Skip to main content
Top

2023 | OriginalPaper | Chapter

Construction of Chinese Healthy Eating Knowledge Graph

Authors : Zhicong Liu, Long Su, Jun Ye, Longjuan Wang

Published in: Frontier Computing

Publisher: Springer Nature Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

With the rapid development of the domestic catering industry, people are gradually concerned about the health problems that come with it. Traditional diet recommendation can help users alleviate the information overload problem, but there are problems such as data sparsity and recommendation results are less accurate. The new auxiliary new type of rich entity semantic association contained in the diet knowledge graph can mitigate the disadvantages of cold start; at same time, the related information in the healthy diet graph is applied to the recommendation system through knowledge representation to recommend suitable dishes for users. This paper will research the design and construction of Chinese dietary knowledge graphs from data sources, knowledge graph data acquisition, knowledge graph data fusion, knowledge graph storage five levels to build a complete knowledge map of Chinese healthy eating, laying a solid foundation for subsequent research.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceedings of the 2000 IEEE Symposium on Security and Privacy, Washington, pp. 44–55. IEEE (2000) Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceedings of the 2000 IEEE Symposium on Security and Privacy, Washington, pp. 44–55. IEEE (2000)
2.
go back to reference Chen, X., et al.: Research on ciphertext image retrieval scheme based on target detection in cloud environment. Wuhan University of Science and Technology (2020) Chen, X., et al.: Research on ciphertext image retrieval scheme based on target detection in cloud environment. Wuhan University of Science and Technology (2020)
3.
go back to reference Shen, M., et al.: Content-based multi-source encrypted image retrieval in clouds with privacy preservation. Future Gener. Comput. Syst. 109, 621–632 (2020) Shen, M., et al.: Content-based multi-source encrypted image retrieval in clouds with privacy preservation. Future Gener. Comput. Syst. 109, 621–632 (2020)
4.
go back to reference Hirata, K., Kato, T.: Query by visual example. In: International Conference on extending database technology. In: Pirotte, A., Delobel, C., Gottlob, G. (eds.) Advances in Database Technology, LNCS, vol. 580, pp. 56–71. Springer, Berlin, Heidelberg (1992). https://doi.org/10.1007/BFb0032423 Hirata, K., Kato, T.: Query by visual example. In: International Conference on extending database technology. In: Pirotte, A., Delobel, C., Gottlob, G. (eds.) Advances in Database Technology, LNCS, vol. 580, pp. 56–71. Springer, Berlin, Heidelberg (1992). https://​doi.​org/​10.​1007/​BFb0032423
5.
go back to reference Manjunath, B.S., Ma, W-Y.: Texture features for browsing and retrieval of image data. IEEE Trans. Pattern Anal. Mach. Intell. 18(8), 837–842 (1996) Manjunath, B.S., Ma, W-Y.: Texture features for browsing and retrieval of image data. IEEE Trans. Pattern Anal. Mach. Intell. 18(8), 837–842 (1996)
6.
go back to reference Shashank, J., Kowshik, P., Srinathan, K., et al.: Private content based image retrieval. In: 2008 IEEE Conference on Computer Vision and Pattern Recognition, pp. 1–8 (2008) Shashank, J., Kowshik, P., Srinathan, K., et al.: Private content based image retrieval. In: 2008 IEEE Conference on Computer Vision and Pattern Recognition, pp. 1–8 (2008)
7.
go back to reference Wong, W.K., Cheung, D.W.-L., Kao, B., et al.: Secure KNN computation on encrypted databases. In: Proceedings of the 2009 ACM SIGMOD International Conference on Management of Data, pp. 139–152 (2009) Wong, W.K., Cheung, D.W.-L., Kao, B., et al.: Secure KNN computation on encrypted databases. In: Proceedings of the 2009 ACM SIGMOD International Conference on Management of Data, pp. 139–152 (2009)
8.
go back to reference Yuan, J., Yu, S., Guo, L.: SEISA: secure and efficient encrypted image search with access control. In: 2015 IEEE Conference on Computer Communications (INFOCOM), pp. 2083–2091 (2015) Yuan, J., Yu, S., Guo, L.: SEISA: secure and efficient encrypted image search with access control. In: 2015 IEEE Conference on Computer Communications (INFOCOM), pp. 2083–2091 (2015)
9.
go back to reference Cheng, H., Zhang, X., Yu, J., et al.: Markov process-based retrieval for encrypted JPEG images. EURASIP J. Inf. Secur. 2016(1), 1 (2016)MathSciNetCrossRef Cheng, H., Zhang, X., Yu, J., et al.: Markov process-based retrieval for encrypted JPEG images. EURASIP J. Inf. Secur. 2016(1), 1 (2016)MathSciNetCrossRef
10.
go back to reference Cheng, H., Zhang, X., Yu, J., et al.: Encrypted JPEG image retrieval using block-wise feature comparison. J. Vis. Commun. Image Represent. 40, 111–117 (2016)CrossRef Cheng, H., Zhang, X., Yu, J., et al.: Encrypted JPEG image retrieval using block-wise feature comparison. J. Vis. Commun. Image Represent. 40, 111–117 (2016)CrossRef
Metadata
Title
Construction of Chinese Healthy Eating Knowledge Graph
Authors
Zhicong Liu
Long Su
Jun Ye
Longjuan Wang
Copyright Year
2023
Publisher
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-99-1428-9_264