Current Issue
    , Volume 30 Issue 2 Previous Issue    Next Issue
    For Selected: View Abstracts Toggle Thumbnails
    Trends and Challenges for Institutional Repositories
    Zhang Xiaolin
    2014, 30 (2): 1-7.  DOI: 10.11925/infotech.1003-3513.2014.02.01
    [Objective] Based on analysis of digital research, explore trends with high potential and impact in Institutional Repository (IR) development. [Methods] Using a quadrant graph with a knowledge outputs to applications dimension and a person to institution dimension, summarize community thinking and practices, reveal possible directions of IRs. [Results] Identified the following as the important trends of IR development: full handling non-textual materials, direct supporting research and education, services for strategic planning. [Conclusion] IR will transform into a live knowledge service platform.
    References | Related Articles | Metrics
    Survey and Analysis on Cognition and Using of Institutional Repository for China Mainland Researchers
    Song Haiyan, Shao Chengjin, Ku Liping, Zhang Dongrong, Pan Wei, Huang Wenli, Jiang Lili, Chen Tiantian, Zhang Hao
    2014, 30 (2): 8-16.  DOI: 10.11925/infotech.1003-3513.2014.02.02

    [Objective] Understanding concepts on IR of China Mainland researchers, and their attitudes, conditions and expectation for submitting and storing their research productions to IR. [Methods] Focusing on "submit role" users, the paper takes the researchers of educational & research institutions as survey object, obtains survey data from more than 1 500 researchers of 60 institutions by quota sampling method. And uses SPSS for reliability and validity analysis, and makes data analysis according to the survey objectives. [Results] Obtaining concepts on IR of China Mainland researchers, and their attitudes, conditions and expectation for submitting and storing their research productions to IR. Also, based on the data, discovering usage and concepts differences between research institutions and universities communities. [Limitations] There is small percentage of users from universities, and as far as the national scitifitic institutions and university communities, it needs more data to support the survey. The findings are just based on the survey data, they may not be applicable to a wider range of user groups. [Conclusions] The survey achieves its desired results, and according to the survey data, it brings out suggestions on promoting IR practice and enhancing IR applications.

    References | Related Articles | Metrics
    Comparative Analysis of Several Typical New Open Source Institutional Repository Software
    Zhang Wangqiang, Zhu Zhongming, Lu Linong
    2014, 30 (2): 17-24.  DOI: 10.11925/infotech.1003-3513.2014.02.03

    [Objective] The article explores the features and shortcomings of several new typical open source Institutional Repository(IR) software including IR+, Zentity, Islandora and Hydra. [Methods] Reviewing relevant information, as well as local installation and testing of these software. [Results] It seems that each open source IR software has different system functions, service features, system architectures, scalabilities, etc. [Limitations] The article only makes a comparative analysis of some new typical open source IR software. [Conclusions] The study is conducive to learning excellent design concept of some open source IR software, moreover, it can provide a reference for how to select appropriate ones from IR open source software to establish an IR.

    References | Related Articles | Metrics
    Research Review on the Research Data Repositories
    Liu Feng, Zhang Xiaolin, Kong Lihua
    2014, 30 (2): 25-31.  DOI: 10.11925/infotech.1003-3513.2014.02.04

    [Objective] To discusses the current status and future directions of Data Repositories (DR). [Methods] Using Databib data, this paper analyses the distributions of DR in terms of country, set-up time, academic field, organizational types, and openness, and then uses GenBank, Dryad, and Figshare to demonstrate DR services. [Results] The study reveals the increasing openness and constant service enrichment of DR, and great potentials in standardizations and integrations. [Conclusions] DRs are in full development, but there are strong needs for further research and application in research lifecycle based data management and open data standards and tools.

    References | Related Articles | Metrics
    A Review on Web Navigation Model:Information Foraging Theory Perspective
    Ke Qing, Wang Xiufeng
    2014, 30 (2): 32-40.  DOI: 10.11925/infotech.1003-3513.2014.02.05

    [Objective] This paper aims to analyze the Web navigation models based on information foraging theory. [Method] The paper compares the similarities of the foraging behavior of animals and navigation behavior of users, investigates the theory foundations of Web navigation models based on information foraging theory and analyzes the operating mechanism of SNIF-ACT series models. [Results] The Web navigation models based on information foraging theory describe users' cognitive characteristics under limited rational hypothesis and suboptimal decision situations. [Conclusion] The paper provides some suggestions so as to improve the application of these models in explaining and predicting users' Web navigation behavior.

    References | Related Articles | Metrics
    An Improved Content-based Recommendation Method Through Collaborative Predictions and Fuzzy Similarity Measures
    Jiang Shuhao, Xue Fuliang
    2014, 30 (2): 41-47.  DOI: 10.11925/infotech.1003-3513.2014.02.06

    [Objective] The authors improvecontent-based recommendation method through Fuzzy similarity-based collaborative filtering prediction and diversity selection algorithm to raise the recommendation quality. [Context] There are many successful applications of Content Based Recommender Systems (CB-RS).Recommendation diversity, representation of items as well as users' preference modeling are still critical parts in this field. [Methods] An effective collaborative Content-Based Filtering (CBF) is developed by introducing an item representation scheme, and measuring similarity based on the scheme, and fuzzy similarity measure and fuzzy-CF into the fuzzy-CBF with diversity, in order to improve content-based recommendation method. [Results] Experiment results show that the proposed hybrid scheme (fuzzy CF-CBF) is better than the other three popular schemes in Mean Absolute Error(MAE), coverage and diversity. [Conclusions] The proposed scheme improves the recommendation quality, while enhances the recommended diversity.

    References | Related Articles | Metrics
    Research on a Method of Implicit Knowledge Push Service Based on Social Network Analysis
    Huang Wei, Gao Junfeng, Wang Chen, Qi Yue
    2014, 30 (2): 48-54.  DOI: 10.11925/infotech.1003-3513.2014.02.07

    [Objective] Introduce the theory of social network analysis to solve the problem in implicit knowledge push service. [Context] The research is carried out by selecting the knowledge preference of logined users within 24 hours based on the digital library environment. [Methods] "N-cliques " and "centrality degree" are introduced to analyze the target users. Make the similar users' implicit knowledge requirement explicit and push knowledge to target users. [Results] The breadth and accuracy of implicit knowledge pushing performance is directly affected by parameter of "n", and the implicit knowledge pushed is of more granularity when the threshold is set to "2". [Conclusions] Our research solved the issue of extreme scarcity of pushing data and poor performance of users' implicit knowledge acquirement, promoting the share of implicit knowledge.

    References | Related Articles | Metrics
    Knowledge Service-oriented Model of Knowledge Base Frame Structure Research Based on Double-base Cooperating
    Jiang Xun, Xu Xukan, Su Xinning
    2014, 30 (2): 55-62.  DOI: 10.11925/infotech.1003-3513.2014.02.08

    [Objective] The paper reveals the relationship between the knowledge base and database, and the double-base cooperates in the process of knowledge acquisition, to improve the speed, accuracy and cognitive autonomy. [Methods] The knowledge service-oriented model of knowledge base frame structure research is based on double-base cooperating. The research of this model focuses on the heuristic coordinator and interruptive coordinator, which their algorithms and collaborative effects are given for high efficiency knowledge service. [Results] The model of knowledge base frame structure on double-base cooperating is presented. In this model, the relation between knowledge base and database and their mapping relationship are given. Finally, double-base cooperating is achieved, and the process model is described. [Limitations] The data sources in double-base cooperating are considered as homogeneity, but other heterogeneous data sources and multidimensional data are not fully involved. [Conclusions] The knowledge base frame structure plays a supporting role, which reduces the search space and improves mining efficiency.

    References | Related Articles | Metrics
    Review of Product Review Spams Detection
    Nie Hui, Wang Jiajia
    2014, 30 (2): 63-71.  DOI: 10.11925/infotech.1003-3513.2014.02.09

    [Objective] The paper cards existing study about online product review spam, summarizes research status, and puts forward future research direction. [Coverage] Almost 50 papers at home and abroad are searched via review/opinion spam as keywords from CNKI and Google scholar. [Methods] By literature analysis, the concept of product review spam is defined. The research area that review spam study belongs to is specified and key issues and challenges are presented in the paper. [Results] Product review spam refers to the untruthful reviews written for the purpose of inflating or damaging given products excessively or low quality reviews not being able to provide any help to customers. Due to the lack of reliable ground truth label of fake/no-fake review data, the analysis for reviewers' behavior is highlighted since it can be employed to solve the problem of fake review identification effectively if being combined with the features of review contents. [Limitations] Further study should be conducted on the creditability analysis for product review spam combined with fake review identification. [Conclusions] Product review spam detection is a kind of application studies corresponding to review creditability. Not only the review content specific features but also reviewers corresponding features should be fully explored for fake reviews detection. Moreover, the features with significant impact on fake review identification need to be highlighted specifically with the consideration of independence of feature variables.

    References | Related Articles | Metrics
    Research on Public Opinion of the Disputes on Huangyan Island in the Network News:A Case Study of “Special Reports about the Disputes Between China and Philippines on Huangyan Island”on Sina
    Zou Wei, Liu Yongxue, Li Manchun, Wang Jiasheng, Chen Yingxue
    2014, 30 (2): 72-78.  DOI: 10.11925/infotech.1003-3513.2014.02.10

    [Objective] Depending on "Special Reports about the Disputes between China and Philippines on Huangyan Island"on Sina, the study explores the situation and correlation of the disputes between China and Philippines on Huangyan Island. [Context] With the rapid development of the Internet, it has been the main carrier of reflecting social hot spot. The disputes between China and Philippines on Huangyan Island in 2012 is a typical events on public opinions. To obtain a comprehensive understanding of events, the study searches the public opinions of the events effectively and reasonably. [Methods] This study uses the methods of Web crawler to get the news data, employs text participle to obtain the elements of news and establishes database of the disputes of Huangyan Island. By using mathematical statistics and Gephi software, the study achieves data analysis. [Results] Changing processes of the situation in the disputes between China and Philippines on Huangyan Island can be divided into five stages. It accords with the lifecycle principle of network public sentiment emergency. The focus in the disputes between China and Philippines on Huangyan Island is similar, but the two sides focused on different measures. [Conclusions] This study is helpful to show a complete development process of the disputes between China and Philippines on Huangyan Island. Meanwhile, it also performs different measures and standpoints between China and Philippines on Huangyan Island.

    References | Related Articles | Metrics
    The Evaluation Model Research on Information Dissemination Influence of Micro-blog Individual
    Lin Chen
    2014, 30 (2): 79-85.  DOI: 10.11925/infotech.1003-3513.2014.02.11
    [Objective] Forwarding number is usually as the one and only criterion in Micro-blog individual evaluation of information dissemination influence. When individual increases forwarding number using ‘buying fans’, evaluation result can't reflect its true influence. [Methods] From the perspective of dissemination results, this paper redefines propagation depth, speed and gives quantitative methods, combined with the forwarding number (propagation breadth) together as evaluation dimensions, constructs evaluation model based on dimensions. [Results] Experimental results show that compared forwarding number, the new model can truly reflect the individual information dissemination influence, in particular, can distinguish the difference between individuals with the same forwarding number. [Limitations] Experimental data is obtained by using Weibo API, but how much data returned is limited. To get the full dissemination of data, the experiment selects individuals that forwarding number of its information is lower than 2 000. But the model is not affected by data size, while data integrity should be ensured for using. [Conclusions] This paper provides a new, more accurate information dissemination influence evaluation model with strong theoretical and practical value.
    References | Related Articles | Metrics
    Realization of Improved RBAC Model in Task Management in Normative Concepts Collaborative Construction Platform
    Li Peng, Zhu Lijun, Liu Yajie, Yan Yingying
    2014, 30 (2): 86-91.  DOI: 10.11925/infotech.1003-3513.2014.02.12

    [Objective] Improve the flexibility of users' permissions and task management in normative concepts collaborative construction platform of the super technological vocabulary. [Methods] The RABC model is adjusted to support flexible configuration between the user, role and permission, and the task state automatic transition by direct permissions setting and the introduction of resource work state. [Results] The model is divided into task creation, task distribution, concept processing, task auditing, task ends while the task runs through the entire business process so as to standardize the workflow. [Conclusions] System operation results show that it can quickly and efficiently distribute process and audit concepts, and realize flexible control of process and completion of collaborative work.

    References | Related Articles | Metrics
    Application of Open Source Search Engine Solr to Build Standards Information Management and Analysis Platform
    Wang Feng, Wei Feng, Liu Yi, Zhou Hong, Zhao De
    2014, 30 (2): 92-98.  DOI: 10.11925/infotech.1003-3513.2014.02.13

    [Objective] The paper is to build an online standards information management and analysis platform based on faceted search engine Solr to meet standards information research requirements of the National Science Library, Chinese Academy of Sciences.[Context] It is the direction to improve efficiency in standards information research by using network platform to manage and analyze data.[Methods] The paper describes the system framework based on MVC multi-layer architecture, designs index fields to meet the demands for information analysis, emphasizing on the implementation of standards information retrieve, computing and analysis by using Solr's rapid indexing and faceted search. [Results] Large amounts of standard data are managed effectively, analyzed and visualized in the platform.[Conclusions] The system has been applied by the standards information analysis team, which can improve work efficiency greatly.

    References | Related Articles | Metrics
    Primo Harvesting-interface Design and Implementation of MELINETSⅡ Metadata
    Tang Xiaoxin
    2014, 30 (2): 99-104.  DOI: 10.11925/infotech.1003-3513.2014.02.14
    [Objective] The paper is to convert manual harvest to automatic for non-signed Primo metadata. [Context] The author takes the Guangxi University Library Metadata MELINETSⅡ for example. [Methods] It proposes some ideas and methods for non-signed metadata MELINETSⅡdata harvest from a manual to automatic harvest, introduces data interface, formulates the harvestable tasks, writes the harvestable conversion script, configures the harvestable pipes and rebuilds the index and the other key technologies. [Results] It realizes automatic harvest of the non-signed Primo metadata MELINETSⅡ, and improves the efficiency of data interface, meets the reader needs of multi-channel use of literature information. [Conclusions] It has a certain significance and promotion prospects to automatic data harvest of heterogeneous systems.
    References | Related Articles | Metrics
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938