Advanced Search
DAKD
Home
Journal Information
Aims and Scopes
Editorial Board
For Authors
Peer-Review Process
Instruction for Authors
Publishing Ethic Statement
Contact Us
中文
Advanced Search
Current Issue
, Volume 27 Issue 4
Previous Issue
Next Issue
For Selected:
View Abstracts
Download Citations
EndNote
Reference Manager
ProCite
BibTeX
RefWorks
Toggle Thumbnails
Select
Data Provenance Model in Semantic Web Environment: An Overview
Shen Zhihong, Zhang Xiaolin
2011,
27
(4): 1-8. DOI:
10.11925/infotech.1003-3513.2011.04.01
Abstract
This paper reviews the progress of research on provenance in the Semantic Web environment, and introduces provenance models including the Open Provenance Model, Provenir Ontology and Provenance Vocabulary, focusing on the description methods and description capabilities of them. Finally, it discusses the difficulties and new challenges when applying these provenance models in the scientific research environment.
References
|
Related Articles
|
Metrics
Select
Construction of Digital Library Private Cloud Platform and Application Development
Ma Shaobing, Ma Ziwei
2011,
27
(4): 9-16. DOI:
10.11925/infotech.1003-3513.2011.04.02
Abstract
This article describes the architecture of digital library private cloud, and detailly introduces the functions and mechanism about the DLCloud infrastructure,Euca2ools middleware,GridSphere subsystem. Then it describes the establishment of digital library templates, and the running methods based on the architecture of the digital library private cloud platform. Finally, the authors summarize cloud platform for digital libraries, and give some suggestions for later research.
References
|
Related Articles
|
Metrics
Select
Research and Initial Implementation of Large-scale Data Processing Based on Cloud Computing
Zhang Xingwang, Li Chenhui, Qin Xiaozhu
2011,
27
(4): 17-23. DOI:
10.11925/infotech.1003-3513.2011.04.03
Abstract
This paper introduces a large-scale data processing method based on cloud computing, builds a dynamic, scalable, cost-effective, easy to use and high-performance computing platform on a large of centralized or distributed inexpensive computer cluster, and creates a cloud computing-based framework for large-scale data processing model. It also discusses the methods and applications in this large-scale data processing environment. The computing platform is set up to verify the computing cluster and the feasibility of this model.
References
|
Related Articles
|
Metrics
Select
The Correction of Anchoring Effect on Information Screening Based on Concept Lattice in Virtual Community
Tian Yilin, Teng Guangqing, Dong Lili, Zhang Fan
2011,
27
(4): 24-28. DOI:
10.11925/infotech.1003-3513.2011.04.04
Abstract
Based on concept lattice theory, this article constructs concept lattice of information and its characteristics in virtual community by formal concept analysis. Conceptual clustering and association rule mining assists screening and recommending “analogical anchors” which is higher in accessibility, and the anchoring effect of former anchor information is intervened. From a combination of epistemological and Ontological perspective, try to explore the correction methods of anchoring effect on information screening in virtual community.
References
|
Related Articles
|
Metrics
Select
Study on Term Extraction on the Basis of Chinese Domain Texts
Gu Jun, Wang Hao
2011,
27
(4): 29-34. DOI:
10.11925/infotech.1003-3513.2011.04.05
Abstract
Based on the ICTCLAS dictionary segmentation, this paper proposes a method that extracts relevant concept terminology from the Chinese patent texts by maximum matching and frequency statistics, then computes the weights of the items by TF-IDF and gets the final concept terminology. Finally, it analyzes the results with the sample data extraction experiments.
References
|
Related Articles
|
Metrics
Select
Fine-grained User Preference Modeling Based on Tag Networks
Yi Ming, Mao Jin, Deng Weihua
2011,
27
(4): 35-41. DOI:
10.11925/infotech.1003-3513.2011.04.06
Abstract
Aiming at the existing problems in the process of extracting user preferences, a new approach that to organize user generated tags by constructing site-level and user-level tag networks on the basis of social network analysis is proposed. Then, topic based tag documents and topic based user networks are formed. A fine-grained user preference model is formed by computing the similarity between them. The experimental results show that the model is scientific.
References
|
Related Articles
|
Metrics
Select
Constructing the Grammar Knowledge Database Orienting Chinese Automatic Sentence Analysis
Wang Dongbo, Zhu Danhao, Xie Jing
2011,
27
(4): 42-47. DOI:
10.11925/infotech.1003-3513.2011.04.07
Abstract
According to grammar function distribution, a relatively multilevel and systematic grammar knowledge database based on 973 Treebank is constructed from the standpoint of Chinese parser and linguistic knowledge database construction. The grammar knowledge database consists of Chinese syntax knowledge, instance functions of syntax structure and structures’ syntax knowledge. The 51 390 Chinese word’s functions which include 58 kinds of function are gained. The 3 836 instance functions of syntax structure with 58 kinds of function are extracted. The 26 structures’ with 58 kinds of function syntax function are got. There are 900 Chinese sentences rules in the knowledge database. The grammar knowledge database not only offers the syntax knowledge to the Chinese automatic sentence analysis and linguistic researches, but also provides a model for the large-scale linguistic knowledge database construction.
References
|
Related Articles
|
Metrics
Select
Query Expansion Oriented Algorithm of Feature-words Frequent Itemsets Mining
Huang Mingxuan, Ma Ruixing, Lan Huihong
2011,
27
(4): 48-51. DOI:
10.11925/infotech.1003-3513.2011.04.08
Abstract
In this paper, a novel algorithm is proposed to mine feature-words frequent itemsets in text database, in order to obtain high-quality expansion terms for query expansion. This algorithm uses the support to measure the frequent itemsets, and only to mine those frequent itemsets containing original query terms and non- query terms synchronously. It can tremendously enhance the mining efficiency. The experimental results demonstrate that the algorithm is more efficient and more feasible than traditional ones.
References
|
Related Articles
|
Metrics
Select
Research on the Detection of Sudden Events in News Stories of Online Information
Yao Zhanlei, Xu Xin
2011,
27
(4): 52-57. DOI:
10.11925/infotech.1003-3513.2011.04.09
Abstract
Focusing on how to capture sudden events timely and accurately, this paper introduces an idea of the Distance between two Segmental Words(DSW), and devises a model for detecting the sudden events in Internet news. This model mainly comprises two parts, as generating the Hot Element of Terms(HET) and detecting new words. Specifically, it uses the improved TF-PDF algorithm for capturing the Element of Terms(ET),which concerns to generate the Hot Element of Terms, and seeks the status quo of distribution among these terms based on the Distance between two Segmental Words, then with the relatively stable combination among these terms to achieve event detection. Experiment shows that the model has a high sensitivity on detecting the sudden events.
References
|
Related Articles
|
Metrics
Select
Co-authorship Network Analysis in the Research Field of Search Engine’s Log Mining
Wang Jimin, Lilei Mingzi, Zhang Peng
2011,
27
(4): 58-63. DOI:
10.11925/infotech.1003-3513.2011.04.10
Abstract
Based on the papers indexed by Web of SCI and EI on the theme of search engine’s log mining, this paper constructs a co-author network of this field, and analyses the centrality, small world features, connectivity and other basic characteristics of this network. Furthermore, it also explores the core cooperative research teams, the team members and their research contents.
References
|
Related Articles
|
Metrics
Select
A New Method to Evaluate Academic Journals ——Indicator Difficulty Ratio Weighting
Yu Liping, Wu Yishan
2011,
27
(4): 64-70. DOI:
10.11925/infotech.1003-3513.2011.04.11
Abstract
After summarizing two objective evaluation methods of data waving method and data independent method, this paper gives a new method of indicator difficulty ratio weighting and evaluates the academic journals with standardization score. The results show indicator weighted ratio method has a good differential capacity and is very suitable for academic journal evaluation. The method can’t be used with a few journals and probability weighting method has some shortcomings.
References
|
Related Articles
|
Metrics
Select
Design and Prototype Implementation of PDF Downloading Abuse Warning System
Li Yu, Wang Wei
2011,
27
(4): 71-76. DOI:
10.11925/infotech.1003-3513.2011.04.12
Abstract
Excessive PDF downloading is likely to cause service disruption of electronic resources. Based on network analysis of PDF downloading behavior, a prototype monitoring system is designed and implemented with open source software. The accuracy of the system is proved by one year of actual operation.
References
|
Related Articles
|
Metrics
Select
New Attempt on Real-time Virtual Reference Service ——The Smart Chat Robot of Tsinghua University Library
Yao Fei, Ji Lei, Zhang Chengyu, Chen Wu
2011,
27
(4): 77-81. DOI:
10.11925/infotech.1003-3513.2011.04.13
Abstract
Virtual reference service is playing an active and important role in library services. Based on the open source software A.L.I.C.E., Tsinghua University Library develops the real-time smart chat robot -“Xiaotu” to provide various services, including reference service, booking searching, self-learning etc, and promotes “Xiaotu” into the social networking site, and achieves good results.
References
|
Related Articles
|
Metrics
Select
Design and Realization of the Library Electronic Resources Service Monitoring System
Peng Xiaoqing
2011,
27
(4): 82-88. DOI:
10.11925/infotech.1003-3513.2011.04.14
Abstract
To solve the practical problems about electronic resources management in university library, the paper accounts for the demand of the electronic resources service monitoring system. Adopting the SNMP and Java EE technologies, the author completes the architecture design and procedure design of the Library Electronic Resources Service Monitoring System. The system is lightweight, easy to deploy and operate, perfectly satisfies the practical needs of libraries, and is able to monitor the library electronic resource service platform, database, and the unique Z39.50 service of libraries.
References
|
Related Articles
|
Metrics
Select
A Practice of Uniform Identity Authentication Against Multiple Authentication Sources Based on LDAP ——A Case Analysis of East China Normal University Library
Li Xin, Liu Dan
2011,
27
(4): 89-93. DOI:
10.11925/infotech.1003-3513.2011.04.15
Abstract
The paper gives a solution to solve uniform identity authentication against multiple authentication sources by setting up a LDAP proxy server. This solution evades the problem that commercial system does not support multiple authentication sources and is appropriate for large-scaled organization.
References
|
Related Articles
|
Metrics
Copyright © 2016 Data Analysis and Knowledge Discovery Tel/Fax:(010)82626611-6626,82624938 E-mail:jishu@mail.las.ac.cn