Advanced Search
DAKD
Home
Journal Information
Aims and Scopes
Editorial Board
For Authors
Peer-Review Process
Instruction for Authors
Publishing Ethic Statement
Contact Us
中文
Advanced Search
Current Issue
, Volume 28 Issue 10
Previous Issue
Next Issue
For Selected:
View Abstracts
Download Citations
EndNote
Reference Manager
ProCite
BibTeX
RefWorks
Toggle Thumbnails
article
Select
A Linked Data-driven Semantic User Modeling Framework for Personalization Service
Niu Yazhen, Zhu Zhongming
2012,
(10): 1-7. DOI:
10.11925/infotech.1003-3513.2012.10.01
Abstract
Based on the framework of Linked Data application, this paper prensents a semantic user modeling framework, and designs a semantic user model in the context of semantic Web, then analyzes the framework in detail. This framework mainly consists of two parts: firstly, it discusses the methods and strategies for discovering and acquiring users data from the LOD cloud; secondly, it introduces the processes for constructing a user model using these data, which includes such steps as concept mapping, identity resolution, data fusion and model generation.
References
|
Related Articles
|
Metrics
Select
The Research and Implementation of Clustered Graphs Layout Algorithm for OntoThesaurus Visualization
Zeng Xinhong, Cai Qinghe, Zeng Hanlong, Tang Cheng, Huang Huajun, Lin Weiming
2012,
(10): 8-15. DOI:
10.11925/infotech.1003-3513.2012.10.02
Abstract
There exists “Descriptor-RelationName-RelatedTermsSet” structural feature between descriptor and its associated terms in OntoThesaurus, and the relationship between the extended subproperties and their superproperty should be visualized, so this paper presents clusters layout algorithms to meet the visualization need of OntoThesaurus. An intuitive and vivid effect is produced, which is done by combing the force-directed algorithm of the information visualization community with animation technology. The initial prototype can process NKOS data represented in Semantic Web description languages such as OntoThesaurus, SKOS, CNKOS, which are based on RDF triples, and therefore can be generally used to visualize the instances of concept class in NKOS (especially Chinese NKOS).
References
|
Related Articles
|
Metrics
Select
Conversion and Consumption of Chinese Agricultural Thesaurus as SKOS
Xian Guojian, Zhao Ruixue, Zhu Liang, Kou Yuantao
2012,
(10): 16-20. DOI:
10.11925/infotech.1003-3513.2012.10.03
Abstract
This paper represents the descriptor, non-descriptor and semantic relationships of Chinese Agricultural Thesaurus (CAT) as SKOS, and develops an application to convert CAT to CAT/SKOS automatically, and indexes millions of agricultural abstracts semantically based on CAT/SKOS, Solr and the improved Lucene-SKOS plugin. Then it realizes a semantic retrieval prototype system, which supports cross-language search (Chinese and English), and can also extend and reconstruct the query based on semantic relationship in CAT/SKOS. Finally, the authors make some prospects on the future applications of CAT/SKOS such as the publication as Linked Data.
References
|
Related Articles
|
Metrics
Select
A Survey of Burst Topic Detection Towards Social Text Stream Data
Le Xiaoqiu, Hong Na
2012,
(10): 21-27. DOI:
10.11925/infotech.1003-3513.2012.10.04
Abstract
Social text streams have rich contextual information and huge participants who communicate with informal steams. It needs to find suitable solutions to detect burst topics from this kind of data. In this paper, the authors comb through the concepts, the characteristics of social text stream data and the presentation forms of burst topics. It also summarizes the main research ideas and the basic procedures of burst topic detection towards social text stream data in three dimensions: textual content, social, and temporal. The principal approaches to make use of social features, such as user participation, social context and community structure evolution, for burst topic detection are generally discussed.
References
|
Related Articles
|
Metrics
Select
Review on Mining Methods of Correlated Bursty Topic Patterns
Huang Yongwen
2012,
(10): 28-34. DOI:
10.11925/infotech.1003-3513.2012.10.05
Abstract
This paper introduces the definition of correlated bursty topic patterns and studies the key issues of mining correlated bursty topic patterns such as detect bursty topics, locate bursty period of a bursty topic and discover correlated bursty topics.Finally, it analyzes the methods of mining correlated bursty topics from text collections, synchronous text streams and asynchronous text streams.
References
|
Related Articles
|
Metrics
Select
Mandarin Text Representation Based on Minimal Recursion Semantics——Illustrate by Quantitative Noun Phrases
Zeng Shaoqin, Wang Huilin, Zhang Yinsheng
2012,
(10): 35-41. DOI:
10.11925/infotech.1003-3513.2012.10.06
Abstract
This paper adopts a new framework named Minimal Recursion Semantics (MRS) to represent sentence meaning. Taking Chinese Quantitative Noun Phrases(QNP) as main analysis object according to MRS’s characteristics,the paper designs a suitable MRS representation for Chinese QNP and shows a reasonable HPSG analysis of QNP.It also implements a grammar analysis experiment, and the result shows the grammer is basically applicable to Chinese QNP representation.
References
|
Related Articles
|
Metrics
Select
The Optimization of SPARQL Query
Xu Lei
2012,
(10): 42-48. DOI:
10.11925/infotech.1003-3513.2012.10.07
Abstract
In order to improve SPARQL query efficiency, this paper uses RDF schema to simplify the BGP of SPARQL, and then estimates each node’cardinality and the weight of each edge through B-tree indexes quickly. After that, it uses the methods of joining cost estimation and dynamic programming for the optimal logical query plan. The result of the experiment shows that the new method improves the SPARQL query efficiency,while the performance of this method is as good as Sesame, and much better than Jena.
References
|
Related Articles
|
Metrics
Select
Investigation and Analysis of Chinese Microblog User Tags——Using Sina Weibo as Example
Huang Hongxia, Zhang Chengzhi
2012,
(10): 49-54. DOI:
10.11925/infotech.1003-3513.2012.10.08
Abstract
Based on the microblog user tags and microblog content data from Sina Weibo, this paper analyses the features of user tags including user characteristics, the semantic relationship of the user tags, the degree of correlation between user tags and microblog content, and the distribution of emotion tags. On the results of investigation and analysis, the paper gives some advice for improvements of tag suggestion.
References
|
Related Articles
|
Metrics
Select
Empirical Study of the Motivations of e-WOM Spreading on Online Feedback System
Cui Jinhong, Wang Lingyun
2012,
(10): 55-60. DOI:
10.11925/infotech.1003-3513.2012.10.09
Abstract
Based on the former researches, this paper studies the motivations of consumers to spread e-WOM on the online feedback system by benefit factors and cost factors. Meanwhile, it brings the motivation crowding effect into the analysis model, and discusses the effect of extrinsic motivation on intrinsic motivation and internalizes extrinsic motivation. Finally, several proposals for encouraging customers to spread on the online feedback system are provided.
References
|
Related Articles
|
Metrics
Select
Research on Sentiment Orientation Analysis of Product Online Reviews
Zhang Hongbin, Li Guangli
2012,
(10): 61-66. DOI:
10.11925/infotech.1003-3513.2012.10.10
Abstract
This paper aims at resolving the semantic mining problem of product online reviews by using the technology of sentiment orientation analysis. The sentiment orientation polar is firstly analyzed and the intensity of sentiment orientation analysis is computed to correctly express the inner semantic of product online reviews. The reviews of Xiaomi mobile phone and Motorola ME525+ mobile phone on Taobao are chosen to do the experiments. The results show that the precision of each auto-scoring of sentiment orientation analysis can reach 80% and most attribute indicators of products can get correct sentiment orientation polar, Which can help Web users to make correct purchase decisions to some extent.
References
|
Related Articles
|
Metrics
Select
Research on Factor Model of Dating Sites’ Initial Trust
Wan Jun, Zhang Xiang, Pang Peipei
2012,
(10): 67-71. DOI:
10.11925/infotech.1003-3513.2012.10.11
Abstract
This paper constructs a conceptual model of initial trust and analyses the effect of the seven antecedent variables (market perception, public validity, structure quality, information quality, window friendly, security system, trust orientation) on the initial trust of the dating sites based on the literature screening. Using SPSS19.0 and Lisrel8.8 to do an empirical test and analysis of the model on the basis of the questionnaire, and the results show that market perception, public validity, information quality, window friendly, security system and trust orientation can affect the initial trust of potential users significantly. Finally, suggestions and research prospects are put forward.
References
|
Related Articles
|
Metrics
Select
Study on the iLibrary Applications for CEODE-CAS
Huang Mingrui, Wang Hua, Zhang Qing, Jiang Xiling, Fan Bing
2012,
(10): 72-76. DOI:
10.11925/infotech.1003-3513.2012.10.12
Abstract
The iLibrary platform application pattern, design clue and implement routine are presented, and the key points of the platform construction and application process are condensed based on the CEODE-CAS iLibrary building process. The paper analyzes the iLibrary requirements of the selected five scientific units of CEODE,and the CEODE-CAS iLibrary has the characteristics of easy building, easy using and easy spreading via mashup and embedded service. The trials for developing other scientific units are prepared based on the practical process.
References
|
Related Articles
|
Metrics
Select
Research and Implementation of Drive-level Local User Behavior Monitoring System
Guo Xiaoqing, Ren Shougang, Xie Zhonghong
2012,
(10): 77-82. DOI:
10.11925/infotech.1003-3513.2012.10.13
Abstract
In order to obtain the behavior of local users which include operation on digital libraries and personalized push service, and application software on the system, a driver stage-based application access control strategy is proposed, which can implement real-time monitoring and recording of the I/O operation. This paper implementes the drive-level local user behavior monitoring system based on VC++, using technologies of file driver stage, Web crawler and database. Operation log obtained through the system also can be used as the electronic survey data designed for personalized push service of the library.
References
|
Related Articles
|
Metrics
Select
Study and Implementation on the Automatic Mapping Rules Between Knowledge Organization Systems——The Case of the Dewey Decimal Classification and the Chinese Library Classification
Qu Jianfeng, Li Fang, Zhang Yihua, Li Bao
2012,
(10): 83-88. DOI:
10.11925/infotech.1003-3513.2012.10.14
Abstract
This paper applies mathematical statistics corpus linguistics to generate mapping rules between DDC(Dewey Decimal Classification) and CLC(Chinese Library Classification). A test system is then built up and the DDC-CLC mapping table is produced through the system. The mapping table is examined by bibliographic records with DDC and CLC data so that continuously improved mapping rules and tables can be obtained.
References
|
Related Articles
|
Metrics
article
Select
Developing a Remote Monitoring System for Library Computer Room Using Arduino and Android Terminal
Wang Jiabing
2012,
(10): 89-92. DOI:
10.11925/infotech.1003-3513.2012.10.15
Abstract
This paper introduces a remote monitoring system for library computer room using Arduino and Android smart terminal. The system modules, hardware and software design are described in detail. Arduino ADK is used as a control panel to complete the information acquisition of temperature, humidity, smoke and power.Android smart terminal is used to monitor the Web services, store and display the sensors temporary data. Related information is also uploaded to Yeelink cloud computing platform for long-term storage or online monitoring. The whole system has the advantages of convenient deployment, low cost, high reliability and high scalability.
Related Articles
|
Metrics
Select
Application of PivotViewer in OPAC Interaction of Library
Qi Xiaochen, Sun Zhen
2012,
(10): 93-96. DOI:
10.11925/infotech.1003-3513.2012.10.16
Abstract
Taking the new books’ notice for example, this paper introduces how to realize the application of PivotViewer in detail. It also shows the outstanding effects that the brand-new pattern of data visualization brings to OPAC interaction of library, which proves the application of PivotViewer in OPAC can provide readers with more friendly man-machine dialogue and communication environment, and the retrieval efficiency can be highly improved.
References
|
Related Articles
|
Metrics
Copyright © 2016 Data Analysis and Knowledge Discovery Tel/Fax:(010)82626611-6626,82624938 E-mail:jishu@mail.las.ac.cn