{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T16:31:24Z","timestamp":1742920284783,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":27,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819932993"},{"type":"electronic","value":"9789819933006"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-981-99-3300-6_17","type":"book-chapter","created":{"date-parts":[[2023,5,30]],"date-time":"2023-05-30T15:04:01Z","timestamp":1685459041000},"page":"234-247","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Research on Application of Knowledge Graph in War Archive Based on Big Data"],"prefix":"10.1007","author":[{"given":"Huang","family":"Yongqin","sequence":"first","affiliation":[]},{"given":"Chen","family":"Xushan","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Anlian","sequence":"additional","affiliation":[]},{"given":"Ping","family":"Shuo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,31]]},"reference":[{"key":"17_CR1","unstructured":"Shu, Z., Zhang, P., Li, X., et al.: Construction of Archival Knowledge Graph of Serious Social Incidents under the Context of Digital Memories. Zhejiang Archives (2021)"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Xu, C., Xu, J.: Provenance method of electronic archives based on knowledge graph in big data environment. Journal of Information Hiding and Privacy Protection (2021)","DOI":"10.32604\/jihpp.2021.019883"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"Wang, H., Miao, X., Pan, Y.: Design and implementation of personal health record systems based on knowledge graph. In: 2018 9th International Conference on Information Technology in Medicine and Education (ITME) IEEE Computer Society (2018)","DOI":"10.1109\/ITME.2018.00039"},{"key":"17_CR4","unstructured":"Yang, J., Qi, T.: From Electronic Records to Knowledge Graph: A New Approach of Knowledge Service Based on Electronic Records. Archives Science Bulletin (2020)"},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"Liao, F., Ma, L., Yang, D.: Research on construction method of knowledge graph of US military equipment based on BiLSTM model. In: 2019 International Conference on High Performance Big Data and Intelligent Systems (2019)","DOI":"10.1109\/HPBDIS.2019.8735478"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Zhao, Q., Huang, H., Ding, H.: Study on Military Regulations Knowledge Construction based on Knowledge Graph. In: 2021 7th International Conference on Big Data and Information Analytics (2021)","DOI":"10.1109\/BigDIA53151.2021.9619666"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Leskinen, P., Koho, M., Heino, E., Tamper, M., et al.: Modeling and Using an Actor Ontology of Second World War Military Units and Personnel. International Semantic Web Conference Springer (2017)","DOI":"10.1007\/978-3-319-68204-4_27"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Yoo, D., No, S., Ra, M.: A Practical Military Ontology Construction for the Intelligent Army Tactical Command Information System. INT J COMPUT COMMUN (2014)","DOI":"10.15837\/ijccc.2014.1.49"},{"key":"17_CR9","unstructured":"Chen, H., Xiang, Q., He, J.: Research on the aggregation and visualization of anti-japanese war archives resources oriented to knowledge service. Archives Science Study (2021)"},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"Robledano-Arillo, J., Navarro-Bonilla, D., Cerd\u00e1-D\u00edaz, J.: Application of linked open data to the coding and dissemination of spanish civil war photographic archives. Journal of Documentation ahead-of-print (2019)","DOI":"10.1108\/JD-06-2019-0112"},{"issue":"4","key":"17_CR11","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1007\/s00799-016-0186-2","volume":"18","author":"E M\u00e4kel\u00e4","year":"2016","unstructured":"M\u00e4kel\u00e4, E., T\u00f6rnroos, J., Lindquist, T., Hyv\u00f6nen, E.: WW1LOD: an application of CIDOC-CRM to World War 1 linked data. Int. J. Digit. Libr. 18(4), 333\u2013343 (2016). https:\/\/doi.org\/10.1007\/s00799-016-0186-2","journal-title":"Int. J. Digit. Libr."},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Koho, M., Ikkala, E., Leskinen, P., et al.: WarSampo knowledge graph: Finland in the Second World War as Linked Open Data. Semantic Web (2020)","DOI":"10.3233\/SW-200392"},{"key":"17_CR13","unstructured":"Xing, M., et al.: Research on the Construction and Application of Knowledge Graph in Military Domain. International Conference on AI and Big Data Application (2019)"},{"key":"17_CR14","unstructured":"CIDOC-CRM. https:\/\/cidoc-crm.org\/,2022-08-16"},{"key":"17_CR15","unstructured":"ICA: Records In Context: A Conceptual Model for Archival Description (2016)"},{"key":"17_CR16","unstructured":"Klyne, G., Carroll, J.J., et al.: Resource Description Framework (RDF): Concepts and Abstract Syntax. w3c recommendation (2004)"},{"key":"17_CR17","unstructured":"Kunal, S., Pascal, H.: Web Ontology Language (OWL). Encyclopedia of Social Network Analysis and Mining (2014)"},{"key":"17_CR18","unstructured":"Prot\u00e9g\u00e9: https:\/\/protege.stanford.edu\/,2021-11-16"},{"key":"17_CR19","unstructured":"Noy, N.F., Mcguinness, D.L.: Ontology Development 101: A Guide to Creating Your First Ontology. Stanford Medical Informatics (2001)"},{"key":"17_CR20","unstructured":"Chronicle of the War to Resist U.S. Aggression and Aid Korea. https:\/\/news.12371.cn\/2014\/10\/23\/ARTI1414065228514997.shtml,2014-10-23"},{"key":"17_CR21","doi-asserted-by":"crossref","unstructured":"He, K., Gkioxari, G., Doll\u00e1r, P., et al.: Mask R-CNN. IEEE Transactions on Pattern Analysis & Machine Intelligence (2020)","DOI":"10.1109\/TPAMI.2018.2844175"},{"key":"17_CR22","doi-asserted-by":"crossref","unstructured":"Zhou, Z., Siddiquee, M.R., Tajbakhsh, N., et al.: UNet++: A Nested U-Net Architecture for Medical Image Segmentation. 4th Deep Learning in Medical Image Analysis Workshop (2018)","DOI":"10.1007\/978-3-030-00889-5_1"},{"key":"17_CR23","unstructured":"Gregor, K., Danihelka, I., Graves, A., et al.: DRAW: A Recurrent Neural Network for Image Generation. Computer Science (2015)"},{"key":"17_CR24","unstructured":"Jin, C., Weihua, L.I., Chen, J.I., et al.: Bi-directional long short-term memory neural networks for chinese word segmentation. Journal of Chinese Information Processing (2018)"},{"key":"17_CR25","unstructured":"Bahdanau, D., Cho, K., Bengio, Y.: Neural machine translation by jointly learning to align and translate. Computer Science (2014)"},{"key":"17_CR26","unstructured":"Prot\u00e9g\u00e9: https:\/\/protege.stanford.edu\/products.php,2022-07-26"},{"key":"17_CR27","unstructured":"Sqarql 1.1 query language. https:\/\/www.w3.org\/TR\/sparql11-query\/, 2021-03-21"}],"container-title":["Communications in Computer and Information Science","Big Data and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-3300-6_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,30]],"date-time":"2023-05-30T15:07:52Z","timestamp":1685459272000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-3300-6_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9789819932993","9789819933006"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-3300-6_17","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"31 May 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICBDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Big Data and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xiamen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icbds2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icbds.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}