Home Table of Contents

25 June 2007, Volume 23 Issue 6
    

  • Select all
    |
    article
  • Guo Wenli,Zhang Xiaolin
    New Technology of Library and Information Service. 2007, 2(6): 1-4. https://doi.org/10.11925/infotech.1003-3513.2007.06.01
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    Embedded toolbar can provide digital library users convenient shortcut to search required information in the Webs. In this paper, a new developed embedded toolbar system is introduced in both aspects of design and implementation. The embedded toolbar realizes personalized services oriented to the favorite usage of individual researcher. Further development trends of this toolbar system is also discussed in this paper.

  • Han Ke,Zhu Zhongming
    New Technology of Library and Information Service. 2007, 2(6): 5-10. https://doi.org/10.11925/infotech.1003-3513.2007.06.02
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    The paper gives a brief background on certification of trusted digital repository. It introduces the concept of Trusted Digital Repository(TDR) and its attributes and resposibilities, which lay a basis for developing certification crietira for TDR. It looks into main components and certifiable elements of the certification criteria. At last,it briefly discusses the envisioned uses of the criteria.

  • Zeng Ting,Dong Li
    New Technology of Library and Information Service. 2007, 2(6): 11-15. https://doi.org/10.11925/infotech.1003-3513.2007.06.03
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    This paper introduces development status of DSpace briefly, then gives a detailed survey of research and extension work about DSpace in recent. At last, the paper discusses three use cases built upon DSpace at Tsinghua University.

  • Chen He
    New Technology of Library and Information Service. 2007, 2(6): 16-19. https://doi.org/10.11925/infotech.1003-3513.2007.06.04
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    According to different possible factors which induce error of institutional repository based on DSpace system, and to the data storage specialty of institutional repository, three type methods of data backup and recover are introduced and analyzed, which are backup and recover with importing and exporting tools, backup and recover based on data storage, backup and recover based on file system. Finally, a simple applied method of backup is recommended which could be stored on another computer automatically.

  • Jin Huibin,Yuan Leping
    New Technology of Library and Information Service. 2007, 2(6): 20-23. https://doi.org/10.11925/infotech.1003-3513.2007.06.05
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    Aiming at the characters of problems about dynamic alliance resource sharing on networks, an information sharing platform based on MAS is designed. After discussing the classifying and layering of Agent, a framework and flow of platform has been designed, with emphasis on cooperant control strategy of solving distributed problem and interactive function of blackboard. At last, realization technology of the system is gone deep into discussion.

  • Jin Dawei,Zhou Ning,Chen Yongyue
    New Technology of Library and Information Service. 2007, 2(6): 24-28. https://doi.org/10.11925/infotech.1003-3513.2007.06.06
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    This paper analyzes the digital watermark rationale, contrastes several kinds of commonly used digital watermarks algorithm.The paper introduces the Arnold digital image set at chaotic and the principle of inverse transformation return to original state.The algorithm feasibility and the toughness are carried out by Matlab. Finally, this paper realizes a digital watermark model based on Inter the OpenCV class and the Arnonld transformation.

  • Quan Lixin
    New Technology of Library and Information Service. 2007, 2(6): 29-32. https://doi.org/10.11925/infotech.1003-3513.2007.06.07
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    On the basis of the relavant theories of fixed-point, using data mining and statistical studies, this paper researches and analyzes the semantics of behavioral constraint and probability statistics of Web services. Aiming at the insufficient of traditional qualitative description of the invoking, this paper also presents an approach for it, and defines the fixed-point function of Web services allocation and its calculating way. The experiment proves the approach aiming at Web services discovery is effectiveness.

  • Geng Chong,Xue Dejun
    New Technology of Library and Information Service. 2007, 2(6): 33-37. https://doi.org/10.11925/infotech.1003-3513.2007.06.08
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    This paper discusses different methods of Document Copy Detection(DCD), compares with each other in the features of DCD techniques through experiment system, and builds a DCD system based on the CNKI repositories. At last, the paper gives a number of recommendations for further work in the field of DCD.

  • Lian Zhanjun,Lv Xueqiang,Zhang Yujie,Shi Shuicai
    New Technology of Library and Information Service. 2007, 2(6): 38-41. https://doi.org/10.11925/infotech.1003-3513.2007.06.09
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    This paper gives a new method of information extraction based on calculation of sentence similarity. The topics of the sentences in testing words are labeled by adopting the method of calculation of sentence similarity. The veracity is increased by referencing the distributing of probability of the sentences in the documents. Using the resources of personal information on Internet, the paper achieves a statistic result.

  • Dou Yongxiang
    New Technology of Library and Information Service. 2007, 2(6): 42-46. https://doi.org/10.11925/infotech.1003-3513.2007.06.10
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    Knowledge retrieval is the key to knowledge sharing between distributed peers in P2P network.This paper discusses the characteristics of P2P knowledge retrieval environment. According to the connotation of knowledge retrieval and retrieval object,the paper divides it into three parts concerning topology of network, peer knowledge and peer user, analyzes the current research,and gives a view to its future.

  • Gao Jin,Jiang Ying,Guo Lifan
    New Technology of Library and Information Service. 2007, 2(6): 47-51. https://doi.org/10.11925/infotech.1003-3513.2007.06.11
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    WSMO mediator is one of the most important contributions that WSMO has donated to the semantic Web services. Mediators address interoperability problems that emerge when different Web services work together. This paper analyzes the conceptual model of WSMO mediator, its structure, its expression in WSML, and its used techniques. Besides, the paper mentions some of its shortcomings for further discussion.

  • Zhang Yulian,Wang Quan
    New Technology of Library and Information Service. 2007, 2(6): 52-55. https://doi.org/10.11925/infotech.1003-3513.2007.06.12
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    Facing massive information from Internet, this paper proposes a method that can acquire user interest profile and update user interest profile to realize the personalized information service based on user’s interest as well as possible. This method does not need to provide explicitly the information user’s interested in. It only needs the actions and contents when users visit and browse Web pages to obtain useful information, subsequently, using those information to establish and update user interest profile. This profile can describe user’s interest type and interest degree well and enhance the personalized information service efficiency.

  • Song Zhenhui
    New Technology of Library and Information Service. 2007, 2(6): 56-59. https://doi.org/10.11925/infotech.1003-3513.2007.06.13
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    On the analysis of problems in the Web-based intelligence collection, a track engine with functions such as track configuration, track training, search creation, intelligence filter, intelligence classification, change detection, distribution interface, intelligence network, relevance feedback is developed, which can support the persistent, push-based and whole cycled Web competitive intelligence demands.

  • Lin Xiaoyan
    New Technology of Library and Information Service. 2007, 2(6): 60-65. https://doi.org/10.11925/infotech.1003-3513.2007.06.14
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    This paper introduces each construction of the MMDSS,MB and MBMS, presents object oriented modeling and managing, and as expatiates on model dynamic linkage in the Model Base. Meanwhile, this paper introduces one mode of interface between Model Base and other bases, using ADO and VC++ embedded DSS statements for its realization. Also, this paper focuses on users’ management and system practicality, showing several examples basing on marketing for illuminating such technology that mentioned previously.

  • Wang Li
    New Technology of Library and Information Service. 2007, 2(6): 66-69. https://doi.org/10.11925/infotech.1003-3513.2007.06.15
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    During the process of establishing the dissertations service system, data is not standardized. In view of the problem about data formats, a metadata exchange standard is proposed. The paper introduces how to use the XML technology to achieve this standard and gives a project to solve the problem.

  • Chen Quan,Cao Zhuowen,Yang Xiaojiang
    New Technology of Library and Information Service. 2007, 2(6): 70-73. https://doi.org/10.11925/infotech.1003-3513.2007.06.16
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    On the basis of some research work on metadata for Website,this paper introduces a search engine system for Websites related to K12 education. Combined with the characters of K12-related Websites,some key technologies are analyzed, such as topic-spider search, Website classification,information extraction for site etc. Both of the whole architecture of the system and the function modules are described in detail in the paper.

  • Guo Xuejuan,Qin Huai
    New Technology of Library and Information Service. 2007, 2(6): 74-78. https://doi.org/10.11925/infotech.1003-3513.2007.06.17
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    The paper gives discussion on MARC format, bibliographic data resource, catalog code, catalog software, windows operating system & character set, bibliographic database retrieval etc. problems in Korean bibliographic database developments. On the basis of our school library’s Korean bibliography database developments, the paper gives an example of Korean bibliographic data format.

  • Ren Ping,Lin Jia,Zhao Chenggang
    New Technology of Library and Information Service. 2007, 2(6): 79-82. https://doi.org/10.11925/infotech.1003-3513.2007.06.18
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    This paper introduces the experiences and practices of establishing Tsinghua University Library multimedia resources management and service platform, including selecting system, server and storage system allocation, layout of directories, data transform and management and so on. On this basis, the paper puts forward some questions about the establishments of multimedia resources management and service platform.

  • Liu Fanxin
    New Technology of Library and Information Service. 2007, 2(6): 83-86. https://doi.org/10.11925/infotech.1003-3513.2007.06.19
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    On the openness of reader-card information and thecredential to wear is easy to embezzle, this paper introduces the composition and the characteristic of PDF417, designs and realizs reader-card system based on PDF417. Taking the reader-database of Huiwen-system as an exemple,the paper points out the two ways of improvement and the supplement to the system.

  • Chen Dan,Zheng Zengwei
    New Technology of Library and Information Service. 2007, 2(6): 87-90. https://doi.org/10.11925/infotech.1003-3513.2007.06.20
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    The index is rebuild every time when using traditional search engine. The process always spends lots of time. Adopting incremental index, the system can supports incremental updates, which documents can be added without re-indexing. The incremental index system could satisfy the increase of searching data and update the changing index in time.

  • Miao Yuanzhao
    New Technology of Library and Information Service. 2007, 2(6): 91-95. https://doi.org/10.11925/infotech.1003-3513.2007.06.21
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    Network security monitor system is the necessary means to improve the computer network safety of the college digitalization library. It is used to ensure the computer network safety of the college digitalization library by the network security system based on the open source software MRTG and NetFlow.