Mining research trends with anomaly detection models: the case of social computing research

被引:13
作者
Cheng, Qing [1 ]
Lu, Xin [2 ,3 ,4 ,5 ]
Liu, Zhong [1 ]
Huang, Jincai [1 ]
机构
[1] Natl Univ Def Technol, Sci & Technol Informat Syst Engn Lab, Changsha 410073, Hunan, Peoples R China
[2] Natl Univ Def Technol, Coll Informat Syst & Management, Changsha 410073, Hunan, Peoples R China
[3] Flowminder Fdn, S-17177 Stockholm, Sweden
[4] Karolinska Inst, Dept Publ Hlth Sci, S-17177 Stockholm, Sweden
[5] Chinese Ctr Dis Control & Prevent, Div Infect Dis, Key Lab Surveillance & Early Warning Infect Dis, Beijing 102206, Peoples R China
基金
中国国家自然科学基金;
关键词
Research trend; Anomaly detection; WSARE; Social computing; Interdisciplinary networks; OUTLIER DETECTION; SCIENCE; PERFORMANCE; ALGORITHM;
D O I
10.1007/s11192-015-1559-9
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
We proposed in this study to use anomaly detection models to discover research trends. The application was illustrated by applying a rule-based anomaly detector (WSARE), which was typically used for biosurveillance purpose, in the research trend analysis in social computing research. Based on articles collected from SCI-EXPANDED and CPCI-S databases during 2000 to 2013, we found that the number of social computing studies went up significantly in the past decade, with computer science and engineering among the top important subjects. Followed by China, USA was the largest contributor for studies in this field. According to anomaly detected by the WSARE, social computing research gradually shifted from its traditional fields such as computer science and engineering, to the fields of medical and health, and communication, etc. There was an emerging of various new subjects in recent years, including sentimental analysis, crowd-sourcing and e-health. We applied an interdisciplinary network evolution analysis to track changes in interdisciplinary collaboration, and found that most subject categories closely collaborate with subjects of computer science and engineering. Our study revealed that, anomaly detection models had high potentials in mining hidden research trends and may provided useful tools in the study of forecasting in other fields.
引用
收藏
页码:453 / 469
页数:17
相关论文
共 54 条
[1]   Flow-Based Anomaly Intrusion Detection System Using Two Neural Network Stages [J].
Abuadlla, Yousef ;
Kvascev, Goran ;
Gajin, Slavko ;
Jovanovic, Zoran .
COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2014, 11 (02) :601-622
[2]  
Agarwal N, 2011, SOCIAL MEDIA TOOLS AND PLATFORMS IN LEARNING ENVIRONMENTS, P37, DOI 10.1007/978-3-642-20392-3_3
[3]   Patients' and health professionals' use of social media in health care: Motives, barriers and expectations [J].
Antheunis, Marjolijn L. ;
Tates, Kiek ;
Nieboer, Theodoor E. .
PATIENT EDUCATION AND COUNSELING, 2013, 92 (03) :426-431
[4]   Automatic outlier detection for time series: an application to sensor data [J].
Basu, Sabyasachi ;
Meckesheimer, Martin .
KNOWLEDGE AND INFORMATION SYSTEMS, 2007, 11 (02) :137-154
[5]   Crowdsourcing Applications for Public Health [J].
Brabham, Daren C. ;
Ribisl, Kurt M. ;
Kirchner, Thomas R. ;
Bernhardt, Jay M. .
AMERICAN JOURNAL OF PREVENTIVE MEDICINE, 2014, 46 (02) :179-187
[6]   Crowdsourcing Awareness: Exploration of the Ovarian Cancer Knowledge Gap through Amazon Mechanical Turk [J].
Carter, Rebecca R. ;
DiFeo, Analisa ;
Bogie, Kath ;
Zhang, Guo-Qiang ;
Sun, Jiayang .
PLOS ONE, 2014, 9 (01)
[7]  
Chen Z., 2011, J COMPUTATIONAL INFO, V7, P5785
[8]  
Cruz-Cunla M. M., 2010, HDB RES DEV E HLTH T
[9]   MILA - multilevel immune learning algorithm and its application to anomaly detection [J].
Dasgupta, D ;
Yu, S ;
Majumdar, NS .
SOFT COMPUTING, 2005, 9 (03) :172-184
[10]   Smartphone-Based Crowdsourcing for Network Monitoring: Opportunities, Challenges, and a Case Study [J].
Faggiani, Adriano ;
Gregori, Enrico ;
Lenzini, Luciano ;
Luconi, Valerio ;
Vecchio, Alessio .
IEEE COMMUNICATIONS MAGAZINE, 2014, 52 (01) :106-113