Please wait a minute...
New Technology of Library and Information Service  2005, Vol. 21 Issue (2): 1-4    DOI: 10.11925/infotech.1003-3513.2005.02.01
article Current Issue | Archive | Adv Search |
Establish a Framework of Digital Resource Unique Identifier (DrUI) System in China: Strategy and Economics
Mao JunMeng LianshengZhen XihuiNi Jinsong2   Wang YanHu TiejunLiu Yanfei5
1(Library of Chinese Academy of Sciences, Beijing 100080,China)
2(National Library of China, Beijing 100081,China)
3(Peking University CALIS Administrative Center, Beijing 100871,China)
4(Chinese Academy of Medical Sciences, Beijing  100730,China)
5(Library of School of CCP, Beijing 100091,China)
Download: PDF (0 KB)  
Export: BibTeX | EndNote (RIS)      
Abstract  

DrUI (Digital Resource Unique Identifier)is designed as a “barcode solution” to identify various network objects including text, images and multimedia. With its robust, persistent and unique character, an viable interoperability between different applications can be achieved in an Internet resolving system. The author firstly scans the current research and employment status by introducing IDF’s DOI solution and Tsinghua Tongfang’s unique code in its full-text journal databases, then from the viewpoint of the library consortia, the author compare three different methods to develop a resolving system in China mainland. At last a strategic plan of DrUI developing come into being and related issues are discussed such as management of DrUI,technical platform and standards selection.

Key wordsDigital library      URI      DOI      Information integration     
Received: 13 October 2004      Published: 25 February 2005
ZTFLH: 

G250.7

 
Corresponding Authors: Mao Jun     E-mail: maoj@mail.las.ac.cn
About author:: Mao Jun,Meng Liansheng,Zhen Xihui,Ni Jinsong,Wang Yan,Hu Tiejun,Liu Yanfei

Cite this article:

Mao Jun,Meng Liansheng,Zhen Xihui,Ni Jinsong,Wang Yan,Hu Tiejun,Liu Yanfei. Establish a Framework of Digital Resource Unique Identifier (DrUI) System in China: Strategy and Economics. New Technology of Library and Information Service, 2005, 21(2): 1-4.

URL:

http://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/10.11925/infotech.1003-3513.2005.02.01     OR     http://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/Y2005/V21/I2/1

1  CNRI Handle System. http://www.handle.net/ (Accessed  Sept.30, 2004)
2CrossRef. http://www.crossref.org/ (Accessed  Sept.30, 2004)
3Dan Connolly .W3C Naming and Addressing: URIs. URLs,http://www.w3.org/Addressing/  (Accessed  Sept.30, 2004)
4ANSI/NISO Z39.56-1996. http://sunsite.berkeley.edu/SICI/version2.html (Accessed  Sept.30, 2004)
5NISO. http://www.niso.org/bicidrft.html (Accessed  Sept.30, 2004)
6ECTOC Publisher Item Identifier.http://www.ch.ic.ac.uk/ectoc/ectoc_pii.html (Accessed  Sept.30, 2004)
7OCLC.  http://purl.org/  (Accessed  Sept.30, 2004)
8OCLC Office of Research.  http://info-uri.info/registry/docs/misc/faq.html (Accessed  Sept.30, 2004)
9International DOI Foundation. http://www.doi.org/ (Accessed  Sept.30, 2004)
10CNRI.Handle System software instructions .http://www.handle.net/download.html (Accessed  Sept.30, 2004)
11cIDF. http://www.cidf.org/english/  (Accessed  Sept.30, 2004)
12mEDRA. http://www.medra.org/  (Accessed  Sept.30, 2004)

[1] Zheng Songyin,Tan Guoxin,Shi Zhongchao. Recommending Tourism Attractions Based on Segmented User Groups and Time Contexts[J]. 数据分析与知识发现, 2020, 4(5): 92-104.
[2] Lianjie Xiao,Tao Meng,Wei Wang,Zhixiang Wu. Entity Recognition of Intelligence Method Based on Deep Learning: Taking Area of Security Intelligence for Example[J]. 数据分析与知识发现, 2019, 3(10): 20-28.
[3] Wang Ling,Dai Qianjin,Wu Xiaojun. The Study on the Temporal and Spatial Distribution of Event Tourism Based on Large-scale Tourism Early Warning Platform[J]. 数据分析与知识发现, 2018, 2(8): 31-40.
[4] Jia Longjia,Zhang Bangzuo. Classifying Topics of Internet Public Opinion from College Students: Case Study of Sina Weibo[J]. 数据分析与知识发现, 2018, 2(7): 55-62.
[5] Zhu Guang,Feng Mining,Zhang Weiwei. Incentive Investments on Information Security for Libraries: An Evolutionary Game-theory Approach[J]. 数据分析与知识发现, 2018, 2(6): 13-24.
[6] Feng Wen’gang,Li Yan,Li Fuhai,Wang Xin,Zhou Xiping. Risk Assessment and Decision Analysis of Civil Aviation Security with Risk Ranking and Decision Tree[J]. 数据分析与知识发现, 2018, 2(10): 27-36.
[7] Feng Wengang,Huang Jing. Early Warning for Civil Aviation Security Checks Based on Deep Learning[J]. 数据分析与知识发现, 2018, 2(10): 46-53.
[8] Qi Yunfei,Zhao Yuxiang,Zhu Qinghua. Linked Data for Mobile Visual Search System of Digital Library[J]. 数据分析与知识发现, 2017, 1(1): 81-90.
[9] Hong Liang,Qian Chen,Fan Xing. Context-aware Recommendation System for Mobile Digital Libraries[J]. 现代图书情报技术, 2016, 32(7-8): 110-119.
[10] Liu Jian,Bi Qiang,Ma Zhuo. Assessment of Digital Library’s Micro-services: An Empirical Study[J]. 现代图书情报技术, 2016, 32(5): 22-29.
[11] Hao Jiashu. Enriching Personal Name Authority with Open Semantic Resources:FOAF for Schema Design[J]. 现代图书情报技术, 2016, 32(2): 75-82.
[12] Chen Guo, Hu Changping. Research on the Structural Features of Keyword Network of Scientific Research Areas:An Empirical Study of LIS[J]. 现代图书情报技术, 2014, 30(7): 84-91.
[13] Xiong Yongjun, Yuan Xiaoyi. Design and Implementation of Automatic Monitoring System about Library Document Database Running State[J]. 现代图书情报技术, 2014, 30(7): 127-132.
[14] Wang Chuanqing, Bi Qiang. System Model of Digital Library Automatic Semantic Annotation Tool[J]. 现代图书情报技术, 2014, 30(6): 17-24.
[15] Wei Meng. Literature Recommendation Using Evolution Patterns[J]. 现代图书情报技术, 2014, 30(4): 20-26.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938   E-mail:jishu@mail.las.ac.cn