Search Results

You are looking at 41 - 50 of 353 items for :

  • "cluster analysis" x
  • All content x
Clear All

, scholars usually cluster analysis, multidimensional scaling analysis and factor analysis to conduct co-citation analysis. Compared to the scholars’ traditional qualitative analysis (including individual induction, interviews and other subjective methods

Restricted access

, P. J. ( 1990 ): Finding Groups in Data: An Introduction to Cluster Analysis . New York: John&Wiley . Kruskal , J. B. ( 1964 ): Nonmetric Multidimensional Scaling: A

Restricted access

problems in a method of cluster analysis. Biometrics 27 :501-514. Practical problems in a method of cluster analysis Biometrics 501 514

Restricted access

statistical significant difference between the two classes of diseases in the proportions of missing papers. For each year, a Kruskal–Wallis rank sum test yielded a non-significant result [χ 2 (1) < 1.5, P > 0.05]. Cluster analysis

Restricted access

Cluster Analysis , John Wiley & Sons, New York, 1999 . [29] H.C. Romesburg , Cluster Analysis for Researchers, Lifetime Learning

Restricted access

Souza, E., Sorrells, M.E. 1991. Relationships among 70 American oat germplasms. I. Cluster analysis using quantitative characters. Crop Sci. 31 :599–605. Sorrells M.E. Relationships

Restricted access

conduct a literature review. Then we introduce the data set and the method HDCCA with its realization steps. In the next part, we construct the hybrid documents co-citation network, and apply both cluster analysis and network analysis to uncover the

Restricted access

1993 106 13 20 Ng, A., Jordan, M. and Weiss, Y. 2001. On spectral clustering: analysis and an algorithm. Advances in

Restricted access

Fig. 4 Dendrogram of the authors in 11-Slice Twelve groups are forming according to the cluster analysis from bottom to top. Group 1, group 3, group 4, group7, group 8 all come from

Restricted access

grouped and considered as single keywords. Another innovative method was “word cluster analysis”, combining and analyzing “words in title”, “author keywords”, and “KeyWords Plus”. This was used to discover the research trend, or “research hotspots

Restricted access