원문정보
보안공학연구지원센터(IJSIA)
International Journal of Security and Its Applications
Vol.10 No.12
2016.12
pp.141-152
피인용수 : 0건 (자료제공 : 네이버학술정보)
초록
영어
Now the network has become the main source of the information where people gain from. However there are various network information, include healthy and helpful information, at the same time; also include the bad and useless information. How to protect the security and quickly and exactly find the user need from this vast information has become the hot research. This article use the improve vector space model to filter bad information and use the semantic web technology to build a computer ontology. Aim at this area to information retrieval, through this ontology to handle users’ input, thus to improve the recall level and the precision rate.
목차
Abstract
1. Introduction
2. Ontology Technology
2.1. Ontology
2.2. Ontology-building method
2.3. Second-order headings
3. Build Ontology and Improved Vector Space Model Information Filter System
3.1. Second-order headings
3.2. Second-order headings
3.3. Improved vector space model
3.4. Build badness information filtering system
4. System design and implementation
4.1. Information security audit system process design
4.2. Information audit and the key technology
5. Experiment and Simulation
6. Conclusion
References
1. Introduction
2. Ontology Technology
2.1. Ontology
2.2. Ontology-building method
2.3. Second-order headings
3. Build Ontology and Improved Vector Space Model Information Filter System
3.1. Second-order headings
3.2. Second-order headings
3.3. Improved vector space model
3.4. Build badness information filtering system
4. System design and implementation
4.1. Information security audit system process design
4.2. Information audit and the key technology
5. Experiment and Simulation
6. Conclusion
References
저자정보
참고문헌
자료제공 : 네이버학술정보