Search results

1 – 10 of 279
Article
Publication date: 22 February 2024

Yuzhuo Wang, Chengzhi Zhang, Min Song, Seongdeok Kim, Youngsoo Ko and Juhee Lee

In the era of artificial intelligence (AI), algorithms have gained unprecedented importance. Scientific studies have shown that algorithms are frequently mentioned in papers…

81

Abstract

Purpose

In the era of artificial intelligence (AI), algorithms have gained unprecedented importance. Scientific studies have shown that algorithms are frequently mentioned in papers, making mention frequency a classical indicator of their popularity and influence. However, contemporary methods for evaluating influence tend to focus solely on individual algorithms, disregarding the collective impact resulting from the interconnectedness of these algorithms, which can provide a new way to reveal their roles and importance within algorithm clusters. This paper aims to build the co-occurrence network of algorithms in the natural language processing field based on the full-text content of academic papers and analyze the academic influence of algorithms in the group based on the features of the network.

Design/methodology/approach

We use deep learning models to extract algorithm entities from articles and construct the whole, cumulative and annual co-occurrence networks. We first analyze the characteristics of algorithm networks and then use various centrality metrics to obtain the score and ranking of group influence for each algorithm in the whole domain and each year. Finally, we analyze the influence evolution of different representative algorithms.

Findings

The results indicate that algorithm networks also have the characteristics of complex networks, with tight connections between nodes developing over approximately four decades. For different algorithms, algorithms that are classic, high-performing and appear at the junctions of different eras can possess high popularity, control, central position and balanced influence in the network. As an algorithm gradually diminishes its sway within the group, it typically loses its core position first, followed by a dwindling association with other algorithms.

Originality/value

To the best of the authors’ knowledge, this paper is the first large-scale analysis of algorithm networks. The extensive temporal coverage, spanning over four decades of academic publications, ensures the depth and integrity of the network. Our results serve as a cornerstone for constructing multifaceted networks interlinking algorithms, scholars and tasks, facilitating future exploration of their scientific roles and semantic relations.

Details

Aslib Journal of Information Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2050-3806

Keywords

Book part
Publication date: 19 April 2024

Lars Mjøset, Roel Meijer, Nils Butenschøn and Kristian Berg Harpviken

This study employs Stein Rokkan's methodological approach to analyse state formation in the Greater Middle East. It develops a conceptual framework distinguishing colonial…

Abstract

This study employs Stein Rokkan's methodological approach to analyse state formation in the Greater Middle East. It develops a conceptual framework distinguishing colonial, populist and democratic pacts, suitable for analysis of state formation and nation-building through to the present period. The framework relies on historical institutionalism. The methodology, however, is Rokkan's. The initial conceptual analysis also specifies differences between European and the Middle Eastern state formation processes. It is followed by a brief and selective discussion of historical preconditions. Next, the method of plotting singular cases into conceptual-typological maps is applied to 20 cases in the Greater Middle East (including Afghanistan, Iran and Turkey). For reasons of space, the empirical analysis is limited to the colonial period (1870s to the end of World War 1). Three typologies are combined into one conceptual-typological map of this period. The vertical left-hand axis provides a composite typology that clarifies cultural-territorial preconditions. The horizontal axis specifies transformations of the region's agrarian class structures since the mid-19th century reforms. The right-hand vertical axis provides a four-layered typology of processes of external intervention. A final section presents selected comparative case reconstructions. To the authors' knowledge, this is the first time such a Rokkan-style conceptual-typological map has been constructed for a non-European region.

Details

A Comparative Historical and Typological Approach to the Middle Eastern State System
Type: Book
ISBN: 978-1-83753-122-6

Keywords

Article
Publication date: 20 November 2023

Chao Zhang, Fang Wang, Yi Huang and Le Chang

This paper aims to reveal the interdisciplinarity of information science (IS) from the perspective of the evolution of theory application.

Abstract

Purpose

This paper aims to reveal the interdisciplinarity of information science (IS) from the perspective of the evolution of theory application.

Design/methodology/approach

Select eight representative IS journals as data sources, extract the theories mentioned in the full texts of the research papers and then measure annual interdisciplinarity of IS by conducting theory co-occurrence network analysis, diversity measure and evolution analysis.

Findings

As a young and vibrant discipline, IS has been continuously absorbing and internalizing external theoretical knowledge and thus formed a high degree of interdisciplinarity. With the continuous application of some kernel theories, the interdisciplinarity of IS appears to be decreasing and gradually converging into a few neighboring disciplines. Influenced by big data and artificial intelligence, the research paradigm of IS is shifting from a theory centered one to a technology centered one.

Research limitations/implications

This study helps to understand the evolution of the interdisciplinarity of IS in the past 21 years. The main limitation is that the data were collected from eight journals indexed by the Social Sciences Citation Index and a small amount of theories might have been omitted.

Originality/value

This study identifies the kernel theories in IS research, measures the interdisciplinarity of IS based on the evolution of the co-occurrence network of theory source disciplines and reveals the paradigm shift being happening in IS.

Details

Journal of Documentation, vol. 80 no. 2
Type: Research Article
ISSN: 0022-0418

Keywords

Article
Publication date: 19 December 2023

Guilherme Dayrell Mendonça, Stanley Robson de Medeiros Oliveira, Orlando Fontes Lima Jr and Paulo Tarso Vilela de Resende

The objective of this paper is to evaluate whether the data from consignors, logistics service providers (LSPs) and consignees contribute to the prediction of air transport…

Abstract

Purpose

The objective of this paper is to evaluate whether the data from consignors, logistics service providers (LSPs) and consignees contribute to the prediction of air transport shipment delays in a machine learning application.

Design/methodology/approach

The research database contained 2,244 air freight intercontinental shipments to 4 automotive production plants in Latin America. Different algorithm classes were tested in the knowledge discovery in databases (KDD) process: support vector machine (SVM), random forest (RF), artificial neural networks (ANN) and k-nearest neighbors (KNN).

Findings

Shipper, consignee and LSP data attribute selection achieved 86% accuracy through the RF algorithm in a cross-validation scenario after a combined class balancing procedure.

Originality/value

These findings expand the current literature on machine learning applied to air freight delay management, which has mostly focused on weather, airport structure, flight schedule, ground delay and congestion as explanatory attributes.

Details

International Journal of Physical Distribution & Logistics Management, vol. 54 no. 1
Type: Research Article
ISSN: 0960-0035

Keywords

Article
Publication date: 16 January 2023

Faisal Lone, Harsh Kumar Verma and Krishna Pal Sharma

The purpose of this study is to extensively explore the vehicular network paradigm, challenges faced by them and provide a reasonable solution for securing these vulnerable…

Abstract

Purpose

The purpose of this study is to extensively explore the vehicular network paradigm, challenges faced by them and provide a reasonable solution for securing these vulnerable networks. Vehicle-to-everything (V2X) communication has brought the long-anticipated goal of safe, convenient and sustainable transportation closer to reality. The connected vehicle (CV) paradigm is critical to the intelligent transportation systems vision. It imagines a society free of a troublesome transportation system burdened by gridlock, fatal accidents and a polluted environment. The authors cannot overstate the importance of CVs in solving long-standing mobility issues and making travel safer and more convenient. It is high time to explore vehicular networks in detail to suggest solutions to the challenges encountered by these highly dynamic networks.

Design/methodology/approach

This paper compiles research on various V2X topics, from a comprehensive overview of V2X networks to their unique characteristics and challenges. In doing so, the authors identify multiple issues encountered by V2X communication networks due to their open communication nature and high mobility, especially from a security perspective. Thus, this paper proposes a trust-based model to secure vehicular networks. The proposed approach uses the communicating nodes’ behavior to establish trustworthy relationships. The proposed model only allows trusted nodes to communicate among themselves while isolating malicious nodes to achieve secure communication.

Findings

Despite the benefits offered by V2X networks, they have associated challenges. As the number of CVs on the roads increase, so does the attack surface. Connected cars provide numerous safety-critical applications that, if compromised, can result in fatal consequences. While cryptographic mechanisms effectively prevent external attacks, various studies propose trust-based models to complement cryptographic solutions for dealing with internal attacks. While numerous trust-based models have been proposed, there is room for improvement in malicious node detection and complexity. Optimizing the number of nodes considered in trust calculation can reduce the complexity of state-of-the-art solutions. The theoretical analysis of the proposed model exhibits an improvement in trust calculation, better malicious node detection and fewer computations.

Originality/value

The proposed model is the first to add another dimension to trust calculation by incorporating opinions about recommender nodes. The added dimension improves the trust calculation resulting in better performance in thwarting attacks and enhancing security while also reducing the trust calculation complexity.

Details

International Journal of Pervasive Computing and Communications, vol. 20 no. 1
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 11 September 2023

Ying Gao, Qiang Zhang, Xiaoran Wang, Yanmei Huang, Fanshuang Meng and Wan Tao

Currently, the Tang tomb mural cultural relic resources are presented in a multi-source and heterogeneous manner, with a lack of effective organization and sharing between…

Abstract

Purpose

Currently, the Tang tomb mural cultural relic resources are presented in a multi-source and heterogeneous manner, with a lack of effective organization and sharing between resources. Therefore, this study aims to propose a multidimensional knowledge discovery solution for Tang tomb mural cultural relic resources.

Design/methodology/approach

Taking the Tang tomb murals collected by the Shaanxi History Museum as an example, based on clarifying the relevant concepts of Tang tomb mural resources and considering both dynamic and static dimensions, a top-down approach was adopted to first construct an ontology model of Tang tomb mural type cultural relics resources. Then, the actual case data was imported into the Neo4J graph database according to the defined pattern hierarchy to complete the static organization of knowledge, and presented in a multimodal form in knowledge reasoning and retrieval. In addition, geographic information system (GIS) technology is used to dynamically display the spatiotemporal distribution of Tang tomb mural resources, and the distribution trend is analysed from a digital humanistic perspective.

Findings

The multi-dimensional knowledge discovery of Tang tomb mural cultural relics resources can help establish the correlation and spatiotemporal relationship between resources, providing support for semantic retrieval and navigation, knowledge discovery and visualization and so on.

Originality/value

This study takes the murals in the collection of the Shaanxi History Museum as an example, revealing potential knowledge associations in a static and intelligent way, achieving knowledge discovery and management of Tang tomb murals, and dynamically presents the spatial distribution of Tang tomb murals through GIS technology, meeting the knowledge presentation needs of different users and opening up new ideas for the study of Tang tomb murals.

Details

The Electronic Library , vol. 42 no. 1
Type: Research Article
ISSN: 0264-0473

Keywords

Article
Publication date: 19 May 2023

Lixin Zhou, Zhenyu Zhang, Laijun Zhao and Pingle Yang

Online open innovation platforms provide opportunities for product users to participate in the innovation process and contribute their ideas to the platform. Nonetheless, they…

Abstract

Purpose

Online open innovation platforms provide opportunities for product users to participate in the innovation process and contribute their ideas to the platform. Nonetheless, they also present a significant challenge for platform managers, who select high-quality innovations from a massive collection of information with diverse quality.

Design/methodology/approach

In this study, the authors employed a machine learning method to automatically collect a real dataset of 2,276 innovations and 30,004 detailed comments from the online platform of IdeaExchange and then conducted empirical experiments to verify the study hypothesis.

Findings

Results show that extraversion, conscientiousness and openness to experience positively and directly influenced the quality of their innovation. Furthermore, an individual's social network position mediated among extraversion, neuroticism, conscientiousness and openness to experience and the quality of an innovation.

Research limitations/implications

Results showed that extraversion, conscientiousness and openness to experience positively and directly influenced the quality of their innovation. Furthermore, an individual's social network position mediated among extraversion, neuroticism, conscientiousness, openness to experience and the quality of innovations.

Originality/value

This study combined the Big Five personality traits theory and social network theory to examine the association between user intrinsic personality traits, social network position and the quality of their innovative ideas in the context of online innovation platforms. Additionally, the findings provide new insights for platform managers on how to select high-quality innovation information by considering user personality traits and their social network position.

Details

Aslib Journal of Information Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2050-3806

Keywords

Article
Publication date: 13 October 2023

Wenxue Wang, Qingxia Li and Wenhong Wei

Community detection of dynamic networks provides more effective information than static network community detection in the real world. The mainstream method for community…

Abstract

Purpose

Community detection of dynamic networks provides more effective information than static network community detection in the real world. The mainstream method for community detection in dynamic networks is evolutionary clustering, which uses temporal smoothness of community structures to connect snapshots of networks in adjacent time intervals. However, the error accumulation issues limit the effectiveness of evolutionary clustering. While the multi-objective evolutionary approach can solve the issue of fixed settings of the two objective function weight parameters in the evolutionary clustering framework, the traditional multi-objective evolutionary approach lacks self-adaptability.

Design/methodology/approach

This paper proposes a community detection algorithm that integrates evolutionary clustering and decomposition-based multi-objective optimization methods. In this approach, a benchmark correction procedure is added to the evolutionary clustering framework to prevent the division results from drifting.

Findings

Experimental results demonstrate the superior accuracy of this method compared to similar algorithms in both real and synthetic dynamic datasets.

Originality/value

To enhance the clustering results, adaptive variances and crossover probabilities are designed based on the relative change amounts of the subproblems decomposed by MOEA/D (A Multiobjective Optimization Evolutionary Algorithm based on Decomposition) to dynamically adjust the focus of different evolutionary stages.

Details

International Journal of Intelligent Computing and Cybernetics, vol. 17 no. 1
Type: Research Article
ISSN: 1756-378X

Keywords

Article
Publication date: 11 September 2023

Zhongmei Zhang, Qingyang Hu, Guanxin Hou and Shuai Zhang

Vehicle companion is one of the most common companion patterns in daily life, which has great value to accident investigation, group tracking, carpooling recommendation and road…

Abstract

Purpose

Vehicle companion is one of the most common companion patterns in daily life, which has great value to accident investigation, group tracking, carpooling recommendation and road planning. Due to the complexity and large scale of vehicle sensor streaming data, existing work were difficult to ensure the efficiency and effectiveness of real-time vehicle companion discovery (VCD). This paper aims to provide a high-quality and low-cost method to discover vehicle companions in real time.

Design/methodology/approach

This paper provides a real-time VCD method based on pro-active data service collaboration. This study makes use of dynamic service collaboration to selectively process data produced by relative sensors, and relax the temporal and spatial constraints of vehicle companion pattern for discovering more potential companion vehicles.

Findings

Experiments based on real and simulated data show that the method can discover 67% more companion vehicles, with 62% less response time comparing with centralized method.

Originality/value

To reduce the amount of processing streaming data, this study provides a Service Collaboration-based Vehicle Companion Discovery method based on proactive data service model. And this study provides a new definition of vehicle companion through relaxing the temporal and spatial constraints for discover companion vehicles as many as possible.

Details

International Journal of Web Information Systems, vol. 19 no. 5/6
Type: Research Article
ISSN: 1744-0084

Keywords

Article
Publication date: 3 February 2023

Ksenia Usanova, Jelena Zikic and Vlad Vaiman

Although the literature on the careers of skilled migrants is growing, relatively little is known about their experiences inside host country organizations. This article is a…

Abstract

Purpose

Although the literature on the careers of skilled migrants is growing, relatively little is known about their experiences inside host country organizations. This article is a replication and an extension of a study by Zikic et al. (2010) on career challenges and coping strategies of skilled migrants. In contrast to the replicated study, where the focus was on the unemployed pool of talented migrants, in this study, the authors look at the career experiences of those who are already employed. Similar to the study of Zikic et al. (2010), the authors seek to explore how migrants understand their careers and what approaches they use to enact career opportunities from the perspective of “insiders” in local organizations.

Design/methodology/approach

The authors used a qualitative explorative approach. Based on 24 in-depth interviews with highly qualified specialists, who were hired for positions in Luxembourg corresponding to their professional profiles, the authors explore what challenges they face at the workplace and how they tackle them.

Findings

This research not only replicates the study of Zikic et al. (2010) but also extends the authors’ knowledge of the careers of skilled migrants in the context of local organizations. By focusing on employed skilled migrants, the authors open a “black box” of their career challenges and strategies and extend an earlier career typology (Zikic et al., 2010) into what happens within local organizations. In particular, this study identifies two major challenges that skilled migrants experience, namely, “trying to fit in” and “managing career mismatch”. Then, it shows three unique strategies that skilled migrants use to manage their careers. This allows us to cluster skilled migrants into three categories that the authors conceptualized, namely “workhorses”, “career rebels” and “career conformists”.

Originality/value

This study contributes to the literature on the careers of skilled migrants by theorizing the experiences of migrant careers after organizational entry. It also contributes to the talent management literature by providing nuanced insights into the challenges, strategies and profiles that this global talent has.

Details

Journal of Global Mobility: The Home of Expatriate Management Research, vol. 11 no. 3
Type: Research Article
ISSN: 2049-8799

Keywords

1 – 10 of 279