Computer Science ›› 2018, Vol. 45 ›› Issue (11A): 132-137.

• Intelligent Computing • Previous Articles     Next Articles

New Method for Ranking Scientific Publications with Creditworthiness Mechanism

FENG Lei1,2, JI Jun-zhong1,2, WU Chen-sheng3   

  1. Beijing Municipal Key Laboratory of Multimedia and Intelligent Software Technology,Beijing University of Technology,Beijing 100124,China1
    Faculty of Information Technology,Beijing University of Technology,Beijing 100124,China2
    Beijing Institute of Science and Technology Information,Beijing 100048,China3
  • Online:2019-02-26 Published:2019-02-26

Abstract: Evaluating the scientific value of publications has always been a research focus in the field of bibliometrics.However,some mainstream methods based on data mining overlook the influence of malicious activities and result in poor evaluation results.To solve this problem,this paper proposed a new method named ReputeRank,which employs a creditworthiness mechanism to evaluate the effectiveness of publications in the citation network.The creditworthiness mechanism consists of the seeds selection phase,the spread credit phase and the integrated computation phase.First,ReputeRank employs background information on the division of SCI Periodicals to select potential good seeds and bad seeds in the citation network.Then,in light of assumption that good credibility seeds pointing to papers which usually have a higher credible degree while bad credibility seeds pointing to papers which often have a lower credible degree,the method uses TrustRank and Anti-TrustRank evaluation formula to iteratively spread trust values and distrust values over the citation network.Finally,according to the trust and distrust values in the citation network,the method utilizes an integrated equation to comprehensively compute the score value of each paper and arranges all papers in the descen-ding order of the score values.The experimental results on KDD cup 2003 datasets demonstrate that ReputeRank has good performance of effectiveness and robustness compared with PageRank,CountDegree and SPRank.

Key words: Citation network, Credibility, Evaluation of academic influence, Information dissemination

CLC Number: 

  • TP391
[1]ZHI L,QIN K P,CHE L.Two citation-based indicators to measure latent referential value of papers [J].Scientometrics,2016,108(3):1299-1313.
[2]BOYACK K W,BORNER K.Indicator-assisted evaluation and funding of re-search:Visualizing the influence of grants on the number and citation counts of research papers [J].Journal of the Association for Information Science and Technology,2003,54(5):447-461.
[3]BOLLEN J,RODRIQUEZ M A,VAN D S.Journal status [J].Scientometrics,2016,69(3):669-687.
[4]MAZLOUMIIAN A,EOM Y H,HELBING D,et al.How citation boosts promote scientific paradigm shifts and Nobel prizes [J].PLoS ONE,2011,6(5):e18975.
[5]HIRSCH J E.An index to quantify an individual’s scientific research output[J].Proceedings of the National Academy of Scien-ces of the United States of America,2005,102(46):16569-16572.
[6]WALKER D,XIE H,YAN K,et al.Ranking scientific publications using a model of network traffic [J].Journal of Statistical Mechanics:Theory and Experiment,2006,6(6):P06010.
[7]SAYYADI H,GETOOR L.FutureRank:Ranking Scientific Articles by Predicting their Future PageRank[C]∥Siam International Conference on Data Mining.USA,2009:533-544.
[8]SU C,PAN Y,ZHEN Y,et al.PrestigeRank:A new evaluation method for papers and journals [J].Journal of Informetrics,2011,5(1):1-13.
[9]YAO L,WEI T,ZENG A,et al.Ranking scientific publications:the effect of nonlinearity [J].Scientific Reports,2014,4:6663.
[10]JOHN P I.A generalized view of self-citation:Direct,co-author,collaborative,and Coercive induced self-citation [J].Journal of Psychosomatic Research,2015,78(1):7-11.
[11]蓝梦微,李翠平,王绍卿,等.符号社会网络中正负关系预测算法研究综述[J].计算机研究与发展,2015,52(2):410-422.
[12]KRISHNAN V,RAJ R.Web Spam Detection with Anti-Trust-Rank [C]∥Proceedings of the 2nd International Workshop on Adversarial Information Retrieval on the Web.New York:ACM Press,2006:37-40.
[13]ZOLTAN G,HECTOR G M,JAN P.Combating Web Spam with TrustRank[C]∥Proceeding of the 30th VLDB conference.Toronto,Canada,2004:576-587.
[14]ZHANG X C,LIANG W X,ZHU S P,et al.Automatic seed set expansion for trust propagation based anti-spam algorithms [J].Information Sciences,2013,232(5):167-187.
[15]ZHOU J L,ZENG A,FAN Y,et al.Ranking scientific publications with similarity-preferential mechanism[J].Scientometrics,2016,106(2):805-816.
[16]ELENI F,GEORGIOS E.Review of the indirect citations paradigm:theory and practice of the assessment of papers,authors and journals [J].Scientometrics,2014,99(2):261-288.
[17]JOHAN B,HERBERT V D S,ARIC H,et al.A Principal Component Analysis of 39 Scientific Impact Measures [J].PLoS ONE,2009,4(6):e6022.
[18]KDD Cup2003 datasets (Version2003) [DB/OL].http://www.cs.cornell.edu/projects/kddcup/datasets.html.
[19]王振飞,朱静阳,郑志蕴,等.基于R-C模型的微博社区用户影响力分析[J].计算机科学,2017,44(3):254-258.
[1] WANG Yu-fei, CHEN Wen. Tri-training Algorithm Based on DECORATE Ensemble Learning and Credibility Assessment [J]. Computer Science, 2022, 49(6): 127-133.
[2] CHANG Ya-wen, YANG Bo, GAO Yue-lin, HUANG Jing-yun. Modeling and Analysis of WeChat Official Account Information Dissemination Based on SEIR [J]. Computer Science, 2022, 49(4): 56-66.
[3] SANG Chun-yan, XU Wen, JIA Chao-long, WEN Jun-hao. Prediction of Evolution Trend of Online Public Opinion Events Based on Attention Mechanism in Social Networks [J]. Computer Science, 2021, 48(7): 118-123.
[4] YUAN De-yu, CHEN Shi-cong, GAO Jian, WANG Xiao-juan. Intervention Algorithm for Distorted Information in Online Social Networks Based on Stackelberg Game [J]. Computer Science, 2021, 48(3): 313-319.
[5] GUO Cong-rui, WANG Jun and FENG Yi-ming. Research on Method of Credibility Evaluation of System Simulation [J]. Computer Science, 2020, 47(6A): 567-571.
[6] GAO Qing-Ji, WANG Wen-bo, HOU Shi-hao and XING Zhi-wei. Traffic Strategy in Dense Crowd Environments Based on Expandable Path [J]. Computer Science, 2020, 47(6A): 34-39.
[7] BAO Jun-bo, YAN Guang-hui, LI Jun-cheng. SIR Propagation Model Combing Incomplete Information Game [J]. Computer Science, 2020, 47(6): 230-235.
[8] WU Yong, WANG Bin-jun, ZHAI Yi-ming, TONG Xin. Study on Co-citation Enhancing Directed Network Embedding [J]. Computer Science, 2020, 47(12): 279-284.
[9] YANG Xiao-jun, XU Zhong-fu, ZHANG Xing, SUN Dan-hui. Overview and Difficulties Analysis on Credibility Assessment of Simulation Models [J]. Computer Science, 2019, 46(6A): 23-29.
[10] ZHENG Hong-liang, HOU Xue-hui, SONG Xiao-ying, PANG Kuo, ZOU Li. Approach for Knowledge Reasoning Based on Hesitate Fuzzy Credibility [J]. Computer Science, 2019, 46(1): 131-137.
[11] GAO Peng, LIU Yun-jiang, GAO Wei-ting, LI Man, CHEN Juan. Double Thresholds DMM Cooperative Spectrum Sensing Algorithm Based on Credibility [J]. Computer Science, 2018, 45(9): 166-170.
[12] ZHANG Lin-zi, JIA Chuan-liang. Study of Propagation Mechanism in Networks Based on Topological Path [J]. Computer Science, 2018, 45(11A): 308-314.
[13] WU Wei-min, CHEN Dong-xin, LAI Wen-xin and SU Qing. Research and Implementation of EFI OS Loader Security Reinforcement Technology [J]. Computer Science, 2016, 43(9): 188-191.
[14] ZHANG Xue-ming, HUANG Zhi-qiu and SUN Yi. Research on Privacy Access Control Based on RBAC [J]. Computer Science, 2016, 43(1): 166-171.
[15] HE Xiao-xia and TAN Liang. Web Service Discovery Model of Semantic and Trust QoS Based on Hadoop [J]. Computer Science, 2015, 42(8): 220-224.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!