Home Table of Contents

25 February 2011, Volume 27 Issue 2
    

  • Select all
    |
    article
  • Zheng Lei, Zhu Zhongming
    New Technology of Library and Information Service. 2011, 27(2): 1-7. https://doi.org/10.11925/infotech.1003-3513.2011.02.01
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    This paper introduces the research progress of compound digital object,including the study status of semantic description and the study status of semantic storage,as well as the projects which are relevant to the semantic submission of compound digital object.

  • Ku Liping
    New Technology of Library and Information Service. 2011, 27(2): 8-15. https://doi.org/10.11925/infotech.1003-3513.2011.02.02
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    The non-doument resource of digital library includes the user, the user generated information and the user activity,they are the metadata objects of the social network, the social media and the virtual society. Based on the virtual society systems (including Registration system, Map system, Live feeds system, Snapshots system and Inventory system etc.), the study discusses that digital library can use user modelling and information system modules to develop virtual research environment, virtual campus and virtual knowledge society and so on.

  • Huang Jinxia, Jing Li
    New Technology of Library and Information Service. 2011, 27(2): 16-20. https://doi.org/10.11925/infotech.1003-3513.2011.02.03
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    To provide an effective method to import the heterogeneous data into the information systems based on Ontologies, this paper introduces a data ingest tool developed in VIVO which is a networking of scientists and is also a semantic Web application, including the principles and the working process in the data ingestion from relational data model to RDF data model and the data mapping with VIVO Ontology. The characteristics and some questions in this tool are also discussed.

  • Zhang Pingshan, Zhang Weixuan
    New Technology of Library and Information Service. 2011, 27(2): 21-28. https://doi.org/10.11925/infotech.1003-3513.2011.02.04
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    This article makes a comparative analysis of 7 open source OPAC system used in the libraries, including basic technical information, search features, search results display and output, Web2.0 features and other aspects. It provides a guidance for domestic libraries in using the open source OPAC system.

  • Yang Daiqing, Wang Zhiping, Wang Xing, Liu Minjian, Chang Yingchun
    New Technology of Library and Information Service. 2011, 27(2): 29-33. https://doi.org/10.11925/infotech.1003-3513.2011.02.05
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    A usenet-snatcher is designed based on multithread to improve the download-speed and MIME-parsing-speed and a storage schema supporting breakpoint transmission is also proposed. Experiment shows that the usenet-snatcher can gather articles effectively and gathering-speed under multithread is faster than single thread.

  • Li Yazi, Qian Qing, Liu Zheng, Fang An, Hong Na, Wang Junhui
    New Technology of Library and Information Service. 2011, 27(2): 34-41. https://doi.org/10.11925/infotech.1003-3513.2011.02.06
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    The paper constructs and extends semantic network of UMLS as a top-level Ontology, proposes a UMLS-based framework which maps heterogeneous disease knowledge to the semantic type, and refines the semantic relationship in UMLS. Through the refunded relationship links the variety of disease knowledge,it implements the framework to integrate relevant disease knowledge by constructing the relation oriented of disease between disease, symptom, test, medicine, medical device, and medical regulation. Finally,it gives an example demonstrating the process of integrate disease knowledge.

  • Zhao Jie, Dong Zhenning, Zhang Shaqing, Xiao Nanfeng
    New Technology of Library and Information Service. 2011, 27(2): 42-47. https://doi.org/10.11925/infotech.1003-3513.2011.02.07
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    This paper proposes a new multi-granularity collection method for user behavior data which collects data through configurable server plug-in. The experiment results prove that the method can enhance quantity of Web usage mining data, simplify data cleaning and give multi-granularity information for the following mining,and provide high quality data for Web user behavior analysis.

  • Wang Jingting
    New Technology of Library and Information Service. 2011, 27(2): 48-53. https://doi.org/10.11925/infotech.1003-3513.2011.02.08
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    This paper adopts cluster analysis method to discuss and analyze the features of Chinese characters,in order to discover the internal rules. Based on the clustering feature of Chinese characters,it refines the matching result of string matching,and advances a 2-level similarity model. The experiment result shows that this model can reflect the similarity better.

  • Zhao Yang, Zhang Liyi
    New Technology of Library and Information Service. 2011, 27(2): 54-61. https://doi.org/10.11925/infotech.1003-3513.2011.02.09
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    By the application of system dynamics, this article makes a qualitative and quantitative research on mechanism of information resources allocation in Industry-Academia-Research (IAR) R&D cooperation, and conducts a system dynamics model. Based on this model, the article simulates the implementation of information resources allocation of our country in 2010-2025, and according to the simulation results, proposes the information resources optimal allocation program which can improve the information resources input-output efficiency in R&D cooperation.

  • Su Jinyan
    New Technology of Library and Information Service. 2011, 27(2): 62-68. https://doi.org/10.11925/infotech.1003-3513.2011.02.10
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    It is true that the spatial distribution of academic information on Internet can be influenced by spatial proximity. That is,spatial dependence is really exist when Internet is discussed. The closer of two spaces are the stronger of spatial dependence. And spatial dependence is stronger in China than in America.

  • Zhao Wenbing, Zhu Qinghua, Wu Kewen, Huang Qi
    New Technology of Library and Information Service. 2011, 27(2): 69-75. https://doi.org/10.11925/infotech.1003-3513.2011.02.11
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    Using metrological methods, this paper analyzes data crawled from micro-blogging of Hexun.com and also uses Pajek to view the social network structure of Hexun micro-blogging. The result shows that, the characters of micro-blogging users have favorable statistic characteristics, and the regional disparities between micro-blogging users are quite remarkable. Moreover, two kinds of micro-blogging users account for almost 90% of the total users. This paper is helpful for other researchers to study micro-blogging users behavior.

  • Dong Xiaoxia, Gong Xiangyang, Zhang Ruolin, Yan Chaobin
    New Technology of Library and Information Service. 2011, 27(2): 76-80. https://doi.org/10.11925/infotech.1003-3513.2011.02.12
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    The paper first provides a definition of smart library. Then it describes the system architecture and key technologies of the BUPT-SLDS developed by Beijing University of the Post and Telecommunications. Finally, the paper addresses the functions of smart library demonstration system. It is to make the smart library’s definition clear and provide the advising to the future practical smart library.

  • Lu Yonghe, Cao Lichao
    New Technology of Library and Information Service. 2011, 27(2): 81-86. https://doi.org/10.11925/infotech.1003-3513.2011.02.13
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    With the research of association rules comprehensive evaluation, this article proposes a books recommended model based on the factors of Support, Confidence, Jaccard Interestingness, Attraction and Profit, and it is also oriented to online bookstores and digital libraries. At the same time, this article determines the weights of the factors in the model by the entropy method and the relative comparison method, and research on the algorithm of the model. Finally, it verifies the function of the model by the developed online bookstore system. The running results of the online bookstore system show that the model can provide the recommended book for users excellently.

  • Zhou Zhicheng
    New Technology of Library and Information Service. 2011, 27(2): 87-93. https://doi.org/10.11925/infotech.1003-3513.2011.02.14
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    Aimed at the defects that the search engine offers too many results and is lack of considering the differences between the user’s personalities, this paper offers a way to give users real-time search suggestions of multi theme according to the user’s search intent in order to help the users describe the information in need more accurately, as well as narrow the gap between the query word and the user’s real intentions to increase the search efficiency. At the same time, it uses K-means to cluster users who are similar in their intent eigenvalue of resources categories, narrow the range of the nearest neighbor of the searching target, as well as to speed up the real-time response of the search suggestions. The experiment result shows that this method is practical.

  • Zhu Xiaodong
    New Technology of Library and Information Service. 2011, 27(2): 94-99. https://doi.org/10.11925/infotech.1003-3513.2011.02.15
    Abstract ( ) Download PDF ( ) HTML ( )   Knowledge map   Save

    The paper presents a distributed honeypot system CPot(Click-based honeyPot) which fuses network telescope and intrusion detection.The author deploys CPot in a virtual digital library which is connected to public network, and carries out half a year of test in library security system. The result proves that CPot can increase the security of digital library and has a high practical value in library security.