{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,30]],"date-time":"2024-06-30T15:10:15Z","timestamp":1719760215872},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2019,10,28]],"date-time":"2019-10-28T00:00:00Z","timestamp":1572220800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,10,28]],"date-time":"2019-10-28T00:00:00Z","timestamp":1572220800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2020,9]]},"DOI":"10.1007\/s12652-019-01547-0","type":"journal-article","created":{"date-parts":[[2019,10,28]],"date-time":"2019-10-28T13:10:58Z","timestamp":1572268258000},"page":"3617-3626","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["An evaluation method of scientific research team influence based on heterogeneity and node similarity of content and structure"],"prefix":"10.1007","volume":"11","author":[{"given":"Zhao","family":"Wenbin","sequence":"first","affiliation":[]},{"given":"Fan","family":"Tongrang","sequence":"additional","affiliation":[]},{"given":"Yin","family":"Zhixian","sequence":"additional","affiliation":[]},{"given":"Fu","family":"Zijian","sequence":"additional","affiliation":[]},{"given":"Wu","family":"Feng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,10,28]]},"reference":[{"issue":"406","key":"1547_CR1","doi-asserted-by":"crossref","first-page":"378","DOI":"10.1038\/35019019","volume":"2000","author":"R Albert","year":"2000","unstructured":"Albert R, Jeong H, Barabasi AL (2000) Error and attack tolerance of complex networks. Nature 2000(406):378\u2013382","journal-title":"Nature"},{"key":"1547_CR2","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1126\/science.1215842","volume":"10","author":"S Aral","year":"2012","unstructured":"Aral S, Walker D (2012) Identifying influential and susceptible members of social networks. Science 10:337\u2013341","journal-title":"Science"},{"key":"1547_CR3","doi-asserted-by":"crossref","first-page":"6108","DOI":"10.1038\/srep06108","volume":"4","author":"DB Chen","year":"2014","unstructured":"Chen DB, Xiao R, Zeng A (2014) Predicting the evolution of spreading on complex networks. Sci Rep 4:6108","journal-title":"Sci Rep"},{"issue":"1","key":"1547_CR4","first-page":"23","volume":"28","author":"D Cui","year":"2019","unstructured":"Cui D, Liu Y, Wang R et al (2019) Influence of substrate temperature on the structural and optical properties of ZnO films on flexible substrate by RF magnetron sputtering. Acta Microsc 28(1):23\u201329","journal-title":"Acta Microsc"},{"key":"1547_CR5","doi-asserted-by":"crossref","first-page":"825","DOI":"10.1134\/S1054661817040058","volume":"27","author":"GM Emelyanov","year":"2017","unstructured":"Emelyanov GM, Mikhailov DV, Kozlov AP (2017) The TF-IDF measure and analysis of links between words within N-grams in the formation of knowledge units for open tests. Pattern Recognit Image Anal 27:825","journal-title":"Pattern Recognit Image Anal"},{"issue":"3","key":"1547_CR6","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1016\/0378-8733(78)90021-7","volume":"1","author":"LC Freeman","year":"1979","unstructured":"Freeman LC (1979) Centrality in social networks conceptual clarification. Soc Netw 1(3):215\u2013239","journal-title":"Soc Netw"},{"issue":"5","key":"1547_CR7","first-page":"28","volume":"34","author":"M Guojun","year":"2017","unstructured":"Guojun M, Songyan X, Dianjun H (2017) Improvement of PageRank model and mining algorithm of microblog user influence. Comput Appl Softw 34(5):28\u201332","journal-title":"Comput Appl Softw"},{"issue":"5","key":"1547_CR8","first-page":"429","volume":"64","author":"Z Han","year":"2015","unstructured":"Han Z, Wu Y, Tan XS et al (2015) Ranking key nodes in complex networks by considering structural holes. Acta Phys Sin 64(5):429\u2013437","journal-title":"Acta Phys Sin"},{"issue":"14","key":"1547_CR9","first-page":"9","volume":"62","author":"Q Hu","year":"2013","unstructured":"Hu Q, Yanshen Y, Ma P et al (2013) A new approach to identify influential spreaders in complex networks. Acta Phys Sin 62(14):9\u201319","journal-title":"Acta Phys Sin"},{"key":"1547_CR10","doi-asserted-by":"crossref","unstructured":"Lee S (2017) Improving Jaccard index for measuring similarity in collaborative filtering. In: Kim K, Joukov N (eds) Information science and applications 2017. ICISA 2017. Lecture notes in electrical engineering, 424. Springer, Singapore","DOI":"10.1007\/978-981-10-4154-9_93"},{"issue":"7579","key":"1547_CR11","doi-asserted-by":"crossref","first-page":"544","DOI":"10.1038\/nature15737","volume":"527","author":"F Morone","year":"2015","unstructured":"Morone F, Makse HA (2015) Influence maximization in complex networks through optimal percolation. Nature 527(7579):544","journal-title":"Nature"},{"issue":"2","key":"1547_CR12","doi-asserted-by":"crossref","first-page":"404","DOI":"10.1073\/pnas.98.2.404","volume":"98","author":"MEJ Newman","year":"2001","unstructured":"Newman MEJ (2001a) The structure of scientific collaboration networks. Proc Natl Acad Sci 98(2):404\u2013409","journal-title":"Proc Natl Acad Sci"},{"issue":"1","key":"1547_CR13","doi-asserted-by":"crossref","first-page":"016132","DOI":"10.1103\/PhysRevE.64.016132","volume":"64","author":"MEJ Newman","year":"2001","unstructured":"Newman MEJ (2001b) Scientific collaboration networks. I. Network construction and fundamental results. Phys Rev E 64(1):016132","journal-title":"Phys Rev E"},{"issue":"1","key":"1547_CR14","doi-asserted-by":"crossref","first-page":"016132","DOI":"10.1103\/PhysRevE.64.016132","volume":"64","author":"MEJ Newman","year":"2001","unstructured":"Newman MEJ (2001c) Scientific collaboration networks. II. Shortest paths, weighted networks, and centrality. Phys Rev E 64(1):016132","journal-title":"Phys Rev E"},{"key":"1547_CR15","first-page":"21","volume":"7","author":"G Qing","year":"2017","unstructured":"Qing G, Guilin J, Yingke L et al (2017) Probabilistic analysis of stochastic SI epidemic model. Stat Decis 7:21\u201324","journal-title":"Stat Decis"},{"key":"1547_CR16","doi-asserted-by":"crossref","unstructured":"Romero DM, Galuba W, Asur S et al (2011) Influence and passivity in social media. In: Machine learning and knowledge discovery in databases. Springer, Heidelberg, pp 18\u201333","DOI":"10.1145\/1963192.1963250"},{"key":"1547_CR17","doi-asserted-by":"crossref","unstructured":"Saito K, Kimura M, Ohara K et al (2010) Selecting information diffusion models over social networks for behavioral analysis. In: Proceedings of the European conference on machine learning and principles and practice of knowledge discovery in databases, Barcelona, pp 180\u2013195","DOI":"10.1007\/978-3-642-15939-8_12"},{"issue":"6","key":"1547_CR18","doi-asserted-by":"crossref","first-page":"063104","DOI":"10.1063\/1.4922153","volume":"25","author":"P Shu","year":"2015","unstructured":"Shu P, Wang W, Tang M et al (2015) Numerical identification of epidemic thresholds for susceptible-infected-recovered model on finite-size networks. Chaos 25(6):063104","journal-title":"Chaos"},{"issue":"5","key":"1547_CR19","first-page":"246","volume":"46","author":"XY Yan","year":"2010","unstructured":"Yan XY (2010) Path-finding algorithm of public transport networks based on bipartite graph model. Comput Eng Appl 46(5):246\u2013248","journal-title":"Comput Eng Appl"},{"issue":"3","key":"1547_CR20","first-page":"371","volume":"66","author":"R Yi-Run","year":"2017","unstructured":"Yi-Run R, Song-Yang L, Jun-De W et al (2017) Node importance measurement based on neighborhood similarity in complex network. Acta Phys Sin 66(3):371\u2013379","journal-title":"Acta Phys Sin"},{"issue":"03","key":"1547_CR21","first-page":"233","volume":"66","author":"X Yunpeng","year":"2017","unstructured":"Yunpeng X, Songyang L, Yanbing L (2017) An information diffusion dynamic model based on social influence and mean-field theory. Acta Phys Sin 66(03):233\u2013245","journal-title":"Acta Phys Sin"},{"issue":"4","key":"1547_CR22","doi-asserted-by":"crossref","first-page":"2759","DOI":"10.1007\/s11277-018-5301-9","volume":"102","author":"W Zhao","year":"2018","unstructured":"Zhao W, Fan T, Nie Y, Feng W, Wen H (2018) Research on attribute dimension partition based on SVM classifying and MapReduce. Wirel Pers Commun 102(4):2759\u20132774","journal-title":"Wirel Pers Commun"},{"issue":"4","key":"1547_CR23","first-page":"155014771984215","volume":"15","author":"W Zhao","year":"2019","unstructured":"Zhao W, Yin Z, Fan T, Luo J (2019) Research on influence spread of scientific research team based on scientific factor quantification of big data. Int J Distrib Sens Netw 15(4):1550147719842158","journal-title":"Int J Distrib Sens Netw"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-019-01547-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12652-019-01547-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-019-01547-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,27]],"date-time":"2020-10-27T00:45:06Z","timestamp":1603759506000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12652-019-01547-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,28]]},"references-count":23,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2020,9]]}},"alternative-id":["1547"],"URL":"https:\/\/doi.org\/10.1007\/s12652-019-01547-0","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"value":"1868-5137","type":"print"},{"value":"1868-5145","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,10,28]]},"assertion":[{"value":"7 May 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 October 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 October 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}