{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T16:55:31Z","timestamp":1742921731842,"version":"3.40.3"},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319155531"},{"type":"electronic","value":"9783319155548"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-15554-8_60","type":"book-chapter","created":{"date-parts":[[2015,3,3]],"date-time":"2015-03-03T12:12:48Z","timestamp":1425384768000},"page":"708-716","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["The Research on Knowledge Push Based on the Feature Extraction of Microblog"],"prefix":"10.1007","author":[{"given":"Weidong","family":"Huang","sequence":"first","affiliation":[]},{"given":"Yafei","family":"Ouyang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,3,4]]},"reference":[{"issue":"32","key":"60_CR1","first-page":"135","volume":"47","author":"M Zhou","year":"2011","unstructured":"Zhou, M., Liao, Q.: Knowledge push based on attribute similarity. Computer Engineering and Applications 47(32), 135\u2013137 (2011)","journal-title":"Computer Engineering and Applications"},{"key":"60_CR2","doi-asserted-by":"crossref","unstructured":"Hamerly, G., Elkan, C.: Alternatives to the k-means algorithm that find better clusterings. In: CIKM, pp. 600\u2013607 (2002)","DOI":"10.1145\/584792.584890"},{"key":"60_CR3","unstructured":"Salton, G., McGill, M.J.: Introduction to modern information retrieval. McGraw-Hill (1986)"},{"issue":"9","key":"60_CR4","first-page":"173","volume":"19","author":"B Huiqiang","year":"2009","unstructured":"Huiqiang, B.: The Application of the principle components analysis in SPSS\u2014Taking the Herbage Community under Forest in the Riparian Zone of Wenyuhe River as the Example. Sci-tech Information Development & Economy 19(9), 173\u2013176 (2009)","journal-title":"Sci-tech Information Development & Economy"},{"issue":"5","key":"60_CR5","doi-asserted-by":"publisher","first-page":"856","DOI":"10.3724\/SP.J.1016.2011.00856","volume":"34","author":"C Huang","year":"2011","unstructured":"Huang, C., Yin, J., Hou, F.: A Text Similarity Measurement Combining Word Semantic Information with TF-IDF Method. Chinese Journal of Computers. 34(5), 856\u2013864 (2011)","journal-title":"Chinese Journal of Computers."},{"key":"60_CR6","unstructured":"Fan, M.: Non-negative matric factorization and clustering methods applied research in personalized recommendation system. East China Jiaotong University (2012)"},{"key":"60_CR7","unstructured":"Zhou, Z.: Algorithm and Framework of Recommender System combined with NMF. Beijing Jiaotong University (2013)"},{"issue":"3","key":"60_CR8","first-page":"1005","volume":"29","author":"F Peng","year":"2012","unstructured":"Peng, F., Xu, Q.: Personalized recommendation system for news based on user concern. Application Research of Computers 29(3), 1005\u20131007 (2012)","journal-title":"Application Research of Computers"},{"key":"60_CR9","unstructured":"Liu, L.: The research and application of knowledge push based on the similarity. Shandong Normal University, June 2013"},{"key":"60_CR10","unstructured":"Zou, D.: The research of Nonnegative matrix decomposition algorithm and its application in personalized recommendation system. Beijing University of Technology (2012)"},{"key":"60_CR11","doi-asserted-by":"crossref","unstructured":"Kim, JW.: Scan and click: The uses and gratifications of social recommendation systems. Computers in Human Behavior, 184\u2013191 (2014)","DOI":"10.1016\/j.chb.2014.01.028"}],"container-title":["Lecture Notes in Computer Science","Human Centered Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-15554-8_60","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,31]],"date-time":"2023-01-31T02:26:26Z","timestamp":1675131986000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-15554-8_60"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319155531","9783319155548"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-15554-8_60","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"4 March 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}