首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
基于CiteSpace的图书情报领域云计算研究分析   总被引:1,自引:0,他引:1  
本文分析我国图书情报领域云计算研究的现状、热点和前沿。以CNKI数据库中的核心期刊和CSSCI作为数据源,借助Cite Space科学文献可视化分析工具,对图书情报领域中云计算研究文献数据进行计量分析,绘制了文献作者及机构分布、关键词共现、研究热点分布等知识图谱。将图书情报领域的云计算研究热点归纳为云图书馆、云服务、云安全和云技术四个方面,为图书情报领域的云计算研究提供参考。  相似文献   

2.
孙玉琴 《现代情报》2013,33(10):105-108
本文以中国社会科学引文索引(CSSCI)2005-2012年图书情报领域信息安全的来源文献为研究对象,从发文量、来源期刊、作者、机构、论文等学术竞争力角度进行统计和分析,得出文献发表规律和期刊、作者、机构及论文在信息安全图书情报领域的学术竞争力排名。  相似文献   

3.
基于CSSCI图书情报类期刊论文的电子商务研究统计分析   总被引:1,自引:0,他引:1  
王伟军  王蕾 《情报科学》2006,24(9):1339-1342,1356
本文以中国社会科学引文索引(CSSCI)中的图书情报类源期刊(2004年度)在1998-2005年间所登载的电子商务相关论文为基础,通过对文献的统计分析,揭示了我国图书情报领域对电子商务研究的概况及主要的研究主题,并指出在继续深入研究相关主题的同时,还应重点加强搜索引擎优化、企业信息化、电子商务测评的研究。  相似文献   

4.
我国技术竞争情报研究文献计量分析   总被引:1,自引:0,他引:1  
傅娟  郝伟龙 《现代情报》2011,31(11):116-119
本文应用了文献计量分析的方法,对2006-2010年国内技术竞争情报领域发表的论文进行了统计,并针对论文发表的年度分布、期刊、著者、引文、关键词等方面进行了分析。基于分析结果,总结出我国目前技术情报研究领域的3个特点,即研究主体集中在图书情报学界、更加注重技术竞争情报理论研究、专利分析是该领域的重要内容。最后,总结出我国提高技术情报领域研究能力的几个可行途径,以适应经济全球化、市场竞争日益激烈的新时代的发展需求。  相似文献   

5.
基于知识图谱的我国期刊评价研究评述   总被引:2,自引:0,他引:2  
利用新的文献可视化手段,对1998-2009年主题为期刊评价的CSSCI来源文献分析,分别绘制了作者、关键词、作者共被引、期刊共被引、文献共被引知识图谱。解读和评述了期刊评价领域的特点。h指数、CSSCI、web即年下载率等是热点话题;知识源主要集中在图书馆情报与文献学、新闻与传播学两类学科期刊;核心期刊、人文社会科学期刊、h指数等评价指标研究是期刊评价研究的三个主要知识领域。  相似文献   

6.
多角度对图书情报领域洛特卡分布的验证   总被引:2,自引:0,他引:2  
通过对1997~2006年十年间图书情报领域以及CSSCI收录的8种核心期刊作者著述情况的数理统计分析,从多角度对图书情报领域洛特卡定律进行验证,并基于验证结果得出结论:K-S检验不适用于大样本容量的洛特卡定律拟合检验;学科或主题领域科学文献生产率的lotka拟合需要进行样本的设计和控制.  相似文献   

7.
蒋晨 《现代情报》2011,31(10):28-30
基于CNKI对国内图书情报领域有关"长尾理论"的研究文献,从论文的发表时间、刊源分布、作者合作情况及主题等方面采用文献统计分析方法,揭示我国目前图书情报领域有关长尾理论的研究现状,归纳研究重点,并期待今后对相关研究作进一步的追踪。  相似文献   

8.
赵蓉英  魏明坤 《现代情报》2017,37(10):165-171
国内竞争情报的战略地位不断提升,本文基于CNKI、CSSCI数据库,利用可视化软件,对国内已有文献进行研究,探析国内竞争情报发展演进过程。通过对文献统计分析,发现研究主题的多样化;通过作者共被引分析,发现研究主题发展过程中代表人物及其更替;通过关键词共现分析,探析研究主题的热点演进;通过文献共被引分析,总结国内竞争情报发展的4个核心领域:"竞争情报基础知识研究"、"竞争情报的实践研究"、"竞争情报系统研究"、"竞争情报的跨学科研究",并分析聚类文献群的特征。最后,根据国内竞争情报发展演进过程,归纳我国竞争情报发展过程面对的挑战。  相似文献   

9.
本文利用CNKI数据库通过词频分析法结合共词分析法对2005-2016年我国"科学数据"领域的研究主题进行演化分析。选取2005-2016年"科学数据"领域发表于北大中文核心期刊和CSSCI来源期刊的547篇期刊论文作为数据来源,通过对数似然值结合相对变化率判断关键词词频的相对增长、平稳和下降趋势,识别不同研究时段"科学数据"领域的核心词、突变词和新生词,并结合共词分析法揭示"科学数据"领域相关文献研究主题的动态演化趋势。研究结果表明:2005-2016年我国"科学数据"领域的相关研究从以技术层面的研究主题为主逐渐过渡到管理层面、服务层面和政策层面的研究主题,图书情报领域已逐渐成为我国"科学数据"相关研究的主要学科领域。  相似文献   

10.
姜鑫  马海群 《现代情报》2016,36(4):170-177
本文以CSSCI收录的18种图书情报学期刊发表于2014年的4407篇期刊论文作为数据来源,通过共词聚类分析、战略坐标分析、作者合作分析和作者-关键词耦合分析方法探讨了2014年我国图书情报学领域的研究进展。本文通过共词聚类分析和战略坐标分析确定了2014年我国图书情报学研究的17个重要主题及其演变趋势,通过作者合作分析确定了2014年我国图书情报学领域的科学合作状况及主要合作团体,通过作者-关键词耦合分析确定了高产作者的主要研究领域。  相似文献   

11.
CAS should stick to the principle of rendering service to, and giving impetus for, the development of China's science enterprise by making S&T innovations, said CAS President LU Yongxiang. The CAS president made the remarks in a recent talk to communicate the gist of the winter session of the Party's Leading-member Group at CAS, which was held from 7 to 11 January in Beijing.  相似文献   

12.
This study examined how students who had no prior experience with videoconferencing would react to the use of videoconferencing as an instructional medium. Students enrolled in seven different courses completed a questionnaire at the beginning of the semester and again at the end of the semester. Students at the origination and remote sites did not differ in their reactions toward videoconferencing but there was a significant difference for gender. Women reacted less favorably to videoconferencing. Compared to the beginning of the semester, students reported significantly less positive attitudes toward taking a course through videoconferencing at the end of the semester. There were no significant differences in students' attitudes toward videoconferencing across courses at the beginning of the semester but there were significant differences across the courses at the end of the semester. The results suggest the need for better preparation for both students and instructors.  相似文献   

13.
With great care, Dr. ZHOU Zhonghe takes out a package wrapped by cotton tissue from a drawer and says: "This is the gem of our collections: the fossil of a bird that lived 125 million years ago!" Then, pointing at a tiny mound, he explains: "Look, this is the claw and that is the head. It was in the egg shell and ready to hatch ... The species fell into a family of waterside inhabitants."  相似文献   

14.
Ajoint study by Prof. ZHANG Zhibin from the CAS Institute of Zoology and his co-workers from Norway, US and Swiss have indicated that historical outbreaks of migratory locusts in China were associated with cold spells, suggesting that China's projected climate warming could decrease the pest's numbers. The study was published in Proceedings of theNational Academy of Sciences on 17 September, 2007.  相似文献   

15.
A computer-mediated group is a complex entity whose members exchange many types of information via multiple means of communication in pursuit of goals specific to their environment. Over time, they coordinate technical features of media with locally enacted use to achieve a viable working arrangement. To explore this complex interaction, a case study is presented of the social networks of interactions and media use among members of a class of computer-supported distance learners. Results show how group structures associated with project teams dominated who communicated with whom, about what, and via which media over the term, and how media came to occupy their own communication niches: Webboard for diffuse class-wide communication; Internet Relay Chat more to named others but still for general communication across the class; and e-mail primarily for intrateam communication. Face-to-face interaction, occurring only during a short on-campus session, appears to have had a catalytic effect on social and emotional exchanges. Results suggest the need to structure exchanges to balance class-wide sharing of ideas with subgroup interactions that facilitate project completion, and to provide media that support these two modes of interaction.  相似文献   

16.
Electronic data interchange (EDI) provides means for interorganizational communication, creates network externalities, requires an advanced information technology (IT) infrastructure, and relies on standards. In the diffusion of such innovations, institutional involvement is imperative. Such institutions contain governmental agencies, national and global standardization organizations, local government, and nonprofit private organizations like industry associations. The last type of organizations we call intermediating institutions. They intermediate or coordinate ("inscribe") the activities of a group of would-be adopters. Unfortunately, little is known of how these organizations shape the EDI diffusion trajectory. In this article we examine one specific type of intermediating organizations?industry associations?and how they advanced the EDI diffusion process in the grocery sectors of Hong Kong, Denmark and Finland. We identify six institutional measures, placed into a matrix formed by the mode of involvement (influence vs. regulation) and the type of diffusion force (supply push vs. demand pull), that can be mobilized to further the EDI diffusion. Industry associations were found to be active users of all these measures to varying degrees. Their role was critical especially in knowledge building, knowledge deployment, and standard setting. Furthermore, institutional involvement varied due to policy and cultural contingencies and power dependencies.  相似文献   

17.
The increasing prospects of digital piracy has prompted the perceived need by electronic publishers to adopt technical systems of protection, and governments to reform their copyright laws. This article is a preliminary study of the management of intellectual property by electronic publishers, defined as those involved in the production of online databases, and CD-ROMs. It focuses on three main issues: (1) how electronic publishers view the increasing threat of piracy; (2) the methods of protection employed to protect intellectual property in digital format; and (3) the importance of technological protection of intellectual property in electronic publications. The analysis is based on a sample of 23 UK electronic publishers. The interviews revealed an interesting assortment of protection methods and did not show that technological protection was a preferred way. Instead, the means of protection, in addition to copyright law, comprised niche markets, pricing, trust, bad publicity, and nontechnical and technical means.  相似文献   

18.
Long-standing conflict between domain name registrants and trademark holders prompted the Internet Corporation for Assigned Names and Numbers (ICANN) to create a global, mandatory arbitration procedure known as the Uniform Dispute Resolution Policy (UDRP). The UDRP has been used in 2166 cases involving 3938 domain names as of 1 November 2000. The policy gives the initiator of a complaint, generally a trademark holder, the right to choose which ICANN-accredited dispute resolution service provider (RSP) will handle the case. During the preparation of the UDRP,some feared that complainant selection would lead to "forum shopping" that might bias the results. This article performs a statistical assessment of the forum-shopping thesis and finds support for it. There are statistically significant differences in the various RSPs' propensity to take away names from defendants; there are also major differences in the number of cases brought to each RSP. RSPs who take away names have the larger share of cases. The study examines other variables that might explain differences in market share, such as price, the plaintiff's nationality, or the time taken to decide a case. It finds that nationality and time also are correlated with market share. The study concludes that shopping for a favorable outcome is an important factor in the UDRP.  相似文献   

19.
Prof. Raymond C.K. Chen, a neuropsychologist with the CAS Institute of Psychology, has made novel progress in his studies of schizophrenia. His work has been reported by a recent issue of Behavioural Neurology.  相似文献   

20.
Prof. SUN Changpu from the CAS Institute of Theoretical Physics and coworkers from University of Basel in Switzerland have worked out a way --at least in theory --to split a beam of molecules according to their chirality. The technique involves passing the molecules through three different laser beams and is similar to the famous Stern-Gerlach effect, whereby a beam of atoms passing through a magnetic field is split in two according to the atoms' spin states (Phys. Rev. Lett. 99 130403).  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号