Please wait a minute...
New Technology of Library and Information Service  2016, Vol. 32 Issue (2): 75-82    DOI: 10.11925/infotech.1003-3513.2016.02.10
Article Current Issue | Archive | Adv Search |
Enriching Personal Name Authority with Open Semantic Resources:FOAF for Schema Design
Hao Jiashu()
National Library of China, Beijing 100081, China
Download:
Export: BibTeX | EndNote (RIS)      
Abstract  

[Objective] This study ctreated a new model to improve the quality and maintenance efficiency of the personal name authority data in China. [Methods] To prove the feasibility of using open semantic resources to enrich the name authority data, this study analyzed the number and types of semantic resources, evaluation metrics, automation and maintenance speed, as well as the credibility of the open resource. The FOAF was used as an example to implement the schema. [Results] This study set restriction conditions, interface mode and harvest rules for obtaining the semantic resources. It created RDF predicate and two realizing techniques, like SDK and software to discover and integrate resources. This study designed automatic multi-matching algorithm and mapping table to automatically enrich name authority data. [Limitations] Only creates the schema, which was not put into practice. The semantic resource’s storage model and the extraction processing methods are also at the initial framework stage. No detailed implementation technology was discussed. [Conclusions] The proposed method could be automatically matched with open semantic resources of the individual names to enrich local personal name authority data.

Key wordsPersonal name authority      Open semantic resources      Automatic discovering and aggregating      RDF      URI      FOAF      Automatic matching and enriching     
Received: 23 August 2015      Published: 08 March 2016

Cite this article:

Hao Jiashu. Enriching Personal Name Authority with Open Semantic Resources:FOAF for Schema Design. New Technology of Library and Information Service, 2016, 32(2): 75-82.

URL:

https://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/10.11925/infotech.1003-3513.2016.02.10     OR     https://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/Y2016/V32/I2/75

[1] Myntti J, Cothran N.Authority Control in a Digital Repository: Preparing for Linked Data[J]. Journal of Library Metadata, 2013, 13(2-3): 95-113.
[2] 刘炜, 张春景, 夏翠娟. 万维网时代的规范控制[J]. 中国图书馆学报, 2015, 41(3): 22-33.
[2] (Liu Wei, Zhang Chunjing, Xia Cuijuan.Authority Control for the Web[J]. Journal of Library Science in China, 2015, 41(3): 22-33.)
[3] Elliott S. Survey of Author Name Disambiguation: 2004 to 2010 [J/OL]. Library Philosophy & Practice. .
[4] Schreiber G, Raimond Y. PDF 1.1 Primer [EB/OL]. (2014- 06-24). [2015-06-07]. .
[5] UGC [EB/OL]. [2015-10-21]. .
[6] FOAF (2000-2015+) [EB/OL]. [2015-08-07]. .
[7] BibApp [EB/OL]. [2015-10-21]. .
[8] VIVO [EB/OL]. [2015-10-10]. .
[9] Gemeinsame Normdate [EB/OL]. [2015-06-15]. .
[10] Virtual International Authority File [EB/OL]. [2015-06-15]. .
[11] UK Archival Thesaurus [EB/OL]. [2015-06-15]. .
[12] Library of Congress Subject Headings [EB/OL]. [2015-06- 15]. .
[13] Simple Knowledge Organization System [EB/OL]. (2012- 12-13). [2015-06-15]. .
[14] Golbeck J, Parsia B.Trust Network-Based Filtering of Aggregated Claims[J]. International Journal of Metadata, Semantic and Ontologies, 2006, 1(1): 58-65.
[15] 刘炜. 关联数据:概念、技术及应用展望[J]. 大学图书馆学报, 2011, 29(2): 5-12.
[15] (Liu Wei.Overview on Linked Data: Concept, Technology and Implementation[J]. Journal of Academic Libraries, 2011, 29(2): 5-12.)
[16] Ding L, Zhou L, Finin T, et al.How the Semantic Web is Being Used: An Analysis of FOAF Documents [C]. In: Proceedings of the 38th Annual Hawaii International Conference on System Sciences. IEEE, 2005: 113-121.
[17] FOAF Vocabulary Specification 0.99[EB/OL]. [2015-07-11]. .
[18] FOAF-a-Matic [EB/OL]. [2015-07-31]. .
[19] Quatuo [EB/OL]. [2015-07-31]. .
[20] Dumbill E.XML观察: 使用XML和RDF找到朋友[EB/ OL]. [2015-08-18]. .
[20] (Dumbill E. Finding Friends with XML and RDF [EB/OL]. [2015-08-18].
[21] 王思丽, 马建玲, 李慧佳, 等. 关联数据集中开放资源的自动获取研究[J]. 图书馆学研究, 2015(18): 49-54.
[21] (Wang Sili, Ma Jianling, Li Huijia, et al.Research on Obtaining Open Resource in the Linked Data Automatically[J].Research on Library Science, 2015(18): 49-54.)
[22] LDSpider [EB/OL]. [2015-07-31]..
[23] Graves M, Constabaris A, Brickeley D.FOAF: Connecting People on the Semantic Web[J]. Cataloging & Classification Quarterly, 2009, 43(3-4): 191-202.
[24] Motik B, Parsia B. OWL 2 Web Ontology Language Structural Specification and Functional-Style Syntax (2nd Edition) [EB/OL]. (2012-12-11). [2015-08-12]. .
[25] Apache Jena [EB/OL]. [2015-10-21]. .
[26] Sesame [EB/OL]. [2015-10-21]. .
[27] PHP [EB/OL]. [2015-10-21]. .
[28] Sindice: Disambiguation Page [EB/OL]. [2015-10-21]. .
[29] Semantic Web Search-Swoogle [EB/OL]. [2015-10-21]. .
[30] NetEstate. Friend of A Friend (FOAF) Search Engine [EB/OL]. [2015-10-21]. .
[31] FRBR Work-Set Algorithm Version 2.0[EB/OL]. [2015-10- 11]. .
[32] FRBR Work-Set Algorithm [EB/OL]. [2015-10-11]. .
[1] Zeng Zhen,Li Gang,Mao Jin,Chen Jinghao. Data Governance and Domain Ontology of Regional Public Security[J]. 数据分析与知识发现, 2020, 4(9): 41-55.
[2] Zheng Songyin,Tan Guoxin,Shi Zhongchao. Recommending Tourism Attractions Based on Segmented User Groups and Time Contexts[J]. 数据分析与知识发现, 2020, 4(5): 92-104.
[3] Feng Wengang,Jiang Zhaofeifan. Improving Security Checks and Passenger Risk Evaluation with Classification of Airline Passengers[J]. 数据分析与知识发现, 2020, 4(12): 105-119.
[4] Lianjie Xiao,Tao Meng,Wei Wang,Zhixiang Wu. Entity Recognition of Intelligence Method Based on Deep Learning: Taking Area of Security Intelligence for Example[J]. 数据分析与知识发现, 2019, 3(10): 20-28.
[5] Wang Ling,Dai Qianjin,Wu Xiaojun. The Study on the Temporal and Spatial Distribution of Event Tourism Based on Large-scale Tourism Early Warning Platform[J]. 数据分析与知识发现, 2018, 2(8): 31-40.
[6] Jia Longjia,Zhang Bangzuo. Classifying Topics of Internet Public Opinion from College Students: Case Study of Sina Weibo[J]. 数据分析与知识发现, 2018, 2(7): 55-62.
[7] Zhu Guang,Feng Mining,Zhang Weiwei. Incentive Investments on Information Security for Libraries: An Evolutionary Game-theory Approach[J]. 数据分析与知识发现, 2018, 2(6): 13-24.
[8] Wang Ying,Wu Sizhu. Converting STKOS Metathesaurus to RDF Triples with R2RML[J]. 数据分析与知识发现, 2018, 2(12): 89-97.
[9] Feng Wen’gang,Li Yan,Li Fuhai,Wang Xin,Zhou Xiping. Risk Assessment and Decision Analysis of Civil Aviation Security with Risk Ranking and Decision Tree[J]. 数据分析与知识发现, 2018, 2(10): 27-36.
[10] Feng Wengang,Huang Jing. Early Warning for Civil Aviation Security Checks Based on Deep Learning[J]. 数据分析与知识发现, 2018, 2(10): 46-53.
[11] Chen Tao, Zhang Yongjuan, Chen Heng. Implementation of the Framework for Converting Web-data to RDF (W2R)[J]. 现代图书情报技术, 2015, 31(2): 1-6.
[12] Jiang Xun, Xu Xukan, Su Xinning. Knowledge Service-oriented Model of Knowledge Base Frame Structure Research Based on Double-base Cooperating[J]. 现代图书情报技术, 2014, 30(2): 55-62.
[13] Liu Zhen, Zhang Zhixiong. Survey of Technical Methods and Tools of RDB-to-RDF[J]. 现代图书情报技术, 2014, 30(11): 17-23.
[14] Yu Bengong, Gu Jiawei. Information Organization and Representation Based on Folksonomy and RDF[J]. 现代图书情报技术, 2014, 30(11): 24-30.
[15] Wu Yue, Zhou Yigang, Cui Haiyuan, Nie Hua. Peking University Library Website Redesign Based on Usability Study[J]. 现代图书情报技术, 2014, 30(11): 88-94.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938   E-mail:jishu@mail.las.ac.cn