Home Table of Contents

25 July 2004, Volume 20 Issue 7
    

  • Select all
    |
  • Niu Zhendong,Shi Xuelin,Ye Chenglin
    New Technology of Library and Information Service. 2004, 20(7): 1-5. https://doi.org/10.11925/infotech.1003-3513.2004.07.01
    Abstract ( ) HTML ( )   Knowledge map   Save

    Computing pattern, Web technology and information security are all involved in d
    igital libraries. The related standards and their improvement are introduced in
    this paper.

  • Wen Tingxiao,Qiu Junping,Hou Jingchuan
    New Technology of Library and Information Service. 2004, 20(7): 6-10. https://doi.org/10.11925/infotech.1003-3513.2004.07.02
    Abstract ( ) HTML ( )   Knowledge map   Save

    Chinese automatic segmentation is one of the most difficult problems in computer Chinese information dis
    posal. Through analyzing segmentation methods in existence , this paper points out three developing directions of future Chinese automatic segmentation research, that is, effective segmentation to traditional text, rapiddevelopment of computer technology, and changing the writing rules of Chinese text.

  • Ma Jianxia
    New Technology of Library and Information Service. 2004, 20(7): 11-16. https://doi.org/10.11925/infotech.1003-3513.2004.07.03
    Abstract ( ) HTML ( )   Knowledge map   Save

    This paper firstly givesthe introduction of topic map, and its relationship with index, glossary, taxonomy,ontology, and semantic Web, and then the the suitability of topic map for digial information organization is discussed.  Then introduces an experimental study on the application of topic map technology in knowledge navigation for a dust
    devil archive. The paper presents procedures and methods to build topic map ontology, a comparision between two topic map visualization application tools, and atool for exporting XTM file and signing the document with topic map. At last, the potential application and development of topic map is discussed.

  • Li Jing,Meng Liansheng
    New Technology of Library and Information Service. 2004, 20(7): 17-22. https://doi.org/10.11925/infotech.1003-3513.2004.07.04
    Abstract ( ) HTML ( )   Knowledge map   Save

     There are seven approaches of constructing ontology having been introduced in this article. Through comp
    aring them with different aspects, their advantages, shortcoming and distinctions been disclosed.

  • Qiu Junping,Zhang Rong,Zhao Rongying
    New Technology of Library and Information Service. 2004, 20(7): 23-26. https://doi.org/10.11925/infotech.1003-3513.2004.07.05
    Abstract ( ) HTML ( )   Knowledge map   Save

     Journal evaluation is just for decision,for choosing the journal scientifically,at the same time it can provide a preference for the orientation of journal development.This paper advances three dimensions  hiberarchical chart of the index system of journal evaluation and sets up a model of journal evaluation.At last, the quantitive ways and contrast between them are analysed.

  • Shi Jiebin
    New Technology of Library and Information Service. 2004, 20(7): 27-29. https://doi.org/10.11925/infotech.1003-3513.2004.07.06
    Abstract ( ) HTML ( )   Knowledge map   Save

    A new machine learning method of Support Vector Machine (SVM), is applied in automatic text categorization. Comparing with the result achieved by k-nearest neighbor algorithm, the accuracy achieved by support vector machine is better; The effect of feature selection methods is smaller to SVM than the KNN method. The SVM is a potential and competitive method for automatic text categorization. The feature selection methods also affectes the accuracy of text categorization.

  • Pan Youneng,Deng Sanhong
    New Technology of Library and Information Service. 2004, 20(7): 30-34. https://doi.org/10.11925/infotech.1003-3513.2004.07.07
    Abstract ( ) HTML ( )   Knowledge map   Save

    This paper makes a brief introduction to Web mining, association rules and XML firstly, puts forward the theory
    of Web mining research based on XML and association rules, and discusses XML architecture mining, XML content mining and the Web usage mining based on XML. As a result, this paper creates a more complete system of XML mining.

  • Wang Xinjun
    New Technology of Library and Information Service. 2004, 20(7): 35-37. https://doi.org/10.11925/infotech.1003-3513.2004.07.08
    Abstract ( ) HTML ( )   Knowledge map   Save

    The paper analyzes the status quo and insecurity factors of library Intranet in combined universities, and puts forward some advices and countermeasures.

  • Xi Zhihong
    New Technology of Library and Information Service. 2004, 20(7): 38-40. https://doi.org/10.11925/infotech.1003-3513.2004.07.09
    Abstract ( ) HTML ( )   Knowledge map   Save

    his article introduces the automatic systems of some colleges and universities in Hubei province about how to upgrade from the old automatic system to ILASⅡ2.0 , and summarizes method of data transformation about bibliography, collection, and reader’s circulation and so on.

     

  • Ren Shuhuai
    New Technology of Library and Information Service. 2004, 20(7): 41-44. https://doi.org/10.11925/infotech.1003-3513.2004.07.10
    Abstract ( ) HTML ( )   Knowledge map   Save

      Winisis is an advanced information storage and retrieval software developed and maintained by UNESCO. It
     is being extended to the whole world without charge. Because powered by some core technologies like the special database schema and inverted file, it shows us the excellent abilities to handle records of varying length and provide the fast retrieval. This paper analyzes the key technologies of the Winisis in detail.

  • Wang Guoqin,Zheng Xiaofang,Gan Liren
    New Technology of Library and Information Service. 2004, 20(7): 45-47. https://doi.org/10.11925/infotech.1003-3513.2004.07.11
    Abstract ( ) HTML ( )   Knowledge map   Save

    In the paper , based on the method of Bottom-up information organization of IA ,the theories,methods,and steps o
    f concept space generation are explored. Furthermore,the applications in medical information retrieval system are introduced.

  • Li Yu,Yang Xiaohang,Liang Na,Zhang Xiaolin (Complier)
    New Technology of Library and Information Service. 2004, 20(7): 48-51. https://doi.org/10.11925/infotech.1003-3513.2004.07.12
    Abstract ( ) HTML ( )   Knowledge map   Save

     Based on W3C guidelines, this paper describes the significance, requirements, conformance levels, principles and check-points of Web content accessibility  in network environment.

  • Zhang Li
    New Technology of Library and Information Service. 2004, 20(7): 52-55. https://doi.org/10.11925/infotech.1003-3513.2004.07.13
    Abstract ( ) HTML ( )   Knowledge map   Save

    This paper introduces the library information infrastructure construction, as well as the evaluation and selection procedure of its library integrated management system, of Shaanxi Normal University, then details the implementation of Aleph 500 library automation system, and finally summarizes experiences on the library information system implementation.

  • Xiao Dehong,Huang Guofan,Liu Haiwei
    New Technology of Library and Information Service. 2004, 20(7): 56-58. https://doi.org/10.11925/infotech.1003-3513.2004.07.14
    Abstract ( ) HTML ( )   Knowledge map   Save

    The paper analyses storage technology, such as SAN, FC, FCIP, and draws up the construction strategy of SAN in digital library.

  • Yang Yijiao,Zhang Ying
    New Technology of Library and Information Service. 2004, 20(7): 59-61. https://doi.org/10.11925/infotech.1003-3513.2004.07.15
    Abstract ( ) HTML ( )   Knowledge map   Save

    This paper introduces some methods of detecting and locating the problems in the physical and data link
    layer on the digital library local area networks, which is based on Microsoft Windows 2000 Server Network Operation System. With the analysis of the causes of  the problems, some solutions offered might be helpful for the management and maintenance of the digital library local area networks.

  • Guo Lifang
    New Technology of Library and Information Service. 2004, 20(7): 63-64. https://doi.org/10.11925/infotech.1003-3513.2004.07.16
    Abstract ( ) HTML ( )   Knowledge map   Save

     Analyzing various retrieval software platforms which provide BIOSIS Previews,the paper discusses the features and retrieval methods of BIOSIS Previews on ISI Web of Knowledge.

  • Ding Zhongliu
    New Technology of Library and Information Service. 2004, 20(7): 65-67. https://doi.org/10.11925/infotech.1003-3513.2004.07.17
    Abstract ( ) HTML ( )   Knowledge map   Save

    Literature managing Integration System Software of Library used only has the function of collection,organization,division,flowing,periodical,trace,query,management  and so on. Library only concentrates its effort on regular operation. As for some special request,it only depends on some specially pertinent third party software to realize its aim. This article gets through a successfully used software tool such as“Literature wealth logout repo
    rt forms of books’ login number program” to explain software thought in detail and how to put out a detailed &
    intact wealth logout list.  

  • Qin Jianning,Lv Deyang
    New Technology of Library and Information Service. 2004, 20(7): 68-72. https://doi.org/10.11925/infotech.1003-3513.2004.07.18
    Abstract ( ) HTML ( )   Knowledge map   Save

    The document guarantee of key subjects construction is a very important job.This paper discusses the doc
    ument guarantee of key subjects construction and the development of  document purchasing intelligence control system.

  • Chen Yue
    New Technology of Library and Information Service. 2004, 20(7): 73-75. https://doi.org/10.11925/infotech.1003-3513.2004.07.19
    Abstract ( ) HTML ( )   Knowledge map   Save

    The paper relatively analyses the function and application about two Z39.50 clients, summarizes their similarities and differences, puts forward some ameliorating policy for online catalogue and net retrieval in library.

  • Sheng Sui,Wang Wen
    New Technology of Library and Information Service. 2004, 20(7): 76-77. https://doi.org/10.11925/infotech.1003-3513.2004.07.20
    Abstract ( ) HTML ( )   Knowledge map   Save

    The management and application of disc-padding books are discussed in this paper according to their char
    acteristics and the date treatment from disc, floppy, cassette are much discussed.

  • Xu Ruiqing,Li Chenying
    New Technology of Library and Information Service. 2004, 20(7): 78-79. https://doi.org/10.11925/infotech.1003-3513.2004.07.21
    Abstract ( ) HTML ( )   Knowledge map   Save

    This article introduces the building of database of special topics in agricultural machine photograph, points out matters needing attention for university library assistant to build database of special topics.

  • Wang Jie,Cai Li
    New Technology of Library and Information Service. 2004, 20(7): 80-82. https://doi.org/10.11925/infotech.1003-3513.2004.07.22
    Abstract ( ) HTML ( )   Knowledge map   Save

    This paper introduces SAN’s technical features and  studies the method building the digital library with SAN.

  • Yang Zhirong,Huang Yong
    New Technology of Library and Information Service. 2004, 20(7): 83-85. https://doi.org/10.11925/infotech.1003-3513.2004.07.23
    Abstract ( ) HTML ( )   Knowledge map   Save

    This paper briefly introduces the construction and management of the movie resources under ILASⅡ 2.0 system environment in library of Zhuhai College, Jinan University. Based on practice, this paper detailedly describes some technical solutions for how to construct and catalog the database, how to build VOD system, and how to search and use the resources.

  • Wu Yuefang
    New Technology of Library and Information Service. 2004, 20(7): 86-89. https://doi.org/10.11925/infotech.1003-3513.2004.07.24
    Abstract ( ) HTML ( )   Knowledge map   Save

    For some reason, Windows 98 used in library management system often makes some breakdowns. While clearing them needs re-setting up operating system and applied software, which is a time-consuming and difficult task, and the cryptogram(password) of database is easily leaked. This paper presents some new methods to the security configuration on maintenance and rapid recovery, as reference for readers.

  • Hu Qun
    New Technology of Library and Information Service. 2004, 20(7): 90-92. https://doi.org/10.11925/infotech.1003-3513.2004.07.25
    Abstract ( ) HTML ( )   Knowledge map   Save

    Based on the statistics of self-citation of New Technology of Library and Information Service from 1993 to 2002, this paper analyzes the self-citation of languages, authors, subjects and periodicals of the journal.

  • Ma Aifang
    New Technology of Library and Information Service. 2004, 20(7): 93-96. https://doi.org/10.11925/infotech.1003-3513.2004.07.26
    Abstract ( ) HTML ( )   Knowledge map   Save

    Advantages and disadvantages of five networks of periodicals subscribing are introduced in this paper, and some proposals are also expounded.