bibliometric report · other engineering and electrical engineering topics important. 10. of the...
TRANSCRIPT
1
Manchester Security Foresight Bibliometrics Report v0.1 – 30-11-12
#
.
Manchester
Security
Foresight
BIBLIOMETRIC
REPORT
2
Manchester Security Foresight Bibliometrics Report v0.1 – 30-11-12
Acknowledgments:
We would like to acknowledge the valuable contributions from all involved in the Manchester Security Foresight, particularly: the project steering group and academic advisors: the KTA team: Matthew Walker of BEST: Greater Manchester Police: all the interviewees and consultees who gave their time freely.
The Manchester Security Foresight has been funded by the ESPRC Knowledge Transfer fund.
Reporthistory
Lead authors: John Rigby & Chiara Marzocchi
V0.0 05-07-12
JR Notes on methods
V0.1 30-10-12
JRigby/ CM
First draft for workshop consultation
3
Manchester Security Foresight Bibliometrics Report v0.1 – 30-11-12
Manchester Security Foresight
Bibliometric Review of Security Researchers at Manchester
John Rigby & Chiara Marzocchi
30-11-12
Contents
Acknowledgments: ............................................................................................................................................. 2Report history..................................................................................................................................................... 2
1) EXECUTIVESUMMARY.....................................................................................................5
2) INTRODUCTION....................................................................................................................8
Aims of the Study ............................................................................................................................................ 9
STUDYMETHODS..........................................................................................................................10
3) FINDINGS..............................................................................................................................11
4.1 The Field............................................................................................................................................ 11
4.2 The Security Authors ......................................................................................................................... 12
4.3 The Collaborating Authors................................................................................................................. 14
4) ANNEXES...............................................................................................................................15
Annex 1: The Field ......................................................................................................................................... 15Funding Bodies ................................................................................................................................................. 15Research Themes ............................................................................................................................................. 16Research Performers ........................................................................................................................................ 18Subjects: Subject Category Counts ................................................................................................................... 19Author Affiliations of DSTL Funded Papers ...................................................................................................... 21Mapping funding to research performers ........................................................................................................ 22
Annex 2 All Security Researchers ................................................................................................................... 23The Manchester Papers ................................................................................................................................... 23
4
Manchester Security Foresight Bibliometrics Report v0.1 – 30-11-12
Manchester Authors: Most Used Journals and Count of Publications ............................................................. 25Concentration of Manchester security papers by journal ............................................................................... 26Papers across journal by count of publications per journal ............................................................................. 27Concentration of Manchester security papers by Subject category ................................................................ 28Concentration of Manchester security papers by web of science Journal Category ....................................... 29Web of Science Categories Occurrence of Papers ........................................................................................... 30Most Common Keywords Plus ......................................................................................................................... 31Keyword Plus Clusters ...................................................................................................................................... 32Clustering of Keywords Plus ............................................................................................................................. 33Keyword Plus Linkages ..................................................................................................................................... 34Keywords Authors ............................................................................................................................................ 35Count of Authors per Publication: Papers in which Manchester security Authors Involved ........................... 36Collaborating Institutions of Manchester Authors: Most Common across All Papers ..................................... 37Collaboration Patterns by Country ................................................................................................................... 38Collaboration Patterns by Institution ............................................................................................................... 39Manchester security author and country collaboration .................................................................................. 40Count of countries per paper ........................................................................................................................... 41Most common country links of our authors..................................................................................................... 42
Annex 3 The Subset of Collaborating Authors ................................................................................................ 43Manchester Security Authors Working Together with other Manchester Security Authors ........................... 43Co-authorship per Year .................................................................................................................................... 44Journals where collaborative work is published .............................................................................................. 45Keywords of the Collaborative Research ......................................................................................................... 46
Annex 4 The Security Researchers ................................................................................................................. 47Manchester Security Authors ........................................................................................................................... 47
5
Manchester Security Foresight Bibliometrics Report v0.1 – 30-11-12
1) EXECUTIVESUMMARY
1. This report has been written to help with the assessment of the University’s strength in an area of work termed security research. This report uses bibliometric methods to assess the activities of the University’s researchers in this area. Researchers are considered to be included as working in this area by a process which involves the following steps: a) inclusion of the major grant holders in existing security research programmes of the UK’s main funding organisations; b) nomination and co nomination by the grant holders named in step a) which expands the group to just under 50 researchers.
2. Three databases of publications are reviewed: publications funded by a major UK security funding body, the Defence Science and Technology Laboratory, to help give background on the field of security research of interest to a major UK funding body in this area, including the position of the University, the particular subjects researched and the other main research performers; a database of publications of the security researchers; a subset of publications of Manchester security authors who collaborate with each other is separately reviewed.
3. Research funded by DSTL supports military activities that may be separate from the area in which the University’s researchers are engaged and is not a random sample of security research. Despite that we believe that the other key funding organisations are EPSRC and joint MOD DSTL projects (which are projects where funding acknowledgements explicitly name DSTL and MOD jointly as funders, rather than as separate funding organisations). European Union funding and other UK research council funding are also funders (co-funders with DSTL as all publications have DSTL as a funding body, this being the criteria for selection).
4. Our review of research themes suggests a focus on engineering problems with a very limited focus upon social, human or economic aspects. Keywords Plus analysis suggests similar focus on engineering questions.
5. Certain institutions are significant in this area, notably Imperial College which has a significant count of author affiliations involved in this research. This analysis suggests that in respect of this kind of funding, Manchester has a less important role being in a cluster of eight universities which lead in just four of the papers, while Imperial leads in 35.
6. Using the main dataset of authored work by the security researchers, this shows of the 47 researchers identified by the e-Scholar scanning showed that the authors had published between them 477 papers in 283 academic journals during the period 2008 to 2013. One
6
Manchester Security Foresight Bibliometrics Report v0.1 – 30-11-12
journal has 16 publications, another 15, another 13, another nine and another six. Three journals have seven publications each.
7. The dispersion of papers across journals is significant. Just under half the papers are in a unique journal, i.e. within a set of 206 journals, while remaining papers (271 papers) are in a total of 77 journals. Such dispersion suggests diversity and clustering, both processes likely to be at work behind the generation of papers.
8. Clustering of publications to Web of Knowledge Journal categories suggest engineering, electrical and electronic and computer science (AI and Theory and Methods) are important areas for research.
9. Keywords Plus frequencies suggest strong computer science focus of the publications with other engineering and electrical engineering topics important.
10. Of the 477 papers, 283 are published with one country involved, the UK. 145 papers are published with one other country. Of these 145 papers, most are published with Chinese institutions (72), the next most common partner for this category of papers is the US with which only 15 papers were published. Of the 34 papers that are published with three countries participating, the most common partner country is the US with 19 papers, the next most common is China with 9 papers. It is clear that for this group of authors, China is an important collaborator.
11. Chinese collaborations are bi- and not generally multi-lateral. The figures of Collaboration Patterns by Institution suggest some marginally greater connectivity of Chinese institutions to other non-Chinese institutions in the production of the papers.
12. The distribution of these 34 co-authored publications is not surprisingly, unevenly distributed between the eight collaborating researchers. 21 of the publications are the product of just two authors. One publication is the result of the work of three authors.
13. Co-authorship occurs amongst authors with large numbers of publications in this area but also amongst authors with few publications in the area. This suggests that co-authorship – co-publication - is not a fixed feature of the most heavily publishing authors but occurs amongst all authors in this group.
14. Over this short period of time from which the observations are drawn it is not possible to say whether there is a trend of increasing growth in collaboration or not amongst these authors.
15. The intensity of publication with China by a small number of authors may suggest that the strongest relationship of the security authors is with China. This may be true in terms of the numbers of papers written but the most common country link of our authors based on the count of authors collaborating and not on the basis of the count of papers, is the US, followed by China and Germany equal second.
7
Manchester Security Foresight Bibliometrics Report v0.1 – 30-11-12
16. This work does not use the grey literature. All patterns of collaboration, indications of links to other institutions and countries and focus upon subject matter (i.e. themes) are based here on published material in ISI Journals.
17. NACTEM tools for bibliometric analysis have not been used here but could have been employed for clustering of key terms such as keywords and Keywords Plus. Further work to exploit the NACTEM tools is justified. This will allow for exploration of semantic entities, and to detect the presence of unseen (immanent) indirect / associative links which may not be capable of identification with the methods used here.
8
Manchester Security Foresight Bibliometrics Report v0.1 – 30-11-12
2) INTRODUCTION
This report has been written to help with a review of the research capability of researchers at the University of Manchester working in the area of security and defence research. Research capability of a group of researchers can be assessed in a number of ways, for example by examining the publications of the researchers, their collaboration activities, their grant raising, their professional and personal networks and the development of new staff. The review can be retrospective or prospective, looking backwards or forwards. The aim of this assessment is to look forward and to assess what areas of work the researchers are engaged with. It is based very largely on publication data and includes analysis of publications, the institutional and researcher collaboration involved. By reviewing bibliographic data, information that is present within the data can be inferred to give a more extensive picture of the characteristics of the research being undertaken.
The review was begun in spring 2012 and is related to a larger scale review of energy researchers at the University of Manchester. The review of energy researchers has been undertaken to help define the capability of a far larger group of researchers at the University of Manchester who will be supported by a new Manchester Energy research initiative.
The group of researchers in the security area is just under 50. It has been selected by a process of self-nomination and co-nomination of researchers at Manchester. This began with an initial discussion with five key grant awardees holding grants in the research area of security and defence themes. The assessment undertaken here does not compare or benchmark the University with others as the number of researchers is small, the subject matter researched by the group of researchers diverse and not easily comparable, and the existing outputs relatively small in number. Where information about other universities is included in this assessment, this has been done to show where Manchester researchers in the area of security are working with other institutions and their staff.
9
Manchester Security Foresight Bibliometrics Report v0.1 – 30-11-12
AimsoftheStudy
This study aims to contribute to the understanding of the research capability of the researchers in the security researchers group. Research capability is understood here to refer to the potential of the research group to contribute to the field of security research.
Our view is that capability is best to be understood here as the development of common shared interests that are pursued both inside and outside the University of Manchester. We have used the concept of intersection and common interest to identify research areas, research funders and other researcher performers where there is evidence of continued or a growing level of activity.
The aims of the research were in more detail:
a) to characterize the security field;
b) to assess the broad range of work previously undertaken by researchers in this area and assess its main characteristics;
c) to assess the work done by researchers within this set of researchers who have worked with each other here at Manchester (defined as collaborating when they have co-authored publications with other authors within the set of security authors).
In relation to this last aim, we have defined collaboration within the security author set.
10
Manchester Security Foresight Bibliometrics Report v0.1 – 30-11-12
StudyMethods
The approach of this review has been on the security researchers as a whole. Measures and characterizations have been used that, where possible, focus on the group, and upon shared interests and activities rather than on the individual characteristics of researchers. We have downloaded a specific set of publications authored by the security researchers in our research group and reviewed these publications with the aim of noting common interests, collaboration activities and shared activities and research priorities.
A number of new information services have recently become available from citation index providers who have traditionally been associated with the development of metrics for evaluation. In particular, the Thomson Reuters InCites data system which has recently become available to the University of Manchester provides a large number of ways of assessing the research capability. In our view this tool can provide many of the measurements of research impact and many forms of comparisons (i.e. benchmarking) some of which the University already uses in its e-Scholar data.
However, the view taken here is that such tools does not provide the detailed insight into the characteristics of a group of researchers considered as a collective, their focus in terms of subject matter, journal output and collaboration activities, uses of funding, and as research takes place within collectivities and disciplinary communities it is as this level that the focus of research capability building should be directed and not at the individual level.
The steps taken to develop an assessment of research capability were as follows:
The researchers in this area (Security – capable of subdivision into a) Cyber Security and b) Scanning and Detection) were identified by snowball sampling and through nomination and co-nomination. This formed a group of 50 researchers.
Publications from e-Scholar were obtained for the researchers and from the Web of Knowledge.
The data set of publications of the security authors was obtained from the Web of Knowledge. This data set includes publications that are conference papers where outputs from computer science are more likely to be indexed than in the narrow citation index.
The data set was cleaned and systematized to remove duplications of author name, institution, funding body and keyword. Author names are unfortunately duplicated in the Web of Science in our data. We noted that there were duplications of publication data in e-Scholar, although minimal use was made of the e-Scholar data.
A range of analyses were carried out to determine a number of characteristics of the research group, for example the co-authorship practice by reference to count of names on each paper, and then various research theme (subject and Web of Science category) relevant measures were obtained.
11
Manchester Security Foresight Bibliometrics Report v0.1 – 30-11-12
3) FINDINGS
4.1 TheFieldAn initial assessment was made of the field of security research with a set of publications defined by their acknowledgement of funding by the UK’s Defence Science and Technology Laboratory (DSTL). This defined a set of publications which, while likely to be more applied in focus than university research would be in general, gives some indication of the character of the field of security research and can be used to develop an outline of the University of Manchester presence within that research area.
Clearly some of the research which is funded by DSTL supports military activities that may be separate from the area in which the University’s researchers are engaged and is not a random sample of security research. Nevertheless, we believe that by identifying the research which DSTL has funded over the last four years we have a useful subset of research in the area of security that is a priority for the UK and it is possible on this basis to observe important features of the field such as leading areas of research, other important funding bodies supporting research in this area, major research performers outside the University amongst research institutes and universities elsewhere in the UK and abroad.
Our initial review of DSTL funding suggests that in this area where DSTL is active, the other key funding organisations are EPSRC and joint MOD DSTL projects (which are projects where funding acknowledgements explicitly name DSTL and MOD jointly as funders, rather than as separate funding organisations). European Union funding and other UK research council funding are also funders (co-funders with DSTL as all publications have DSTL as a funding body, this being the criteria for selection).
Research themes based on author keywords suggest a focus on engineering problems with a very limited focus upon social, human or economic aspects. Keywords Plus analysis suggests similar focus on engineering questions.
A review of the research performers in this area show the importance of certain institutions, notably Imperial College which has a significant count of author affiliations involved in this research. There is then a cluster for four major UK universities Bristol Cambridge Southampton and Oxford each of which has around 20 papers in the data set. Manchester is then in the next cluster of institutions with 8 papers in total in the data set, producing one sixth of the publications produced by Imperial College. A further table shows the count of the organisations of the authors of papers listed first. Such an ordering of the institutions may give some indication as to which organisations are leaders in the field and which are followers. Note that the list below of organisations of the 1st author includes fewer industrial or mission oriented organisations as these are less likely to lead research. The 1st author ordering has Imperial again at the top of the list followed by the same set of universities as in the clustering of all affiliations. This analysis suggests that in respect of this kind of
12
Manchester Security Foresight Bibliometrics Report v0.1 – 30-11-12
funding, Manchester has a less important role being in a cluster of eight universities which lead in just four of the papers, while Imperial leads in 35.
Funding organisation have been mapped to research performers for the main funding bodies and performers. This shows the dependence of the main UK institutions on DSTL and EPSRC which is not surprising. Some other UK institutions indicate funding of papers by the Home Office and the Government Communications Centre.
4.2 TheSecurityAuthors
Review of the 47 researchers identified by the e-Scholar scanning showed that the authors had published between them 477 papers in 283 academic journals during the period 2008 to 2013. One journal has 16 publications, another 15, another 13, another nine and another six. Three journals have seven publications each.
Co-authorship of the papers was examined to examine how many papers had been published as single authored publications and how many had been published as joint authored papers. We also investigated how many of the papers had been published with other institutions and how many had only Manchester author(s).
The papers produced cover 66 subject categories of the ISI, a large spread of research themes. The average number of subject categories per paper taken the whole number of papers and dividing this into the sum of categories of all papers was (900/477) was 1.8, the mode was one subject category, but significant numbers of papers are in the area of security interdisciplinary where the definition of interdisciplinary is if the count of subject areas is greater than one. More than half the papers have more than one subject category, and just under a quarter of all papers have been allocated to three or more subject categories.
Data from e-Scholar was also available but this also had to be cleaned because of inaccuracies. This has been partly reviewed but has not been completed. A table has been produced that shows a range of information for each of the most commonly used journals by the security researchers. This shows the quartiles position of each of the publications and the rank of the journal within the set of journals within the journal category. Some journals have more than one category where the journal is interdisciplinary. The publications are generally from the first quartile of the journals in any classification, suggesting high impact of publications through the most cited journals. This may not apply in the tail however where there are many publications within single journals.
The distribution of papers in journals has been assessed using the Web of Knowledge papers not the e-Scholar set. The dispersion of papers across journals is significant. Just under half the papers are in a unique journal, i.e. within a set of 206 journals, while remaining papers (271 papers) are in a total of 77 journals. Such dispersion suggests diversity and clustering, both processes likely to be at work behind the generation of papers. Institutional comparison may reveal the existence of strategies on the part of researchers of their institutions at other research performers to focus research on to narrower range of journals.
13
Manchester Security Foresight Bibliometrics Report v0.1 – 30-11-12
Clustering of publications to Web of Knowledge Journal categories suggest engineering, electrical and electronic and computer science (AI and Theory and Methods) are important areas for research.
Keywords Plus frequencies suggest strong computer science focus of the publications with other engineering and electrical engineering topics important.
Word frequency clusters suggest the importance of systems as a focus for research.
Autocorrelation of Keywords Plus terms suggests links between the computer science terms. This is likely to reflect a group of computer science researchers’ co-publication and common use of keywords and subjects, although Keywords Plus is a construction of research theme provided by the Web of Knowledge service.
Count of authors per paper suggests most papers are three to five authors. There are a small number of multiple authorship papers with n>8.
Of the 477 papers, 283 are published with one country involved, the UK. 145 papers are published with one other country. Of these 145 papers, most are published with Chinese institutions (72), the next most common partner for this category of papers is the US with which only 15 papers were published. Of the 34 papers that are published with three countries participating, the most common partner country is the US with 19 papers, the next most common is China with 9 papers. It is clear that for this group of authors, China is an important collaborator. It should be noted that papers with one country affiliation can have multiple institutional participation and this is the case for this data. For example, of the 72 papers with Chinese participation, there are 33 papers with two institutions, 30 papers with three institutions, six papers with four institutions and three papers with five institutions.
Tables of institution showing the count of addresses (which gives the number of participating institutions in papers) shows a large spread of institutional collaboration. There is not major other research partner globally for the research undertaken. This suggests the wide diversity of the institutional collaborations. Chinese institutions are important as noted above. Further analysis may reveal if the Chinese participation is generally multi country >2 countries or is bi-lateral. Figures showing country to country links reveal clusters of collaboration activities involving Argentina, Austria, Cameroon, Brazil New Zealand, the Netherlands, Switzerland, Italy Belgium and Hungary. These may be EU funded activities in which Manchester researchers are engaged. The absence of links for China in the Collaboration Patterns by Country does indeed suggest Chinese collaborations are bi- and not generally multi-lateral. The figures of Collaboration Patterns by Institution suggest some marginally greater connectivity of Chinese institutions to other non-Chinese institutions in the production of the papers.
14
Manchester Security Foresight Bibliometrics Report v0.1 – 30-11-12
4.3 TheCollaboratingAuthors
Collaboration between the Manchester security authors measured from the bibliometric data we have downloaded from the Web of Science and measured as the number of co-authored papers amounts to 34 publications out of a total of 477. These co-publication arise from the work of just eight authors. The instance of co-publication is therefore around 7% measured by the number of publications and 16% of the authors.
The distribution of these 34 co-authored publications is not surprisingly, unevenly distributed between the eight collaborating researchers. 21 of the publications are the product of just two authors. One publication is the result of the work of three authors.
Co-authorship occurs amongst authors with large numbers of publications in this area but also amongst authors with few publications in the area. This suggests that co-authorship – co-publication - is not a fixed feature of the most heavily publishing authors but occurs amongst all authors in this group.
A box shows the author’s keywords of the publications resulting from co-authorship. Over this short period of time from which the observations are drawn it is not possible to say whether there is a trend of increasing growth in collaboration or not amongst these authors.
The intensity of publication with China by a small number of authors may suggest that the strongest relationship of the security authors is with China. This may be true in terms of the numbers of papers written but the most common country link of our authors based on the count of authors collaborating and not on the basis of the count of papers, is the US, followed by China and Germany equal second.
15
Manchester Security Foresight Bibliometrics Report v0.1 – 30-11-12
4) ANNEXES
Annex1:TheField
FundingBodiesRank Papers Funding Organization
1 184 Defence Science and Technology Laboratory
2 120 Engineering and Physical Sciences Research Council (EPSRC)
3 32 MOD/DSTL
4 18 European Community
5 17 EPSRC/DSTL
6 16 Natural Environment Research Council
6 12 Ministry of Defence (MOD), UK
7 10 QinetiQ Ltd
9 8 Royal Society
11 6 Home Office Scientific Development Branch (HOSDB)
12 5 Airbus UK
13 5 Biotechnology and Biological Sciences Research Council
14 5 Her Majesty's Government Communications Centre
15 5 NIH
16 4 HM Revenue and Customs
17 4 Innovative Electronics Manufacturing Research Center (IeMRC)
18 4 NSF
19 4 Scottish Natural Heritage
20 3 Agri-Food and Biosciences Institute (Northern Ireland)
TABLE 1 MAIN FUNDING BODIES ALSO FUNDING WITH DSTL
16
Manchester Security Foresight Bibliometrics Report v0.1 – 30-11-12
ResearchThemesRank Papers Keywords (author's)
1 6 delamination2 5 Impact behaviour3 5 Microstructure4 5 Self-healing5 4 Damage mechanics6 4 Finite element analysis (FEA)7 4 Fracture toughness8 4 Mechanical properties9 3 Carbon fibre
10 3 Crack arrest11 3 Damage tolerance12 3 Fractography13 3 fracture14 3 Impact15 3 Mechanical testing16 3 natural scenes17 3 Remote sensing18 3 Spectrogram19 2 ABAQUS20 2 Ballistic21 2 biodiversity22 2 Carbon fibres23 2 Colocated antennas24 2 complex circularity25 2 copper26 2 Crowding27 2 diffusion28 2 estimation29 2 explosives30 2 Filler wire development31 2 friction32 2 Fuel cell
TABLE 2 RESEARCH THEMES – AUTHOR KEYWORDS
17
Manchester Security Foresight Bibliometrics Report v0.1 – 30-11-12
Rank Papers Keywords Plus
1 14 Behavior
2 9 Composites
3 8 Model
4 7 Identification
5 7 Impact
6 7 Performance
7 7 Polymer composites
8 7 Stability
9 7 Strength
10 7 Water
11 6 Delamination
12 6 Dynamics
13 6 Nanoparticles
14 6 Surface
15 5 Crystal-structure
16 5 Deformation
17 5 Diffraction
18 5 Electrodes
19 5 Fabrication
20 5 Fracture-toughness
21 5 Mechanical-properties
22 5 Microvascular networks
23 5 Polymers
24 5 Primary visual-cortex
25 5 Signals
26 5 Temperature
27 4 Catalysts
28 4 Chemistry
29 4 Escherichia-coli
30 4 Fiber-reinforced composites
31 4 Fracture
32 4 Growth
33 4 Impact damage
34 4 In-situ composites
35 4 Models
TABLE 3 RESEARCH THEMES – KEYWORDS PLUS
18
Manchester Security Foresight Bibliometrics Report v0.1 – 30-11-12
ResearchPerformers
Rank Papers Count of Occurrences Author Affiliations (Organization Only)
1 51 70 Univ London Imperial Coll Sci Technol & Med
2 46 46 DSTL
3 20 21 Univ Bristol
4 20 20 Univ Cambridge
5 20 26 Univ Southampton
6 18 22 Univ Oxford
7 13 13 Cranfield Univ
8 12 12 Univ Exeter
9 8 8 Univ Liverpool
10 8 8 Univ Manchester
11 7 11 Univ Edinburgh
12 7 7 Univ Leeds
13 6 7 Dstl Porton Down
14 6 6 Univ Loughborough
15 6 6 Univ Strathclyde
16 5 5 Bangor Univ
17 5 11 UCL
18 5 9 Univ Sheffield
19 5 5 Univ York
20 4 4 Kings Coll London
21 4 4 Newcastle Univ
22 4 4 RMIT Univ
23 4 4 Swansea Univ
24 4 4 Univ Birmingham
25 4 4 Univ Bolton
26 4 5 Univ Bradford
27 4 4 Univ Nottingham
28 4 5 Univ Surrey
29 3 4 Cardiff Univ
TABLE 4 INSTITUTIONS PRODUCING MOST PAPERS (TOP 30)
19
Manchester Security Foresight Bibliometrics Report v0.1 – 30-11-12
Subjects:SubjectCategoryCounts
Rank Records Subject Category
1 69 Materials Science
2 51 Chemistry
3 48 Engineering
4 24 Physics
5 20 Science & Technology - Other Topics
6 13 Mechanics
7 11 Computer Science
8 11 Environmental Sciences & Ecology
9 10 Metallurgy & Metallurgical Engineering
10 9 Acoustics
11 9 Biochemistry & Molecular Biology
12 8 Microbiology
13 7 Oceanography
14 6 Immunology
15 5 Biotechnology & Applied Microbiology
16 5 Electrochemistry
17 5 Mathematics
18 4 Audiology & Speech-Language Pathology
19 4 Geology
20 4 Spectroscopy
21 3 Biophysics
22 3 Crystallography
23 3 Energy & Fuels
24 3 Imaging Science & Photographic Technology
25 3 Infectious Diseases
26 3 Life Sciences & Biomedicine - Other Topics
27 3 Marine & Freshwater Biology
28 3 Ophthalmology
29 3 Optics
30 2 Biodiversity & Conservation
31 2 Evolutionary Biology
32 2 Geochemistry & Geophysics
33 2 Instruments & Instrumentation
34 2 Meteorology & Atmospheric Sciences
35 2 Polymer Science
36 2 Telecommunications
37 1 Astronomy & Astrophysics
38 1 Cell Biology
39 1 Mathematical & Computational Biology
40 1 Microscopy
20
Manchester Security Foresight Bibliometrics Report v0.1 – 30-11-12
41 1 Neurosciences & Neurology
42 1 Pharmacology & Pharmacy
43 1 Plant Sciences
44 1 Psychology
45 1 Radiology, Nuclear Medicine & Medical Imaging
46 1 Remote Sensing
47 1 Research & Experimental Medicine
48 1 Respiratory System
49 1 Robotics
50 1 Toxicology
TABLE 5 DSTL FUNDED RESEARCH SUBJECT CATEGORY CLASSIFICATIONS
21
Manchester Security Foresight Bibliometrics Report v0.1 – 30-11-12
AuthorAffiliationsofDSTLFundedPapers
Rank Papers Author Affiliations (1st)
1 35 Univ London Imperial Coll Sci Technol & Med
2 16 Univ Southampton
3 15 Univ Cambridge
4 15 Univ Oxford
5 14 Univ Bristol
6 10 Cranfield Univ
7 6 Univ Edinburgh
8 5 Univ Leeds
9 5 Univ Loughborough
10 4 Bangor Univ
11 4 Univ Birmingham
12 4 Univ Exeter
13 4 Univ Liverpool
14 4 Univ Manchester
15 4 Univ Sheffield
16 4 Univ Strathclyde
17 4 Univ York
TABLE 6 ORGANISATIONS OF FIRST AUTHOR
22
Manchester Security Foresight Bibliometrics Report v0.1 – 30-11-12
MappingfundingtoresearchperformersAuthor Affiliations (Organization Only)
1 2 3 4 5 6 7 8 9 10 11
Funding Organization
# Records
184
120
32
18
17
12
6 5 5 5 4
# Records
Defence Science and Technology Laboratory
Engineering and Physical Sciences Research Council (EPSRC)
MO
D/Dstl
European Comm
unity
EPSRC/DSTL
Ministry of Defence (M
OD), U
K
Home O
ffice Scientific Development Branch
(HOSDB)
Airbus UK
Her Majesty's Governm
ent Comm
unications Centre
NIH
Innovative Electronics Manufacturing Research
Center (IeMRC)
1 51 Imperial College 46 24 9 5 5
2 25 Def Sci & Technol Lab 24 10 5
3 21 DSTL 18 10
4 20 Univ Bristol 5 12 8 8 5
5 20 Univ Cambridge 9 7 9
6 20 Univ Southampton 17 8 4
7 18 Univ Oxford 16 11 4
8 13 Cranfield Univ 10 5
9 12 Univ Exeter 11 4
10 8 Univ Liverpool 5
11 8 Univ Manchester 4 7 4
12 7 Univ Edinburgh 6 5 4
13 7 Univ Leeds 6 4 4 4
14 6 Dstl Porton Down 6
15 6 Univ Loughborough 6 5
16 6 Univ Strathclyde 6 5
17 5 Bangor Univ 5
18 5 UCL 4
19 5 Univ Sheffield 5 5
20 5 Univ York 5
21 4 Newcastle Univ 4
22 4 RMIT Univ 4 4
23 4 Swansea Univ 4
24 4 Univ Birmingham 4 4
25 4 Univ Bolton 4 4
26 4 Univ Bradford 4 4 4 4
27 4 Univ Surrey 4 4
TABLE 7 MAPPING OF FUNDING BODIES TO RESEARCH PERFORMERS
23
Manchester Security Foresight Bibliometrics Report v0.1 – 30-11-12
Annex2AllSecurityResearchers
TheManchesterPapers
Subject Category Count of Papers
1 213
2 152
3 78
4 21
5 13
TABLE 8 FREQUENCY COUNT OF PAPERS BY NUMBER OF SUBJECT CATEGORIES
FIGURE 1 PLOT OF FREQUENCY COUNT OF PAPERS BY NUMBER OF SUBJECT CATEGORIES
0
50
100
150
200
250
0 1 2 3 4 5 6
Coun
t of P
aper
s
Count of Subject Categories
24
Manchester Security Foresight Bibliometrics Report v0.1 – 30-11-12
FIGURE 2 MOST COMMON SUBJECT CATEGORIES FOR MANCHESTER SECURITY RESEARCHERS
020406080
100120140160180
Engi
neer
ing
Com
pute
r Sci
ence
Auto
mat
ion
& C
ontr
ol S
yste
ms
Mat
hem
atic
sBi
oche
mist
ry &
Mol
ecul
ar B
iolo
gyIn
stru
men
ts &
Inst
rum
enta
tion
Biot
echn
olog
y &
App
lied
Mic
robi
olog
yM
athe
mat
ical
& C
ompu
tatio
nal …
Ope
ratio
ns R
esea
rch
& …
Phys
ics
Chem
istry
Opt
ics
Neu
rosc
ienc
es &
Neu
rolo
gySc
ienc
e &
Tec
hnol
ogy
-Oth
er T
opic
sM
ater
ials
Scie
nce
Radi
olog
y, N
ucle
ar M
edic
ine
& …
Busin
ess &
Eco
nom
ics
Educ
atio
n &
Edu
catio
nal R
esea
rch
Imag
ing
Scie
nce
& P
hoto
grap
hic …
Phys
iolo
gyTe
leco
mm
unic
atio
nsFo
od S
cien
ce &
Tec
hnol
ogy
Ener
gy &
Fue
lsU
rban
Stu
dies
Beha
vior
al S
cien
ces
Elec
troc
hem
istry
Envi
ronm
enta
l Sci
ence
s & E
colo
gyLi
fe S
cien
ces &
Bio
med
icin
e -O
ther
…Ps
ychi
atry
Info
rmat
ion
Scie
nce
& L
ibra
ry S
cien
ce
Coun
t of O
ccur
renc
es o
f Sub
ject
Cat
egor
y
Subject Category
Most Common Subject Categories for Manchester Security Researchers
25
Manchester Security Foresight Bibliometrics Report v0.1 – 30-11-12
ManchesterAuthors:MostUsedJournalsandCountofPublications
Rank Count Source IF Quartile
1 16 Expert systems with applications2 15 Bmc bioinformatics3 13 Bioinformatics4 9 Ieee transactions on instrumentation and
measurement 5 7 Ieee transactions on fuzzy systems6 7 Ieee transactions on neural networks7 7 Measurement & control8 6 Multiple classifier systems, proceedings9 5 Chemical senses
10 5 Educational studies in mathematics11 5 European journal of operational research12 5 Ieee sensors journal13 5 International journal of computational intelligence
systems 14 5 Journal of algebra15 5 Transactions of the institute of measurement and
control 16 4 2011 50th ieee conference on decision and control
and european control conference (cdc-ecc 17 4 Analyst18 4 Computers & operations research19 4 Ieee transactions on control systems technology20 4 Ieee transactions on systems man and cybernetics
part a-systems and humans 21 4 International journal of advanced manufacturing
technology 22 4 Inverse problems23 4 Journal of urban technology24 3 2010 8th world congress on intelligent control and
automation (wcica 25 3 2011 ieee international symposium on circuits and
systems (iscas 26 3 2011 ieee nuclear science symposium and medical
imaging conference (nss/mic 27 3 Analytical and bioanalytical chemistry28 3 Ieee transactions on automatic control29 3 Ieee transactions on medical imaging30 3 International journal of algebra and computation31 3 Journal of chromatography a32 3 Journal of synchrotron radiation
26
Manchester Security Foresight Bibliometrics Report v0.1 – 30-11-12
33 3 Journal of the optical society of america a-optics image science and vision
34 3 Lab on a chip35 3 Lms journal of computation and mathematics36 3 Measurement science & technology37 3 Ndt & e international38 3 Physiological measurement39 3 Plos one
FIGURE 3 MAIN JOURNALS USED (477 PUBLICATIONS)
ConcentrationofManchestersecuritypapersbyjournal
Count of Papers Per Journal
Count of Journals
Count of Papers
1 206 206
2 38 76
3 16 48
4 8 32
5 7 35
6 1 6
7 3 21
9 1 9
13 1 13
15 1 15
16 1 16
Totals 283 477
FIGURE 4 DISPERSION OF PAPERS ACROSS JOURNAL BY COUNT OF PUBLICATIONS PER JOURNAL
27
Manchester Security Foresight Bibliometrics Report v0.1 – 30-11-12
Papersacrossjournalbycountofpublicationsperjournal
FIGURE 5 COUNT OF PAPERS PER JOURNAL AND COUNT OF JOURNAL
0
50
100
150
200
250
0 5 10 15 20
Coun
t of J
ourn
als
Count of Papers Per Journal
Count of Papers per Journal and Count of Journal
28
Manchester Security Foresight Bibliometrics Report v0.1 – 30-11-12
ConcentrationofManchestersecuritypapersbySubjectcategory
Subject Category Count
Engineering 157
Computer Science 154
Automation & Control Systems 53
Mathematics 52
Biochemistry & Molecular Biology 49
Instruments & Instrumentation 49
Biotechnology & Applied Microbiology 34
Mathematical & Computational Biology 34
Operations Research & Management Science 33
Physics 33
Chemistry 21
Optics 16
Neurosciences & Neurology 15
Science & Technology - Other Topics 14
Materials Science 12
Radiology, Nuclear Medicine & Medical Imaging 12
Business & Economics 11
Education & Educational Research 11
Imaging Science & Photographic Technology 10
Physiology 9
Telecommunications 8
Food Science & Technology 7
Energy & Fuels 6
Urban Studies 6
Behavioral Sciences 5
Electrochemistry 5
Environmental Sciences & Ecology 5
Life Sciences & Biomedicine - Other Topics 5
Psychiatry 5
Information Science & Library Science 4
29
Manchester Security Foresight Bibliometrics Report v0.1 – 30-11-12
ConcentrationofManchestersecuritypapersbywebofscienceJournalCategory
FIGURE 6 MOST COMMON WOS CATEGORIES FOR MANCHESTER SECURITY RESEARCHERS
020406080
100120140
Engi
neer
ing,
Ele
ctric
al &
…Co
mpu
ter S
cien
ce, A
rtifi
cial
…Co
mpu
ter S
cien
ce, T
heor
y …Au
tom
atio
n &
Con
trol
…In
stru
men
ts &
…Bi
oche
mic
al R
esea
rch …
Com
pute
r Sci
ence
, …Co
mpu
ter S
cien
ce, …
Biot
echn
olog
y &
App
lied …
Mat
hem
atic
al &
…O
pera
tions
Res
earc
h &
…M
athe
mat
ics
Phys
ics,
App
lied
Chem
istry
, Ana
lytic
alCo
mpu
ter S
cien
ce, …
Opt
ics
Stat
istic
s & P
roba
bilit
yN
euro
scie
nces
Com
pute
r Sci
ence
, …M
athe
mat
ics,
App
lied
Radi
olog
y, N
ucle
ar …
Man
agem
ent
Engi
neer
ing,
Bio
med
ical
Imag
ing
Scie
nce
& …
Educ
atio
n &
Edu
catio
nal …
Nan
osci
ence
& …
Phys
iolo
gyBi
oche
mist
ry &
Mol
ecul
ar …
Mat
eria
ls Sc
ienc
e, …
Tele
com
mun
icat
ions
Food
Sci
ence
& T
echn
olog
yEn
ergy
& F
uels
Coun
t of O
ccur
renc
e of
WO
S Ca
tego
ry
WOS Category
Most Common WOS Categories for Manchester Security Researchers
30
Manchester Security Foresight Bibliometrics Report v0.1 – 30-11-12
WebofScienceCategoriesOccurrenceofPapers
WOS Category Occurrences within the set of Papers
Engineering, Electrical & Electronic 126
Computer Science, Artificial Intelligence 69
Computer Science, Theory & Methods 55
Automation & Control Systems 53
Instruments & Instrumentation 49
Biochemical Research Methods 43
Computer Science, Information Systems 37
Computer Science, Interdisciplinary Applications 35
Biotechnology & Applied Microbiology 34
Mathematical & Computational Biology 34
Operations Research & Management Science 33
Mathematics 28
Physics, Applied 25
Chemistry, Analytical 18
Computer Science, Hardware & Architecture 16
Optics 16
Statistics & Probability 16
Neurosciences 15
Computer Science, Software Engineering 14
Mathematics, Applied 12
Radiology, Nuclear Medicine & Medical Imaging 12
Management 11
Engineering, Biomedical 10
Imaging Science & Photographic Technology 10
TABLE 9 SECURITY RESEARCHER PAPERS BY WEB OF SCIENCE CATEGORY
31
Manchester Security Foresight Bibliometrics Report v0.1 – 30-11-12
MostCommonKeywordsPlus
Keywords Plus Number of Instances Uncertainty 25 Identification 24 System 24 Design 23 Evidential reasoning approach 22 Model 18 Models 17 Multi attribute decision-analysis 15 Systems 15 Algorithm 14 Diagnosis 14 Information 14 Inference 13 Optimization 12 Neural-networks 10 Algorithms 9 Biology 9 Text 9 Tomography 9 Methodology 8 Reconstruction 8 Tool 8 Information extraction 7 Management 7 Rule 7 Stochastic-systems 7 Classification 6 Construction 6 Database 6 Images 6 Incomplete data 6 Microtomography 6 Networks 6 Pipeline leak detection 6 Prediction 6 Protein 6 Recognition 6 Safety analysis 6 Annotation 5 Decision-analysis 5
TABLE 10 COMMONEST KEYWORDS PLUS (WOS)
32
Manchester Security Foresight Bibliometrics Report v0.1 – 30-11-12
KeywordPlusClusters
absorption algorithm analysis annotation approach approximation attribute behavior belief biology capillary chip classification computed
conductivity construction control data database decision density design detection device diagnosis distribution dynamic electrical
electrophoresis entropy environments estimator event evidential evolution expert
extraction feedback flow functions fuzzy gene identification image
impedance inference information integration language machines making management mass measurements methodology microtomography minimum
models multiattribute names natural networks neural nonlinear optimization output patterns pdfs pipeline prediction problem process
protein reasoning recognition reconstruction rule safety scenes sensor separation sets spectrometry spectroscopy stability state statistical stochastic structures
surface systems text theory time
tomography tools tracking uncertainty vision weight
FIGURE 7 KEYWORD PLUS FREQUENCY WORD PICTURE
33
Manchester Security Foresight Bibliometrics Report v0.1 – 30-11-12
ClusteringofKeywordsPlus
FIGURE 8 CLUSTERING OF KEYWORDS PLUS
34
Manchester Security Foresight Bibliometrics Report v0.1 – 30-11-12
KeywordPlusLinkages
FIGURE 9 KEYWORDS PLUS SECURITY AREA AUTOCORRELATION: MOST COMMON TERMS
35
Manchester Security Foresight Bibliometrics Report v0.1 – 30-11-12
KeywordsAuthors
Rank Count of Keywords Keyword (Author’s)
1 13 Evidential reasoning
2 11 Belief rule base
3 8 Uncertainty
4 6 Isotachophoresis
5 6 word problem
6 5 Evidential reasoning approach
7 5 expert system
8 5 image reconstruction
9 5 Uncertainty modeling
10 5 Utility
11 4 Data envelopment analysis
12 4 entropy
13 4 forecasting
14 4 Miniaturisation
15 4 Monoid
16 4 Refinement
17 4 Reliability
18 4 Signal processing
19 4 Text mining
20 4 tomography
21 3 Decision analysis
22 3 electrical impedance tomography
23 3 evidential reasoning (ER
24 3 Failure mode and effects analysis
25 3 Fault detection
26 3 Finite element method
27 3 Fuzzy logic
28 3 Image processing
29 3 Iterative learning control (ILC
30 3 Leak detection
31 3 machine learning
32 3 neural networks
33 3 New product development
34 3 nondestructive evaluation (NDE
35 3 Nonlinear optimization
36 3 Recursive algorithm
37 3 recursive algorithms
FIGURE 10 COMMON AUTHOR KEYWORDS IN RANK ORDER - SECURITY
36
Manchester Security Foresight Bibliometrics Report v0.1 – 30-11-12
CountofAuthorsperPublication:PapersinwhichManchestersecurityAuthorsInvolved
FIGURE 11 FREQUENCY COUNT OF AUTHORS PER PAPER
0
20
40
60
80
100
120
0 5 10 15 20 25 30 35
Coun
t of P
aper
s
Count of Authors per Paper
Frequency Count of Authors per Paper
37
Manchester Security Foresight Bibliometrics Report v0.1 – 30-11-12
CollaboratingInstitutionsofManchesterAuthors:MostCommonacrossAllPapers
Rank University Count of Addresses 1 Univ Manchester 549 2 Northeastern Univ 24 3 Univ Tokyo 18 4 Manchester Metropolitan Univ 15 5 Univ Cambridge 14 6 City Univ Hong Kong 12 7 Hefei Univ Technol 10 8 Tsinghua Univ 10 9 High Tech Inst Xian 9 10 Univ Liverpool 9 11 Beihang Univ 7 12 Virginia Tech 7 13 Chinese Acad Sci 6 14 Concordia Univ 6 15 Fuzhou Univ 6 16 Newcastle Univ 7 17 Tianjin Univ 6 18 Univ Birmingham 6 19 Argonne Natl Lab 5 20 Huazhong Univ Sci & Technol 6 21 Moscow MV Lomonosov State Univ 5 22 Univ London 5 23 Xian Inst Hitech 5 24 Carleton Univ 4 25 European Bioinformat Inst 4 26 Kangwon Natl Univ 4 27 Microsoft Res Asia 4 28 N China Elect Power Univ 5 29 Southeast Univ 4 30 UCL 8 31 Univ Lancaster 4 32 Univ Sheffield 5 33 Deakin Univ 5 34 Global FIA 3 35 Kings Coll London 3 36 Massey Univ 3 37 Univ Edinburgh 3 38 Univ Leicester 4 39 Univ Michigan 4 40 Univ So Calif 3
TABLE 11 COLLABORATING INSTITUTIONS OF SECURITY RESEARCHERS
38
Manchester Security Foresight Bibliometrics Report v0.1 – 30-11-12
CollaborationPatternsbyCountry
FIGURE 12 COUNTRY TO COUNTRY LINKS
39
Manchester Security Foresight Bibliometrics Report v0.1 – 30-11-12
CollaborationPatternsbyInstitution
FIGURE 13 INSTITUTIONAL COLLABORATION LINKS MOST COMMONLY OCCURRING INSTITUTIONS (50 INSTITUTIONS)
40
Manchester Security Foresight Bibliometrics Report v0.1 – 30-11-12
Manchestersecurityauthorandcountrycollaboration
Authors (Cleaned) (Cleaned)
1 2 3 4 5 6 7 8 9 10 11 12 13
Show Values >= 1 and <= 65 Cooccurrence # of Records
UK
Chin
a
USA
Japa
n
Germ
any
Cana
da
Spai
n
Aust
ralia
Fran
ce
Russ
ia
Sout
h Ko
rea
Gree
ce
Net
herla
nds
# Records 473
87 42 21 14 13 12 8 8 6 6 5 5
Wang, Hong 65 37 2 1 4 1
Yang, Jian-Bo 44 35 3
Paton, Norman W 36 8 4 1 2 1 1 3
Ananiadou, Sophia 33 4 6 18 1 1 1 1
Withers, Philip J 27 1 4 1 2 1 6
Xu, Dong-Ling 26 19
Fielden, Peter R 24 3 3 1
Kambites, Mark 16 1 1 1
Dudek, Piotr 16
Brown, Gavin 16 3 1 1 1
Rowley, Peter 13 1
Peyton, Anthony J 13 3 2
Ozanyan, Krikor B 12 1
Foster, David H 12 3
McNaught, John 11 1
Keane, John A 11 1 2
Brown, Tony 11
Persaud, Krishna C 9 4
Lionheart, William R B 9 2 1 4 1 1
Gaydecki, Patrick 8
Crossley, Peter 8 1 1 1
Zhang, Ning 7 1 1 1 1 1 1 1 1
Cootes, Timothy F 7
Aldridge, Judith 6
York, Trevor 5
Purdam, Kingsley 5
Brand, Ralf 5 1
Banach, Richard 5 1
van Silfhout, Roelof 4 1
Pan, Jianxin 4 1 1 1
McCann, Hugh 4
Li, Haiyu 4 1 1
Brass, Andrew 3 1 1 1
Wong, Cecilia 2
41
Manchester Security Foresight Bibliometrics Report v0.1 – 30-11-12
Marjanovic, Ognjen 2
Kawalek, Peter 2 2 1
Green, Peter R 2
George, Danielle 2
Dorn, Oliver 2 2 1
Missous, Mohamed 1 1
King, Ross D 1 1
Howells, Geraint 1
Healey, Mark P 1
TABLE 12 MANCHESTER SECURITY AUTHORS AND COUNTRY COLLABORATION
CountofcountriesperpaperRank Number of Countries in the Paper Frequency
1 1 283
2 2 145
3 3 34
4 4 9
5 5 2
6 27 1
7 12 1
8 6 1
9 0 1
TABLE 13 MANCHESTER SECURITY AUTHORS: COUNTRY COLLABORATION FREQUENCIES
42
Manchester Security Foresight Bibliometrics Report v0.1 – 30-11-12
Mostcommoncountrylinksofourauthors
FIGURE 14 MOST COMMON COUNTRY COLLABORATOR BY COUNT OF AUTHORS
0
5
10
15
20
China USA Japan Germany Canada Spain Australia France
Coun
t of A
utho
rs
Most Common Country Collaborator by Count of Authors
43
Manchester Security Foresight Bibliometrics Report v0.1 – 30-11-12
Annex3TheSubsetofCollaboratingAuthors
ManchesterSecurityAuthorsWorkingTogetherwithotherManchesterSecurityAuthors
Count of Publications Count of Instances Total Publications 20 1 20 8 1 8 2 1 2 1 4 4
Total Publications 34
TABLE 14 COLLABORATING AUTHORS
44
Manchester Security Foresight Bibliometrics Report v0.1 – 30-11-12
Co-authorshipperYear
FIGURE 15
0 2 4 6 8 10 12 14 16 18
Frequency
2008
2009
2009
2010
2010
2011
2011
2012
2012
45
Manchester Security Foresight Bibliometrics Report v0.1 – 30-11-12
Journalswherecollaborativeworkispublished
Journal Title Count of Publications
BMC Bioinformatics 5
Chem. Eng. J 1
Comput. Oper. Res 2
Eur. J. Oper. Res 3
Expert Syst 1
Expert Syst. Appl 7
IEEE Sens. J 1
IEEE Trans. Instrum. Meas 1
IEEE Trans. Syst. Man Cybern. Paart A-Syst. Hum 1
Inf. Sci 2
Int. J. Comput. Intell. Syst 1
Int. J. Uncertainty Fuzziness Knowl.-Based Syst 1
J. Mar. Sci. Technol 1
Nucleic Acids Res 1
Philos. Trans. R. Soc. A-Math. Phys. Eng. Sci
TABLE 15 MANCHESTER SECURITY AUTHORS COLLABORATING: JOURNALS USED
46
Manchester Security Foresight Bibliometrics Report v0.1 – 30-11-12
KeywordsoftheCollaborativeResearch
Adaptive training; Belief rule base; Evidential reasoning; Inference analysis; Leak detection; Multi-modal function analytical hierarchical process (AHP; decision with uncertainties; evidential reasoning (ER; group-based decision; product project screening Bayesian reasoning; Belief rule base; Leak detection; Recursive algorithm; expert system Belief rule base; Clinical risk assessment; Decision support systems; Evidential reasoning approach; OR in medicine; Uncertainty modeling Belief rule base; Consumer preference mapping; Consumer preference prediction; Evidential reasoning; Prediction accuracy Belief rule base; Evidential reasoning approach; clinical decision support system; clinical guideline; inference mechanism Belief rule base; Evidential reasoning; Leak detection; Recursive algorithm; expert system Belief rule base; Evidential reasoning; Recursive algorithm; Utility; expert system Belief rule base; Evidential reasoning; Uncertainty; forecasting; recursive algorithms Belief rule-based system; Consumer preference modeling; Optimization; Preference mapping; Product design; Quality assessment; Target setting Belief-rule-base (BRB; Uncertainty; evidential reasoning (ER; inference; recursive algorithms Branch-and-bound; Dynamic programming; Flexible maintenance; Shortest processing time; Single machine scheduling Carbon-fiber-reinforced plastics (CFRPs; materials characterization; modeling; multifrequency eddy current sensors; nondestructive evaluation (NDE; polymer composites clinical decision support system; group clinical decision making; inference mechanism; knowledge acquisition tool; knowledge representation scheme; uncertainty handling Container Line Supply Chain; Security evaluation; Theft Data envelopment analysis; Efficient frontier; Minimax method; Multiple objective linear programming; Performance assessment Data envelopment analysis; Minimax method; Multiple objective linear programming; Performance assessment; Tradeoff analysis Decision analysis; Evidential reasoning; Nonlinear optimization; Partial information; Voices of customer Electrical capacitance tomography (ECT; THz tomography; X-ray tomography; electrical impedance tomography (EIT; electromagnetic tomography; gamma tomography; optical tomography; sensing systems Enterprise risk management; Evidential reasoning; health organization; intelligent decision system Evidence theory; Multiple criteria analysis; Uncertainty modeling; Vehicle evaluation Full Text Search; Information Retrieval; Natural Language processing; Termine; document clustering; term extraction IEC 61850; Process bus architecture; Reliability; protection system; relaying; reliability block diagram multiple-criteria decision analysis; reference ship selection; shipping evidential reasoning Process monitoring; UWB; Wireless sensor networks; grain storage; industrial processes; local positioning Text mining; document classification; document clustering; term extraction
BOX 1 KEYWORDS OF THE COLLABORATIVE RESEARCH
47
Manchester Security Foresight Bibliometrics Report v0.1 – 30-11-12
Annex4TheSecurityResearchers
ManchesterSecurityAuthorsAuthor Name
Aldridge, Judith
Ananiadou, Sophia
Banach, Richard
Brand, Ralf
Brass, Andrew
Brown, Gavin
Brown, Tony
Carr, Christopher
Cootes, Timothy
Crossley, Peter
Dorn, Oliver
Dudek, Piotr
Fielden, Peter
Foster, David
Gadd, David
Gaydecki, Patrick
George, Danielle
Green, Peter
Healey, Mark
Howells, Geraint
Kambites, Mark
Kawalek, Peter
Keane, John
King, Ross
Li, Haiyu
Lionheart, William
Marjanovic, Ognjen
Maytorena-Sanchez, Eunice
Mccann, Hugh
Mcnaught, John
Missous, Mohamed
Oyadiji, Sunday
Ozanyan, Krikor
Pan, Jianxin
Paton, Norman
Persaud, Krishna
Peyton, Anthony
Purdam, Kingsley
Rowley, Peter
48
Manchester Security Foresight Bibliometrics Report v0.1 – 30-11-12
Van Silfhout, Roelof
Wang, Hong
Withers, Philip
Wong, Cecilia
Xu, Dong-Ling
Yang, Jian-Bo
York, Trevor
Zhang, Ning
TABLE 16 MANCHESTER SECURITY AUTHORS