associated with &gt;-locality modules.
However, from the previous work done for the DL E L+ [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], it is evident that
these modules preserve all entailments for a given seed signature S. Further, they
also preserve and contain all justi cations for any given entailment. Similarly,
the exact module theoretic properties of modules associated with frontier graphs
is something we are currently looking into.
6
      </p>
    </sec>
    <sec id="sec-5">
      <title>Conclusion</title>
      <p>We have introduced a normal form for any SROIQ ontology, as well as the
necessary algorithms in order to map any SROIQ ontology to a syntactic
locality preserving hypergraph. This mapping process can be accomplished in linear
time in the number of axioms with at most a linear increase in the number of
hyperedges in the hypergraph.</p>
      <p>Standard path searching algorithms for hypergraphs may now be used to nd:
(1) sets of B-hyperpaths | this is equivalent to nding ?-syntactical locality
modules; (2) sets of F -hyperpaths | these are subsets of &gt;-locality modules,
and (3) frontier graphs | these are subsets of ?&gt; modules. Whilst the modules
associated with B-hyperpaths share all the module theoretic properties of
?locality modules, it is unclear at this point which module-theoretic properties
modules associated with F -hyperpaths and frontier graphs possess.</p>
      <p>The ability to map SROIQ ontologies to hypergraphs, such that hyperedges
preserve syntactic locality conditions, allows us to investigate the relationship
between DL reasoning algorithms and the vast body of standard hypergraph
algorithms in greater depth.</p>
      <p>Our primary focus for future research is to investigate and de ne the
moduletheoretic properties of modules associated with F -hyperpaths and frontier graphs
as well as their relative performance with respect to existing locality methods.
Thereafter, we aim to expand our research and investigate other hypergraph
algorithms and how they may be applied to DL reasoning problems.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <given-names>Cuenca</given-names>
            <surname>Grau</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            ,
            <surname>Halaschek-Wiener</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Kazakov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            ,
            <surname>Suntisrivaraporn</surname>
          </string-name>
          ,
          <string-name>
            <surname>B.</surname>
          </string-name>
          :
          <article-title>Incremental classi cation of description logic ontologies</article-title>
          .
          <source>Tech. rep. (</source>
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <given-names>Cuenca</given-names>
            <surname>Grau</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            ,
            <surname>Horrocks</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            ,
            <surname>Kazakov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            ,
            <surname>Sattler</surname>
          </string-name>
          ,
          <string-name>
            <surname>U.</surname>
          </string-name>
          :
          <article-title>Just the right amount: extracting modules from ontologies</article-title>
          . In: Williamson,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Zurko</surname>
          </string-name>
          , M. (eds.)
          <source>Proceedings of the 16th International Conference on World Wide Web (WWW '07)</source>
          . pp.
          <volume>717</volume>
          {
          <fpage>726</fpage>
          .
          <string-name>
            <surname>ACM</surname>
          </string-name>
          , New York, NY, USA (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>Cuenca</given-names>
            <surname>Grau</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            ,
            <surname>Horrocks</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            ,
            <surname>Kazakov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            ,
            <surname>Sattler</surname>
          </string-name>
          ,
          <string-name>
            <surname>U.</surname>
          </string-name>
          :
          <article-title>Modular reuse of ontologies: Theory and practice</article-title>
          .
          <source>Journal of Arti cial Intelligence Research (JAIR) 31</source>
          ,
          <fpage>273</fpage>
          {
          <fpage>318</fpage>
          (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <given-names>Del</given-names>
            <surname>Vescovo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Parsia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            ,
            <surname>Sattler</surname>
          </string-name>
          ,
          <string-name>
            <given-names>U.</given-names>
            ,
            <surname>Schneider</surname>
          </string-name>
          ,
          <string-name>
            <surname>T.</surname>
          </string-name>
          :
          <article-title>The modular structure of an ontology: atomic decomposition and module count</article-title>
          . In: O.
          <string-name>
            <surname>Kutz</surname>
          </string-name>
          , T.S. (ed.)
          <source>Proc. of WoMO-11. Frontiers in AI and Appl.</source>
          , vol.
          <volume>230</volume>
          , pp.
          <volume>25</volume>
          {
          <fpage>39</fpage>
          . IOS Press (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Horrocks</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kutz</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sattler</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          :
          <article-title>The even more irresistable SROIQ</article-title>
          . In: Doherty,
          <string-name>
            <given-names>P.</given-names>
            ,
            <surname>Mylopoulos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            ,
            <surname>Welty</surname>
          </string-name>
          , C. (eds.)
          <source>Proceedings of the Tenth International Conference on Princleples of Knowledge Representation and Reasoning</source>
          . pp.
          <volume>57</volume>
          {
          <fpage>67</fpage>
          . AAAI Press (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Jimenez-Ruiz</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cuenca Grau</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sattler</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schneider</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Berlanga</surname>
          </string-name>
          , R.:
          <article-title>Safe and economic re-use of ontologies: A logic-based methodology and tool support</article-title>
          .
          <source>In: Proceedings of ESWC-08</source>
          . vol.
          <volume>5021</volume>
          of LNCS, pp.
          <volume>185</volume>
          {
          <issue>199</issue>
          (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Maier</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ma</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hitzler</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Paraconsistent OWL and related logics</article-title>
          . In: Janowicz,
          <string-name>
            <surname>K</surname>
          </string-name>
          . (ed.)
          <source>Semantic Web</source>
          <year>2012</year>
          . pp.
          <volume>1</volume>
          {
          <fpage>33</fpage>
          . IOS Press (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Nguyen</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pretolani</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Markenzon</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>On some path problems on oriented hypergraphs</article-title>
          .
          <source>Theoretical Informatics and Applications</source>
          <volume>32</volume>
          (
          <issue>1-2</issue>
          -3),
          <volume>1</volume>
          {
          <fpage>20</fpage>
          (
          <year>1998</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Nortje</surname>
          </string-name>
          , R.:
          <article-title>Module extraction for inexpressive description logics</article-title>
          .
          <source>Master's thesis</source>
          , University of South Africa (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Nortje</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Britz</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          , Meyer, T.:
          <article-title>Bidirectional reachability-based modules</article-title>
          .
          <source>In: Proceedings of the 2011 International Workshop on Description Logics (DL2011)</source>
          .
          <source>CEUR Workshop Proceedings</source>
          , CEUR-WS (
          <year>2011</year>
          ), http://ceur-ws.org/
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Suntisrivaraporn</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Polynomial-Time Reasoning Support for Design and Maintenance of Large-Scale Biomedical Ontologies</article-title>
          .
          <source>Ph.D. thesis</source>
          , Technical University of Dresden (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Thakur</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tripathi</surname>
          </string-name>
          , R.:
          <article-title>Complexity of linear connectivity problems in directed hypergraphs</article-title>
          .
          <source>Linear Connectivity</source>
          Conference pp.
          <volume>1</volume>
          {
          <issue>12</issue>
          (
          <year>2001</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>