首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 78 毫秒
1.
对《情报科学》2005至2010年刊出论文作者的情况进行了统计分析。分析指标有作者发文量、合作情况、地区分布、机构分布、核心作者、高产机构等。结果表明,该刊作者分布范围广,合作率高,并拥有一支实力雄厚,对刊物影响较大、造诣较深的活跃核心作者群,吉林、湖北和北京地区科研力量雄厚,总体分布尚不均衡。  相似文献   

2.
基于h指数和hm指数的《情报科学》核心作者分析   总被引:1,自引:0,他引:1  
龚舒野 《情报科学》2013,(1):82-85,95
通过CNKI中国知网对2001-2009年《情报科学》作者发文量和被引频次进行统计,利用普莱斯定律、h指数和hm指数测定了《情报科学》的核心作者,并就其年龄、技术职称、所处的地域加以评析。通过对核心作者的分析,可以了解情报学发展的动态。  相似文献   

3.
易彤 《情报科学》2008,26(1):104-109
本文选取《情报学报》自1982年创刊以来的典型年度1983~1985、1993~1995和2003~2005年的数据为统计源,运用文献计量学的方法通过对发文量、各级科研项目论文篇数、发文单位、作者年龄、职称、学历、性别、合作现象、活跃作者、作者的成长历史等进行统计与分析,揭示《情报学报》的成长和发展历史,从某一侧面说明了期刊质量、作者队伍等情况.  相似文献   

4.
【目的/意义】《情报科学》是情报学理论与方法研究方面的重要学术刊物,是集理论性、实践性和知识性于 一体的学术性刊物。【方法/过程】本文对2011-2016年《情报科学》期刊6年来刊载的2255篇论文应用文献计量学方 法对作者发文数量、合作情况、基金来源、刊文被引情况、核心作者、高产机构等指标进行统计,每三年作为一个节 点进行前后对比分析。【结果/结论】经评估分析《情报科学》期刊具有较高的时效性和先进性,具有一批相对稳定的 学科带头人为核心作者,有很多新兴的学者成为核心作者,成为学科研究发展的新兴力量。有些新的大学发文率 逐年上升,作者合作率逐年增加,有更多的研究人员开始关注并参与该学科。该刊吸引了大量的基金论文,使得在 该学科的核心地位得到了应有的体现。  相似文献   

5.
2004年《现代情报》载文和作者统计分析与评价   总被引:4,自引:1,他引:4  
董宇昭 《现代情报》2005,25(9):146-147,149
本文对2004年《现代情报》的发文及作者情况进行了统计分析和评价,并对其今后的发展提出了一些参考性建议。  相似文献   

6.
对《情报理论与实践》文献及作者分布研究   总被引:3,自引:0,他引:3  
王惠翔 《情报理论与实践》1999,22(5):364-365,309
0前言 <情报理论与实践>自创刊以来,特别是近10年来,在活跃我国情报学界学术气氛,反映我国情报学理论研究与实践研究最新成果,促进国内外情报学交流,促进情报科学发展和培养、发现、扶植情报科学人才等方面,都发挥了积极作用.多次被国家评为中文情报学核心期刊.<情报理论与实践>刊载的学术论文基本上能反映出我国情报科学研究的最新水平.其作者群基本上也能反映出我国情报科学研究队伍的现状.鉴于此,本文对<情报理论与实践>近10年间发文选题及论文作者分布进行一次调查与研究.  相似文献   

7.
以Web of Science(SCI-E,SSCI,A&HCI)为数据源,统计得到我国8所研究型大学图书情报院系1985-2012年间文献172篇,涉及作者329人,502人次。运用文献计量学和社会网络分析法,从作者合作总体概况、合作网络及高产作者等角度客观展示我国图书情报学国际科学研究中的作者群体情况。结果表明参与国际科学研究的作者较少,人均国际发文量不足一篇;作者合作度和合作率分别为2.92和86.63%,且呈上升趋势,3人及以上合作较多;国际合作度约为33.14%,呈上升趋势,合作文献最多的国家是美国和英国;合作文献不低于2篇61位作者形成20个研究子群,合作网络较为分散,主要是“师生型”和“同事型”子网;目前还无发文量高于10篇的高产作者出现,发文量不低于3篇的作者群较小。  相似文献   

8.
《情报学报》九五期间论文作者及引文的调查分析   总被引:10,自引:1,他引:10  
王惠翔 《情报科学》2001,19(11):1140-1143,1232
本文调查了《情报学报》九五期间(1996-2000年)发表论文作者情况(作者发文选题分布、年龄结构分布、职称结构分布、性别结构分布、系统分布、地区分布和合作度)及发表论文引文情况(引文的数量、类型、学科、语种、年代、被引期刊和自引量),并对有关数据进行了定量分析。  相似文献   

9.
2005年《情报科学》的文献计量学分析   总被引:31,自引:5,他引:31  
刘宁南 《情报科学》2006,24(2):214-217
本文运用文献计量学方法,对2005年《情报科学》的载文、作者及引文等情况进行了统计分析。  相似文献   

10.
韩芳芳 《情报科学》2012,(6):858-861,865
以CSSCI为数据源,运用文献计量学方法,从基金论文率、基金级别、论文主题、合著率、发文机构、发文作者及所在区域等角度,对2009-2011年《情报科学》所刊载的543篇基金论文进行定量分析。结果表明:近年来该刊基金论文率呈直线上升趋势,吸纳高级别及国外基金论文的能力不断增强;形成了较为稳定的核心发文单位和高产作者,多人合著是完成的主要形式;论文主题涉及范围宽泛,重点突出。  相似文献   

11.
综合发文与引文这两个相互对应的角度,融合作者合作网络分析、作者关键词耦合分析、作者共被引分析、作者文献耦合分析、作者互引网络分析等方法,形成了一种综合视角下的学术共同体与主题结构发现以及作者学术交流与贡献影响力的比较分析框架,然后利用该思路对科学计量学这一领域进行探索研究;实现了科学计量学领域内核心作者所构成的不同层面的研究群体划分以及主题结构发现,并利用社会网络的中心性测度对他们在不同维度的影响力情况和综合影响力进行了规范处理与测度分析,进而得出了该领域最有影响力的作者排序。  相似文献   

12.
This note analyzes the synchronization problem for a class of complex networks. The considered network topology, symbolized by adjacent matrices, is assumed to be time-varying and subjected to a Markov process. When designing controllers to synchronize the network, we consider the asynchronous phenomenon occurred between the mode of the adjacent matrices and that of the controllers. A properly defined stochastic process, which is related to the Markov process by a conditional probability is then introduced to indicate the controller mode. Base on this connection, a sufficient condition is derived by using Lyapunov–Krasoviskii theorem to ensure the global synchronization of the considered complex network with a predefined noise attenuation level. The design scheme is presented by solving a series of LMIs. A numerical example is finally provided to verify the effectiveness of the proposed method.  相似文献   

13.
洛特卡定律在合著者及全体著者中的验证研究   总被引:10,自引:0,他引:10  
钟旭  阎永胜 《情报科学》2000,18(6):564-565
以往对洛特卡定律的验证研究基本仅局限于第一著者,随着科研合作的日益频繁,科学论文合著指标的不断提高,对于合著者及全体著者的著文分布规律的研究就显得越来越重要,本文研究表明合著者及全体著者的科学生产率频率分布均符合洛特卡定律。  相似文献   

14.
In the process of online storytelling, individual users create and consume highly diverse content that contains a great deal of implicit beliefs and not plainly expressed narrative. It is hard to manually detect these implicit beliefs, intentions and moral foundations of the writers.We study and investigate two different tasks, each of which reflect the difficulty of detecting an implicit user’s knowledge, intent or belief that may be based on writer’s moral foundation: (1) political perspective detection in news articles (2) identification of informational vs. conversational questions in community question answering (CQA) archives. In both tasks we first describe new interesting annotated datasets and make the datasets publicly available. Second, we compare various classification algorithms, and show the differences in their performance on both tasks. Third, in political perspective detection task we utilize a narrative representation language of local press to identify perspective differences between presumably neutral American and British press.  相似文献   

15.
16.
An individual's Web search behavior can be influenced by a number of factors, including features and functions of a search engine as well as search education. In contrast to the long-lasting attention to the algorithm and interface dimensions of search, there is a lack of research concerned with the potential effects of user education on search behavior. To address this gap, we ran a three-session field-lab-combined study to examine the effects of user education from two distinct sources – peer advice and cognitive authority (operationalized as video-based student's advice and expert's advice respectively) – on Web search behavior in two different search task scenarios (i.e., factual specific and factual amorphous tasks). We also tested if these behavioral effects persist for a short period of time when the explicit search tips are removed. Using 185 task session data generated by 31 participants in two field and one lab sessions, this study demonstrates that: (1) both peer advice and cognitive authority are effective in stimulating immediate behavioral changes in Web search; (2) the immediate behavioral impact of search advice is broader in factual amorphous task than in factual specific task; (3) framing search tips as the advice from cognitive authority is more likely to generate continuing, short-term effects on Web search behaviors. This research has implications for the design of task-aware user education as well as the study of users’ interactions with IR systems in general.  相似文献   

17.
While test collections provide the cornerstone for Cranfield-based evaluation of information retrieval (IR) systems, it has become practically infeasible to rely on traditional pooling techniques to construct test collections at the scale of today’s massive document collections (e.g., ClueWeb12’s 700M+ Webpages). This has motivated a flurry of studies proposing more cost-effective yet reliable IR evaluation methods. In this paper, we propose a new intelligent topic selection method which reduces the number of search topics (and thereby costly human relevance judgments) needed for reliable IR evaluation. To rigorously assess our method, we integrate previously disparate lines of research on intelligent topic selection and deep vs. shallow judging (i.e., whether it is more cost-effective to collect many relevance judgments for a few topics or a few judgments for many topics). While prior work on intelligent topic selection has never been evaluated against shallow judging baselines, prior work on deep vs. shallow judging has largely argued for shallowed judging, but assuming random topic selection. We argue that for evaluating any topic selection method, ultimately one must ask whether it is actually useful to select topics, or should one simply perform shallow judging over many topics? In seeking a rigorous answer to this over-arching question, we conduct a comprehensive investigation over a set of relevant factors never previously studied together: 1) method of topic selection; 2) the effect of topic familiarity on human judging speed; and 3) how different topic generation processes (requiring varying human effort) impact (i) budget utilization and (ii) the resultant quality of judgments. Experiments on NIST TREC Robust 2003 and Robust 2004 test collections show that not only can we reliably evaluate IR systems with fewer topics, but also that: 1) when topics are intelligently selected, deep judging is often more cost-effective than shallow judging in evaluation reliability; and 2) topic familiarity and topic generation costs greatly impact the evaluation cost vs. reliability trade-off. Our findings challenge conventional wisdom in showing that deep judging is often preferable to shallow judging when topics are selected intelligently.  相似文献   

18.
The purpose of this analysis was to evaluate an existing set of search tasks in terms of their effectiveness as part of a “shared infrastructure” for conducting interactive IR research. Twenty search tasks that varied in their cognitive complexity and domain were assigned to 47 study participants; the 3,101 moves used to complete those tasks were then analyzed in terms of frequency of each type of move and the sequential patterns they formed. The cognitive complexity of the tasks influenced the number of moves used to complete the tasks, with the most complex (i.e., Create) tasks requiring more moves than tasks at other levels of complexity. Across the four domains, the Commerce tasks elicited more search moves per search. When sequences of moves were analyzed, seven patterns were identified; some of these patterns were associated with particular task characteristics. The findings suggest that search tasks can be designed to elicit particular types of search behaviors and, thus, allow researchers to focus attention on particular aspects of IR interactions.  相似文献   

19.
This paper is consecrated to the feedback stabilization of the rotating disk-beam system. The beam is assumed to be non-uniform and clamped at its left-end to the center of the disk where a torque control takes place, while a memory boundary control is acting at the right-end of the beam. First, the usual torque control is proposed, whereas the boundary control is designed by taking into account a special type of a memory phenomenon, as well as the dynamic features of the input. Sufficient conditions on the angular velocity of the disk and the memory term are derived to guarantee the existence and uniqueness of solutions of the system. Furthermore, the frequency domain method is utilized in order to achieve the exponential stability of the closed-loop system. The relevance of the theoretical outcomes is shown through several numerical simulations.  相似文献   

20.
This paper investigates the modified tracking performance limitation of the networked time-delay systems with two-channel constraints. We consider both the white Gaussian noise and packet dropout constraints in the communication channels. In the plant, the non-minimum phase, unstable poles and time-delay are considered. The modified tracking performance limitation expressions will be achieved using the co-prime factorization and the spectral decomposition technique, and the two-parameter controller is adopted. The results show that the modified tracking performance limitation is related to the intrinsic properties of the given plant, including the non-minimum phase zeroes, the unstable poles and the time-delay. Furthermore, the network communication parameters, e.g. the white Gaussian noise, the packet-dropouts probability and the modified factor affect the modified tracking performance limitation of the networked time-delay systems. Finally, some particular examples are provided to illustrate the efficiency of the proposed method.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号