Apparently, this is an excellent interdisciplinary study. This paper drawn on a simple but large database that contains notable individuals in Europe and North America over two thousand years, analyzed their migration activities by utilizing tools and metrics from the domain of computer science, demography, linguistic studies, etc., and finally obtained many interesting insights and findings.


Birth and death data of notable individuals reveal interactions between culturally relevant locations over two millennia by Schich et al.(2014)

The structure of this paper is sound, clear and approachable, as many other articles published in Science magazine always are. In the first paragraph, this paper presents the research problem clearly. With the emphasis on the many implications of quantifying historical developments as the beginning, It says, 'there is inherent tension between qualitative analyze of individual accounts and quantitative approaches...'. Then, the authors indicate the data source of this paper and describe them in detail. The paragraphs that followed are the major parts of this paper in which the authors condense their findings into three figures. All the stories and explications revolve around the three figures. The first figure, as its name suggests, focuses on the interactions between cultural locations by connecting the locations with birth and death of notable individuals. This figure has a impact on me because it shows a lot of implications for urban researches, place making and promotion, which I would explain later. The second figure reveals global patterns and local instabilities in human mobility dynamics. As the authors says in the paper, several insights found in this study are in line with some empirical laws such as Heaps' law, Zip's law and Ravenstein's laws of migration. As for figure 3, it did a fantastic visualization job which offers a meta-narrative of cultural history. In the end of this paper, the authors utilized the Google Ngram English data set and conducted a match between the historical cultural events and the death rate patterns.
The methodology of this paper is worth noting. As the author says in the first paragraph, this paper adopted a mixed method of quantitative and qualitative tools. The authors use the quantitative methods to identify the statistical regularities, which are presented in figure 1 and figure 2 in this paper, and then use qualitative approaches to delineate the meta-narrative of cultural history in figure 3. In addition to this mixed and complementary methods, this paper employed a lot of metrics from other domain of disciplines. For example, PageRank, a metric that measures centrality of a network in computational technology, is used to denote the relative importance of cultural locations. This shows the power of inter-disciplinary studies.
This paper has intrigued me. I can't help think that, why not do a similar study in China, during a specific period, on a specific group of people? This idea agrees with the authors' final statement without prior consultation, in which the authors says, "Our approach allows for cross-fertilization of domain knowledge into other domains, periods, and geographic areas." Therefore, I plan to propose the following study:
"Chinese Cities and Chinese Elites' Migration in Chinese History"
Thousands of Chinese Elites in ancient China have shaped the Chinese history, as well as Chinese cities...
[Anyone who is interested please contact me at jazzyl@qq.com]

Thoughts on an Article from Science 'A network framework of cultural history'的更多相关文章

  1. Case1-basic network framework/Related organization‘s name

    常见的计算机网络物理拓扑结构: 1.星型网 2.树型网 3.分布式网络 4.总线型网 5.环型网 6.复合型网络 计算机网络相关的标准化组织: 国际标准化组织(ISO):International O ...

  2. Neural Network Toolbox使用笔记1:数据拟合

    http://blog.csdn.net/ljp1919/article/details/42556261 Neural Network Toolbox为各种复杂的非线性系统的建模提供多种函数和应用程 ...

  3. Deep Learning 学习随记(五)Deep network 深度网络

    这一个多周忙别的事去了,忙完了,接着看讲义~ 这章讲的是深度网络(Deep Network).前面讲了自学习网络,通过稀疏自编码和一个logistic回归或者softmax回归连接,显然是3层的.而这 ...

  4. 智能合约遇到的小错误 network up to date解决办法

    https://blog.csdn.net/qindong564950620/article/details/68933678 说 network up to date .这个错误我刚开始不知道怎么解 ...

  5. Network Embedding

    网络表示 网络表示学习(DeepWalk,LINE,node2vec,SDNE) https://blog.csdn.net/u013527419/article/details/76017528 网 ...

  6. (zhuan) Recurrent Neural Network

    Recurrent Neural Network 2016年07月01日  Deep learning  Deep learning 字数:24235   this blog from: http:/ ...

  7. MatterTrack Route Of Network Traffic :: Matter

    Python 1.1 基础 while语句 字符串边缘填充 列出文件夹中的指定文件类型 All Combinations For A List Of Objects Apply Operations ...

  8. Chinese culture

      文房四宝 笔墨纸砚是中国古代文人书房中必备的宝贝,被称为“文房四宝”.用笔墨书写绘画在 中国可追溯到五千年前.秦(前221---前206)时已用不同硬度的毛和竹管制笔:汉代(前206—公元220) ...

  9. Beginners Guide To Learn Dimension Reduction Techniques

    Beginners Guide To Learn Dimension Reduction Techniques Introduction Brevity is the soul of wit This ...

随机推荐

  1. Tools - VirtualBox

    为CentOS虚拟机安装增强功能 启动CentOS虚拟机,点击"菜单 -> 设备 -> 安装增强功能". vboxadd的映像文件将会被挂载到虚拟机,在桌面也可以看到, ...

  2. Hadoop阅读笔记(三)——深入MapReduce排序和单表连接

    继上篇了解了使用MapReduce计算平均数以及去重后,我们再来一探MapReduce在排序以及单表关联上的处理方法.在MapReduce系列的第一篇就有说过,MapReduce不仅是一种分布式的计算 ...

  3. 15个前卫的 HTML5 & CSS3 网页设计作品

    今天,我们编译收集一组使用 HTML5 和 CSS3 制作的精美网站.在此集合中,你可以看到平面设计,网页设计,作品集和企业网站设计实例. 响应式设计和基于 HTML5 & CSS3 编码的网 ...

  4. Bourbon – 简单轻量的 Sass 混入(Mixins)库

    Bourbon 是一个简单易用的 Sass 混入(Mixin)库,无需配置.该混入包含用于支持所有现代浏览器的 CSS3 属性前缀.前缀需要确保在旧的浏览器支持优雅降级.Bourbon 使用 SCSS ...

  5. Android 获取可靠的手机编码

    项目中出现了将设备和用户信息进行绑定的需求.最先想到的是IMEI串码和IMSI串码.手机登陆的时候一直都没有问题.换了一个平板中之后IMEI和IMSI串码都获取不到了.后来查了一下原因,是因为平板上是 ...

  6. ASP.NET MVC案例——————拦截器

    摘要      本文将对“MVC公告发布系统”的发布公告功能添加日志功能和异常处理功能,借此来讨论ASP.NET MVC中拦截器的使用方法. 一个小难题      我们继续完善“MVC公告发布系统”, ...

  7. C# HTTP上传文件

    代码: /// <summary> /// Http上传文件 /// </summary> public static string HttpUploadFile(string ...

  8. Java NIO:NIO概述

    Java NIO:NIO概述 在上一篇博文中讲述了几种IO模型,现在我们开始进入Java NIO编程主题.NIO是Java 4里面提供的新的API,目的是用来解决传统IO的问题.本文下面分别从Java ...

  9. 孙鑫MFC学习笔记16:异步套接字

    16 1.事件对象 2.CreateEvent创建事件对象 3.SetEvent设置事件对象为通知状态 4.ResetEvent设置事件对象为非通知状态 5.InitializeCriticalSec ...

  10. JVM简介

    关于java的JVM这块儿知识,在项目做大之后,一些性能的优化,要涉及到数据库,一些缓存要放在内存中.还有一些JMS的消息传播等等,高大上的知识需要有JVM内存模型知识的支持.所以自问自答,来回答下面 ...