Your conditions: 周毅
  • Research on the Construction of Linked Data Model for Research Entity's Name Authority Data

    Subjects: Library Science,Information Science >> Information Science submitted time 2023-04-01 Cooperative journals: 《图书情报工作》

    Abstract: [Purpose/significance] The purpose of this paper is to study the linked data model of publishing the NSTL’s research entity name authority data as linked data. After the name authority data is published as linked data, it can be reused as an open linked data set by other system or organization, and also can be better integrated with other linked data sets to improve data quality. In addition, it also provides a model building reference for other organizations to publish authority data as linked data. [Method/process] First, this paper analyzed and compared the data models used in the linked data publishing projects at home and abroad. It showed that the data models in the linked data publishing projects were mainly divided into two categories. Then, combined with the characteristics of NSTL name authority data, two forms of linked data models were designed. It compared the two models from the expression level of the NSTL’s data and the complexity of the models. The better one was selected. Finally, it used D2RQ as tool to publish the sample data as linked data. [Result/conclusion] The analysis found that the model with Schema.org as the core standard vocabulary has better performance. So it is more suitable as a linked data model for NSTL’s name authority data.

  • Ontology Model Construction of Question-Answering Knowledge Graph Integrating Multi-Level Data

    Subjects: Library Science,Information Science >> Information Science submitted time 2023-04-01 Cooperative journals: 《图书情报工作》

    Abstract: [Purpose/significance] Aiming at problems of intelligent Q&A based on Q&A pairs such as low accuracy and resolution rate and poor user satisfaction, this paper constructs a knowledge graph (KG) ontology model that supports the realization of dynamic and accurate intelligent Q&A based on the knowledge graph. [Method/process] First, the paper analyzed the current problems and causes of intelligent question answering, and proposed a plan to build a knowledge graph to support intelligent question answering. Second, On the basis of existing ontology model construction methods, the paper proposed a multi-round loop method integrating multi-level data, which used the business data provided by the enterprises, user data and business system dynamic data as the data sources. And the core steps were to build a basic framework, improve the knowledge structure, and align three cycles of the knowledge structure. Finally, this paper took the domain of return and exchange as a case to describe the concrete steps of ontology model construction, from zero, added incrementally, and constructed ontology model of knowledge graph. [Result/conclusion] This paper applies the knowledge graph with the return ontology model as the schema layer in an intelligent Q&A system for testing. The evaluation results show that the accuracy rate increased by 50% and the precision rate increased by 300% after the return and exchange knowledge graph is online. So, the proposed ontology model construction method sorts out the complete and fine-grained domain knowledge structure from scattered domain knowledge, can provide accurate answers to users in intelligent Q&A, and can effectively solve the intelligent Q&A dilemma based on Q&A pairs.

  • Research on the Theoretical Framework and Realization Strategy of the Holistic Intelligent Governance for the Ecological Security Risk of Network Information Content

    Subjects: Library Science,Information Science >> Information Science submitted time 2023-04-01 Cooperative journals: 《图书情报工作》

    Abstract: [Purpose/significance] The ecological security risk of network information content is a new type of information ecological security problem, which affects and threatens the overall national security from multiple dimensions. [Method/process] Based on the theory of holistic governance, intelligent governance and technological intermediation, this paper put forward the concepts, logical relations and basic contents of the theoretical framework construction of holistic intelligent governance of network information content ecological security risk, and specifically explained the significance of the theoretical framework construction of holistic intelligent governance. [Result/conclusion] The paper signifies the theoretical framework construction of holistic intelligent governance of network information content ecological security risk is an organic fusion of integrity and intelligent governance with information technology as the intermediary. In order to specifically promote its organization and implementation, the implementation path can be selected from the construction of an institutionalized mechanism guarantee system and the implementation of an intelligent technical support system.

  • Users' Personal Information Security Risk and Governance on Network Information Service Platforms:Content Analysis Based on 117 App Privacy Policy Texts

    Subjects: Library Science,Information Science >> Information Science submitted time 2023-04-01 Cooperative journals: 《图书情报工作》

    Abstract: [Purpose/significance] Network information service platforms provide great convenience for citizens’ life, however, the problem of users’ personal information security risk is increasingly serious, thus identifying and preventing risks are vital to enhance the governance capacity of network space and promote modernization of the governance system in cyberspace. [Method/process] Through cluster analysis on privacy policies of 117 sample Apps, this paper found out potential risk types of users’ personal information security. [Result/conclusion] This paper illustrates that the ecological environment of network space consists of the small ecology of the third party in the process of network information service, the internal ecology of network information service platforms, and the external ecology of network information service platform industry groups. According to that, this paper puts forward effective paths of personal information security risk governance form aspects of specifying platform privacy policies, regulating internal control mechanism of platforms and the interaction mechanism with the third parties, as well as playing the main role of government governance.

  • Governance Action and Its Transformation of Ecological Security Risks of Network Information Contents

    Subjects: Library Science,Information Science >> Information Science submitted time 2023-04-01 Cooperative journals: 《图书情报工作》

    Abstract: [Purpose/significance] Summarizing and reflecting on the current status and deficiencies of the ecological security risk governance actions of network information contents is to improve the effectiveness of future governance actions. [Method/process] The article investigated and sorted out the characteristics of the four major governance actions, "periodical theme-based special actions", "fixed-point targeted special actions", "big content service platform targeted actions" and "emergency-related special actions" for the ecological security risk governance of network information contents, benchmarked the Regulations on the Ecological Governance of Network Information Contents, and analyzed the deficiencies of existing governance actions in five aspects of governance objectives, governance participants, governance objects, processes and methods of governance and governance tools. [Result/conclusion] The article finally puts forward the logic of network information content ecological security risk governance actions based on "PDCA-5 dimensional elements" framework. In addition, the article also proposes the upgrading and combination strategies of four types of actions: rights-based sports governance actions, normalized participatory governance actions, constructive active governance actions and perception-based smart governance actions.

  • Characteristics, Evolution and Deconstruction of Scene Elements on Security Risks of Network Information Contents

    Subjects: Library Science,Information Science >> Information Science submitted time 2023-04-01 Cooperative journals: 《图书情报工作》

    Abstract: [Purpose/significance] Network information content governance has become an important part of national strategy and an important measure to build a cyber power. Identifying and deconstructing the risks of network information content security is an effective way to diagnose the key and difficult points of network information content governance. [Method/process] Combining literature investigation with the Regulations on Ecological Governance of Network Information Contents, this paper conducted research and carried out feature analysis of network information content security risks; With content analysis method, this paper made a quantitative analysis of the network information content governance incidents published by Cyberspace Administration of China in the past seven years; With social network analysis method, this paper analyzed the relationship between the elements related to the risks of network information content security in governance, and deconstructed scene elements. [Result/conclusion] This paper divides the risks of network information content security into 9 types, and analyzes the connotations and characterizations of each risk. The evolution trend of the risk is related to the development of network new media technology, unexpected public safety incidents and the changes of policies and regulations related to network governance. There are differences among the scene elements of different types of risk, such as the significantly low participation of information service platforms, and little attention to the network ideology risk or the cultural invasion risk. In terms of governance objects, this paper proposes that it is necessary to further subdivide the characteristics of network information content security risks, especially in establishing the risk assessment system of network information content security. In terms of governance subjects, the key point is clarifying the main responsibility of network information service platforms. In terms of fundamental governance principles, we need to focus on the network information content governance in the view of a holistic approach to national security.

  • Research on Connotation, Types, Causes and Impacts of Online Information Content Ecosystem Security Risks

    Subjects: Library Science,Information Science >> Information Science submitted time 2023-04-01 Cooperative journals: 《图书情报工作》

    Abstract: [Purpose/significance] The conceptual definition, type division, and analysis of the causes of typical risks and the impact relationship between risks of online information content ecosystem security risks are carried out, in order to provide an analysis basis for the research on ecological security governance of online information contents. [Method/process] Through a summary of the continuously derived online information content ecosystem security risks, combined with the online information security risk prevention, control and governance issues of national concern, the specific types of online information content ecological security risks were analyzed. From the overall perspective of online information ecosystem security risks, this paper analyzed the connotation and cause of the mainstream and typical types of risks, and summarized the overall characteristics of the ecological security risks of online information content. And from the perspective of the relationship between the ecological security risk of specific types of online information content and the overall risk, this paper comprehensively analyzed the possible impacts of the overall security risk. [Result/conclusion] Online information content ecosystem security risks are the core component of online information ecosystem security risks. Various types of online information content ecosystem security risks have different causes, but they overlap in characteristics and impacts. To ensure the security of the online information content ecology, it is necessary to specifically address the online information content ecosystem security risks of different types and comprehensively consider their overall risk impacts.

  • 模板引导下经会阴前列腺穿刺活检5379例回顾性分析

    Subjects: Medicine, Pharmacy >> Clinical Medicine submitted time 2019-11-15 Cooperative journals: 《协和医学杂志》

    Abstract:探讨模板引导下经会阴前列腺穿刺活检的准确性和安全性。 方法 回顾性分析我中心2004年11月至2018年1月共5379例前列腺穿刺活检患者临床资料。年龄14~89岁,平均68.1岁;血清tPSA 0.03~5000.00ng/ml,平均11.2ng/ml。所有患者均接受经直肠超声引导下经会阴模板定位下前列腺11区穿刺活检术,分析前列腺穿刺活检阳性率及并发症。 结果 每例每区活检1~4针,共11~44针,平均19针。前列腺癌总体活检阳性率39.9%,tPSA 0~4.0、4.1~10.0、10.1~20.0、20.1~100及>100ng/ml前列腺癌活检阳性率分别为16.6%(46/277)、25.2%(525/2057)、34.1%(573/1680)、65.9%(673/1022)及95.3%(327/343)。术后血尿42.1%,急性尿潴留2.2%,感染性休克1例,无死亡病例。 结论 经直肠超声引导下经会阴模板定位下前列腺穿刺活检准确且安全。

  • 基于DEM的月表典型撞击坑形态特征的指标 因子量化关系模拟

    Subjects: Astronomy >> Astrophysical processes submitted time 2019-04-08 Cooperative journals: 《天文研究与技术》

    Abstract:本文在激光测高方法获取的100m分辨率的全月DEM数据基础上,选取1407个不同形态的撞击坑,提取多视角刻画撞击坑形态的地形因子指标,并进行撞击坑形态特征分析;在此基础上,采用数理统计与地理建模的方法,重点探讨地形因子间的关联性,进一步构建基于多因子的量化模型,以解释地形因子信息与撞击坑形态发育的内在联系。结果表明,深径比(Y)与直径(X1)、体积(X2)、圆度(X3)、体态比(X4)以及坑壁坡度(X5)能较好地刻画撞击坑形态发育特征,通过多元线性回归拟合构建指标间的函数关系,且拟合模型在0.05置信水平下的显著性F=492.037>>F,拟合模型的的显著性极好, 为其模拟函数关系式,拟合优度达0.637。该模拟方法在月表撞击坑形态发育研究中有重要意义,是撞击坑形态特征的数字地形模拟与信息挖掘的一次有益实践。

  • 系统性红斑狼疮合并带状疱疹病毒感染的免疫抑制

    Subjects: Medicine, Pharmacy >> Preclinical Medicine submitted time 2017-12-21 Cooperative journals: 《南方医科大学学报》

    Abstract: Objective To explore the changes in cellular immune function and the safety of physical therapy in patients with systemic lupus erythematosus (SLE) complicated by herpes zoster (HZ) virus infection. Methods A retrospective analysis was conducted among 10 SLE pateints with HZ virus infection, with 30 SLE patients without HZ infection as the control group.The results of routine laboratory tests and T lymphocyte subset counts (before and during infection and after cure of infection) were compared between the two groups. Results The proportion of patients with significantly increased absolute neutrophil count and white blood cell count before HZ infection, and those with decreased lymphocyte percentage and elevated C-reactive protein during infection differed significantly between the two groups (P<0.05). Before HZ infection, the proportions of patients with increased CD3 + %, decreased CD16 + CD56 + %, abnormal 4/8 ratio (P<0.01) and those with increased CD8 + % and CD8 + count and decreased CD16 + CD56 + count differed significantly between the two groups (P<0.05). During HZ infection, the proportion of patients with increased CD3 + % and CD8 + % and decreased CD4+% and 4/8 ratio count (P<0.05) and those with decreased CD16 + CD56 + % and increased CD8 + count differed significantly between the two groups (P<0.01). After cure of HZ infection, the proportion of patients with decreased CD16 + CD56 + % was significantly different between the two groups (P<0.01). The treatment time of HZ infection averaged 5�.3 days with a cure rate of 100%; postherpetic neuralgia occurred in none of the patients after the treatment. Conclusion Patients with SLE complicated by HZ infection are in an immunosuppressive state, suggesting the need of monitoring T lymphocyte subsets in SLE treatment. The combined use of antiviral drugs and physical therapy can be safe and effective for treatment of SLE complicated by HZ infection.