Home Table of Contents

25 April 2008, Volume 24 Issue 4
    

  • Select all
    |
    article
  • Shen Yulan,Zhang Aixia
    New Technology of Library and Information Service. 2008, 24(4): 1-6. https://doi.org/10.11925/infotech.1003-3513.2008.04.01
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

     This paper proposes a standard system frame of long-term digital preservation technology for China national science and technology plan according to the standardization’s requirements of the plan, and analyses general standards, professional standards, standards selection and the importance of application.

  • Zeng Su,Ma Jianxia,Zhang Xiuxiu
    New Technology of Library and Information Service. 2008, 24(4): 7-11. https://doi.org/10.11925/infotech.1003-3513.2008.04.02
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

     This paper analyses realistic demands of automatic metadata extraction, elaborates related research on automatic metadata extraction and compares three typical automatic extractors of metadata, including DROID, NLNZ Metadata Extractor and Metadata Miner Catalogue PRO. On the basis of discussing present limitations of automatic metadata extraction, the authors give a summary and prediction of this technology.

  • Hou Lei,Wu Xu
    New Technology of Library and Information Service. 2008, 24(4): 12-17. https://doi.org/10.11925/infotech.1003-3513.2008.04.03
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

     The audio and video module of consulting system is designed. This paper elaborates the module technology architecture,communication process, key point technology mechanism and the development tendency of the future.

  • Hao Jiashu,Wang Huilin
    New Technology of Library and Information Service. 2008, 24(4): 18-22. https://doi.org/10.11925/infotech.1003-3513.2008.04.04
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    Based on the introduction of several separated phenomena of approaches to CLIR, this paper raises the integrated approach of query translation and retrieve process to CLIR and discusses the methods of this approach.

  • Cao Gaohui,Jiao Yuying,Cheng Quan
    New Technology of Library and Information Service. 2008, 24(4): 23-28. https://doi.org/10.11925/infotech.1003-3513.2008.04.05
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    This paper firstly defines tag, tagging, folksonomy, then analyzes the limitation of collaborative tagging system. In order to achieve reorganization of the user tags and better tag navigation, browsing mechanism, the authors propose a method on using hierarchical agglomerative clustering algorithm to cluster the tags. Finally experiments certify the tag cluster method.

  • Yang Zhizhuo,Han Xie
    New Technology of Library and Information Service. 2008, 24(4): 29-34. https://doi.org/10.11925/infotech.1003-3513.2008.04.06
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

     In order to resolve the disadvantages of traditional TFIDF in text filtering, the authors propose a text information filtering algorithm based on feature extraction. This paper briefly analyses the text information filtering principles and processes, and then focuses on the design and realization of information filtering algorithm. Experimental results show that the new approach significantly outperforms the traditional information filtering method.

  • He Lin
    New Technology of Library and Information Service. 2008, 24(4): 35-38. https://doi.org/10.11925/infotech.1003-3513.2008.04.07
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    This paper studies the relation extraction of domain Ontology, using the technology of machine learning and natural language processing. The extraction method on hierarchy relation and domain relation is introduced in detail. Test results show that this mothod is valid.

  • Jiang Hua
    New Technology of Library and Information Service. 2008, 24(4): 39-43. https://doi.org/10.11925/infotech.1003-3513.2008.04.08
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    Through computing the similarity and relevancy based on Ontology, the author uses semantic reasoning to make connotative semantics clear in order to  mine fully the information correlative with the search content. This paper implements the relevant information’s semantic fusion and improves the precision and recall.The method of computing semantic similarity and relevancy based on Ontology is studied and is proved feasible by implementing the semantic search method.

  • Yang Daiqing,Zhang Aixia
    New Technology of Library and Information Service. 2008, 24(4): 44-48. https://doi.org/10.11925/infotech.1003-3513.2008.04.09
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    In this paper, the academician Ontology is constructed via topdown and kernelexpanding methodology to express academician concept.The paper describes the constructing process in detail,and gives the classes, relations and some templates for collecting instance among the academician Ontology. Moreover, it provides the key strategies and codes for instance storing,which will be helpful for expression of human concept in relative fields.

  • Qian Aibing
    New Technology of Library and Information Service. 2008, 24(4): 49-55. https://doi.org/10.11925/infotech.1003-3513.2008.04.10
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

     In view of the shortcomings of traditional methods for analyzing public opinions, this paper proposes a new idea of public opinion analysis under the Web,and then designs a model for it. Experiments show that the proposed model is an effective solution to analyzing public opinion under the Web.

  • Wang Jiandong,Wang Jimin,Tian Feijia
    New Technology of Library and Information Service. 2008, 24(4): 56-60. https://doi.org/10.11925/infotech.1003-3513.2008.04.11
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    Taking Chinese blog groups as the object, this paper reveals the characteristics of blog groups and their evolution mechanism. Then the authors establish a complex network based on the relathonships of the common-member in blog groups. Finally, the authors propose an evolving model of the blog groups complex network. The simulation results based on this model are in quite good agreement with the empirical statistical results.

  • Liu Xiaojuan
    New Technology of Library and Information Service. 2008, 24(4): 61-65. https://doi.org/10.11925/infotech.1003-3513.2008.04.12
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    This paper gives the definition of the formalization and analyzes the principles. Two key problems are discussed. It provides the effective approach of the formalization. The author proposes an indicator mapping model, which is multi-level and two-dimension. This quantitative model realizes the transform of evaluation goals and metrics. The author also designs the indicators mapping model definition language, which is used for formalized description of indicators.

  • Liu Xiang
    New Technology of Library and Information Service. 2008, 24(4): 66-70. https://doi.org/10.11925/infotech.1003-3513.2008.04.13
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

     Aiming at the managing current situation on computer and network center room in libraries, the author adopts SNMP to realize the general intelligent management concerning the hardware equipments of computer and network center room,running situations of digital resources and the environment of computer and network center room.

  • Yi Zhengqiang,Zhou Qun,Liao Sizhou
    New Technology of Library and Information Service. 2008, 24(4): 71-74. https://doi.org/10.11925/infotech.1003-3513.2008.04.14
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    The paper analyses the shortcomings of the current  CD attached books management system and gives out some solutions. According to this, the authors take advantage of  software and database technology to design and implement a CD download system, so that readers can make the best use of the CD attached books in libraries.

  • Ni Wenyin,Yin Feng,Huang Jianqi
    New Technology of Library and Information Service. 2008, 24(4): 75-79. https://doi.org/10.11925/infotech.1003-3513.2008.04.15
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

     Based on the security demands of grid, the paper proposes a retracted and extensible security strategy of access control as well as the corresponding security model. It also presents a flexible access control security policy, which supports the inherent dynamics, flexibility and expansibility of grid computing environment. Based on the strategy design, the corresponding access control security model is able to support identity authentication and access control through XML-based inquiring request / assertive response language SAML and extensible access control language XACML.

  • Liu Fang,Yang Haibin,Hua Weina
    New Technology of Library and Information Service. 2008, 24(4): 80-85. https://doi.org/10.11925/infotech.1003-3513.2008.04.16
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

     This paper summarizes the difficulties in data format transform  between information retrieval and information analysis, and designs a general simple procedure of data transform, which is combined with text file, Word software, VC++ programme and Excel software. The usage and realization algorithm of the software are also introduced.

  • Dou Tianfang,Jiang Airong,Lin Rong
    New Technology of Library and Information Service. 2008, 24(4): 86-89. https://doi.org/10.11925/infotech.1003-3513.2008.04.17
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

     The application of SFX at Tsinghua university library is briefly introduced. Then the implementation of SFX and the shortages of INNOPAC as SFX source are analyzed. Finally, a method on extending SFX service based on INNOPAC Z39.50 protocol is explained.

  • Luo Lin,Zhang Kai,Xia Zhengwei
    New Technology of Library and Information Service. 2008, 24(4): 90-94. https://doi.org/10.11925/infotech.1003-3513.2008.04.18
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    This paper employs transparent proxy  technology to control  users’ behavior on Internet, and the authors develop a Web management system for the access control of Squid proxy-server  using Ajax and PHP, which improvs the managing efficiency of the electronic reading room.

  • Bai Yun,Su Xinning
    New Technology of Library and Information Service. 2008, 24(4): 95-102. https://doi.org/10.11925/infotech.1003-3513.2008.04.19
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    The published papers, the cited papers, and the criteria for evaluation of journals in area of library and information science are analyzed and evaluated using the database of 2004-2006 from CSSCI. The aim of the present paper is to reveal the unique feature and increase the academic influence of New Technology of Library and Information Service.