JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2019, Vol. 54 ›› Issue (5): 28-36, 43.doi: 10.6040/j.issn.1671-9352.2.2018.058
• • Previous Articles Next Articles
Pei-ming WANG1(),Xing-shu CHEN1,2,Hai-zhou WANG2,Wen-xian WANG3,*()
CLC Number:
1 | 中国互联网中心.第41次中国互联网发展状况报告[EB/OL].[2018-01-31] http://www.cac.gov.cn/files/pdf/cnnic/CNNIC41.pdf. |
CNNIC. The 41st report on China's Internet development[EB/OL].[2018-01-31] http://www.cac.gov.cn/files/pdf/cnnic/CNNIC41.pdf. | |
2 | CATANESE S A, MEO P D, FERRARA E, et al. Crawling Facebook for social network analysis purposes[C]// International Conference on Web Intelligence, Mining and Semantics. New York: ACM, 2011: 1-8. |
3 | WU S, HOFMAN J M, MASON W A, et al. Who says what to whom on Twitter[C]// International Conference on World Wide Web, WWW 2011, Hyderabad: DBLP, 2011: 705-714. |
4 | SINGANAMALLA S, CHRISTEN M P. Loklak-A distributed crawler and data harvester for overcoming rate limits[J]. arXiv: 1704.03624, 2017. https://arxiv.org/abs/1704.03624 |
5 | WANI M A, AGARWAL N, JABIN S, et al. Design and implementation of iMacros-based data crawler for behavioral analysis of Facebook users[J]. arXiv preprint arXiv: 1802.09566, 2018. |
6 | 冯典.面向微博的数据采集和分析系统的设计与实现[D].北京:北京邮电大学, 2013. |
FENG Dian. The design and implementation of the data acquisition and analysis system for micro-blog[D]. Beijing: Beijing University of Posts and Telecommunications, 2013. | |
7 | 孙青云, 王俊峰, 赵宗渠, 等. 一种基于模拟登录的微博数据采集方案[J]. 计算机技术与发展, 2014, 24 (3): 6- 10. |
SUN Qingyun , WANG Junfeng , ZHAO Zongqu , et al. A microblog data collection method based on simulated login technology[J]. Computer Technology and Development, 2014, 24 (3): 6- 10. | |
8 |
周雪, 刘乃文. 基于用户影响力的微博数据采集技术[J]. 山东师范大学学报(自然科学版), 2016, 31 (2): 34- 39.
doi: 10.3969/j.issn.1001-4748.2016.02.007 |
ZHOU Xue , LIU Naiwen . Weibo data mining technology based on the user influential[J]. Journal of Shandong Normal University(Natural Science), 2016, 31 (2): 34- 39.
doi: 10.3969/j.issn.1001-4748.2016.02.007 |
|
9 | 黄鑫博.面向社交网络的数据采集系统的研究和实现[D].北京:北京邮电大学, 2016. |
HUANG Xinbo. Research and implementation of data acquisition system oriented on social networks[D]. Beijing: Beijing University of Post and Telecommunications, 2013. | |
10 | 徐恒.社会化网络数据获取技术研究与实现[D].长春:吉林大学, 2016. |
XU Heng. Study and implementation of data acquisition technology in social network[D]. Changchun: Jilin University, 2016. | |
11 | 徐雁飞, 刘渊, 吴文鹏. 社交网络数据采集技术研究与应用[J]. 计算机科学, 2017, 44 (1): 277- 282. |
XU Yanfei , LIU Yuan , WU Wenpeng . Research and application of social network data acquisition technology[J]. Computer Science, 2017, 44 (1): 277- 282. | |
12 | MOHAMMAD A A , SHAIKHLI I F A , MOHAMMAD A H , et al. Protection of the texts using Base64 and MD5[J]. Journal of Advanced Computer Science & Technology Research, 2012, 2 (1): 22- 34. |
13 | SOMANI U, LAKHANI K, MUNDRA M. Implementing digital signature with RSA encryption algorithm to enhance the data security of cloud in cloud computing[C]//2010 First International Conference on Parallel, Distributed and Grid Computing. Solan: PDGC.2010. |
14 | CHAU D H, PANDIT S, WANG S, et al. Parallel crawling for online social networks[C]// International Conference on World Wide Web, WWW 2007, Banff: DBLP, 2007: 1283-1284. |
15 |
BOLDI P , CODENOTTI B , SANTINI M , et al. UbiCrawler:a scalable fully distributed Web crawler[J]. Software:Practice and Experience, 2004, 34 (8): 711- 726.
doi: 10.1002/(ISSN)1097-024X |
16 |
袁浩, 黄烟波. 网页标题分析对主题爬虫的改进[J]. 计算机技术与发展, 2009, 19 (6): 22- 24, 28.
doi: 10.3969/j.issn.1673-629X.2009.06.006 |
YUAN Hao , HUANG Yanbo . Analysis of title page to improve focus crawler[J]. Computer Technology and Development, 2009, 19 (6): 22- 24, 28.
doi: 10.3969/j.issn.1673-629X.2009.06.006 |
|
17 | CHO J, GARCIA-MOLINA H. Parallel crawlers[C]//Proceedings of the 11th International Conference on World Wide Web. New York: ACM, 2002: 124-135. |
18 |
高梦超, 胡庆宝, 程耀东, 等. 基于众包的社交网络数据采集模型设计与实现[J]. 计算机工程, 2015, 41 (4): 36- 40.
doi: 10.3969/j.issn.1000-3428.2015.04.007 |
GAO Mengchao , HU Qingbao , CHENG Yaodong , et al. Design and implementation of crowd sourcing-based social network data collection model[J]. Computer Engineering, 2015, 41 (4): 36- 40.
doi: 10.3969/j.issn.1000-3428.2015.04.007 |
|
19 | CHIU D M , JAIN R . Analysis of the increase and decrease algorithms for congestion avoidance in computer networks[J]. Computer Networks and ISDN Systems, 1989, 17 (1): 1- 14. |
20 | 中央网信办.互联网跟帖评论服务管理规定[EB/OL].[2017-08-25] http://www.cac.gov.cn/2017-08/25/c_1121541842.htm |
The Cyberspace Administration of China. Post comment service management regulations on Internet[EB/OL].[2017-08-25] http://www.cac.gov.cn/2017-08/25/c_1121541842.htm |
[1] | YAN Yan, HAO Xiao-hong. Differential privacy partitioning algorithm based on adaptive density grids [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(9): 12-22. |
[2] | KANG Hai-yan, HUANG Yu-xuan, CHEN Chu-qiao. Enhancing privacy for geographic information based on video analysis [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 19-29. |
[3] | SONG Yuan-zhang, LI Hong-yu, CHEN Yuan, WANG Jun-jie. P2P botnet detection method based on fractal and adaptive data fusion [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(3): 74-81. |
[4] | HUANG Wei-ting, ZHAO Hong, ZHU William. Adaptive divide and conquer algorithm for cost-sensitive attribute reduction [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(8): 98-104. |
[5] | ZHANG Jing, XIAO Zhi-bin, RONG Hui, CUI Yi. An improved genetic algorithm in the application of Web spider [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2015, 50(05): 1-6. |
[6] | ZHANG Cong, FANG Ding-yi, WANG Huai-jun, QI Sheng-de. A software protection method base on concealment of API security attributes [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2015, 50(01): 12-19. |
[7] | YANG Ye-hong, XIAO Jian*, MA Zhen-zhen. Synchronization and control of a novel fractional-order chaotic system [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(2): 76-83. |
[8] | L Xiao-ni 1, WANG Yan-cai 2, GAO Yue-lin 2. The maximum of earnings per risk portfolio model with restricted short selling under BVaR [J]. J4, 2013, 48(05): 92-96. |
[9] | DAI Tao1, XI Kai-hua2*, DAI Jia-lin1, LU Tong-chao2, YU Jin-biao1, REN Yong-qiang2, YANG Yao-zhong1, CHENG Ai-jie2. A method for numerical simulation of binary combination flooding based on interpolation of capillary number [J]. J4, 2012, 47(8): 55-59. |
[10] | FANG Wei-wei1,2, LI Jing-yuan1, LIU Yue1, YU Zhi-hua1, CAO Peng1,2, ZHANG Kai1. Research of Twitter data collection [J]. J4, 2012, 47(5): 73-77. |
[11] | ZHOU Yan1,2, LIU Pei-yu 1,2, ZHAO Jing1,2, WANG Qian-long1,2. Chaos particle swarm optimization based on the adaptive inertia weight [J]. J4, 2012, 47(3): 27-32. |
[12] | DING Wei-ping1,2,3, WANG Jian-dong2, DUAN Wei-hua2, SHI Quan1. Research of cooperative PSO for attribute reduction optimization [J]. J4, 2011, 46(5): 97-102. |
[13] | HU Yun, HU Lin. The heaping of granular materials at different vibration frequencies [J]. J4, 2009, 44(11): 25-28. |
[14] | LU Wei-jie,ZHU Chen-fu,SONG Cui and YANG Yan-li . Determination of inorganic cations in the Chinese traditional drug Yujin by capillary electrophoresis [J]. J4, 2007, 42(7): 13-18 . |
[15] | WANG Shao-bo,GAO Zhen-ming.LI Zhi-yong,HU Lan-yu,WANG Feng-li . Analysis of dynamic bit allocation algorithm in FMT system [J]. J4, 2006, 41(6): 99-102 . |
|