CN109582858A - A kind of believable Knowledge Ecosystem - Google Patents
A kind of believable Knowledge Ecosystem Download PDFInfo
- Publication number
- CN109582858A CN109582858A CN201811207431.XA CN201811207431A CN109582858A CN 109582858 A CN109582858 A CN 109582858A CN 201811207431 A CN201811207431 A CN 201811207431A CN 109582858 A CN109582858 A CN 109582858A
- Authority
- CN
- China
- Prior art keywords
- knowledge
- personal
- text
- platform
- theme
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a kind of believable Knowledge Ecosystems, it include: the automatic collection module of education resource, the learning materials of specific subject are acquired from internet open source on demand, data cleansing, data regularization are carried out, structuring or semi-structured data are credibly stored in internal learning resources bank;Resources learning module carries out study to resource and forms personal knowledge base, and wherein personal knowledge base is stored on platform in a trusted manner;Knowledge management module carries out tissue to the knowledge element in the personal knowledge base and arrives existing knowledge hierarchy with merging, updating;Knowledge is credibly shared with specific user (group) by Knowledge Sharing module;Knowledge innovation module produces personal achievement in conjunction with existing knowledge hierarchy, and forms personal achievement library;Achievement submits module, and the personal achievement is submitted on platform.In the present invention, the flow process of knowledge promotes the continuous self-renewing of knowledge base, forms constantly circulation, self-growing Knowledge Ecosystem.
Description
Technical field
The invention belongs to reliable computing technology fields, and in particular to a kind of believable Knowledge Ecosystem and its building side
Method.
Background technique
Currently, information management, the research progress just like a raging fire of the trusted storage of knowledge, the shared aspect of knowledge.?
The epoch of information explosion, how to carry out information management, the trusted storage of knowledge, knowledge it is shared, be pendulum in each information management
Problem in face of industry practitioner.
Chinese invention patent publication number CN107704634A discloses the method for a kind of formation knowledge and building knowledge chain,
It is characterized in that, studies the knowledge for including in text information, construct the field primitive figure of system to indicate knowledge, pass through the phase of knowledge
Mutually connection generates knowledge chain;The knowledge that primitive figure indicates is made of object, attribute and magnitude, and object is center, attribute explanation pair
As;Attribute is divided into index, tendency and object three classes;The object properties of object Object are to form the basis of knowledge chain, and knowledge
Explanation be generate knowledge chain power;Knowledge and learning knowledge in text information constitute primitive Knowledge Ecosystem;It is main
The knowledge analysis being used in text and building knowledge chain.
However, above-mentioned Knowledge Ecosystem master is to solve the management system structure that enterprise produces, faces in business administration
Problem is built, there is no believable Knowledge Ecosystem at present, the integration of the education resource on common internet.
Summary of the invention
In order to solve the above problem, the present invention is by semantic-based Theme Crawler of Content, increment crawler technology, from it is multi-source heterogeneous,
The related resource that specific subject or specific area are obtained in the internet open source of magnanimity complexity, by data deduplication, knows
The management of knowledge, credible management, credible sharing, the technologies such as trusted storage establish collect resource acquisition, resources learning, information management, at
Fruit output, knowledge sharing are in the Knowledge Ecosystem of one.
According to an aspect of the invention, there is provided a kind of believable Knowledge Ecosystem, comprising:
The automatic collection module of education resource acquires the learning materials of specific subject from internet open source on demand, into
Structuring or semi-structured data are credibly stored in internal learning resources bank by row data cleansing, data regularization;
Resources learning module, resource carry out self study and form personal knowledge base, and wherein personal knowledge base is in a trusted manner
It is stored on platform;
Knowledge management module carries out tissue to the knowledge element in the personal knowledge base and merges, updates to existing
Knowledge base;
Knowledge is credibly shared with specific user (group) by Knowledge Sharing module;
Knowledge innovation module produces personal achievement in conjunction with existing knowledge hierarchy, and forms personal achievement library;
Achievement submits module, and the personal achievement is submitted on platform, is learnt for other learners.
Preferably, the carrier format of the resources learning module object includes: video, audio, document, and/or webpage.
Preferably, in the personal knowledge base knowledge element and existing knowledge hierarchy merge, comprising: knowledge
Duplicate removal, disambiguation, and/or knowledge connection.
Preferably, the method for the information management are as follows: the system is embedded in plug-in unit method of calling using mind map tool
System is managed knowledge.
Preferably, the Knowledge Sharing includes: to share the partial knowledge in personal knowledge base to the inside of the system
Intercommunion platform or internet open source platform are shared from internal communication platform to internet open source platform, from described
Personal achievement library is shared with internal communication platform or internet open source platform.
Preferably, user can control the access profile of strict control content by permission during sharing, and believe
Breath is transmitted in transmission channel with ciphertext form.
Preferably, the method for the acquisition learning materials is semantic-based Theme Crawler of Content or increment crawler algorithm.
Preferably, the Theme Crawler of Content method includes the following steps:
(1), using Dewey Decimal Classification, the stage is extracted in web page characteristics, web page text is rapidly found out and Anchor Text closes
Keyword similar in keyword theme;
(2), theme candidate link feature text is extracted;
(3), classified using Naive Bayes Classifier to candidate link theme edge text, obtain theme
Related web page;If text belongs to specific subject, corresponding candidate link is using weight of classifying as priority value, with excellent
The size order of first grade is inserted into queue of creeping, and crawler preferentially accesses the big link of classification value, if text is not belonging to specific subject,
Then abandon candidate link;
(4), its corresponding technorati authority and centrad are calculated with HITS algorithm to the Web link information of related web page, it is comprehensive
Close Anchor Text, Anchor Text nearby information, reversed webpage, backward chaining brother link, URL link, prejudge webpage to be crawled with
The degree of correlation of theme.
Preferably, the extraction theme candidate link feature text includes the following steps:
(1) word segmentation processing is carried out to the Anchor Text of webpage and text, removes stop words, obtains keyword;
(2) the Du Wei class number of keyword is searched;
(3) theme candidate link feature text is extracted with the characteristic of Dewey decimal classification and combination two-dimensional coordinate;
Using the length of keyword class number as X-axis, keyword classification number as Y-axis, by the corresponding Du Weishi of keyword into point
Class number draws corresponding point in two-dimensional coordinate;
(4) the corresponding keyword of key point in two-dimensional coordinate around Anchor Text key point and Anchor Text is extracted as master
Inscribe candidate link feature text.
Preferably, which is believable, is embodied in the access authority control of the personal knowledge base, personal achievement library
System is managed by user;Data therein are credibly stored in system platform.
Preferably, the trusted storage refers to that data in the database, pass through unsymmetrical key with encrypted test mode storage
Public key encrypted, and private key only has user oneself to possess, even if the manager of platform can not obtain.
The present invention has the advantages that the flow process of knowledge promotes the continuous self-renewing of knowledge base on this platform,
Form constantly circulation, self-growing Knowledge Ecosystem.Platform of the invention has the following characteristics that
(1) renewal of knowledge self-renewing microcirculation of individual subscriber: the process of information management can be recycled past by user
Multiple knowledge process realizes the continuous renewal of personal knowledge base;
(2) the interior circulation (partial circulating) that internal system education resource automatically updates: on learning platform, knowledge learning is known
Know innovation and achievement submits three processes to form partial circulating, is updated by the learning outcome of user and the study of platform is constantly promoted to provide
Source library is cyclically updated.
(3) outer circulation (systemic circulation) that internal system education resource automatically updates: personal knowledge base and achievement library it is continuous
It updates, promotes the continuous updating of internet open source by orderly opening Knowledge Sharing, internet open source continues
The update of further promotion system internal learning resource is updated, the outer circulation that internal system education resource updates is formed.
Detailed description of the invention
By reading the following detailed description of the preferred embodiment, various other advantages and benefits are common for this field
Technical staff will become clear.The drawings are only for the purpose of illustrating a preferred embodiment, and is not considered as to the present invention
Limitation.And throughout the drawings, the same reference numbers will be used to refer to the same parts.In the accompanying drawings:
Fig. 1 shows the operation principle schematic diagram of the believable Knowledge Ecosystem of the present invention.
Fig. 2 shows believable Knowledge Ecosystem structure charts of the invention.
Specific embodiment
The illustrative embodiments of the disclosure are more fully described below with reference to accompanying drawings.Although showing this public affairs in attached drawing
The illustrative embodiments opened, it being understood, however, that may be realized in various forms the disclosure without the reality that should be illustrated here
The mode of applying is limited.It is to be able to thoroughly understand the disclosure on the contrary, providing these embodiments, and can be by this public affairs
The range opened is fully disclosed to those skilled in the art.
Explain " credible " concept according to the present invention first below.In the present invention, the meaning of " credible " is different from daily
Concept and range in life has it in the particular meaning of specific field.
In technical field, nineteen eighty-three U.S. Department of Defense has just formulated " trust computing and system evaluation criterion ".1999
TCPA tissue is set up, and is reorganized as Trusted Computing Group TCG within 2003.TCPA and TCG has been formulated about credible calculating platform, credible
A series of technical specifications such as storage, trustable network connection.Existing more than 200 a enterprises joined TCG at present, and trusted computer is
Into practical application.
In theoretical field, IEEE, which is organized in, has edited and publish IEEE Transaction on dependable for 2004
And secure Computing magazine, specially discusses trust computing.
Trusted Computing Group TCG is defined credible with the expection of entity behavior: an entity is believable, if it
Behavior always by way of expectations, reaches the set goal.
15408 standard of ISO/IEC will be credible is defined as: participates in the component calculated, operation or process are under conditions of any
It is predictable, and virus and physical disturbance can be resisted.
It is so-called credible to refer to that service provided by computer system is that prove it be reliable.Here it is refer to from
Family angle sees that service provided by computer system is reliable, and this trust is demonstrable.Credible accounting system
It is the reliability, availability, the computer system of information and behavior safety of the system that is capable of providing.
In addition, what the present invention can be published about the basic conception of trust computing with reference to China Machine Press in 2009
" trust computing " book.
As shown in Figure 1, technical principle of the invention is as follows:
The automatic collection of education resource, by semantic-based Theme Crawler of Content, increment crawler technology, from multi-source heterogeneous, extra large
The related resource for obtaining specific subject or specific area in complicated internet open source is measured, and number is passed through to these resources
After realizing duplicate removal according to cleaning technique and carry out quality evaluation, internal system is stored in the form of structuring and semi-structured data
Learning object repository.The Theme Crawler of Content method includes the following steps:
(1), using Dewey Decimal Classification, the stage is extracted in web page characteristics, web page text is rapidly found out and Anchor Text closes
Keyword similar in keyword theme;
(2), theme candidate link feature text is extracted;The extraction theme candidate link feature text includes following step
It is rapid:
(1) word segmentation processing is carried out to the Anchor Text of webpage and text, removes stop words, obtains keyword;
(2) the Du Wei class number of keyword is searched;
(3) theme candidate link feature text is extracted with the characteristic of Dewey decimal classification and combination two-dimensional coordinate;
Using the length of keyword class number as X-axis, keyword classification number as Y-axis, by the corresponding Du Weishi of keyword into point
Class number draws corresponding point in two-dimensional coordinate;
(4) the corresponding keyword of key point in two-dimensional coordinate around Anchor Text key point and Anchor Text is extracted as master
Inscribe candidate link feature text.
(3), classified using Naive Bayes Classifier to candidate link theme edge text, obtain theme
Related web page;If text belongs to specific subject, corresponding candidate link is using weight of classifying as priority value, with excellent
The size order of first grade is inserted into queue of creeping, and crawler preferentially accesses the big link of classification value, if text is not belonging to specific subject,
Then abandon candidate link;
(4), its corresponding technorati authority and centrad are calculated with HITS algorithm to the Web link information of related web page, it is comprehensive
Close Anchor Text, Anchor Text nearby information, reversed webpage, backward chaining brother link, URL link, prejudge webpage to be crawled with
The degree of correlation of theme.
Resources learning, the resources learning including different carriers type.Video study, including on-line study and off-line learning two
Kind function, utilizes the technologies such as video online request, break-point continuous playing, stream data cache to realize.Audio study and document, article etc. are literary
The study of this class carrier, mainly supports on-line study, can be downloaded off-line learning in the case where copyright allows.
Information management, the knowledge such as notes, idea that can be generated by way of mind map to learning process carry out pipe
Reason, a kind of method can use the mind maps such as xmind, freemind tool with plug-in unit method of calling embedded system, another
Method can also be realized based on existed system.
Knowledge innovation can carry out notes and the automatically extracting of idea, Science Report or academic paper based on system
The Automatic Typesetting of equal articles, forms personal achievement library.The access authority in achievement library can be configured by author, allow specified model
Enclose or designated user access, downloading etc..Personal achievement is stored in system platform in the form of ciphertext, and user can choose difference
The Encryption Algorithm of intensity is encrypted, and voluntarily grasps key, to protect the intellectual property of author.
The algorithm encrypted to personal achievement is the combination of symmetric encipherment algorithm and rivest, shamir, adelman: as used
Rivest, shamir, adelman RSA transmission key, and AES encryption algorithm is used for data encryption.
Achievement is submitted, and is referred to that the personal achievement in part is submitted to system internal resources platform by author, is accessed for platform user
Study.Personal achievement is submitted, and the personal achievement formed in platform can be carried out a key submission, can also be by offline personal achievement
It is submitted.After the achievement submitted is audited by copyright, content, form of platform etc., it can issue.
Knowledge Sharing, by possessing the user for sharing permission for knowledge from an access profile sharing to another access model
It encloses.It is settable whether to allow repeatedly to be shared when author shares from personal knowledge base to internal system intercommunion platform;Work as knowledge
When arriving internet open platform by sharing, such as microblogging, wechat social platform, dated copyright can repeatedly be shared.The process of sharing
Middle user can control the access profile of strict control content by permission, and information is passed in transmission channel with ciphertext form
It is defeated.
The system be it is believable, be embodied in the personal knowledge base, personal achievement library access privilege control by with
Family is managed;Data therein are credibly stored in system platform.
The trusted storage refers to that data in the database, pass through the public key of unsymmetrical key with encrypted test mode storage
It is encrypted, and private key only has user oneself that can decrypt, even if the manager of platform can not obtain the key of decryption.
On this platform, the flow process of knowledge promotes the continuous self-renewing of knowledge base, is formed and constantly recycles, is spontaneous
Long Knowledge Ecosystem.Platform of the invention has the following characteristics that
(1) renewal of knowledge self-renewing microcirculation of individual subscriber: the process of information management can be recycled past by user
Multiple knowledge process realizes the continuous renewal of personal knowledge base;
(2) the interior circulation (partial circulating) that internal system education resource automatically updates: on learning platform, knowledge learning is known
Know innovation and achievement submits three processes to form partial circulating, is updated by the learning outcome of user and the study of platform is constantly promoted to provide
Source library is cyclically updated.
(3) outer circulation (systemic circulation) that internal system education resource automatically updates: personal knowledge base and achievement library it is continuous
It updates, promotes the continuous updating of internet open source by orderly opening Knowledge Sharing, internet open source continues
The update of further promotion system internal learning resource is updated, the outer circulation that internal system education resource updates is formed.
Embodiment 1
Correspondingly, the present invention also provides a kind of believable Knowledge Ecosystem 10, including education resource collects mould automatically
Block 11, resources learning module 12, knowledge management module 13, Knowledge Sharing module 14, knowledge innovation module 15, achievement submit module
16。
The automatic collection module 11 of education resource acquires the learning materials of specific subject from internet open source on demand,
Data cleansing, data regularization are carried out, structuring or semi-structured data are credibly stored in internal learning resources bank.
Resources learning module 12, resource carry out self study and form personal knowledge base, and wherein personal knowledge base is with believable side
Formula is stored on platform.The carrier format of resources learning object includes but is not limited to video, audio, document, webpage, learning process
In can recorde notes, mark resource, extract knowledge point etc., these knowledge elements are the required contents for forming knowledge base.
Knowledge management module 13, be to the knowledge element and the process that is merged of existing knowledge hierarchy in knowledge base,
Tissue is carried out to the knowledge element in the personal knowledge base and merges, update to existing knowledge base, includes but is not limited to know
Know duplicate removal, disambiguation, knowledge connection etc., and can be realized the continuous renewal of personal knowledge base by information management.Wherein
Personal knowledge base is stored on platform in a trusted manner.Herein credible is embodied in, and content is stored in platform with ciphertext form
On, even the manager of platform can not also decrypt to obtain ciphertext.Specific cipher mode, optional way first is that public key adds
Mode close, that private key is taken care of by user oneself.
Knowledge Sharing module 14 refers to and knowledge is credibly shared with to specific user (group), is a kind of side of knowledge dissemination
Formula.Its is credible to be embodied in, and content is transmitted in transmission process with ciphertext form, is not easy to be stolen by packet capturing;The object of sharing passes through
Access control technology carries out strict control, and can limit the permission of the read-write of other side, duplication, forwarding.The Knowledge Sharing
Including the partial knowledge in personal knowledge base to be shared to internal communication platform or internet open source platform to system, from
Internal communication platform is shared to internet open source platform, is shared with internal communication platform or internet from personal achievement library
Open source platform.Knowledge Sharing is the most important a kind of mode promoted knowledge flow.User can lead to during sharing
The access profile of permission control strict control content is crossed, and information is transmitted in transmission channel with ciphertext form.
Knowledge innovation module 15, knowledge innovation are the deep-processing process of knowledge, in conjunction with existing knowledge hierarchy, utilize personal intelligence
The new knowledge production of intelligent production, and gradually form personal achievement library.
Achievement submits module 16.The personal achievement of user, can be submitted to internal platform, further enrich internal system study
Resources bank.It is shared under the premise of protecting intellectual property, is learnt for other learners.
The system be it is believable, be embodied in the personal knowledge base, personal achievement library access privilege control by with
Family is managed;Data therein are credibly stored in system platform.
The trusted storage refers to that data in the database, pass through the public key of unsymmetrical key with encrypted test mode storage
It is encrypted, and private key only has user oneself that can decrypt, even if the manager of platform can not obtain the key of decryption.
It should be understood that
Algorithm and display be not inherently related to any certain computer, virtual bench or other equipment provided herein.
Various fexible units can also be used together with teachings based herein.As described above, it constructs required by this kind of device
Structure be obvious.In addition, the present invention is also not directed to any particular programming language.It should be understood that can use various
Programming language realizes summary of the invention described herein, and the description done above to language-specific is to disclose this hair
Bright preferred forms.
In the instructions provided here, numerous specific details are set forth.It is to be appreciated, however, that implementation of the invention
Example can be practiced without these specific details.In some instances, well known method, structure is not been shown in detail
And technology, so as not to obscure the understanding of this specification.
Similarly, it should be understood that in order to simplify the present invention and help to understand one or more of the various inventive aspects,
Above in the description of exemplary embodiment of the present invention, each feature of the invention is grouped together into single implementation sometimes
In example, figure or descriptions thereof.However, the disclosed method should not be interpreted as reflecting the following intention: i.e. required to protect
Shield the present invention claims features more more than feature expressly recited in each claim.More precisely, as following
Claims reflect as, inventive aspect is all features less than single embodiment disclosed above.Therefore,
Thus the claims for following specific embodiment are expressly incorporated in the specific embodiment, wherein each claim itself
All as a separate embodiment of the present invention.
Those skilled in the art will understand that can be carried out adaptively to the module in the equipment in embodiment
Change and they are arranged in one or more devices different from this embodiment.It can be the module or list in embodiment
Member or component are combined into a module or unit or component, and furthermore they can be divided into multiple submodule or subelement or
Sub-component.Other than such feature and/or at least some of process or unit exclude each other, it can use any
Combination is to all features disclosed in this specification (including adjoint claim, abstract and attached drawing) and so disclosed
All process or units of what method or apparatus are combined.Unless expressly stated otherwise, this specification is (including adjoint power
Benefit require, abstract and attached drawing) disclosed in each feature can carry out generation with an alternative feature that provides the same, equivalent, or similar purpose
It replaces.
In addition, it will be appreciated by those of skill in the art that although some embodiments described herein include other embodiments
In included certain features rather than other feature, but the combination of the feature of different embodiments mean it is of the invention
Within the scope of and form different embodiments.For example, in the following claims, embodiment claimed is appointed
Meaning one of can in any combination mode come using.
The software module that various component embodiments of the invention can be run on one or more processors is realized.This
Field it will be appreciated by the skilled person that microprocessor or digital signal processor (DSP) Lai Shixian can be used in practice
The some or all functions of some or all components in the creating device of virtual machine according to an embodiment of the present invention.This hair
The bright some or all device or device program (examples being also implemented as executing method as described herein
Such as, computer program and computer program product).It is such to realize that program of the invention can store in computer-readable medium
On, or may be in the form of one or more signals.Such signal can be downloaded from an internet website to obtain, or
Person is provided on the carrier signal, or is provided in any other form.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and ability
Field technique personnel can be designed alternative embodiment without departing from the scope of the appended claims.In the claims,
Any reference symbol between parentheses should not be configured to limitations on claims.Word "comprising" does not exclude the presence of not
Element or step listed in the claims.Word "a" or "an" located in front of the element does not exclude the presence of multiple such
Element.The present invention can be by means of including the hardware of several different elements and being come by means of properly programmed computer real
It is existing.In the unit claims listing several devices, several in these devices can be through the same hardware branch
To embody.The use of word first, second, and third does not indicate any sequence.These words can be explained and be run after fame
Claim.
The foregoing is only a preferred embodiment of the present invention, but scope of protection of the present invention is not limited thereto,
In the technical scope disclosed by the present invention, any changes or substitutions that can be easily thought of by anyone skilled in the art,
It should be covered by the protection scope of the present invention.Therefore, protection scope of the present invention should be with the protection model of the claim
Subject to enclosing.
Claims (10)
1. a kind of believable Knowledge Ecosystem characterized by comprising
The automatic collection module of education resource acquires the learning materials of specific subject from internet open source on demand, is counted
According to cleaning, data regularization, structuring or semi-structured data are credibly stored in internal learning resources bank;
Resources learning module, resource carry out self study and form personal knowledge base, and wherein personal knowledge base stores in a trusted manner
In on platform;
Knowledge management module carries out tissue to the knowledge element in the personal knowledge base and merges, updates to existing knowledge
Library;
Knowledge is credibly shared with specific user by Knowledge Sharing module;
Knowledge innovation module produces personal achievement in conjunction with existing knowledge hierarchy, and forms personal achievement library;
Achievement submits module, and the personal achievement is submitted on platform, is learnt for other learners.
2. system according to claim 1, which is characterized in that
The carrier format of the resources learning module object includes: video, audio, document, and/or webpage;
To in the personal knowledge base knowledge element and existing knowledge hierarchy merge, comprising: knowledge duplicate removal, eliminate discrimination
Justice, and/or knowledge connection.
3. system according to claim 2, which is characterized in that
The method of the information management are as follows: the system is embedded in plug-in unit method of calling using mind map tool, knowledge is carried out
Management.
4. system according to claim 1, which is characterized in that
The Knowledge Sharing include: by personal knowledge base partial knowledge share to the system internal communication platform or
Internet open source platform is shared from internal communication platform to internet open source platform, from the personal achievement library point
It enjoys to internal communication platform or internet open source platform.
5. system according to claim 4, which is characterized in that
User can control the access profile of strict control content by permission during sharing, and information is with ciphertext form
It is transmitted in transmission channel.
6. system according to claim 1, which is characterized in that
The method of the acquisition learning materials is semantic-based Theme Crawler of Content or increment crawler algorithm.
7. system according to claim 6, which is characterized in that
The Theme Crawler of Content method includes the following steps:
(1), using Dewey Decimal Classification, the stage is extracted in web page characteristics, rapidly finds out web page text and Anchor Text keyword
Keyword similar in theme;
(2), theme candidate link feature text is extracted;
(3), classified using Naive Bayes Classifier to candidate link theme edge text, it is related to obtain theme
Webpage;If text belongs to specific subject, corresponding candidate link is using weight of classifying as priority value, with priority
Size order insertion creep queue, crawler preferentially accesses the big link of classification value and loses if text is not belonging to specific subject
Abandon candidate link;
(4), its corresponding technorati authority and centrad, comprehensive anchor are calculated with HITS algorithm to the Web link information of related web page
Information, reversed webpage, the brother's link of backward chaining, URL link nearby of text, Anchor Text, prejudges webpage and theme to be crawled
The degree of correlation.
8. system according to claim 7, which is characterized in that
The extraction theme candidate link feature text includes the following steps:
(1) word segmentation processing is carried out to the Anchor Text of webpage and text, removes stop words, obtains keyword;
(2) the Du Wei class number of keyword is searched;
(3) theme candidate link feature text is extracted with the characteristic of Dewey decimal classification and combination two-dimensional coordinate;It checks on
The length of keyword class number is as X-axis, and keyword classification number is as Y-axis, by the corresponding Du Weishi of keyword into classification number
Code draws corresponding point in two-dimensional coordinate;
(4) the corresponding keyword of key point in two-dimensional coordinate around Anchor Text key point and Anchor Text is extracted as theme time
Select chain feature text.
9. system according to claim 1, which is characterized in that
The system be it is believable, be embodied in the personal knowledge base, personal achievement library access privilege control by user into
Row management;Data therein are credibly stored in system platform.
10. system according to claim 9, which is characterized in that the trusted storage refers to that data are deposited with encrypted test mode
Storage in the database, is encrypted by the public key of unsymmetrical key, and private key only has user oneself to possess, even if the pipe of platform
Reason person can not obtain.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811207431.XA CN109582858A (en) | 2018-10-17 | 2018-10-17 | A kind of believable Knowledge Ecosystem |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811207431.XA CN109582858A (en) | 2018-10-17 | 2018-10-17 | A kind of believable Knowledge Ecosystem |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109582858A true CN109582858A (en) | 2019-04-05 |
Family
ID=65920559
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811207431.XA Pending CN109582858A (en) | 2018-10-17 | 2018-10-17 | A kind of believable Knowledge Ecosystem |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109582858A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113342966A (en) * | 2021-07-08 | 2021-09-03 | 北京明略昭辉科技有限公司 | Method, system, equipment and storage medium for editing online document based on knowledge base |
CN113407805A (en) * | 2021-07-16 | 2021-09-17 | 山东北斗科技信息咨询有限公司 | Big data based policy acquisition, cleaning and automatic accurate pushing method |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102521337A (en) * | 2011-12-08 | 2012-06-27 | 华中科技大学 | Academic community system based on massive knowledge network |
WO2015126957A1 (en) * | 2014-02-19 | 2015-08-27 | Snowflake Computing Inc. | Resource management systems and methods |
-
2018
- 2018-10-17 CN CN201811207431.XA patent/CN109582858A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102521337A (en) * | 2011-12-08 | 2012-06-27 | 华中科技大学 | Academic community system based on massive knowledge network |
WO2015126957A1 (en) * | 2014-02-19 | 2015-08-27 | Snowflake Computing Inc. | Resource management systems and methods |
Non-Patent Citations (1)
Title |
---|
中国通信学会学术工作委员会: "《第九届中国通信学会学术年会论文集》", 31 December 2012, 北京邮电大学出版社 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113342966A (en) * | 2021-07-08 | 2021-09-03 | 北京明略昭辉科技有限公司 | Method, system, equipment and storage medium for editing online document based on knowledge base |
CN113407805A (en) * | 2021-07-16 | 2021-09-17 | 山东北斗科技信息咨询有限公司 | Big data based policy acquisition, cleaning and automatic accurate pushing method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU2018361246B2 (en) | Data protection via aggregation-based obfuscation | |
Gupta et al. | Advances in security and privacy of multimedia big data in mobile and cloud computing | |
JP6814017B2 (en) | Computer implementation systems and methods that automatically identify attributes for anonymization | |
CN106250769B (en) | A kind of the source code data detection method and device of multistage filtering | |
Yan et al. | Rolling colors: Adversarial laser exploits against traffic light recognition | |
CN107409040A (en) | For code analysis tool of the recommending data encryption without influenceing Program Semantics | |
Layton et al. | Automating open source intelligence: algorithms for OSINT | |
Sharma et al. | A review study on the privacy preserving data mining techniques and approaches | |
CN107408115A (en) | web site access control | |
Schlögl et al. | eNNclave: Offline inference with model confidentiality | |
Wu et al. | TrackerDetector: A system to detect third-party trackers through machine learning | |
CN109582858A (en) | A kind of believable Knowledge Ecosystem | |
Karger et al. | Blockchain for AI Data-State of the Art and Open Research. | |
Ramsay | The General Data ProtectionRegulation vs. The Blockchain: A legal study on the compatibility between blockchain technology and the GDPR | |
Pan et al. | TrajGuard: a comprehensive trajectory copyright protection scheme | |
Sumathi et al. | Generic cost optimized and secured sensitive attribute storage model for template based text document on cloud | |
Ismaila et al. | An intelligent crypto-locker ransomware detection technique using support vector machine classification and grey wolf optimization algorithms | |
Reichert et al. | Menhir: an oblivious database with protection against access and volume pattern leakage | |
Koley | 6 Big data security issues with challenges and solutions | |
Jain et al. | Privacy-preserving record linkage with block-chains | |
Goyal et al. | Preventing inadvertent information disclosures via automatic security policies | |
Vinothkumar et al. | A Study on Privacy Preserving Methodologies in Big Data | |
AGNIHOTRI et al. | NAAS: AN AI-BASED AMALGAMATED APPROACH FOR SECURING E-COMMERCE TRANSACTIONS | |
Li et al. | Data Privacy Enhancing in the IoT User/Device Behavior Analytics | |
Xiang et al. | Privacy vs. Utility: An Enhanced K-coRated |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190405 |