期刊文献+
共找到68篇文章
< 1 2 4 >
每页显示 20 50 100
K-GCN for Identifying Key Nodes in Complex Networks
1
作者 Lin DONG Yufeng LU 《Journal of Mathematical Research with Applications》 2025年第2期260-274,共15页
Accurately identifying key nodes is essential for evaluating network robustness and controlling information propagation in complex network analysis. However, current research methods face limitations in applicability ... Accurately identifying key nodes is essential for evaluating network robustness and controlling information propagation in complex network analysis. However, current research methods face limitations in applicability and accuracy. To address these challenges, this study introduces the K-GCN model, which integrates neighborhood k-shell distribution analysis with Graph Convolutional Network(GCN) technology to enhance key node identification in complex networks. The K-GCN model first leverages neighborhood k-shell distributions to calculate entropy values for each node, effectively quantifying node importance within the network. These entropy values are then used as key features within the GCN, which subsequently formulates intelligent strategies to maximize network connectivity disruption by removing a minimal set of nodes, thereby impacting the overall network architecture. Through iterative interactions with the environment, the GCN continuously refines its strategies, achieving precise identification of key nodes in the network. Unlike traditional methods, the K-GCN model not only captures local node features but also integrates the network structure and complex interrelations between neighboring nodes, significantly improving the accuracy and efficiency of key node identification.Experimental validation in multiple real-world network scenarios demonstrates that the K-GCN model outperforms existing methods. 展开更多
关键词 key nodes complex networks K-SHELL GCN
原文传递
Predicting Complex Word Emotions and Topics through a Hierarchical Bayesian Network 被引量:2
2
作者 Kang Xin Ren Fuji 《China Communications》 SCIE CSCD 2012年第3期99-109,共11页
In this paper, we provide a Word Emotion Topic (WET) model to predict the complex word e- motion information from text, and discover the dis- trbution of emotions among different topics. A complex emotion is defined... In this paper, we provide a Word Emotion Topic (WET) model to predict the complex word e- motion information from text, and discover the dis- trbution of emotions among different topics. A complex emotion is defined as the combination of one or more singular emotions from following 8 basic emotion categories: joy, love, expectation, sur- prise, anxiety, sorrow, anger and hate. We use a hi- erarchical Bayesian network to model the emotions and topics in the text. Both the complex emotions and topics are drawn from raw texts, without con- sidering any complicated language features. Our ex- periment shows promising results of word emotion prediction, which outperforms the traditional parsing methods such as the Hidden Markov Model and the Conditional Random Fields(CRFs) on raw text. We also explore the topic distribution by examining the emotion topic variation in an emotion topic diagram. 展开更多
关键词 word emotion classification complex e-motion emotion intensity prediction emotion-topicvariation hierarchical Bayesian network
在线阅读 下载PDF
RESEARCH ON KEY NODES OF WIRELESS SENSOR NETWORK BASED ON COMPLEX NETWORK THEORY
3
作者 Ma Chuang Liu Hongwei Zuo Decheng Wu Zhibo Yang Xiaozong 《Journal of Electronics(China)》 2011年第3期396-401,共6页
On the basis of complex network theory, the issues of key nodes in Wireless Sensor Networks (WSN) are discussed. A model expression of sub-network fault in WSN is given at first; subsequently, the concepts of average ... On the basis of complex network theory, the issues of key nodes in Wireless Sensor Networks (WSN) are discussed. A model expression of sub-network fault in WSN is given at first; subsequently, the concepts of average path length and clustering coefficient are introduced. Based on the two concepts, a novel attribute description of key nodes related to sub-networks is proposed. Moreover, in terms of node deployment density and transmission range, the concept of single-point key nodes and generalized key nodes of WSN are defined, and their decision theorems are investigated. 展开更多
关键词 Wireless Sensor network (WSN) key nodes Fault model complex network theory
在线阅读 下载PDF
Identification of key recovering node for spatial networks
4
作者 严子健 夏永祥 +3 位作者 郭丽君 祝令哲 梁圆圆 涂海程 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第6期698-704,共7页
Many networks in the real world have spatial attributes, such as location of nodes and length of edges, called spatial networks. When these networks are subject to some random or deliberate attacks, some nodes in the ... Many networks in the real world have spatial attributes, such as location of nodes and length of edges, called spatial networks. When these networks are subject to some random or deliberate attacks, some nodes in the network fail, which causes a decline in the network performance. In order to make the network run normally, some of the failed nodes must be recovered. In the case of limited recovery resources, an effective key node identification method can find the key recovering node in the failed nodes, by which the network performance can be recovered most of the failed nodes. We propose two key recovering node identification methods for spatial networks, which are the Euclidean-distance recovery method and the route-length recovery method. Simulations on homogeneous and heterogeneous spatial networks show that the proposed methods can significantly recover the network performance. 展开更多
关键词 complex networks spatial networks CONGESTION key recovering node
原文传递
A Layer-Cluster Key Agreement Protocol for Ad Hoc Networks
5
作者 章丽平 崔国华 +2 位作者 雷建云 许静芳 卢社阶 《Journal of Southwest Jiaotong University(English Edition)》 2008年第4期346-351,共6页
Mobile ad hoc networks create additional challenges for implementing the group key establishment due to resource constraints on nodes and dynamic changes on topology. The nodes in mobile ad hoc networks are usually lo... Mobile ad hoc networks create additional challenges for implementing the group key establishment due to resource constraints on nodes and dynamic changes on topology. The nodes in mobile ad hoc networks are usually low power devices that run on battery power. As a result, the costs of the node resources should be minimized when constructing a group key agreement protocol so that the battery life could be prolonged. To achieve this goal, in this paper we propose a security efficient group key agreement protocol based on Burmester-Desmedt (BD) scheme and layer-cluster group model, referred to as LCKM-BD, which is appropriate for large mobile ad hoe networks. In the layer-cluster group model, BD scheme is employed to establish group key, which can not only meet security demands of mobile ad hoc networks but also improve executing performance. Finally, the proposed protocol LCKM-BD are compared with BD, TGDH (tree-based group Diffe-Hellman), and GDH (group Diffie-Hellman) group key agreement protocols. The analysis results show that our protocol can significantly decrease both the computational overhead and communication costs with respect to these comparable protocols. 展开更多
关键词 Ad hoe networks Group key agreement BD Layer-cluster Security complexITY
在线阅读 下载PDF
Structures and dynamics of scientific knowledge networks:An empirical analysis based on a co-word network 被引量:1
6
作者 WANG Xiaoguang JIANG Tingting LI Xiaoyu 《Chinese Journal of Library and Information Science》 2010年第3期19-36,共18页
Co-word networks are constructed with author-provided keywords in academic publications and their relations of co-occurrence.As special form of scientific knowledge networks,they represent the cognitive structure of s... Co-word networks are constructed with author-provided keywords in academic publications and their relations of co-occurrence.As special form of scientific knowledge networks,they represent the cognitive structure of scientific literature.This paper analyzes the complex structure of a co-word network based on 8,190 author-provided keywords extracted from 3,651 papers in five Chinese core journals in the field of management science.Small-world and scale-free phenomena are found in this network.A large-scale co-word network graph,which consists of one major giant component and many small isolated components,has been generated with the GUESS software.The dynamic growth of keywords and keyword co-occurrence relationships are described with four new informetrics measures.The results indicate that existing concepts always serve as the intellectual base of new ideas as represented by keywords. 展开更多
关键词 Knowledge network Co-word network complex network Visualization Dynamics Small-world Scale-free
原文传递
Vulnerability analysis for airport networks based on fuzzy soft sets: From the structural and functional perspective 被引量:8
7
作者 Li Shanmei Xu Xiaohao 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2015年第3期780-788,共9页
Abstract Recently, much attention has been paid to the reliability and vulnerability of critical infrastructure. In air traffic systems, the vulnerability analysis for airport networks can be used to guide air traffic... Abstract Recently, much attention has been paid to the reliability and vulnerability of critical infrastructure. In air traffic systems, the vulnerability analysis for airport networks can be used to guide air traffic administrations in their prioritization of the maintenance and repair of airports, as well as to avoid unnecessary disturbances in the planning of flight schedules. In this paper, the evaluation methods of airport importance and network efficiency arc established. Firstly, the evaluation indices of airport importance are proposed from both the topological and functional perspectives. The topological characteristics come from the structure of airport network and the functional features stem from the traffic flow distribution taking place inside the network. Secondly, an integrated evaluation method based on fuzzy soft set theory is proposed to identify the key airports, which can fuse together importance indices over different time intervals. Thirdly, an airport network efficiency method is established for the purpose of assessing the accuracy of the evaluation method. Finally, empirical studies using real traffic data of US and China's airport networks show that the evaluation method proposed in this papcr is the most accuratc. Thc vulucrability of US and China's airport networks is compared. The similarities and differences between airport geography distribution and airport importance distribution are discussed here and the dynamics of airport importance is studied as well. 展开更多
关键词 Air traffic Airport network complex networkFuzzy soft sets key node
原文传递
Effect of HIV-1 Tat on Secretion of TNF-α and IL-1β by U87 Cells in AIDS Patients with or without AIDS Dementia Complex 被引量:5
8
作者 ZHAO Li PU Shuang Shuang +5 位作者 GAO Wen Hua CHI Yuan Yuan WEN Hong Ling WANG Zhi Yu SONG Yan Yan YU Xue Jie 《Biomedical and Environmental Sciences》 SCIE CAS CSCD 2014年第2期111-117,共7页
Objective To explore the role of HIV-1 tat gene variations in AIDS dementia complex (ADC) pathogenesis. Methods HIV-1 tat genes derived from peripheral spleen and central basal ganglia of an AIDS patient with ADC an... Objective To explore the role of HIV-1 tat gene variations in AIDS dementia complex (ADC) pathogenesis. Methods HIV-1 tat genes derived from peripheral spleen and central basal ganglia of an AIDS patient with ADC and an AIDS patient without ADC were cloned for sequence analysis. HIV-1 tat gene sequence alignment was performed by using CLUSTAL W and the phylogentic analysis was conducted by using Neighbor-joining with MEGA4 software. All tat genes were used to construct recombinant retroviral expressing vector MSCV-IRES-GFP/tat. The MSCV-IRES-GFP/tat was cotransfected into 293T cells with pCMV-VSV-G and pUMVC vectors to assemble the recombinant retrovirus. After infection of gliomas U87 cells with equal amount of the recombinant retrovirus, TNF-α, and IL-1β concentrations in the supernatant of U87 cells were determined with ELISA. Results HIV-1 tat genes derived from peripheral spleen and central basal ganglia of the AIDS patient with ADC and the other one without ADC exhibited genetic variations. Tat variations and amino acid mutation sites existed mainly at Tat protein core functional area (38-47aa). All Tat proteins could induce ug7 cells to produce TNF-α and IL-1β, but the level of IL-1β production was different among Tat proteins derived from the ADC patient's spleen, basal ganglia, and the non-ADC patient's spleen. The level of Tat proteins derived from the ADC patient's spleen, basal ganglia, and the non-ADC patient's spleen were obviously higher than that from the non-ADC patient's basal ganglia. Conclusion Tat protein core functional area (38-47aa) may serve as the key area of enhancing the secretion of IL-1β. This may be related with the neurotoxicity of HIV-1 Tat. 展开更多
关键词 key words: HIV-1 tat gene AIDS dementia complex Cytokines TNF-Α IL-1Β NEUROTOXICITY
暂未订购
Neural Network Based Scheduling for Variable-Length Packets in Gigabit Router with Crossbar Switch Fabric and Input Queuing
9
作者 Li Sheng\|hong, Xue Zhi, Li Jian\|hua, Zhu Hong\|wen Department of Electronic Engineering, Shanghai Jiaotong University, Shanghai 200030, China 《Wuhan University Journal of Natural Sciences》 EI CAS 2002年第3期313-318,共6页
A high-speed and effective packet scheduling method is crucial to the performance of Gigabit routers. The paper studies the variable-length packet scheduling problem in Gigabit router with crossbar switch fabric and i... A high-speed and effective packet scheduling method is crucial to the performance of Gigabit routers. The paper studies the variable-length packet scheduling problem in Gigabit router with crossbar switch fabric and input queuing, and a scheduling method based on neural network is proposed. For the proposed method, a scheduling system structure fit for the variable-length packet case is presented first, then some rules for scheduling are given. At last, an optimal scheduling method using Hopfield neural network is proposed based on the rules. Furthermore, the paper discusses that the proposed method can be realized by hardware circuit. The simulation result shows the effectiveness of the proposed method. 展开更多
关键词 key words scheduling neural networks input queuing gigabit router
在线阅读 下载PDF
Finding Key Node Sets in Complex Networks Based on Improved Discrete Fireworks Algorithm 被引量:11
10
作者 LIU Fengzeng XIAO Bing LI Hao 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2021年第3期1014-1027,共14页
Finding out the key node sets that affect network robustness has great practical significance for network protection and network disintegration.In this paper,the problem of finding key node sets in complex networks is... Finding out the key node sets that affect network robustness has great practical significance for network protection and network disintegration.In this paper,the problem of finding key node sets in complex networks is defined firstly.Because it is an NP-hard combinatorial optimization problem,discrete fireworks algorithm is introduced to search the optimal solution,which is a swarm intelligence algorithm and is improved by the prior information of networks.To verify the effect of improved discrete fireworks algorithm(IDFA),experiments are carried out on various model networks and real power grid.Results show that the proposed IDFA is obviously superior to the benchmark algorithms,and networks suffer more damage when the key node sets obtained by IDFA are removed from the networks.The key node sets found by IDFA contain a large number of non-central nodes,which provides the authors a new perspective that the seemingly insignificant nodes may also have an important impact on the robustness of the network. 展开更多
关键词 complex networks discrete fireworks algorithm key node sets network robustness node centrality
原文传递
Frequency-bin-encoded entanglement-based quantum key distribution in a reconfigurable frequency-multiplexed network 被引量:2
11
作者 Anahita Khodadad Kashi Michael Kues 《Light: Science & Applications》 2025年第2期441-456,共16页
Large-scale quantum networks require dynamic and resource-efficient solutions to reduce system complexity with maintained security and performance to support growing number of users over large distances.Current encodi... Large-scale quantum networks require dynamic and resource-efficient solutions to reduce system complexity with maintained security and performance to support growing number of users over large distances.Current encoding schemes including time-bin,polarization,and orbital angular momentum,suffer from the lack of reconfigurability and thus scalability issues.Here,we demonstrate the first-time implementation of frequency-bin-encoded entanglement-based quantum key distribution and a reconfigurable distribution of entanglement using frequency-bin encoding.Specifically,we demonstrate a novel scalable frequency-bin basis analyzer module that allows for a passive random basis selection as a crucial step in quantum protocols,and importantly equips each user with a single detector rather than four detectors.This minimizes massively the resource overhead,reduces the dark count contribution,vulnerability to detector side-channel attacks,and the detector imbalance,hence providing an enhanced security.Our approach offers an adaptive frequency-multiplexing capability to increase the number of channels without hardware overhead,enabling increased secret key rate and reconfigurable multi-user operations.In perspective,our approach enables dynamic resource-minimized quantum key distribution among multiple users across diverse network topologies,and facilitates scalability to large-scale quantum networks. 展开更多
关键词 entanglement based reconfigurable distribution quantum networks orbital angular momentumsuffer quantum key distribution RECONFIGURABLE reduce system complexity frequency bin encoded
原文传递
情报学领域关键词同现网络结构研究 被引量:27
12
作者 耿志杰 朱学芳 王文鼐 《情报科学》 CSSCI 北大核心 2010年第8期1179-1182,1202,共5页
通过对关键词同现网络结构的研究,有助于分析研究领域内的一些关联特征。本文建立了CSSCI收录的2005-2007年情报学领域相关文献的关键词同现网络,使用复杂网络理论方法对该网络拓扑结构和加权结构的网络特性进行了分析,这些网络特性... 通过对关键词同现网络结构的研究,有助于分析研究领域内的一些关联特征。本文建立了CSSCI收录的2005-2007年情报学领域相关文献的关键词同现网络,使用复杂网络理论方法对该网络拓扑结构和加权结构的网络特性进行了分析,这些网络特性对分析情报学领域的科研特征具有重要参考价值。 展开更多
关键词 关键词同现网络 复杂网络 拓扑结构 加权网络
原文传递
基于复杂网络的微博舆情分析 被引量:40
13
作者 唐晓波 宋承伟 《情报学报》 CSSCI 北大核心 2012年第11期1153-1162,共10页
微博作为迅速崛起的新兴社会媒体,在网络舆情领域日益引起研究者的关注。为了弥补传统网络舆情分析的不足,本文将共词网络分析和复杂网络的思想与方法拓展到微博舆情分析中,并设计了基于网络可视化的微博舆情分析模型。并通过实证分... 微博作为迅速崛起的新兴社会媒体,在网络舆情领域日益引起研究者的关注。为了弥补传统网络舆情分析的不足,本文将共词网络分析和复杂网络的思想与方法拓展到微博舆情分析中,并设计了基于网络可视化的微博舆情分析模型。并通过实证分析对其效果进行验证,发现共词网络可有效探测舆论热点,复杂网络在舆论领袖发现中也可取得较好效果。本文为基于微博的网络舆情分析提供了有效的可视化途径,探索和拓展了其研究方法,并提供了有益借鉴。 展开更多
关键词 共词网络 复杂网络 微博 网络舆情
在线阅读 下载PDF
中国沿海港口网络空间结构的复杂性研究 被引量:16
14
作者 宗刚 胡蓓蓓 韩建飞 《中国软科学》 CSSCI 北大核心 2012年第12期171-178,共8页
基于复杂网络理论,系统分析了中国沿海港口网络的度分布、网络集聚系数、平均路径长度、可达性及其相互关联性。结果表明中国沿海港口网络空间结构特征差异明显,表现出较强的集聚性,其度累计概率分布表现为具有置信度较高的指数分布,且... 基于复杂网络理论,系统分析了中国沿海港口网络的度分布、网络集聚系数、平均路径长度、可达性及其相互关联性。结果表明中国沿海港口网络空间结构特征差异明显,表现出较强的集聚性,其度累计概率分布表现为具有置信度较高的指数分布,且具有较小的路径长度和较大的集聚系数,整体结构呈现"小世界网络"特点。并结合实际的自然,社会因素对其进行分析,为今后港口建设规划和航线分布提供有力的理论支持。 展开更多
关键词 复杂网络 关联性分析 小世界网络 中国沿海港口
在线阅读 下载PDF
重复购买行为与新产品创新扩散——基于产品复杂性的视角 被引量:9
15
作者 郭斌 郭琳 汪玥琦 《浙江大学学报(人文社会科学版)》 CSSCI 北大核心 2014年第3期88-99,共12页
新产品扩散研究目前大多数是基于单次采纳行为的研究,而对重复购买行为及其对新产品创新扩散的影响关注不足。通过将产品复杂性视角引入采纳者与非采纳者的动态知识转移过程,建立基于无标度网络结构的三阶段扩散仿真模型来分析重复购买... 新产品扩散研究目前大多数是基于单次采纳行为的研究,而对重复购买行为及其对新产品创新扩散的影响关注不足。通过将产品复杂性视角引入采纳者与非采纳者的动态知识转移过程,建立基于无标度网络结构的三阶段扩散仿真模型来分析重复购买对新产品扩散的影响后发现:第一,重复购买对新产品扩散规模和扩散速度的影响并不是简单地随重复购买比例的提高而增加;第二,产品复杂性对重复购买与新产品的扩散规模和扩散速度起到相反的调节作用;第三,当负面口碑的作用减弱时,重复购买对新产品扩散速度的影响会降低。 展开更多
关键词 新产品扩散 重复购买 产品复杂性 复杂网络 系统仿真 负面口碑
原文传递
基于复杂网络的汉语相似词挖掘和相似度计算研究 被引量:5
16
作者 韩普 王东波 朱恒民 《情报学报》 CSSCI 北大核心 2015年第8期885-896,共12页
相似词是自然语言中普遍存在的现象,词汇相似度计算是情报学、自然语言处理和信息处理等领域的一项中间步骤。首先,基于大规模语料库构建了汉语词汇共现网络,进而利用复杂网络结构中节点相似的思想来计算词汇的相似度。其次,基于分... 相似词是自然语言中普遍存在的现象,词汇相似度计算是情报学、自然语言处理和信息处理等领域的一项中间步骤。首先,基于大规模语料库构建了汉语词汇共现网络,进而利用复杂网络结构中节点相似的思想来计算词汇的相似度。其次,基于分布假设、上下文语境理论和词汇网络结构的特点,本文提出了基于贡献度折扣的词汇相似度计算方法,该方法不仅考虑了网络边的权重信息,还将节点的全局度特征融合进来。通过节点相似度实验发现,本文提出的基于贡献度折扣的相似度算法要明显好于共同邻居法、Jaccard方法和Sahon方法。最后文章就实验结果及其结论做了详细分析。 展开更多
关键词 复杂网络 语料库 词汇相似度 语义相关度
在线阅读 下载PDF
基于关键词共现网络的我国图情领域近三十年学科发展脉络分析 被引量:18
17
作者 彭陶 王建冬 孙慧明 《大学图书馆学报》 CSSCI 北大核心 2012年第2期29-34,共6页
选取图书馆学、情报学领域各4种核心期刊,构建近30年的关键词共现网络,引入学科隶属度和G-N聚类算法,对图书馆学、情报学领域的知识地图进行共时和历时分析。研究发现:该领域的关键词共现网络符合复杂网络的基本特征。共时分析发现:可... 选取图书馆学、情报学领域各4种核心期刊,构建近30年的关键词共现网络,引入学科隶属度和G-N聚类算法,对图书馆学、情报学领域的知识地图进行共时和历时分析。研究发现:该领域的关键词共现网络符合复杂网络的基本特征。共时分析发现:可将该领域划分为10个板块;属于情报学的5个(信息组织、信息检索、文献计量学、用户研究与服务、网络技术);属于图书馆学的4个(信息资源建设、文献学、资源共建共享、图书馆事业);两学科关注度相当的1个(开放存取)。历时分析发现:1990年以前图书馆学研究的体系性更强;1990-2000年,情报学的发展态势强于图书馆学;2000年后图书馆学则强于情报学。 展开更多
关键词 图书馆学 情报学 共词网络 领域分析 复杂网络 聚类分析 学科隶属度
在线阅读 下载PDF
基于复杂社会网络的服务质量口碑传播 被引量:8
18
作者 李林 孙军华 周章金 《系统工程》 CSCD 北大核心 2009年第6期1-7,共7页
对复杂网络结构和功能的理解成为解释生物学、科学技术和社会学中各种不同客观现象的基础。本文利用复杂网络传播的有关理论,结合服务质量口碑传播的特点提出了服务质量口碑传播演化模型,并将模型在基于电话通话记录建立了的社会网进行... 对复杂网络结构和功能的理解成为解释生物学、科学技术和社会学中各种不同客观现象的基础。本文利用复杂网络传播的有关理论,结合服务质量口碑传播的特点提出了服务质量口碑传播演化模型,并将模型在基于电话通话记录建立了的社会网进行模拟研究,得出了有意义的结果,为有关管理经验提供了定量化的解释。本文采用的方法论和实证结果可为网络的传播及相关的管理问题研究提供参考。 展开更多
关键词 复杂社会网络 服务质量 口碑传播 演化模型
原文传递
汉语复句关系词搭配网中的小世界效应和无标度特征 被引量:3
19
作者 胡泉 刘延申 +1 位作者 谢芳 邓君丽 《武汉大学学报(工学版)》 CAS CSCD 北大核心 2014年第6期859-864,共6页
采用复杂网络的方法对"复句关系词本体知识库"中457个搭配关系进行研究,构建了一个现代汉语的"复句关系词搭配网",并对该网络中的最短路径、平均聚集系数和度分布情况进行分析研究.研究结果表明,"复句关系词... 采用复杂网络的方法对"复句关系词本体知识库"中457个搭配关系进行研究,构建了一个现代汉语的"复句关系词搭配网",并对该网络中的最短路径、平均聚集系数和度分布情况进行分析研究.研究结果表明,"复句关系词搭配网"具有复杂网络的典型特征,而且其小世界效应和无标度特征反映了复句关系词的搭配能力和搭配对象的同现关系,这些特性能够对复句层次关系和逻辑语义关系的自动识别起到重要的作用. 展开更多
关键词 复杂网络 汉语复句 关系词搭配网 小世界效应 无标度特征
原文传递
科学知识网络的形成与演化(Ⅰ):共词网络方法的提出 被引量:89
20
作者 王晓光 《情报学报》 CSSCI 北大核心 2009年第4期599-605,共7页
知识网络观已经被情报学界普遍接受。已往的科学知识网络研究多以引文关系和合著关系为线索,其结果揭示的是科学界高阶的学科结构和智力结构,而非知识概念结构。为了在微观层面上揭示科学知识网络的形成与演化机理,我们将目光关注在了... 知识网络观已经被情报学界普遍接受。已往的科学知识网络研究多以引文关系和合著关系为线索,其结果揭示的是科学界高阶的学科结构和智力结构,而非知识概念结构。为了在微观层面上揭示科学知识网络的形成与演化机理,我们将目光关注在了文章关键词与关键词共现关系上。通过回顾认知地图、科学知识领域绘图与共词分析三个领域的发展历史,本文提出了共词网络方法,并以此为基础分析了科学知识体系的网络结构和知识单元的增长模式。借助对共词网络的结构与演化过程的分析,本文首次从词汇维度定性解释了科学知识网络的形成与演化机理。 展开更多
关键词 知识网络 共词网络 复杂网络 网络演化
在线阅读 下载PDF
上一页 1 2 4 下一页 到第
使用帮助 返回顶部