Dr Taoxin Peng T.Peng@napier.ac.uk
Lecturer
A comparison of techniques for name matching
Peng, Taoxin; Li, Lin; Kennedy, Jessie
Authors
Lin Li
Prof Jessie Kennedy J.Kennedy@napier.ac.uk
Enhanced Associate
Abstract
Information explosion is a problem for everyone nowadays. It is a great challenge to all kinds of businesses to maintain high quality of data in their information applications, such as data integration, text and web mining, information retrieval, search engine, etc. In such applications, matching names is one of the popular tasks. There are a number of name matching techniques available. Unfortunately, there is no existing name matching technique that performs the best in all situations. Therefore, a problem that every researcher or a practitioner has to face is how to select an appropriate technique for a given dataset. This paper analyses and evaluates a set of popular name matching techniques on several carefully designed different datasets. The experimental comparison confirms the statement that there is no clear best technique. Some suggestions have been presented, which can be used as guidance for researchers and practitioners to select an appropriate name matching technique in a given dataset.
Citation
Peng, T., Li, L., & Kennedy, J. (2012). A comparison of techniques for name matching. GSTF journal on computing, 2,
Journal Article Type | Article |
---|---|
Publication Date | 2012 |
Deposit Date | Apr 12, 2012 |
Publicly Available Date | May 16, 2017 |
Print ISSN | 2010-2283 |
Peer Reviewed | Peer Reviewed |
Volume | 2 |
Keywords | Name matching; dataset; |
Public URL | http://researchrepository.napier.ac.uk/id/eprint/5116 |
Files
A comparison of techniques for name matching
(554 Kb)
PDF
You might also like
Data quality and data cleaning in database applications
(2012)
Thesis
An evaluation of name matching techniques.
(2011)
Conference Proceeding
A rule based taxonomy of dirty data.
(2011)
Journal Article
Improving data quality in data warehousing applications
(2010)
Conference Proceeding
Developing Visualisations to Enhance an Insider Threat Product: A Case Study
(2021)
Conference Proceeding
Downloadable Citations
About Edinburgh Napier Research Repository
Administrator e-mail: repository@napier.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search