Please wait a minute...
New Technology of Library and Information Service  2004, Vol. 20 Issue (10): 33-35    DOI: 10.11925/infotech.1003-3513.2004.10.05
Current Issue | Archive | Adv Search |
The Research and Application of Pure Text Document Technique
Li Haitao
(Institute of Scientific and Technical Information of China, Beijing 100038, China)
Download: PDF(0 KB)   HTML  
Export: BibTeX | EndNote (RIS)      

This paper based on the practice of the project, researches the means of dealing with pure text, which including the content identification and pick-up, associated modification etc, and realized the Pure Text Parser System with Visual C#. NET and Parameter Configuration System based on pure text with Java. At last, combining the application, summarizes the characteristic of technique that based on pure text, and demonstrates the value of it.

Key wordsPure text      Identification      Pick-up      Associated modification     
Received: 16 April 2004      Published: 25 October 2004


Corresponding Authors: Li Haitao     E-mail:
About author:: Li Haitao

Cite this article:

Li Haitao. The Research and Application of Pure Text Document Technique. New Technology of Library and Information Service, 2004, 20(10): 33-35.

URL:     OR

1  李保利等.信息抽取研究综述.计算机工程与应用,2003(10):4 Apr.6,2004)
3  解析文本和列表.
(Accessed Apr.8,2004)
4  parse text,,(Accessed Apr.2,2004)

[1] Ru Li,Rui Li,Jie Jiang,Huayi Wu. Spatio-Temporal Characteristics of WMTS Access Sessions[J]. 数据分析与知识发现, 2019, 3(6): 1-11.
[2] Zixuan Zhang,Hao Wang,Liping Zhu,Sanhong eng. Identifying Risks of HS Codes by China Customs[J]. 数据分析与知识发现, 2019, 3(1): 72-84.
[3] Cheng Zhou,Hongqin Wei. Identifying Crowd Participants with Modified Random Forests Algorithm[J]. 数据分析与知识发现, 2018, 2(7): 46-54.
[4] Yuan Chen,Chaoqun Wang,Zhongyi Hu,Jiang Wu. Identifying Malicious Websites with PCA and Random Forest Methods[J]. 数据分析与知识发现, 2018, 2(4): 71-80.
[5] Cuiqing Jiang,Kailun Song,Yong Ding,Yao Liu. Identifying Potential Customers Based on User-Generated Contents[J]. 数据分析与知识发现, 2018, 2(3): 1-8.
[6] Zhen Li,Shengchun Ding,Nan Wang. Identifying Topics of Online Public Opinion[J]. 数据分析与知识发现, 2017, 1(8): 18-30.
[7] Huanrong Shou,Shuqing Deng,Jian Xu. Detecting Online Rumors with Sentiment Analysis[J]. 数据分析与知识发现, 2017, 1(7): 44-51.
[8] Zhongyi Hu,Chaoqun Wang,Jiang Wu. Identifying Phishing Websites with Multiple Online Data Sources[J]. 数据分析与知识发现, 2017, 1(6): 47-55.
[9] Ruihua Qi. Identifying Chinese Microblog Author Gender Based on Dependency[J]. 数据分析与知识发现, 2017, 1(2): 58-63.
[10] Xinwei Yuan,Shaohua Yang,Chaochao Wang,Zhanhe Du. Identifying Lead Players of User Innovation Communities Based on Feature Extraction and Random Forest Classification[J]. 数据分析与知识发现, 2017, 1(11): 62-74.
[11] Yue He,Xiaojia Yin,Chao Zhu. Analyzing Characteristics of Weibo Users Based on Their Sentiments and Influences —— Case Study of Cell Phone Brand[J]. 数据分析与知识发现, 2017, 1(10): 12-20.
[12] He Jianmin,Yin Shu. Identifying Influential Users in Social Networks[J]. 现代图书情报技术, 2016, 32(4): 20-30.
[13] Zhang Pengyi,Zhou Xiang,Wang Jun. Multi-task Session Identification and Analysis in Product Search[J]. 现代图书情报技术, 2016, 32(3): 1-7.
[14] Zhang Lei,Ma Jing,Li Dandan,Shen Yang. Hypernetwork Model for Semantic Social Network and Automatic Identification of Key Nodes[J]. 现代图书情报技术, 2016, 32(3): 8-17.
[15] Guo Xu,Qi Ruihua. Using Non-standard Text Features to Identify Authors[J]. 现代图书情报技术, 2016, 32(11): 27-33.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938