Skip to main content

ORIGINAL RESEARCH article

Front. Res. Metr. Anal., 13 May 2021
Sec. Emerging Technologies and Transformative Paradigms in Research
This article is part of the Research Topic Emerging Areas in Literature-Based Discovery View all 5 articles

Exploration of Shared Themes Between Food Security and Internet of Things Research Through Literature-Based Discovery

  • 1Graduate School of Environment and Society, Tokyo Institute of Technology, Tokyo, Japan
  • 2Institute for Future Initiatives, The University of Tokyo, Tokyo, Japan

This paper applied a literature-based discovery methodology utilizing citation networks and text mining in order to extract and represent shared terminologies found in disjoint academic literature on food security and the Internet of Things. The topic of food security includes research on improvements in nutrition, sustainable agriculture, and a plurality of other social challenges, while the Internet of Things refers to a collection of technologies from which solutions can be drawn. Academic articles on both topics were classified into subclusters, and their text contents were compared against each other to find shared terms. These terms formed a network from which clusters of related keywords could be identified, potentially easing the exploration of common themes. Thirteen transversal themes, including blockchain, healthcare, and air quality, were found. This method can be applied by policymakers and other stakeholders to understand how a given technology could contribute to solving a pressing social issue.

Introduction

Literature-based discovery (LBD) refers to text mining methodologies aimed at connecting disjoint literature by finding intermediary terms or concepts. Bridging terms help experts and practitioners derive hypotheses that can be tested in the research labs. As such, LBD is a tool for the systematic creation of hypotheses, potentially accelerating the discovery of solutions to known problems (Kostoff, 2006). For instance, Swanson (Swanson, 1986) established a connection between Raynaud's syndrome and fish oil as a potential treatment by mining academic articles on both topics and finding linking terms, such as blood viscosity. This treatment was validated through clinical trials.

While the application of text mining methods has extended across most fields of science, LBD methods continued to be focused on biomedical research due to their valuable contributions in finding linkages between diseases and potential treatments (Coeckelbergh et al., 2016; Gopalakrishnan et al., 2019). Most LBD methodologies fall within two models: open or closed discovery. In open discovery, researchers start with a seed term or topic, with subsequent steps to find related terms. This process can result in an ever-expanding list of related terms from where unexpected but valuable connections can be found. In closed discovery, researchers have an idea regarding two topics for comparison. The corpus of knowledge representing both topics is usually referred to as literature A and literature C, and a methodology is applied to find connecting terms, usually called B-terms. These B-terms are the output of the method and presented to experts who attempt to draw hypotheses on the utility of terms (Henry and McInnes, 2017).

In most cases, the process of systematic discovery of B-terms follows a generic framework composed of data acquisition or the selection of data sources and data types, the discovery process, output representation process or visualization, and validation (Thilakaratne et al., 2019a). Each has a possibility of applying a variety of methods depending on the nature of the study and data type under analysis. The discovery process has been performed by applying computation techniques, such as fuzzy logic, topic models, and clustering analysis (Thilakaratne et al., 2019b). Most of them establish associations by exploring keywords or their context within sentences in the text (Cameron et al., 2015). However, combination methods utilizing bibliographic information of academic articles and semantic context are more accurate when predicting future associations between a pair of terms (Sebastian et al., 2017).

A seemingly common trend in biomedical LBD is the reliance on medical thesauri, ontologies, and controlled vocabularies, such as the Unified Medical Language System (UMLS) (Weeber et al., 2001) or the Medline Subject Heading (MESH) (Baker, 2010). During the input stage, only keywords matching those found in the thesaurus are used in the discovery process, with the output list of B-terms including concepts familiar to biomedical fields. This eases the inference process of establishing hypotheses, as meaningless keywords are sorted by default. The advantage of controlled vocabularies is missing in non-biomedical fields, which may hamper the adoption of LBD methods, as more effort is required to remove unnecessary keywords from output B-terms, establish hierarchies and classifications, and validate the concepts.

Few studies have explored the application of LBD beyond biomedical research (Hui and Lau, 1997). Some early examples include the application of LBD to find influences among poetry writers (Cory, 1997), study the spread of genetic algorithms in the World Wide Web (Gordon et al., 2002), and establish connections among persons, places, and other entities in counter-terrorism databases (Jha and Jin, 2016). Most other applications were in the fields of innovation and technology management. For instance, Kostoff et al. (2008) explored the applicability of LBD in finding technologies related to water purification, while Huang et al. (2012) used a similar approach focused on agricultural economics. This involved the integration of text mining with network analysis in the works of technology management scholars. For instance, Fujita (2012) applied a mixed method of citation networks and text mining to find intermediary concepts between sustainability science and the field of complex networks.

In addition, there is a trend of attempting to bridge technological concepts with social issues. Ittipanuvat et al. (2014) explored the linkage between robotics and gerontology. This study compared and analyzed over 11,000 articles on robotics and 22,000 on gerontology, making it one of the first to deal with a relatively large volume of data. This study helped identify ten specific robotic technologies (e.g., laparoscopic surgery) that potentially address 13 specific problems among the elderly (e.g., prostate cancer). Likewise, Takano and Kajikawa (2018) linked the Internet of Things (IoT) to the topics of water, energy, health, agriculture, and biodiversity. In previous cases, the researchers successfully identified relationship patterns in literature on technological solutions and social issues at the cost of laborious validation by experts, given that LBD methods shown in those articles signaled similarities between pairs of subtopics, and the experts noted the logical connection between them.

In contrast to the methods used in previous research, this study aimed to reduce the burden of exploring a list of B-terms between two disjoint literatures by grouping them into themes and presenting them graphically. This study took advantage of the analysis of gaps to find undiscovered public knowledge, including logical associations, solutions, and applications already in place in unexpected research fields or overlooked due to information overflow (Swanson, 1986; Smalheiser, 2018).

This method is illustrated by bridging research on food security and the Internet of Things (IoT). The first corresponds to the second United Nations (UN) Sustainable Development Goal (SDG), that is, to “end hunger, achieve food security and improved nutrition, and promote sustainable agriculture” (United Nations, 2015). The latter is a term for several technologies expected to enhance the quality of life and exert great economic impact (Manyika et al., 2015). Food security literature represents a collection of social issues, while research on IoT provides a collection of solutions. This method should shed light on common themes between research areas where synergies could be possible. The methodology applied in this study was first presented in the First International Workshop on Literature-Based Discovery in the Pacific-Asia Conference on Knowledge Discovery and Data Mining (Mejia and Kajikawa, 2020). This paper provides a detailed explanation of each step, improves the implementation and reproducibility of the methods, and targets a new case study.

Data and Methods

An overview of the methodological approach is shown in Figure 1. It consists of six steps, including data acquisition and methodological approach. Each step is explained in the following subsections.

FIGURE 1
www.frontiersin.org

Figure 1. Overview of the methodology.

Step 1

First, literature related to topics of food security and IoT was compiled. Bibliographic data from the Web of Science Core Collection, which covers articles from the sciences, social sciences, arts, and humanities, was retrieved. To obtain the articles, a topical search (TS) was performed to find documents matching the search queries in Table 1 in the title, abstract, or keywords. In the query, an asterisk is used as a truncation symbol to find variations of the keywords. The query for food security was experimentally developed by Jayabalasingham et al. (2019), aiming to extract articles that closely match the wordings and intentions of the UN SDGs (United Nations, 2015). Several queries were formulated iteratively. For each iteration, the authors assessed how the top-cited articles were related to the food security goal, until reaching the query with the most satisfactory results. However, as IoT is a coined term, articles were retrieved by setting the full and abbreviated writing as the query. Data were retrieved on December 16, 2020.

TABLE 1
www.frontiersin.org

Table 1. Search queries for extracting academic articles on food security and IoT.

Step 2

Core literature for both topics were cleaned and extracted. In order to increase the accuracy of the datasets, unrelated articles with keywords within the search query were excluded. This study was premised on the idea that academic literature does not exist in isolation, and a given article was expected to cite or be cited by another article on the same topic. This was captured through citation networks. A citation network was created, with each article represented as a node connected to other nodes in the list of references in the data sets. This type of direct citation network provides better topical representations (Klavans and Boyack, 2017). The largest connected component of each network was retained, while disconnected nodes (articles) were excluded.

Step 3

As the network structure for the core literature was known, a network clustering algorithm was applied to identify tightly connected groups of articles within each topic. A modularity maximization algorithm was applied to measure how well a network was divided by comparing the strength of inter-cluster vs. intra-cluster connections. Modularity Q was defined in Eq. 1:

Q= i(eii- ai2), ai=jeij     (1)

where eij was the fraction of edges connecting cluster i and cluster j, while eii was the fraction of edges within cluster i. There are several algorithms for extracting clusters based on modularity maximization that differ in the number and characteristics of clusters produced, computational speed, and suitability for large networks. This study used the Louvain algorithm (Blondel et al., 2008), as it has been applied to citation networks in a variety of topics and is known to scale well in large networks (Šubelj et al., 2015). It also produces fewer clusters, which ease the interpretation of large network trends compared to other modularity maximization algorithms that produce a mix of few large clusters and many small clusters (Dao et al., 2019). For guidance in understanding major trends represented by clusters, they were named based on a manual inspection of contents of the clusters' most cited articles. These clusters represent an academic landscape or the main subtopics for food security and IoT.

These main clusters were further subclustered to obtain fine granular topics containing more specific vocabularies. The sub-clusters had two different purposes. First, they allowed literature to be split into fine-grained clusters and avoid the problem of resolution limits (Fortunato and Barthélemy, 2007) found in large networks. As their size decreases, they become more cohesive and easier to interpret. Specifically, their vocabulary was expected to be narrower. Second, more subclusters allow for more pairwise comparisons between subclusters of both networks. This number of intersections is the mechanism that helps create a network of co-occurring B-terms.

Step 4

Papers shared by both topics were excluded. Intersecting articles were checked separately to extract available knowledge regarding the intersection of both topics and contrast the findings to assess similarities and differences.

Step 5

Semantic similarities of each subcluster were computed and B-terms for each pair of subclusters were extracted. First, text was prepared by concatenating keywords, abstracts, and titles of each article, lowercased, with stop words removed, and stems of each word obtained. Following this, each article was represented as a vector whose length was the size of the vocabulary present in the dataset, with values being the number of occurrences of each word in the article. Text vectors at the cluster level were obtained by the summation of the text vectors of each article in the cluster. Finally, values were transformed into tfidf weights, as follows:

wc(i)=tfi,clog(Ndfi),     (2)

where tfi,c was the frequency of term i in subcluster c, dfi was the number of documents with i, N was the total number of documents, and wc was normalized such that ||wc|| = 1. A similarity score was computed between all possible pairs of subclusters and B-terms extracted from the pairs that were above average. There were a variety of similar scores applied to text vectors, and the selection of one could affect the results. In order to assess the robustness of selecting any of them, correlation of four similarity scores was computer. A high correlation indicates that a similar result can be obtained regardless of the metric. The following similarity scores were compared:

Cosine(c1,c2)=wc1 wc2    (3)
Jaccard(c1,c2)=wc1 wc2iwc12+iwc22- wc1 wc2     (4)
Dice(c1,c2)=2 (wc1 wc2)iwc1+ iwc2      (5)
Simpson(c1,c2)= |wc1 wc2|min(|wc1|,|wc2|)     (6)

where wc was the tfidf vectors computed with Equation (2).

Step 6

A network of B-terms was created. B-terms were connected if they appeared together as intersecting terms between a pair of subclusters. The more frequently they appeared together, the stronger their connection. As in citation networks, clusters of B-terms rather than articles were obtained by applying the Louvain algorithm. Clusters of B-terms were expected to share semantic similarity or belong to the same topic. Each cluster of B terms was assigned a name based on the list of terms within the cluster. The result was the network and list of B-terms that conformed to it. A few LBD methods rely on visualizations of B-terms (Cohen et al., 2010; Goodwin et al., 2012; Workman et al., 2016; Henry et al., 2019). However, they were dependent on the use of biomedical controlled vocabularies; hence, this approach relied on standard network visualization techniques. To conclude, results were compared with other LBD methods to identify similarities, differences, and use cases for each.

Implementation

The method described in steps 2 to 6 was implemented using the programming language R version 3.6.3 (R Core Team, 2019). Additionally, network building and clustering were performed using the R package, Igraph version 1.2.5 (Csardi and Nepusz, 2006). The network of academic articles in step 4 was plotted using the Large Graph Layout algorithm and free software designed to plot large networks (Adai et al., 2004). The size of nodes was set to zero to display only the edges. These were given different colors to represent clusters. Finally, for the network of B-terms described in step 6, VOSviewer (Van Eck and Waltman, 2010) and Gephi (Bastian et al., 2009) were used, as these were considered to be an appropriate option for smaller networks. Gephi's OpenOrd layout with software default parameters was used to plot the network of B-terms.

Results and Discussion

Major Clusters on Food Security and IoT

Before exploring connecting terms, the academic landscape of food security and IoT was examined by looking at clusters derived from citation networks of academic articles on each topic. A total of 77,559 articles was found in the largest component of the food security network, which can be grouped into 17 major clusters. The 41,117 IoT research articles were divided into 16 clusters. Figure 2 shows the networks and relative positions of the largest clusters.

FIGURE 2
www.frontiersin.org

Figure 2. Citation network of (A) food security and (B) IoT research. The top six large clusters are shown.

Research on food security has a long history, with the earliest article in the network being one on children malnutrition published in 1919 (Blanton, 1919). The IoT is a younger field of research, with the earliest article using the concept published in 2002 (Schoenberger, 2002). Details of major clusters are summarized in Tables 2, 3, respectively. Additionally, Table 4 shows the countries most engaged based on the number of publications on food security.

TABLE 2
www.frontiersin.org

Table 2. Food security clusters.

TABLE 3
www.frontiersin.org

Table 3. IoT clusters.

TABLE 4
www.frontiersin.org

Table 4. Countries with most publications on food security research.

Based on average publication years, early research on food security focused on issues related to malnutrition treatment, while the latest trends focused on aquaculture and the food supply chain. However, plant breeding had the most impact in terms of average citations per paper, which collected research exploring techniques for enhancing the breeding of micronutrients in genetically modified food crops (Welch and Graham, 2004). Other studies explored the enhancement of salt tolerance in plants, improving agricultural productivity (Apse et al., 1999). The most cited article across this dataset was in the cluster of sustainable agriculture, which was a discussion of soil carbon sequestration, a technique of regenerative agriculture that could play a significant role in land restoration and slowing climate change (Lal, 2004). Sustainable agriculture was also the dominant cluster based on the number of publications.

One of the clusters focused on research from and for Africa, with a focus on techniques and policies affecting small farmers (Barrett, 2008; Pretty et al., 2011). Although the US and the UK led in food security research (Table 4), African countries participate across clusters of this topic. Other countries with active engagement in food security research were China, India, and Brazil.

IoT as a concept and subject of research is relatively new. The idea of devices connected to the Internet and ubiquitous computing date back to the 1980's (Weiser, 1991), while the term itself started circulating since 1999 (Ashton, 2009). However, a large volume of publications and developments in IoT have appeared recently. The dataset in the present study included a 2-year difference between the average publication year of articles in the oldest and newest clusters. The largest number of publications was related to security and privacy issues, followed by smart manufacturing. The cluster on energy harvesting for IoT devices captured more citations on average. The most cited article was a review discussing the paradigm of IoT (Atzori et al., 2010), which appeared in the cluster of policy and academic discussions on IoT.

Intersecting Terms Between Food Security and IoT

Major clusters were split into subclusters, leading to 304 subclusters for food security and 304 for IoT. Similarity between all possible pairs of subclusters in the two networks was obtained and pairs above average were retained. As selection of similarity above others could result in different results, robustness of the approach was verified by comparing commonly used similarity metrics on text mining. Table 5 presents the correlations between them. There was an exact correlation between Cosine and Dice scores, while Jaccard and Simpson showed a high correlation. Therefore, the selection of one score above others had little to no impact on the results of the present study.

TABLE 5
www.frontiersin.org

Table 5. Correlation between different similarity measures.

Cosine similarity is considered the standard for topic similarity in information retrieval (Manning et al., 2008), while it has been found to outperform other metrics in LBD research. For instance, Cosine similarity was found to be the best metric to establish connections between clusters of academic articles and patents sharing the same topic when metrics were evaluated against the opinions of experts (Shibata et al., 2011). Similarly, Cosine similarity showed the best content relatedness when comparing clusters of social issues and technologies in a set of academic articles (Ittipanuvat et al., 2014). Based on the results presented in Table 5 and previous research, Cosine similarity was selected to extract intersecting terms. Figure 3 shows the network of intersecting terms between a pair of subclusters of food security and IoT with an above-average similarity score.

FIGURE 3
www.frontiersin.org

Figure 3. Cooccurrence network of B-terms between food security and IoT.

Each term in the network was connected to another if they cooccurred between pairs of subclusters. The size of the nodes represented the degree or number of connections, and the thickness of the edges was the number of times the two terms cooccured. Terms that appeared two or more times are shown. There were 13 clusters of terms. For ease of exploration, each cluster was assigned a name that summarized each group of keywords as a whole. These clusters can be understood as transversal themes in common between food security and IoT, including healthcare, agriculture, supply chain, information technologies, social acceptance, machine learning, China, risk mitigation, resource management systems, blockchain, nanomaterials, perceived risks, and occupational health. Table 6 shows the summary statistics of articles containing non-unigram B-terms in the datasets of food security and IoT for the 13 themes.

TABLE 6
www.frontiersin.org

Table 6. Transversal themes across food security and IoT.

In Table 6 themes were sorted by the difference in average citations for related papers in each dataset. Articles containing blockchain B-terms in the IoT dataset had the largest difference in citations compared with articles in food security. On the other hand, air quality had more citations in the food security dataset than in IoT, revealing a gradient of themes in which academics tend to emphasize it as a solution (at the top) or concern (at the bottom). Relationships were found by exploring the content of articles on such themes. Out of the 13 themes, this paper focused on three practical examples.

The cluster composed of B-terms related to the blockchain and smart contracts pointed to the application of distributed ledger technologies to transfer and manage assets in the context of the food security loan program in China (Wang et al., 2019). This kind of application was incipient in the context of food security; however, its underlying technology could be enhanced by many developments linking the blockchain and IoT.

The intersecting theme of air quality matched research on urban agriculture and IoT monitoring systems. For instance, the need to monitor heavy metal content in food due to polluted air in urban areas (Ercilla-Montserrat et al., 2018) could be satisfied with a system of sensors transmitting through a wide-area low-power network (Zheng et al., 2016). In addition, crop production has been found to greatly benefit from air quality control systems. However, the implementation of such systems requires globally orchestrated efforts or incentives from local governments (Shindell et al., 2012). Current developments in IoT for air quality monitoring could help bridge the gap between understanding and practice.

Finally, the last category, labeled China, appeared due to case studies covering Chinese research focused on IoT devices for agriculture and the service sector in rural China. This theme differed from others in that it focused on a geographic location. From the perspective of public knowledge discovery, China offered a variety of examples for potential applications of IoT in the context of food security, from which policymakers and researchers could draw ideas for implementation in other locations. For instance, this category included remote monitoring systems for agriculture (Zhang et al., 2017) and a management system for water conservation (Liu et al., 2015) developed in rural China.

Comparison With Other LBD Methodologies

The network presented in Figure 3 is a way to visualize B-terms that eases the exploration of long lists of terms by grouping them into semantically related keywords. Currently, there are other LBD methods available, most of which have been developed for biomedical literature but are generalizable to some extent. Table 7 presents the B-terms obtained by applying three LBD methods to the data in this study. First, B-terms were obtained by applying the method of Swanson and Smalheiser (1997), which is the basic implementation of LBD for closed discovery. Second, queries from Table 1 were applied to the Arrowsmith web service (Smalheiser et al., 2009). Only bigrams were retained to avoid a long list of generic unigrams. Arrowsmith pulls data from Medline, favoring biomedical literature and ranking newer terms higher. This makes surface COVID-19 related terms highly ranked. Finally, results of the method of Ittipanuvat et al. (2014) were demonstrated. This method ranks the intersecting terms based on pairs of clusters with high similarity. The Ittipanuvat et al. method generates n * m lists of B-terms, where n and m are the number of clusters for literature A and C, respectively. This study obtained 272 lists of B-terms (16 × 17 clusters), one per pair of clusters. Table 7 shows the resulting B-terms for three most semantically similar clusters. LBD using the Ittipanuvat et al. method requires more intentionality from the researcher by having a research question related to the pair of clusters or a methodological approach to filter the pairs of clusters for analysis. Additionally, each list of B-terms has the same characteristics as the Swanson and Smalheiser methods. Hence, when no controlled vocabulary is available, each B-term must be considered.

TABLE 7
www.frontiersin.org

Table 7. B-terms between food security and IoT by using other LBD methods.

Similarities were found between the proposed method and other known LBD approaches. Keywords such as healthcare, supply chain, and blockchain were observed with the classic ABC approach, while other terms, such as climate change, were missing in this network. On the other hand, keywords related to agriculture, nanomaterials, and air quality surfaced in the network. Previous methodologies reported extensive lists of connecting terms, putting the burden of assessment of each keyword on the reader or expert. Although the present method is not different in this regard, semantic grouping of keywords were used to ease the assessment process, for instance, by disregarding entire clusters of irrelevant keywords. This advantage is only apparent when the method is applied to non-biomedical fields. Biomedicine tools, such as Arrowsmith, can take advantage of semantic categories already in place in the Medline Subject Heading (MESH) thesaurus to group keywords into different fields.

To identify relevant connecting keywords, the transversal theme knowledge domain is required. The method proposed in this study, like others, is prone to revealing generic terms, such as product, technology, and future (Figure 3). However, as the keywords are grouped in clusters, they facilitate finding concepts that might bring interesting connections between studies and ease the discovery process.

Comparing different methods of LBD has been a challenge due to the lack of evaluative frameworks and ground truth (Smalheiser, 2012). In biomedical LBD, some evaluation attempts were performed by replicating the foundational discoveries of Swanson between Fish Oil and Raynaud's Syndrome and relations between Migraine and Magnesium (Sebastian et al., 2017). There are no similar comparative datasets in social sciences. Rather, different non-biomedical LBD methods may serve different purposes. The method applied in this study served as an exploratory tool to identify transversal themes between two research topics. The methods of Swanson and Smalheiser and Ittipanuvat et al. can help to explore linking concepts for specific and broad topics, respectively. According to these approaches, a theme refers to a group of concepts or terms; hence, it is more an aggregated exploratory level.

Articles Intersecting Food Security and IoT

A total of 74 common documents were found between the largest components of both networks. Most of them were distributed in clusters of smart manufacturing, wide-area low-power networks, and blockchains and smart contracts in the IoT dataset. On the other hand, they were concentrated in the food supply chain in the food security dataset. These documents represent the current direct linkage between these topics, where the potentialities of the IoT for helping with food security issues are already acknowledged.

Research in this set of documents included the development of value-centric frameworks of the IoT for the food supply chain, with a paradigm shift from traceability values of IoT systems to income values that include shelf life prediction, sales premium, precision food production, and insurance cost reduction (Pang et al., 2015). Other research has focused on showcasing systems for smart farms (Muangprathub et al., 2019) or applications of the blockchain in the food supply chain (Zhao et al., 2019). While these were direct connections between the topics of this study, the approach applied in this paper reveals interesting terms or indirect possible connections that became visible after removing common documents from the network. A list of 74 documents is included in the Supplementary Material.

Poverty Alleviation and Food Security

The UN SDGs agenda places the end of poverty and zero hunger as the first and second goals (United Nations, 2015). Although separate topics, research targeting one may have spillover effects into the other. This section explores transversal topics between food security and poverty alleviation in order to understand themes that may be expected to address issues of SDGs. Research on SDGs was triangulated by applying the methods discussed above and using poverty alleviation data from previous research (Mejia and Kajikawa, 2020).

There was a larger overlap between both topics, with 1,253 articles simultaneously tackling poverty alleviation and food security. These were removed from the networks, and B-terms were computed based on the remaining articles. Figure 4 shows the network of B-terms.

FIGURE 4
www.frontiersin.org

Figure 4. Cooccurrence network of B-terms in food security and poverty alleviation.

The network was composed of 567 B-terms aggregated into nine clusters. Compared to that of food security and IoT, where there were 271 B-terms aggregated into 13 clusters, this network was more intertwined, which can be interpreted as being more topically overlapped. After checking the keywords and articles related to the B-terms, nine themes were identified: welfare, sustainability, economic development, China, Africa, disaster management, migration, agriculture, and income generation. These themes had a broad scope, with two empathizing research in China and Africa.

Therefore, developing policies that consider linkages between a social challenge and a technological solution, such as between food security and IoT, can have an extended benefit in solving other social pressures while simultaneously targeting any broad themes shared by social issues. The LBD method helps reveal themes with this added value.

Conclusion and Limitations

This study applied an LBD methodology to find intersecting terms between disjoint research literature. The network approach helped visualize and organize terms into semantically-related clusters of keywords, which could help experts navigate a potentially long list of terms. As such, transversal themes were revealed and a taxonomy was automatically created.

This method was applied to the topics of food security and IoT, representing a variety of social issues and technologies, respectively. At the current state of research, both topics were highly disjoint. Only 74 (0.06%) out of 118,602 articles in the networks appeared in both. This indicates opportunities for researchers to dig deeper and establish direct connections, devices, or strategies for IoT to help solve this SDG. However, recognizing this gap is insufficient to set directions for researchers or policymakers. LBD methods help provide potential solutions that can be further investigated in research laboratories. The network of B-terms is intended to help identify possible connections. This study found 13 transversal themes between food security and IoT. Each theme was a cluster of keywords derived from multiple connections between the subclusters of the two topics.

Finding transversalities between social issues and potential technological solutions is part of evidence-based policymaking, which pursues two goals: “to use what we already know from program evaluation to make policy decisions, and to build more knowledge to better inform future decisions” (Evidence-Based Policymaking Collaborative, 2016). Rigorous research is expected to provide evidence for policy debates and internal public sector processes for improving program development and reforms (Head, 2009). The present LBD method helps navigate academic literature in order to compile evidence on what has worked, under what conditions, and when as well as the cost and benefits of implementing these solutions. In practice, policymakers and other stakeholders interested in the application of IoT in the context of food security could use the provided themes and linked literature to narrow down the pool of potential options and classify various alternatives. Additionally, the map could help to bring completeness to policy proposals by finding themes not yet covered. The applied method does not establish a direct link but helps rethink IoT policies and technology roadmaps in order to address pressing social issues, such as food security.

There was active participation in academic publishing on food security from non-OECD countries in Africa and Asia, which have an identified demand for information on potential ways to attain sustainable agriculture. Technological interventions have been applied by trial and error, which did not always consider regional differences (Giller et al., 2011). Additionally, some policy reforms on land use and agriculture had a positive impact on government budgets but an unintended negative impact on food security in rural areas in Africa (Morris et al., 2007). Failure in this kind of policy signals the need for supportive tools to identify potentially better options for application (Denning et al., 2009). In Asia, China and India engage in research on IoT and food security, although the efforts seem to be rated in parallel rather than conjoined.

While this paper illustrated the application of an LBD methodology to support policy discovery, it is limited in being an exploratory tool scoping technological alternatives. Achieving food security is influenced by several factors, such as social capital, strength of rural institutions, access to credit, and markets (Teklewold et al., 2013). However, the present study contributed by illustrating a case in which a social issue can be addressed by encouraging innovation and supporting evidence-based policymaking.

The methods used in this study had some limitations. There was a lack of an evaluation framework to assess the quality of the terms and clusters obtained and the impact of potential discoveries. This is a common problem for most LBD methods, given the non-existence of a standard for comparison and the costs of testing multiple hypotheses created by exploring connecting terms (Smalheiser, 2012; Sebastian, Y., et al., 2017). In addition, although the method is assumed to be generalizable, more case studies are required to understand its applicability in other fields.

Some opportunities for future improvement include the application of other clustering algorithms, such as trajectory clustering, which can, to some extent, be transferred to the dynamics of citation networks (Yuan et al., 2017; Bian et al., 2018). The application of LBD to datasets different from academic articles is also a promising new avenue of research. Social challenges may first be identified in other media, such as news, tweets, or policy reports. For instance, the Global Data on Events, Locations, and Tone (GDELT) dataset offers large-scale monitoring of social events based on mining web sources (Leetaru and Schrodt, 2013), which may be suitable to track global issues related to the SDGs, as in this paper.

This study offered a method for exploring shared terminologies between disjoint literature that does not depend on controlled vocabularies by reducing the burden of policymakers or experts aiming to develop a hypothesis or reframe a policy strategy. In addition, this study provided more use cases of LBD beyond the biomedical fields. Future research should focus on developing evaluation systems for these outputs, methodological improvements, and ease of accessibility through programming libraries or web interfaces.

Data Availability Statement

The data analyzed in this study is subject to the following licenses/restrictions: A Web of Science license is needed to download the data as instructed in the article. Post-processed datasets for the reproduction of the network and intersecting terms are available upon request. Requests to access these datasets should be directed to bWVqaWEuYy5hYSYjeDAwMDQwO20udGl0ZWNoLmFjLmpw.

Author Contributions

CM designed the project, collected the data, and conducted the analysis. YK supervised and monitored the project. All authors made substantial, direct, and intellectual contributions to the study.

Funding

Part of this research was supported by the Japan Science and Technology Agency through the Center of Innovation Program.

Conflict of Interest

The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

Acknowledgments

Part of this paper has been presented and published as conference proceedings of the First International Workshop on Literature-Based Discovery in the Pacific-Asia Conference on Knowledge Discovery and Data Mining (Mejia and Kajikawa, 2020). We are grateful for the comments and suggestions raised by the participants of this conference and reviewers of earlier versions of this manuscript.

Supplementary Material

The Supplementary Material for this article can be found online at: https://www.frontiersin.org/articles/10.3389/frma.2021.652285/full#supplementary-material

References

Adai, A. T., Date, S. V., Wieland, S., and Marcotte, E. M. (2004). LGL: creating a map of protein function with an algorithm for visualizing very large biological networks. J. Mol. Biol. 340, 179–190. doi: 10.1016/j.jmb.2004.04.047

PubMed Abstract | CrossRef Full Text | Google Scholar

Apse, M. P., Aharon, G. S., Snedden, W. A., and Blumwald, E. (1999). Salt tolerance conferred by overexpression of a vacuolar Na+/H+ antiport in Arabidopsis. Science 285, 1256–1258. doi: 10.1126/science.285.5431.1256

PubMed Abstract | CrossRef Full Text | Google Scholar

Ashton, K. (2009). That “Internet of Things” Thing. RFID J. Available online at: https://www.rfidjournal.com/that-internet-of-things-thing (accessed January 11, 2021).

Google Scholar

Atzori, L., Iera, A., and Morabito, G. (2010). The internet of things: a survey. Comput. Networks 54, 2787–2805. doi: 10.1016/j.comnet.2010.05.010

CrossRef Full Text | Google Scholar

Baker, N. C. (2010). Methods in Literature-Based Drug Discovery. Zhurnal Eksp i Teor Fiz.

Google Scholar

Barrett, C. B. (2008). Smallholder market participation: concepts and evidence from eastern and southern Africa. Food Policy 33, 299–317. doi: 10.1016/j.foodpol.2007.10.005

CrossRef Full Text | Google Scholar

Bastian, M., Heymann, S., and Jacomy, M. (2009). “Gephi: An open source software for exploring and manipulating networks,” in Proceedings of the Third International ICWSM Conference (San Jose, CA).

Google Scholar

Bian, J., Tian, D., Tang, Y., and Tao, D. (2018). A survey on trajectory clustering analysis. ArXiv Available online at: http://arxiv.org/abs/1802.06971 (accessed March 30, 2021).

Google Scholar

Blanton, S. (1919). Mental and nervous changes in the children of the Volksschulen of Trier, Germany, caused by malnutrition. Ment Hyg 3, 343–386.

Google Scholar

Blondel, V. D., Guillaume, J.-L., Lambiotte, R., and Lefebvre, E. (2008). Fast unfolding of communities in large networks. J. Stat. Mech. Theory Exp. 2008:P10008. doi: 10.1088/1742-5468/2008/10/P10008

CrossRef Full Text | Google Scholar

Cameron, D., Kavuluru, R., Rindflesch, T. C., Sheth, A. P., Thirunarayan, K., and Bodenreider, O. (2015). Context-driven automatic subgraph creation for literature-based discovery. J. Biomed. Inform. 54, 141–157. doi: 10.1016/j.jbi.2015.01.014

CrossRef Full Text | Google Scholar

Coeckelbergh, M., Pop, C., Simut, R., Peca, A., Pintea, S., David, D., et al. (2016). A survey of expectations about the role of robots in robot-assisted therapy for children with ASD: ethical acceptability, trust, sociability, appearance, and attachment. Sci. Eng. Ethics 22, 47–65. doi: 10.1007/s11948-015-9649-x

CrossRef Full Text | Google Scholar

Cohen, T., Kerr Whitfield, G., Schvaneveldt, R. W., Mukund, K., and Rindflesch, T. (2010). EpiphaNet: an interactive tool to support biomedical discoveries. J. Biomed. Discov. Collab. 5, 21–49.

PubMed Abstract | Google Scholar

Cory, K. A. (1997). Discovering hidden analogies in an online humanities database. Comput. Hum. 31, 1–12.

Google Scholar

Csardi, G., and Nepusz, T. (2006). The igraph software package for complex network research. InterJournal Complex Syst Complex Sy.

Google Scholar

Dao, V. L., Bothorel, C., and Lenca, P. (2019). Community structure: a comparative evaluation of community detection methods. Netw. Sci. 8, 1–41. doi: 10.1017/nws.2019.59

CrossRef Full Text | Google Scholar

Denning, G., Kabambe, P., Sanchez, P., Malik, A., Flor, R., Harawa, R., et al. (2009). Input subsidies to improve smallholder maize productivity in Malawi: toward an African green revolution. PLoS Biol. 7:e1000023. doi: 10.1371/journal.pbio.1000023

PubMed Abstract | CrossRef Full Text | Google Scholar

Ercilla-Montserrat, M., Muñoz, P., Montero, J. I., Gabarrell, X., and Rieradevall, J. (2018). A study on air quality and heavy metals content of urban food produced in a Mediterranean city (Barcelona). J. Clean Prod. 195, 385–395. doi: 10.1016/j.jclepro.2018.05.183

CrossRef Full Text | Google Scholar

Evidence-Based Policymaking Collaborative (2016). Principles of Evidence-Based Policymaking. Washington, DC: Evidence-Based Policymaking Collaborative.

Google Scholar

Fortunato, S., and Barthélemy, M. (2007). Resolution limit in community detection. Proc. Natl. Acad. Sci. U. S. A. 104, 36–41. doi: 10.1073/pnas.0605965104

PubMed Abstract | CrossRef Full Text | Google Scholar

Fujita, K. (2012). “Finding linkage between sustainability science and technologies based on citation network analysis,” in Proceedings - 2012 5th IEEE International Conference on Service-Oriented Computing and Applications, SOCA 2012 (Taipei). doi: 10.1109/SOCA.2012.6449422

CrossRef Full Text | Google Scholar

Giller, K. E., Tittonell, P., Rufino, M. C., van Wijk, M. T., Zingore, S., Mapfumo, P., et al. (2011). Communicating complexity: Integrated assessment of trade-offs concerning soil fertility management within African farming systems to support innovation and development. Agric. Syst. 104, 191–203. doi: 10.1016/j.agsy.2010.07.002

CrossRef Full Text | Google Scholar

Goodwin, J. C., Cohen, T., and Rindflesch, T. (2012). “Discovery by scent: discovery browsing system based on the information foraging theory,” in Proceedings - 2012 IEEE International Conference on Bioinformatics and Biomedicine Workshops, BIBMW (Philadelphia, PA), 232–239. doi: 10.1109/BIBMW.2012.6470309

CrossRef Full Text | Google Scholar

Gopalakrishnan, V., Jha, K., Jin, W., and Zhang, A. (2019). A survey on literature based discovery approaches in biomedical domain. J. Biomed. Inform. 93:103141. doi: 10.1016/j.jbi.2019.103141

PubMed Abstract | CrossRef Full Text | Google Scholar

Gordon, M., Lindsay, R. K., and Fan, W. (2002). Literature-based discovery on the world wide web. ACM Trans Internet Technol. 2, 261–275. doi: 10.1145/604596.604597

CrossRef Full Text | Google Scholar

Head, B. (2009). “Evidence-based policy : principles and requirements,” in Strenghtening Evidence-Based Policy in the Australian Federation, ed P. Commission (Melbourne, VIC), 13–26.

Google Scholar

Henry, S., and McInnes, B. T. (2017). Literature based discovery: models, methods, and trends. J. Biomed. Inform. 74, 20–32. doi: 10.1016/j.jbi.2017.08.011

PubMed Abstract | CrossRef Full Text | Google Scholar

Henry, S., Panahi, A., Wijesinghe, D. S., and McInnes, B. T. (2019). A literature based discovery visualization system with hierarchical clustering and linking set associations. AMIA Jt. Summits Transl. Sci. Proc. 2019, 582–591. Available online at: http://www.ncbi.nlm.nih.gov/pubmed/31259013 (accessed February, 25, 2021).

PubMed Abstract | Google Scholar

Huang, S., He, L., Yang, B., and Zhang, M. (2012). A compound correlation model for disjoint literature-based knowledge discovery. Aslib Proc. New Inf. Perspect. 64, 423–436. doi: 10.1108/00012531211244770

CrossRef Full Text | Google Scholar

Hui, W., and Lau, W. K. (1997). “Application of literature-based discovery in nonmedical disciplines: a survey,” in ACM International Conference Proceeding Series (New York, NY: Association for Computing Machinery), 7–11.

Google Scholar

Ittipanuvat, V., Fujita, K., Sakata, I., and Kajikawa, Y. (2014). Finding linkage between technology and social issue: A Literature Based Discovery approach. J. Eng. Technol. Manag. 32, 160–184. doi: 10.1016/j.jengtecman.2013.05.006

CrossRef Full Text | Google Scholar

Jayabalasingham, B., Boverhof, R., Agnew, K., and Klein, L. (2019). Identifying Research Supporting the United Nations Sustainable Development Goals. Mendeley.

Google Scholar

Jha, K., and Jin, W. (2016). “Mining hidden knowledge from the counterterrorism dataset using graph-based approach,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics, eds E. Métais, F. Meziane, M. Saraee, V. Sugumaran, and S. Vadera (Cham: Springer Verlag), 310–317. doi: 10.1007/978-3-319-41754-7_29

CrossRef Full Text | Google Scholar

Klavans, R., and Boyack, K. W. (2017). Which type of citation analysis generates the most accurate taxonomy of scientific and technical knowledge? J. Assoc. Inf. Sci. Technol. 68, 984–998. doi: 10.1002/asi.23734

CrossRef Full Text | Google Scholar

Kostoff, R. N. (2006). Systematic acceleration of radical discovery and innovation in science and technology. Technol. Forecast. Soc. Change 73, 923–936. doi: 10.1016/j.techfore.2005.09.004

CrossRef Full Text | Google Scholar

Kostoff, R. N., Solka, J. L., Rushenberg, R. L., and Wyatt, J. (2008). Literature-related discovery (LRD): Water purification. Technol. Forecast Soc. Change 75, 256–275. doi: 10.1016/j.techfore.2007.11.009

CrossRef Full Text | Google Scholar

Lal, R. (2004). Soil carbon sequestration impacts on global climate change and food security. Science 304, 1623–1627. doi: 10.1126/science.1097396

PubMed Abstract | CrossRef Full Text | Google Scholar

Leetaru, K., and Schrodt, P. A. (2013). “GDELT: Global data on events, location and tone, 1979–2012,” in International Studies Association Meetings (San Francisco, CA).

Google Scholar

Liu, X., Liu, H., Wan, Z., Chen, T., and Tian, K. (2015). Application and study of Internet of Things used in rural water conservancy project. J. Comput. Methods Sci. Eng. 15, 477–488. doi: 10.3233/JCM-150560

CrossRef Full Text | Google Scholar

Manning, C. D., Raghavan, P., and Schutze, H. (2008). Introduction to Information Retrieval. Cambridge: Cambridge University Press. doi: 10.1017/CBO9780511809071

CrossRef Full Text | Google Scholar

Manyika, J., Chui, M., Bisson, P., Woetzel, J., Dobbs, R., Bughin, J., and Aharon, D. (2015). Unlocking the Potential of the Internet of Things. McKinsey. Available online at: https://www.mckinsey.com/business-functions/mckinsey-digital/our-insights/the-internet-of-things-the-value-of-digitizing-the-physical-world (accessed January 30, 2020).

Google Scholar

Mejia, C., and Kajikawa, Y. (2020). “A network approach for mapping and classifying shared terminologies between disparate literatures in the social sciences,” in Lecture Notes in Computer Science including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics, eds W. Lu, and K. Q. Zhu (Cham: Springer), 30–40. doi: 10.1007/978-3-030-60470-7_4

CrossRef Full Text | Google Scholar

Morris, M., Kelly, V. A., Kopicki, R. J., and Byerlee, D. (2007). “Fertilizer use in African agriculture. Lessons learned and good practice guidelines,” in Directions in Development. (Washington, DC: World Bank Group), 1–144. doi: 10.1596/978-0-8213-6880-0

CrossRef Full Text | Google Scholar

Muangprathub, J., Boonnam, N., Kajornkasirat, S., Lekbangpong, N., Wanichsombat, A., and Nillaor, P. (2019). IoT and agriculture data analysis for smart farm. Comput. Electron. Agric. 156, 467–474. doi: 10.1016/j.compag.2018.12.011

PubMed Abstract | CrossRef Full Text | Google Scholar

Pang, Z., Chen, Q., Han, W., and Zheng, L. (2015). Value-centric design of the internet-of-things solution for food supply chain: value creation, sensor portfolio and information fusion. Inf. Syst. Front. 17, 289–319. doi: 10.1007/s10796-012-9374-9

CrossRef Full Text | Google Scholar

Pretty, J., Toulmin, C., and Williams, S. (2011). Sustainable intensification in African agriculture. Int. J. Agric. Sustain. 9, 5–24. doi: 10.3763/ijas.2010.0583

CrossRef Full Text | Google Scholar

R Core Team (2019). R: A Language and Environment for Statistical Computing. R Foundation Statistics Computing.

Google Scholar

Schoenberger, C. R. (2002). The Internet of Things. Forbes 169:155. Available online at: https://www.forbes.com/global/2002/0318/092.html?sh=7ef170353c3e (accessed January 30, 2021).

Google Scholar

Sebastian, Y., Siew, E.-G., and Orimaye, S. O. (2017). Emerging approaches in literature-based discovery: techniques and performance review. Knowl. Eng. Rev. 32:e12. doi: 10.1017/S0269888917000042

CrossRef Full Text | Google Scholar

Sebastian, Y., Siew, E. G., and Orimaye, S. O. (2017). Learning the heterogeneous bibliographic information network for literature-based discovery. Knowl. Based Syst. 115, 66–79. doi: 10.1016/j.knosys.2016.10.015

CrossRef Full Text | Google Scholar

Shibata, N., Kajikawa, Y., and Sakata, I. (2011). Detecting potential technological fronts by comparing scientific papers and patents. Foresight 13, 51–60. doi: 10.1108/14636681111170211

CrossRef Full Text | Google Scholar

Shindell, D., Kuylenstierna, J. C. I., Vignati, E., Van Dingenen, R., Amann, M., Klimont, Z., et al. (2012). Simultaneously mitigating near-term climate change and improving human health and food security. Science 335, 183–189. doi: 10.1126/science.1210026

PubMed Abstract | CrossRef Full Text | Google Scholar

Smalheiser, N. R. (2012). Literature-based discovery: beyond the ABCs. J. Am. Soc. Inf. Sci. Technol. 63, 218–224. doi: 10.1002/asi.21599

CrossRef Full Text | Google Scholar

Smalheiser, N. R. (2018). Rediscovering don swanson: the past, present and future of literature-based discovery. J. Data Inf. Sci. 2, 43–64. doi: 10.1515/jdis-2017-0019

PubMed Abstract | CrossRef Full Text | Google Scholar

Smalheiser, N. R., Torvik, V. I., and Zhou, W. (2009). Arrowsmith two-node search interface: A tutorial on finding meaningful links between two disparate sets of articles in MEDLINE. Comput. Methods Programs Biomed. 94, 190–197. doi: 10.1016/j.cmpb.2008.12.006

PubMed Abstract | CrossRef Full Text | Google Scholar

Šubelj, L., van Eck, N. J., and Waltman, L. (2015). Clustering scientific publications based on citation relations: a systematic comparison of different methods. PLoS ONE 11:e0154404. doi: 10.1371/journal.pone.0154404

PubMed Abstract | CrossRef Full Text | Google Scholar

Swanson, D. R. (1986). Fish oil, Raynau's syndrome, and undiscovered public knowledge. Perspect. Biol. Med. 30, 7–18. doi: 10.1353/pbm.1986.0087

PubMed Abstract | CrossRef Full Text | Google Scholar

Swanson, D. R. (1986). Undiscovered public knowledge. Libr. Q Inf. Community Policy 56, 103–118. doi: 10.1086/601720

CrossRef Full Text | Google Scholar

Swanson, D. R., and Smalheiser, N. R. (1997). An interactive system for finding complementary literatures: a stimulus to scientific discovery. Artif. Intell. 91, 183–203. doi: 10.1016/S0004-3702(97)00008-8

CrossRef Full Text | Google Scholar

Takano, Y., and Kajikawa, Y. (2018). “Advanced methods: opportunities and potential of the Internet of Things for solving social issues,” in Innovation Discovery: Network Analysis Of Research And Invention Activity For Technology Management, eds T. Daim and A. Pilkington (London: World Scientific Publishing Co. Pte. Ltd.), 531–558. doi: 10.1142/9781786344069_0019

CrossRef Full Text | Google Scholar

Teklewold, H., Kassie, M., and Shiferaw, B. (2013). Adoption of multiple sustainable agricultural practices in rural Ethiopia. J. Agric. Econ. 64, 597–623. doi: 10.1111/1477-9552.12011

CrossRef Full Text | Google Scholar

Thilakaratne, M., Falkner, K., and Atapattu, T. (2019a). A systematic review on literature-based discovery workflow. PeerJ. Comput. Sci. 5:e235. doi: 10.7717/peerj-cs.235

PubMed Abstract | CrossRef Full Text | Google Scholar

Thilakaratne, M., Falkner, K., and Atapattu, T. (2019b). A systematic review on literature-based discovery: General overview, methodology, and statistical analysis. ACM Comput. Surv. 52, 1–34. doi: 10.1145/3365756

CrossRef Full Text | Google Scholar

United Nations (2015). Transforming Our World: The 2030 Agenda for Sustainable Development. United Nations.

Google Scholar

Van Eck, N. J., and Waltman, L. (2010). Software survey: VOSviewer, a computer program for bibliometric mapping. Scientometrics 84, 523–538. doi: 10.1007/s11192-009-0146-3

PubMed Abstract | CrossRef Full Text | Google Scholar

Wang, H., Guo, C., and Cheng, S. (2019). LoC — a new financial loan management system based on smart contracts. Futur. Gen. Comput. Syst. 100, 648–655. doi: 10.1016/j.future.2019.05.040

CrossRef Full Text | Google Scholar

Weeber, M., Klein, H., de Jong-van den Berg, L. T. W., and Vos, R. (2001). Using concepts in literature-based discovery: simulating swanson's raynaud-fish oil and migraine-magnesium discoveries. J. Am. Soc. Inf. Sci. Technol. 52, 548–557. doi: 10.1002/asi.1104

CrossRef Full Text | Google Scholar

Weiser, M. (1991). The computer for the 21st century. Sci. Am. 265, 94–104. doi: 10.1038/scientificamerican0991-94

CrossRef Full Text | Google Scholar

Welch, R. M., and Graham, R. D. (2004). Breeding for micronutrients in staple food crops from a human nutrition perspective. J. Exp. Bot. 55, 353–364. doi: 10.1093/jxb/erh064

PubMed Abstract | CrossRef Full Text | Google Scholar

Workman, T. E., Fiszman, M., Cairelli, M. J., Nahl, D., and Rindflesch, T. C. (2016). Spark, an application based on serendipitous knowledge discovery. J. Biomed. Inform. 60, 23–37. doi: 10.1016/j.jbi.2015.12.014

PubMed Abstract | CrossRef Full Text | Google Scholar

Yuan, G., Sun, P., Zhao, J., Li, D., and Wang, C. (2017). A review of moving object trajectory clustering algorithms. Artif. Intell. Rev. 47, 123–144. doi: 10.1007/s10462-016-9477-7

CrossRef Full Text | Google Scholar

Zhang, R., Hao, F., and Sun, X. (2017). The design of agricultural machinery service management system based on internet of things. Procedia Comput. Sci. 107, 53–57. doi: 10.1016/j.procs.2017.03.055

CrossRef Full Text | Google Scholar

Zhao, G., Liu, S., Lopez, C., Lu, H., Elgueta, S., Chen, H., et al. (2019). Blockchain technology in agri-food value chain management: A synthesis of applications, challenges and future research directions. Comput. Ind. 109, 83–99. doi: 10.1016/j.compind.2019.04.002

CrossRef Full Text | Google Scholar

Zheng, K., Zhao, S., Yang, Z., Xiong, X., and Xiang, W. (2016). Design and implementation of LPWA-based air quality monitoring system. IEEE Access 4, 3238–3245. doi: 10.1109/ACCESS.2016.2582153

CrossRef Full Text | Google Scholar

Keywords: literature-based discovery, citation networks, text mining, food security, poverty alleviation, SDGs, Internet of Things

Citation: Mejia C and Kajikawa Y (2021) Exploration of Shared Themes Between Food Security and Internet of Things Research Through Literature-Based Discovery. Front. Res. Metr. Anal. 6:652285. doi: 10.3389/frma.2021.652285

Received: 12 January 2021; Accepted: 19 April 2021;
Published: 13 May 2021.

Edited by:

Yakub Sebastian, Charles Darwin University, Australia

Reviewed by:

Alan L. Porter, Search Technology, Inc., United States
Scott Cunningham, University of Strathclyde, United Kingdom
Bridget McInnes, Virginia Commonwealth University, United States

Copyright © 2021 Mejia and Kajikawa. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

*Correspondence: Cristian Mejia, bWVqaWEuYy5hYSYjeDAwMDQwO20udGl0ZWNoLmFjLmpw

Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.