• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Wang Ying, Zuo Xianglin, Zuo Wanli, Wang Xin. Interface Integration of Deep Web Based on Ontology[J]. Journal of Computer Research and Development, 2012, 49(11): 2383-2394.
Citation: Wang Ying, Zuo Xianglin, Zuo Wanli, Wang Xin. Interface Integration of Deep Web Based on Ontology[J]. Journal of Computer Research and Development, 2012, 49(11): 2383-2394.

Interface Integration of Deep Web Based on Ontology

More Information
  • Published Date: November 14, 2012
  • A significant amount of information in Deep Web can only be accessed through the query interface of a back-end database, instead of traversing static URL links. In order to access domain-specific databases simultaneously, it is important to construct an integration interface which allows uniform access to disparate relevant sources. Therefore, a novel method of interface integration based on ontology technique is proposed in this paper. It mainly subsumes two aspects: schema matching and schema merging. Schema matching is used to accurately identify the semantic correspondences among the attributes from different interfaces by exploiting the “bridge” effect of ontology, which can match many schemas and find all mapping relationships at one time. Schema merging is used to merge the source query interfaces to construct a unified schema based on the identified mapping relationships after schema matching, which should encompass all unique attributes features and sequences over the given set of interfaces as much as possible. Through a detailed experimental evaluation, it is indicated that the approach of interface integration based on ontology not only reduce the complexity of schema matching instead of finding pairwise-attribute correspondence in isolation, but also greatly improve the integration accuracy of interfaces. Therefore, the ontology-assisted interface integration approach is feasible and effective.
  • Related Articles

    [1]Zhao Shengnan, Jiang Han, Wei Xiaochao, Ke Junming, Zhao Minghao. An Efficient Single Server-Aided k-out-of-n Oblivious Transfer Protocol[J]. Journal of Computer Research and Development, 2017, 54(10): 2215-2223. DOI: 10.7544/issn1000-1239.2017.20170463
    [2]Zhang Hongbin, Ji Donghong, Yin Lan, Ren Yafeng, Niu Zhengyu. Caption Generation from Product Image Based on Tag Refinement and Syntactic Tree[J]. Journal of Computer Research and Development, 2016, 53(11): 2542-2555. DOI: 10.7544/issn1000-1239.2016.20150906
    [3]Chen Tieming, Yang Yimin, Chen Bo. Maldetect: An Android Malware Detection System Based on Abstraction of Dalvik Instructions[J]. Journal of Computer Research and Development, 2016, 53(10): 2299-2306. DOI: 10.7544/issn1000-1239.2016.20160348
    [4]Liu Duo, Dai Yiqi. Construction of Transformation Matrix with a Given Period Modulo N[J]. Journal of Computer Research and Development, 2012, 49(5): 925-931.
    [5]Hu Kai, Wang Zhe, Jiang Shu, and Yin Baolin. A Performance Model of k-Ary n-Cube Under Communication Locality[J]. Journal of Computer Research and Development, 2011, 48(11): 2083-2093.
    [6]Sun Decai, Sun Xingming, Zhang Wei, and Liu Yuling. A Filter Algorithm for Approximate String Matching Based on Match-Region Features[J]. Journal of Computer Research and Development, 2010, 47(4): 663-670.
    [7]Chen Huahong, Luo Xiaonan, Ling Ruotian, Ma Jianping. A Mesh Simplification Algorithm Based on n-Edges-Mesh Collapse[J]. Journal of Computer Research and Development, 2008, 45(6).
    [8]Zhang Yuejie, Xu Zhiting, and Xue Xiangyang. Fusion of Multiple Features for Chinese Named Entity Recognition Based on Maximum Entropy Model[J]. Journal of Computer Research and Development, 2008, 45(6).
    [9]Xia Luning and Jing Jiwu. An Administrative Model for Role-Based Access Control Using Hierarchical Namespace[J]. Journal of Computer Research and Development, 2007, 44(12): 2020-2027.
    [10]Tang Huanling, Sun Jiantao, Lu Yuchang. A Weight Adjustment Technique with Feature Weight Function Named TEF-WA in Text Categorization[J]. Journal of Computer Research and Development, 2005, 42(1): 47-53.

Catalog

    Article views (854) PDF downloads (582) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return