Pennants for Descriptors
نویسندگان
چکیده
The technique is pennant diagrams, introduced with several kinds of bibliographic data in White (2007a, b, 2009, 2010). White’s examples to date, including the one in this paper, have required datagathering in the Dialog search system (with its Rank command), to which many information scientists lack access. However, simple pennant diagrams, using 25 co-cited author names, have also been programmed into Drexel University’s AuthorWeb system (White et al. 2001; Lin et al. 2003). As designers experiment with new ways of visualizing knowledge organization systems for their users, there seems little impediment to including pennant diagrams. The only data they require are (a) a usersupplied seed term to initiate the display, (b) non-zero co-occurrence counts of every term with the seed, and (c) total frequency counts for each of these co-occurring terms in the database.
منابع مشابه
Potentials and limitations of visual methods for the exploration of complex data structures
Visualizations can be used for the analysis of algorithms and data structures as well as for algorithm teaching and learning. In the latter case, they are usually employed for clarification or as instructive examples. In practice, it is most often the teacher who prepares the visualizations and presents them to the students in a class. If interactive animations or simulations are available, lea...
متن کاملA New Development of Electronic Descriptors for Simulation of 13C Chemical Shifts
The 13C chemical shifts for a series of compounds which includes carboxylic acids, aldehydes, ethers, ketones and hydrocarbons were simulated by using the parametric techniques. The observed chemical shifts were related to numerically encoded structural parametes called descriptors. Two new electronic descriptors were added to the previous descriptors. Ploting of experimental ver...
متن کاملPerformance evaluation of block-based copy- move image forgery detection algorithms
Copy-move forgery is a particular type of distortion where a part or portions of one image is/are copied to other parts of the same image. This type of manipulation is done to hide a particular part of the image or to copy one or more objects into the same image. There are several methods for detecting copy-move forgery, including block-based and key point-based methods. In this paper, a method...
متن کاملQuantitative Structure-Pproperty Relationship Modeling of the Redox Potential for Some Phenolic Antioxidants
In this work, quantitative structure-property relationship (QSPR) approaches were used to predict the redox potential of 42 phenolic antioxidants. The structures of all compounds optimized by the AM1 semi-empirical method and then a large number of molecular descriptors were calculated for each compound in the data set. Subsequently, stepwise multilinear regression was applied to select the mos...
متن کاملDetermination of critical properties of Alkanes derivatives using multiple linear regression
This study presents some mathematical methods for estimating the critical properties of 40 different types of alkanes and their derivatives including critical temperature, critical pressure and critical volume. This algorithm used QSPR modeling based on graph theory, several structural indices, and geometric descriptors of chemical compounds. Multiple linear regression was used to estimate the ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1310.3808 شماره
صفحات -
تاریخ انتشار 2013