<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.3 20070202//EN" "journalpublishing.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">Front. Big Data</journal-id>
<journal-title>Frontiers in Big Data</journal-title>
<abbrev-journal-title abbrev-type="pubmed">Front. Big Data</abbrev-journal-title>
<issn pub-type="epub">2624-909X</issn>
<publisher>
<publisher-name>Frontiers Media S.A.</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="doi">10.3389/fdata.2019.00038</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Big Data</subject>
<subj-group>
<subject>Original Research</subject>
</subj-group>
</subj-group>
</article-categories>
<title-group>
<article-title>From Big Scholarly Data to Solution-Oriented Knowledge Repository</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author" corresp="yes">
<name><surname>Zhang</surname> <given-names>Yu</given-names></name>
<xref ref-type="aff" rid="aff1"><sup>1</sup></xref>
<xref ref-type="corresp" rid="c001"><sup>&#x0002A;</sup></xref>
<uri xlink:href="http://loop.frontiersin.org/people/797115/overview"/>
</contrib>
<contrib contrib-type="author">
<name><surname>Wang</surname> <given-names>Min</given-names></name>
<xref ref-type="aff" rid="aff2"><sup>2</sup></xref>
</contrib>
<contrib contrib-type="author">
<name><surname>Saberi</surname> <given-names>Morteza</given-names></name>
<xref ref-type="aff" rid="aff3"><sup>3</sup></xref>
<uri xlink:href="http://loop.frontiersin.org/people/813499/overview"/>
</contrib>
<contrib contrib-type="author">
<name><surname>Chang</surname> <given-names>Elizabeth</given-names></name>
<xref ref-type="aff" rid="aff1"><sup>1</sup></xref>
</contrib>
</contrib-group>
<aff id="aff1"><sup>1</sup><institution>School of Business, University of New South Wales</institution>, <addr-line>Canberra, ACT</addr-line>, <country>Australia</country></aff>
<aff id="aff2"><sup>2</sup><institution>School of Engineering and Information Technology, University of New South Wales</institution>, <addr-line>Canberra, ACT</addr-line>, <country>Australia</country></aff>
<aff id="aff3"><sup>3</sup><institution>School of Information, Systems and Modelling, Faculty of Engineering and Information Technology, University of Technology Sydney</institution>, <addr-line>Sydney, NSW</addr-line>, <country>Australia</country></aff>
<author-notes>
<fn fn-type="edited-by"><p>Edited by: Feng Xia, Dalian University of Technology (DUT), China</p></fn>
<fn fn-type="edited-by"><p>Reviewed by: Philipp Mayr, GESIS Leibniz Institute for the Social Sciences, Germany; Xiangjie Kong, Dalian University of Technology (DUT), China; Jiang Li, Nanjing University, China</p></fn>
<corresp id="c001">&#x0002A;Correspondence: Yu Zhang <email>yu.zhang&#x00040;adfa.edu.au</email></corresp>
<fn fn-type="other" id="fn001"><p>This article was submitted to Data Mining and Management, a section of the journal Frontiers in Big Data</p></fn></author-notes>
<pub-date pub-type="epub">
<day>31</day>
<month>10</month>
<year>2019</year>
</pub-date>
<pub-date pub-type="collection">
<year>2019</year>
</pub-date>
<volume>2</volume>
<elocation-id>38</elocation-id>
<history>
<date date-type="received">
<day>31</day>
<month>08</month>
<year>2019</year>
</date>
<date date-type="accepted">
<day>15</day>
<month>10</month>
<year>2019</year>
</date>
</history>
<permissions>
<copyright-statement>Copyright &#x000A9; 2019 Zhang, Wang, Saberi and Chang.</copyright-statement>
<copyright-year>2019</copyright-year>
<copyright-holder>Zhang, Wang, Saberi and Chang</copyright-holder>
<license xlink:href="http://creativecommons.org/licenses/by/4.0/"><p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.</p></license>
</permissions>
<abstract><p>The volume of scientific articles grow rapidly, producing a scientific basis for understanding and identifying the research problems and the state-of-the-art solutions. Despite the considerable significance of the problem-solving information, existing scholarly recommending systems lack the ability to retrieve this information from the scientific articles for generating knowledge repositories and providing problem-solving recommendations. To address this issue, this paper proposes a novel framework to build solution-oriented knowledge repositories and provide recommendations to solve given research problems. The framework consists of three modules: a semantics based information extraction module mining research problems and solutions from massive academic papers; a knowledge assessment module based on the heterogeneous bibliometric graph and a ranking algorithm; and a knowledge repository generation module to produce solution-oriented maps with recommendations. Based on the framework, a prototype scholarly solution support system is implemented. A case study is carried out in the research field of intrusion detection, and the results demonstrate the effectiveness and efficiency of the proposed method.</p></abstract> <kwd-group>
<kwd>knowledge repository</kwd>
<kwd>big scholarly data</kwd>
<kwd>recommender system</kwd>
<kwd>text mining</kwd>
<kwd>bibliometrics</kwd>
</kwd-group>
<counts>
<fig-count count="6"/>
<table-count count="1"/>
<equation-count count="12"/>
<ref-count count="37"/>
<page-count count="10"/>
<word-count count="6446"/>
</counts>
</article-meta> 
</front>
<body>
<sec sec-type="intro" id="s1">
<title>1. Introduction</title>
<p>Academic publications often reflect the development of a research field and provide classic and cutting-edge solutions to research problems. These publications generate big scholarly data that has grown exponentially since the beginning of the information age. Such &#x0201C;knowledge explosion&#x0201D; (Adair and Vohra, <xref ref-type="bibr" rid="B1">2003</xref>) brings valuable opportunities for researchers to have a general understanding of the current state of development of a research problem. However, in order to find possible solutions to their problems or acquire solution-related knowledge, researchers often need to delve into a large number of articles, which is especially overwhelming for inexperienced researchers or non-professional users who only have limited knowledge of the field. Although academic searching engine such as Google Scholar and Scopus facilitate the searching process, they do not support in-depth exploration of the content and cannot mine knowledge of solutions to research problems.</p>
<p>There have been many studies focusing on retrieving information from the big scholarly data to understand and visualize academic papers for analysis and recommendations, such as the VOSviewer (Van Eck and Waltman, <xref ref-type="bibr" rid="B32">2010</xref>), AKMiner (Huang and Wan, <xref ref-type="bibr" rid="B11">2013</xref>), and AceMap (Tan et al., <xref ref-type="bibr" rid="B28">2016</xref>). These systems provide useful information about the paper citation relationship and academic social networks involved in the scholarly data, however, they are not designed to retrieve problem-solving knowledge from academic papers, thereby cannot recommend solutions for given research problems. Designing efficient knowledge mining and retrieving method and scheme has long been a challenge that hinders the development of solution-oriented knowledge repositories.</p>
<p>In this study, three observations are leveraged to build the basis of our proposals. The first is that academic papers in most cases address one or several research problems, therefore, mining scientific solutions from an adequate number of academic papers is an effective way to find the best solution for a research problem. The second is that a good solution usually exists in a good paper that tends to have a higher impact in the field, therefore, it would be reasonable to assume that a higher impact paper is more likely to provide a better solution to a specific problem. The third is that the academic papers that propose to solve a domain (or interdisciplinary) problem often establish relationships through citations and academic social networks (authors and publication venues). Therefore, these scholarly information should be considered when evaluating the impact of a paper.</p>
<p>Based on the above observations, we propose a novel framework to generate a Solution-oriented Knowledge Repository (SKR) that provides scientific solutions mined from academic articles to the given research problems. To this end, we first design a semantics based information extraction module for text mining from the source articles, and propose association rules for concept mining and linking which largely improve mining efficiency compared to full text parsing. Then, a know assessment module is designed based on heterogeneous bibliometric graph to rank the collected solutions according to the impact of the corresponding articles. Finally, a SKR is generated to provide solution recommendations to each given research problem. Based on the proposed SKR framework, a prototype system, named Scholarly Solution Support System (S4), is implemented. The S4 system is tested through a case study in the field of intrusion detection. The results demonstrate the effectiveness and efficiency of the proposed method.</p>
<p>The novelty and contributions of this study can be summarized as follows:
<list list-type="bullet">
<list-item><p>The concept of Solution-oriented Knowledge Repository (SKR) is created. It contains problem-solving knowledge that is significant for quickly understanding the development state of a research problem and finding the existing solutions for it.</p></list-item>
<list-item><p>The problem of ranking scientific solutions is converted into academic paper ranking, which is solved by a ranking algorithm using the weighted Heterogeneous Bibliometric Graph (HBG).</p></list-item>
<list-item><p>A Scholarly Solution Support System (S4) prototype is implemented. The case study validates that the system can automatically mine solutions from massive academic papers and provide recommendations to solve given research problems effectively and efficiently.</p></list-item>
</list></p>
</sec>
<sec id="s2">
<title>2. Related Works</title>
<p>Many studies have been contributed on academic article searching and recommending approaches, which can be classified into six categories including stereotyping, content filtering, collaborative filtering, co-occurrence based method, graph based method and hybrid method. These methods show advantages and shortcomings. For instance, the stereotyping (Rich, <xref ref-type="bibr" rid="B23">1979</xref>; Barla, <xref ref-type="bibr" rid="B3">2010</xref>; Beel, <xref ref-type="bibr" rid="B4">2015</xref>) consumes a considerably large amount of human labor and time. The content filtering method (Jack, <xref ref-type="bibr" rid="B13">2012</xref>; Zarrinkalam and Kahani, <xref ref-type="bibr" rid="B34">2013</xref>; Ricci et al., <xref ref-type="bibr" rid="B22">2015</xref>) improves the degree of system automation and accuracy by analyzing the content of scientific articles, but it creates the problems of low serendipity and high overspecialization, and it cares less about the recommendation quality. The collaborative filtering (Yang et al., <xref ref-type="bibr" rid="B33">2009</xref>; Ma et al., <xref ref-type="bibr" rid="B16">2014</xref>; Arapakis et al., <xref ref-type="bibr" rid="B2">2015</xref>) and co-occurrence based method (M&#x000F6;nnich and Spiering, <xref ref-type="bibr" rid="B17">2008</xref>; Gipp and Beel, <xref ref-type="bibr" rid="B10">2009</xref>; Zhang et al., <xref ref-type="bibr" rid="B35">2016</xref>) improve the serendipity issue but they need to deal with cold-start problem and rise computing time (Sosnovsky and Dicheva, <xref ref-type="bibr" rid="B27">2010</xref>). The graph based (Bethard and Jurafsky, <xref ref-type="bibr" rid="B5">2010</xref>; Le and Lauw, <xref ref-type="bibr" rid="B15">2017</xref>) and hybrid approach (Burke, <xref ref-type="bibr" rid="B7">2002</xref>; Lao and Cohen, <xref ref-type="bibr" rid="B14">2010</xref>) utilize inherent connections within the scholarly networks, which generates higher level of recommending accuracy in general, however, employing mathematical algorithms and models increases the degree of complexity.</p>
<p>In addition, researchers and practitioners have proposed many academic recommending systems. ArnetMiner (Tang et al., <xref ref-type="bibr" rid="B29">2008</xref>) focused on mining academic social networks, including extracting researcher profiles, incorporating publication data, modeling academic networks and providing search services for the networks. VOSviewer (Van Eck and Waltman, <xref ref-type="bibr" rid="B32">2010</xref>) presented large-scale graphs displaying profiles, density and collaborative relationships of bibliometric entities. Metro maps (Shahaf et al., <xref ref-type="bibr" rid="B25">2012</xref>) proposed to build road-maps for academic papers based on the metrics of influence, coverage, and connectivity generated from the papers. AKMiner (Huang and Wan, <xref ref-type="bibr" rid="B11">2013</xref>) extracted the academic concepts from academic articles based on Markov Logic Networks (MLN) and constructed graphs to present their relations. AceMap (Tan et al., <xref ref-type="bibr" rid="B28">2016</xref>) analyzed the big scholarly data and presented the results through a &#x0201C;map&#x0201D; in which the dynamic citation network, paper clustering, academic genealogy, author and conference homepage could be displayed. Study Map (Tao et al., <xref ref-type="bibr" rid="B30">2017</xref>) proposed to reveal the knowledge learning trace of a given article based on a Reference Injection based Double-Damping PageRank (RIDP). All these systems have been developed to support users in more efficient literature review and analysis, however, retrieving the problem-solving knowledge and constructing solution-oriented knowledge repositories have not yet been explored.</p>
<p>Knowledge and concept mining has been studied for analyzing document content. Article Content Miner (ACM) was an outstanding example that contained an article content miner designed for assessing the quality of scientific output (Nuzzolese et al., <xref ref-type="bibr" rid="B19">2016</xref>). It used the hybrid methodology including several existing technologies such as NLP, Semantic Web techniques, Ontology Design practices and FRED (Gangemi et al., <xref ref-type="bibr" rid="B9">2013</xref>) enabling extraction of information from PDF documents including authors names, affiliations, countries, supplementary material, sections, tables, figures, funding agencies, and EU projects. Most of the document content extraction methods focused on mining the high-level structure of scientific articles or only extracting citation and metadata, and yet none of them have contributed in collecting the knowledge-based data from the articles (Shotton, <xref ref-type="bibr" rid="B26">2009</xref>; Constantin et al., <xref ref-type="bibr" rid="B8">2013</xref>; Tkaczyk et al., <xref ref-type="bibr" rid="B31">2015</xref>; Perez-Arriaga et al., <xref ref-type="bibr" rid="B20">2016</xref>).</p>
<p>This study aims to automatically find the solutions to a give research problem from academic articles, generate solution-oriented knowledge repositories, and recommend the highlighted solutions for the problem based on the impact of the articles.</p>
</sec>
<sec sec-type="methods" id="s3">
<title>3. Methodology</title>
<sec>
<title>3.1. Definitions</title>
<p><bold>Definition 1 Research Problem (<italic>RP</italic>)</bold> refers to the problem or issue that a scientific article claims to address.</p>
<p><bold>Definition 2 Proposed Solution (<italic>PS</italic>)</bold> denotes the technique or approach that an article proposes to solve the issue or problem.</p>
<p><bold>Definition 3 Weighted Heterogeneous Bibliometric Graph (weighted HBG)</bold> represents the bibliometric network that integrates scholarly information, such as papers, authors and venues of publications (journals and conferences), into one heterogeneous unit that allows them to interact with each other via sub-networks. It is worth noting that the HBG is a weighted graph considering the citation relevance and authorship. For details, see section 3.4.</p>
<p><bold>Definition 4 Solution-oriented Knowledge Repositories (SKR)</bold> denote the knowledge bases which are composed of <italic>RP</italic>s, <italic>PS</italic>s, and the relationship between them. The <italic>PS</italic>s are ranked based on their impact.</p>
<p><bold>Definition 5 Association Rules</bold> define how the papers and their corresponding <italic>RP</italic>s and <italic>PS</italic>s are linked. The rules include: (a) <italic>RP</italic> and <italic>PS</italic> are associated with the paper from which they are extracted; (b) for each paper, the <italic>RP</italic>(s) and <italic>PS</italic> are extracted from the title, abstract, introduction or conclusion, and the <italic>PS</italic> is associated with the <italic>RP</italic>(s).</p>
</sec>
<sec>
<title>3.2. Proposed Framework</title>
<p>As mentioned earlier, a good solution usually exists in a good paper with a higher impact, so higher-impact papers are more likely to provide better solutions to specific problems. In other words, the problem of solution knowledge assessment can be converted into the ranking of the corresponding papers that propose these solutions. The proposed framework is illustrated in <xref ref-type="fig" rid="F1">Figure 1</xref>. It takes the source articles as input. These articles are returned from Scopus by searching domain keywords defined by users. The <italic>RP</italic>s and <italic>PS</italic>s are then extracted from the papers and their corresponding bibliometric information is used to form a weighted Heterogeneous Bibliometric Graph (HBG). Afterwards, W-Rank algorithm (Zhang et al., <xref ref-type="bibr" rid="B37">2019</xref>) is adopted to rank the papers, based on which the <italic>PS</italic>s can be assessed. Finally an SKR is generated by associating the <italic>RP</italic>s and corresponding <italic>PS</italic>s.</p>
<list list-type="order">
<list-item><p>Semantics based information extraction. Run a keyword-based text mining method on the source papers to extract the <italic>RP</italic>s and <italic>PS</italic>s. In addition, the bibliometric data (citations, authors, venues, and publication time) of the corresponding papers are also extracted.</p></list-item>
<list-item><p>Weighted HBG construction. Generate a HBG by integrating the bibliometric information and employ a weighting scheme on the citation network and author-article sub-network taking into account the citation relavance and authorship to update the HBG into a weighted one.</p></list-item>
<list-item><p>Paper impact assessment (ranking) and SKR generation. Utilize a ranking algorithm, the W-Rank, to rank the corresponding papers that propose the solutions <italic>PS</italic>s, and finally generate a SKR by connecting the ranked <italic>PS</italic>s to their <italic>RP</italic>s based on the association rules defined at the beginning.</p></list-item>
</list>
<fig id="F1" position="float">
<label>Figure 1</label>
<caption><p>Framework illustration.</p></caption>
<graphic xlink:href="fdata-02-00038-g0001.tif"/>
</fig>
</sec>
<sec>
<title>3.3. Semantics Based Information Extraction</title>
<p>A semantics-based text mining method using keywords is proposed in this section to extract the <italic>PS</italic>s and <italic>RP</italic>s from academic papers, where the <italic>PS</italic>s and <italic>RP</italic>s are extracted separately. Specifically, for <italic>RP</italic>(s), the noun terms positioned in front of the keyword are extracted since they usually denote the research problems to be addressed in an academic article. For instance, if &#x0201C;attack&#x0201D; and &#x0201C;intrusion&#x0201D; are set as keywords for searching articles in the research field of intrusion detection, we can obtain words, such as &#x0201C;DoS,&#x0201D; &#x0201C;DDoS,&#x0201D; &#x0201C;Flooding,&#x0201D; &#x0201C;Injection,&#x0201D; &#x0201C;eavesdropping,&#x0201D; and so forth using the proposed method. These words are the intrusions to be addressed in each article, which represent the <italic>RP</italic>s and need to be extracted. Similarly, in order to extract the <italic>PS</italic>s, all sentences containing the verb term &#x0201C;propose&#x0201D; or &#x0201C;present&#x0201D; or &#x0201C;develop&#x0201D; or &#x0201C;address&#x0201D; or &#x0201C;design&#x0201D; are extracted since authors commonly demonstrate their contributions, novelty or solutions by using these verbs. For instance, &#x0201C;<italic>In this paper, we propose &#x0201C;Multilevel Thrust Filtration (MTF) mechanism&#x0201D; as a solution, which authenticates the incoming&#x02026;</italic> (Iyengar et al., <xref ref-type="bibr" rid="B12">2014</xref>)&#x0201D; briefly summarizes the solution proposed in the article using the verb &#x0201C;propose.&#x0201D; The solutions or techniques proposed to solve research problems in academic articles are most likely represented in the sentences as such.</p>
<p>In order to reduce possible noise and improve efficiency during information extraction, only the title, abstract, introduction and conclusion of each paper are considered to the text-mining procedure rather than full text parsing. The procedure running on each paper follows a priority order, that is, the title and abstract of each paper are processed firstly, and then the introduction and conclusion. Specifically, if both <italic>RP</italic> and <italic>PS</italic> are successfully extracted from the title and abstract, the procedure stops, otherwise the introduction and conclusion will be processed until both <italic>RP</italic> and <italic>PS</italic> are found. For those papers that return partial information (including only <italic>RP</italic> or <italic>PS</italic>, or empty), they will not be considered in constructing the knowledge repository, therefore, be removed from further processing. The pseudo codes for the information extraction and association rules are shown in Algoirthm 1 which has been validated in our previous work (Zhang et al., <xref ref-type="bibr" rid="B36">2018</xref>).</p>
<p>The extracted <italic>PS</italic>s and <italic>RP</italic>s are treated differently. When going through the text of each paper, each noun term denoting a <italic>RP</italic> is extracted and stored individually, resulting in one or multiple <italic>RP</italic>s; while the sentence(s) meeting the condition of <italic>PS</italic> is extracted, concatenated, and stored as one <italic>PS</italic>. Incorporating with the association rules, two possible scenarios could happen, including one-to-one (a pair of <italic>PS</italic> and <italic>RP</italic>) and multiple-to-one (one <italic>PS</italic> to multiple <italic>RP</italic>s). Finally, the extracted <italic>PS</italic>s, <italic>RP</italic>s and their connections will be used to develop the knowledge repository, in which the clusters in the repository are defined by the extracted <italic>RP</italic>s.</p>
<table-wrap position="float">
<label>Algorithm 1:</label>
<caption><p>Semantics based Information Extraction</p></caption>
<graphic xlink:href="fdata-02-00038-i0001.tif"/>
</table-wrap>
</sec>
<sec>
<title>3.4. Weighted Heterogeneous Bibliometric Graph Construction</title>
<p>Recall that academic papers are not independent as they are linked to each other through citations and the academic social networks, thereby these factors should be considered when formulating an assessment of the paper impact. To achieve this, a weighted HBG is constructed using information extracted from the previous component, including the academic articles, authors, venues (journals and conferences), and the relationship amongst them.</p>
<p>The weighted HBG <inline-formula><mml:math id="M1"><mml:mrow><mml:mi mathvariant="-tex-caligraphic">G</mml:mi></mml:mrow></mml:math></inline-formula> is the basis of the following paper ranking algorithm and it, as illustrated in <xref ref-type="fig" rid="F2">Figure 2</xref>, can be described with a set of nodes <inline-formula><mml:math id="M2"><mml:mrow><mml:mi mathvariant="-tex-caligraphic">N</mml:mi></mml:mrow></mml:math></inline-formula> and a set of links <inline-formula><mml:math id="M3"><mml:mrow><mml:mi mathvariant="-tex-caligraphic">L</mml:mi></mml:mrow></mml:math></inline-formula> connecting these nodes, as follows:</p>
<disp-formula id="E1"><label>(1)</label><mml:math id="M4"><mml:mtable class="eqnarray" columnalign="left"><mml:mtr><mml:mtd><mml:mrow><mml:mi mathvariant="-tex-caligraphic">G</mml:mi></mml:mrow><mml:mo>=</mml:mo><mml:msub><mml:mrow><mml:mrow><mml:mi mathvariant="-tex-caligraphic">G</mml:mi></mml:mrow></mml:mrow><mml:mrow><mml:mi>P</mml:mi><mml:mo>-</mml:mo><mml:mi>A</mml:mi></mml:mrow></mml:msub><mml:mo>&#x0222A;</mml:mo><mml:msub><mml:mrow><mml:mrow><mml:mi mathvariant="-tex-caligraphic">G</mml:mi></mml:mrow></mml:mrow><mml:mrow><mml:mi>P</mml:mi><mml:mo>-</mml:mo><mml:mi>P</mml:mi></mml:mrow></mml:msub><mml:mo>&#x0222A;</mml:mo><mml:msub><mml:mrow><mml:mrow><mml:mi mathvariant="-tex-caligraphic">G</mml:mi></mml:mrow></mml:mrow><mml:mrow><mml:mi>P</mml:mi><mml:mo>-</mml:mo><mml:mi>V</mml:mi></mml:mrow></mml:msub></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>
<disp-formula id="E2"><label>(2)</label><mml:math id="M5"><mml:mtable class="eqnarray" columnalign="left"><mml:mtr><mml:mtd><mml:mtext>&#x000A0;&#x000A0;&#x000A0;</mml:mtext><mml:mo>=</mml:mo><mml:mrow><mml:mo>{</mml:mo><mml:mrow><mml:mrow><mml:mi mathvariant="-tex-caligraphic">N</mml:mi><mml:mo>,</mml:mo><mml:mi mathvariant="-tex-caligraphic">L</mml:mi></mml:mrow></mml:mrow><mml:mo>}</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:mrow><mml:mo>{</mml:mo><mml:mrow><mml:msub><mml:mrow><mml:mrow><mml:mi mathvariant="-tex-caligraphic">N</mml:mi></mml:mrow></mml:mrow><mml:mrow><mml:mi>A</mml:mi></mml:mrow></mml:msub><mml:mo>&#x0222A;</mml:mo><mml:msub><mml:mrow><mml:mrow><mml:mi mathvariant="-tex-caligraphic">N</mml:mi></mml:mrow></mml:mrow><mml:mrow><mml:mi>P</mml:mi></mml:mrow></mml:msub><mml:mo>&#x0222A;</mml:mo><mml:msub><mml:mrow><mml:mrow><mml:mi mathvariant="-tex-caligraphic">N</mml:mi></mml:mrow></mml:mrow><mml:mrow><mml:mi>V</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mrow><mml:mrow><mml:mi mathvariant="-tex-caligraphic">L</mml:mi></mml:mrow></mml:mrow><mml:mrow><mml:mi>P</mml:mi><mml:mo>-</mml:mo><mml:mi>A</mml:mi></mml:mrow></mml:msub><mml:mo>&#x0222A;</mml:mo><mml:msub><mml:mrow><mml:mrow><mml:mi mathvariant="-tex-caligraphic">L</mml:mi></mml:mrow></mml:mrow><mml:mrow><mml:mi>P</mml:mi><mml:mo>-</mml:mo><mml:mi>P</mml:mi></mml:mrow></mml:msub><mml:mo>&#x0222A;</mml:mo><mml:msub><mml:mrow><mml:mrow><mml:mi mathvariant="-tex-caligraphic">L</mml:mi></mml:mrow></mml:mrow><mml:mrow><mml:mi>P</mml:mi><mml:mo>-</mml:mo><mml:mi>V</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo>}</mml:mo></mml:mrow></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>
<p>where <italic>P</italic>, <italic>A</italic>, and <italic>V</italic> denote article, author, and venue, respectively. Considering the citation relevance, the citation network is further updated to <inline-formula><mml:math id="M6"><mml:msub><mml:mrow><mml:mrow><mml:mi mathvariant="-tex-caligraphic">G</mml:mi></mml:mrow></mml:mrow><mml:mrow><mml:mi>P</mml:mi><mml:mo>-</mml:mo><mml:mi>P</mml:mi></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mrow><mml:mo>{</mml:mo><mml:mrow><mml:msub><mml:mrow><mml:mrow><mml:mi mathvariant="-tex-caligraphic">N</mml:mi></mml:mrow></mml:mrow><mml:mrow><mml:mi>P</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mrow><mml:mrow><mml:mi mathvariant="-tex-caligraphic">L</mml:mi></mml:mrow></mml:mrow><mml:mrow><mml:mi>P</mml:mi><mml:mo>-</mml:mo><mml:mi>P</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:mstyle mathvariant="bold"><mml:mtext>W</mml:mtext></mml:mstyle></mml:mrow><mml:mo>}</mml:mo></mml:mrow></mml:math></inline-formula>, where <bold>W</bold> &#x02208; &#x0211D;<sup><italic>N</italic>&#x000D7;<italic>N</italic></sup> is the adjacency matrix of the citation network and <inline-formula><mml:math id="M7"><mml:mi>N</mml:mi><mml:mo>=</mml:mo><mml:mo>|</mml:mo><mml:msub><mml:mrow><mml:mrow><mml:mi mathvariant="-tex-caligraphic">N</mml:mi></mml:mrow></mml:mrow><mml:mrow><mml:mi>P</mml:mi></mml:mrow></mml:msub><mml:mo>|</mml:mo></mml:math></inline-formula> is the number of articles in it. The adjacency matrix <bold>W</bold> is a representative description of the citation network structure with its entries, denoted as <italic>w</italic><sub><italic>i,j</italic></sub> referring to the relevance of a citation link from article <italic>i</italic> to article <italic>j</italic>.</p>
<fig id="F2" position="float">
<label>Figure 2</label>
<caption><p>Weighted heterogeneous bibliometric graph (Weighted HBG).</p></caption>
<graphic xlink:href="fdata-02-00038-g0002.tif"/>
</fig>
<p>The citation relevance can be interpreted from two perspectives, including the semantic similarity of the articles&#x00027; content and the network-level similarity evaluating the mutual links in the citation network. For semantic similarity, we extract titles and abstracts from papers as the lexical items, and use the &#x0201C;align, disambiguate and walk&#x0201D; (ADW) algorithm (Pilehvar et al., <xref ref-type="bibr" rid="B21">2013</xref>) for calculation. Titles and abstracts are selected as they contain the key information of an article, and the sense-level ADW is adopted due to its flexibility in handling lexical items in different sizes and the effectiveness in comparing the meaning of the lexical items. To measure the network-level similarity, we use Cosine similarity (Salton, <xref ref-type="bibr" rid="B24">1970</xref>) as it is effective in handling citation networks. The Cosine similarity between two papers <italic>P</italic><sub><italic>i</italic></sub> and <italic>P</italic><sub><italic>j</italic></sub> is defined as follow:</p>
<disp-formula id="E3"><label>(3)</label><mml:math id="M8"><mml:mtable class="eqnarray" columnalign="left"><mml:mtr><mml:mtd><mml:mi>C</mml:mi><mml:mi>o</mml:mi><mml:mi>s</mml:mi><mml:mi>i</mml:mi><mml:mi>n</mml:mi><mml:mi>e</mml:mi><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:msub><mml:mrow><mml:mi>P</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mrow><mml:mi>P</mml:mi></mml:mrow><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:mfrac><mml:mrow><mml:mo>|</mml:mo><mml:msub><mml:mrow><mml:mi>L</mml:mi></mml:mrow><mml:mrow><mml:msub><mml:mrow><mml:mi>P</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:msub><mml:mo>&#x02229;</mml:mo><mml:msub><mml:mrow><mml:mi>L</mml:mi></mml:mrow><mml:mrow><mml:msub><mml:mrow><mml:mi>P</mml:mi></mml:mrow><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:msub><mml:mo>|</mml:mo></mml:mrow><mml:mrow><mml:msqrt><mml:mrow><mml:mo>|</mml:mo><mml:msub><mml:mrow><mml:mi>L</mml:mi></mml:mrow><mml:mrow><mml:msub><mml:mrow><mml:mi>P</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:msub><mml:mo>|</mml:mo><mml:mo>&#x000D7;</mml:mo><mml:mo>|</mml:mo><mml:msub><mml:mrow><mml:mi>L</mml:mi></mml:mrow><mml:mrow><mml:msub><mml:mrow><mml:mi>P</mml:mi></mml:mrow><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:msub><mml:mo>|</mml:mo></mml:mrow></mml:msqrt></mml:mrow></mml:mfrac></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>
<p>where <italic>L</italic><sub><italic>P</italic></sub> denotes the links that connect to node <italic>P</italic> in the citation network, and <italic>L</italic><sub><italic>P</italic><sub><italic>i</italic></sub></sub> &#x02229; <italic>L</italic><sub><italic>P</italic><sub><italic>j</italic></sub></sub> the links connecting to both <italic>P</italic><sub><italic>i</italic></sub> and <italic>P</italic><sub><italic>j</italic></sub> regardless of the link direction. Finally, the citation relevance is formulated as an integration of the semantic similarity and network-level similarity according to the following equation (Zhang et al., <xref ref-type="bibr" rid="B37">2019</xref>).</p>
<disp-formula id="E4"><label>(4)</label><mml:math id="M9"><mml:mtable class="eqnarray" columnalign="left"><mml:mtr><mml:mtd><mml:msub><mml:mrow><mml:mi>w</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mi>&#x003B1;</mml:mi><mml:mo>&#x000B7;</mml:mo><mml:mi>S</mml:mi><mml:mi>e</mml:mi><mml:mi>m</mml:mi><mml:mi>a</mml:mi><mml:mi>n</mml:mi><mml:mi>t</mml:mi><mml:mi>i</mml:mi><mml:mi>c</mml:mi><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:msub><mml:mrow><mml:mi>P</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mrow><mml:mi>P</mml:mi></mml:mrow><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow><mml:mo>&#x0002B;</mml:mo><mml:mi>&#x003B2;</mml:mi><mml:mo>&#x000B7;</mml:mo><mml:mi>C</mml:mi><mml:mi>o</mml:mi><mml:mi>s</mml:mi><mml:mi>i</mml:mi><mml:mi>n</mml:mi><mml:mi>e</mml:mi><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:msub><mml:mrow><mml:mi>P</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mrow><mml:mi>P</mml:mi></mml:mrow><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>
<p>where &#x003B1; and &#x003B2; are coefficients defined by exponential functions: <inline-formula><mml:math id="M10"><mml:mi>&#x003B1;</mml:mi><mml:mo>=</mml:mo><mml:msup><mml:mrow><mml:mi>e</mml:mi></mml:mrow><mml:mrow><mml:mo>&#x003BB;</mml:mo><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mi>S</mml:mi><mml:mi>e</mml:mi><mml:mi>m</mml:mi><mml:mi>a</mml:mi><mml:mi>n</mml:mi><mml:mi>t</mml:mi><mml:mi>i</mml:mi><mml:mi>c</mml:mi><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:msub><mml:mrow><mml:mi>P</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mrow><mml:mi>P</mml:mi></mml:mrow><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow><mml:mo>-</mml:mo><mml:msub><mml:mrow><mml:mi>&#x003C4;</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:mrow></mml:msup></mml:math></inline-formula> and <inline-formula><mml:math id="M11"><mml:mi>&#x003B2;</mml:mi><mml:mo>=</mml:mo><mml:msup><mml:mrow><mml:mi>e</mml:mi></mml:mrow><mml:mrow><mml:mo>&#x003BB;</mml:mo><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mi>C</mml:mi><mml:mi>o</mml:mi><mml:mi>s</mml:mi><mml:mi>i</mml:mi><mml:mi>n</mml:mi><mml:mi>e</mml:mi><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:msub><mml:mrow><mml:mi>P</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mrow><mml:mi>P</mml:mi></mml:mrow><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow><mml:mo>-</mml:mo><mml:msub><mml:mrow><mml:mi>&#x003C4;</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:mrow></mml:msup></mml:math></inline-formula>. &#x003BB; is set to 6 in favor of the similarity values which are greater than the threshold, and the thresholds &#x003C4;<sub>1</sub> and &#x003C4;<sub>2</sub> are adjusted to be the median values of the two types of similarities, respectively. The &#x003B1; and &#x003B2; are normalized so that &#x003B1; &#x0002B; &#x003B2; &#x0003D; 1.</p>
</sec>
<sec>
<title>3.5. Paper Impact Assessment (Ranking)</title>
<p>Paper ranking applies the W-Rank algorithm proposed in our previous study (Zhang et al., <xref ref-type="bibr" rid="B37">2019</xref>) which outputs a list of paper scores obtained by propagating between paper authority scores <italic>S</italic> and hub scores <italic>H</italic> from three types of nodes (paper <italic>P</italic>, author <italic>A</italic>, and venue <italic>V</italic>) in the weighted HBG generated from the previous component. We can calculate the hub score of author <italic>A</italic><sub><italic>i</italic></sub> and venue <italic>V</italic><sub><italic>i</italic></sub> as follows:</p>
<disp-formula id="E5"><label>(5)</label><mml:math id="M12"><mml:mtable class="eqnarray" columnalign="left"><mml:mtr><mml:mtd><mml:mi>H</mml:mi><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:msub><mml:mrow><mml:mi>A</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:mtd><mml:mtd><mml:mo>=</mml:mo><mml:mfrac><mml:mrow><mml:mstyle displaystyle="true"><mml:msub><mml:mrow><mml:mo>&#x02211;</mml:mo></mml:mrow><mml:mrow><mml:msub><mml:mrow><mml:mi>P</mml:mi></mml:mrow><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>&#x02208;</mml:mo><mml:mi>O</mml:mi><mml:mi>u</mml:mi><mml:mi>t</mml:mi><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:msub><mml:mrow><mml:mi>A</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:mrow></mml:msub></mml:mstyle><mml:mi>S</mml:mi><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:msub><mml:mrow><mml:mi>P</mml:mi></mml:mrow><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:mrow><mml:mrow><mml:mo>|</mml:mo><mml:mi>O</mml:mi><mml:mi>u</mml:mi><mml:mi>t</mml:mi><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:msub><mml:mrow><mml:mi>A</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow><mml:mo>|</mml:mo></mml:mrow></mml:mfrac></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>
<disp-formula id="E6"><label>(6)</label><mml:math id="M13"><mml:mtable class="eqnarray" columnalign="left"><mml:mtr><mml:mtd><mml:mi>H</mml:mi><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:msub><mml:mrow><mml:mi>V</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:mtd><mml:mtd><mml:mo>=</mml:mo><mml:mfrac><mml:mrow><mml:mstyle displaystyle="true"><mml:msub><mml:mrow><mml:mo>&#x02211;</mml:mo></mml:mrow><mml:mrow><mml:msub><mml:mrow><mml:mi>P</mml:mi></mml:mrow><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>&#x02208;</mml:mo><mml:mi>O</mml:mi><mml:mi>u</mml:mi><mml:mi>t</mml:mi><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:msub><mml:mrow><mml:mi>V</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:mrow></mml:msub></mml:mstyle><mml:mi>S</mml:mi><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:msub><mml:mrow><mml:mi>P</mml:mi></mml:mrow><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:mrow><mml:mrow><mml:mo>|</mml:mo><mml:mi>O</mml:mi><mml:mi>u</mml:mi><mml:mi>t</mml:mi><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:msub><mml:mrow><mml:mi>V</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow><mml:mo>|</mml:mo></mml:mrow></mml:mfrac></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>
<p>where <italic>Out</italic>(<italic>X</italic><sub><italic>i</italic></sub>) represents the paper nodes linked from node <italic>X</italic><sub><italic>i</italic></sub> in the network. Considering the citation relevance <italic>w</italic>, the hub score of paper <italic>P</italic><sub><italic>i</italic></sub> can be calculated as follows:</p>
<disp-formula id="E7"><label>(7)</label><mml:math id="M14"><mml:mtable class="eqnarray" columnalign="left"><mml:mtr><mml:mtd><mml:mi>H</mml:mi><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:msub><mml:mrow><mml:mi>P</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:mfrac><mml:mrow><mml:mstyle displaystyle="true"><mml:msub><mml:mrow><mml:mo>&#x02211;</mml:mo></mml:mrow><mml:mrow><mml:msub><mml:mrow><mml:mi>P</mml:mi></mml:mrow><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>&#x02208;</mml:mo><mml:mi>O</mml:mi><mml:mi>u</mml:mi><mml:mi>t</mml:mi><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:msub><mml:mrow><mml:mi>P</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:mrow></mml:msub></mml:mstyle><mml:msub><mml:mrow><mml:mi>w</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mi>S</mml:mi><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:msub><mml:mrow><mml:mi>P</mml:mi></mml:mrow><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:mrow><mml:mrow><mml:mstyle displaystyle="true"><mml:msub><mml:mrow><mml:mo>&#x02211;</mml:mo></mml:mrow><mml:mrow><mml:msub><mml:mrow><mml:mi>P</mml:mi></mml:mrow><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>&#x02208;</mml:mo><mml:mi>O</mml:mi><mml:mi>u</mml:mi><mml:mi>t</mml:mi><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:msub><mml:mrow><mml:mi>P</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:mrow></mml:msub></mml:mstyle><mml:msub><mml:mrow><mml:mi>w</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:mfrac></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>
<p>Based on the hub scores, we can calculate the corresponding components of authority score, namely <italic>Citation</italic>(<italic>P</italic><sub><italic>i</italic></sub>), <italic>Author</italic>(<italic>P</italic><sub><italic>i</italic></sub>), and <italic>Venue</italic>(<italic>P</italic><sub><italic>i</italic></sub>), as follows, which are propagated from the hub scores of paper, author, and venue, respectively.</p>
<disp-formula id="E8"><label>(8)</label><mml:math id="M15"><mml:mtable class="eqnarray" columnalign="left"><mml:mtr><mml:mtd><mml:mi>A</mml:mi><mml:mi>u</mml:mi><mml:mi>t</mml:mi><mml:mi>h</mml:mi><mml:mi>o</mml:mi><mml:mi>r</mml:mi><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:msub><mml:mrow><mml:mi>P</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:msup><mml:mrow><mml:mi>Z</mml:mi></mml:mrow><mml:mrow><mml:mo>-</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msup><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mi>A</mml:mi></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow><mml:mstyle displaystyle="true"><mml:munder class="msub"><mml:mrow><mml:mo>&#x02211;</mml:mo></mml:mrow><mml:mrow><mml:msub><mml:mrow><mml:mi>A</mml:mi></mml:mrow><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>&#x02208;</mml:mo><mml:mi>I</mml:mi><mml:mi>n</mml:mi><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:msub><mml:mrow><mml:mi>P</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:mrow></mml:munder></mml:mstyle><mml:mi>H</mml:mi><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:msub><mml:mrow><mml:mi>A</mml:mi></mml:mrow><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>
<disp-formula id="E9"><label>(9)</label><mml:math id="M16"><mml:mtable class="eqnarray" columnalign="left"><mml:mtr><mml:mtd><mml:mi>V</mml:mi><mml:mi>e</mml:mi><mml:mi>n</mml:mi><mml:mi>u</mml:mi><mml:mi>e</mml:mi><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:msub><mml:mrow><mml:mi>P</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:msup><mml:mrow><mml:mi>Z</mml:mi></mml:mrow><mml:mrow><mml:mo>-</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msup><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mi>V</mml:mi></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow><mml:mstyle displaystyle="true"><mml:munder class="msub"><mml:mrow><mml:mo>&#x02211;</mml:mo></mml:mrow><mml:mrow><mml:msub><mml:mrow><mml:mi>V</mml:mi></mml:mrow><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>&#x02208;</mml:mo><mml:mi>I</mml:mi><mml:mi>n</mml:mi><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:msub><mml:mrow><mml:mi>P</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:mrow></mml:munder></mml:mstyle><mml:mi>H</mml:mi><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:msub><mml:mrow><mml:mi>V</mml:mi></mml:mrow><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>
<disp-formula id="E10"><label>(10)</label><mml:math id="M17"><mml:mtable class="eqnarray" columnalign="left"><mml:mtr><mml:mtd><mml:mi>C</mml:mi><mml:mi>i</mml:mi><mml:mi>t</mml:mi><mml:mi>a</mml:mi><mml:mi>t</mml:mi><mml:mi>i</mml:mi><mml:mi>o</mml:mi><mml:mi>n</mml:mi><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:msub><mml:mrow><mml:mi>P</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:msup><mml:mrow><mml:mi>Z</mml:mi></mml:mrow><mml:mrow><mml:mo>-</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msup><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mi>P</mml:mi></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow><mml:mstyle displaystyle="true"><mml:munder class="msub"><mml:mrow><mml:mo>&#x02211;</mml:mo></mml:mrow><mml:mrow><mml:msub><mml:mrow><mml:mi>P</mml:mi></mml:mrow><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>&#x02208;</mml:mo><mml:mi>I</mml:mi><mml:mi>n</mml:mi><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:msub><mml:mrow><mml:mi>P</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:mrow></mml:munder></mml:mstyle><mml:mi>H</mml:mi><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:msub><mml:mrow><mml:mi>P</mml:mi></mml:mrow><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow><mml:msub><mml:mrow><mml:mi>w</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>
<p>where <italic>In</italic>(<italic>X</italic><sub><italic>i</italic></sub>) denotes the nodes linked to node <italic>X</italic><sub><italic>i</italic></sub>, and <italic>Z</italic>(&#x000B7;) is a normalization term. In addition, we consider publishing time using the following equation to promote the prestige of new papers because they are often underestimated by citation-based models due to inadequate citations.</p>
<disp-formula id="E11"><label>(11)</label><mml:math id="M18"><mml:mtable class="eqnarray" columnalign="left"><mml:mtr><mml:mtd><mml:mi>T</mml:mi><mml:mi>i</mml:mi><mml:mi>m</mml:mi><mml:mi>e</mml:mi><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:msub><mml:mrow><mml:mi>P</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:msup><mml:mrow><mml:mi>Z</mml:mi></mml:mrow><mml:mrow><mml:mo>-</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msup><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mi>T</mml:mi></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow><mml:msup><mml:mrow><mml:mi>e</mml:mi></mml:mrow><mml:mrow><mml:mo>-</mml:mo><mml:mi>&#x003C1;</mml:mi><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:msub><mml:mrow><mml:mi>T</mml:mi></mml:mrow><mml:mrow><mml:mi>C</mml:mi><mml:mi>u</mml:mi><mml:mi>r</mml:mi><mml:mi>r</mml:mi><mml:mi>e</mml:mi><mml:mi>n</mml:mi><mml:mi>t</mml:mi></mml:mrow></mml:msub><mml:mo>-</mml:mo><mml:msub><mml:mrow><mml:mi>T</mml:mi></mml:mrow><mml:mrow><mml:msub><mml:mrow><mml:mi>P</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:msub></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:mrow></mml:msup></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>
<p>where &#x003C1; &#x0003D; 0.62, <italic>T</italic><sub><italic>Current</italic></sub> is the current time of evaluation, and <italic>Z</italic> is a normalization term. Finally, the paper authority score <italic>S</italic> is updated considering the above four components which are citation, authors, venues, and time according to the following equation.</p>
<disp-formula id="E12"><label>(12)</label><mml:math id="M19"><mml:mtable class="eqnarray" columnalign="left"><mml:mtr><mml:mtd><mml:mtable><mml:mtr><mml:mtd><mml:mi>S</mml:mi><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:msub><mml:mrow><mml:mi>P</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:mi>&#x003B1;</mml:mi><mml:mo>&#x000B7;</mml:mo><mml:mi>C</mml:mi><mml:mi>i</mml:mi><mml:mi>t</mml:mi><mml:mi>a</mml:mi><mml:mi>t</mml:mi><mml:mi>i</mml:mi><mml:mi>o</mml:mi><mml:mi>n</mml:mi><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:msub><mml:mrow><mml:mi>P</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow><mml:mo>&#x0002B;</mml:mo><mml:mi>&#x003B2;</mml:mi><mml:mo>&#x000B7;</mml:mo><mml:mi>A</mml:mi><mml:mi>u</mml:mi><mml:mi>t</mml:mi><mml:mi>h</mml:mi><mml:mi>o</mml:mi><mml:mi>r</mml:mi><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:msub><mml:mrow><mml:mi>P</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow><mml:mo>&#x0002B;</mml:mo><mml:mi>&#x003B3;</mml:mi><mml:mo>&#x000B7;</mml:mo><mml:mi>V</mml:mi><mml:mi>e</mml:mi><mml:mi>n</mml:mi><mml:mi>u</mml:mi><mml:mi>e</mml:mi><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:msub><mml:mrow><mml:mi>P</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:mtd></mml:mtr><mml:mtr><mml:mtd columnalign="left"><mml:mtext>&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0;</mml:mtext><mml:mo>&#x0002B;</mml:mo><mml:mi>&#x003B4;</mml:mi><mml:mo>&#x000B7;</mml:mo><mml:mi>T</mml:mi><mml:mi>i</mml:mi><mml:mi>m</mml:mi><mml:mi>e</mml:mi><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:msub><mml:mrow><mml:mi>P</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow><mml:mo>&#x0002B;</mml:mo><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mn>1</mml:mn><mml:mo>-</mml:mo><mml:mi>&#x003B1;</mml:mi><mml:mo>-</mml:mo><mml:mi>&#x003B2;</mml:mi><mml:mo>-</mml:mo><mml:mi>&#x003B3;</mml:mi><mml:mo>-</mml:mo><mml:mi>&#x003B4;</mml:mi></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow><mml:mo>&#x000B7;</mml:mo><mml:mfrac><mml:mrow><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:msub><mml:mrow><mml:mi>N</mml:mi></mml:mrow><mml:mrow><mml:mi>p</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:mfrac></mml:mtd></mml:mtr></mml:mtable></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>
<p>where <italic>N</italic><sub><italic>p</italic></sub> is the total number of papers in the collection, and the last term represents a random jump. We set the four parameters so that &#x003B1; &#x0002B; &#x003B2; &#x0002B; &#x003B3; &#x0002B; &#x003B4; &#x0002B; &#x003B8; &#x0003D; 0.85, which means the probability of a random jump is 0.15. The iteration procedure is summarized in Algorithm 15.</p>
<table-wrap position="float">
<label>Algorithm 2:</label>
<caption><p>Paper Impact Assessment (Ranking)</p></caption>
<graphic xlink:href="fdata-02-00038-i0002.tif"/>
</table-wrap>
<p>In summary, the above paper ranking algorithm follows the four basic assumptions: (1) Papers tend to be important if other important papers cite them; (2) Authors become prestige if their articles are cited by important articles, and respected authors tend to write articles of higher quality; (3) Top venues (journals and conferences) tend to publish well-established articles, and being cited by high quality articles gives them higher impact; and (4) Articles tend to cite others for varied purposes, which produces different degrees of citation relevance. A citation is considered highly-relevant when the two papers are addressing relevant problems, using similar methods, or sharing common knowledge (Zhang et al., <xref ref-type="bibr" rid="B37">2019</xref>).</p>
</sec>
<sec>
<title>3.6. Solution-Oriented Knowledge Repository (SKR) Generation</title>
<p>Generation of the SKR is based on the <italic>RP</italic>s and <italic>PS</italic>s obtained by the semantics based information extraction module and the ranking results returned by the paper impact assessment module. Specifically, the <italic>RP</italic>s are used to generate clusters and link the corresponding <italic>PS</italic>s according to the association rules. Meanwhile, the <italic>PS</italic>s connecting to the central node <italic>PS</italic> in each cluster are sorted in ascending order based on the ranking result obtained from the paper impact assessment procedure. An illustration of the final SKR presented to users is shown in <xref ref-type="fig" rid="F3">Figure 3B</xref>.</p>
<fig id="F3" position="float">
<label>Figure 3</label>
<caption><p>Citation network <bold>(A)</bold> and the proposed solution-oriented graph <bold>(B)</bold>.</p></caption>
<graphic xlink:href="fdata-02-00038-g0003.tif"/>
</fig>
<p>It is worth mentioning that a SKR is different from a bibliometric network or citation network which reflect the social relationship between bibliometric entities or the citation relationship between papers. The SKR is evolved from bibliometric network, and more importantly, it performs in-depth exploration of the paper content and mine solutions from massive data for problem-driven solution recommendation. A comparison between a citation network (bibliometric network) and our SKG is illustrated in <xref ref-type="fig" rid="F3">Figure 3</xref> in which the <italic>R</italic><sub><italic>n</italic></sub> refers to the ranking position of the corresponding <italic>PS</italic> in its own cluster. The final presentation of the SKG follows a concise design.</p>
</sec>
</sec>
<sec id="s4">
<title>4. Case Study and Demonstration</title>
<sec>
<title>4.1. Dataset and Pre-processing</title>
<p>The research domain of intrusion detection in cyber security was chosen to test the S4 prototype due to the fact that cyber security issues are great challenges that humans currently face and will continue to do so in the future. According to reports and studies related to cyber crimes, a great amount of economic loss has been caused by cyber security incidents and crimes, and this amount is predicted to be arising if appropriate actions are not taken (Morgan, <xref ref-type="bibr" rid="B18">2018</xref>; Bissell and Ponemon, <xref ref-type="bibr" rid="B6">2019</xref>). Given the massive economic loss the intrusions could lead to, the intrusion detection field is selected as the test and demonstration subject.</p>
<p>Scopus was utilized to collect the source papers and their bibliometric data. By applying and utilizing Scopus API key, a Python program was developed to crawl scholarly data from Scopus database. 1358 related papers were obtained in the field of intrusion detection. The bibliometric data of these papers contains 4493 authors, 1331 publication venues including journals and conferences. The citations within paper collection were obtained by collecting the citations and references of the 1358 papers, and removing those citing and referencing outside the scope of the paper collection.</p>
<p>In order to further process the collected papers, another program (Python) was developed which converted the PDF documents into TXT files and separated each article into section. Incorporating with the semantics-based text mining method proposed in section 3.3, the <italic>RP</italic>s and <italic>PS</italic>s denoting intrusions and detecting solutions were extracted by using the Natural Language Toolkit (NLTK) in the program.</p>
</sec>
<sec>
<title>4.2. Results</title>
<p>A prototype system S4 is implemented based on the proposed framework for evaluation and demonstration. A partial view of the generated SKR in the research filed of intrusion detection is shown in <xref ref-type="fig" rid="F4">Figure 4</xref>. Details about the user interface and functions are specified after the result analysis.</p>
<fig id="F4" position="float">
<label>Figure 4</label>
<caption><p>A partial view of the SKR generated for the research field of intrusion detection.</p></caption>
<graphic xlink:href="fdata-02-00038-g0004.tif"/>
</fig>
<p>The SKR generated by our framework is different from the existing scholarly visualizations. In the SKR, each cluster represents a research problem (the central node) with its potential solutions (surrounding nodes linked to the central node) extracted from the academic papers. For a research domain, multiple clusters can be generated depending on the number of research problems mined from the papers. In the demonstrated example of intrusion detection, the research problems <italic>RP</italic>s are various types of intrusions such as DOS (blue), DDOS (green), BOTNET (pink), and PROBE (indigo) to cite a few, and the surrounding squares denote the solutions (or techniques) proposed to address the corresponding intrusions.</p>
<p>The SKR is presented in a concise and intuitive manner, and more importantly, it rebuilds the intrinsic relationship between research problems and proposed solutions and constructs the knowledge repository for effective user recommendation. Given the significance of the solutions for problems, the repository shows great potential in both academia and industry. In addition, the implemented S4 prototype integrates several auxiliary functions such as finding the frequently discussed topics and discovering the critical research problems yet has not been fully addressed. These functions enable the system to have certain data analysis capabilities to further provide knowledge-related analytical results.</p>
<p>The advance of the S4 also highlights in its efficiency and automation. <xref ref-type="table" rid="T1">Table 1</xref> shows a comparison of time consumption between the S4 and the traditional way of knowledge learning that relies on humans searching and studying a large number of articles. In the case study, the processing time of generating the final knowledge repository for intrusion detection is roughly 12 min, and during this period a number of 1358 papers has been processed. It has to be clarified that the majority time is consumed in calculating the citation relevance using semantics which is a procedure in generating the weighted HBG for the W-Rank paper ranking algorithm. The processing time can be significantly reduced to around 1 min when classic PageRank algorithm is selected (one option provided in our system), however, the ranking precision is compromised. In addition to ranked solutions to each problem, the S4 also provide a general review of the problems and solutions in this field. However, it would be overwhelming for a human to do so in limited time.</p>
<table-wrap position="float" id="T1">
<label>Table 1</label>
<caption><p>Comparison between S4 automation and manual learning.</p></caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th valign="top" align="left"><bold>Processing</bold></th>
<th valign="top" align="left"><bold>S4</bold></th>
<th valign="top" align="left"><bold>Human</bold></th>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left">Time</td>
<td valign="top" align="left">12 min</td>
<td valign="top" align="left">Rely on human capacities</td>
</tr>
<tr>
<td valign="top" align="left">&#x00023;Articles</td>
<td valign="top" align="left">1358</td>
<td valign="top" align="left">Rely on human capacities</td>
</tr>
<tr>
<td valign="top" align="left">Results</td>
<td valign="top" align="left">SKR with analytic report</td>
<td valign="top" align="left">Rely on human capacities</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>Regarding the output, the S4 generated a formatted knowledge repository which allows flexible user operations such as editing, adding notes, storing and downloading. But beyond all these attributes, the major contribution of S4 is that it automatically generates solution-oriented knowledge maps retrieved from academic articles, which is a distinctive feature compared to other scholarly recommending systems.</p>
</sec>
<sec>
<title>4.3. The S4 Prototype Demonstration</title>
<p>Implementation of the prototype and User Interface (UI) design involves several programming languages, including Hypertext Markup Language (HTML), Cascading Style Sheets (CSS), and Javascript (JS), and several libraries, including JSON and Visual Notation for OWL Ontologies (VOWL). Currently the prototype is running on a local server. The system UI is shown in <xref ref-type="fig" rid="F5">Figure 5</xref>. The SKR is displayed in the main panel and it is interactive. On the top right side, a node description panel is set to show the details of any selected node. A comment panel is placed at the right bottom for users to leave comments to the nodes and view the existing comments.</p>
<fig id="F5" position="float">
<label>Figure 5</label>
<caption><p>User interface of the S4 prototype.</p></caption>
<graphic xlink:href="fdata-02-00038-g0005.tif"/>
</fig>
<p>A recommendation panel is designed at the bottom to provide analytic indexes and recommendations. This panel was developed to provide solution ranking results and recommendations to users. This function was achieved by utilizing the bibliometric information of the articles from which the <italic>PS</italic>s and <italic>RP</italic>s were extracted. Three rankings are displayed at the bottom of the S4 interface by default as shown in <xref ref-type="fig" rid="F5">Figure 5</xref> and total nine bibliometric indexes are used to rate the collected solutions as shown in <xref ref-type="fig" rid="F6">Figure 6</xref>. Firstly, citation count is selected as it is by far the most widely accepted and easiest way to measure the significance of academic articles. The more times an article is cited, the more value the article is perceived to hold. Secondly, the proposed W-Rank algorithm is able to generate scores for the articles that correspond to the <italic>PS</italic> nodes in the knowledge map and rank them accordingly. The greater score an article obtains, the greater significant of the article. The W-Rank algorithm adopted in the system takes into account multiple bibliometric factors including citation (with citation relevance), author (with co-author contribution), publication venue, and publication time, as in Equation (12), rather than only considering paper citations. The classic PageRank algorithm is also available to rank the articles for comparison. Thirdly, the information of the corresponding journals and authors is also ranked in order to help the users make justified decisions. The article publication year and the amount of received comments are collected and made available to the users.</p>
<fig id="F6" position="float">
<label>Figure 6</label>
<caption><p>Recommendation panel of the S4 prototype.</p></caption>
<graphic xlink:href="fdata-02-00038-g0006.tif"/>
</fig>
</sec>
</sec>
<sec id="s5">
<title>5. Conclusion and Future Work</title>
<p>The huge and ever growing volume of academic articles have created the &#x0201C;big literature,&#x0201D; which brings great opportunities for advancing scientific research, meanwhile it rises the difficulties for readers to find valuable problem-solving knowledge of their interests. To cope with this issue, a system that retrieves scientific solutions from academic articles and provides solution-oriented recommendations is required, yet has been overlooked in existing literature. In this study, we propose a framework to build Solution-oriented Knowledge Repositories (SKR) by semantics based information extraction and bibliometric graph based knowledge evaluation algorithms. Employing the proposed SKR framework, a Scholarly Solution Support System (S4) prototype is developed that produces a SKR in a concise, meaningful and intuitive manner and recommends scientific solutions based on their impact. The S4 prototype has been tested in the intrusion detection field, and the results validated the efficiency and effectiveness of S4 and demonstrated its potential value in both academia and industry. It automates the information retrieval and knowledge learning process, therefore, helps users in reducing their learning workload and time.</p>
<p>Future extension of this study will focus on the design of a document filtering module for source paper cleansing and denoising to improve the quality of the papers used in knowledge mining. By doing so, the irrelevant or low quality articles can be removed to generate a more precise knowledge repository, as well as reducing processing time. In addition, the current dataset for demonstration is not large enough, which is a limitation of this study. In our future work, we will expand our dataset in other research fields or mixed fields to verify the universal applicability of the proposed methods.</p>
</sec>
<sec sec-type="data-availability-statement" id="s6">
<title>Data Availability Statement</title>
<p>The datasets generated for this study are available on request to the corresponding author.</p>
</sec>
<sec id="s7">
<title>Author Contributions</title>
<p>YZ proposed the conceptual framework and system design. MW and MS also contributed to the framework design. YZ and MW drafted the manuscript and figures. YZ and MW carried out the case study and experiments. MW developed the ranking algorithm. MS and EC provided supervision and support.</p>
<sec>
<title>Conflict of Interest</title>
<p>The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.</p>
</sec>
</sec>
</body>
<back>
<ref-list>
<title>References</title>
<ref id="B1">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Adair</surname> <given-names>J. G.</given-names></name> <name><surname>Vohra</surname> <given-names>N.</given-names></name></person-group> (<year>2003</year>). <article-title>The explosion of knowledge, references, and citations: psychology&#x00027;s unique response to a crisis</article-title>. <source>Am. Psychol.</source> <volume>58</volume>, <fpage>15</fpage>&#x02013;<lpage>23</lpage>. <pub-id pub-id-type="doi">10.1037/0003-066X.58.1.15</pub-id><pub-id pub-id-type="pmid">12674815</pub-id></citation></ref>
<ref id="B2">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Arapakis</surname> <given-names>I.</given-names></name> <name><surname>Leiva</surname> <given-names>L. A.</given-names></name> <name><surname>Cambazoglu</surname> <given-names>B. B.</given-names></name></person-group> (<year>2015</year>). <article-title>Know your onions: understanding the user experience with the knowledge module in web search</article-title>, in <source>Proceedings of the 24th ACM International on Conference on Information and Knowledge Management</source>, CIKM &#x00027;15 (<publisher-loc>New York, NY</publisher-loc>: <publisher-name>ACM</publisher-name>), <fpage>1695</fpage>&#x02013;<lpage>1698</lpage>.</citation></ref>
<ref id="B3">
<citation citation-type="thesis"><person-group person-group-type="author"><name><surname>Barla</surname> <given-names>M.</given-names></name></person-group> (<year>2010</year>). <source>Towards social-based user modeling and personalization</source> (Ph.D. dissertation). <publisher-name>Slovak University of Technology in Bratislava</publisher-name>, <publisher-loc>Bratislava, Europe</publisher-loc>.</citation></ref>
<ref id="B4">
<citation citation-type="thesis"><person-group person-group-type="author"><name><surname>Beel</surname> <given-names>J.</given-names></name></person-group> (<year>2015</year>). <source>Towards effective research-paper recommender systems and user modeling based on mind maps</source> (Ph.D. dissertation). <publisher-name>Otto von Guericke University Magdeburg</publisher-name>, <publisher-loc>Magdeburg, Germany</publisher-loc>.</citation></ref>
<ref id="B5">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Bethard</surname> <given-names>S.</given-names></name> <name><surname>Jurafsky</surname> <given-names>D.</given-names></name></person-group> (<year>2010</year>). <article-title>Who should I cite: learning literature search models from citation behavior</article-title>, in <source>Proceedings of the 19th ACM International Conference on Information and Knowledge Management</source> (<publisher-loc>Toronto, ON</publisher-loc>: <publisher-name>ACM</publisher-name>), <fpage>609</fpage>&#x02013;<lpage>618</lpage>.</citation></ref>
<ref id="B6">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Bissell</surname> <given-names>K.</given-names></name> <name><surname>Ponemon</surname> <given-names>L.</given-names></name></person-group> (<year>2019</year>). <source>Ninth Annual Cost of Cybercrime Study</source>. Available online at: <ext-link ext-link-type="uri" xlink:href="https://www.accenture.com/us-en/insights/security/cost-cybercrime-study">https://www.accenture.com/us-en/insights/security/cost-cybercrime-study</ext-link> (accessed June 13, 2019).</citation></ref>
<ref id="B7">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Burke</surname> <given-names>R.</given-names></name></person-group> (<year>2002</year>). <article-title>Hybrid recommender systems: survey and experiments</article-title>. <source>User Model User Adapt. Interact.</source> <volume>12</volume>, <fpage>331</fpage>&#x02013;<lpage>370</lpage>. <pub-id pub-id-type="doi">10.1023/A:1021240730564</pub-id></citation></ref>
<ref id="B8">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Constantin</surname> <given-names>A.</given-names></name> <name><surname>Pettifer</surname> <given-names>S.</given-names></name> <name><surname>Voronkov</surname> <given-names>A.</given-names></name></person-group> (<year>2013</year>). <article-title>PDFX: Fully-automated PDF-to-XML conversion of scientific literature</article-title>, in <source>Proceedings of the 2013 ACM Symposium on Document Engineering</source> (<publisher-loc>Florence</publisher-loc>: <publisher-name>ACM</publisher-name>), <fpage>177</fpage>&#x02013;<lpage>180</lpage>.</citation></ref>
<ref id="B9">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Gangemi</surname> <given-names>A.</given-names></name> <name><surname>Draicchio</surname> <given-names>F.</given-names></name> <name><surname>Presutti</surname> <given-names>V.</given-names></name> <name><surname>Nuzzolese</surname> <given-names>A. G.</given-names></name> <name><surname>Reforgiato</surname> <given-names>D.</given-names></name></person-group> (<year>2013</year>). <article-title>A machine reader for the semantic web</article-title>, in <source>Proceedings of the 12th International Semantic Web Conference (Posters &#x00026; Demonstrations Track)</source>, <fpage>149</fpage>&#x02013;<lpage>152</lpage>. Available online at: <ext-link ext-link-type="uri" xlink:href="http://ceur-ws.org/">http://ceur-ws.org/</ext-link></citation></ref>
<ref id="B10">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Gipp</surname> <given-names>B.</given-names></name> <name><surname>Beel</surname> <given-names>J.</given-names></name></person-group> (<year>2009</year>). <article-title>Citation proximity analysis (cpa) : a new approach for identifying related work based on co-citation analysis</article-title>, in <source>Proceedings of the 12th International Conference on Scientometrics and Informetrics</source>, ed <person-group person-group-type="editor"><name><surname>Larsen</surname> <given-names>B.</given-names></name></person-group> (<publisher-loc>So Paulo</publisher-loc>: <publisher-name>BIREME/PANO/WHO</publisher-name>), <fpage>571</fpage>&#x02013;<lpage>575</lpage>.</citation></ref>
<ref id="B11">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Huang</surname> <given-names>S.</given-names></name> <name><surname>Wan</surname> <given-names>X.</given-names></name></person-group> (<year>2013</year>). <article-title>Akminer: domain-specific knowledge graph mining from academic literatures</article-title>, in <source>Proceedings of the Web Information Systems Engineering (WISE)</source> (<publisher-loc>Berlin; Heidelberg</publisher-loc>: <publisher-name>Springer</publisher-name>), <fpage>241</fpage>&#x02013;<lpage>255</lpage>.</citation></ref>
<ref id="B12">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Iyengar</surname> <given-names>N. C. S. N.</given-names></name> <name><surname>Ganapathy</surname> <given-names>G.</given-names></name> <name><surname>Mogan Kumar</surname> <given-names>P.</given-names></name> <name><surname>Abraham</surname> <given-names>A.</given-names></name></person-group> (<year>2014</year>). <article-title>A multilevel thrust filtration defending mechanism against ddos attacks in cloud computing environment</article-title>. <source>Int. J. Grid Util. Comput.</source> <volume>5</volume>, <fpage>236</fpage>&#x02013;<lpage>248</lpage>. <pub-id pub-id-type="doi">10.1504/IJGUC.2014.065384</pub-id></citation></ref>
<ref id="B13">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Jack</surname> <given-names>K.</given-names></name></person-group> (<year>2012</year>). <source>Mendeley: Recommendation Systems for Academic Literature</source>. Presentation at Technical University of Graz (TUG).</citation></ref>
<ref id="B14">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Lao</surname> <given-names>N.</given-names></name> <name><surname>Cohen</surname> <given-names>W. W.</given-names></name></person-group> (<year>2010</year>). <article-title>Relational retrieval using a combination of path-constrained random walks</article-title>. <source>Mach. Learn.</source> <volume>81</volume>, <fpage>53</fpage>&#x02013;<lpage>67</lpage>. <pub-id pub-id-type="doi">10.1007/s10994-010-5205-8</pub-id></citation></ref>
<ref id="B15">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Le</surname> <given-names>T. M. V.</given-names></name> <name><surname>Lauw</surname> <given-names>H. W.</given-names></name></person-group> (<year>2017</year>). <article-title>Semvis: semantic visualization for interactive topical analysis</article-title>, in <source>Proceedings of the 2017 ACM on Conference on Information and Knowledge Management</source>, CIKM &#x00027;17 (<publisher-loc>New York, NY</publisher-loc>: <publisher-name>ACM</publisher-name>), <fpage>2487</fpage>&#x02013;<lpage>2490</lpage>.</citation></ref>
<ref id="B16">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Ma</surname> <given-names>X.</given-names></name> <name><surname>Lu</surname> <given-names>H.</given-names></name> <name><surname>Gan</surname> <given-names>Z.</given-names></name></person-group> (<year>2014</year>). <article-title>Improving recommendation accuracy by combining trust communities and collaborative filtering</article-title>, in <source>Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management</source>, CIKM &#x00027;14 (<publisher-loc>New York, NY</publisher-loc>: <publisher-name>ACM</publisher-name>), <fpage>1951</fpage>&#x02013;<lpage>1954</lpage>.</citation></ref>
<ref id="B17">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>M&#x000F6;nnich</surname> <given-names>M.</given-names></name> <name><surname>Spiering</surname> <given-names>M.</given-names></name></person-group> (<year>2008</year>). <article-title>Adding value to the library catalog by implementing a recommendation system</article-title>. <source>D Lib Magaz.</source> <volume>14</volume>, <fpage>1082</fpage>&#x02013;<lpage>9873</lpage>. <pub-id pub-id-type="doi">10.1045/may2008-monnich</pub-id></citation></ref>
<ref id="B18">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Morgan</surname> <given-names>S.</given-names></name></person-group> (<year>2018</year>). <source>Cybercrime Damages $6 trillion by 2021</source>. Available online at: <ext-link ext-link-type="uri" xlink:href="https://cybersecurityventures.com/cybercrime-damages-6-trillion-by-2021/">https://cybersecurityventures.com/cybercrime-damages-6-trillion-by-2021/</ext-link> (accessed June 13, 2019).</citation></ref>
<ref id="B19">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Nuzzolese</surname> <given-names>A. G.</given-names></name> <name><surname>Peroni</surname> <given-names>S.</given-names></name> <name><surname>Reforgiato Recupero</surname> <given-names>D.</given-names></name></person-group> (<year>2016</year>). <article-title>ACM: article content miner for assessing the quality of scientific output</article-title>, in <source>Proceedings of the Third SemWebEval Challenge at ESWC 2016</source>, eds <person-group person-group-type="editor"><name><surname>Nuzzolese</surname> <given-names>A. G.</given-names></name> <name><surname>Peroni</surname> <given-names>S.</given-names></name> <name><surname>Reforgiato Recupero</surname> <given-names>D.</given-names></name></person-group> (<publisher-loc>Cham</publisher-loc>: <publisher-name>Springer International Publishing</publisher-name>), <fpage>281</fpage>&#x02013;<lpage>292</lpage>.</citation></ref>
<ref id="B20">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Perez-Arriaga</surname> <given-names>M. O.</given-names></name> <name><surname>Estrada</surname> <given-names>T.</given-names></name> <name><surname>Abad-Mota</surname> <given-names>S.</given-names></name></person-group> (<year>2016</year>). <article-title>TAO: system for table detection and extraction from PDF documents</article-title>, in <source>Proceedings of the Twenty-Ninth International Florida Artificial Intelligence Research Society (FLAIRS) Conference</source> (<publisher-loc>Palo Alto, CA</publisher-loc>: <publisher-name>AAAI Press</publisher-name>), <fpage>591</fpage>&#x02013;<lpage>596</lpage>.</citation></ref>
<ref id="B21">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Pilehvar</surname> <given-names>M. T.</given-names></name> <name><surname>Jurgens</surname> <given-names>D.</given-names></name> <name><surname>Navigli</surname> <given-names>R.</given-names></name></person-group> (<year>2013</year>). <article-title>Align, disambiguate and walk: a unified approach for measuring semantic similarity</article-title>, in <source>Proceedings of the 51st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers)</source> (<publisher-loc>Bulgaria</publisher-loc>: <publisher-name>Association for Computational Linguistics</publisher-name>), <fpage>1341</fpage>&#x02013;<lpage>1351</lpage>.</citation></ref>
<ref id="B22">
<citation citation-type="book"><person-group person-group-type="editor"><name><surname>Ricci</surname> <given-names>F.</given-names></name> <name><surname>Rokach</surname> <given-names>L.</given-names></name> <name><surname>Shapira</surname> <given-names>B.</given-names></name></person-group> (eds.). (<year>2015</year>). <article-title>Recommender systems: introduction and challenges</article-title>, in <source>Recommender Systems Handbook</source> (<publisher-loc>Boston, MA</publisher-loc>: <publisher-name>Springer</publisher-name>). <pub-id pub-id-type="doi">10.1007/978-1-4899-7637-6_1</pub-id></citation>
</ref>
<ref id="B23">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Rich</surname> <given-names>E.</given-names></name></person-group> (<year>1979</year>). <article-title>User modeling via stereotypes</article-title>. <source>Cogn. Sci.</source> <volume>3</volume>, <fpage>329</fpage>&#x02013;<lpage>354</lpage>. <pub-id pub-id-type="doi">10.1207/s15516709cog0304_3</pub-id></citation></ref>
<ref id="B24">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Salton</surname> <given-names>G.</given-names></name></person-group> (<year>1970</year>). <article-title>Automatic text analysis</article-title>. <source>Science</source> <volume>168</volume>, <fpage>335</fpage>&#x02013;<lpage>343</lpage>. <pub-id pub-id-type="doi">10.1126/science.168.3929.335</pub-id><pub-id pub-id-type="pmid">5435890</pub-id></citation></ref>
<ref id="B25">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Shahaf</surname> <given-names>D.</given-names></name> <name><surname>Guestrin</surname> <given-names>C.</given-names></name> <name><surname>Horvitz</surname> <given-names>E.</given-names></name></person-group> (<year>2012</year>). <article-title>Metro maps of science</article-title>, in <source>Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining</source>, KDD &#x00027;12 (<publisher-loc>New York, NY</publisher-loc>: <publisher-name>ACM</publisher-name>), <fpage>1122</fpage>&#x02013;<lpage>1130</lpage>.</citation></ref>
<ref id="B26">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Shotton</surname> <given-names>D.</given-names></name></person-group> (<year>2009</year>). <article-title>CiTO, the citation typing ontology, and its use for annotation of reference lists and visualization of citation networks</article-title>, in <source>Proceedings of the Bio-Ontologies Special Interest Group Meeting 2009: Knowledge in Biology</source> (<publisher-loc>Stockholm</publisher-loc>).</citation></ref>
<ref id="B27">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Sosnovsky</surname> <given-names>S.</given-names></name> <name><surname>Dicheva</surname> <given-names>D.</given-names></name></person-group> (<year>2010</year>). <article-title>Ontological technologies for user modelling</article-title>. <source>Int. J. Metadata Semant. Ontol.</source> <volume>5</volume>, <fpage>1744</fpage>&#x02013;<lpage>2621</lpage>. <pub-id pub-id-type="doi">10.1504/IJMSO.2010.032649</pub-id></citation></ref>
<ref id="B28">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Tan</surname> <given-names>Z.</given-names></name> <name><surname>Liu</surname> <given-names>C.</given-names></name> <name><surname>Mao</surname> <given-names>Y.</given-names></name> <name><surname>Guo</surname> <given-names>Y.</given-names></name> <name><surname>Shen</surname> <given-names>J.</given-names></name> <name><surname>Wang</surname> <given-names>X.</given-names></name></person-group> (<year>2016</year>). <article-title>AceMap: a novel approach towards displaying relationship among academic literatures</article-title>, in <source>Proceedings of the 25th International Conference Companion on World Wide Web</source> (<publisher-loc>Montr&#x000E9;al, QC</publisher-loc>: <publisher-name>International World Wide Web Conferences Steering Committee</publisher-name>), <fpage>437</fpage>&#x02013;<lpage>442</lpage>. <pub-id pub-id-type="doi">10.1145/2872518.2890514</pub-id></citation></ref>
<ref id="B29">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Tang</surname> <given-names>J.</given-names></name> <name><surname>Zhang</surname> <given-names>J.</given-names></name> <name><surname>Yao</surname> <given-names>L.</given-names></name> <name><surname>Li</surname> <given-names>J.</given-names></name> <name><surname>Zhang</surname> <given-names>L.</given-names></name> <name><surname>Su</surname> <given-names>Z.</given-names></name></person-group> (<year>2008</year>). <article-title>Arnetminer: Extraction and mining of academic social networks</article-title>, in <source>Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining</source>, KDD &#x00027;08 (<publisher-loc>New York, NY</publisher-loc>: <publisher-name>ACM</publisher-name>), <fpage>990</fpage>&#x02013;<lpage>998</lpage>.</citation></ref>
<ref id="B30">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Tao</surname> <given-names>S.</given-names></name> <name><surname>Wang</surname> <given-names>X.</given-names></name> <name><surname>Huang</surname> <given-names>W.</given-names></name> <name><surname>Chen</surname> <given-names>W.</given-names></name> <name><surname>Wang</surname> <given-names>T.</given-names></name> <name><surname>Lei</surname> <given-names>K.</given-names></name></person-group> (<year>2017</year>). <article-title>From citation network to study map: a novel model to reorganize academic literatures</article-title>, in <source>Proceedings of the 26th International Conference on World Wide Web Companion</source> (<publisher-loc>Perth, WA</publisher-loc>: <publisher-name>International World Wide Web Conferences Steering Committee</publisher-name>), <fpage>1225</fpage>&#x02013;<lpage>1232</lpage>.</citation></ref>
<ref id="B31">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Tkaczyk</surname> <given-names>D.</given-names></name> <name><surname>Szostek</surname> <given-names>P.</given-names></name> <name><surname>Fedoryszak</surname> <given-names>M.</given-names></name> <name><surname>Dendek</surname> <given-names>P. J.</given-names></name> <name><surname>Bolikowski</surname> <given-names>L.</given-names></name></person-group> (<year>2015</year>). <article-title>CERMINE: automatic extraction of structured metadata from scientific literature</article-title>. <source>Int. J. Doc. Anal. Recog.</source> <volume>18</volume>, <fpage>317</fpage>&#x02013;<lpage>335</lpage>. <pub-id pub-id-type="doi">10.1007/s10032-015-0249-8</pub-id></citation></ref>
<ref id="B32">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Van Eck</surname> <given-names>N. J.</given-names></name> <name><surname>Waltman</surname> <given-names>L.</given-names></name></person-group> (<year>2010</year>). <article-title>Software survey: vosviewer, a computer program for bibliometric mapping</article-title>. <source>Scientometrics</source> <volume>84</volume>, <fpage>523</fpage>&#x02013;<lpage>538</lpage>. <pub-id pub-id-type="doi">10.1007/s11192-009-0146-3</pub-id><pub-id pub-id-type="pmid">20585380</pub-id></citation></ref>
<ref id="B33">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Yang</surname> <given-names>C.</given-names></name> <name><surname>Wei</surname> <given-names>B.</given-names></name> <name><surname>Wu</surname> <given-names>J.</given-names></name> <name><surname>Zhang</surname> <given-names>Y.</given-names></name> <name><surname>Zhang</surname> <given-names>L.</given-names></name></person-group> (<year>2009</year>). <article-title>CARES: a ranking-oriented CADAL recommender system</article-title>, in <source>Proceedings of the 9th ACM/IEEE-CS Joint Conference on Digital Libraries</source> (<publisher-loc>Austin, TX</publisher-loc>), <fpage>203</fpage>&#x02013;<lpage>212</lpage>. <pub-id pub-id-type="doi">10.1145/1555400.1555432</pub-id></citation></ref>
<ref id="B34">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Zarrinkalam</surname> <given-names>F.</given-names></name> <name><surname>Kahani</surname> <given-names>M.</given-names></name></person-group> (<year>2013</year>). <article-title>Semcir: a citation recommendation system based on a novel semantic distance measure</article-title>. <source>Program</source> <volume>47</volume>, <fpage>92</fpage>&#x02013;<lpage>112</lpage>. <pub-id pub-id-type="doi">10.1108/00330331311296320</pub-id></citation></ref>
<ref id="B35">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Zhang</surname> <given-names>L.</given-names></name> <name><surname>F&#x000E4;rber</surname> <given-names>M.</given-names></name> <name><surname>Rettinger</surname> <given-names>A.</given-names></name></person-group> (<year>2016</year>). <article-title>Xknowsearch!: exploiting knowledge bases for entity-based cross-lingual information retrieval</article-title>, in <source>Proceedings of the 25th ACM International on Conference on Information and Knowledge Management</source>, CIKM &#x00027;16 (<publisher-loc>New York, NY</publisher-loc>: <publisher-name>ACM</publisher-name>), <fpage>2425</fpage>&#x02013;<lpage>2428</lpage>.</citation></ref>
<ref id="B36">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Zhang</surname> <given-names>Y.</given-names></name> <name><surname>Saberi</surname> <given-names>M.</given-names></name> <name><surname>Chang</surname> <given-names>E.</given-names></name></person-group> (<year>2018</year>). <article-title>A semantic-based knowledge fusion model for solution-oriented information network development: a case study in intrusion detection field</article-title>. <source>Scientometrics</source> <volume>117</volume>, <fpage>857</fpage>&#x02013;<lpage>886</lpage>. <pub-id pub-id-type="doi">10.1007/s11192-018-2904-6</pub-id></citation></ref>
<ref id="B37">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Zhang</surname> <given-names>Y.</given-names></name> <name><surname>Wang</surname> <given-names>M.</given-names></name> <name><surname>Gottwalt</surname> <given-names>F.</given-names></name> <name><surname>Saberi</surname> <given-names>M.</given-names></name> <name><surname>Chang</surname> <given-names>E.</given-names></name></person-group> (<year>2019</year>). <article-title>Ranking scientific articles based on bibliometric networks with a weighting scheme</article-title>. <source>J. Informetr.</source> <volume>13</volume>, <fpage>616</fpage>&#x02013;<lpage>634</lpage>. <pub-id pub-id-type="doi">10.1016/j.joi.2019.03.013</pub-id></citation></ref>
</ref-list> 
</back>
</article>