generated from FacultadInformatica-LinkedData/Template-Curso
-
Notifications
You must be signed in to change notification settings - Fork 57
/
Copy pathehrlz-fromJSONtoJSON-LD.jsonld
62 lines (61 loc) · 2.28 KB
/
ehrlz-fromJSONtoJSON-LD.jsonld
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
{
"@context":{
"upm":"http://www.upm.es/api/catalogo",
"rdfs": "http://www.w3.org/2000/01/rdf-schema#",
"name": "rdfs:label",
"hometown": "rdfs:label",
"age": "rdfs:label",
"alma_mater": "rdfs:label",
"subjects": {
"@id":"http://www.upm.es/api/subjects",
"@container": "@list"
},
"teachers": {
"@id":"http://www.upm.es/api/teachers",
"@container": "@list"
},
"description": "rdfs:label"
},
"@id":"http://www.upm.es/api/students/muii/1234",
"@type":"upm:student",
"name": "Elías Herrero Lázaro",
"hometown":"Madrid",
"age": 23,
"alma_mater": "UPM",
"father_name":"Pepe Herrero",
"mother_name": "María Lázaro",
"subjects": [
{
"@id": "http://www.upm.es/api/subjects/muii/5555",
"@type":"upm:subject",
"name": "Open data and Knowledge Graphs",
"teachers": [{
"@id":"http://www.upm.es/api/teachers/1231",
"name":"Óscar Corcho",
"email":"[email protected]"
},
{
"@id":"http://www.upm.es/api/teachers/5234",
"name":"Raúl García",
"email":"[email protected]"
},
{
"@id":"http://www.upm.es/api/teachers/8335",
"name":"Daniel Garijo",
"email":"[email protected]"
}],
"description": "Open Data and Knowledge Graphs explores the principles and practices of open data management, including data sharing and reuse, alongside the creation and use of knowledge graphs to model complex relationships between datasets."
},
{
"@id": "http://www.upm.es/api/subjects/muii/9999",
"@type":"upm:subject",
"name": "DSSR",
"teachers": [{
"@id":"http://www.upm.es/api/teachers/1111",
"name":"Luis Mengual",
"email":"[email protected]"
}],
"description": "Focuses on best practices and methodologies for designing and building applications that protect against security threats. Students learn about risk assessment, secure coding techniques, threat modeling, and compliance with security standards to ensure that applications are resilient against vulnerabilities and attacks."
}
]
}