Search results

1 – 10 of 10
Article
Publication date: 19 July 2013

Yuxian Liu and Ronald Rousseau

This paper aims to provide a new insight into the reasons why authors cite.

873

Abstract

Purpose

This paper aims to provide a new insight into the reasons why authors cite.

Design/methodology/approach

The authors argue that, based on philosophical ideas about the essence of things, pure rational thinking about the role of citations leads to the answer.

Findings

Citations originate from the interestingness of the investigated phenomenon. The essence of citation lies in the interaction between different ideas or perspectives on a phenomenon addressed in the citing as well as in the cited articles.

Research limitations/implications

The findings only apply to ethical (not whimsical or self‐serving) citations. As such citations reflect interactions of scientific ideas, they can reveal the evolution of science, revive the cognitive process of an investigated scientific phenomenon and reveal political and economic factors influencing the development of science.

Originality/value

This article is the first to propose interestingness and the interaction of ideas as the basic reason for citing. This view on citations allows reverse engineering from citations to ideas and hence becomes useful for science policy.

Article
Publication date: 16 March 2012

Yuxian Liu and Ronald Rousseau

The paper aims to propose the use of spline functions for the description and visualization of discrete informetric data.

Abstract

Purpose

The paper aims to propose the use of spline functions for the description and visualization of discrete informetric data.

Design/methodology/approach

Interpolating cubic splines: are interpolating functions (they pass through the given data points); are cubic, i.e. are polynomials of third degree; have first and second derivatives in the data points, implying that they connect data points in a smooth way; satisfy a best‐approximation property which tends to reduce curvature. These properties are illustrated in the paper using real citation data.

Findings

The paper reveals that calculating splines yields a differentiable function that still captures small but real changes. It offers a middle way between connecting discrete data by line segments and providing an overall best‐fitting curve.

Research limitations/implications

The major disadvantage of the use of splines is that accurate data are essential.

Practical implications

Spline functions can be used for illustrative as well as modelling purposes.

Originality/value

Splines have hardly ever been used or studied in the information sciences.

Details

Aslib Proceedings, vol. 64 no. 2
Type: Research Article
ISSN: 0001-253X

Keywords

Article
Publication date: 13 January 2012

Yuxian Liu, Ismael Rafols and Ronald Rousseau

This paper aims to introduce a general framework for the analysis of knowledge integration and diffusion using bibliometric data.

1996

Abstract

Purpose

This paper aims to introduce a general framework for the analysis of knowledge integration and diffusion using bibliometric data.

Design/methodology/approach

The authors propose that in order to characterise knowledge integration and diffusion of a given issue (the source, for example articles on a topic or by an organisation, etc.), one has to choose a set of elements from the source (the intermediary set, for example references, keywords, etc.). This set can then be classified into categories (cats), thus making it possible to investigate its diversity. The set can also be characterised according to the coherence of a network associated to it.

Findings

This framework allows a methodology to be developed to assess knowledge integration and diffusion. Such methodologies can be useful for a number of science policy issues, including the assessment of interdisciplinarity in research and dynamics of research networks.

Originality/value

The main contribution of this article is to provide a simple and easy to use generalisation of an existing approach to study interdisciplinarity, bringing knowledge integration and knowledge diffusion together in one framework.

Details

Journal of Documentation, vol. 68 no. 1
Type: Research Article
ISSN: 0022-0418

Keywords

Article
Publication date: 26 August 2020

Tiyang Huang, Rui Nie and Yue Zhao

The purpose of this paper is to propose a theoretical framework to illustrate the archival knowledge applied by archivists in their personal archiving (PA) and the mechanism of…

1944

Abstract

Purpose

The purpose of this paper is to propose a theoretical framework to illustrate the archival knowledge applied by archivists in their personal archiving (PA) and the mechanism of the application of archival knowledge in their PA.

Design/methodology/approach

The grounded theory methodology was adopted. For data collection, in-depth interviews were conducted with 21 archivists in China. Data analysis was performed using the open coding, axial coding and selective coding to organise the archival knowledge composition of PA and develops the awareness-knowledge-action (AKA) integration model of archival knowledge application in the field of PA, according to the principles of the grounded theory.

Findings

The archival knowledge involved in the field of PA comprises four principal categories: documentation, arrangement, preservation and appraisal. Three interactive factors involved in archivists' archival knowledge application in the field of PA behaviour: awareness, knowledge and action, which form a pattern of awareness leading, knowledge guidance and action innovation, and archivists' PA practice is flexible and innovative. The paper underscored that it is need to improve archival literacy among general public.

Originality/value

The study constructs a theoretical framework to identify the specialised archival knowledge and skills of PA which is able to provide solutions for non-specialist PA and develops an AKA model to explain the interaction relationships between awareness, knowledge and action in the field of PA.

Details

Journal of Documentation, vol. 77 no. 1
Type: Research Article
ISSN: 0022-0418

Keywords

Article
Publication date: 3 January 2020

Yuxian Gao

The purpose of this paper is to apply link prediction to community mining and to clarify the role of link prediction in improving the performance of social network analysis.

Abstract

Purpose

The purpose of this paper is to apply link prediction to community mining and to clarify the role of link prediction in improving the performance of social network analysis.

Design/methodology/approach

In this study, the 2009 version of Enron e-mail data set provided by Carnegie Mellon University was selected as the research object first, and bibliometric analysis method and citation analysis method were adopted to compare the differences between various studies. Second, based on the impact of various interpersonal relationships, the link model was adopted to analyze the relationship among people. Finally, the factorization of the matrix was further adopted to obtain the characteristics of the research object, so as to predict the unknown relationship.

Findings

The experimental results show that the prediction results obtained by considering multiple relationships are more accurate than those obtained by considering only one relationship.

Research limitations/implications

Due to the limited number of objects in the data set, the link prediction method has not been tested on the large-scale data set, and the validity and correctness of the method need to be further verified with larger data. In addition, the research on algorithm complexity and algorithm optimization, including the storage of sparse matrix, also need to be further studied. At the same time, in the case of extremely sparse data, the accuracy of the link prediction method will decline a lot, and further research and discussion should be carried out on the sparse data.

Practical implications

The focus of this research is on link prediction in social network analysis. The traditional prediction model is based on a certain relationship between the objects to predict and analyze, but in real life, the relationship between people is diverse, and different relationships are interactive. Therefore, in this study, the graph model is used to express different kinds of relations, and the influence between different kinds of relations is considered in the actual prediction process. Finally, experiments on real data sets prove the effectiveness and accuracy of this method. In addition, link prediction, as an important part of social network analysis, is also of great significance for other applications of social network analysis. This study attempts to prove that link prediction is helpful to the improvement of performance analysis of social network by applying link prediction to community mining.

Originality/value

This study adopts a variety of methods, such as link prediction, data mining, literature analysis and citation analysis. The research direction is relatively new, and the experimental results obtained have a certain degree of credibility, which is of certain reference value for the following related research.

Details

Library Hi Tech, vol. 38 no. 2
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 6 December 2020

Binghai Zhou, Xiujuan Li and Yuxian Zhang

This paper aims to investigate the part feeding scheduling problem with electric vehicles (EVs) for automotive assembly lines. A point-to-point part feeding model has been…

Abstract

Purpose

This paper aims to investigate the part feeding scheduling problem with electric vehicles (EVs) for automotive assembly lines. A point-to-point part feeding model has been formulated to minimize the number of EVs and the maximum handling time by specifying the EVs and sequence of all the delivery tasks.

Design/methodology/approach

First, a mathematical programming model of point-to-point part feeding scheduling problem (PTPPFSP) with EVs is presented. Because the PTPPFSP is NP-hard, an improved multi-objective cuckoo search (IMCS) algorithm is developed with novel search strategies, possessing the self-adaptive Levy flights, the Gaussian mutation and elite selection strategy to strengthen the algorithm’s optimization performance. In addition, two local search operators are designed for deep optimization. The effectiveness of the IMCS algorithm is verified by dealing with the PTPPFSP in different problem scales.

Findings

Numerical experiments are used to demonstrate how the IMCS algorithm serves as an efficient method to solve the PTPPFSP with EVs. The effectiveness and feasibility of the IMCS algorithm are validated by approximate Pareto fronts obtained from the instances of different problem scales. The computational results show that the IMCS algorithm can achieve better performance than the other high-performing algorithms in terms of solution quality, convergence and diversity.

Research limitations/implications

This study is applicable without regard to the breakdown of EVs. The current research contributes to the scheduling of in-plant logistics for automotive assembly lines, and it could be modified to cope with similar part feeding scheduling problems characterized by just-in-time (JIT) delivery.

Originality/value

Both limited electricity capacity and no earliness and tardiness constraints are considered, and the scheduling problem is solved satisfactorily and innovatively for an efficient JIT part feeding with EVs applied to in-plant logistics.

Details

Assembly Automation, vol. 41 no. 1
Type: Research Article
ISSN: 0144-5154

Keywords

Article
Publication date: 1 February 2016

Yuxian Eugene Liang and Soe-Tsyr Daphne Yuan

What makes investors tick? Largely counter-intuitive compared to the findings of most past research, this study explores the possibility that funding investors invest in companies…

3487

Abstract

Purpose

What makes investors tick? Largely counter-intuitive compared to the findings of most past research, this study explores the possibility that funding investors invest in companies based on social relationships, which could be positive or negative, similar or dissimilar. The purpose of this paper is to build a social network graph using data from CrunchBase, the largest public database with profiles about companies. The authors combine social network analysis with the study of investing behavior in order to explore how similarity between investors and companies affects investing behavior through social network analysis.

Design/methodology/approach

This study crawls and analyzes data from CrunchBase and builds a social network graph which includes people, companies, social links and funding investment links. The problem is then formalized as a link (or relationship) prediction task in a social network to model and predict (across various machine learning methods and evaluation metrics) whether an investor will create a link to a company in the social network. Various link prediction techniques such as common neighbors, shortest path, Jaccard Coefficient and others are integrated to provide a holistic view of a social network and provide useful insights as to how a pair of nodes may be related (i.e., whether the investor will invest in the particular company at a time) within the social network.

Findings

This study finds that funding investors are more likely to invest in a particular company if they have a stronger social relationship in terms of closeness, be it direct or indirect. At the same time, if investors and companies share too many common neighbors, investors are less likely to invest in such companies.

Originality/value

The author’s study is among the first to use data from the largest public company profile database of CrunchBase as a social network for research purposes. The author ' s also identify certain social relationship factors that can help prescribe the investor funding behavior. Authors prediction strategy based on these factors and modeling it as a link prediction problem generally works well across the most prominent learning algorithms and perform well in terms of aggregate performance as well as individual industries. In other words, this study would like to encourage companies to focus on social relationship factors in addition to other factors when seeking external funding investments.

Details

Internet Research, vol. 26 no. 1
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 16 August 2023

Anish Khobragade, Shashikant Ghumbre and Vinod Pachghare

MITRE and the National Security Agency cooperatively developed and maintained a D3FEND knowledge graph (KG). It provides concepts as an entity from the cybersecurity…

Abstract

Purpose

MITRE and the National Security Agency cooperatively developed and maintained a D3FEND knowledge graph (KG). It provides concepts as an entity from the cybersecurity countermeasure domain, such as dynamic, emulated and file analysis. Those entities are linked by applying relationships such as analyze, may_contains and encrypt. A fundamental challenge for collaborative designers is to encode knowledge and efficiently interrelate the cyber-domain facts generated daily. However, the designers manually update the graph contents with new or missing facts to enrich the knowledge. This paper aims to propose an automated approach to predict the missing facts using the link prediction task, leveraging embedding as representation learning.

Design/methodology/approach

D3FEND is available in the resource description framework (RDF) format. In the preprocessing step, the facts in RDF format converted to subject–predicate–object triplet format contain 5,967 entities and 98 relationship types. Progressive distance-based, bilinear and convolutional embedding models are applied to learn the embeddings of entities and relations. This study presents a link prediction task to infer missing facts using learned embeddings.

Findings

Experimental results show that the translational model performs well on high-rank results, whereas the bilinear model is superior in capturing the latent semantics of complex relationship types. However, the convolutional model outperforms 44% of the true facts and achieves a 3% improvement in results compared to other models.

Research limitations/implications

Despite the success of embedding models to enrich D3FEND using link prediction under the supervised learning setup, it has some limitations, such as not capturing diversity and hierarchies of relations. The average node degree of D3FEND KG is 16.85, with 12% of entities having a node degree less than 2, especially there are many entities or relations with few or no observed links. This results in sparsity and data imbalance, which affect the model performance even after increasing the embedding vector size. Moreover, KG embedding models consider existing entities and relations and may not incorporate external or contextual information such as textual descriptions, temporal dynamics or domain knowledge, which can enhance the link prediction performance.

Practical implications

Link prediction in the D3FEND KG can benefit cybersecurity countermeasure strategies in several ways, such as it can help to identify gaps or weaknesses in the existing defensive methods and suggest possible ways to improve or augment them; it can help to compare and contrast different defensive methods and understand their trade-offs and synergies; it can help to discover novel or emerging defensive methods by inferring new relations from existing data or external sources; and it can help to generate recommendations or guidance for selecting or deploying appropriate defensive methods based on the characteristics and objectives of the system or network.

Originality/value

The representation learning approach helps to reduce incompleteness using a link prediction that infers possible missing facts by using the existing entities and relations of D3FEND.

Details

International Journal of Web Information Systems, vol. 19 no. 3/4
Type: Research Article
ISSN: 1744-0084

Keywords

Article
Publication date: 30 September 2019

Andriani Kusumawati, Humam Santosa Utomo, Suharyono Suharyono and Sunarti Sunarti

The purpose of this paper is to examine the effect of sustainability on word-of-mouth (WoM) intention and revisit intention, with environmental awareness as a moderator. This…

1652

Abstract

Purpose

The purpose of this paper is to examine the effect of sustainability on word-of-mouth (WoM) intention and revisit intention, with environmental awareness as a moderator. This study was carried out in one of the tourist destinations in Indonesia, namely, Bali.

Design/methodology/approach

The population in this study was foreign tourists visiting Bali. This study uses non-probability sampling with a purposive sampling technique and uses inferential statistics. Inferential statistics was used to test the sample data on the effect of sustainability on WoM intention and revisit intention. The statistical tool used is warp-partial least square.

Findings

Effect of sustainability on WoM intention is that the higher perception of foreign tourists in the sustainability assessment will increase the WoM intention of foreign tourists. Contrarily, lower perception of foreign tourists on sustainability assessment will lower the WoM intention of foreign tourists. Effects of sustainability on revisit intention is that the higher perception of foreign tourists in the sustainability assessment will increase the revisit intention of foreign tourists. Contrarily, the lower perception of foreign tourists in sustainability assessment will lower the revisit intention of foreign tourists. Environmental awareness moderating the effects of sustainability on revisit intention is that the higher the environmental awareness of foreign tourists visiting Bali, the stronger the influence of sustainability on revisit intention. Contrarily, the lower environmental awareness of foreign tourists visiting Bali will lower the effect of sustainability on revisit intention.

Originality/value

Destination sustainability research from the perspective of tourists has not been conducted up to the behavior intention, and research is still limited to tourist satisfaction. Research that connects destination sustainability with trust, WoM intention and revisit intention has not been found yet. WoM intention and revisit intention provide a clearer picture than behavioral intention; therefore, this study focuses on WoM intention and revisit intention variables. Destination sustainability research has not been combined with destination quality as an exogenous variable that is able to predict more precisely tourist satisfaction and behavioral intention. Research has not been found on environmental awareness in relation to the sustainability variable and behavior intention. The studies that have been carried out only focus on the effect of environmental awareness on the behavior intention (Gao et al., 2016), and the research has not yet linked it to sustainability.

Details

Management of Environmental Quality: An International Journal, vol. 31 no. 1
Type: Research Article
ISSN: 1477-7835

Keywords

Article
Publication date: 7 October 2014

Martin Aruldoss, Miranda Lakshmi Travis and V. Prasanna Venkatesan

Business intelligence (BI) has been applied in various domains to take better decisions and it provides different level of information to its stakeholders according to the…

5758

Abstract

Purpose

Business intelligence (BI) has been applied in various domains to take better decisions and it provides different level of information to its stakeholders according to the information needs. The purpose of this paper is to present a literature review on recent works in BI. The two principal aims in this survey are to identify areas lacking in recent research, thereby offering potential opportunities for investigation.

Design/methodology/approach

To simplify the study on BI literature, it is segregated into seven categories according to the usage. Each category of work is analyzed using parameters such as purpose, domain, problem identified, solution applied, benefit and outcome.

Findings

The BI contribution in various domains, ongoing research in BI, the convergence of BI domains, problems and solutions, results of congregated domains, core problems and key solutions. It also outlines BI and its components composition, widely applied BI solutions such as algorithm-based, architecture-based and model-based solutions. Finally, it discusses BI implementation issues and outlines the security and privacy policies adopted in BI environment.

Research limitations/implications

In this survey BI has been discussed in theoretical perspective whereas practical contribution has been given less attention.

Originality/value

A comprehensive survey on BI which identifies areas lacking in recent research and providing potential opportunities for investigation.

Details

Journal of Enterprise Information Management, vol. 27 no. 6
Type: Research Article
ISSN: 1741-0398

Keywords

1 – 10 of 10