Journal Information
Sponsor: China Society for Defense Science and Technology Information
                Institute No. 210,CNGC
International serial number: ISSN 1000-7490
Domestic serial number: CN 11-1762/G3
Mailing address: Box 10, Box 2413, Haidian District, Beijing
Postal code: 100089
Email: itapress@163.com/1587682149@qq.com
Tel: 010-68961793/68963306
WeChat public account: qbllysj
2024 Volume 47 Issue 4 
Published: 30 April 2024
  
  • Select all
    |
  • Abstract ( ) Download PDF ( )   Knowledge map   Save
    [Purpose/significance] With the application and expansion of digital intelligence technology,user oriented intelligent interaction,multimodal information fusion,and the extension of digital space activities have put forward new requirements for the organization of digital information resources,description of interactive cognition,and the development of deep level servicesHow to effectively address the deepseated development issues of information interaction and services in the context of digital intelligence has become an urgent issue to be explored[Method/process] On the basis of analyzing the formation of digital intelligent environment and its impact on information interaction and services,this article studies user oriented intelligent interaction and experience design,as well as the development and security guarantee of generative artificial intelligence based on intelligent interaction[Result/conclusion] In the user oriented information service organizations,we should focus on the formation and impact of digital intelligent environments,and seek service organization models that are suitable for intelligent environments and service organization methods driven by digital intelligenceUser centered intelligent interaction in digital services aims to fully understand user intentions,integrate user visual,auditory and other interaction channels,and provide support for the development of intelligent servicesAt the same time,in response to the rapid development of generative artificial intelligence,it is necessary to not only deal with the security threats brought by generative AI,but also to ensure the safe implementation of generative AI and ensure the security of generative AI systems in a correct and reasonable manner
  • Abstract ( ) Download PDF ( )   Knowledge map   Save
    [Purpose/significance] A technology tree is a treelike diagram used to represent the upper and lower relationships between product components and technological functions in a specific fieldIt is widely used in process of technical planning and decision-making-Building a technology tree based on massive scientific and technological information resources is of great significance in the era of big data[Method/process] The article proposes a largescale deep technology tree construction methodThis method is driven by the idea of humanmachine collaboration and multiround iterations,and is designed to mine hierarchical relationships so as to construct a technology tree based on the SubjectActionObject(SAO) structure for product components in specific domain[Result/conclusion] The largescale deep technology tree construction experiment conducted in the field of “graphics processing unit” technology domain has validated the effectiveness of this approach
  • Abstract ( ) Download PDF ( )   Knowledge map   Save
    [Purpose/significance] The systemic risks induced by the combination of new technological products represented by artificial intelligence generated content (AIGC) in the digital intelligence environment and technological issues and information fog in the gaming environment have intensified the impact of information fog on information workHow to effectively deal with information fog has become an urgent issue to be explored[Method/process] This study summarizes the characteristics of information fog,constructs a working model of information exploitation,analyzes the significance of information exploitation for information fog,and explores information exploitation tools to deal with information fog[Result/conclusion] The study believes that information exploitation is presented in a form that promotes information awarenessThrough the exploitation of information facts and imitations,information fog can be suppressed and screened,thereby reducing the uncertainty that misleads decisionmaking
  • Abstract ( ) Download PDF ( )   Knowledge map   Save
    [Purpose/significance] The effect of “data explosion” and truth indistinction becomes serious due to the “5V” features of big dataAs demand of wide knowledge inspiration and solutionoriented of science and technology intelligence has been increased during the process of science and technology project system engineering construction,the systematic intelligence featured with flexible and professional cluster construction becomes the basis and backbone of empowering science and technology project system engineering construction process[Method/process] Aiming at the science and technology project system engineering construction “V” model,and focusing on the issue of inspiration traction and case traction,a twostep method of building the intelligence center based on professional expert definition and the intelligence network based on algorithm are proposedAnd then the intelligence knowledge cluster suitable for system engineering construction process is practicedCombined with AI trend,the systematic intelligence knowledge fusion center based on LLM is planned[Result/conclusion] Through engineering practice,the effectiveness of algorithm is verified,and the intelligence knowledge clusters of various fields based on twostep method are constructed quickly in platformThe power of revealing power,and the solution capability of intelligence knowledge focusing on science and technology project development are exhibitedThe importance of science and technology intelligence is proved in supporting systematic system engineering construction from macroscopic aspects,providing solution concepts from system engineering aspects
  • Abstract ( ) Download PDF ( )   Knowledge map   Save
    [Purpose/significance] As one of the core parts of information service,it is a great challenge to use intelligent means to conduct information awareness effectively in the era of big data,and provide clues and “proper information” of relationship decisionmaking for information requesters[Method/process] Based on the idea of information awareness,with the help of natural language processing (NLP) technology and expert experience,this paper designs and practices a complete set of national defense material domain knowledge graph construction model oriented to information awareness,and develops the application capabilities of domain knowledge awareness,semantic intelligent retrieval,visual awareness and information clues tracing[Result/conclusion] It provides multidimensional intelligent information awareness service for scientific researchers,and has made some achievements
  • Abstract ( ) Download PDF ( )   Knowledge map   Save
    [Purpose/significance] Under the risk of global geopolitical conflicts,building an autonomous and controllable defense technology intelligence intelligent perception system plays a significant role in supporting strategic decisionmaking for national security and military constructionThe construction of a defense technology intelligence intelligent perception system that integrates large language models can improve intelligence acquisition efficiency and intelligent analysis capabilities[Method/process] The system can quickly identify technical intelligence and expert intelligence by automatically collecting and classifying updatesThe study has built huge knowledge bases and information models,integrating large language models to intelligently explore innovative points and cuttingedge technologies[Result/conclusion] The system generally achieves functions such as timely monitoring of important intelligence clues based on tasks,deep mining supporting evidence and evidence chains of credible intelligence,and intelligent perception of the key field technical contentIt can provide reference for improving the quality and efficiency of national defense science and technology intelligence work in the era of artificial intelligence
  • Abstract ( ) Download PDF ( )   Knowledge map   Save
    [Purpose/significance] Exploring the influencing factors of government data misuse behavior and its mechanism of action will help give full play to the value of government data and provide a reference basis for accelerating the construction of “Digital China”[Method/process] Using metaanalysis,we analyzed empirical research papers related to government data misuse behavior,extracted influence factors,analyzed influence effects,identified conditional variables,and explored the grouping path of each influence factor based on typical cases using fsQCA[Result/conclusion] Forming eight pathways of influence between the nine influences on government data misuse behavior,presenting three types of combined utility,respectively,“multifactor composite driven” “technologydriven” “internal and external dualsupport type”The effects are:the occurrence of government data misuse is not necessarily linked to the core conditions;the level of technological development plays an important role in the mechanism of government data misuse;and the complexity of external social influences and the multifaceted nature of internal data quality lead to different mechanisms of action between multiple factors
  • Abstract ( ) Download PDF ( )   Knowledge map   Save
    [Purpose/significance] Analysis of the evolution from Open Government Data to Open Public Data is beneficial for the healthy development of Open Data activities and the circulation of data elements[Method/process] On the basis of differentiating the relationship between Open Government Data and Open Public Data,this paper analyzes the three representations and evolving dynamics from the perspective of innovation diffusion theory[Result/conclusion] This paper summarizes nine key driving factors under three dimensions of technology,organization and environment,and also analyzes the six future trends of evolution
  • Abstract ( ) Download PDF ( )   Knowledge map   Save
    [Purpose/significance] The renaming of the firstclass discipline of “library,information,and archives management” to “information resources management” (IRM) in 2022 is a milestone of discipline construction and professional educationAt present,there is still some confusion in the understanding of the IRM disciplineThis article systematically and comprehensively reviews the tortuous process of the Chinese IRM discipline construction[Method/process] An indepth analysis of disciplinary construction is conducted in the following aspects:the unique value of early information management reform in China,the maturity and establishment of IRM discipline after the new millennium,and the theoretical exploration and debates on renaming first level discipline to IRM[Result/conclusion] The early reform of IRM in China has unique historical and practical valueThe IRMoriented renaming of departments and majors has laid the foundation for establishing the IRM disciplineAfter entering the new millennium,IRM education and research institutionalization tends to matureHowever,the actual process of renaming the discipline is quite complicatedIt discusses the critical role of renaming firstclass disciplines in promoting disciplinary integration and expansion and comments on different controversial viewpointsIt is proposed to strengthen the research on IRM abstract laws to promote constructing an independent knowledge system for IRM in the new eraThe enlightenment of discipline reforming history and suggestions for future development are made
  • Abstract ( ) Download PDF ( )   Knowledge map   Save
    [Purpose/significance] In the context of the development of new humanities and crossdisciplinary,clarifying the crossdisciplinary influence and formation mechanism of the theoretical methods of library and information science(LIS) has important theoretical and practical significance for constructing the academic discourse system of information resource management discipline and effectively enhancing the academic status of information resource management in crossdisciplinary construction[Method/process] This paper selected 28 researchers from nonLIS fields for indepth and focus interviewsDrawing on the grounded theory research paradigm,the original interview data were encoded and analyzed,and a research model on the formation mechanism of crossdisciplinary influence of LIS theoretical methods was constructed[Result/conclusion] The research results show that the influence of LIS theory and methods on crossdisciplinary research can be divided into four dimensions:explicit influence,implicit influence,directed influence,and potential influenceIn addition,it was found that research subjects,disciplinary factors,social environment,and academic media are important factors that affect the crossdisciplinary influence of LIS theory and methodsOn this basis,it is proposed that the LIS field should be guided by national strategies,improve its theoretical and methodological system,expand academic exchanges,and continuously enhance its academic influence
  • Abstract ( ) Download PDF ( )   Knowledge map   Save
    [Purpose/significance] Data elements have become a crucial productive force for industrial development,and the healthy and rapid growth of industries in our country relies heavily on highquality data transactions and circulationConstructing an industrial data element circulation model based on data trust holds great significance in enhancing the secure and efficient flow of industrial data elements,promoting the establishment of an industrial data element market,and unlocking the value of data[Method/process] Based on literature research and comparative analysis,this paper combines the practical characteristics of industrial operationFirstly,it analyzes the driving forces behind the circulation of industrial data elements and clarifies the logic of these forcesThen,it proposes strategies to alleviate the barriers to the circulation of industrial data elements,utilizing the power of trustFinally,it constructs a model for the circulation of industrial data elements based on data trust,completing the reshaping of the model[Result/conclusion] This paper takes “logic of forcestrust alleviationmodel reshaping” as the main research thread,focusing on the industrial data elements in our countryIt systematically identifies the obstacles and driving forces behind the circulation of industrial data elementsWith data trust as the foundation,it constructs a model for the circulation of industrial data elements,aiming to achieve highquality circulation and maximize the value of industrial data elements in our country
  • Abstract ( ) Download PDF ( )   Knowledge map   Save
    [Purpose/significance] In academic evaluation,the scientificity and rationality of weight assignment are ignored[Method/process] This paper introduces the idea of quality diagnosis into academic evaluation,puts forward the concept of weight assignment quality diagnosis of academic evaluation,establishes a theoretical framework and evaluation index system,and conducts an indepth analysis of the mechanism of weight assignment on academic evaluation results[Result/conclusion] Firstly,the importance of weight diagnosis of academic evaluation must be fully understoodSecondly,a comprehensive and multistep weight assignment quality diagnosis system should be establishedThirdly,objective weighting methods are not dominant in weight diagnosisFourthly,the idea of weight assignment quality diagnosis can also be extended to all multiattribute academic evaluation
  • Abstract ( ) Download PDF ( )   Knowledge map   Save
    [Purpose/significance] The development of intelligent technologies has brought about unprecedented transformation in the field of knowledge servicesBy studying the theoretical logic,technical foundation,system framework and application prospect of embodied intelligence knowledge service,it can provide new theoretical reference and practical guidance for the knowledge service field[Method/process] Based on the theory of embodied cognition,this article deeply understands the presence,initiative and connectivity characteristics of embodied intelligent knowledge servicesThis article further analyzes the framework of embodied intelligence knowledge service constructed with metaverse,AIGC,digital intelligent human,and humanoid robots as the technical foundationsThe systematic framework covers the generation,processing,dissemination and feedback of knowledgeThis article also explores the applications of knowledge services with body intelligence in various service scenarios,such as education and training,public culture,cultural tourism,and healthcare[Result/conclusion] Through an analysis of the construction of the embodied intelligence knowledge service framework and its application landscape,this article contributes to the establishment of a more comprehensive and intelligent knowledge service network,meets users’ knowledge needs,enhances the efficiency of embodied knowledge services,and promotes the highquality development of embodied intelligence knowledge service
  • Abstract ( ) Download PDF ( )   Knowledge map   Save
    [Purpose/significance] From the perspective of the overall national security perspective,the evolution trajectory of national security intelligence work needs to be consistent with the expansion trend of national securityThe interaction between intelligence functions and the expansion of intelligence boundaries requires the introduction of new technologiesThe research on the empowering effect and associated risks of ChatGPTlike artificial intelligence in the process of expanding intelligence boundaries has practical significance for innovating the governance paradigm of national security intelligence work[Method/process] Sort out the underlying logic and application technology of ChatGPT operation through descriptive research,this study assesses the opportunities and challenges faced by future national security intelligence work under the intervention of ChatGPTlike artificial intelligence,and proposes targeted measures on how to achieve technical regulation in the intelligence field[Result/conclusion] ChatGPTlike artificial intelligence is a significant empowerment of national security intelligence work,but technical limitations may lead to risks in intelligence work such as falsification dilemmas,functional “dislocation”,and intensified competitionWe need to consider starting from the value concept,institutional construction,and technological implementation,adhering to the peopleoriented intelligence concept,and highlighting the subjectivity of human beingsGive full play to the “bottom line” role of the legal system and promote good governance through technologyPromote the application of technology in intelligence work and test technology through practice
  • Abstract ( ) Download PDF ( )   Knowledge map   Save
    [Purpose/significance] The precise layout of key core technologies of the industry is an important prerequisite for industrial innovation and development under the new development patternThis paper builds an intelligence support framework for precise layout of key core technologies in the industry,in order to further leverage the role of intelligence research as a booster for highquality industrial development[Method/process] The framework integrates multisource information data,utilizes various intelligence methods such as text mining,social network analysis,deep learning,and knowledge graph to systematically identify and deconstruct key core technologies in the industry,deeply analyzes the advantages and weaknesses,and formulates precise layout strategies for it[Result/conclusion] This framework integrates identification,deconstruction,diagnosis,and layout,effectively improving the efficiency of intelligence analysis,and providing a replicable and referenceable general method process for the precise layout of key core technologies in the industry[Limitations] It is necessary to combine more application scenarios for practice and improvement,and further optimization are needed in improving semantic mining accuracy,panoramic visualization design,and dynamic diagnosis of layout status

  • Abstract ( ) Download PDF ( )   Knowledge map   Save
    [Purpose/significance] The types of false crisis information are complex,the interests are widely involved,and the dissemination motivation is relatively scattered and hiddenIt is necessary to conduct research on subject identification and motivation narrative from a traceability perspective[Method/process] On the basis of determining the five recognition elements of text emotion value,entity number,temporal rate,clustering cluster,and overlap,a deep implicit semantic understanding,false crisis information discrimination,associated subject locking,and subject confirmation process is designed to achieve the recognition function of false crisis information dissemination subjects,and the features are exposed through portraitsOn the other hand,based on the rational graph,a motivational narrative model is constructed based on the understanding of intentionDevelop an adaptive visual operation interface by combining the two methods to improve application efficiency[Result/conclusion] Taking the “5·23 Qatar Position Statement” event as an example,empirical research shows that this method can identify five types of communication subjects:inciting,shaping,transforming,investigating,and suppressingThe motivations are focused on resonating with the value of opinions,promoting one's own strength,breaking down information barriers,and infiltrating official operationsMethod comparison experiments have shown that text design has better performance compared to other methodsHowever,there is still room for optimization,such as the exposure of subject features and the granularity of motivational narrative,which needs to be improvedFurther research can be conducted in the future
  • Abstract ( ) Download PDF ( )   Knowledge map   Save
    [Purpose/significance] In the face of diversified expression of public demands,dispersed content,and complex governance in public emergencies,it is necessary to improve the accuracy and efficiency of government response to public opinion[Method/process] By integrating the LDA model and fsQCA method,this study establishes a research framework of “data foundation layer → theme portrait layer → pattern attribution layer”This study achieves the characterization of public demand theme portraits for public emergencies through visual presentation of theme clustering and theme weight assignmentBased on attribution theory,this study takes the event subject,event harm,event details,victims,rescue response,media coverage,and emergency response as conditional variables,and the event influence as outcome variableThis study reveals the configuration path and internal mode of public demands in public emergencies[Result/conclusion] This study found that low incident details is a necessary condition for the occurrence of high public demandsThis study obtained 4 configuration paths for high public demands and 6 configuration paths for low public demandsThis study summarizes two types of attribution models for high public demands (internal dominant model and external assistance model) and two types of attribution models for low public demands (event resolution model and media mitigation model).

  • Abstract ( ) Download PDF ( )   Knowledge map   Save
    [Purpose/significance] Emergency intelligence is the intelligent accumulation and key element of emergency management,and it is of great practical significance to standardize and govern its collection,storage,sharing,analysis,and tracing processesBlockchain technology and endside cloud architecture provide new research perspectives and technical support for emergency intelligence governance,which can solve problems such as signal recognition difficulties,delayed intelligence sharing,and hindrance in post event traceability in emergency intelligence governance[Method/process] This paper combines with the characteristics of technologydriven,organizational change,environmental optimization and data deconstruction of emergency information governance,and analyzes the elements of emergency intelligence governance based on the TOE framework,integrates the endside cloud architecture of blockchain technological convergence to build an emergency intelligence governance system framework,establishes a governance operation mode of collaboration and interaction between alliance chain,private chain,edge cloud and cloud,and elaborates on the six stages of emergency intelligence governance,namely,intelligence collection and storage,intelligence processing and early warning,intelligence sharing,intelligence service,intelligence evaluation,and intelligence traceability[Result/conclusion] This article applies the smart contract and consensus mechanism of blockchain technology,as well as the location and computing advantages of endside cloud architecture,to ensure the security of intelligence storage,emergency response speed,intelligence service efficiency,and intelligence sharing rate in the process of emergency intelligence governance,and improve the efficiency of emergency intelligence governance
  • Abstract ( ) Download PDF ( )   Knowledge map   Save
    [Purpose/significance]The evaluation of academic influence is an important research content in the field of scientometricsIt is of great significance in exploring the trend of interdisciplinary knowledge fusion and evaluating the influence of researchersHowever,there are many defects in the current influence measurement methods,such as the single carrier of paper citations and the oneway communicationMeanwhile,they do not take into account the degree of interdisciplinary of scholars[Method/process]This paper proposes an integrating paper citations and scholar information method (IPCSI),which combines citations dissemination and scholar information dissemination by extracting scholar domain information characteristicsSpecifically,first of all,a crossdomain crossover matrix is constructed based on quantifying the interdisciplinary crossover of the ttime node literatureAfterwards,the t+1 time citation factor vector is calculated,where the citation propagation of the cited literature to the node literature is taken as the influence linkageBased on this,the backward citation propagation of academic influence can be realized by using the graph ranking algorithmSecondly,the linkage of scholar’ influence,which takes scholars themselves as the communication carrier,is added to the citation network from the perspective of domain correlation of the coauthor shipOn this condition,the scholar factor vector at t-1 time is calculated to simulate the forward information propagation of academic influenceFinally,the process of preorder and postorder propagation of academic influence is reproduced objectively by modeling both citation propagation and scholar information propagationIn addition,the harmonic measurement method to allocate academic contribution has reached the goal of completing the quantitative analysis of scholar influence dissemination[Result/conclusion] The validity and feasibility of IPCSI is verified on real data setsThe experimental results show that by combining the granularity of paper citations and the granularity of scholar information,the propagation paths of academic influence in crossfields can be enriched and the accuracy of academic influence evaluation can be improved
  • Abstract ( ) Download PDF ( )   Knowledge map   Save
    [Purpose/significance] Identifying the research fronts of interdisciplinary projects and predicting their development trends will help to understand the internal structure of disciplines,explore the key deployment directions,and provide references for future innovative and breakthrough researches[Method/process] Based on the data of NSF projects and its output papers,this study firstly measures the interdisciplinarity of the project from three dimensions and selects interdisciplinary projectsSecondly,the research front identification indicators are constructed according to topic attention,topic creativity,etc,and the topics that meet the threshold are the interdisciplinary front topicsThirdly,comparing the fitting effect of the time series analysis models such as auto regression integreate moving average (ARIMA) and long shortterm memory networks (LSTM),the least error model is selected for trend predictionFinally,taking the field of biological sciences as an example to demonstrate the effectiveness and feasibility of the method[Result/conclusion] In the field of biological sciences,there are good prospects in nanobiological technology,global change and marine environmental biology,bioinformatics,chytridiomycosis and amphibian biodiversityThrough expert consultation and comparative analysis of existing researches,this method can effectively identify the front topics of interdisciplinary researches,and provide some references for its future research trends
  • Abstract ( ) Download PDF ( )   Knowledge map   Save
    [Purpose/significance] With the acceleration and deepening of the process of scientific and technological innovation,the knowledge demands of researchers gradually show the characteristics of depth and ambiguity,and their knowledge search is mostly an exploratory search processResearch on the types and characteristics of researchers’ exploratory search tasks is conducive to revealing the characteristics of researchers’ information needs in a finegrained manner,providing theoretical basis for accurate knowledge services of scientific and technological information service platforms,thus promoting scientific and technological knowledge sharing and speeding up the process of scientific and technological innovation[Method/process] Taking the field of integrated circuits as an example,this paper collected data using the critical incident technique and online questionnaire survey methodContent analysis and coding were conducted based on the Multiple Information Seeking Episodes model,and data statistical analysis was performed using SPSS[Result/conclusion] Exploratory search in the field of integrated circuit includes two task types,learning type and research type,and 13 task subtypesAmong them,five task attributes,source,search frequency,level of domain knowledge,complexity of knowledge dimension and complexity of cognitive process dimensions,are significantly correlated with task subtypesMeanwhile,the cooccurrence results among task attributes reflect the most common combinations of task attributesThis paper provides some references for us to better understand the domain knowledge needs of researchers,carry out the followup research on researchers’ information search behavior and optimize the search system
  • Abstract ( ) Download PDF ( )   Knowledge map   Save
    [Purpose/significance] Constructing a finegrained user profile label through multisource data fusion strengthens and enhances the identification and precise recommendation of user profiles in service scenariosThis has significant reference value for understanding user needs,conducting targeted group marketing,and increasing user loyalty[Method/process] Integrating service scenarios,a framework for user profile identification and recommendation analysis based on multisource data fusion is constructedThe RFCLS label,which redefines user behavior using the user value model RFM,is developedThe LDA model is employed to extract textual semantic labels that represent users’ resource usage preferencesAfter converging multisource heterogeneous data such as user attributes,behaviors,and resource usage preferences into a user profile label system,the Random Forest model is selected for model training and performance assessment in user profile identification with different label combinations[Result/conclusion] Empirical research shows that compared to a single numeric or textual profile label system,the multisource data fusion user profile model enhances the accuracy of user profile identification and classificationThis effectively supports academic libraries in implementing more targeted marketing strategies and personalized service recommendations
  • Abstract ( ) Download PDF ( )   Knowledge map   Save
    [Purpose/significance] The rich internet big data provides a multidimensional perspective for insight into real events,and the rapid identification of emergencies and accurate judgment of the categories to which they belong can help governments and emergency management departments at all levels to manage emergency intelligence resources efficiently[Method/process] The study firstly constructs an emergency event identification and classification model based on TextImage Enhancement,and then constructs a MultiDNN model by TextCNN,VGG16 and DNNFinally,validates it with real natural disaster class data by example[Result/conclusion] Mutual enhancement through text and images,multimodal data fusion can improve the accuracy of emergency event recognition and classification,while still having good results in the task processing of small sample data,proving that data from different modalities can complement and corroborate each other,and their fusion analysis can provide more accurate and comprehensive information processing than single modality
  • Abstract ( ) Download PDF ( )   Knowledge map   Save
    [Purpose/significance] In the absence of auxiliary information,to better mine user preferences,this paper extracts highorder relational features from the interaction information between users and items and considers interaction relations at both global and local levels,proposing a deep learning recommendation model (HLRec) based on highorder and loworder interactions[Method/process] Two kinds of subgraphs,namely,hypergraph and bipartite graph,are constructed from the original interaction data,to explicitly model the highorder and loworder interactive relationships between users and itemsThe correlation matrix is used to represent the features of highorder interactions,and the heterogenous graph neural network is used to extract features from loworder interactionsThe features of highorder and loworder interaction are fused and the variational autoencoder (VAE) is used to learn the embeddings of users and itemsThe matching probability between users and items predicted by the model is used in Topk personalized recommendationsThe proposed model is verified on the popular MovieLens1M dataset[Result/conclusion] The experimental results show that the Recall,Precision,and NDCG of our model are improved by 4.18%,3.20%,and 3.41%,respectively,compared with the baseline model in the top-20 recommendation task
  • Abstract ( ) Download PDF ( )   Knowledge map   Save
    [Purpose/significance] The EU data intermediation system aims to facilitate business relationships with the purpose of data sharing between uncertain data rights holders and data consumers through technological,legal,or other meansIt holds valuable insights for unlocking the potential of data elements in our country and promoting the marketization of data elements[Method/process] Exploring the background and key innovations of the EU data intermediation system through legislative explanations and news reports on the EU’s Data Governance ActAnalyzing the regulatory framework of the Data Governance Act to understand the fundamental aspects of the data intermediation systemThrough case studies to analyze the basic forms of data intermediationBased on these findings,proposing a roadmap for enhancing and refining China’s data intermediation system[Result/conclusion] Borrowing from the experiences of the EU data intermediation system,it is suggested that the enhancement of China’s data intermediation system should focus on three main areas:exploring new forms of data intermediation services,strengthening trust in data intermediation service providers,and promoting the establishment of data interoperability standards