Search Results

You are looking at 1 - 10 of 21 items for :

  • direct search methods x
  • Project Management x
Clear All
Open access

Lidan Xia, Shengli Deng and Yirong Liu

are a few studies that consider the impact of situational factors, but they either take situational factors as the research background or just investigated the direct impact of situational factors on search intention. For instance, Wu and Li (2015) analyzed the elderly’s diversity of emotion and cognition, and their different ways of dealing with information in online information retrieval processes in different health situations via user experiment, questionnaire survey, and interview methods. But this study only considered different situations as the research

Open access

Xianlei Dong, Jian Xu, Ying Ding, Chenwei Zhang, Kunpeng Zhang and Min Song

and comments about natural disasters and political uprisings travel at breakneck speed in Twitter or Google. Social media are becoming an important channel that can also greatly influence our perception of a certain topic. In economics, social media can have a significant effect on a firm’s reputation, sales, and even survival ( Kietzmann et al., 2011 ). Altmetrics ( Priem et al., 2010 ) use social media to estimate the early impact of publications or researchers. Dong and Bollen (2015) applied Google search-engine query data to detect consumer confidence indexes

Open access

Neil R. Smalheiser

individually stored temporarily by job ID so users can go back without the need to re-run the search each time. Thus, carrying out a one-node search is simply a matter of carrying out a series of two-node searches, one for each MeSH term within the category of interest ( Smalheiser, 2012b ). This greatly simplifies the computational issues involved. 7 Examples from the Front Lines of Scientific Investigation A variety of investigators have used literature-based discovery (LBD) methods to propose specific hypotheses which were then tested experimentally. Some of these

Open access

Stephen F. Carley, Alan L. Porter and Jan L. Youtie

perform disambiguation by comparing citation records using some type of similarity function.” In their analysis, a “major gap in the field is the lack of direct comparisons among the methods under the same circumstances: e.g., same collections (e.g., many methods used different versions of collections such as DBLP).” DBLP, which originally stood for DataBase systems and Logic Programming, is a scholarly digital library which was launched at the University of Trier, Germany, in 1993. It tracks all major computer science journals. Another drawback of this approach is

Open access

Haiyun Xu, Chao Wang, Kun Dong and Zenghui Yue

: Text analysis. Here the topic clusters acquisition method proposed by Porter is adopted ( Porter & Zhang, 2012 ). After preprocessing the data set based on the text content, meaningful phrases that passed a certain threshold could be selected as a candidate topics set. Subsequently, data preprocessing is implemented using the Derwent Data Analyzer (DDA). For massive amounts of scientific literature, mining and cleaning of terms are time-consuming and laborious processes. DDA is a professional text-mining software package developed by Search Technology Inc. and

Open access

Satoshi Tsutsui, Yi Bu and Ying Ding

to understand large amounts of literature in a specific medical domain in combination with topic modeling methods. 3 Methodology The methodology of this paper is visually summarized in Figure 1 . First, we collected literature with a focus that can be specified by key terms, specific periods, and/or target journals. After consulting domain experts, we collected a set of PubMed papers relevant to AD The query was performed in October, 2015. using search terms Alzheimer, Mild cognitive impairment, Dementia, Significant memory concern , and Subjective memory

Open access

Daniela Fernandez Espinosa and Lu Xiao

computational cost will be higher than make a simple search on a name database. The accuracy of both methods, tweets text analysis, and the gender prediction strategies (profile, name, and description analysis), may vary, but the result will be substantially constant. Inspired by Krempeaux work (2013) , Herdağdelen published an n-gram data set of Twitter messages, which contains gender of the author and time of posting tags. In order to infer the gender of the author, Herdağdelen used the first name of the users to infer his/her gender, at least, for the ones that provide

Open access

Guoqiang Liang, Haiyan Hou, Zhigang Hu, Fu Huang, Yajie Wang and Shanshan Zhang

(1994) pointed out that research fronts are co-citation clusters plus citing articles; Morris et al. (2003) applied bibliographic coupling methods to identify the research fronts; Shibata et al. (2008) proposed that research fronts are direct citation clusters. Presently, Chen (2006) , Braam, Moed, and van Raan (1991) , and Persson’s (1994) views are the mainstream in research fronts detection. They concurred that research fronts are clusters of citing papers sharing a common intellectual base. The research fronts detection method of this paper is in

Open access

Jian Du and Yishan Wu

methods that become useful in biology. A sleeping beauty may need one or more “princes” and even “retinues” to be awakened. The PRs may be either conceptually related or direct-citation-related to the SB. In this study, the PRs include two documents of Hell himself, who believed and insisted on his theory, and finally succeeded. Although the other two PRs did not cite the SB in the first generation, they cited other documents of Hell, and these citations induced the citation leap of the SB. Hell did not co-author with Betzig’s group or Zhuang’s group; it is through a

Open access

Anthony F.J. van Raan

briefly discuss recent work on the above issues. Tackling the problem of monitoring the technological state-of-the–art as recent as possible, Ko et al. (2014) argue that patent-citation networks are insufficient to capture the most recent technological information, particularly the direct and hidden impacts among technologies. To improve technology-impact networks they integrate patent co-classification, decision making algorithms, and social network analysis. The method is illustrated using all Korean patents in the United States patent database from 2008 to 2012