Knowledge Map Analysis of CBR-Based on CiteSpace
نویسندگان
چکیده
منابع مشابه
Visualization Analysis of the Research on Knowledge Network in Industrial Clusters Based on CiteSpace
This paper choosed the documents on subject of knowledge network of industrial cluster included in Web of Science from 2004 to 2014 as object of research and used an information visualization analysis software CiteSpace to make visual analysis of data information in this field. Then it introduced some key indicators of knowledge map, such as frequency, centrality of knot points, burst term and ...
متن کاملKnowledge Domain and Emerging Trends in Organic Photovoltaic Technology: A Scientometric Review Based on CiteSpace Analysis
To study the rapid growth of research on organic photovoltaic (OPV) technology, development trends in the relevant research are analyzed based on CiteSpace software of text mining and visualization in scientific literature. By this analytical method, the outputs and cooperation of authors, the hot research topics, the vital references and the development trend of OPV are identified and visualiz...
متن کاملOperationalizing Comprehensive Software Knowledge Reuse Based on CBR Methods
Reuse of software knowledge is a principle for improving productivity of software development and reliability of software systems. To achieve this, reuse must be done systematically. This means that methods for retrieving, adapting, and learning have to be defined. In this paper we present MIRACLE, a model which integrates the reuse of software knowledge and case-based reasoning. MIRACLE extend...
متن کاملfabrication of new ion sensitive field effect transistors (isfet) based on modification of junction-fet for analysis of hydronium, potassium and hydrazinium ions
a novel and ultra low cost isfet electrode and measurement system was designed for isfet application and detection of hydronium, hydrazinium and potassium ions. also, a measuring setup containing appropriate circuits, suitable analyzer (advantech board), de noise reduction elements, cooling system and pc was used for controlling the isfet electrode and various characteristic measurements. the t...
study of hash functions based on chaotic maps
توابع درهم نقش بسیار مهم در سیستم های رمزنگاری و پروتکل های امنیتی دارند. در سیستم های رمزنگاری برای دستیابی به احراز درستی و اصالت داده دو روش مورد استفاده قرار می گیرند که عبارتند از توابع رمزنگاری کلیددار و توابع درهم ساز. توابع درهم ساز، توابعی هستند که هر متن با طول دلخواه را به دنباله ای با طول ثابت تبدیل می کنند. از جمله پرکاربردترین و معروف ترین توابع درهم می توان توابع درهم ساز md4, md...
ذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: DEStech Transactions on Economics, Business and Management
سال: 2019
ISSN: 2475-8868
DOI: 10.12783/dtem/icem2019/31208