Centrality-Based Paper Citation Recommender System
Journal Title: EAI Endorsed Transactions on Industrial Networks and Intelligent Systems - Year 2019, Vol 6, Issue 19
Abstract
Researchers cite papers in order to connect the new research ideas with previous research. For the purpose of finding suitable papers to cite, researchers spend a considerable amount of time and effort. To help researchers in finding relevant/important papers, we evaluated textual and topological similarity measures for citation recommendations. This work analyzes textual and topological similarity measures (i.e., Jaccard and Cosine) to evaluate which one performs well in finding similar papers? To find the importance of papers, we compute centrality measures (i.e., Betweeness, Closeness, Degree and PageRank). After evaluation, it is found that topological-based similarity via Cosine achieved 85.2% and using Jaccard obtained 61.9% whereas textualbased similarity via Cosine on abstract obtained 68.9% and using Cosine on title achieved 37.4% citation links. Likewise, textual-based similarity via Jaccard on abstract obtained 35.4% and using Jaccard on title achieved 28.3% citation links.
Authors and Affiliations
Abdul Samad, Muhammad Arshad Islam, Muhammad Azhar Iqbal, Muhammad Aleem
Welcome message from the Editors
This special issue is dedicated to Innovations for Community Services. The issue highlights papers selected from the presentations given during the 2014 14th International Conference on Innovations for Community Serv...
SMC-I with Approach Angle Method for Slip Suppression of Electric Vehicles
This study presents SMC-I (sliding mode control with integral action) with approach angle method applied to slip suppression problem of electric vehicles (EVs). In SMC, chattering phenomenon always occurs through high fr...
A2Ba: Adaptive Background Modelling for Visual Aerial Surveillance Conditions
Background modelling algorithms are widely used to define a part of an image that most time remains stationary in a video. In surveillance tasks, this model helps to recognize those outlier objects in an area under monit...
A Novel Intrusion Detection Mechanism for SCADA systems which Automatically Adapts to Network Topology Changes
Industrial Control Systems (ICS) are getting more vulnerable as they become increasingly interconnected with other systems. Industrial Internet of Things(IIoT) will bring new opportunities to business and society, along...
Security and Privacy in Online Social Networks: A Survey
The Online Social Networks (OSN) open a new vista serving millions of users and have reshaped the way people interacts. Unfortunately these networks are an emerging platform for cybercrimes such as sending malicious URLs...