WorldWideScience

Sample records for hierarchical social network

  1. Hierarchical social networks and information flow

    Science.gov (United States)

    López, Luis; F. F. Mendes, Jose; Sanjuán, Miguel A. F.

    2002-12-01

    Using a simple model for the information flow on social networks, we show that the traditional hierarchical topologies frequently used by companies and organizations, are poorly designed in terms of efficiency. Moreover, we prove that this type of structures are the result of the individual aim of monopolizing as much information as possible within the network. As the information is an appropriate measurement of centrality, we conclude that this kind of topology is so attractive for leaders, because the global influence each actor has within the network is completely determined by the hierarchical level occupied.

  2. Hierarchical community structure in complex (social) networks

    CERN Document Server

    Massaro, Emanuele

    2014-01-01

    The investigation of community structure in networks is a task of great importance in many disciplines, namely physics, sociology, biology and computer science where systems are often represented as graphs. One of the challenges is to find local communities from a local viewpoint in a graph without global information in order to reproduce the subjective hierarchical vision for each vertex. In this paper we present the improvement of an information dynamics algorithm in which the label propagation of nodes is based on the Markovian flow of information in the network under cognitive-inspired constraints \\cite{Massaro2012}. In this framework we have introduced two more complex heuristics that allow the algorithm to detect the multi-resolution hierarchical community structure of networks from a source vertex or communities adopting fixed values of model's parameters. Experimental results show that the proposed methods are efficient and well-behaved in both real-world and synthetic networks.

  3. Category theoretic analysis of hierarchical protein materials and social networks.

    Directory of Open Access Journals (Sweden)

    David I Spivak

    Full Text Available Materials in biology span all the scales from Angstroms to meters and typically consist of complex hierarchical assemblies of simple building blocks. Here we describe an application of category theory to describe structural and resulting functional properties of biological protein materials by developing so-called ologs. An olog is like a "concept web" or "semantic network" except that it follows a rigorous mathematical formulation based on category theory. This key difference ensures that an olog is unambiguous, highly adaptable to evolution and change, and suitable for sharing concepts with other olog. We consider simple cases of beta-helical and amyloid-like protein filaments subjected to axial extension and develop an olog representation of their structural and resulting mechanical properties. We also construct a representation of a social network in which people send text-messages to their nearest neighbors and act as a team to perform a task. We show that the olog for the protein and the olog for the social network feature identical category-theoretic representations, and we proceed to precisely explicate the analogy or isomorphism between them. The examples presented here demonstrate that the intrinsic nature of a complex system, which in particular includes a precise relationship between structure and function at different hierarchical levels, can be effectively represented by an olog. This, in turn, allows for comparative studies between disparate materials or fields of application, and results in novel approaches to derive functionality in the design of de novo hierarchical systems. We discuss opportunities and challenges associated with the description of complex biological materials by using ologs as a powerful tool for analysis and design in the context of materiomics, and we present the potential impact of this approach for engineering, life sciences, and medicine.

  4. Category theoretic analysis of hierarchical protein materials and social networks

    CERN Document Server

    Spivak, David I; Buehler, Markus J

    2011-01-01

    Materials in biology span all the scales from Angstroms to meters and typically consist of complex hierarchical assemblies of simple building blocks. Here we review an application of category theory to describe structural and resulting functional properties of biological protein materials by developing so-called ologs. An olog is like a "concept web" or "semantic network" except that it follows a rigorous mathematical formulation based on category theory. This key difference ensures that an olog is unambiguous, highly adaptable to evolution and change, and suitable for sharing concepts with other ologs. We consider a simple example of an alpha-helical and an amyloid-like protein filament subjected to axial extension and develop an olog representation of their structural and resulting mechanical properties. We also construct a representation of a social network in which people send text-messages to their nearest neighbors and act as a team to perform a task. We show that the olog for the protein and the olog f...

  5. Predicting Hierarchical Structure in Small World Social Networks

    DEFF Research Database (Denmark)

    Hussain, Dil Muhammad Akbar

    2009-01-01

    Typisk analytisk foranstaltninger i grafteori gerne grad centralitet, betweenness og nærhed centralities er meget almindelige og har lang tradition for deres vellykkede brug. Men modellering af skjult, terrorister eller kriminelle netværk gennem sociale grafer ikke rigtig give den hierarkiske str...... udnyttet til at forudsige den kommandostruktur af nettet. Nøgleord: Social Networks Analyse, Bayes Teorem, entropi, hierarkisk struktur.......Typisk analytisk foranstaltninger i grafteori gerne grad centralitet, betweenness og nærhed centralities er meget almindelige og har lang tradition for deres vellykkede brug. Men modellering af skjult, terrorister eller kriminelle netværk gennem sociale grafer ikke rigtig give den hierarkiske...

  6. Hierarchical Network Design

    DEFF Research Database (Denmark)

    Thomadsen, Tommy

    2005-01-01

    of different types of hierarchical networks. This is supplemented by a review of ring network design problems and a presentation of a model allowing for modeling most hierarchical networks. We use methods based on linear programming to design the hierarchical networks. Thus, a brief introduction to the various....... The thesis investigates models for hierarchical network design and methods used to design such networks. In addition, ring network design is considered, since ring networks commonly appear in the design of hierarchical networks. The thesis introduces hierarchical networks, including a classification scheme...... linear programming based methods is included. The thesis is thus suitable as a foundation for study of design of hierarchical networks. The major contribution of the thesis consists of seven papers which are included in the appendix. The papers address hierarchical network design and/or ring network...

  7. Hierarchical Network Design

    DEFF Research Database (Denmark)

    Thomadsen, Tommy

    2005-01-01

    Communication networks are immensely important today, since both companies and individuals use numerous services that rely on them. This thesis considers the design of hierarchical (communication) networks. Hierarchical networks consist of layers of networks and are well-suited for coping...... the clusters. The design of hierarchical networks involves clustering of nodes, hub selection, and network design, i.e. selection of links and routing of ows. Hierarchical networks have been in use for decades, but integrated design of these networks has only been considered for very special types of networks....... The thesis investigates models for hierarchical network design and methods used to design such networks. In addition, ring network design is considered, since ring networks commonly appear in the design of hierarchical networks. The thesis introduces hierarchical networks, including a classification scheme...

  8. Visualization of Social Networks

    NARCIS (Netherlands)

    Boertjes, E.M.; Kotterink, B.; Jager, E.J.

    2011-01-01

    Current visualizations of social networks are mostly some form of node-link diagram. Depending on the type of social network, this can be some treevisualization with a strict hierarchical structure or a more generic network visualization.

  9. A Social Potential Fields Approach for Self-Deployment and Self-Healing in Hierarchical Mobile Wireless Sensor Networks

    Science.gov (United States)

    González-Parada, Eva; Cano-García, Jose; Aguilera, Francisco; Sandoval, Francisco; Urdiales, Cristina

    2017-01-01

    Autonomous mobile nodes in mobile wireless sensor networks (MWSN) allow self-deployment and self-healing. In both cases, the goals are: (i) to achieve adequate coverage; and (ii) to extend network life. In dynamic environments, nodes may use reactive algorithms so that each node locally decides when and where to move. This paper presents a behavior-based deployment and self-healing algorithm based on the social potential fields algorithm. In the proposed algorithm, nodes are attached to low cost robots to autonomously navigate in the coverage area. The proposed algorithm has been tested in environments with and without obstacles. Our study also analyzes the differences between non-hierarchical and hierarchical routing configurations in terms of network life and coverage. PMID:28075364

  10. Hierarchical winner-take-all particle swarm optimization social network for neural model fitting.

    Science.gov (United States)

    Coventry, Brandon S; Parthasarathy, Aravindakshan; Sommer, Alexandra L; Bartlett, Edward L

    2017-02-01

    Particle swarm optimization (PSO) has gained widespread use as a general mathematical programming paradigm and seen use in a wide variety of optimization and machine learning problems. In this work, we introduce a new variant on the PSO social network and apply this method to the inverse problem of input parameter selection from recorded auditory neuron tuning curves. The topology of a PSO social network is a major contributor to optimization success. Here we propose a new social network which draws influence from winner-take-all coding found in visual cortical neurons. We show that the winner-take-all network performs exceptionally well on optimization problems with greater than 5 dimensions and runs at a lower iteration count as compared to other PSO topologies. Finally we show that this variant of PSO is able to recreate auditory frequency tuning curves and modulation transfer functions, making it a potentially useful tool for computational neuroscience models.

  11. Detecting Hierarchical Structure in Networks

    DEFF Research Database (Denmark)

    Herlau, Tue; Mørup, Morten; Schmidt, Mikkel Nørgaard;

    2012-01-01

    a generative Bayesian model that is able to infer whether hierarchies are present or not from a hypothesis space encompassing all types of hierarchical tree structures. For efficient inference we propose a collapsed Gibbs sampling procedure that jointly infers a partition and its hierarchical structure......Many real-world networks exhibit hierarchical organization. Previous models of hierarchies within relational data has focused on binary trees; however, for many networks it is unknown whether there is hierarchical structure, and if there is, a binary tree might not account well for it. We propose....... On synthetic and real data we demonstrate that our model can detect hierarchical structure leading to better link-prediction than competing models. Our model can be used to detect if a network exhibits hierarchical structure, thereby leading to a better comprehension and statistical account the network....

  12. Onboard hierarchical network

    Science.gov (United States)

    Tunesi, Luca; Armbruster, Philippe

    2004-02-01

    The objective of this paper is to demonstrate a suitable hierarchical networking solution to improve capabilities and performances of space systems, with significant recurrent costs saving and more efficient design & manufacturing flows. Classically, a satellite can be split in two functional sub-systems: the platform and the payload complement. The platform is in charge of providing power, attitude & orbit control and up/down-link services, whereas the payload represents the scientific and/or operational instruments/transponders and embodies the objectives of the mission. One major possibility to improve the performance of payloads, by limiting the data return to pertinent information, is to process data on board thanks to a proper implementation of the payload data system. In this way, it is possible to share non-recurring development costs by exploiting a system that can be adopted by the majority of space missions. It is believed that the Modular and Scalable Payload Data System, under development by ESA, provides a suitable solution to fulfil a large range of future mission requirements. The backbone of the system is the standardised high data rate SpaceWire network http://www.ecss.nl/. As complement, a lower speed command and control bus connecting peripherals is required. For instance, at instrument level, there is a need for a "local" low complexity bus, which gives the possibility to command and control sensors and actuators. Moreover, most of the connections at sub-system level are related to discrete signals management or simple telemetry acquisitions, which can easily and efficiently be handled by a local bus. An on-board hierarchical network can therefore be defined by interconnecting high-speed links and local buses. Additionally, it is worth stressing another important aspect of the design process: Agencies and ESA in particular are frequently confronted with a big consortium of geographically spread companies located in different countries, each one

  13. Strategic games on a hierarchical network model

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    Among complex network models, the hierarchical network model is the one most close to such real networks as world trade web, metabolic network, WWW, actor network, and so on. It has not only the property of power-law degree distribution, but growth based on growth and preferential attachment, showing the scale-free degree distribution property. In this paper, we study the evolution of cooperation on a hierarchical network model, adopting the prisoner's dilemma (PD) game and snowdrift game (SG) as metaphors of the interplay between connected nodes. BA model provides a unifying framework for the emergence of cooperation. But interestingly, we found that on hierarchical model, there is no sign of cooperation for PD game, while the frequency of cooperation decreases as the common benefit decreases for SG. By comparing the scaling clustering coefficient properties of the hierarchical network model with that of BA model, we found that the former amplifies the effect of hubs. Considering different performances of PD game and SG on complex network, we also found that common benefit leads to cooperation in the evolution. Thus our study may shed light on the emergence of cooperation in both natural and social environments.

  14. Memory Stacking in Hierarchical Networks.

    Science.gov (United States)

    Westö, Johan; May, Patrick J C; Tiitinen, Hannu

    2016-02-01

    Robust representations of sounds with a complex spectrotemporal structure are thought to emerge in hierarchically organized auditory cortex, but the computational advantage of this hierarchy remains unknown. Here, we used computational models to study how such hierarchical structures affect temporal binding in neural networks. We equipped individual units in different types of feedforward networks with local memory mechanisms storing recent inputs and observed how this affected the ability of the networks to process stimuli context dependently. Our findings illustrate that these local memories stack up in hierarchical structures and hence allow network units to exhibit selectivity to spectral sequences longer than the time spans of the local memories. We also illustrate that short-term synaptic plasticity is a potential local memory mechanism within the auditory cortex, and we show that it can bring robustness to context dependence against variation in the temporal rate of stimuli, while introducing nonlinearities to response profiles that are not well captured by standard linear spectrotemporal receptive field models. The results therefore indicate that short-term synaptic plasticity might provide hierarchically structured auditory cortex with computational capabilities important for robust representations of spectrotemporal patterns.

  15. Hierarchical networks of scientific journals

    CERN Document Server

    Palla, Gergely; Mones, Enys; Pollner, Péter; Vicsek, Tamás

    2015-01-01

    Scientific journals are the repositories of the gradually accumulating knowledge of mankind about the world surrounding us. Just as our knowledge is organised into classes ranging from major disciplines, subjects and fields to increasingly specific topics, journals can also be categorised into groups using various metrics. In addition to the set of topics characteristic for a journal, they can also be ranked regarding their relevance from the point of overall influence. One widespread measure is impact factor, but in the present paper we intend to reconstruct a much more detailed description by studying the hierarchical relations between the journals based on citation data. We use a measure related to the notion of m-reaching centrality and find a network which shows the level of influence of a journal from the point of the direction and efficiency with which information spreads through the network. We can also obtain an alternative network using a suitably modified nested hierarchy extraction method applied ...

  16. Hierarchical Network Design Using Simulated Annealing

    DEFF Research Database (Denmark)

    Thomadsen, Tommy; Clausen, Jens

    2002-01-01

    The hierarchical network problem is the problem of finding the least cost network, with nodes divided into groups, edges connecting nodes in each groups and groups ordered in a hierarchy. The idea of hierarchical networks comes from telecommunication networks where hierarchies exist. Hierarchical...... networks are described and a mathematical model is proposed for a two level version of the hierarchical network problem. The problem is to determine which edges should connect nodes, and how demand is routed in the network. The problem is solved heuristically using simulated annealing which as a sub......-algorithm uses a construction algorithm to determine edges and route the demand. Performance for different versions of the algorithm are reported in terms of runtime and quality of the solutions. The algorithm is able to find solutions of reasonable quality in approximately 1 hour for networks with 100 nodes....

  17. Hierarchical modularity in human brain functional networks

    CERN Document Server

    Meunier, D; Fornito, A; Ersche, K D; Bullmore, E T; 10.3389/neuro.11.037.2009

    2010-01-01

    The idea that complex systems have a hierarchical modular organization originates in the early 1960s and has recently attracted fresh support from quantitative studies of large scale, real-life networks. Here we investigate the hierarchical modular (or "modules-within-modules") decomposition of human brain functional networks, measured using functional magnetic resonance imaging (fMRI) in 18 healthy volunteers under no-task or resting conditions. We used a customized template to extract networks with more than 1800 regional nodes, and we applied a fast algorithm to identify nested modular structure at several hierarchical levels. We used mutual information, 0 < I < 1, to estimate the similarity of community structure of networks in different subjects, and to identify the individual network that is most representative of the group. Results show that human brain functional networks have a hierarchical modular organization with a fair degree of similarity between subjects, I=0.63. The largest 5 modules at ...

  18. Analyzing security protocols in hierarchical networks

    DEFF Research Database (Denmark)

    Zhang, Ye; Nielson, Hanne Riis

    2006-01-01

    Validating security protocols is a well-known hard problem even in a simple setting of a single global network. But a real network often consists of, besides the public-accessed part, several sub-networks and thereby forms a hierarchical structure. In this paper we first present a process calculus...... capturing the characteristics of hierarchical networks and describe the behavior of protocols on such networks. We then develop a static analysis to automate the validation. Finally we demonstrate how the technique can benefit the protocol development and the design of network systems by presenting a series...

  19. Modular, Hierarchical Learning By Artificial Neural Networks

    Science.gov (United States)

    Baldi, Pierre F.; Toomarian, Nikzad

    1996-01-01

    Modular and hierarchical approach to supervised learning by artificial neural networks leads to neural networks more structured than neural networks in which all neurons fully interconnected. These networks utilize general feedforward flow of information and sparse recurrent connections to achieve dynamical effects. The modular organization, sparsity of modular units and connections, and fact that learning is much more circumscribed are all attractive features for designing neural-network hardware. Learning streamlined by imitating some aspects of biological neural networks.

  20. Universal hierarchical behavior of citation networks

    CERN Document Server

    Mones, Enys; Vicsek, Tamás

    2014-01-01

    Many of the essential features of the evolution of scientific research are imprinted in the structure of citation networks. Connections in these networks imply information about the transfer of knowledge among papers, or in other words, edges describe the impact of papers on other publications. This inherent meaning of the edges infers that citation networks can exhibit hierarchical features, that is typical of networks based on decision-making. In this paper, we investigate the hierarchical structure of citation networks consisting of papers in the same field. We find that the majority of the networks follow a universal trend towards a highly hierarchical state, and i) the various fields display differences only concerning their phase in life (distance from the "birth" of a field) or ii) the characteristic time according to which they are approaching the stationary state. We also show by a simple argument that the alterations in the behavior are related to and can be understood by the degree of specializatio...

  1. Genetic Algorithm for Hierarchical Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sajid Hussain

    2007-09-01

    Full Text Available Large scale wireless sensor networks (WSNs can be used for various pervasive and ubiquitous applications such as security, health-care, industry automation, agriculture, environment and habitat monitoring. As hierarchical clusters can reduce the energy consumption requirements for WSNs, we investigate intelligent techniques for cluster formation and management. A genetic algorithm (GA is used to create energy efficient clusters for data dissemination in wireless sensor networks. The simulation results show that the proposed intelligent hierarchical clustering technique can extend the network lifetime for different network deployment environments.

  2. Hierarchical Network Models for Education Research: Hierarchical Latent Space Models

    Science.gov (United States)

    Sweet, Tracy M.; Thomas, Andrew C.; Junker, Brian W.

    2013-01-01

    Intervention studies in school systems are sometimes aimed not at changing curriculum or classroom technique, but rather at changing the way that teachers, teaching coaches, and administrators in schools work with one another--in short, changing the professional social networks of educators. Current methods of social network analysis are…

  3. Social networks

    CERN Document Server

    Etaner-Uyar, A Sima

    2014-01-01

    The present volume provides a comprehensive resource for practitioners and researchers alike-both those new to the field as well as those who already have some experience. The work covers Social Network Analysis theory and methods with a focus on current applications and case studies applied in various domains such as mobile networks, security, machine learning and health. With the increasing popularity of Web 2.0, social media has become a widely used communication platform. Parallel to this development, Social Network Analysis gained in importance as a research field, while opening up many

  4. Ultrafast Hierarchical OTDM/WDM Network

    Directory of Open Access Journals (Sweden)

    Hideyuki Sotobayashi

    2003-12-01

    Full Text Available Ultrafast hierarchical OTDM/WDM network is proposed for the future core-network. We review its enabling technologies: C- and L-wavelength-band generation, OTDM-WDM mutual multiplexing format conversions, and ultrafast OTDM wavelengthband conversions.

  5. Noise enhances information transfer in hierarchical networks.

    Science.gov (United States)

    Czaplicka, Agnieszka; Holyst, Janusz A; Sloot, Peter M A

    2013-01-01

    We study the influence of noise on information transmission in the form of packages shipped between nodes of hierarchical networks. Numerical simulations are performed for artificial tree networks, scale-free Ravasz-Barabási networks as well for a real network formed by email addresses of former Enron employees. Two types of noise are considered. One is related to packet dynamics and is responsible for a random part of packets paths. The second one originates from random changes in initial network topology. We find that the information transfer can be enhanced by the noise. The system possesses optimal performance when both kinds of noise are tuned to specific values, this corresponds to the Stochastic Resonance phenomenon. There is a non-trivial synergy present for both noisy components. We found also that hierarchical networks built of nodes of various degrees are more efficient in information transfer than trees with a fixed branching factor.

  6. Biased trapping issue on weighted hierarchical networks

    Indian Academy of Sciences (India)

    Meifeng Dai; Jie Liu; Feng Zhu

    2014-10-01

    In this paper, we present trapping issues of weight-dependent walks on weighted hierarchical networks which are based on the classic scale-free hierarchical networks. Assuming that edge’s weight is used as local information by a random walker, we introduce a biased walk. The biased walk is that a walker, at each step, chooses one of its neighbours with a probability proportional to the weight of the edge. We focus on a particular case with the immobile trap positioned at the hub node which has the largest degree in the weighted hierarchical networks. Using a method based on generating functions, we determine explicitly the mean first-passage time (MFPT) for the trapping issue. Let parameter (0 < < 1) be the weight factor. We show that the efficiency of the trapping process depends on the parameter a; the smaller the value of a, the more efficient is the trapping process.

  7. Hierarchical Neural Network Structures for Phoneme Recognition

    CERN Document Server

    Vasquez, Daniel; Minker, Wolfgang

    2013-01-01

    In this book, hierarchical structures based on neural networks are investigated for automatic speech recognition. These structures are evaluated on the phoneme recognition task where a  Hybrid Hidden Markov Model/Artificial Neural Network paradigm is used. The baseline hierarchical scheme consists of two levels each which is based on a Multilayered Perceptron. Additionally, the output of the first level serves as a second level input. The computational speed of the phoneme recognizer can be substantially increased by removing redundant information still contained at the first level output. Several techniques based on temporal and phonetic criteria have been investigated to remove this redundant information. The computational time could be reduced by 57% whilst keeping the system accuracy comparable to the baseline hierarchical approach.

  8. Non-homogeneous fractal hierarchical weighted networks.

    Science.gov (United States)

    Dong, Yujuan; Dai, Meifeng; Ye, Dandan

    2015-01-01

    A model of fractal hierarchical structures that share the property of non-homogeneous weighted networks is introduced. These networks can be completely and analytically characterized in terms of the involved parameters, i.e., the size of the original graph Nk and the non-homogeneous weight scaling factors r1, r2, · · · rM. We also study the average weighted shortest path (AWSP), the average degree and the average node strength, taking place on the non-homogeneous hierarchical weighted networks. Moreover the AWSP is scrupulously calculated. We show that the AWSP depends on the number of copies and the sum of all non-homogeneous weight scaling factors in the infinite network order limit.

  9. The Hourglass Effect in Hierarchical Dependency Networks

    CERN Document Server

    Sabrin, Kaeser M

    2016-01-01

    Many hierarchically modular systems are structured in a way that resembles a bow-tie or hourglass. This "hourglass effect" means that the system generates many outputs from many inputs through a relatively small number of intermediate modules that are critical for the operation of the entire system (the waist of the hourglass). We investigate the hourglass effect in general (not necessarily layered) hierarchical dependency networks. Our analysis focuses on the number of source-to-target dependency paths that traverse each vertex, and it identifies the core of a dependency network as the smallest set of vertices that collectively cover almost all dependency paths. We then examine if a given network exhibits the hourglass property or not, comparing its core size with a "flat" (i.e., non-hierarchical) network that preserves the source dependencies of each target in the original network. As a possible explanation for the hourglass effect, we propose the Reuse Preference (RP) model that captures the bias of new mo...

  10. Synchronization patterns: from network motifs to hierarchical networks

    Science.gov (United States)

    Krishnagopal, Sanjukta; Lehnert, Judith; Poel, Winnie; Zakharova, Anna; Schöll, Eckehard

    2017-03-01

    We investigate complex synchronization patterns such as cluster synchronization and partial amplitude death in networks of coupled Stuart-Landau oscillators with fractal connectivities. The study of fractal or self-similar topology is motivated by the network of neurons in the brain. This fractal property is well represented in hierarchical networks, for which we present three different models. In addition, we introduce an analytical eigensolution method and provide a comprehensive picture of the interplay of network topology and the corresponding network dynamics, thus allowing us to predict the dynamics of arbitrarily large hierarchical networks simply by analysing small network motifs. We also show that oscillation death can be induced in these networks, even if the coupling is symmetric, contrary to previous understanding of oscillation death. Our results show that there is a direct correlation between topology and dynamics: hierarchical networks exhibit the corresponding hierarchical dynamics. This helps bridge the gap between mesoscale motifs and macroscopic networks. This article is part of the themed issue 'Horizons of cybernetical physics'.

  11. First-passage phenomena in hierarchical networks

    CERN Document Server

    Tavani, Flavia

    2016-01-01

    In this paper we study Markov processes and related first passage problems on a class of weighted, modular graphs which generalize the Dyson hierarchical model. In these networks, the coupling strength between two nodes depends on their distance and is modulated by a parameter $\\sigma$. We find that, in the thermodynamic limit, ergodicity is lost and the "distant" nodes can not be reached. Moreover, for finite-sized systems, there exists a threshold value for $\\sigma$ such that, when $\\sigma$ is relatively large, the inhomogeneity of the coupling pattern prevails and "distant" nodes are hardly reached. The same analysis is carried on also for generic hierarchical graphs, where interactions are meant to involve $p$-plets ($p>2$) of nodes, finding that ergodicity is still broken in the thermodynamic limit, but no threshold value for $\\sigma$ is evidenced, ultimately due to a slow growth of the network diameter with the size.

  12. HIDEN: Hierarchical decomposition of regulatory networks

    Directory of Open Access Journals (Sweden)

    Gülsoy Günhan

    2012-09-01

    Full Text Available Abstract Background Transcription factors regulate numerous cellular processes by controlling the rate of production of each gene. The regulatory relations are modeled using transcriptional regulatory networks. Recent studies have shown that such networks have an underlying hierarchical organization. We consider the problem of discovering the underlying hierarchy in transcriptional regulatory networks. Results We first transform this problem to a mixed integer programming problem. We then use existing tools to solve the resulting problem. For larger networks this strategy does not work due to rapid increase in running time and space usage. We use divide and conquer strategy for such networks. We use our method to analyze the transcriptional regulatory networks of E. coli, H. sapiens and S. cerevisiae. Conclusions Our experiments demonstrate that: (i Our method gives statistically better results than three existing state of the art methods; (ii Our method is robust against errors in the data and (iii Our method’s performance is not affected by the different topologies in the data.

  13. The hierarchical brain network for face recognition.

    Science.gov (United States)

    Zhen, Zonglei; Fang, Huizhen; Liu, Jia

    2013-01-01

    Numerous functional magnetic resonance imaging (fMRI) studies have identified multiple cortical regions that are involved in face processing in the human brain. However, few studies have characterized the face-processing network as a functioning whole. In this study, we used fMRI to identify face-selective regions in the entire brain and then explore the hierarchical structure of the face-processing network by analyzing functional connectivity among these regions. We identified twenty-five regions mainly in the occipital, temporal and frontal cortex that showed a reliable response selective to faces (versus objects) across participants and across scan sessions. Furthermore, these regions were clustered into three relatively independent sub-networks in a face-recognition task on the basis of the strength of functional connectivity among them. The functionality of the sub-networks likely corresponds to the recognition of individual identity, retrieval of semantic knowledge and representation of emotional information. Interestingly, when the task was switched to object recognition from face recognition, the functional connectivity between the inferior occipital gyrus and the rest of the face-selective regions were significantly reduced, suggesting that this region may serve as an entry node in the face-processing network. In sum, our study provides empirical evidence for cognitive and neural models of face recognition and helps elucidate the neural mechanisms underlying face recognition at the network level.

  14. Hierarchical mutual information for the comparison of hierarchical community structures in complex networks

    CERN Document Server

    Perotti, Juan Ignacio; Caldarelli, Guido

    2015-01-01

    The quest for a quantitative characterization of community and modular structure of complex networks produced a variety of methods and algorithms to classify different networks. However, it is not clear if such methods provide consistent, robust and meaningful results when considering hierarchies as a whole. Part of the problem is the lack of a similarity measure for the comparison of hierarchical community structures. In this work we give a contribution by introducing the {\\it hierarchical mutual information}, which is a generalization of the traditional mutual information, and allows to compare hierarchical partitions and hierarchical community structures. The {\\it normalized} version of the hierarchical mutual information should behave analogously to the traditional normalized mutual information. Here, the correct behavior of the hierarchical mutual information is corroborated on an extensive battery of numerical experiments. The experiments are performed on artificial hierarchies, and on the hierarchical ...

  15. Antiferromagnetic Ising Model in Hierarchical Networks

    Science.gov (United States)

    Cheng, Xiang; Boettcher, Stefan

    2015-03-01

    The Ising antiferromagnet is a convenient model of glassy dynamics. It can introduce geometric frustrations and may give rise to a spin glass phase and glassy relaxation at low temperatures [ 1 ] . We apply the antiferromagnetic Ising model to 3 hierarchical networks which share features of both small world networks and regular lattices. Their recursive and fixed structures make them suitable for exact renormalization group analysis as well as numerical simulations. We first explore the dynamical behaviors using simulated annealing and discover an extremely slow relaxation at low temperatures. Then we employ the Wang-Landau algorithm to investigate the energy landscape and the corresponding equilibrium behaviors for different system sizes. Besides the Monte Carlo methods, renormalization group [ 2 ] is used to study the equilibrium properties in the thermodynamic limit and to compare with the results from simulated annealing and Wang-Landau sampling. Supported through NSF Grant DMR-1207431.

  16. Complex networks with scale-free nature and hierarchical modularity

    Science.gov (United States)

    Shekatkar, Snehal M.; Ambika, G.

    2015-09-01

    Generative mechanisms which lead to empirically observed structure of networked systems from diverse fields like biology, technology and social sciences form a very important part of study of complex networks. The structure of many networked systems like biological cell, human society and World Wide Web markedly deviate from that of completely random networks indicating the presence of underlying processes. Often the main process involved in their evolution is the addition of links between existing nodes having a common neighbor. In this context we introduce an important property of the nodes, which we call mediating capacity, that is generic to many networks. This capacity decreases rapidly with increase in degree, making hubs weak mediators of the process. We show that this property of nodes provides an explanation for the simultaneous occurrence of the observed scale-free structure and hierarchical modularity in many networked systems. This also explains the high clustering and small-path length seen in real networks as well as non-zero degree-correlations. Our study also provides insight into the local process which ultimately leads to emergence of preferential attachment and hence is also important in understanding robustness and control of real networks as well as processes happening on real networks.

  17. Local Social Networks

    DEFF Research Database (Denmark)

    Sapuppo, Antonio; Sørensen, Lene Tolstrup

    2011-01-01

    Online social networks have become essential for many users in their daily communication. Through a combination of the online social networks with opportunistic networks, a new concept arises: Local Social Networks. The target of local social networks is to promote social networking benefits...... in physical environment in order to leverage personal affinities in the users' surroundings. The purpose of this paper is to present and discuss the concept of local social networks as a new social communication system. Particularly, the preliminary architecture and the prototype of local social networks...

  18. Spectral characterization of hierarchical network modularity and limits of modularity detection.

    Directory of Open Access Journals (Sweden)

    Somwrita Sarkar

    Full Text Available Many real world networks are reported to have hierarchically modular organization. However, there exists no algorithm-independent metric to characterize hierarchical modularity in a complex system. The main results of the paper are a set of methods to address this problem. First, classical results from random matrix theory are used to derive the spectrum of a typical stochastic block model hierarchical modular network form. Second, it is shown that hierarchical modularity can be fingerprinted using the spectrum of its largest eigenvalues and gaps between clusters of closely spaced eigenvalues that are well separated from the bulk distribution of eigenvalues around the origin. Third, some well-known results on fingerprinting non-hierarchical modularity in networks automatically follow as special cases, threreby unifying these previously fragmented results. Finally, using these spectral results, it is found that the limits of detection of modularity can be empirically established by studying the mean values of the largest eigenvalues and the limits of the bulk distribution of eigenvalues for an ensemble of networks. It is shown that even when modularity and hierarchical modularity are present in a weak form in the network, they are impossible to detect, because some of the leading eigenvalues fall within the bulk distribution. This provides a threshold for the detection of modularity. Eigenvalue distributions of some technological, social, and biological networks are studied, and the implications of detecting hierarchical modularity in real world networks are discussed.

  19. Field experiment on a robust hierarchical metropolitan quantum cryptography network

    Institute of Scientific and Technical Information of China (English)

    XU FangXing; CHEN Wei; WANG Shuang; YIN ZhenQiang; ZHANG Yang; LIU Yun; ZHOU Zheng; ZHAO YiBo; LI HongWei; LIU Dong; HAN ZhengFu; GUO GuangCan

    2009-01-01

    these bureaus.The whole implementation including the hierarchical quantum cryptographic communication network links and the corresponding application software shows a big step toward the practical user-oriented network with a high security level.

  20. A Hierarchical Sensor Network Based on Voronoi Diagram

    Institute of Scientific and Technical Information of China (English)

    SHANG Rui-qiang; ZHAO Jian-li; SUN Qiu-xia; WANG Guang-xing

    2006-01-01

    A hierarchical sensor network is proposed which places the sensing and routing capacity at different layer nodes.It thus simplifies the hardware design and reduces cost. Adopting Voronoi diagram in the partition of backbone network,a mathematical model of data aggregation based on hierarchical architecture is given. Simulation shows that the number of transmission data packages is sharply cut down in the network, thus reducing the needs in the bandwidth and energy resources and is thus well adapted to sensor networks.

  1. Automatic Construction of Hierarchical Road Networks

    Science.gov (United States)

    Yang, Weiping

    2016-06-01

    This paper describes an automated method of constructing a hierarchical road network given a single dataset, without the presence of thematic attributes. The method is based on a pattern graph which maintains nodes and paths as junctions and through-traffic roads. The hierarchy is formed incrementally in a top-down fashion for highways, ramps, and major roads directly connected to ramps; and bottom-up for the rest of major and minor roads. Through reasoning and analysis, ramps are identified as unique characteristics for recognizing and assembling high speed roads. The method makes distinctions on the types of ramps by articulating their connection patterns with highways. Major and minor roads will be identified by both quantitative and qualitative analysis of spatial properties and by discovering neighbourhood patterns revealed in the data. The result of the method would enrich data description and support comprehensive queries on sorted exit or entry points on highways and their related roads. The enrichment on road network data is important to a high successful rate of feature matching for road networks and to geospatial data integration.

  2. Multilevel compression of random walks on networks reveals hierarchical organization in large integrated systems

    CERN Document Server

    Rosvall, M

    2010-01-01

    To comprehend the hierarchical organization of large integrated systems, we introduce the hierarchical map equation that reveals multilevel structures in networks. In this information-theoretic approach, we exploit the duality between compression and pattern detection; by compressing a description of a random walker as a proxy for real flow on a network, we find regularities in the network that induce this system-wide flow. Finding the shortest multilevel description of the random walker therefore gives us the best hierarchical clustering of the network, the optimal number of levels and modular partition at each level, with respect to the dynamics on the network. With a novel search algorithm, we extract and illustrate the rich multilevel organization of several large social and biological networks. For example, from the global air traffic network we uncover countries and continents, and from the pattern of scientific communication we reveal more than 100 scientific fields organized in four major disciplines:...

  3. Hierarchical sequencing of online social graphs

    CERN Document Server

    Andjelković, Miroslav; Maletić, Slobodan; Rajković, Milan

    2014-01-01

    In online communications, patterns of conduct of individual actors and use of emotions in the process can lead to a complex social graph exhibiting multilayered structure and mesoscopic communities. Using simplicial complexes representation of graphs, we investigate in-depth topology of online social network which is based on MySpace dialogs. The network exhibits original community structure. In addition, we simulate emotion spreading in this network that enables to identify two emotion-propagating layers. The analysis resulting in three structure vectors quantifies the graph's architecture at different topology levels. Notably, structures emerging through shared links, triangles and tetrahedral faces, frequently occur and range from tree-like to maximal 5-cliques and their respective complexes. On the other hand, the structures which spread only negative or only positive emotion messages appear to have much simpler topology consisting of links and triangles. Furthermore, we introduce the node's structure vec...

  4. Genomic analysis of the hierarchical structure of regulatory networks

    Science.gov (United States)

    Yu, Haiyuan; Gerstein, Mark

    2006-01-01

    A fundamental question in biology is how the cell uses transcription factors (TFs) to coordinate the expression of thousands of genes in response to various stimuli. The relationships between TFs and their target genes can be modeled in terms of directed regulatory networks. These relationships, in turn, can be readily compared with commonplace “chain-of-command” structures in social networks, which have characteristic hierarchical layouts. Here, we develop algorithms for identifying generalized hierarchies (allowing for various loop structures) and use these approaches to illuminate extensive pyramid-shaped hierarchical structures existing in the regulatory networks of representative prokaryotes (Escherichia coli) and eukaryotes (Saccharomyces cerevisiae), with most TFs at the bottom levels and only a few master TFs on top. These masters are situated near the center of the protein–protein interaction network, a different type of network from the regulatory one, and they receive most of the input for the whole regulatory hierarchy through protein interactions. Moreover, they have maximal influence over other genes, in terms of affecting expression-level changes. Surprisingly, however, TFs at the bottom of the regulatory hierarchy are more essential to the viability of the cell. Finally, one might think master TFs achieve their wide influence through directly regulating many targets, but TFs with most direct targets are in the middle of the hierarchy. We find, in fact, that these midlevel TFs are “control bottlenecks” in the hierarchy, and this great degree of control for “middle managers” has parallels in efficient social structures in various corporate and governmental settings. PMID:17003135

  5. GSMNet: A Hierarchical Graph Model for Moving Objects in Networks

    Directory of Open Access Journals (Sweden)

    Hengcai Zhang

    2017-03-01

    Full Text Available Existing data models for moving objects in networks are often limited by flexibly controlling the granularity of representing networks and the cost of location updates and do not encompass semantic information, such as traffic states, traffic restrictions and social relationships. In this paper, we aim to fill the gap of traditional network-constrained models and propose a hierarchical graph model called the Geo-Social-Moving model for moving objects in Networks (GSMNet that adopts four graph structures, RouteGraph, SegmentGraph, ObjectGraph and MoveGraph, to represent the underlying networks, trajectories and semantic information in an integrated manner. The bulk of user-defined data types and corresponding operators is proposed to handle moving objects and answer a new class of queries supporting three kinds of conditions: spatial, temporal and semantic information. Then, we develop a prototype system with the native graph database system Neo4Jto implement the proposed GSMNet model. In the experiment, we conduct the performance evaluation using simulated trajectories generated from the BerlinMOD (Berlin Moving Objects Database benchmark and compare with the mature MOD system Secondo. The results of 17 benchmark queries demonstrate that our proposed GSMNet model has strong potential to reduce time-consuming table join operations an d shows remarkable advantages with regard to representing semantic information and controlling the cost of location updates.

  6. Hierarchical sequencing of online social graphs

    Science.gov (United States)

    Andjelković, Miroslav; Tadić, Bosiljka; Maletić, Slobodan; Rajković, Milan

    2015-10-01

    In online communications, patterns of conduct of individual actors and use of emotions in the process can lead to a complex social graph exhibiting multilayered structure and mesoscopic communities. Using simplicial complexes representation of graphs, we investigate in-depth topology of the online social network constructed from MySpace dialogs which exhibits original community structure. A simulation of emotion spreading in this network leads to the identification of two emotion-propagating layers. Three topological measures are introduced, referred to as the structure vectors, which quantify graph's architecture at different dimension levels. Notably, structures emerging through shared links, triangles and tetrahedral faces, frequently occur and range from tree-like to maximal 5-cliques and their respective complexes. On the other hand, the structures which spread only negative or only positive emotion messages appear to have much simpler topology consisting of links and triangles. The node's structure vector represents the number of simplices at each topology level in which the node resides and the total number of such simplices determines what we define as the node's topological dimension. The presented results suggest that the node's topological dimension provides a suitable measure of the social capital which measures the actor's ability to act as a broker in compact communities, the so called Simmelian brokerage. We also generalize the results to a wider class of computer-generated networks. Investigating components of the node's vector over network layers reveals that same nodes develop different socio-emotional relations and that the influential nodes build social capital by combining their connections in different layers.

  7. Big Data Processing in Complex Hierarchical Network Systems

    CERN Document Server

    Polishchuk, Olexandr; Tyutyunnyk, Maria; Yadzhak, Mykhailo

    2016-01-01

    This article covers the problem of processing of Big Data that describe process of complex networks and network systems operation. It also introduces the notion of hierarchical network systems combination into associations and conglomerates alongside with complex networks combination into multiplexes. The analysis is provided for methods of global network structures study depending on the purpose of the research. Also the main types of information flows in complex hierarchical network systems being the basic components of associations and conglomerates are covered. Approaches are proposed for creation of efficient computing environments, distributed computations organization and information processing methods parallelization at different levels of system hierarchy.

  8. An Unsupervised Model for Exploring Hierarchical Semantics from Social Annotations

    Science.gov (United States)

    Zhou, Mianwei; Bao, Shenghua; Wu, Xian; Yu, Yong

    This paper deals with the problem of exploring hierarchical semantics from social annotations. Recently, social annotation services have become more and more popular in Semantic Web. It allows users to arbitrarily annotate web resources, thus, largely lowers the barrier to cooperation. Furthermore, through providing abundant meta-data resources, social annotation might become a key to the development of Semantic Web. However, on the other hand, social annotation has its own apparent limitations, for instance, 1) ambiguity and synonym phenomena and 2) lack of hierarchical information. In this paper, we propose an unsupervised model to automatically derive hierarchical semantics from social annotations. Using a social bookmark service Del.icio.us as example, we demonstrate that the derived hierarchical semantics has the ability to compensate those shortcomings. We further apply our model on another data set from Flickr to testify our model's applicability on different environments. The experimental results demonstrate our model's efficiency.

  9. Multilevel compression of random walks on networks reveals hierarchical organization in large integrated systems.

    Directory of Open Access Journals (Sweden)

    Martin Rosvall

    Full Text Available To comprehend the hierarchical organization of large integrated systems, we introduce the hierarchical map equation, which reveals multilevel structures in networks. In this information-theoretic approach, we exploit the duality between compression and pattern detection; by compressing a description of a random walker as a proxy for real flow on a network, we find regularities in the network that induce this system-wide flow. Finding the shortest multilevel description of the random walker therefore gives us the best hierarchical clustering of the network--the optimal number of levels and modular partition at each level--with respect to the dynamics on the network. With a novel search algorithm, we extract and illustrate the rich multilevel organization of several large social and biological networks. For example, from the global air traffic network we uncover countries and continents, and from the pattern of scientific communication we reveal more than 100 scientific fields organized in four major disciplines: life sciences, physical sciences, ecology and earth sciences, and social sciences. In general, we find shallow hierarchical structures in globally interconnected systems, such as neural networks, and rich multilevel organizations in systems with highly separated regions, such as road networks.

  10. Object recognition with hierarchical discriminant saliency networks

    Directory of Open Access Journals (Sweden)

    Sunhyoung eHan

    2014-09-01

    Full Text Available The benefits of integrating attention and object recognition are investigated. While attention is frequently modeled as pre-processor for recognition, we investigate the hypothesis that attention is an intrinsic component of recognition and vice-versa. This hypothesis is tested with a recognitionmodel, the hierarchical discriminant saliency network (HDSN, whose layers are top-down saliency detectors, tuned for a visual class according to the principles of discriminant saliency. The HDSN has two possible implementations. In a biologically plausible implementation, all layers comply with the standard neurophysiological model of visual cortex, with sub-layers of simple and complex units that implement a combination of filtering, divisive normalization, pooling, and non-linearities. In a neuralnetwork implementation, all layers are convolutional and implement acombination of filtering, rectification, and pooling. The rectificationis performed with a parametric extension of the now popular rectified linearunits (ReLUs, whose parameters can be tuned for the detection of targetobject classes. This enables a number of functional enhancementsover neural network models that lack a connection to saliency, including optimal feature denoising mechanisms for recognition, modulation ofsaliency responses by the discriminant power of the underlying features,and the ability to detect both feature presence and absence.In either implementation, each layer has a precise statistical interpretation, and all parameters are tuned by statistical learning. Each saliency detection layer learns more discriminant saliency templates than its predecessors and higher layers have larger pooling fields. This enables the HDSN to simultaneously achieve high selectivity totarget object classes and invariance. The resulting performance demonstrates benefits for all the functional enhancements of the HDSN.

  11. Object recognition with hierarchical discriminant saliency networks.

    Science.gov (United States)

    Han, Sunhyoung; Vasconcelos, Nuno

    2014-01-01

    The benefits of integrating attention and object recognition are investigated. While attention is frequently modeled as a pre-processor for recognition, we investigate the hypothesis that attention is an intrinsic component of recognition and vice-versa. This hypothesis is tested with a recognition model, the hierarchical discriminant saliency network (HDSN), whose layers are top-down saliency detectors, tuned for a visual class according to the principles of discriminant saliency. As a model of neural computation, the HDSN has two possible implementations. In a biologically plausible implementation, all layers comply with the standard neurophysiological model of visual cortex, with sub-layers of simple and complex units that implement a combination of filtering, divisive normalization, pooling, and non-linearities. In a convolutional neural network implementation, all layers are convolutional and implement a combination of filtering, rectification, and pooling. The rectification is performed with a parametric extension of the now popular rectified linear units (ReLUs), whose parameters can be tuned for the detection of target object classes. This enables a number of functional enhancements over neural network models that lack a connection to saliency, including optimal feature denoising mechanisms for recognition, modulation of saliency responses by the discriminant power of the underlying features, and the ability to detect both feature presence and absence. In either implementation, each layer has a precise statistical interpretation, and all parameters are tuned by statistical learning. Each saliency detection layer learns more discriminant saliency templates than its predecessors and higher layers have larger pooling fields. This enables the HDSN to simultaneously achieve high selectivity to target object classes and invariance. The performance of the network in saliency and object recognition tasks is compared to those of models from the biological and

  12. Phase transition from egalitarian to hierarchical societies driven by competition between cognitive and social constraints

    CERN Document Server

    Caticha, Nestor; Vicente, Renato

    2016-01-01

    Empirical evidence suggests that social structure may have changed from hierarchical to egalitarian and back along the evolutionary line of humans. We model a society subject to competing cognitive and social navigation constraints. The theory predicts that the degree of hierarchy decreases with encephalization and increases with group size. Hence hominin groups may have been driven from a phase with hierarchical order to a phase with egalitarian structures by the encephalization during the last two million years, and back to hierarchical due to fast demographical changes during the Neolithic. The dynamics in the perceived social network shows evidence in the egalitarian phase of the observed phenomenon of Reverse Dominance. The theory also predicts for modern hunter-gatherers in mild climates a trend towards an intermediate hierarchy degree and a phase transition for harder ecological conditions. In harsher climates societies would tend to bemore egalitarian if organized in small groups but more hierarchical...

  13. Social network data analytics

    CERN Document Server

    Aggarwal, Charu C

    2011-01-01

    Social network analysis applications have experienced tremendous advances within the last few years due in part to increasing trends towards users interacting with each other on the internet. Social networks are organized as graphs, and the data on social networks takes on the form of massive streams, which are mined for a variety of purposes. Social Network Data Analytics covers an important niche in the social network analytics field. This edited volume, contributed by prominent researchers in this field, presents a wide selection of topics on social network data mining such as Structural Pr

  14. Road network safety evaluation using Bayesian hierarchical joint model.

    Science.gov (United States)

    Wang, Jie; Huang, Helai

    2016-05-01

    Safety and efficiency are commonly regarded as two significant performance indicators of transportation systems. In practice, road network planning has focused on road capacity and transport efficiency whereas the safety level of a road network has received little attention in the planning stage. This study develops a Bayesian hierarchical joint model for road network safety evaluation to help planners take traffic safety into account when planning a road network. The proposed model establishes relationships between road network risk and micro-level variables related to road entities and traffic volume, as well as socioeconomic, trip generation and network density variables at macro level which are generally used for long term transportation plans. In addition, network spatial correlation between intersections and their connected road segments is also considered in the model. A road network is elaborately selected in order to compare the proposed hierarchical joint model with a previous joint model and a negative binomial model. According to the results of the model comparison, the hierarchical joint model outperforms the joint model and negative binomial model in terms of the goodness-of-fit and predictive performance, which indicates the reasonableness of considering the hierarchical data structure in crash prediction and analysis. Moreover, both random effects at the TAZ level and the spatial correlation between intersections and their adjacent segments are found to be significant, supporting the employment of the hierarchical joint model as an alternative in road-network-level safety modeling as well.

  15. Road Network Selection Based on Road Hierarchical Structure Control

    Directory of Open Access Journals (Sweden)

    HE Haiwei

    2015-04-01

    Full Text Available A new road network selection method based on hierarchical structure is studied. Firstly, road network is built as strokes which are then classified into hierarchical collections according to the criteria of betweenness centrality value (BC value. Secondly, the hierarchical structure of the strokes is enhanced using structural characteristic identification technique. Thirdly, the importance calculation model was established according to the relationships among the hierarchical structure of the strokes. Finally, the importance values of strokes are got supported with the model's hierarchical calculation, and with which the road network is selected. Tests are done to verify the advantage of this method by comparing it with other common stroke-oriented methods using three kinds of typical road network data. Comparision of the results show that this method had few need to semantic data, and could eliminate the negative influence of edge strokes caused by the criteria of BC value well. So, it is better to maintain the global hierarchical structure of road network, and suitable to meet with the selection of various kinds of road network at the same time.

  16. Wayfinding in Social Networks

    Science.gov (United States)

    Liben-Nowell, David

    With the recent explosion of popularity of commercial social-networking sites like Facebook and MySpace, the size of social networks that can be studied scientifically has passed from the scale traditionally studied by sociologists and anthropologists to the scale of networks more typically studied by computer scientists. In this chapter, I will highlight a recent line of computational research into the modeling and analysis of the small-world phenomenon - the observation that typical pairs of people in a social network are connected by very short chains of intermediate friends - and the ability of members of a large social network to collectively find efficient routes to reach individuals in the network. I will survey several recent mathematical models of social networks that account for these phenomena, with an emphasis on both the provable properties of these social-network models and the empirical validation of the models against real large-scale social-network data.

  17. Multilayer Social Networks

    DEFF Research Database (Denmark)

    Dickison, Mark; Magnani, Matteo; Rossi, Luca

    social network systems, the evolution of interconnected social networks, and dynamic processes such as information spreading. A single real dataset is used to illustrate the concepts presented throughout the book, demonstrating both the practical utility and the potential shortcomings of the various......Multilayer networks, in particular multilayer social networks, where users belong to and interact on different networks at the same time, are an active research area in social network analysis, computer science, and physics. These networks have traditionally been studied within these separate...

  18. Inferring a district-based hierarchical structure of social contacts from census data.

    Directory of Open Access Journals (Sweden)

    Z Yu

    Full Text Available Researchers have recently paid attention to social contact patterns among individuals due to their useful applications in such areas as epidemic evaluation and control, public health decisions, chronic disease research and social network research. Although some studies have estimated social contact patterns from social networks and surveys, few have considered how to infer the hierarchical structure of social contacts directly from census data. In this paper, we focus on inferring an individual's social contact patterns from detailed census data, and generate various types of social contact patterns such as hierarchical-district-structure-based, cross-district and age-district-based patterns. We evaluate newly generated contact patterns derived from detailed 2011 Hong Kong census data by incorporating them into a model and simulation of the 2009 Hong Kong H1N1 epidemic. We then compare the newly generated social contact patterns with the mixing patterns that are often used in the literature, and draw the following conclusions. First, the generation of social contact patterns based on a hierarchical district structure allows for simulations at different district levels. Second, the newly generated social contact patterns reflect individuals social contacts. Third, the newly generated social contact patterns improve the accuracy of the SEIR-based epidemic model.

  19. Neural Mechanisms of Hierarchical Planning in a Virtual Subway Network.

    Science.gov (United States)

    Balaguer, Jan; Spiers, Hugo; Hassabis, Demis; Summerfield, Christopher

    2016-05-18

    Planning allows actions to be structured in pursuit of a future goal. However, in natural environments, planning over multiple possible future states incurs prohibitive computational costs. To represent plans efficiently, states can be clustered hierarchically into "contexts". For example, representing a journey through a subway network as a succession of individual states (stations) is more costly than encoding a sequence of contexts (lines) and context switches (line changes). Here, using functional brain imaging, we asked humans to perform a planning task in a virtual subway network. Behavioral analyses revealed that humans executed a hierarchically organized plan. Brain activity in the dorsomedial prefrontal cortex and premotor cortex scaled with the cost of hierarchical plan representation and unique neural signals in these regions signaled contexts and context switches. These results suggest that humans represent hierarchical plans using a network of caudal prefrontal structures. VIDEO ABSTRACT.

  20. Digital Social Network Mining for Topic Discovery

    Science.gov (United States)

    Moradianzadeh, Pooya; Mohi, Maryam; Sadighi Moshkenani, Mohsen

    Networked computers are expanding more and more around the world, and digital social networks becoming of great importance for many people's work and leisure. This paper mainly focused on discovering the topic of exchanging information in digital social network. In brief, our method is to use a hierarchical dictionary of related topics and words that mapped to a graph. Then, with comparing the extracted keywords from the context of social network with graph nodes, probability of relation between context and desired topics will be computed. This model can be used in many applications such as advertising, viral marketing and high-risk group detection.

  1. Professional social networking.

    Science.gov (United States)

    Rowley, Robert D

    2014-12-01

    We review the current state of social communication between healthcare professionals, the role of consumer social networking, and some emerging technologies to address the gaps. In particular, the review covers (1) the current state of loose social networking for continuing medical education (CME) and other broadcast information dissemination; (2) social networking for business promotion; (3) social networking for peer collaboration, including simple communication as well as more robust data-centered collaboration around patient care; and (4) engaging patients on social platforms, including integrating consumer-originated data into the mix of healthcare data. We will see how, as the nature of healthcare delivery moves from the institution-centric way of tradition to a more social and networked ambulatory pattern that we see emerging today, the nature of health IT has also moved from enterprise-centric systems to more socially networked, cloud-based options.

  2. Field Experiment on a Robust Hierarchical Metropolitan Quantum Cryptography Network

    CERN Document Server

    Xu, Fangxing; Wang, Shuang; Yin, Zhenqiang; Zhang, Yang; Liu, Yun; Zhou, Zheng; Zhao, Yibo; Li, Hongwei; Liu, Dong; Han, Zhengfu; Guo, Guangcan

    2009-01-01

    A hierarchical metropolitan quantum cryptography network upon the inner-city commercial telecom fiber cables is reported in this paper. The seven-user network contains a four-node backbone net with one node acting as the subnet gateway, a two-user subnet and a single-fiber access link, which is realized by the Faraday-Michelson Interferometer set-ups. The techniques of the quantum router, optical switch and trusted relay are assembled here to guarantee the feasibility and expandability of the quantum cryptography network. Five nodes of the network are located in the government departments and the secure keys generated by the quantum key distribution network are utilized to encrypt the instant video, sound, text messages and confidential files transmitting between these bureaus. The whole implementation including the hierarchical quantum cryptographic communication network links and corresponding application software shows a big step toward the practical user-oriented network with high security level.

  3. Complex Evaluation of Hierarchically-Network Systems

    CERN Document Server

    Polishchuk, Dmytro; Yadzhak, Mykhailo

    2016-01-01

    Methods of complex evaluation based on local, forecasting, aggregated, and interactive evaluation of the state, function quality, and interaction of complex system's objects on the all hierarchical levels is proposed. Examples of analysis of the structural elements of railway transport system are used for illustration of efficiency of proposed approach.

  4. Next Generation Social Networks

    DEFF Research Database (Denmark)

    Sørensen, Lene Tolstrup; Skouby, Knud Erik

    2008-01-01

    When it comes to discussing the future of electronic communication, social networking is the buzzword. The Internet has become a platform where new social networks emerge and the Internet it itself support the more traditional computer supported communication. The way users build and verifies...... different online networks for communities of people who share interests or individuals who presents themselves through user produced content is what makes up the social networking of today. The purpose of this paper is to discuss perceived user requirements to the next generation social networks. The paper...

  5. Modelling hierarchical and modular complex networks: division and independence

    Science.gov (United States)

    Kim, D.-H.; Rodgers, G. J.; Kahng, B.; Kim, D.

    2005-06-01

    We introduce a growing network model which generates both modular and hierarchical structure in a self-organized way. To this end, we modify the Barabási-Albert model into the one evolving under the principles of division and independence as well as growth and preferential attachment (PA). A newly added vertex chooses one of the modules composed of existing vertices, and attaches edges to vertices belonging to that module following the PA rule. When the module size reaches a proper size, the module is divided into two, and a new module is created. The karate club network studied by Zachary is a simple version of the current model. We find that the model can reproduce both modular and hierarchical properties, characterized by the hierarchical clustering function of a vertex with degree k, C(k), being in good agreement with empirical measurements for real-world networks.

  6. Hierarchical Overlapping Clustering of Network Data Using Cut Metrics

    CERN Document Server

    Gama, Fernando; Ribeiro, Alejandro

    2016-01-01

    A novel method to obtain hierarchical and overlapping clusters from network data -i.e., a set of nodes endowed with pairwise dissimilarities- is presented. The introduced method is hierarchical in the sense that it outputs a nested collection of groupings of the node set depending on the resolution or degree of similarity desired, and it is overlapping since it allows nodes to belong to more than one group. Our construction is rooted on the facts that a hierarchical (non-overlapping) clustering of a network can be equivalently represented by a finite ultrametric space and that a convex combination of ultrametrics results in a cut metric. By applying a hierarchical (non-overlapping) clustering method to multiple dithered versions of a given network and then convexly combining the resulting ultrametrics, we obtain a cut metric associated to the network of interest. We then show how to extract a hierarchical overlapping clustering structure from the aforementioned cut metric. Furthermore, the so-called overlappi...

  7. Social cognitive radio networks

    CERN Document Server

    Chen, Xu

    2015-01-01

    This brief presents research results on social cognitive radio networks, a transformational and innovative networking paradigm that promotes the nexus between social interactions and cognitive radio networks. Along with a review of the research literature, the text examines the key motivation and challenges of social cognitive radio network design. Three socially inspired distributed spectrum sharing mechanisms are introduced: adaptive channel recommendation mechanism, imitation-based social spectrum sharing mechanism, and evolutionarily stable spectrum access mechanism. The brief concludes with a discussion of future research directions which ascertains that exploiting social interactions for distributed spectrum sharing will advance the state-of-the-art of cognitive radio network design, spur a new line of thinking for future wireless networks, and enable novel wireless service and applications.

  8. Social network analysis

    OpenAIRE

    Mathias, Carlos Leonardo Kelmer

    2014-01-01

    In general, the paper develops a historiographical debate about the methodology of social network analysis. More than responding questions using such methodology, this article tries to introduce the historian to the founder bibliography of social network analysis. Since the publication of the famous article by John Barnes in 1954, sociologists linked to sociometric studies have usually employed the social network analysis in their studies. On the other hand, this methodology is not widespread...

  9. Marketing on social networks

    OpenAIRE

    Kadečková, Anna

    2016-01-01

    The bachelor´s thesis is focused on marketing communications on social networks in recruitment agency OPENN. The work is composed of three parts: literature review, own work and draft recommendations. The first part describes the basic concepts of marketing, marketing mix and communication mix, whose tools are used to successful marketing on social networks. Among other things, thesis informs on major social networks, including Facebook, Twitter, LinkedIn, Google+, YouTube and Instagram. It f...

  10. Detect overlapping and hierarchical community structure in networks

    CERN Document Server

    Shen, Huawei; Cai, Kai; Hu, Mao-Bin

    2008-01-01

    Clustering and community structure is crucial for many network systems and the related dynamic processes. It has been shown that communities are usually overlapping and hierarchical. However, previous methods investigate these two properties of community structure separately. This paper propose an algorithm (EAGLE) to detect both the overlapping and hierarchical properties of complex community structure together. This algorithm deals with the set of maximal cliques and adopts an agglomerative framework. The quality function of modularity is extended to evaluate the goodness of a cover. The examples of application to real world networks give excellent results.

  11. Hierarchical Routing over Dynamic Wireless Networks

    CERN Document Server

    Tschopp, Dominique; Grossglauser, Matthias

    2009-01-01

    Wireless network topologies change over time and maintaining routes requires frequent updates. Updates are costly in terms of consuming throughput available for data transmission, which is precious in wireless networks. In this paper, we ask whether there exist low-overhead schemes that produce low-stretch routes. This is studied by using the underlying geometric properties of the connectivity graph in wireless networks.

  12. Tiresias: Online Anomaly Detection for Hierarchical Operational Network Data

    CERN Document Server

    Hong, Chi-Yao; Duffield, Nick; Wang, Jia

    2012-01-01

    Operational network data, management data such as customer care call logs and equipment system logs, is a very important source of information for network operators to detect problems in their networks. Unfortunately, there is lack of efficient tools to automatically track and detect anomalous events on operational data, causing ISP operators to rely on manual inspection of this data. While anomaly detection has been widely studied in the context of network data, operational data presents several new challenges, including the volatility and sparseness of data, and the need to perform fast detection (complicating application of schemes that require offline processing or large/stable data sets to converge). To address these challenges, we propose Tiresias, an automated approach to locating anomalous events on hierarchical operational data. Tiresias leverages the hierarchical structure of operational data to identify high-impact aggregates (e.g., locations in the network, failure modes) likely to be associated w...

  13. Hierarchicality of trade flow networks reveals complexity of products.

    Science.gov (United States)

    Shi, Peiteng; Zhang, Jiang; Yang, Bo; Luo, Jingfei

    2014-01-01

    With globalization, countries are more connected than before by trading flows, which amounts to at least 36 trillion dollars today. Interestingly, around 30-60 percents of exports consist of intermediate products in global. Therefore, the trade flow network of particular product with high added values can be regarded as value chains. The problem is weather we can discriminate between these products from their unique flow network structure? This paper applies the flow analysis method developed in ecology to 638 trading flow networks of different products. We claim that the allometric scaling exponent η can be used to characterize the degree of hierarchicality of a flow network, i.e., whether the trading products flow on long hierarchical chains. Then, it is pointed out that the flow networks of products with higher added values and complexity like machinary, transport equipment etc. have larger exponents, meaning that their trade flow networks are more hierarchical. As a result, without the extra data like global input-output table, we can identify the product categories with higher complexity, and the relative importance of a country in the global value chain by the trading network solely.

  14. Hierarchicality of trade flow networks reveals complexity of products.

    Directory of Open Access Journals (Sweden)

    Peiteng Shi

    Full Text Available With globalization, countries are more connected than before by trading flows, which amounts to at least 36 trillion dollars today. Interestingly, around 30-60 percents of exports consist of intermediate products in global. Therefore, the trade flow network of particular product with high added values can be regarded as value chains. The problem is weather we can discriminate between these products from their unique flow network structure? This paper applies the flow analysis method developed in ecology to 638 trading flow networks of different products. We claim that the allometric scaling exponent η can be used to characterize the degree of hierarchicality of a flow network, i.e., whether the trading products flow on long hierarchical chains. Then, it is pointed out that the flow networks of products with higher added values and complexity like machinary, transport equipment etc. have larger exponents, meaning that their trade flow networks are more hierarchical. As a result, without the extra data like global input-output table, we can identify the product categories with higher complexity, and the relative importance of a country in the global value chain by the trading network solely.

  15. Hierarchical document categorization using associative networks

    NARCIS (Netherlands)

    Bloom, Niels; Theune, Mariet; de Jong, Franciska M.G.; Klement, E.P.; Borutzky, W.; Fahringer, T.; Hamza, M.H.; Uskov, V.

    Associative networks are a connectionist language model with the ability to handle dynamic data. We used two associative networks to categorize random sets of related Wikipedia articles with only their raw text as input. We then compared the resulting categorization to a gold standard: the manual

  16. Changes of hierarchical network in local and world stock market

    Science.gov (United States)

    Patwary, Enayet Ullah; Lee, Jong Youl; Nobi, Ashadun; Kim, Doo Hwan; Lee, Jae Woo

    2017-10-01

    We consider the cross-correlation coefficients of the daily returns in the local and global stock markets. We generate the minimal spanning tree (MST) using the correlation matrix. We observe that the MSTs change their structure from chain-like networks to star-like networks during periods of market uncertainty. We quantify the measure of the hierarchical network utilizing the value of the hierarchy measured by the hierarchical path. The hierarchy and betweenness centrality characterize the state of the market regarding the impact of crises. During crises, the non-financial company is established as the central node of the MST. However, before the crisis and during stable periods, the financial company is occupying the central node of the MST in the Korean and the U.S. stock markets. The changes in the network structure and the central node are good indicators of an upcoming crisis.

  17. Information Sharing During Crisis Management in Hierarchical vs. Network Teams

    NARCIS (Netherlands)

    Schraagen, J.M.C.; Veld, M.H.I.T.; Koning, L. de

    2010-01-01

    This study examines the differences between hierarchical and network teams in emergency management. A controlled experimental environment was created in which we could study teams that differed in decision rights, availability of information, information sharing, and task division. Thirty-two teams

  18. Social Networks and Health.

    Science.gov (United States)

    Perdiaris, Christos; Chardalias, Konstantinos; Magita, Andrianna; Mechili, Aggelos E; Diomidous, Marianna

    2015-01-01

    Nowadays the social networks have been developed into an advanced communications tool, which is important for all people to contact each other. These specific networks do offer lots of options as well as plenty of advantages and disadvantages. The social websites are many in number and titles, such as the facebook, the twitter, the bandoo etc. One of the most important function-mechanisms for the social network websites, are the marketing tools. The future goal is suggested to be the evolution of these programs. The development of these applications, which is going to lead into a new era for the social digital communication between the internet users, all around the globe.

  19. Self-organized Criticality in Hierarchical Brain Network

    Institute of Scientific and Technical Information of China (English)

    YANG Qiu-Ying; ZHANG Ying-Yue; CHEN Tian-Lun

    2008-01-01

    It is shown that the cortical brain network of the macaque displays a hierarchically clustered organization and the neuron network shows small-world properties. Now the two factors will be considered in our model and the dynamical behavior of the model will be studied. We study the characters of the model and find that the distribution of avalanche size of the model follows power-law behavior.

  20. An Extended Hierarchical Trusted Model for Wireless Sensor Networks

    Institute of Scientific and Technical Information of China (English)

    DU Ruiying; XU Mingdi; ZHANG Huanguo

    2006-01-01

    Cryptography and authentication are traditional approach for providing network security. However, they are not sufficient for solving the problems which malicious nodes compromise whole wireless sensor network leading to invalid data transmission and wasting resource by using vicious behaviors. This paper puts forward an extended hierarchical trusted architecture for wireless sensor network, and establishes trusted congregations by three-tier framework. The method combines statistics, economics with encrypt mechanism for developing two trusted models which evaluate cluster head nodes and common sensor nodes respectively. The models form logical trusted-link from command node to common sensor nodes and guarantees the network can run in secure and reliable circumstance.

  1. Evolution of Social networks

    OpenAIRE

    Hellmann, Tim; Staudigl, Mathias

    2012-01-01

    Modeling the evolution of networks is central to our understanding of modern large communication systems, such as theWorld-Wide-Web, as well as economic and social networks. The research on social and economic networks is truly interdisciplinary and the number of modeling strategies and concepts is enormous. In this survey we present some modeling approaches, covering classical random graph models and game-theoretic models, which may be used to provide a unified framework to model and analyze...

  2. Hierarchical Ring Network Design Using Branch-and-Price

    DEFF Research Database (Denmark)

    Thomadsen, Tommy; Stidsen, Thomas K.

    2005-01-01

    We consider the problem of designing hierarchical two layer ring networks. The top layer consists of a federal-ring which establishes connection between a number of node disjoint metro-rings in a bottom layer. The objective is to minimize the costs of links in the network, taking both the fixed l...... for jointly solving the clustering problem, the metro ring design problem and the routing problem. Computational results are given for networks with up to 36 nodes.......We consider the problem of designing hierarchical two layer ring networks. The top layer consists of a federal-ring which establishes connection between a number of node disjoint metro-rings in a bottom layer. The objective is to minimize the costs of links in the network, taking both the fixed...... link establishment costs and the link capacity costs into account. Hierarchical ring network design problems combines the following optimization problems: Clustering, hub selection, metro ring design, federal ring design and routing problems. In this paper a branch-and-price algorithm is presented...

  3. Learning Contextual Dependence With Convolutional Hierarchical Recurrent Neural Networks

    Science.gov (United States)

    Zuo, Zhen; Shuai, Bing; Wang, Gang; Liu, Xiao; Wang, Xingxing; Wang, Bing; Chen, Yushi

    2016-07-01

    Existing deep convolutional neural networks (CNNs) have shown their great success on image classification. CNNs mainly consist of convolutional and pooling layers, both of which are performed on local image areas without considering the dependencies among different image regions. However, such dependencies are very important for generating explicit image representation. In contrast, recurrent neural networks (RNNs) are well known for their ability of encoding contextual information among sequential data, and they only require a limited number of network parameters. General RNNs can hardly be directly applied on non-sequential data. Thus, we proposed the hierarchical RNNs (HRNNs). In HRNNs, each RNN layer focuses on modeling spatial dependencies among image regions from the same scale but different locations. While the cross RNN scale connections target on modeling scale dependencies among regions from the same location but different scales. Specifically, we propose two recurrent neural network models: 1) hierarchical simple recurrent network (HSRN), which is fast and has low computational cost; and 2) hierarchical long-short term memory recurrent network (HLSTM), which performs better than HSRN with the price of more computational cost. In this manuscript, we integrate CNNs with HRNNs, and develop end-to-end convolutional hierarchical recurrent neural networks (C-HRNNs). C-HRNNs not only make use of the representation power of CNNs, but also efficiently encodes spatial and scale dependencies among different image regions. On four of the most challenging object/scene image classification benchmarks, our C-HRNNs achieve state-of-the-art results on Places 205, SUN 397, MIT indoor, and competitive results on ILSVRC 2012.

  4. Brain rhythms reveal a hierarchical network organization.

    Directory of Open Access Journals (Sweden)

    G Karl Steinke

    2011-10-01

    Full Text Available Recordings of ongoing neural activity with EEG and MEG exhibit oscillations of specific frequencies over a non-oscillatory background. The oscillations appear in the power spectrum as a collection of frequency bands that are evenly spaced on a logarithmic scale, thereby preventing mutual entrainment and cross-talk. Over the last few years, experimental, computational and theoretical studies have made substantial progress on our understanding of the biophysical mechanisms underlying the generation of network oscillations and their interactions, with emphasis on the role of neuronal synchronization. In this paper we ask a very different question. Rather than investigating how brain rhythms emerge, or whether they are necessary for neural function, we focus on what they tell us about functional brain connectivity. We hypothesized that if we were able to construct abstract networks, or "virtual brains", whose dynamics were similar to EEG/MEG recordings, those networks would share structural features among themselves, and also with real brains. Applying mathematical techniques for inverse problems, we have reverse-engineered network architectures that generate characteristic dynamics of actual brains, including spindles and sharp waves, which appear in the power spectrum as frequency bands superimposed on a non-oscillatory background dominated by low frequencies. We show that all reconstructed networks display similar topological features (e.g. structural motifs and dynamics. We have also reverse-engineered putative diseased brains (epileptic and schizophrenic, in which the oscillatory activity is altered in different ways, as reported in clinical studies. These reconstructed networks show consistent alterations of functional connectivity and dynamics. In particular, we show that the complexity of the network, quantified as proposed by Tononi, Sporns and Edelman, is a good indicator of brain fitness, since virtual brains modeling diseased states

  5. Computational Social Network Analysis

    CERN Document Server

    Hassanien, Aboul-Ella

    2010-01-01

    Presents insight into the social behaviour of animals (including the study of animal tracks and learning by members of the same species). This book provides web-based evidence of social interaction, perceptual learning, information granulation and the behaviour of humans and affinities between web-based social networks

  6. Design of Hierarchical Ring Networks Using Branch-and-Price

    DEFF Research Database (Denmark)

    Thomadsen, Tommy; Stidsen, Thomas K.

    2004-01-01

    We consider the problem of designing hierarchical two layer ring networks. The top layer consists of a federal-ring which establishes connection between a number of node disjoint metro-rings in a bottom layer. The objective is to minimize the costs of links in the network, taking both the fixed...... link establishment costs and the link capacity costs into account. The hierarchical two layer ring network design problem is solved in two stages: First the bottom layer, i.e. the metro-rings are designed, implicitly taking into account the capacity cost of the federal-ring. Then the federal......-ring is designed connecting the metro-rings, minimizing fixed link establishment costs of the federal-ring. A branch-and-price algorithm is presented for the design of the bottom layer and it is suggested that existing methods are used for the design of the federal-ring. Computational results are given...

  7. Strongly Resilient Non-Interactive Key Predistribution For Hierarchical Networks

    CERN Document Server

    Chen, Hao

    2010-01-01

    Key establishment is the basic necessary tool in the network security, by which pairs in the network can establish shared keys for protecting their pairwise communications. There have been some key agreement or predistribution schemes with the property that the key can be established without the interaction (\\cite{Blom84,BSHKY92,S97}). Recently the hierarchical cryptography and the key management for hierarchical networks have been active topics(see \\cite{BBG05,GHKRRW08,GS02,HNZI02,HL02,Matt04}. ). Key agreement schemes for hierarchical networks were presented in \\cite{Matt04,GHKRRW08} which is based on the Blom key predistribution scheme(Blom KPS, [1]) and pairing. In this paper we introduce generalized Blom-Blundo et al key predistribution schemes. These generalized Blom-Blundo et al key predistribution schemes have the same security functionality as the Blom-Blundo et al KPS. However different and random these KPSs can be used for various parts of the networks for enhancing the resilience. We also presentk...

  8. Hierarchical Compressed Sensing for Cluster Based Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Vishal Krishna Singh

    2016-02-01

    Full Text Available Data transmission consumes significant amount of energy in large scale wireless sensor networks (WSNs. In such an environment, reducing the in-network communication and distributing the load evenly over the network can reduce the overall energy consumption and maximize the network lifetime significantly. In this work, the aforementioned problem of network lifetime and uneven energy consumption in large scale wireless sensor networks is addressed. This work proposes a hierarchical compressed sensing (HCS scheme to reduce the in-network communication during the data gathering process. Co-related sensor readings are collected via a hierarchical clustering scheme. A compressed sensing (CS based data processing scheme is devised to transmit the data from the source to the sink. The proposed HCS is able to identify the optimal position for the application of CS to achieve reduced and similar number of transmissions on all the nodes in the network. An activity map is generated to validate the reduced and uniformly distributed communication load of the WSN. Based on the number of transmissions per data gathering round, the bit-hop metric model is used to analyse the overall energy consumption. Simulation results validate the efficiency of the proposed method over the existing CS based approaches.

  9. Time Synchronization in Hierarchical TESLA Wireless Sensor Networks

    Energy Technology Data Exchange (ETDEWEB)

    Jason L. Wright; Milos Manic

    2009-08-01

    Time synchronization and event time correlation are important in wireless sensor networks. In particular, time is used to create a sequence events or time line to answer questions of cause and effect. Time is also used as a basis for determining the freshness of received packets and the validity of cryptographic certificates. This paper presents secure method of time synchronization and event time correlation for TESLA-based hierarchical wireless sensor networks. The method demonstrates that events in a TESLA network can be accurately timestamped by adding only a few pieces of data to the existing protocol.

  10. SOFM Neural Network Based Hierarchical Topology Control for Wireless Sensor Networks

    OpenAIRE

    2014-01-01

    Well-designed network topology provides vital support for routing, data fusion, and target tracking in wireless sensor networks (WSNs). Self-organization feature map (SOFM) neural network is a major branch of artificial neural networks, which has self-organizing and self-learning features. In this paper, we propose a cluster-based topology control algorithm for WSNs, named SOFMHTC, which uses SOFM neural network to form a hierarchical network structure, completes cluster head selection by the...

  11. Extending stability through hierarchical clusters in Echo State Networks

    Directory of Open Access Journals (Sweden)

    Sarah Jarvis

    2010-07-01

    Full Text Available Echo State Networks (ESN are reservoir networks that satisfy well-established criteria for stability when constructed as feedforward networks. Recent evidence suggests that stability criteria are altered in the presence of reservoir substructures, such as clusters. Understanding how the reservoir architecture affects stability is thus important for the appropriate design of any ESN. To quantitatively determine the influence of the most relevant network parameters, we analysed the impact of reservoir substructures on stability in hierarchically clustered ESNs (HESN, as they allow a smooth transition from highly structured to increasingly homogeneous reservoirs. Previous studies used the largest eigenvalue of the reservoir connectivity matrix (spectral radius as a predictor for stable network dynamics. Here, we evaluate the impact of clusters, hierarchy and intercluster connectivity on the predictive power of the spectral radius for stability. Both hierarchy and low relative cluster sizes extend the range of spectral radius values, leading to stable networks, while increasing intercluster connectivity decreased maximal spectral radius.

  12. PERSON IN SOCIAL NETWORKS

    Directory of Open Access Journals (Sweden)

    Андрей Борисович Шалимов

    2013-11-01

    Full Text Available Purpose: Our scientific purpose is creation of practical model of person’s representation in social networks (Facebook, Twitter, Classmates. As user of social networks, person is made conditional not only upon its own identity, but also upon the information about himself, which he is ready to share with his friends in contact list. Goal-setting and practical activities for their achievement mean that you should apply force, it can completely eliminates systemic factors, the system of power relations, which overwhelms human being in social networks.Methodology: The reconstruction of the model of human in the popularity of social networksResults: There is descripton of practical model of person's representation in social networks, it includes the management of own identity and the audience (the list of contacts. When person manages own identity, he answers the question, «Whom I can dare to be?». Person perceives himself in social networks' being, he understands himself and his place in the world, he identifies.Managing the way in social media means that you answer the question «What I want to tell?». Person in social media looks at events in the field of culture, economy, politics, social relations through the prism of his own attitudes, he forms and formulates his own agenda and he is going to tell about himself through them.Practical implications: Everyday people’s life, practical activities, including marketing in social networks.DOI: http://dx.doi.org/10.12731/2218-7405-2013-9-51

  13. Hierarchical Resource Allocation in Femtocell Networks using Graph Algorithms

    CERN Document Server

    Sadr, Sanam

    2012-01-01

    This paper presents a hierarchical approach to resource allocation in open-access femtocell networks. The major challenge in femtocell networks is interference management which in our system, based on the Long Term Evolution (LTE) standard, translates to which user should be allocated which physical resource block (or fraction thereof) from which femtocell access point (FAP). The globally optimal solution requires integer programming and is mathematically intractable. We propose a hierarchical three-stage solution: first, the load of each FAP is estimated considering the number of users connected to the FAP, their average channel gain and required data rates. Second, based on each FAP's load, the physical resource blocks (PRBs) are allocated to FAPs in a manner that minimizes the interference by coloring the modified interference graph. Finally, the resource allocation is performed at each FAP considering users' instantaneous channel gain. The two major advantages of this suboptimal approach are the significa...

  14. Affinity driven social networks

    Science.gov (United States)

    Ruyú, B.; Kuperman, M. N.

    2007-04-01

    In this work we present a model for evolving networks, where the driven force is related to the social affinity between individuals of a population. In the model, a set of individuals initially arranged on a regular ordered network and thus linked with their closest neighbors are allowed to rearrange their connections according to a dynamics closely related to that of the stable marriage problem. We show that the behavior of some topological properties of the resulting networks follows a non trivial pattern.

  15. Replanning Using Hierarchical Task Network and Operator-Based Planning

    Science.gov (United States)

    Wang, X.; Chien, S.

    1997-01-01

    In order to scale-up to real-world problems, planning systems must be able to replan in order to deal with changes in problem context. In this paper we describe hierarchical task network and operatorbased re-planning techniques which allow adaptation of a previous plan to account for problems associated with executing plans in real-world domains with uncertainty, concurrency, changing objectives.

  16. Multi-mode clustering model for hierarchical wireless sensor networks

    Science.gov (United States)

    Hu, Xiangdong; Li, Yongfu; Xu, Huifen

    2017-03-01

    The topology management, i.e., clusters maintenance, of wireless sensor networks (WSNs) is still a challenge due to its numerous nodes, diverse application scenarios and limited resources as well as complex dynamics. To address this issue, a multi-mode clustering model (M2 CM) is proposed to maintain the clusters for hierarchical WSNs in this study. In particular, unlike the traditional time-trigger model based on the whole-network and periodic style, the M2 CM is proposed based on the local and event-trigger operations. In addition, an adaptive local maintenance algorithm is designed for the broken clusters in the WSNs using the spatial-temporal demand changes accordingly. Numerical experiments are performed using the NS2 network simulation platform. Results validate the effectiveness of the proposed model with respect to the network maintenance costs, node energy consumption and transmitted data as well as the network lifetime.

  17. Social network analysis

    NARCIS (Netherlands)

    W. de Nooy

    2009-01-01

    Social network analysis (SNA) focuses on the structure of ties within a set of social actors, e.g., persons, groups, organizations, and nations, or the products of human activity or cognition such as web sites, semantic concepts, and so on. It is linked to structuralism in sociology stressing the si

  18. Hierarchical Communication Network Architectures for Offshore Wind Power Farms

    Directory of Open Access Journals (Sweden)

    Mohamed A. Ahmed

    2014-05-01

    Full Text Available Nowadays, large-scale wind power farms (WPFs bring new challenges for both electric systems and communication networks. Communication networks are an essential part of WPFs because they provide real-time control and monitoring of wind turbines from a remote location (local control center. However, different wind turbine applications have different requirements in terms of data volume, latency, bandwidth, QoS, etc. This paper proposes a hierarchical communication network architecture that consist of a turbine area network (TAN, farm area network (FAN, and control area network (CAN for offshore WPFs. The two types of offshore WPFs studied are small-scale WPFs close to the grid and medium-scale WPFs far from the grid. The wind turbines are modelled based on the logical nodes (LN concepts of the IEC 61400-25 standard. To keep pace with current developments in wind turbine technology, the network design takes into account the extension of the LNs for both the wind turbine foundation and meteorological measurements. The proposed hierarchical communication network is based on Switched Ethernet. Servers at the control center are used to store and process the data received from the WPF. The network architecture is modelled and evaluated via OPNET. We investigated the end-to-end (ETE delay for different WPF applications. The results are validated by comparing the amount of generated sensing data with that of received traffic at servers. The network performance is evaluated, analyzed and discussed in view of end-to-end (ETE delay for different link bandwidths.

  19. Routing and wavelength assignment in hierarchical WDM networks

    Institute of Scientific and Technical Information of China (English)

    Yiyi LU; Ruxiang JIN; Chen HE

    2008-01-01

    A new routing and wavelength assignment method applied in hierarchical wavelength division multiplexing(WDM)networks is proposed.The algorithm is called offiine band priority algorithm(offiine BPA).The offline BPA targets to maximize the number of waveband paths under the condition of minimum number of wavelengths,and solve the routing and wavelength assignment(RWA)problem with waveband grooming to reduce cost.Based on the circle construction algorithm,waveband priority function is introduced to calculate the RWA problem.Simulation results demonstrate that the proposed algorithm achieves significant cost reduction in WDM network construction.

  20. Hierarchical control based on Hopfield network for nonseparable optimization problems

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    The nonseparable optimization control problem is considered, where the overall objective function is not of an additive form with respect to subsystems. Since there exists the problem that computation is very slow when using iterative algorithms in multiobjective optimization, Hopfield optimization hierarchical network based on IPM is presented to overcome such slow computation difficulty. Asymptotic stability of this Hopfield network is proved and its equilibrium point is the optimal point of the original problem. The simulation shows that the net is effective to deal with the optimization control problem for large-scale nonseparable steady state systems.

  1. Online social support networks.

    Science.gov (United States)

    Mehta, Neil; Atreja, Ashish

    2015-04-01

    Peer support groups have a long history and have been shown to improve health outcomes. With the increasing familiarity with online social networks like Facebook and ubiquitous access to the Internet, online social support networks are becoming popular. While studies have shown the benefit of these networks in providing emotional support or meeting informational needs, robust data on improving outcomes such as a decrease in health services utilization or reduction in adverse outcomes is lacking. These networks also pose unique challenges in the areas of patient privacy, funding models, quality of content, and research agendas. Addressing these concerns while creating patient-centred, patient-powered online support networks will help leverage these platforms to complement traditional healthcare delivery models in the current environment of value-based care.

  2. Online Advertising in Social Networks

    Science.gov (United States)

    Bagherjeiran, Abraham; Bhatt, Rushi P.; Parekh, Rajesh; Chaoji, Vineet

    Online social networks offer opportunities to analyze user behavior and social connectivity and leverage resulting insights for effective online advertising. This chapter focuses on the role of social network information in online display advertising.

  3. Hierarchical organization of brain functional network during visual task

    CERN Document Server

    Zhuo, Zhao; Fu, Zhong-Qian; Zhang, Jie

    2011-01-01

    In this paper, the brain functional networks derived from high-resolution synchronous EEG time series during visual task are generated by calculating the phase synchronization among the time series. The hierarchical modular organizations of these networks are systematically investigated by the fast Girvan-Newman algorithm. At the same time, the spatially adjacent electrodes (corresponding to EEG channels) are clustered into functional groups based on anatomical parcellation of brain cortex, and this clustering information are compared to that of the functional network. The results show that the modular architectures of brain functional network are in coincidence with that from the anatomical structures over different levels of hierarchy, which suggests that population of neurons performing the same function excite and inhibit in identical rhythms. The structure-function relationship further reveals that the correlations among EEG time series in the same functional group are much stronger than those in differe...

  4. Quantum social networks

    CERN Document Server

    Cabello, Adan; Lopez-Tarrida, Antonio J; Portillo, Jose R

    2011-01-01

    We introduce a physical approach to social networks (SNs) in which each actor is characterized by a yes-no test on a physical system. This is used to measure whether the interactions originating a SN obey pre-existing properties, as in a classical social network (CSN). As an example of SNs beyond CSNs, we introduce quantum social networks (QSNs) as those in which actor $i$ is characterized by a test of whether or not the system is in a quantum state $|\\psi_i>$. We show that QSNs outperform CSNs for a certain task and some graphs. We identify the simplest of these graphs and show that graphs in which QSNs outperform CSNs are increasingly frequent as the number of vertices increases. We also discuss more general SNs and identify the simplest graphs in which QSNs cannot be outperformed.

  5. Where sociality and relatedness diverge: the genetic basis for hierarchical social organization in African elephants

    DEFF Research Database (Denmark)

    Wittemyer, George; Okello, John B. A.; Rasmussen, Henrik B.

    2009-01-01

    Hierarchical properties characterize elephant fission-fusion social organization whereby stable groups of individuals coalesce into higher order groups or split in a predictable manner. This hierarchical complexity is rare among animals and, as such, an examination of the factors driving its...... emergence offers unique insight into the evolution of social behaviour. Investigation of the genetic basis for such social affiliation demonstrates that while the majority of core social groups (second-tier affiliates) are significantly related, this is not exclusively the case. As such, direct benefits...

  6. Hierarchical prediction errors in midbrain and septum during social learning

    Science.gov (United States)

    Mathys, Christoph; Weber, Lilian A. E.; Kasper, Lars; Mauer, Jan; Stephan, Klaas E.

    2017-01-01

    Abstract Social learning is fundamental to human interactions, yet its computational and physiological mechanisms are not well understood. One prominent open question concerns the role of neuromodulatory transmitters. We combined fMRI, computational modelling and genetics to address this question in two separate samples (N = 35, N = 47). Participants played a game requiring inference on an adviser’s intentions whose motivation to help or mislead changed over time. Our analyses suggest that hierarchically structured belief updates about current advice validity and the adviser’s trustworthiness, respectively, depend on different neuromodulatory systems. Low-level prediction errors (PEs) about advice accuracy not only activated regions known to support ‘theory of mind’, but also the dopaminergic midbrain. Furthermore, PE responses in ventral striatum were influenced by the Met/Val polymorphism of the Catechol-O-Methyltransferase (COMT) gene. By contrast, high-level PEs (‘expected uncertainty’) about the adviser’s fidelity activated the cholinergic septum. These findings, replicated in both samples, have important implications: They suggest that social learning rests on hierarchically related PEs encoded by midbrain and septum activity, respectively, in the same manner as other forms of learning under volatility. Furthermore, these hierarchical PEs may be broadcast by dopaminergic and cholinergic projections to induce plasticity specifically in cortical areas known to represent beliefs about others. PMID:28119508

  7. Social Network Infiltration

    Science.gov (United States)

    Plait, Philip

    2008-05-01

    Social networks are websites (or software that distributes media online) where users can distribute content to either a list of friends on that site or to anyone who surfs onto their page, and where those friends can interact and discuss the content. By linking to friends online, the users’ personal content (pictures, songs, favorite movies, diaries, websites, and so on) is dynamically distributed, and can "become viral", that is, get spread rapidly as more people see it and spread it themselves. Social networks are immensely popular around the planet, especially with younger users. The biggest social networks are Facebook and MySpace; an IYA2009 user already exists on Facebook, and one will be created for MySpace (in fact, several NASA satellites such as GLAST and Swift already have successful MySpace pages). Twitter is another network where data distribution is more limited; it is more like a mini-blog, but is very popular. IYA2009 already has a Twitter page, and will be updated more often with relevant information. In this talk I will review the existing social networks, show people how and why they are useful, and give them the tools they need to contribute meaningfully to IYA's online reach.

  8. Communication in Animal Social Networks

    NARCIS (Netherlands)

    Snijders, Lysanne; Naguib, Marc

    2017-01-01

    Animal social networks and animal communication networks are key disciplines for understanding animal social behavior, yet these disciplines remain poorly integrated. In this review, we show how communication and social networks are inherently linked, with social signals reflecting and affecting

  9. Social exchange : Relations and networks

    NARCIS (Netherlands)

    Dijkstra, Jacob

    2015-01-01

    In this short paper, I review the literature on social exchange networks, with specific attention to theoretical and experimental research. I indicate how social exchange theory is rooted in general social theory and mention a few of its main links to social network analysis and empirical network re

  10. Doubly Optimal Secure Multicasting: Hierarchical Hybrid Communication Network : Disaster Relief

    CERN Document Server

    Garimella, Rama Murthy; Singhal, Deepti

    2011-01-01

    Recently, the world has witnessed the increasing occurrence of disasters, some of natural origin and others caused by man. The intensity of the phenomenon that cause such disasters, the frequency in which they occur, the number of people affected and the material damage caused by them have been growing substantially. Disasters are defined as natural, technological, and human-initiated events that disrupt the normal functioning of the economy and society on a large scale. Areas where disasters have occurred bring many dangers to rescue teams and the communication network infrastructure is usually destroyed. To manage these hazards, different wireless technologies can be launched in the area of disaster. This paper discusses the innovative wireless technologies for Disaster Management. Specifically, issues related to the design of Hierarchical Hybrid Communication Network (arising in the communication network for disaster relief) are discussed.

  11. Hierarchical modular granular neural networks with fuzzy aggregation

    CERN Document Server

    Sanchez, Daniela

    2016-01-01

    In this book, a new method for hybrid intelligent systems is proposed. The proposed method is based on a granular computing approach applied in two levels. The techniques used and combined in the proposed method are modular neural networks (MNNs) with a Granular Computing (GrC) approach, thus resulting in a new concept of MNNs; modular granular neural networks (MGNNs). In addition fuzzy logic (FL) and hierarchical genetic algorithms (HGAs) are techniques used in this research work to improve results. These techniques are chosen because in other works have demonstrated to be a good option, and in the case of MNNs and HGAs, these techniques allow to improve the results obtained than with their conventional versions; respectively artificial neural networks and genetic algorithms.

  12. Power to Detect Intervention Effects on Ensembles of Social Networks

    Science.gov (United States)

    Sweet, Tracy M.; Junker, Brian W.

    2016-01-01

    The hierarchical network model (HNM) is a framework introduced by Sweet, Thomas, and Junker for modeling interventions and other covariate effects on ensembles of social networks, such as what would be found in randomized controlled trials in education research. In this article, we develop calculations for the power to detect an intervention…

  13. Retrieval capabilities of hierarchical networks: from Dyson to Hopfield.

    Science.gov (United States)

    Agliari, Elena; Barra, Adriano; Galluzzi, Andrea; Guerra, Francesco; Tantari, Daniele; Tavani, Flavia

    2015-01-16

    We consider statistical-mechanics models for spin systems built on hierarchical structures, which provide a simple example of non-mean-field framework. We show that the coupling decay with spin distance can give rise to peculiar features and phase diagrams much richer than their mean-field counterpart. In particular, we consider the Dyson model, mimicking ferromagnetism in lattices, and we prove the existence of a number of metastabilities, beyond the ordered state, which become stable in the thermodynamic limit. Such a feature is retained when the hierarchical structure is coupled with the Hebb rule for learning, hence mimicking the modular architecture of neurons, and gives rise to an associative network able to perform single pattern retrieval as well as multiple-pattern retrieval, depending crucially on the external stimuli and on the rate of interaction decay with distance; however, those emergent multitasking features reduce the network capacity with respect to the mean-field counterpart. The analysis is accomplished through statistical mechanics, Markov chain theory, signal-to-noise ratio technique, and numerical simulations in full consistency. Our results shed light on the biological complexity shown by real networks, and suggest future directions for understanding more realistic models.

  14. Where sociality and relatedness diverge: the genetic basis for hierarchical social organization in African elephants.

    Science.gov (United States)

    Wittemyer, George; Okello, John B A; Rasmussen, Henrik B; Arctander, Peter; Nyakaana, Silvester; Douglas-Hamilton, Iain; Siegismund, Hans R

    2009-10-07

    Hierarchical properties characterize elephant fission-fusion social organization whereby stable groups of individuals coalesce into higher order groups or split in a predictable manner. This hierarchical complexity is rare among animals and, as such, an examination of the factors driving its emergence offers unique insight into the evolution of social behaviour. Investigation of the genetic basis for such social affiliation demonstrates that while the majority of core social groups (second-tier affiliates) are significantly related, this is not exclusively the case. As such, direct benefits received through membership of these groups appear to be salient to their formation and maintenance. Further analysis revealed that the majority of groups in the two higher social echelons (third and fourth tiers) are typically not significantly related. The majority of third-tier members are matrilocal, carrying the same mtDNA control region haplotype, while matrilocality among fourth-tier groups was slightly less than expected at random. Comparison of results to those from a less disturbed population suggests that human depredation, leading to social disruption, altered the genetic underpinning of social relations in the study population. These results suggest that inclusive fitness benefits may crystallize elephant hierarchical social structuring along genetic lines when populations are undisturbed. However, indirect benefits are not critical to the formation and maintenance of second-, third- or fourth-tier level bonds, indicating the importance of direct benefits in the emergence of complex, hierarchical social relations among elephants. Future directions and conservation implications are discussed.

  15. Social Networks in Silicon Valley

    Institute of Scientific and Technical Information of China (English)

    Joseph Leu

    2006-01-01

    @@ Social network is a dominant, distinguishing characteristic of Silicon Valley. Because innovation entails coping with a high degree of uncertainty,such innovation is particularly dependent on networks.

  16. Foraging Online Social Networks

    NARCIS (Netherlands)

    Koot, G.; Huis in ’t Veld, M.A.A.; Hendricksen, J.; Vries, A. de; Broek, E.L. van den

    2014-01-01

    A concise and practical introduction is given on Online Social Networks (OSN) and their application in law enforcement, including a brief survey of related work. Subsequently, a tool is introduced that can be used to search OSN in order to generate user profiles. Both its architecture and processing

  17. Foraging Online Social Networks

    NARCIS (Netherlands)

    Koot, G.; Huis in ’t Veld, M.A.A.; Hendricksen, J.; Vries, A. de; Broek, E.L. van den

    2014-01-01

    A concise and practical introduction is given on Online Social Networks (OSN) and their application in law enforcement, including a brief survey of related work. Subsequently, a tool is introduced that can be used to search OSN in order to generate user profiles. Both its architecture and processing

  18. Foraging online social networks

    NARCIS (Netherlands)

    Koot, Gijs; Huis in ’t Veld, Mirjam; Hendricksen, Joost; Kaptein, Rianne; Vries, Arnout; Broek, van den Egon L.; Hengst, den M.; Israël, M.; Zeng, D.; Veenman, C.; Wang, A.

    2014-01-01

    A concise and practical introduction is given on Online Social Networks (OSN) and their application in law enforcement, including a brief survey of related work. Subsequently, a tool is introduced that can be used to search OSN in order to generate user profiles. Both its architecture and processing

  19. PSN: Portfolio Social Network

    DEFF Research Database (Denmark)

    Cortes, Jordi Magrina; Nizamani, Sarwat; Memon, Nasrullah

    2014-01-01

    In this paper we present a web-based information system which is a portfolio social network (PSN) that provides solutions to the recruiters and job seekers. The proposed system enables users to create portfolio so that he/she can add his specializations with piece of code if any specifically...

  20. The Analysis of Social Networks.

    Science.gov (United States)

    O'Malley, A James; Marsden, Peter V

    2008-12-01

    Many questions about the social organization of medicine and health services involve interdependencies among social actors that may be depicted by networks of relationships. Social network studies have been pursued for some time in social science disciplines, where numerous descriptive methods for analyzing them have been proposed. More recently, interest in the analysis of social network data has grown among statisticians, who have developed more elaborate models and methods for fitting them to network data. This article reviews fundamentals of, and recent innovations in, social network analysis using a physician influence network as an example. After introducing forms of network data, basic network statistics, and common descriptive measures, it describes two distinct types of statistical models for network data: individual-outcome models in which networks enter the construction of explanatory variables, and relational models in which the network itself is a multivariate dependent variable. Complexities in estimating both types of models arise due to the complex correlation structures among outcome measures.

  1. A HIERARCHICAL INTRUSION DETECTION ARCHITECTURE FOR WIRELESS SENSOR NETWORKS

    Directory of Open Access Journals (Sweden)

    Hossein Jadidoleslamy

    2011-10-01

    Full Text Available Networks protection against different types of attacks is one of most important posed issue into the network andinformation security application domains. This problem on Wireless Sensor Networks (WSNs, in attention to theirspecial properties, has more importance. Now, there are some of proposed architectures and guide lines to protectWireless Sensor Networks (WSNs against different types of intrusions; but any one of them do not has acomprehensive view to this problem and they are usually designed and implemented in single-purpose; but, theproposed design in this paper tries to has been a comprehensive view to this issue by presenting a complete andcomprehensive Intrusion Detection Architecture (IDA. The main contribution of this architecture is its hierarchicalstructure; i.e., it is designed and applicable, in one or two levels, consistent to the application domain and itsrequired security level. Focus of this paper is on the clustering WSNs, designing and deploying Cluster-basedIntrusion Detection System (CIDS on cluster-heads and Wireless Sensor Network wide level Intrusion DetectionSystem (WSNIDS on the central server. Suppositions of the WSN and Intrusion Detection Architecture (IDA are:static and heterogeneous network, hierarchical and clustering structure, clusters' overlapping and using hierarchicalrouting protocol such as LEACH, but along with minor changes. Finally, the proposed idea has been verified bydesigning a questionnaire, representing it to some (about 50 people experts and then, analyzing and evaluating itsacquired results.

  2. Promoting Social Network Awareness: A Social Network Monitoring System

    Science.gov (United States)

    Cadima, Rita; Ferreira, Carlos; Monguet, Josep; Ojeda, Jordi; Fernandez, Joaquin

    2010-01-01

    To increase communication and collaboration opportunities, members of a community must be aware of the social networks that exist within that community. This paper describes a social network monitoring system--the KIWI system--that enables users to register their interactions and visualize their social networks. The system was implemented in a…

  3. Promoting Social Network Awareness: A Social Network Monitoring System

    Science.gov (United States)

    Cadima, Rita; Ferreira, Carlos; Monguet, Josep; Ojeda, Jordi; Fernandez, Joaquin

    2010-01-01

    To increase communication and collaboration opportunities, members of a community must be aware of the social networks that exist within that community. This paper describes a social network monitoring system--the KIWI system--that enables users to register their interactions and visualize their social networks. The system was implemented in a…

  4. Social Networks as Marketing Tools

    National Research Council Canada - National Science Library

    NOZHA ERRAGCHA; RABIAA ROMDHANE

    2014-01-01

    The aims of this paper is to reinforce the literature on the digital social networks and their influences on the marketing Having presented and categorized the digital social, networks, we highlighted...

  5. [A medical image semantic modeling based on hierarchical Bayesian networks].

    Science.gov (United States)

    Lin, Chunyi; Ma, Lihong; Yin, Junxun; Chen, Jianyu

    2009-04-01

    A semantic modeling approach for medical image semantic retrieval based on hierarchical Bayesian networks was proposed, in allusion to characters of medical images. It used GMM (Gaussian mixture models) to map low-level image features into object semantics with probabilities, then it captured high-level semantics through fusing these object semantics using a Bayesian network, so that it built a multi-layer medical image semantic model, aiming to enable automatic image annotation and semantic retrieval by using various keywords at different semantic levels. As for the validity of this method, we have built a multi-level semantic model from a small set of astrocytoma MRI (magnetic resonance imaging) samples, in order to extract semantics of astrocytoma in malignant degree. Experiment results show that this is a superior approach.

  6. Spatially Resolved Monitoring of Drying of Hierarchical Porous Organic Networks.

    Science.gov (United States)

    Velasco, Manuel Isaac; Silletta, Emilia V; Gomez, Cesar G; Strumia, Miriam C; Stapf, Siegfried; Monti, Gustavo Alberto; Mattea, Carlos; Acosta, Rodolfo H

    2016-03-01

    Evaporation kinetics of water confined in hierarchal polymeric porous media is studied by low field nuclear magnetic resonance (NMR). Systems synthesized with various degrees of cross-linker density render networks with similar pore sizes but different response when soaked with water. Polymeric networks with low percentage of cross-linker can undergo swelling, which affects the porosity as well as the drying kinetics. The drying process is monitored macroscopically by single-sided NMR, with spatial resolution of 100 μm, while microscopic information is obtained by measurements of spin-spin relaxation times (T2). Transition from a funicular to a pendular regime, where hydraulic connectivity is lost and the capillary flow cannot compensate for the surface evaporation, can be observed from inspection of the water content in different sample layers. Relaxation measurements indicate that even when the larger pore structures are depleted of water, capillary flow occurs through smaller voids.

  7. Architecture of the parallel hierarchical network for fast image recognition

    Science.gov (United States)

    Timchenko, Leonid; Wójcik, Waldemar; Kokriatskaia, Natalia; Kutaev, Yuriy; Ivasyuk, Igor; Kotyra, Andrzej; Smailova, Saule

    2016-09-01

    Multistage integration of visual information in the brain allows humans to respond quickly to most significant stimuli while maintaining their ability to recognize small details in the image. Implementation of this principle in technical systems can lead to more efficient processing procedures. The multistage approach to image processing includes main types of cortical multistage convergence. The input images are mapped into a flexible hierarchy that reflects complexity of image data. Procedures of the temporal image decomposition and hierarchy formation are described in mathematical expressions. The multistage system highlights spatial regularities, which are passed through a number of transformational levels to generate a coded representation of the image that encapsulates a structure on different hierarchical levels in the image. At each processing stage a single output result is computed to allow a quick response of the system. The result is presented as an activity pattern, which can be compared with previously computed patterns on the basis of the closest match. With regard to the forecasting method, its idea lies in the following. In the results synchronization block, network-processed data arrive to the database where a sample of most correlated data is drawn using service parameters of the parallel-hierarchical network.

  8. A Comparison of Online Social Networks and Real-Life Social Networks: A Study of Sina Microblogging

    Directory of Open Access Journals (Sweden)

    Dayong Zhang

    2014-01-01

    Full Text Available Online social networks appear to enrich our social life, which raises the question whether they remove cognitive constraints on human communication and improve human social capabilities. In this paper, we analyze the users' following and followed relationships based on the data of Sina Microblogging and reveal several structural properties of Sina Microblogging. Compared with real-life social networks, our results confirm some similar features. However, Sina Microblogging also shows its own specialties, such as hierarchical structure and degree disassortativity, which all mark a deviation from real-life social networks. The low cost of the online network forms a broader perspective, and the one-way link relationships make it easy to spread information, but the online social network does not make too much difference in the creation of strong interpersonal relationships. Finally, we describe the mechanisms for the formation of these characteristics and discuss the implications of these structural properties for the real-life social networks.

  9. Reliable Point to Multipoint Hierarchical Routing in Scatternet Sensor Network

    Directory of Open Access Journals (Sweden)

    R.Dhaya

    2011-01-01

    Full Text Available In the recent development of communication, Bluetooth Scatternet wireless is a technology developed for wideband local accesses. Bluetooth technology is very popular because of its low cost and easy deployment which is based on IEEE 802.11standards. On the other hand Wireless Sensor Network (WSN consists of large number of sensor nodes distributed to monitor an environment and each node in a WSN consists of a small CPU, a sensing device and battery. Mostly, the sensor networks are distributed in an inconvenient location and it is difficult to recharge often. So routing in WSN is an important issue to consume energy and as well as to increase the life of the network, since a routing protocol finds the path between sources and sink. Moreover it is a challenging task to schedule the data between nodes in a scatternet in a congestive environment. Here this paper presents a new scheduling method for point to multi- point routing in Scatternet sensor network and the new dynamic routing method designed is cluster-based with hierarchical routing. The efficiency of this method is also compared in terms of energy consumption and the results show that the proposed routing is an energy efficient one which simultaneously increases the lifetime of the network.

  10. The Analysis of Social Networks

    OpenAIRE

    O’Malley, A James; Marsden, Peter V.

    2008-01-01

    Many questions about the social organization of medicine and health services involve interdependencies among social actors that may be depicted by networks of relationships. Social network studies have been pursued for some time in social science disciplines, where numerous descriptive methods for analyzing them have been proposed. More recently, interest in the analysis of social network data has grown among statisticians, who have developed more elaborate models and methods for fitting them...

  11. Social networks in supervision

    DEFF Research Database (Denmark)

    Lystbæk, Christian Tang

    and practice have focused on conceptual frameworks and practical techniques of promoting reflection through conversation in general and questioning in particular. However, in recent years, supervision research has started to focus on the social and technological aspects of supervision. This calls...... is constituted by the relationality of the actors, not by the actors themselves. In other words, no one acts in a vacuum but rather always under the influence of a wide range of surrounding and interconnected factors. Actors are actors because they are in a networked relationship. Thus, focusing on social...... and space. That involves mobilised an denrolled actos, both animate and inanimate (e.g. books, computers, etc. Actor-network theory defines a symmetry between animate and inanimate, i.e. subjects and objects, because ”human powers increasingly derive from the complex interconnections if human with material...

  12. The Social Networks of Innovation

    DEFF Research Database (Denmark)

    Björk, Jennie; Bergenholtz, Carsten; Magnusson, Mats

    It is a well-known fact in the innovation management literature that social network structures both constrain and facilitate ideation activities within firm boundaries. Still, recent research shows how the impact of social network structures varies across different contexts, depending e......) the characteristics of individuals involved in the given ideation process and 3) the social network activities of these individuals. The dependent variables are based on the idea level. Our research objective is two-fold: We explore how different kinds of social networks develop around varying idea categories...... and explain how particular social network structures facilitate some ideas to fare more successfully than others....

  13. The Social Networks of Innovation

    DEFF Research Database (Denmark)

    Björk, Jennie; Bergenholtz, Carsten; Magnusson, Mats

    It is a well-known fact in the innovation management literature that social network structures both constrain and facilitate ideation activities within firm boundaries. Still, recent research shows how the impact of social network structures varies across different contexts, depending e......) the characteristics of individuals involved in the given ideation process and 3) the social network activities of these individuals. The dependent variables are based on the idea level. Our research objective is two-fold: We explore how different kinds of social networks develop around varying idea categories...... and explain how particular social network structures facilitate some ideas to fare more successfully than others....

  14. A hierarchical network modeling method for railway tunnels safety assessment

    Science.gov (United States)

    Zhou, Jin; Xu, Weixiang; Guo, Xin; Liu, Xumin

    2017-02-01

    Using network theory to model risk-related knowledge on accidents is regarded as potential very helpful in risk management. A large amount of defects detection data for railway tunnels is collected in autumn every year in China. It is extremely important to discover the regularities knowledge in database. In this paper, based on network theories and by using data mining techniques, a new method is proposed for mining risk-related regularities to support risk management in railway tunnel projects. A hierarchical network (HN) model which takes into account the tunnel structures, tunnel defects, potential failures and accidents is established. An improved Apriori algorithm is designed to rapidly and effectively mine correlations between tunnel structures and tunnel defects. Then an algorithm is presented in order to mine the risk-related regularities table (RRT) from the frequent patterns. At last, a safety assessment method is proposed by consideration of actual defects and possible risks of defects gained from the RRT. This method cannot only generate the quantitative risk results but also reveal the key defects and critical risks of defects. This paper is further development on accident causation network modeling methods which can provide guidance for specific maintenance measure.

  15. The fundamental structures of dynamic social networks

    CERN Document Server

    Sekara, Vedran; Lehmann, Sune

    2015-01-01

    Networks provide a powerful mathematical framework for analyzing the structure and dynamics of complex systems (1-3). The study of group behavior has deep roots in the social science literature (4,5) and community detection is a central part of modern network science. Network communities have been found to be highly overlapping and organized in a hierarchical structure (6-9). Recent technological advances have provided a toolset for measuring the detailed social dynamics at scale (10,11). In spite of great progress, a quantitative description of the complex temporal behavior of social groups-with dynamics spanning from minute-by-minute changes to patterns expressed on the timescale of years-is still absent. Here we uncover a class of fundamental structures embedded within highly dynamic social networks. On the shortest time-scale, we find that social gatherings are fluid, with members coming and going, but organized via a stable core of individuals. We show that cores represent social contexts (9), with recur...

  16. Hierarchical Interference Mitigation for Massive MIMO Cellular Networks

    Science.gov (United States)

    Liu, An; Lau, Vincent

    2014-09-01

    We propose a hierarchical interference mitigation scheme for massive MIMO cellular networks. The MIMO precoder at each base station (BS) is partitioned into an inner precoder and an outer precoder. The inner precoder controls the intra-cell interference and is adaptive to local channel state information (CSI) at each BS (CSIT). The outer precoder controls the inter-cell interference and is adaptive to channel statistics. Such hierarchical precoding structure reduces the number of pilot symbols required for CSI estimation in massive MIMO downlink and is robust to the backhaul latency. We study joint optimization of the outer precoders, the user selection, and the power allocation to maximize a general concave utility which has no closed-form expression. We first apply random matrix theory to obtain an approximated problem with closed-form objective. We show that the solution of the approximated problem is asymptotically optimal with respect to the original problem as the number of antennas per BS grows large. Then using the hidden convexity of the problem, we propose an iterative algorithm to find the optimal solution for the approximated problem. We also obtain a low complexity algorithm with provable convergence. Simulations show that the proposed design has significant gain over various state-of-the-art baselines.

  17. Signed Networks in Social Media

    OpenAIRE

    Leskovec, Jure; Huttenlocher, Daniel; Kleinberg, Jon

    2010-01-01

    Relations between users on social media sites often reflect a mixture of positive (friendly) and negative (antagonistic) interactions. In contrast to the bulk of research on social networks that has focused almost exclusively on positive interpretations of links between people, we study how the interplay between positive and negative relationships affects the structure of on-line social networks. We connect our analyses to theories of signed networks from social psychology. We find that the c...

  18. Distributed Plume Source Localization Using Hierarchical Sensor Networks

    Institute of Scientific and Technical Information of China (English)

    KUANG Xing-hong; LIU Yu-qing; WU Yan-xiang; SHAO Hui-he

    2009-01-01

    A hierarchical wireless sensor networks (WSN) was proposed to estimate the plume source location. Such WSN can be of tremendous help to emergency personnel trying to protect people from terrorist attacks or responding to an accident. The entire surveillant field is divided into several small sub-regions. In each sub-region, the localization algorithm based on the improved particle filter (IPF) was performed to estimate the location. Some improved methods such as weighted centroid, residual resampling were introduced to the IPF algorithm to increase the localization performance. This distributed estimation method elirninates many drawbacks inherent with the traditional centralized optimization method. Simulation results show that localization algorithm is efficient far estimating the plume source location.

  19. Hierarchical self-organization of cytoskeletal active networks

    CERN Document Server

    Gordon, Daniel; Keasar, Chen; Farago, Oded

    2012-01-01

    The structural reorganization of the actin cytoskeleton is facilitated through the action of motor proteins that crosslink the actin filaments and transport them relative to each other. Here, we present a combined experimental-computational study that probes the dynamic evolution of mixtures of actin filaments and clusters of myosin motors. While on small spatial and temporal scales the system behaves in a very noisy manner, on larger scales it evolves into several well distinct patterns such as bundles, asters, and networks. These patterns are characterized by junctions with high connectivity, whose formation is possible due to the organization of the motors in "oligoclusters" (intermediate-size aggregates). The simulations reveal that the self-organization process proceeds through a series of hierarchical steps, starting from local microscopic moves and ranging up to the macroscopic large scales where the steady-state structures are formed. Our results shed light into the mechanisms involved in processes li...

  20. Learning Probabilistic Hierarchical Task Networks to Capture User Preferences

    CERN Document Server

    Li, Nan; Kambhampati, Subbarao; Yoon, Sungwook

    2010-01-01

    We propose automatically learning probabilistic Hierarchical Task Networks (pHTNs) in order to capture a user's preferences on plans, by observing only the user's behavior. HTNs are a common choice of representation for a variety of purposes in planning, including work on learning in planning. Our contributions are (a) learning structure and (b) representing preferences. In contrast, prior work employing HTNs considers learning method preconditions (instead of structure) and representing domain physics or search control knowledge (rather than preferences). Initially we will assume that the observed distribution of plans is an accurate representation of user preference, and then generalize to the situation where feasibility constraints frequently prevent the execution of preferred plans. In order to learn a distribution on plans we adapt an Expectation-Maximization (EM) technique from the discipline of (probabilistic) grammar induction, taking the perspective of task reductions as productions in a context-free...

  1. Applications of Social Network Analysis

    Science.gov (United States)

    Thilagam, P. Santhi

    A social network [2] is a description of the social structure between actors, mostly persons, groups or organizations. It indicates the ways in which they are connected with each other by some relationship such as friendship, kinship, finance exchange etc. In a nutshell, when the person uses already known/unknown people to create new contacts, it forms social networking. The social network is not a new concept rather it can be formed when similar people interact with each other directly or indirectly to perform particular task. Examples of social networks include a friendship networks, collaboration networks, co-authorship networks, and co-employees networks which depict the direct interaction among the people. There are also other forms of social networks, such as entertainment networks, business Networks, citation networks, and hyperlink networks, in which interaction among the people is indirect. Generally, social networks operate on many levels, from families up to the level of nations and assists in improving interactive knowledge sharing, interoperability and collaboration.

  2. Collaboration in Social Networks

    CERN Document Server

    Dall'Asta, Luca; Pin, Paolo

    2011-01-01

    The very notion of social network implies that linked individuals interact repeatedly with each other. This allows them not only to learn successful strategies and adapt to them, but also to condition their own behavior on the behavior of others, in a strategic forward looking manner. Game theory of repeated games shows that these circumstances are conducive to the emergence of collaboration in simple games of two players. We investigate the extension of this concept to the case where players are engaged in a local contribution game and show that rationality and credibility of threats identify a class of Nash equilibria -- that we call "collaborative equilibria" -- that have a precise interpretation in terms of sub-graphs of the social network. For large network games, the number of such equilibria is exponentially large in the number of players. When incentives to defect are small, equilibria are supported by local structures whereas when incentives exceed a threshold they acquire a non-local nature, which r...

  3. Hierarchical steepness, counter-aggression, and macaque social style scale.

    Science.gov (United States)

    Balasubramaniam, Krishna N; Dittmar, Katharina; Berman, Carol M; Butovskaya, Marina; Cooper, Mathew A; Majolo, Bonaventura; Ogawa, Hideshi; Schino, Gabriele; Thierry, Bernard; De Waal, Frans B M

    2012-10-01

    Nonhuman primates show remarkable variation in several aspects of social structure. One way to characterize this variation in the genus Macaca is through the concept of social style, which is based on the observation that several social traits appear to covary with one another in a linear or at least continuous manner. In practice, macaques are more simply characterized as fitting a four-grade scale in which species range from extremely despotic (grade 1) to extremely tolerant (grade 4). Here, we examine the fit of three core measures of social style-two measures of dominance gradients (hierarchical steepness) and another closely related measure (counter-aggression)-to this scale, controlling for phylogenetic relationships. Although raw scores for both steepness and counter-aggression correlated with social scale in predicted directions, the distributions appeared to vary by measure. Counter-aggression appeared to vary dichotomously with scale, with grade 4 species being distinct from all other grades. Steepness measures appeared more continuous. Species in grades 1 and 4 were distinct from one another on all measures, but those in the intermediate grades varied inconsistently. This confirms previous indications that covariation is more readily observable when comparing species at the extreme ends of the scale than those in intermediate positions. When behavioral measures were mapped onto phylogenetic trees, independent contrasts showed no significant consistent directional changes at nodes below which there were evolutionary changes in scale. Further, contrasts were no greater at these nodes than at neutral nodes. This suggests that correlations with the scale can be attributed largely to species' phylogenetic relationships. This could be due in turn to a structural linkage of social traits based on adaptation to similar ecological conditions in the distant past, or simply to unlinked phylogenetic closeness.

  4. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  5. Social Network Analysis Based on Network Motifs

    OpenAIRE

    2014-01-01

    Based on the community structure characteristics, theory, and methods of frequent subgraph mining, network motifs findings are firstly introduced into social network analysis; the tendentiousness evaluation function and the importance evaluation function are proposed for effectiveness assessment. Compared with the traditional way based on nodes centrality degree, the new approach can be used to analyze the properties of social network more fully and judge the roles of the nodes effectively. I...

  6. Underage Children and Social Networking

    Science.gov (United States)

    Weeden, Shalynn; Cooke, Bethany; McVey, Michael

    2013-01-01

    Despite minimum age requirements for joining popular social networking services such as Facebook, many students misrepresent their real ages and join as active participants in the networks. This descriptive study examines the use of social networking services (SNSs) by children under the age of 13. The researchers surveyed a sample of 199…

  7. Underage Children and Social Networking

    Science.gov (United States)

    Weeden, Shalynn; Cooke, Bethany; McVey, Michael

    2013-01-01

    Despite minimum age requirements for joining popular social networking services such as Facebook, many students misrepresent their real ages and join as active participants in the networks. This descriptive study examines the use of social networking services (SNSs) by children under the age of 13. The researchers surveyed a sample of 199…

  8. Privacy in Social Networks

    CERN Document Server

    Zheleva, Elena

    2012-01-01

    This synthesis lecture provides a survey of work on privacy in online social networks (OSNs). This work encompasses concerns of users as well as service providers and third parties. Our goal is to approach such concerns from a computer-science perspective, and building upon existing work on privacy, security, statistical modeling and databases to provide an overview of the technical and algorithmic issues related to privacy in OSNs. We start our survey by introducing a simple OSN data model and describe common statistical-inference techniques that can be used to infer potentially sensitive inf

  9. Elgg 18 Social Networking

    CERN Document Server

    Costello, Cash

    2012-01-01

    This book provides more than just a step-by-step guide to installing and using Elgg. It includes practical advice gained through experience on what it takes to deploy and maintain an Elgg-based site. If you are a software developer or are familiar with PHP, it provides both a tutorial-based introduction and a quick reference guide so that you can quickly extend and customize Elgg. If you want to create a social networking site using Elgg and do not have a background in software development, this book provides all the information and advice that you need written just for you. If you are a devel

  10. Enterprise Social Networks from a Manager's Perspective

    DEFF Research Database (Denmark)

    Richter, Alexander; Hetmank, Corinna; Müller, Maria

    2016-01-01

    be supported best to trigger both learning and change processes in the enterprise. For such processes, managers have a strong multiplying and "role model" effect. Therefore, following a case study approach, we conducted 15 interviews with managers at different hierarchical levels at a financial services......The increasing use of Enterprise Social Networks (ESN) has been resulting in important changes in individual work practices, and is subject of numerous studies. From both a theoretical and a practical perspective, there is a lack of well-founded knowledge on how the implementation of ESN can...

  11. Registration Cost Performance Analysis of a Hierarchical Mobile Internet Protocol Network

    Institute of Scientific and Technical Information of China (English)

    XU Kai; JI Hong; YUE Guang-xin

    2004-01-01

    On the basis of introducing principles for hierarchical mobile Internet protocol networks, the registration cost performance in this network model is analyzed in detail. Furthermore, the functional relationship is also established in the paper among registration cost, hierarchical level number and the maximum handover time for gateway foreign agent regional registration. At last, the registration cost of the hierarchical mobile Internet protocol network is compared with that of the traditional mobile Internet protocol. Theoretic analysis and computer simulation results show that the hierarchical level number and the maximum handover times can both affect the registration cost importantly, when suitable values of which are chosen, the hierarchical network can significantly improve the registration performance compared with the traditional mobile IP.

  12. Hierarchical Real-time Network Traffic Classification Based on ECOC

    Directory of Open Access Journals (Sweden)

    Yaou Zhao

    2013-09-01

    Full Text Available Classification of network traffic is basic and essential for manynetwork researches and managements. With the rapid development ofpeer-to-peer (P2P application using dynamic port disguisingtechniques and encryption to avoid detection, port-based and simplepayload-based network traffic classification methods were diminished.An alternative method based on statistics and machine learning hadattracted researchers' attention in recent years. However, most ofthe proposed algorithms were off-line and usually used a single classifier.In this paper a new hierarchical real-time model was proposed which comprised of a three tuple (source ip, destination ip and destination portlook up table(TT-LUT part and layered milestone part. TT-LUT was used to quickly classify short flows whichneed not to pass the layered milestone part, and milestones in layered milestone partcould classify the other flows in real-time with the real-time feature selection and statistics.Every milestone was a ECOC(Error-Correcting Output Codes based model which was usedto improve classification performance. Experiments showed that the proposedmodel can improve the efficiency of real-time to 80%, and themulti-class classification accuracy encouragingly to 91.4% on the datasets which had been captured from the backbone router in our campus through a week.

  13. On sampling social networking services

    OpenAIRE

    Wang, Baiyang

    2012-01-01

    This article aims at summarizing the existing methods for sampling social networking services and proposing a faster confidence interval for related sampling methods. It also includes comparisons of common network sampling techniques.

  14. Social Interaction in Learning Networks

    NARCIS (Netherlands)

    Sloep, Peter

    2009-01-01

    The original publication is available from www.springerlink.com. Sloep, P. (2009). Social Interaction in Learning Networks. In R. Koper (Ed.), Learning Network Services for Professional Development (pp 13-15). Berlin, Germany: Springer Verlag.

  15. Social Networks in Silicon Valley

    Institute of Scientific and Technical Information of China (English)

    Joseph; Leu

    2006-01-01

      Social network is a dominant, distinguishing characteristic of Silicon Valley. Because innovation entails coping with a high degree of uncertainty,such innovation is particularly dependent on networks.……

  16. Online social networking for radiology.

    Science.gov (United States)

    Auffermann, William F; Chetlen, Alison L; Colucci, Andrew T; DeQuesada, Ivan M; Grajo, Joseph R; Heller, Matthew T; Nowitzki, Kristina M; Sherry, Steven J; Tillack, Allison A

    2015-01-01

    Online social networking services have changed the way we interact as a society and offer many opportunities to improve the way we practice radiology and medicine in general. This article begins with an introduction to social networking. Next, the latest advances in online social networking are reviewed, and areas where radiologists and clinicians may benefit from these new tools are discussed. This article concludes with several steps that the interested reader can take to become more involved in online social networking. Copyright © 2015 AUR. Published by Elsevier Inc. All rights reserved.

  17. Sensor Networks Hierarchical Optimization Model for Security Monitoring in High-Speed Railway Transport Hub

    Directory of Open Access Journals (Sweden)

    Zhengyu Xie

    2015-01-01

    Full Text Available We consider the sensor networks hierarchical optimization problem in high-speed railway transport hub (HRTH. The sensor networks are optimized from three hierarchies which are key area sensors optimization, passenger line sensors optimization, and whole area sensors optimization. Case study on a specific HRTH in China showed that the hierarchical optimization method is effective to optimize the sensor networks for security monitoring in HRTH.

  18. Creative networks in Guanxi Land: a study of social networking related to Shanghai Expo 2010

    OpenAIRE

    Lee, Y-H

    2007-01-01

    Entering the twentieth-first century, post-Mao China continues its considerable transformation. The central theme of this research lies in the examination of social networking through a case study of Shanghai Expo 2010. It is an analysis of the forms of networking in the formation of Shanghai as a global city. The overall question is: To what extent will China be able to enter the global network economy whilst maintaining its emphasis on hierarchical decision-making and central control? This ...

  19. Hierarchical Structure, Disassortativity and Information Measures of the US Flight Network

    Institute of Scientific and Technical Information of China (English)

    WANG Ru; CAI Xu

    2005-01-01

    @@ We investigate the mixing structure of directed and evolutionary US flight network. It is shown that such a network is a hierarchical network, with average assortativity coefficient -0.37. Application of the informationbased method that can give the same result provides a way to explore the structure of complex networks.

  20. Resolution of Singularities Introduced by Hierarchical Structure in Deep Neural Networks.

    Science.gov (United States)

    Nitta, Tohru

    2016-06-30

    We present a theoretical analysis of singular points of artificial deep neural networks, resulting in providing deep neural network models having no critical points introduced by a hierarchical structure. It is considered that such deep neural network models have good nature for gradient-based optimization. First, we show that there exist a large number of critical points introduced by a hierarchical structure in deep neural networks as straight lines, depending on the number of hidden layers and the number of hidden neurons. Second, we derive a sufficient condition for deep neural networks having no critical points introduced by a hierarchical structure, which can be applied to general deep neural networks. It is also shown that the existence of critical points introduced by a hierarchical structure is determined by the rank and the regularity of weight matrices for a specific class of deep neural networks. Finally, two kinds of implementation methods of the sufficient conditions to have no critical points are provided. One is a learning algorithm that can avoid critical points introduced by the hierarchical structure during learning (called avoidant learning algorithm). The other is a neural network that does not have some critical points introduced by the hierarchical structure as an inherent property (called avoidant neural network).

  1. A Tool for Fast Development of Modular and Hierarchic Neural Network-based Systems

    Directory of Open Access Journals (Sweden)

    Francisco Reinaldo

    2006-08-01

    Full Text Available This paper presents PyramidNet tool as a fast and easy way to develop Modular and Hierarchic Neural Network-based Systems. This tool facilitates the fast emergence of autonomous behaviors in agents because it uses a hierarchic and modular control methodology of heterogeneous learning modules: the pyramid. Using the graphical resources of PyramidNet the user is able to specify a behavior system even having little understanding of artificial neural networks. Experimental tests have shown that a very significant speedup is attained in the development of modular and hierarchic neural network-based systems by using this tool.

  2. Churn in Social Networks

    Science.gov (United States)

    Karnstedt, Marcel; Hennessy, Tara; Chan, Jeffrey; Basuchowdhuri, Partha; Hayes, Conor; Strufe, Thorsten

    In the past, churn has been identified as an issue across most industry sectors. In its most general sense it refers to the rate of loss of customers from a company's customer base. There is a simple reason for the attention churn attracts: churning customers mean a loss of revenue. Emerging from business spaces like telecommunications (telcom) and broadcast providers, where churn is a major issue, it is also regarded as a crucial problem in many other businesses, such as online games creators, but also online social networks and discussion sites. Companies aim at identifying the risk of churn in its early stages, as it is usually much cheaper to retain a customer than to try to win him or her back. If this risk can be accurately predicted, marketing departments can target customers efficiently with tailored incentives to prevent them from leaving.

  3. SO2 Emissions in China - Their Network and Hierarchical Structures

    Science.gov (United States)

    Yan, Shaomin; Wu, Guang

    2017-04-01

    SO2 emissions lead to various harmful effects on environment and human health. The SO2 emission in China has significant contribution to the global SO2 emission, so it is necessary to employ various methods to study SO2 emissions in China with great details in order to lay the foundation for policymaking to improve environmental conditions in China. Network analysis is used to analyze the SO2 emissions from power generation, industrial, residential and transportation sectors in China for 2008 and 2010, which are recently available from 1744 ground surface monitoring stations. The results show that the SO2 emissions from power generation sector were highly individualized as small-sized clusters, the SO2 emissions from industrial sector underwent an integration process with a large cluster contained 1674 places covering all industrial areas in China, the SO2 emissions from residential sector was not impacted by time, and the SO2 emissions from transportation sector underwent significant integration. Hierarchical structure is obtained by further combining SO2 emissions from all four sectors and is potentially useful to find out similar patterns of SO2 emissions, which can provide information on understanding the mechanisms of SO2 pollution and on designing different environmental measure to combat SO2 emissions.

  4. Hierarchical Artificial Bee Colony Algorithm for RFID Network Planning Optimization

    Directory of Open Access Journals (Sweden)

    Lianbo Ma

    2014-01-01

    Full Text Available This paper presents a novel optimization algorithm, namely, hierarchical artificial bee colony optimization, called HABC, to tackle the radio frequency identification network planning (RNP problem. In the proposed multilevel model, the higher-level species can be aggregated by the subpopulations from lower level. In the bottom level, each subpopulation employing the canonical ABC method searches the part-dimensional optimum in parallel, which can be constructed into a complete solution for the upper level. At the same time, the comprehensive learning method with crossover and mutation operators is applied to enhance the global search ability between species. Experiments are conducted on a set of 10 benchmark optimization problems. The results demonstrate that the proposed HABC obtains remarkable performance on most chosen benchmark functions when compared to several successful swarm intelligence and evolutionary algorithms. Then HABC is used for solving the real-world RNP problem on two instances with different scales. Simulation results show that the proposed algorithm is superior for solving RNP, in terms of optimization accuracy and computation robustness.

  5. Social Networking Goes to School

    Science.gov (United States)

    Davis, Michelle R.

    2010-01-01

    Just a few years ago, social networking meant little more to educators than the headache of determining whether to penalize students for inappropriate activities captured on Facebook or MySpace. Now, teachers and students have an array of social-networking sites and tools--from Ning to VoiceThread and Second Life--to draw on for such serious uses…

  6. A Social Networks in Education

    Science.gov (United States)

    Klimova, Blanka; Poulova, Petra

    2015-01-01

    At present social networks are becoming important in all areas of human activities. They are simply part and parcel of everyday life. They are mostly used for advertising, but they have already found their way into education. The future potential of social networks is high as it can be seen from their statistics on a daily, monthly or yearly…

  7. Social networks and factor markets

    DEFF Research Database (Denmark)

    Abay, Kibrom Araya; Kahsay, Goytom Abraha; Berhane, Guush

    In the absence of well-established factor markets, the role of indigenous institutions and social networks can be substantial for mobilizing factors for agricultural production. We investigate the role of an indigenous social network in Ethiopia, the iddir, in facilitating factor market...

  8. Risk aversion and social networks

    NARCIS (Netherlands)

    Kovářík, J.; van der Leij, M.J.

    2014-01-01

    This paper first investigates empirically the relationship between risk aversion and social network structure in a large group of undergraduate students. We find that risk aversion is strongly correlated to local network clustering, that is, the probability that one has a social tie to friends of

  9. Social networks and factor markets

    DEFF Research Database (Denmark)

    Abay, Kibrom Araya; Kahsay, Goytom Abraha; Berhane, Guush

    In the absence of well-established factor markets, the role of indigenous institutions and social networks can be substantial for mobilizing factors for agricultural production. We investigate the role of an indigenous social network in Ethiopia, the iddir, in facilitating factor market...... sources. These results point out the roles non-market arrangements, such as social networks, can play in mitigating market inefficiencies in poor rural markets....... transactions among smallholder farmers. Using detailed longitudinal household survey data and employing a difference-in-differences approach, we find that iddir membership improves households’ access to factor markets. Specifically, we find that joining an iddir network improves households’ access to land...

  10. Signed Networks in Social Media

    CERN Document Server

    Leskovec, Jure; Kleinberg, Jon

    2010-01-01

    Relations between users on social media sites often reflect a mixture of positive (friendly) and negative (antagonistic) interactions. In contrast to the bulk of research on social networks that has focused almost exclusively on positive interpretations of links between people, we study how the interplay between positive and negative relationships affects the structure of on-line social networks. We connect our analyses to theories of signed networks from social psychology. We find that the classical theory of structural balance tends to capture certain common patterns of interaction, but that it is also at odds with some of the fundamental phenomena we observe --- particularly related to the evolving, directed nature of these on-line networks. We then develop an alternate theory of status that better explains the observed edge signs and provides insights into the underlying social mechanisms. Our work provides one of the first large-scale evaluations of theories of signed networks using on-line datasets, as ...

  11. Line graphs as social networks

    CERN Document Server

    Krawczyk, Malgorzata; Mańka-Krasoń, Anna; Kułakowski, Krzysztof

    2010-01-01

    The line graphs are clustered and assortative. They share these topological features with some social networks. We argue that this similarity reveals the cliquey character of the social networks. In the model proposed here, a social network is the line graph of an initial network of families, communities, interest groups, school classes and small companies. These groups play the role of nodes, and individuals are represented by links between these nodes. The picture is supported by the data on the LiveJournal network of about 8 x 10^6 people. In particular, sharp maxima of the observed data of the degree dependence of the clustering coefficient C(k) are associated with cliques in the social network.

  12. SOCIAL NETWORKS AND INTERPERSONAL COMMUNICATION

    OpenAIRE

    Veronica GHEORGHIȚĂ; Alexandrina PĂDUREȚU

    2014-01-01

    Social networks visible influence people's ability to interact and communicate. Extending social circles by establishing virtual links involves a number of positive aspects such as: instant access to options for interaction, sharing of information to large communities of people, intensification of acts of communication, high levels of feedback and trust with people with whom we communicate. On the other hand, social networks adversely affects communication by decreasing the interaction face t...

  13. Multiple dynamical time-scales in networks with hierarchically nested modular organization

    Indian Academy of Sciences (India)

    Sitabhra Sinha; Swarup Poria

    2011-11-01

    Many natural and engineered complex networks have intricate mesoscopic organization, e.g., the clustering of the constituent nodes into several communities or modules. Often, such modularity is manifested at several different hierarchical levels, where the clusters defined at one level appear as elementary entities at the next higher level. Using a simple model of a hierarchical modular network, we show that such a topological structure gives rise to characteristic time-scale separation between dynamics occurring at different levels of the hierarchy. This generalizes our earlier result for simple modular networks, where fast intramodular and slow intermodular processes were clearly distinguished. Investigating the process of synchronization of oscillators in a hierarchical modular network, we show the existence of as many distinct time-scales as there are hierarchical levels in the system. This suggests a possible functional role of such mesoscopic organization principle in natural systems, viz., in the dynamical separation of events occurring at different spatial scales.

  14. Loss Performance Modeling for Hierarchical Heterogeneous Wireless Networks With Speed-Sensitive Call Admission Control

    DEFF Research Database (Denmark)

    Huang, Qian; Huang, Yue-Cai; Ko, King-Tim;

    2011-01-01

    dimensioning and planning. This paper investigates the computationally efficient loss performance modeling for multiservice in hierarchical heterogeneous wireless networks. A speed-sensitive call admission control (CAC) scheme is considered in our model to assign overflowed calls to appropriate tiers...

  15. A Distributed Network Mobility Management Scheme for Hierarchical Mobile IPv6 Networks

    Science.gov (United States)

    Kawano, Keita; Kinoshita, Kazuhiko; Yamai, Nariyoshi

    Route optimization for network mobility is a key technique for providing a node in a mobile network (Mobile Network Node or MNN) with high quality broadband communications. Many schemes adding route optimization function to Network Mobility (NEMO) Basic Support protocol, the standardized network mobility management protocol from the IETF nemo working group, have already been proposed in recent years. One such scheme, a scheme using Hierarchical Mobile IPv6 (HMIPv6) aims to overcome micromobility management issues as well by applying a mechanism based on HMIPv6. The traditional scheme, however, suffers from a significant number of signaling messages as the number of MNNs and/or the number of their Correspondent Nodes (CNs) increase, because many messages notifying the MNNs' Home Agents (HAMNNs) and the CNs of the mobile network's movement are generated simultaneously each time the mobile network moves to the domain of another micromobility management router (Mobility Anchor Point or MAP). This paper proposes a scheme to overcome this problem. Our scheme reduces the number of signaling messages generated at the same time by managing the mobility of MNNs using multiple MAPs distributed within a network for load sharing. The results of simulation experiments show that our scheme works efficiently compared to the traditional scheme when a mobile network has many MNNs and/or these MNNs communicate with many CNs.

  16. IPTV traffic management using topology-based hierarchical scheduling in Carrier Ethernet transport networks

    DEFF Research Database (Denmark)

    Yu, Hao; Yan, Ying; Berger, Michael Stubert

    2009-01-01

    of Service (QoS) provisioning abilities, which guarantee end-to-end performances of voice, video and data traffic delivered over networks. This paper introduces a topology-based hierarchical scheduler scheme, which controls the incoming traffic at the edge of the network based on the network topology...

  17. SOCIAL NETWORKS AND INTERPERSONAL COMMUNICATION

    Directory of Open Access Journals (Sweden)

    Veronica GHEORGHIȚĂ

    2014-11-01

    Full Text Available Social networks visible influence people's ability to interact and communicate. Extending social circles by establishing virtual links involves a number of positive aspects such as: instant access to options for interaction, sharing of information to large communities of people, intensification of acts of communication, high levels of feedback and trust with people with whom we communicate. On the other hand, social networks adversely affects communication by decreasing the interaction face to face, by imposing superficial communications experiences, grammatical and spelling erosion of the language. Therefore, the study aims to capture the spread of social networks, their use and impact on interpersonal communication. More specifically, they look for the answer to the question: what is the nature of interpersonal communication that is found on social networking sites: personal, emotional, private or shared, informal, and public?

  18. RECOMMENDER SYSTEMS IN SOCIAL NETWORKS

    Directory of Open Access Journals (Sweden)

    Cleomar Valois Batista Jr

    2011-12-01

    Full Text Available The continued and diversified growth of social networks has changed the way in which users interact with them. With these changes, what once was limited to social contact is now used for exchanging ideas and opinions, creating the need for new features. Users have so much information at their fingertips that they are unable to process it by themselves; hence, the need to develop new tools. Recommender systems were developed to address this need and many techniques were used for different approaches to the problem. To make relevant recommendations, these systems use large sets of data, not taking the social network of the user into consideration. Developing a recommender system that takes into account the social network of the user is another way of tackling the problem. The purpose of this project is to use the theory of six degrees of separation (Watts 2003 amongst users of a social network to enhance existing recommender systems.

  19. Anti-Social Networking

    Directory of Open Access Journals (Sweden)

    Chris Allen

    2014-01-01

    Full Text Available With research highlighting the growing incidence of public opposition to the building of mosques and the innovative use of social networking, especially Facebook, to disseminate and garner support for such opposition, a pilot study sought to investigate this in relation to the proposed Dudley “super mosque.” Focusing on the Facebook group Stop Dudley Super Mosque and Islamic Village, members were engaged online to explore why they opposed the mosque. Some of the emergent themes included planning and location, inclusion and public investment as well as those relating to notions of identity, heritage, otherness, and Islamification. Overt racist and Islamophobic reasons were also identified. The sense of political disconnect of members is also considered. Concluding with a contextualization of the findings within the existing body of scholarly output, in particular the building of mosques and Islamophobia, having recognized how spaces such as Facebook have potential to function as sites for research and method also, an extended methodological consideration is also included.

  20. Introduction to Social Network Analysis

    Science.gov (United States)

    Zaphiris, Panayiotis; Ang, Chee Siang

    Social Network analysis focuses on patterns of relations between and among people, organizations, states, etc. It aims to describe networks of relations as fully as possible, identify prominent patterns in such networks, trace the flow of information through them, and discover what effects these relations and networks have on people and organizations. Social network analysis offers a very promising potential for analyzing human-human interactions in online communities (discussion boards, newsgroups, virtual organizations). This Tutorial provides an overview of this analytic technique and demonstrates how it can be used in Human Computer Interaction (HCI) research and practice, focusing especially on Computer Mediated Communication (CMC). This topic acquires particular importance these days, with the increasing popularity of social networking websites (e.g., youtube, myspace, MMORPGs etc.) and the research interest in studying them.

  1. Networks in social policy problems

    CERN Document Server

    Scotti, marco

    2012-01-01

    Network science is the key to managing social communities, designing the structure of efficient organizations and planning for sustainable development. This book applies network science to contemporary social policy problems. In the first part, tools of diffusion and team design are deployed to challenges in adoption of ideas and the management of creativity. Ideas, unlike information, are generated and adopted in networks of personal ties. Chapters in the second part tackle problems of power and malfeasance in political and business organizations, where mechanisms in accessing and controlling informal networks often outweigh formal processes. The third part uses ideas from biology and physics to understand global economic and financial crises, ecological depletion and challenges to energy security. Ideal for researchers and policy makers involved in social network analysis, business strategy and economic policy, it deals with issues ranging from what makes public advisories effective to how networks influenc...

  2. Line graphs as social networks

    Science.gov (United States)

    Krawczyk, M. J.; Muchnik, L.; Mańka-Krasoń, A.; Kułakowski, K.

    2011-07-01

    It was demonstrated recently that the line graphs are clustered and assortative. These topological features are known to characterize some social networks [M.E.J. Newman, Y. Park, Why social networks are different from other types of networks, Phys. Rev. E 68 (2003) 036122]; it was argued that this similarity reveals their cliquey character. In the model proposed here, a social network is the line graph of an initial network of families, communities, interest groups, school classes and small companies. These groups play the role of nodes, and individuals are represented by links between these nodes. The picture is supported by the data on the LiveJournal network of about 8×10 6 people.

  3. Semantic mining of social networks

    CERN Document Server

    Tang, Jie

    2015-01-01

    The first kinds of questions we try to answer are: What are the fundamental factors that form the different categories of social ties? How have reciprocal relationships been developed fro parasocial relationships? How do connected users further form groups? Another theme addressed in this book is the study of social influence. Social influence occurs when one's opinions, emotions, or behaviors are affected by others, intentionally or unintentionally. Considerable research has been conducted to verify the existence of social influence in various networks.

  4. Social contagions on time-varying community networks

    CERN Document Server

    Liu, Mian-Xin; Liu, Ying; Tang, Ming; Cai, Shi-Min; Zhang, Hai-Feng

    2016-01-01

    Time-varying community structures widely exist in various real-world networks. However, the spreading dynamics on this kind of network has not been fully studied. To this end, we systematically study the effects of time-varying community structures on social contagions. We first propose a non-Markovian social contagion model on time-varying community networks based on the activity driven network model, in which an individual adopts a behavior if and only if the accumulated behavioral information it has ever received reaches a threshold. Then, we develop a mean-field theory to describe the proposed model. From theoretical analyses and numerical simulations, we find that behavior adoption in the social contagions exhibits a hierarchical feature, i.e., the behavior first quickly spreads in one of the communities, and then outbreaks in the other. Moreover, under different behavioral information transmission rates, the final behavior adoption proportion in the whole network versus the community strength shows one ...

  5. Hierarchical Route Optimization By Using Memetic Algorithm In A Mobile Networks

    Directory of Open Access Journals (Sweden)

    K .K. Gautam

    2011-02-01

    Full Text Available The networks Mobility (NEMO Protocol is a way of managing the mobility of an entire network, and mobile internet protocol is the basic solution for networks Mobility. A hierarchical route optimization system for mobile network is proposed to solve management of hierarchical route optimization problems. In present paper we study hierarchical Route Optimization scheme using memetic algorithm(HROSMA The concept of optimization- finding the extreme of a function that maps candidate ‘solution’ to scalar values of ‘quality’ – is an extremely general and useful idea. For solving this problem, we use a few salient adaptations, and we also extend HROSMA perform routing between the mobile networks.

  6. Online Identities and Social Networking

    Science.gov (United States)

    Maheswaran, Muthucumaru; Ali, Bader; Ozguven, Hatice; Lord, Julien

    Online identities play a critical role in the social web that is taking shape on the Internet. Despite many technical proposals for creating and managing online identities, none has received widespread acceptance. Design and implementation of online identities that are socially acceptable on the Internet remains an open problem. This chapter discusses the interplay between online identities and social networking. Online social networks (OSNs) are growing at a rapid pace and has millions of members in them. While the recent trend is to create explicit OSNs such as Facebook and MySpace, we also have implicit OSNs such as interaction graphs created by email and instant messaging services. Explicit OSNs allow users to create profiles and use them to project their identities on the web. There are many interesting identity related issues in the context of social networking including how OSNs help and hinder the definition of online identities.

  7. Organizational networks and social capital

    DEFF Research Database (Denmark)

    Svendsen, Gunnar Lind Haase; Waldstrøm, Christian

    2013-01-01

    This chapter presents a framework for understanding organizational networks and social capital through the lens of “social capital ownership” as well as the private and collective goods provided through this ownership. More specifically, it argues that ownership of social capital in organizations...... is closely connected to four types of social capital – two belonging to the bridging social capital type, and two belonging to the bonding social capital type. The chapter first reviews literature on organizational social capital and then directly focuses on ownership of social capital in organizations......, as well as the derived benefits, or losses. Next, the chapter presents an empirical case apt to illustrate the theoretical findings in part one, namely the nineteenth-century Danish Cooperative Dairy Movement (Svendsen and Svendsen 2004). It is demonstrated how social capital among Danish peasants...

  8. Organizational networks and social capital

    DEFF Research Database (Denmark)

    Svendsen, Gunnar Lind Haase; Waldstrøm, Christian

    2013-01-01

    This chapter presents a framework for understanding organizational networks and social capital through the lens of “social capital ownership” as well as the private and collective goods provided through this ownership. More specifically, it argues that ownership of social capital in organizations...... is closely connected to four types of social capital – two belonging to the bridging social capital type, and two belonging to the bonding social capital type. The chapter first reviews literature on organizational social capital and then directly focuses on ownership of social capital in organizations......, as well as the derived benefits, or losses. Next, the chapter presents an empirical case apt to illustrate the theoretical findings in part one, namely the nineteenth-century Danish Cooperative Dairy Movement (Svendsen and Svendsen 2004). It is demonstrated how social capital among Danish peasants...

  9. Identifying time-delayed gene regulatory networks via an evolvable hierarchical recurrent neural network.

    Science.gov (United States)

    Kordmahalleh, Mina Moradi; Sefidmazgi, Mohammad Gorji; Harrison, Scott H; Homaifar, Abdollah

    2017-01-01

    The modeling of genetic interactions within a cell is crucial for a basic understanding of physiology and for applied areas such as drug design. Interactions in gene regulatory networks (GRNs) include effects of transcription factors, repressors, small metabolites, and microRNA species. In addition, the effects of regulatory interactions are not always simultaneous, but can occur after a finite time delay, or as a combined outcome of simultaneous and time delayed interactions. Powerful biotechnologies have been rapidly and successfully measuring levels of genetic expression to illuminate different states of biological systems. This has led to an ensuing challenge to improve the identification of specific regulatory mechanisms through regulatory network reconstructions. Solutions to this challenge will ultimately help to spur forward efforts based on the usage of regulatory network reconstructions in systems biology applications. We have developed a hierarchical recurrent neural network (HRNN) that identifies time-delayed gene interactions using time-course data. A customized genetic algorithm (GA) was used to optimize hierarchical connectivity of regulatory genes and a target gene. The proposed design provides a non-fully connected network with the flexibility of using recurrent connections inside the network. These features and the non-linearity of the HRNN facilitate the process of identifying temporal patterns of a GRN. Our HRNN method was implemented with the Python language. It was first evaluated on simulated data representing linear and nonlinear time-delayed gene-gene interaction models across a range of network sizes and variances of noise. We then further demonstrated the capability of our method in reconstructing GRNs of the Saccharomyces cerevisiae synthetic network for in vivo benchmarking of reverse-engineering and modeling approaches (IRMA). We compared the performance of our method to TD-ARACNE, HCC-CLINDE, TSNI and ebdbNet across different network

  10. Evaluation of Social Network Sites Information Architecture Using Hierarchical Task Analysis——Taking Huaban Website as an Example%基于层次任务分析的社交网站信息构建评估——以花瓣网为例

    Institute of Scientific and Technical Information of China (English)

    董玮; 詹庆东

    2012-01-01

    Based on the study of huaban website, this paper analyses and evaluates social network sites information architecture through the methods of hierarchical task analysis and user testing. It introduces three methods of evaluation on information architecture, then proposes the website hierarchical diagram and specific plan. Using the data from the user testing of designed tasks, the paper standardizes the tested data with four indicators, and calculates a score of website information architecture to recognise information architecture problems.%在综合比较三种网站信息构建评估方法的基础上,采用层次任务分析与用户测试相结合的方法对社交网站的信息构建进行系统分析与评估,以社交分享类网站——花瓣网为例:首先构建花瓣网层次任务图与行动计划,然后进行用户任务测试,使用4种度量指标对测试数据进行标准化处理,最后得出网站信息构建评估分数,发现该网站信息构建中存在的问题。

  11. On Social and Economic Networks

    NARCIS (Netherlands)

    A. Galeotti

    2005-01-01

    textabstractYou can call it a clan, or a network, or a family, or a group of friends. The way you call it is not relevant. What matters is that it exists and often you will need one. A large body of empirical work shows that networks are pervasive in social and economic interactions. This book conta

  12. Social networks and research output

    NARCIS (Netherlands)

    Ductor, L.; Fafchamps, M.; Goyal, S.; van der Leij, M.J.

    2014-01-01

    We study how knowledge about the social network of an individual researcher - as embodied in his coauthor relations - helps us in developing a more accurate prediction of his future productivity. We find that incorporating information about coauthor networks leads to a modest improvement in the accu

  13. Social Networks and Sales Performance

    Directory of Open Access Journals (Sweden)

    Danny Pimentel Claro

    2011-05-01

    Full Text Available This paper argues that an informal network can itself be a basis for the increase in a sales manager’s performance. Informal networks create a structure that surpasses the formal hierarchical structure defined by the firm. We concentrated on the advice network and considered two different views of network structure that claim to have impact on performance. To explore this claim, we examined whether sales managers develop either a highly cohesive network structure (i.e. Coleman’s view or one containing structural holes (i.e. Burt’s view in order to achieve higher sales. We also investigated the matter of tie strength put forward by Granovetter in his seminal 1973 work. Census data was collected from about 500 personnel from an agricultural input retailer having 23 divisions. Estimates from a sample of 101 sales managers showed the importance of a highly cohesive structure (degree centrality for the three measures of sales manager’s performance. The strong ties have a positive impact on performance, suggesting the importance of building up strong bonds with network contacts. Sales managers’ age, time within the retailer and education also influence performance. These results imply that firms should stimulate contacts among personnel to spread technical and commercial information.

  14. Relationship between Social Networks Adoption and Social Intelligence

    Science.gov (United States)

    Gunduz, Semseddin

    2017-01-01

    The purpose of this study was to set forth the relationship between the individuals' states to adopt social networks and social intelligence and analyze both concepts according to various variables. Research data were collected from 1145 social network users in the online media by using the Adoption of Social Network Scale and Social Intelligence…

  15. Coevolution of Information Processing and Topology in Hierarchical Adaptive Random Boolean Networks

    CERN Document Server

    Gorski, Piotr J; Holyst, Janusz A

    2015-01-01

    Random Boolean networks (RBNs) are frequently employed for modelling complex systems driven by information processing, e.g. for gene regulatory networks (GRNs). Here we propose a hierarchical adaptive RBN (HARBN) as a system consisting of distinct adaptive RBNs - subnetworks - connected by a set of permanent interlinks. Information measures and internal subnetworks topology of HARBN coevolve and reach steady-states that are specific for a given network structure. We investigate mean node information, mean edge information as well as a mean node degree as functions of model parameters and demonstrate HARBN's ability to describe complex hierarchical systems.

  16. Social contagions on weighted networks

    Science.gov (United States)

    Zhu, Yu-Xiao; Wang, Wei; Tang, Ming; Ahn, Yong-Yeol

    2017-07-01

    We investigate critical behaviors of a social contagion model on weighted networks. An edge-weight compartmental approach is applied to analyze the weighted social contagion on strongly heterogenous networks with skewed degree and weight distributions. We find that degree heterogeneity cannot only alter the nature of contagion transition from discontinuous to continuous but also can enhance or hamper the size of adoption, depending on the unit transmission probability. We also show that the heterogeneity of weight distribution always hinders social contagions, and does not alter the transition type.

  17. Social contagions on weighted networks

    CERN Document Server

    Zhu, Yu-Xiao; Tang, Ming; Ahn, Yong-Yeol

    2016-01-01

    We investigate critical behaviors of a social contagion model on weighted networks. An edge-weight compartmental approach is applied to analyze the weighted social contagion on strongly heterogenous networks with skewed degree and weight distributions. We find that degree heterogeneity can not only alter the nature of contagion transition from discontinuous to continuous but also can enhance or hamper the size of adoption, depending on the unit transmission probability. We also show that, the heterogeneity of weight distribution always hinder social contagions, and does not alter the transition type.

  18. Sustained Activity in Hierarchical Modular Neural Networks: Self-Organized Criticality and Oscillations

    Science.gov (United States)

    Wang, Sheng-Jun; Hilgetag, Claus C.; Zhou, Changsong

    2010-01-01

    Cerebral cortical brain networks possess a number of conspicuous features of structure and dynamics. First, these networks have an intricate, non-random organization. In particular, they are structured in a hierarchical modular fashion, from large-scale regions of the whole brain, via cortical areas and area subcompartments organized as structural and functional maps to cortical columns, and finally circuits made up of individual neurons. Second, the networks display self-organized sustained activity, which is persistent in the absence of external stimuli. At the systems level, such activity is characterized by complex rhythmical oscillations over a broadband background, while at the cellular level, neuronal discharges have been observed to display avalanches, indicating that cortical networks are at the state of self-organized criticality (SOC). We explored the relationship between hierarchical neural network organization and sustained dynamics using large-scale network modeling. Previously, it was shown that sparse random networks with balanced excitation and inhibition can sustain neural activity without external stimulation. We found that a hierarchical modular architecture can generate sustained activity better than random networks. Moreover, the system can simultaneously support rhythmical oscillations and SOC, which are not present in the respective random networks. The mechanism underlying the sustained activity is that each dense module cannot sustain activity on its own, but displays SOC in the presence of weak perturbations. Therefore, the hierarchical modular networks provide the coupling among subsystems with SOC. These results imply that the hierarchical modular architecture of cortical networks plays an important role in shaping the ongoing spontaneous activity of the brain, potentially allowing the system to take advantage of both the sensitivity of critical states and the predictability and timing of oscillations for efficient information

  19. Sustained activity in hierarchical modular neural networks: self-organized criticality and oscillations

    Directory of Open Access Journals (Sweden)

    Sheng-Jun Wang

    2011-06-01

    Full Text Available Cerebral cortical brain networks possess a number of conspicuous features of structure and dynamics. First, these networks have an intricate, non-random organization. They are structured in a hierarchical modular fashion, from large-scale regions of the whole brain, via cortical areas and area subcompartments organized as structural and functional maps to cortical columns, and finally circuits made up of individual neurons. Second, the networks display self-organized sustained activity, which is persistent in the absence of external stimuli. At the systems level, such activity is characterized by complex rhythmical oscillations over a broadband background, while at the cellular level, neuronal discharges have been observed to display avalanches, indicating that cortical networks are at the state of self-organized criticality. We explored the relationship between hierarchical neural network organization and sustained dynamics using large-scale network modeling. It was shown that sparse random networks with balanced excitation and inhibition can sustain neural activity without external stimulation. We find that a hierarchical modular architecture can generate sustained activity better than random networks. Moreover, the system can simultaneously support rhythmical oscillations and self-organized criticality, which are not present in the respective random networks. The underlying mechanism is that each dense module cannot sustain activity on its own, but displays self-organized criticality in the presence of weak perturbations. The hierarchical modular networks provide the coupling among subsystems with self-organized criticality. These results imply that the hierarchical modular architecture of cortical networks plays an important role in shaping the ongoing spontaneous activity of the brain, potentially allowing the system to take advantage of both the sensitivityof critical state and predictability and timing of oscillations for efficient

  20. Sustained activity in hierarchical modular neural networks: self-organized criticality and oscillations.

    Science.gov (United States)

    Wang, Sheng-Jun; Hilgetag, Claus C; Zhou, Changsong

    2011-01-01

    Cerebral cortical brain networks possess a number of conspicuous features of structure and dynamics. First, these networks have an intricate, non-random organization. In particular, they are structured in a hierarchical modular fashion, from large-scale regions of the whole brain, via cortical areas and area subcompartments organized as structural and functional maps to cortical columns, and finally circuits made up of individual neurons. Second, the networks display self-organized sustained activity, which is persistent in the absence of external stimuli. At the systems level, such activity is characterized by complex rhythmical oscillations over a broadband background, while at the cellular level, neuronal discharges have been observed to display avalanches, indicating that cortical networks are at the state of self-organized criticality (SOC). We explored the relationship between hierarchical neural network organization and sustained dynamics using large-scale network modeling. Previously, it was shown that sparse random networks with balanced excitation and inhibition can sustain neural activity without external stimulation. We found that a hierarchical modular architecture can generate sustained activity better than random networks. Moreover, the system can simultaneously support rhythmical oscillations and SOC, which are not present in the respective random networks. The mechanism underlying the sustained activity is that each dense module cannot sustain activity on its own, but displays SOC in the presence of weak perturbations. Therefore, the hierarchical modular networks provide the coupling among subsystems with SOC. These results imply that the hierarchical modular architecture of cortical networks plays an important role in shaping the ongoing spontaneous activity of the brain, potentially allowing the system to take advantage of both the sensitivity of critical states and the predictability and timing of oscillations for efficient information

  1. Vaccines, Contagion, and Social Networks

    CERN Document Server

    Ogburn, Elizabeth L

    2014-01-01

    Consider the causal effect that one individual's treatment may have on another individual's outcome when the outcome is contagious, with specific application to the effect of vaccination on an infectious disease outcome. The effect of one individual's vaccination on another's outcome can be decomposed into two different causal effects, called the "infectiousness" and "contagion" effects. We present identifying assumptions and estimation or testing procedures for infectiousness and contagion effects in two different settings: (1) using data sampled from independent groups of observations, and (2) using data collected from a single interdependent social network. The methods that we propose for social network data require fitting generalized linear models (GLMs). GLMs and other statistical models that require independence across subjects have been used widely to estimate causal effects in social network data, but, because the subjects in networks are presumably not independent, the use of such models is generall...

  2. Assortative model for social networks

    Science.gov (United States)

    Catanzaro, Michele; Caldarelli, Guido; Pietronero, Luciano

    2004-09-01

    In this Brief Report we present a version of a network growth model, generalized in order to describe the behavior of social networks. The case of study considered is the preprint archive at cul.arxiv.org. Each node corresponds to a scientist, and a link is present whenever two authors wrote a paper together. This graph is a nice example of degree-assortative network, that is, to say a network where sites with similar degree are connected to each other. The model presented is one of the few able to reproduce such behavior, giving some insight on the microscopic dynamics at the basis of the graph structure.

  3. Prolonging the Lifetime of Wireless Sensor Networks Interconnected to Fixed Network Using Hierarchical Energy Tree Based Routing Algorithm

    Directory of Open Access Journals (Sweden)

    M. Kalpana

    2014-01-01

    Full Text Available This research work proposes a mathematical model for the lifetime of wireless sensor networks (WSN. It also proposes an energy efficient routing algorithm for WSN called hierarchical energy tree based routing algorithm (HETRA based on hierarchical energy tree constructed using the available energy in each node. The energy efficiency is further augmented by reducing the packet drops using exponential congestion control algorithm (TCP/EXP. The algorithms are evaluated in WSNs interconnected to fixed network with seven distribution patterns, simulated in ns2 and compared with the existing algorithms based on the parameters such as number of data packets, throughput, network lifetime, and data packets average network lifetime product. Evaluation and simulation results show that the combination of HETRA and TCP/EXP maximizes longer network lifetime in all the patterns. The lifetime of the network with HETRA algorithm has increased approximately 3.2 times that of the network implemented with AODV.

  4. Dynamic Hierarchical Sleep Scheduling for Wireless Ad-Hoc Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chih-Yu Wen

    2009-05-01

    Full Text Available This paper presents two scheduling management schemes for wireless sensor networks, which manage the sensors by utilizing the hierarchical network structure and allocate network resources efficiently. A local criterion is used to simultaneously establish the sensing coverage and connectivity such that dynamic cluster-based sleep scheduling can be achieved. The proposed schemes are simulated and analyzed to abstract the network behaviors in a number of settings. The experimental results show that the proposed algorithms provide efficient network power control and can achieve high scalability in wireless sensor networks.

  5. Social networks and environmental outcomes.

    Science.gov (United States)

    Barnes, Michele L; Lynham, John; Kalberg, Kolter; Leung, PingSun

    2016-06-07

    Social networks can profoundly affect human behavior, which is the primary force driving environmental change. However, empirical evidence linking microlevel social interactions to large-scale environmental outcomes has remained scarce. Here, we leverage comprehensive data on information-sharing networks among large-scale commercial tuna fishers to examine how social networks relate to shark bycatch, a global environmental issue. We demonstrate that the tendency for fishers to primarily share information within their ethnic group creates segregated networks that are strongly correlated with shark bycatch. However, some fishers share information across ethnic lines, and examinations of their bycatch rates show that network contacts are more strongly related to fishing behaviors than ethnicity. Our findings indicate that social networks are tied to actions that can directly impact marine ecosystems, and that biases toward within-group ties may impede the diffusion of sustainable behaviors. Importantly, our analysis suggests that enhanced communication channels across segregated fisher groups could have prevented the incidental catch of over 46,000 sharks between 2008 and 2012 in a single commercial fishery.

  6. An Isolation Intrusion Detection System for Hierarchical Wireless Sensor Networks

    OpenAIRE

    Rung-Ching Chen; Chia-Fen Hsieh; Yung-Fa Huang

    2010-01-01

    A wireless sensor network (WSN) is a wireless network consisting of spatially distributed autonomous devices using sensors to cooperatively monitor environmental conditions, such as battlefield data and personal health information, and some environment limited resources. To avoid malicious damage is important while information is transmitted in wireless network. Thus, Wireless Intrusion Detection Systems are crucial to safe operation in wireless sensor networks. Wireless networks are subject ...

  7. Exact and Approximate Inference in Associative Hierarchical Networks using Graph Cuts

    CERN Document Server

    Russell, Chris; Kohli, Pushmeet; Torr, Philip H S

    2012-01-01

    Markov Networks are widely used through out computer vision and machine learning. An important subclass are the Associative Markov Networks which are used in a wide variety of applications. For these networks a good approximate minimum cost solution can be found efficiently using graph cut based move making algorithms such as alpha- expansion. Recently a related model has been proposed, the associative hierarchical net- work, which provides a natural generalisation of the Associative Markov Network for higher order cliques (i.e. clique size greater than two). This method provides a good model for object class segmentation problem in com- puter vision. Within this paper we briefly describe the associative hierarchical network and provide a computationally efficient method for ap- proximate inference based on graph cuts. Our method performs well for networks con- taining hundreds of thousand of variables, and higher order potentials are defined over cliques containing tens of thousands of vari- ables. Due to th...

  8. The Griffiths Phase on Hierarchical Modular Networks with Small-world Edges

    CERN Document Server

    Li, Shanshan

    2016-01-01

    The Griffiths phase has been proposed to induce a stretched critical regime that facilitates self organizing of brain networks for optimal function. This phase stems from the intrinsic structural heterogeneity of brain networks, such as the hierarchical modular structure. In this work, we extend this concept to modified hierarchical networks with small-world connections based on Hanoi networks [1]. Through extensive simulations, we identify the essential role played by the exponential distribution of the inter-moduli connectivity probability across hierarchies on the emergence of the Griffiths phase in this network. Additionally, the spectral analysis on the adjacency matrix of the relevant networks [2] shows that a localized principle eigenvector is not necessarily the fingerprint of the Griffiths phase.

  9. Social networks and bronchial asthma.

    Science.gov (United States)

    D'Amato, Gennaro; Cecchi, Lorenzo; Liccardi, Gennaro; D'Amato, Maria; Stanghellini, Giovanni

    2013-02-01

    To focus on both positive and negative aspects of the interaction between asthmatic patients and the social networks, and to highlight the need of a psychological approach in some individuals to integrate pharmacological treatment is the purpose of review. There is evidence that in some asthmatic patients, the excessive use of social networks can induce depression and stress triggering bronchial obstruction, whereas in others their rational use can induce beneficial effects in terms of asthma management. The increasing asthma prevalence in developed countries seen at the end of last century has raised concern for the considerable burden of this disease on society as well as individuals. Bronchial asthma is a disease in which psychological implications play a role in increasing or in reducing the severity of bronchial obstruction. Internet and, in particular, social media are increasingly a part of daily life of both young and adult people, thus allowing virtual relationships with peers sharing similar interests and goals. Although social network users often disclose more about themselves online than they do in person, there might be a risk for adolescents and for sensitive individuals, who can be negatively influenced by an incorrect use. However, although some studies show an increased risk of depression, other observations suggest beneficial effects of social networks by enhancing communication, social connection and self-esteem.

  10. NEW METHOD TO ESTIMATE SCALING OF POWER-LAW DEGREE DISTRIBUTION AND HIERARCHICAL NETWORKS

    Institute of Scientific and Technical Information of China (English)

    YANG Bo; DUAN Wen-qi; CHEN Zhong

    2006-01-01

    A new method and corresponding numerical procedure are introduced to estimate scaling exponents of power-law degree distribution and hierarchical clustering func tion for complex networks. This method can overcome the biased and inaccurate faults of graphical linear fitting methods commonly used in current network research. Furthermore, it is verified to have higher goodness-of-fit than graphical methods by comparing the KS (Kolmogorov-Smirnov) test statistics for 10 CNN (Connecting Nearest-Neighbor)networks.

  11. Networks in Social Policy Problems

    Science.gov (United States)

    Vedres, Balázs; Scotti, Marco

    2012-08-01

    1. Introduction M. Scotti and B. Vedres; Part I. Information, Collaboration, Innovation: The Creative Power of Networks: 2. Dissemination of health information within social networks C. Dhanjal, S. Blanchemanche, S. Clemençon, A. Rona-Tas and F. Rossi; 3. Scientific teams and networks change the face of knowledge creation S. Wuchty, J. Spiro, B. F. Jones and B. Uzzi; 4. Structural folds: the innovative potential of overlapping groups B. Vedres and D. Stark; 5. Team formation and performance on nanoHub: a network selection challenge in scientific communities D. Margolin, K. Ognyanova, M. Huang, Y. Huang and N. Contractor; Part II. Influence, Capture, Corruption: Networks Perspectives on Policy Institutions: 6. Modes of coordination of collective action: what actors in policy making? M. Diani; 7. Why skewed distributions of pay for executives is the cause of much grief: puzzles and few answers so far B. Kogut and J.-S. Yang; 8. Networks of institutional capture: a case of business in the State apparatus E. Lazega and L. Mounier; 9. The social and institutional structure of corruption: some typical network configurations of corruption transactions in Hungary Z. Szántó, I. J. Tóth and S. Varga; Part III. Crisis, Extinction, World System Change: Network Dynamics on a Large Scale: 10. How creative elements help the recovery of networks after crisis: lessons from biology A. Mihalik, A. S. Kaposi, I. A. Kovács, T. Nánási, R. Palotai, Á. Rák, M. S. Szalay-Beko and P. Csermely; 11. Networks and globalization policies D. R. White; 12. Network science in ecology: the structure of ecological communities and the biodiversity question A. Bodini, S. Allesina and C. Bondavalli; 13. Supply security in the European natural gas pipeline network M. Scotti and B. Vedres; 14. Conclusions and outlook A.-L. Barabási; Index.

  12. Interests Diffusion in Social Networks

    CERN Document Server

    D'Agostino, Gregorio; De Nicola, Antonio; Tucci, Salvatore

    2015-01-01

    Understanding cultural phenomena on Social Networks (SNs) and exploiting the implicit knowledge about their members is attracting the interest of different research communities both from the academic and the business side. The community of complexity science is devoting significant efforts to define laws, models, and theories, which, based on acquired knowledge, are able to predict future observations (e.g. success of a product). In the mean time, the semantic web community aims at engineering a new generation of advanced services by defining constructs, models and methods, adding a semantic layer to SNs. In this context, a leapfrog is expected to come from a hybrid approach merging the disciplines above. Along this line, this work focuses on the propagation of individual interests in social networks. The proposed framework consists of the following main components: a method to gather information about the members of the social networks; methods to perform some semantic analysis of the Domain of Interest; a p...

  13. Modular networks with hierarchical organization: The dynamical implications of complex structure

    Indian Academy of Sciences (India)

    Raj Kumar Pan; Sitabhra Sinha

    2008-08-01

    Several networks occurring in real life have modular structures that are arranged in a hierarchical fashion. In this paper, we have proposed a model for such networks, using a stochastic generation method. Using this model we show that, the scaling relation between the clustering and degree of the nodes is not a necessary property of hierarchical modular networks, as had previously been suggested on the basis of a deterministically constructed model. We also look at dynamics on such networks, in particular, the stability of equilibria of network dynamics and of synchronized activity in the network. For both of these, we find that, increasing modularity or the number of hierarchical levels tends to increase the probability of instability. As both hierarchy and modularity are seen in natural systems, which necessarily have to be robust against environmental fluctuations, we conclude that additional constraints are necessary for the emergence of hierarchical structure, similar to the occurrence of modularity through multi-constraint optimization as shown by us previously.

  14. BRAND COMMUNICATION ON SOCIAL NETWORKS

    Directory of Open Access Journals (Sweden)

    Otilia-Elena PLATON

    2015-07-01

    Full Text Available The communication represents a basic element for the marketing activity that helps companies to achieve their objectives. Building long-term relationships between brands and consumers is one of the most important objectives pursued by marketers. This involves brand communication and creating multiple connections with consumers, even in the online environment. From this point of view, social networks proved to be an effective way of linking brands and consumers online. This paper aims to present some aspects involved by the usage of social networks in brand communication by analyzing several examples of online marketing campaigns implemented on Facebook on the occasion of Valentine's Day by six different brands.

  15. Social Networks as Marketing Tools

    Directory of Open Access Journals (Sweden)

    NOZHA ERRAGCHA

    2014-05-01

    Full Text Available The aims of this paper is to reinforce the literature on the digital social networks and their influences on the marketing Having presented and categorized the digital social, networks, we highlighted, the opportunities which brings Web2.0 to the marketing. The advent of Web2.0 imposed fundamental changes Which required the revalorization of the role of the consumer in the marketing approach. Indeed, this one is not passive any more, but it becomes a co-value-creating for the company

  16. Dynamics in online social networks

    CERN Document Server

    Grabowicz, Przemyslaw A; Eguiluz, Victor M

    2012-01-01

    An increasing number of today's social interactions occurs using online social media as communication channels. Some online social networks have become extremely popular in the last decade. They differ among themselves in the character of the service they provide to online users. For instance, Facebook can be seen mainly as a platform for keeping in touch with close friends and relatives, Twitter is used to propagate and receive news, LinkedIn facilitates the maintenance of professional contacts, Flickr gathers amateurs and professionals of photography, etc. Albeit different, all these online platforms share an ingredient that pervades all their applications. There exists an underlying social network that allows their users to keep in touch with each other and helps to engage them in common activities or interactions leading to a better fulfillment of the service's purposes. This is the reason why these platforms share a good number of functionalities, e.g., personal communication channels, broadcasted status...

  17. Navigating Social Networks

    Science.gov (United States)

    Hamblin, DeAnna; Bartlett, Marilyn J.

    2013-01-01

    The authors note that when it comes to balancing free speech and schools' responsibilities, the online world is largely uncharted waters. Questions remain about the rights of both students and teachers in the world of social media. Although the lower courts have ruled that students' freedom of speech rights offer them some protection for…

  18. Navigating Social Networks

    Science.gov (United States)

    Hamblin, DeAnna; Bartlett, Marilyn J.

    2013-01-01

    The authors note that when it comes to balancing free speech and schools' responsibilities, the online world is largely uncharted waters. Questions remain about the rights of both students and teachers in the world of social media. Although the lower courts have ruled that students' freedom of speech rights offer them some protection for…

  19. Group Recommendation in Social Networks

    Science.gov (United States)

    2011-01-01

    the Facebook social graph are connected to each other via relationships. Bret Taylor is a fan of the Coca - Cola page, and Bret Taylor and Arjun...even used for business promotions like organizing events and taking surveys etc. Consider for example, if you would like to conduct a survey it...takes a lot of effort in terms of the promotion to reach out to the intended audience. Using social networks targeting the audience and reaching out

  20. Social networks user: current research

    Directory of Open Access Journals (Sweden)

    Agadullina E.R.

    2015-12-01

    Full Text Available The purpose of this article is to review current research studies focusing on the users of Facebook and their behaviors in social networks. This review is organized into two sections: 1 social-demographic characteristics (Age, Gender, Nationality; 2 personality characteristics (Neuroticism, Extraversion, Openness-to-Experience, Agreeableness, Conscientiousness, Narcissism, Self-esteem. The results showed that the information in the personal profile and online behavior are strongly connected with socio-demographic and personality characteristics

  1. SOCIAL NETWORK EFFECTS ON ROMANTIC RELATIONSHIP

    Directory of Open Access Journals (Sweden)

    Fatma CAN

    2015-06-01

    Full Text Available The main objective of the study was to obtain information about social network variables in order to predict the relational commitment of married individuals and people having dating relationships. For this purpose, social network analysis has been carried out on 134 people having dating relationship and 154 married individuals and then Relationship Stability Scale, Subjective Norm Scale and Social Network Feature Survey prepared by the researcher were used. The results indicated that the approval of the closest social network member and the level of enjoyment of each other’s social network members had the best predictive value for relationship satisfaction and the investment to the relationship. The results also demonstrated that, approval of the social network had a negative impact on the level of the quality of alternatives and it showed that social networks were seen as a barrier function to have alternative relationships. Furthermore, by dividing social network members into two groups, for the dating group, the approval of the social network was the most significant variable for commitment but in the married group, the need for social network approval was not an important criteria because of having their relatioship already confirmed legally. When social network members were categorised and examined, the closest social network members did not differ by sex, but were varied in terms of relationship types. In the flirt group, one of their friends among his/her social network and their partners’ social network was specified as the closest social network member whereas in the married group, the closest social network member among his/her social network was their mother while it was their sibling among partner’s social network.

  2. Social networks: communication and change

    Directory of Open Access Journals (Sweden)

    Gustavo Cardoso

    2011-01-01

    Full Text Available Virtual social networks have brought about the possibility for open and plural debate, where all those with the necessary literacy skills and means are able to participate in the creation and dissemination of information. By pressing political agents and determining the “agenda” of a lot of the media, users demonstrate that we stand at an ideal platform for creating both real social movements and more or less fleeting events, as manifestos or virtual campaigns. Nonetheless, in order to understand the role of virtual social networks in today’s world, we need to answer some prior questions. Are we facing a new communication model, whereby the product of “disinterested” interactivity creates an aura of confidence in disseminated information, often quite higher that that seen in the “old media”? Will that interactivity be a chance to fight-off citizens’ growing detachment with regard to the “res publica”? Will we find in citizen-made journalism, transmitted through virtual social networks, the consecration of a true fourth power? On the other hand, can we call the distinct collective movements we have seen emerging true “social movements”?The present article aims to examine this and other issues that come to the fore in the intricate social world of cyberspace.

  3. Social networks and factor markets

    DEFF Research Database (Denmark)

    Abay, Kibrom Araya; Kahsay, Goytom Abraha; Berhane, Guush

    2017-01-01

    We investigate the role of an indigenous social network in Ethiopia, the iddir, in facilitating factor market transactions among smallholder farmers. We use a detailed longitudinal household survey data and employ a fixed effects estimation to identify the effect of iddir membership on factor...... market transactions among farmers. We find that joining an iddir network improves households’ access to land, labour and credit transactions. Our findings also hint that iddir networks may crowd-out borrowing from local moneylenders (locally referred as ‘Arata Abedari’), a relatively expensive credit...

  4. Data Mining on Social Interaction Networks

    OpenAIRE

    Atzmueller, Martin

    2013-01-01

    Social media and social networks have already woven themselves into the very fabric of everyday life. This results in a dramatic increase of social data capturing various relations between the users and their associated artifacts, both in online networks and the real world using ubiquitous devices. In this work, we consider social interaction networks from a data mining perspective - also with a special focus on real-world face-to-face contact networks: We combine data mining and social netwo...

  5. Application of growing hierarchical SOM for visualisation of network forensics traffic data.

    Science.gov (United States)

    Palomo, E J; North, J; Elizondo, D; Luque, R M; Watson, T

    2012-08-01

    Digital investigation methods are becoming more and more important due to the proliferation of digital crimes and crimes involving digital evidence. Network forensics is a research area that gathers evidence by collecting and analysing network traffic data logs. This analysis can be a difficult process, especially because of the high variability of these attacks and large amount of data. Therefore, software tools that can help with these digital investigations are in great demand. In this paper, a novel approach to analysing and visualising network traffic data based on growing hierarchical self-organising maps (GHSOM) is presented. The self-organising map (SOM) has been shown to be successful for the analysis of highly-dimensional input data in data mining applications as well as for data visualisation in a more intuitive and understandable manner. However, the SOM has some problems related to its static topology and its inability to represent hierarchical relationships in the input data. The GHSOM tries to overcome these limitations by generating a hierarchical architecture that is automatically determined according to the input data and reflects the inherent hierarchical relationships among them. Moreover, the proposed GHSOM has been modified to correctly treat the qualitative features that are present in the traffic data in addition to the quantitative features. Experimental results show that this approach can be very useful for a better understanding of network traffic data, making it easier to search for evidence of attacks or anomalous behaviour in a network environment. Copyright © 2012 Elsevier Ltd. All rights reserved.

  6. Purity homophily in social networks.

    Science.gov (United States)

    Dehghani, Morteza; Johnson, Kate; Hoover, Joe; Sagi, Eyal; Garten, Justin; Parmar, Niki Jitendra; Vaisey, Stephen; Iliev, Rumen; Graham, Jesse

    2016-03-01

    Does sharing moral values encourage people to connect and form communities? The importance of moral homophily (love of same) has been recognized by social scientists, but the types of moral similarities that drive this phenomenon are still unknown. Using both large-scale, observational social-media analyses and behavioral lab experiments, the authors investigated which types of moral similarities influence tie formations. Analysis of a corpus of over 700,000 tweets revealed that the distance between 2 people in a social-network can be predicted based on differences in the moral purity content-but not other moral content-of their messages. The authors replicated this finding by experimentally manipulating perceived moral difference (Study 2) and similarity (Study 3) in the lab and demonstrating that purity differences play a significant role in social distancing. These results indicate that social network processes reflect moral selection, and both online and offline differences in moral purity concerns are particularly predictive of social distance. This research is an attempt to study morality indirectly using an observational big-data study complemented with 2 confirmatory behavioral experiments carried out using traditional social-psychology methodology.

  7. Social Networking: Keeping It Clean

    Science.gov (United States)

    Waters, John K.

    2011-01-01

    The need to maintain an unpolluted learning environment is no easy task for schools and districts that have incorporated social networking sites into their educational life. The staff and teachers at Blaine High School in Minnesota's Anoka-Hennepin District 11 had been considering the pros and cons of establishing a school Facebook page when the…

  8. Privacy and Social Networking Sites

    Science.gov (United States)

    Timm, Dianne M.; Duven, Carolyn J.

    2008-01-01

    College students are relying on the Internet to make connections with other people every day. As the Internet has developed and grown, so have the capabilities for interaction. Social networking sites, a group of Web sites that provide people with the opportunity to create an online profile and to share that profile with others, are a part of…

  9. Node Classification in Social Networks

    Science.gov (United States)

    Bhagat, Smriti; Cormode, Graham; Muthukrishnan, S.

    When dealing with large graphs, such as those that arise in the context of online social networks, a subset of nodes may be labeled. These labels can indicate demographic values, interest, beliefs or other characteristics of the nodes (users). A core problem is to use this information to extend the labeling so that all nodes are assigned a label (or labels).

  10. A Hierarchical Approach to Persistent Scatterer Network Construction and Deformation Time Series Estimation

    Directory of Open Access Journals (Sweden)

    Rui Zhang

    2014-12-01

    Full Text Available This paper presents a hierarchical approach to network construction and time series estimation in persistent scatterer interferometry (PSI for deformation analysis using the time series of high-resolution satellite SAR images. To balance between computational efficiency and solution accuracy, a dividing and conquering algorithm (i.e., two levels of PS networking and solution is proposed for extracting deformation rates of a study area. The algorithm has been tested using 40 high-resolution TerraSAR-X images collected between 2009 and 2010 over Tianjin in China for subsidence analysis, and validated by using the ground-based leveling measurements. The experimental results indicate that the hierarchical approach can remarkably reduce computing time and memory requirements, and the subsidence measurements derived from the hierarchical solution are in good agreement with the leveling data.

  11. Social structure of Facebook networks

    Science.gov (United States)

    Traud, Amanda L.; Mucha, Peter J.; Porter, Mason A.

    2012-08-01

    We study the social structure of Facebook “friendship” networks at one hundred American colleges and universities at a single point in time, and we examine the roles of user attributes-gender, class year, major, high school, and residence-at these institutions. We investigate the influence of common attributes at the dyad level in terms of assortativity coefficients and regression models. We then examine larger-scale groupings by detecting communities algorithmically and comparing them to network partitions based on user characteristics. We thereby examine the relative importance of different characteristics at different institutions, finding for example that common high school is more important to the social organization of large institutions and that the importance of common major varies significantly between institutions. Our calculations illustrate how microscopic and macroscopic perspectives give complementary insights on the social organization at universities and suggest future studies to investigate such phenomena further.

  12. Social inheritance can explain the structure of animal social networks.

    Science.gov (United States)

    Ilany, Amiyaal; Akçay, Erol

    2016-06-28

    The social network structure of animal populations has major implications for survival, reproductive success, sexual selection and pathogen transmission of individuals. But as of yet, no general theory of social network structure exists that can explain the diversity of social networks observed in nature, and serve as a null model for detecting species and population-specific factors. Here we propose a simple and generally applicable model of social network structure. We consider the emergence of network structure as a result of social inheritance, in which newborns are likely to bond with maternal contacts, and via forming bonds randomly. We compare model output with data from several species, showing that it can generate networks with properties such as those observed in real social systems. Our model demonstrates that important observed properties of social networks, including heritability of network position or assortative associations, can be understood as consequences of social inheritance.

  13. Social inheritance can explain the structure of animal social networks

    Science.gov (United States)

    Ilany, Amiyaal; Akçay, Erol

    2016-01-01

    The social network structure of animal populations has major implications for survival, reproductive success, sexual selection and pathogen transmission of individuals. But as of yet, no general theory of social network structure exists that can explain the diversity of social networks observed in nature, and serve as a null model for detecting species and population-specific factors. Here we propose a simple and generally applicable model of social network structure. We consider the emergence of network structure as a result of social inheritance, in which newborns are likely to bond with maternal contacts, and via forming bonds randomly. We compare model output with data from several species, showing that it can generate networks with properties such as those observed in real social systems. Our model demonstrates that important observed properties of social networks, including heritability of network position or assortative associations, can be understood as consequences of social inheritance. PMID:27352101

  14. Detecting Hidden Hierarchy of Non Hierarchical Terrorist Networks

    DEFF Research Database (Denmark)

    Memon, Nasrullah

    to analyze terrorist networks and prioritize their targets. Applying recently introduced mathematical methods for constructing the hidden hierarchy of "nonhierarchical" terrorist networks; we present case studies of the terrorist attacks occurred / planned in the past, in order to identify hidden hierarchy...

  15. A Hierarchical Multiobjective Routing Model for MPLS Networks with Two Service Classes

    Science.gov (United States)

    Craveirinha, José; Girão-Silva, Rita; Clímaco, João; Martins, Lúcia

    This work presents a model for multiobjective routing in MPLS networks formulated within a hierarchical network-wide optimization framework, with two classes of services, namely QoS and Best Effort (BE) services. The routing model uses alternative routing and hierarchical optimization with two optimization levels, including fairness objectives. Another feature of the model is the use of an approximate stochastic representation of the traffic flows in the network, based on the concept of effective bandwidth. The theoretical foundations of a heuristic strategy for finding “good” compromise solutions to the very complex bi-level routing optimization problem, based on a conjecture concerning the definition of marginal implied costs for QoS flows and BE flows, will be described. The main features of a first version of this heuristic based on a bi-objective shortest path model and some preliminary results for a benchmark network will also be revealed.

  16. An Advanced Survey on Secure Energy-Efficient Hierarchical Routing Protocols in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Abdoulaye Diop

    2013-01-01

    Full Text Available Wireless Sensor Networks (WSNs are often deployed in hostile environments, which make such networks highly vulnerable and increase the risk of attacks against this type of network. WSN comprise of large number of sensor nodes with different hardware abilities and functions. Due to the limited memory resources and energy constraints, complex security algorithms cannot be used in sensor networks. Therefore, it is necessary to balance between the security level and the associated energy consumption overhead to mitigate the security risks. Hierarchical routing protocol is more energy-efficient than other routing protocols in WSNs. Many secure cluster-based routing protocols have been proposed in the literature to overcome these constraints. In this paper, we discuss Secure Energy-Efficient Hierarchical Routing Protocols in WSNs and compare them in terms of security, performance and efficiency. Security issues for WSNs and their solutions are also discussed.

  17. Effective Hierarchical Routing Algorithm for Large-scale Wireless Mobile Networks

    Directory of Open Access Journals (Sweden)

    Guofeng Yan

    2014-02-01

    Full Text Available The growing interest in wireless mobile network techniques has resulted in many routing protocol proposals. The unpredictable motion and the unreliable behavior of mobile nodes is one of the key issues in wireless mobile network. Virtual mobile node (VMN consists of robust virtual nodes that are both predictable and reliable. Based on VMN, in this paper, we present a hierarchical routing algorithm, i.e., EHRA-WAVE, for large-scale wireless mobile networks. By using mobile WAVE technology, a routing path can be found rapidly between VMNs without accurate topology information. We introduce the routing algorithm and the implementation issues of the proposed EHRA-WAVE routing algorithm. Finally, we evaluate the performance of EHRA-WAVE through experiments, and compare the performance on VMN failure and message delivery ratio using hierarchical and non-hierarchical routing methods. However, due to the large amounts WAVE flooding, EHRAWAVE results in too large load which would impede the application of the EHRA-WAVE algorithm. Therefore, the further routing protocol focuses on minimizing the number of WAVE using hierarchical structures in large-scale wireless mobile networks

  18. Bottom-up GGM algorithm for constructing multiple layered hierarchical gene regulatory networks

    Science.gov (United States)

    Multilayered hierarchical gene regulatory networks (ML-hGRNs) are very important for understanding genetics regulation of biological pathways. However, there are currently no computational algorithms available for directly building ML-hGRNs that regulate biological pathways. A bottom-up graphic Gaus...

  19. A Novel Hierarchical Semi-centralized Telemedicine Network Architecture Proposition for Bangladesh

    DEFF Research Database (Denmark)

    Choudhury, Samiul; Peterson, Carrie Beth; Kyriazakos, Sofoklis

    2011-01-01

    where there are extreme paucities of efficient healthcare professionals and equipments, specifically in the rural areas. In this paper a novel, hierarchical and semi-centralized telemedicine network architecture has been proposed holisti-cally focusing on the rural underdeveloped areas of Bangladesh...... of Bangladesh. Finally, some features and services associated with the model have also been proposed which are pragmatic and easily implementable....

  20. Strategies of Legitimacy Through Social Media: The Networked Strategy

    DEFF Research Database (Denmark)

    Castelló, Itziar; Etter, Michael; Nielsen, Finn Årup

    2016-01-01

    , legitimacy gains may increase when firms are able to reduce the control over the engagements and relate non-hierarchically with their publics. We contribute to the extant literature on political corporate social responsibility and legitimacy by providing an understanding of a new context for engagement......How can corporations develop legitimacy when coping with stakeholders who have multiple, often conflicting sustainable development (SD) agendas? We address this question by conducting an in-depth longitudinal case study of a corporation's stakeholder engagement in social media and propose...... that reconfigures cultural, network, and power relations between the firm and their stakeholders in ways that challenge previous forms of legitimation....

  1. Social Networking: It's Not What You Think

    Science.gov (United States)

    Jones, Kevin D.

    2010-01-01

    This slide presentation reviews some of the current uses of the social networking sites available on the internet. It list some of the skills that are now considered obsolete and reviews the major social networking sites.

  2. The exact Laplacian spectrum for the Dyson hierarchical network

    CERN Document Server

    Agliari, Elena

    2016-01-01

    We consider the Dyson hierarchical graph $\\mathcal{G}$, that is a weighted fully-connected graph, where the pattern of weights is ruled by the parameter $\\sigma \\in (1/2, 1]$. Exploiting the deterministic recursivity through which $\\mathcal{G}$ is built, we are able to derive explicitly the whole set of the eigenvalues and the eigenvectors for its Laplacian matrix. Given that the Laplacian operator is intrinsically implied in the analysis of dynamic processes (e.g., random walks) occurring on the graph, as well as in the investigation of the dynamical properties of connected structures themselves (e.g., vibrational structures and the relaxation modes), this result allows addressing analytically a large class of problems. In particular, as examples of applications, we study the random walk and the continuous-time quantum walk embedded in $\\mathcal{G}$, and the relaxation times of a polymer whose structure is described by $\\mathcal{G}$.

  3. The exact Laplacian spectrum for the Dyson hierarchical network

    Science.gov (United States)

    Agliari, Elena; Tavani, Flavia

    2017-01-01

    We consider the Dyson hierarchical graph , that is a weighted fully-connected graph, where the pattern of weights is ruled by the parameter σ ∈ (1/2, 1]. Exploiting the deterministic recursivity through which is built, we are able to derive explicitly the whole set of the eigenvalues and the eigenvectors for its Laplacian matrix. Given that the Laplacian operator is intrinsically implied in the analysis of dynamic processes (e.g., random walks) occurring on the graph, as well as in the investigation of the dynamical properties of connected structures themselves (e.g., vibrational structures and relaxation modes), this result allows addressing analytically a large class of problems. In particular, as examples of applications, we study the random walk and the continuous-time quantum walk embedded in , the relaxation times of a polymer whose structure is described by , and the community structure of in terms of modularity measures.

  4. Cluster based hierarchical resource searching model in P2P network

    Institute of Scientific and Technical Information of China (English)

    Yang Ruijuan; Liu Jian; Tian Jingwen

    2007-01-01

    For the problem of large network load generated by the Gnutella resource-searching model in Peer to Peer (P2P) network, a improved model to decrease the network expense is proposed, which establishes a duster in P2P network,auto-organizes logical layers, and applies a hybrid mechanism of directional searching and flooding. The performance analysis and simulation results show that the proposed hierarchical searching model has availably reduced the generated message load and that its searching-response time performance is as fairly good as that of the Gnutella model.

  5. Avalanche transmission and critical behaviour in load-bearing hierarchical networks

    Indian Academy of Sciences (India)

    Ajay Deep Kachhvah; Neelima Gupte

    2011-11-01

    The strength and stability properties of hierarchical load-bearing networks and their strengthened variants have been discussed in a recent work. Here, we study the avalanche time distributions on these load-bearing networks. The avalanche time distributions of the V-lattice, a unique realization of the networks, show power-law behaviour when tested with certain fractions of its trunk weights. All other avalanche distributions show Gaussian peaked behaviour. Thus the V-lattice is the critical case of the network. We discuss the implications of this result.

  6. Internal representation of hierarchical sequences involves the default network

    Directory of Open Access Journals (Sweden)

    Rogers Baxter P

    2010-04-01

    Full Text Available Abstract Background The default network is a set of brain regions that exhibit a reduction in BOLD response during attention-demanding cognitive tasks, and distinctive patterns of functional connectivity that typically include anti-correlations with a fronto-parietal network involved in attention, working memory, and executive control. The function of the default network regions has been attributed to introspection, self-awareness, and theory of mind judgments, and some of its regions are involved in episodic memory processes. Results Using the method of psycho-physiological interactions, we studied the functional connectivity of several regions in a fronto-parietal network involved in a paired image discrimination task involving transitive inference. Some image pairs were derived from an implicit underlying sequence A>B>C>D>E, and some were independent (F>G, H>J, etc. Functional connectivity between the fronto-parietal regions and the default network regions depended on the presence of the underlying sequence relating the images. When subjects viewed learned and novel pairs from the sequence, connectivity between these two networks was higher than when subjects viewed learned and novel pairs from the independent sets. Conclusions These results suggest that default network regions were involved in maintaining the internal model that subserved discrimination of image pairs derived from the implicit sequence, and contributed to introspective access of an internal sequence model built during training. The default network may not be a unified entity with a specific function, but rather may interact with other functional networks in task-dependent ways.

  7. Masculinity, Educational Achievement and Social Status: A Social Network Analysis

    Science.gov (United States)

    Lusher, Dean

    2011-01-01

    This study utilises a quantitative case study social network approach to explore the connection between masculinity and scholastic achievement in two secondary, all-boys schools in Australia. In both schools two social networks representing social status are explored: the "friendship" network as a measure of status that includes…

  8. Social Network Analysis and informal trade

    DEFF Research Database (Denmark)

    Walther, Olivier

    networks can be applied to better understand informal trade in developing countries, with a particular focus on Africa. The paper starts by discussing some of the fundamental concepts developed by social network analysis. Through a number of case studies, we show how social network analysis can...... illuminate the relevant causes of social patterns, the impact of social ties on economic performance, the diffusion of resources and information, and the exercise of power. The paper then examines some of the methodological challenges of social network analysis and how it can be combined with other...... approaches. The paper finally highlights some of the applications of social network analysis and their implications for trade policies....

  9. Privacy and Security: Online Social Networking

    Directory of Open Access Journals (Sweden)

    Akriti Verma, Deepak Kshirsagar, Sana Khan

    2013-03-01

    Full Text Available Online Social Networking (OSN sites such asFacebook, Twitter, Google+ attract hundreds andmillions of users. Such social networks have acentralized architecture wherein user's private dataand user generated content are centrally owned by asingle administrative domain that managescommunication between its users. As a result,centralized social networks have gatheredunprecedented amounts of data about the behaviorsand personalities of individuals, raising majorprivacy and security concerns. This has put indemand for a decentralized social networking sitethat addresses the privacy and security issues.

  10. Multilevel hierarchical kernel spectral clustering for real-life large scale complex networks.

    Directory of Open Access Journals (Sweden)

    Raghvendra Mall

    Full Text Available Kernel spectral clustering corresponds to a weighted kernel principal component analysis problem in a constrained optimization framework. The primal formulation leads to an eigen-decomposition of a centered Laplacian matrix at the dual level. The dual formulation allows to build a model on a representative subgraph of the large scale network in the training phase and the model parameters are estimated in the validation stage. The KSC model has a powerful out-of-sample extension property which allows cluster affiliation for the unseen nodes of the big data network. In this paper we exploit the structure of the projections in the eigenspace during the validation stage to automatically determine a set of increasing distance thresholds. We use these distance thresholds in the test phase to obtain multiple levels of hierarchy for the large scale network. The hierarchical structure in the network is determined in a bottom-up fashion. We empirically showcase that real-world networks have multilevel hierarchical organization which cannot be detected efficiently by several state-of-the-art large scale hierarchical community detection techniques like the Louvain, OSLOM and Infomap methods. We show that a major advantage of our proposed approach is the ability to locate good quality clusters at both the finer and coarser levels of hierarchy using internal cluster quality metrics on 7 real-life networks.

  11. Dynamic Hierarchical Energy-Efficient Method Based on Combinatorial Optimization for Wireless Sensor Networks.

    Science.gov (United States)

    Chang, Yuchao; Tang, Hongying; Cheng, Yongbo; Zhao, Qin; Yuan, Baoqing Li andXiaobing

    2017-07-19

    Routing protocols based on topology control are significantly important for improving network longevity in wireless sensor networks (WSNs). Traditionally, some WSN routing protocols distribute uneven network traffic load to sensor nodes, which is not optimal for improving network longevity. Differently to conventional WSN routing protocols, we propose a dynamic hierarchical protocol based on combinatorial optimization (DHCO) to balance energy consumption of sensor nodes and to improve WSN longevity. For each sensor node, the DHCO algorithm obtains the optimal route by establishing a feasible routing set instead of selecting the cluster head or the next hop node. The process of obtaining the optimal route can be formulated as a combinatorial optimization problem. Specifically, the DHCO algorithm is carried out by the following procedures. It employs a hierarchy-based connection mechanism to construct a hierarchical network structure in which each sensor node is assigned to a special hierarchical subset; it utilizes the combinatorial optimization theory to establish the feasible routing set for each sensor node, and takes advantage of the maximum-minimum criterion to obtain their optimal routes to the base station. Various results of simulation experiments show effectiveness and superiority of the DHCO algorithm in comparison with state-of-the-art WSN routing algorithms, including low-energy adaptive clustering hierarchy (LEACH), hybrid energy-efficient distributed clustering (HEED), genetic protocol-based self-organizing network clustering (GASONeC), and double cost function-based routing (DCFR) algorithms.

  12. Interests diffusion in social networks

    Science.gov (United States)

    D'Agostino, Gregorio; D'Antonio, Fulvio; De Nicola, Antonio; Tucci, Salvatore

    2015-10-01

    We provide a model for diffusion of interests in Social Networks (SNs). We demonstrate that the topology of the SN plays a crucial role in the dynamics of the individual interests. Understanding cultural phenomena on SNs and exploiting the implicit knowledge about their members is attracting the interest of different research communities both from the academic and the business side. The community of complexity science is devoting significant efforts to define laws, models, and theories, which, based on acquired knowledge, are able to predict future observations (e.g. success of a product). In the mean time, the semantic web community aims at engineering a new generation of advanced services by defining constructs, models and methods, adding a semantic layer to SNs. In this context, a leapfrog is expected to come from a hybrid approach merging the disciplines above. Along this line, this work focuses on the propagation of individual interests in social networks. The proposed framework consists of the following main components: a method to gather information about the members of the social networks; methods to perform some semantic analysis of the Domain of Interest; a procedure to infer members' interests; and an interests evolution theory to predict how the interests propagate in the network. As a result, one achieves an analytic tool to measure individual features, such as members' susceptibilities and authorities. Although the approach applies to any type of social network, here it is has been tested against the computer science research community. The DBLP (Digital Bibliography and Library Project) database has been elected as test-case since it provides the most comprehensive list of scientific production in this field.

  13. Exploring Impact: Negative Effects of Social Networks

    OpenAIRE

    Egbert, Henrik; Sedlarski, Teodor

    2011-01-01

    he sociological literature on social networks emphasizes by and large positive network effects. Negative effects of such networks are discussed rather rarely. This paper tackles negative effects by applying economic theory, particularly neoclassical theory, new institutional theory and the results from experimental economics to the concept of social networks. In the paper it is assumed that social networks are exclusive and since exclusiveness affects the allocation of resources, negative ext...

  14. Leveraging social networks for toxicovigilance.

    Science.gov (United States)

    Chary, Michael; Genes, Nicholas; McKenzie, Andrew; Manini, Alex F

    2013-06-01

    The landscape of drug abuse is shifting. Traditional means of characterizing these changes, such as national surveys or voluntary reporting by frontline clinicians, can miss changes in usage the emergence of novel drugs. Delays in detecting novel drug usage patterns make it difficult to evaluate public policy aimed at altering drug abuse. Increasingly, newer methods to inform frontline providers to recognize symptoms associated with novel drugs or methods of administration are needed. The growth of social networks may address this need. The objective of this manuscript is to introduce tools for using data from social networks to characterize drug abuse. We outline a structured approach to analyze social media in order to capture emerging trends in drug abuse by applying powerful methods from artificial intelligence, computational linguistics, graph theory, and agent-based modeling. First, we describe how to obtain data from social networks such as Twitter using publicly available automated programmatic interfaces. Then, we discuss how to use artificial intelligence techniques to extract content useful for purposes of toxicovigilance. This filtered content can be employed to generate real-time maps of drug usage across geographical regions. Beyond describing the real-time epidemiology of drug abuse, techniques from computational linguistics can uncover ways that drug discussions differ from other online conversations. Next, graph theory can elucidate the structure of networks discussing drug abuse, helping us learn what online interactions promote drug abuse and whether these interactions differ among drugs. Finally, agent-based modeling relates online interactions to psychological archetypes, providing a link between epidemiology and behavior. An analysis of social media discussions about drug abuse patterns with computational linguistics, graph theory, and agent-based modeling permits the real-time monitoring and characterization of trends of drugs of abuse. These

  15. Topological evolution of virtual social networks by modeling social activities

    Science.gov (United States)

    Sun, Xin; Dong, Junyu; Tang, Ruichun; Xu, Mantao; Qi, Lin; Cai, Yang

    2015-09-01

    With the development of Internet and wireless communication, virtual social networks are becoming increasingly important in the formation of nowadays' social communities. Topological evolution model is foundational and critical for social network related researches. Up to present most of the related research experiments are carried out on artificial networks, however, a study of incorporating the actual social activities into the network topology model is ignored. This paper first formalizes two mathematical abstract concepts of hobbies search and friend recommendation to model the social actions people exhibit. Then a social activities based topology evolution simulation model is developed to satisfy some well-known properties that have been discovered in real-world social networks. Empirical results show that the proposed topology evolution model has embraced several key network topological properties of concern, which can be envisioned as signatures of real social networks.

  16. Organizational Application of Social Networking Information Technologies

    Science.gov (United States)

    Reppert, Jeffrey R.

    2012-01-01

    The focus of this qualitative research study using the Delphi method is to provide a framework for leaders to develop their own social networks. By exploring concerns in four areas, leaders may be able to better plan, implement, and manage social networking systems in organizations. The areas addressed are: (a) social networking using…

  17. Challenges for Mobile Social Networking Applications

    Science.gov (United States)

    Rana, Juwel; Kristiansson, Johan; Hallberg, Josef; Synnes, Kåre

    This paper presents work in progress regarding utilization of social network information for mobile applications. Primarily a number of challenges are identified, such as how to mine data from multiple social networks, how to integrate and consolidate social networks, and how to manage semantic information for mobile applications. The challenges are discussed from a semantic Web perspective using a driving scenario as motivation.

  18. Integration of scientific and social networks

    NARCIS (Netherlands)

    Neshati, Mahmood; Hiemstra, Djoerd; Asgari, Ehsaneddin; Beigy, Hamid

    In this paper, we address the problem of scientific-social network integration to find a matching relationship between members of these networks (i.e. The DBLP publication network and the Twitter social network). This task is a crucial step toward building a multi environment expert finding system

  19. Hierarchical Synchrony of Phase Oscillators in Modular Networks

    CERN Document Server

    Skardal, Per Sebastian

    2011-01-01

    We study synchronization of sinusoidally coupled phase oscillators on networks with modular structure and a large number of oscillators in each community. Of particular interest is the hierarchy of local and global synchrony, i.e., synchrony within and between communities, respectively. Using the recent ansatz of Ott and Antonsen, we find that the degree of local synchrony can be determined from a set of coupled low-dimensional equations. If the number of communities in the network is large, a low-dimensional description of global synchrony can be also found. Using these results, we study bifurcations between different types of synchrony. We find that, depending on the relative strength of local and global coupling, the transition to synchrony in the network can be mediated by local or global effects.

  20. Multistage Campaigning in Social Networks

    CERN Document Server

    Farajtabar, Mehrdad; Harati, Sahar; Song, Le; Zha, Hongyuan

    2016-01-01

    We consider the problem of how to optimize multi-stage campaigning over social networks. The dynamic programming framework is employed to balance the high present reward and large penalty on low future outcome in the presence of extensive uncertainties. In particular, we establish theoretical foundations of optimal campaigning over social networks where the user activities are modeled as a multivariate Hawkes process, and we derive a time dependent linear relation between the intensity of exogenous events and several commonly used objective functions of campaigning. We further develop a convex dynamic programming framework for determining the optimal intervention policy that prescribes the required level of external drive at each stage for the desired campaigning result. Experiments on both synthetic data and the real-world MemeTracker dataset show that our algorithm can steer the user activities for optimal campaigning much more accurately than baselines.

  1. From Offline Social Networks to Online Social Networks: Changes in Entrepreneurship

    Directory of Open Access Journals (Sweden)

    Yang SONG

    2015-01-01

    Full Text Available The paper reviewed studies of entrepreneurship based on the emergency of online social networks. Similar to offline social networks, entrepreneurs’ online social networks have their own unique characteristics. We first reviewed the offline network based research on entrepreneurship. Then we reviewed the studies of entrepreneurship in the context of online social networks including those focusing on topics of network structures and network ties. We highlighted online network communities based on the data collected from LinkedIn, Facebook and Twitter. Our research implies that both researcher and entrepreneurs are facing new opportunities due to the emergence of online social networks.

  2. Identifying overlapping and hierarchical thematic structures in networks of scholarly papers: a comparison of three approaches.

    Science.gov (United States)

    Havemann, Frank; Gläser, Jochen; Heinz, Michael; Struck, Alexander

    2012-01-01

    The aim of this paper is to introduce and assess three algorithms for the identification of overlapping thematic structures in networks of papers. We implemented three recently proposed approaches to the identification of overlapping and hierarchical substructures in graphs and applied the corresponding algorithms to a network of 492 information-science papers coupled via their cited sources. The thematic substructures obtained and overlaps produced by the three hierarchical cluster algorithms were compared to a content-based categorisation, which we based on the interpretation of titles, abstracts, and keywords. We defined sets of papers dealing with three topics located on different levels of aggregation: h-index, webometrics, and bibliometrics. We identified these topics with branches in the dendrograms produced by the three cluster algorithms and compared the overlapping topics they detected with one another and with the three predefined paper sets. We discuss the advantages and drawbacks of applying the three approaches to paper networks in research fields.

  3. Identifying overlapping and hierarchical thematic structures in networks of scholarly papers: a comparison of three approaches.

    Directory of Open Access Journals (Sweden)

    Frank Havemann

    Full Text Available The aim of this paper is to introduce and assess three algorithms for the identification of overlapping thematic structures in networks of papers. We implemented three recently proposed approaches to the identification of overlapping and hierarchical substructures in graphs and applied the corresponding algorithms to a network of 492 information-science papers coupled via their cited sources. The thematic substructures obtained and overlaps produced by the three hierarchical cluster algorithms were compared to a content-based categorisation, which we based on the interpretation of titles, abstracts, and keywords. We defined sets of papers dealing with three topics located on different levels of aggregation: h-index, webometrics, and bibliometrics. We identified these topics with branches in the dendrograms produced by the three cluster algorithms and compared the overlapping topics they detected with one another and with the three predefined paper sets. We discuss the advantages and drawbacks of applying the three approaches to paper networks in research fields.

  4. Hierarchical network architectures of carbon fiber paper supported cobalt oxide nanonet for high-capacity pseudocapacitors.

    Science.gov (United States)

    Yang, Lei; Cheng, Shuang; Ding, Yong; Zhu, Xingbao; Wang, Zhong Lin; Liu, Meilin

    2012-01-11

    We present a high-capacity pseudocapacitor based on a hierarchical network architecture consisting of Co(3)O(4) nanowire network (nanonet) coated on a carbon fiber paper. With this tailored architecture, the electrode shows ideal capacitive behavior (rectangular shape of cyclic voltammograms) and large specific capacitance (1124 F/g) at high charge/discharge rate (25.34 A/g), still retaining ~94% of the capacitance at a much lower rate of 0.25 A/g. The much-improved capacity, rate capability, and cycling stability may be attributed to the unique hierarchical network structures, which improves electron/ion transport, enhances the kinetics of redox reactions, and facilitates facile stress relaxation during cycling.

  5. A CDMA Based Scalable Hierarchical Architecture for Network-On-Chip

    Directory of Open Access Journals (Sweden)

    Mohamed A. Abd El Ghany

    2012-09-01

    Full Text Available A Scalable hierarchical architecture based Code-Division Multiple Access (CDMA is proposed for high performance Network-on-Chip (NoC. This hierarchical architecture provides the integration of a large number of IPs in a single on-chip system. The network encoding and decoding schemes for CDMA transmission are provided. The proposed CDMA NoC architecture is compared to the conventional architecture in terms of latency, area and power dissipation. The overall area required to implement the proposed CDMA NoC design is reduced by 24.2%. The design decreases the latency of the network by 40%. The total power consumption required to achieve the proposed design is also decreased by 25%.

  6. Scaling of the Average Receiving Time on a Family of Weighted Hierarchical Networks

    Science.gov (United States)

    Sun, Yu; Dai, Meifeng; Sun, Yanqiu; Shao, Shuxiang

    2016-08-01

    In this paper, based on the un-weight hierarchical networks, a family of weighted hierarchical networks are introduced, the weight factor is denoted by r. The weighted hierarchical networks depend on the number of nodes in complete bipartite graph, denoted by n1, n2 and n = n1 + n2. Assume that the walker, at each step, starting from its current node, moves to any of its neighbors with probability proportional to the weight of edge linking them. We deduce the analytical expression of the average receiving time (ART). The obtained remarkable results display two conditions. In the large network, when nr > n1n2, the ART grows as a power-law function of the network size |V (Gk)| with the exponent, represented by θ =logn( nr n1n2 ), 0 < θ < 1. This means that the smaller the value of θ, the more efficient the process of receiving information. When nr ≤ n1n2, the ART grows with increasing order |V (Gk)| as logn|V (Gk)| or (logn|V (Gk)|)2.

  7. Web Mining and Social Networking

    DEFF Research Database (Denmark)

    Xu, Guandong; Zhang, Yanchun; Li, Lin

    This book examines the techniques and applications involved in the Web Mining, Web Personalization and Recommendation and Web Community Analysis domains, including a detailed presentation of the principles, developed algorithms, and systems of the research in these areas. The applications of web ...... sense of individuals or communities. The volume will benefit both academic and industry communities interested in the techniques and applications of web search, web data management, web mining and web knowledge discovery, as well as web community and social network analysis....

  8. When business networks “kill” social networks

    DEFF Research Database (Denmark)

    Jackson, Laurel; Young, L.

    2016-01-01

    that considers the changes to a community's social network and the associated norms emerging from the growing influence of a microfinance providers' network. A case study reports the impact of microfinance on a particular Bangladesh rural community. We show there is a breakdown in traditional social networks......Social networks are a key contributor to the economic and social fabric of life. There is evidence that the social cohesion that social networks provide is critical for societies to prosper economically and for development to be sustainable. These social networks and the functions they perform co......-exist with, influence and are influenced by the business networks of connected firms and other economic organisations that surround them. This is increasingly so in our ever-more-complex, internationalized and connected world. This paper explores the potential consequences of this influence via a case study...

  9. Social Networking Sites: A premise on enhancement

    Directory of Open Access Journals (Sweden)

    MANINDERPAL SINGH SAINI

    2013-12-01

    Full Text Available This article address five constructs that are paramount toward continued evolution of social networking sites (SNS`s they include, - stabilisation, visual, language, security and flexibility. These constructs add to our proposed framework. Firmly grounded research on social networking sites and literature, we propose that user feedback, is the critical component that stimulates the development and growth of social networking sites online. We offer a framework that can aid new and current social networking sites toward success. We conclude that the management of social networking sites should be treated as a process that is pragmatic and paradoxically, be stimulated.

  10. Handbook of social network technologies and applications

    CERN Document Server

    Furht, Borko

    2010-01-01

    Social networking is a concept that has existed for a long time; however, with the explosion of the Internet, social networking has become a tool for people to connect and communicate in ways that were impossible in the past. The recent development of Web 2.0 has provided many new applications, such as Myspace, Facebook, and LinkedIn. The purpose of ""Handbook of Social Networks: Technologies and Applications"" is to provide comprehensive guidelines on the current and future trends in social network technologies and applications in the field of Web-based Social Networks. This handbook includes

  11. Brand Marketing Model on Social Networks

    Directory of Open Access Journals (Sweden)

    Jolita Jezukevičiūtė

    2014-04-01

    Full Text Available The paper analyzes the brand and its marketing solutions onsocial networks. This analysis led to the creation of improvedbrand marketing model on social networks, which will contributeto the rapid and cheap organization brand recognition, increasecompetitive advantage and enhance consumer loyalty. Therefore,the brand and a variety of social networks are becoming a hotresearch area for brand marketing model on social networks.The world‘s most successful brand marketing models exploratoryanalysis of a single case study revealed a brand marketingsocial networking tools that affect consumers the most. Basedon information analysis and methodological studies, develop abrand marketing model on social networks.

  12. Synchronization in heterogeneous FitzHugh-Nagumo networks with hierarchical architecture

    Science.gov (United States)

    Plotnikov, S. A.; Lehnert, J.; Fradkov, A. L.; Schöll, E.

    2016-07-01

    We study synchronization in heterogeneous FitzHugh-Nagumo networks. It is well known that heterogeneities in the nodes hinder synchronization when becoming too large. Here we develop a controller to counteract the impact of these heterogeneities. We first analyze the stability of the equilibrium point in a ring network of heterogeneous nodes. We then derive a sufficient condition for synchronization in the absence of control. Based on these results we derive the controller providing synchronization for parameter values where synchronization without control is absent. We demonstrate our results in networks with different topologies. Particular attention is given to hierarchical (fractal) topologies, which are relevant for the architecture of the brain.

  13. Hierarchical micro-mobility management in high-speed multihop access networks

    Institute of Scientific and Technical Information of China (English)

    TANG Bi-hua; MA Xiao-lei; LIU Yuan-an; GAO Jin-chun

    2006-01-01

    This article integrates the hierarchical micro-mobility management and the high-speed multihop access networks (HMAN), to accomplish the smooth handover between different access routers. The proposed soft handover scheme in the high-speed HMAN can solve the micro-mobility management problem in the access network. This article also proposes the hybrid access router (AR) advertisement scheme and AR selection algorithm, which uses the time delay and stable route to the AR as the gateway selection parameters. By simulation, the proposed micro-mobility management scheme can achieve high packet delivery fraction and improve the lifetime of network.

  14. Using Social Network Research in HRM

    DEFF Research Database (Denmark)

    Kaše, Robert; King, Zella; Minbaeva, Dana

    2013-01-01

    The article features a conversation between Rob Cross and Martin Kilduff about organizational network analysis in research and practice. It demonstrates the value of using social network perspectives in HRM. Drawing on the discussion about managing personal networks; managing the networks of others......; the impact of social networking sites on perceptions of relationships; and ethical issues in organizational network analysis, we propose specific suggestions to bring social network perspectives closer to HRM researchers and practitioners and rebalance our attention to people and to their relationships....

  15. Topology of the correlation networks among major currencies using hierarchical structure methods

    Science.gov (United States)

    Keskin, Mustafa; Deviren, Bayram; Kocakaplan, Yusuf

    2011-02-01

    We studied the topology of correlation networks among 34 major currencies using the concept of a minimal spanning tree and hierarchical tree for the full years of 2007-2008 when major economic turbulence occurred. We used the USD (US Dollar) and the TL (Turkish Lira) as numeraires in which the USD was the major currency and the TL was the minor currency. We derived a hierarchical organization and constructed minimal spanning trees (MSTs) and hierarchical trees (HTs) for the full years of 2007, 2008 and for the 2007-2008 period. We performed a technique to associate a value of reliability to the links of MSTs and HTs by using bootstrap replicas of data. We also used the average linkage cluster analysis for obtaining the hierarchical trees in the case of the TL as the numeraire. These trees are useful tools for understanding and detecting the global structure, taxonomy and hierarchy in financial data. We illustrated how the minimal spanning trees and their related hierarchical trees developed over a period of time. From these trees we identified different clusters of currencies according to their proximity and economic ties. The clustered structure of the currencies and the key currency in each cluster were obtained and we found that the clusters matched nicely with the geographical regions of corresponding countries in the world such as Asia or Europe. As expected the key currencies were generally those showing major economic activity.

  16. Mapping the hierarchical layout of the structural network of the macaque prefrontal cortex.

    Science.gov (United States)

    Goulas, Alexandros; Uylings, Harry B M; Stiers, Peter

    2014-05-01

    A consensus on the prefrontal cortex (PFC) holds that it is pivotal for flexible behavior and the integration of the cognitive, affective, and motivational domains. Certain models have been put forth and a dominant model postulates a hierarchical anterior-posterior gradient. The structural connectivity principles of this model dictate that increasingly anterior PFC regions exhibit more efferent connections toward posterior ones than vice versa. Such hierarchical asymmetry principles are thought to pertain to the macaque PFC. Additionally, the laminar patterns of the connectivity of PFC regions can be used for defining hierarchies. In the current study, we formally tested the asymmetry-based hierarchical principles of the anterior-posterior model by employing an exhaustive dataset on macaque PFC connectivity and tools from network science. On the one hand, the asymmetry-based principles and predictions of the hierarchical anterior-posterior model were not confirmed. The wiring of the macaque PFC does not fully correspond to the principles of the model, and its asymmetry-based hierarchical layout does not follow a strict anterior-posterior gradient. On the other hand, our results suggest that the laminar-based hierarchy seems a more tenable working hypothesis for models advocating an anterior-posterior gradient. Our results can inform models of the human PFC.

  17. Sleeping of a Complex Brain Networks with Hierarchical Organization

    Institute of Scientific and Technical Information of China (English)

    ZHANG Ying-Yue; YANG Qiu-Ying; CHEN Tian-Lun

    2009-01-01

    The dynamical behavior in the cortical brain network of macaque is studied by modeling each cortical area with a subnetwork of interacting excitable neurons. We characterize the system by studying how to perform the transition, which is now topology-dependent, from the active state to that with no activity. This could be a naive model for the wakening and sleeping of a brain-like system, i.e., a multi-component system with two different dynamical behavior.

  18. Hierarchical brain networks active in approach and avoidance goal pursuit

    Directory of Open Access Journals (Sweden)

    Jeffrey Martin Spielberg

    2013-06-01

    Full Text Available Effective approach/avoidance goal pursuit is critical for attaining long-term health and well-being. Research on the neural correlates of key goal pursuit processes (e.g., motivation has long been of interest, with lateralization in prefrontal cortex being a particularly fruitful target of investigation. However, this literature has often been limited by a lack of spatial specificity and has not delineated the precise aspects of approach/avoidance motivation involved. Additionally, the relationships among brain regions (i.e., network connectivity vital to goal pursuit remain largely unexplored. Specificity in location, process, and network relationship is vital for moving beyond gross characterizations of function and identifying the precise cortical mechanisms involved in motivation. The present paper integrates research using more spatially specific methodologies (e.g., functional magnetic resonance imaging with the rich psychological literature on approach/avoidance to propose an integrative network model that takes advantage of the strengths of each of these literatures.

  19. Detecting Change in Longitudinal Social Networks

    Science.gov (United States)

    2011-01-01

    marketing campaigns and media on social behavior. Initial Construct populations, social and knowledge networks, can be hypothetical or real (Carley...patent data bases, phone-networks, email- based-networks, social- media networks and more. Page 6 of 37 Current methods of change detection in...CUSUM C Sta measured fo o be successf Average Bet ct either incre or each socia g increases in the data for fective for ch ork. tistic Over Tim

  20. Analyzing negative ties in social networks

    OpenAIRE

    Mankirat Kaur; Sarbjeet Singh

    2016-01-01

    Online social networks are a source of sharing information and maintaining personal contacts with other people through social interactions and thus forming virtual communities online. Social networks are crowded with positive and negative relations. Positive relations are formed by support, endorsement and friendship and thus, create a network of well-connected users whereas negative relations are a result of opposition, distrust and avoidance creating disconnected networks. Due to increase i...

  1. The model of social crypto-network

    Directory of Open Access Journals (Sweden)

    Марк Миколайович Орел

    2015-06-01

    Full Text Available The article presents the theoretical model of social network with the enhanced mechanism of privacy policy. It covers the problems arising in the process of implementing the mentioned type of network. There are presented the methods of solving problems arising in the process of building the social network with privacy policy. It was built a theoretical model of social networks with enhanced information protection methods based on information and communication blocks

  2. Frontoparietal Connectivity and Hierarchical Structure of the Brain’s Functional Network during Sleep

    Directory of Open Access Journals (Sweden)

    Victor I Spoormaker

    2012-05-01

    Full Text Available Frontal and parietal regions are associated with some of the most complex cognitive functions, and several frontoparietal resting-state networks can be observed in wakefulness. We used functional magnetic resonance imaging (fMRI data acquired in polysomnographically validated wakefulness, light sleep and slow-wave sleep to examine the hierarchical structure of a low-frequency functional brain network, and to examine whether frontoparietal connectivity would disintegrate in sleep. Whole-brain analyses with hierarchical cluster analysis on predefined atlases were performed, as well as regression of inferior parietal lobules seeds against all voxels in the brain, and an evaluation of the integrity of voxel time-courses in subcortical regions-of-interest. We observed that frontoparietal functional connectivity disintegrated in sleep stage 1 and was absent in deeper sleep stages. Slow-wave sleep was characterized by strong hierarchical clustering of local submodules. Frontoparietal connectivity between inferior parietal lobules and superior medial and right frontal gyrus was lower in sleep stages than in wakefulness. Moreover, thalamus voxels showed maintained integrity in sleep stage 1, making intrathalamic desynchronization an unlikely source of reduced thalamocortical connectivity in this sleep stage. Our data suggest a transition from a globally integrated functional brain network in wakefulness to a disintegrated network consisting of local submodules in slow-wave sleep, in which frontoparietal inter-modular nodes may play a crucial role, possibly in combination with the thalamus.

  3. Matching Community Structure Across Online Social Networks

    OpenAIRE

    Lin LI; Campbell, W. M.

    2016-01-01

    The discovery of community structure in networks is a problem of considerable interest in recent years. In online social networks, often times, users are simultaneously involved in multiple social media sites, some of which share common social relationships. It is of great interest to uncover a shared community structure across these networks. However, in reality, users typically identify themselves with different usernames across social media sites. This creates a great difficulty in detecti...

  4. Predicting Group Evolution in the Social Network

    OpenAIRE

    Bródka, Piotr; Kazienko, Przemysław; Kołoszczyk, Bartosz

    2012-01-01

    Groups - social communities are important components of entire societies, analysed by means of the social network concept. Their immanent feature is continuous evolution over time. If we know how groups in the social network has evolved we can use this information and try to predict the next step in the given group evolution. In the paper, a new aproach for group evolution prediction is presented and examined. Experimental studies on four evolving social networks revealed that (i) the predict...

  5. HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENSOR NETWORK

    Directory of Open Access Journals (Sweden)

    Mohammad Saiful Islam Mamun

    2010-07-01

    Full Text Available In recent years, wireless ad hoc sensor network becomes popular both in civil and military jobs.However, security is one of the significant challenges for sensor network because of their deploymentin open and unprotected environment. As cryptographic mechanism is not enough to protect sensornetwork from external attacks, intrusion detection system needs to be introduced. Though intrusionprevention mechanism is one of the major and efficient methods against attacks, but there might besome attacks for which prevention method is not known. Besides preventing the system from someknown attacks, intrusion detection system gather necessary information related to attack technique andhelp in the development of intrusion prevention system. In addition to reviewing the present attacksavailable in wireless sensor network this paper examines the current efforts to intrusion detectionsystem against wireless sensor network. In this paper we propose a hierarchical architectural designbased intrusion detection system that fits the current demands and restrictions of wireless ad hocsensor network. In this proposed intrusion detection system architecture we followed clusteringmechanism to build a four level hierarchical network which enhances network scalability to largegeographical area and use both anomaly and misuse detection techniques for intrusion detection. Weintroduce policy based detection mechanism as well as intrusion response together with GSM cellconcept for intrusion detection architecture.

  6. Social networks as journalistic paradigm

    Directory of Open Access Journals (Sweden)

    José Manuel Noguera Vivo, Ph. D

    2010-01-01

    Full Text Available Spain is one of the countries with higher use of social networks in the world. Among them, Facebook is emerging as one of the most significant internationally. If these phenomena are combined with the current transformation of journalism, it is not surprising that some Spanish cybermedia have approached this platform to develop new products for the Web. From this starting point, this article focuses on the recent performances of Spanish cybermedia within social networks, specifically Facebook, with an exploratory study about both the use of native media of Web and media from the print newspapers. This research studies the use of most important Spanish cybermedia from a structured observation. Data are collected through a content analysis with an ad hoc questionnaire. The results point out few cybermedia which seem to take advantage of these networks in terms of participation. This allows us to conclude that we are in a young state of relations on the Web, where spaces and resources are not optimized.

  7. Natural forest conservation hierarchical program with neural network

    Institute of Scientific and Technical Information of China (English)

    LUO Chuanwen; LI Jihong

    2006-01-01

    In this paper,the implementing steps of a natural forest protection program grading (NFPPG) with neural network (NN) were summarized and the concepts of program illustration,patch sign unification and regression,and inclining factor were set forth.Employing Arc/Info GIS,the tree species diversity and rarity,disturbance degree,protection of channel system,and classification management in the Maoershan National Forest Park were described,and used as the input factors of NN.The relationships between NFPPG and above factors were also analyzed.By artificially determining training samples,the NFPPG of Moershan National Forest Park was created.Tested with all patches in the park,the generalization of NFPPG was satisfied.NFPPG took both the classification management and the protection of forest community types into account,as well as the ecological environment.The excitation function of NFPPG was not seriously saturated,indicating the leading effect of the inclining factor on the network optimization.

  8. Social networks and human development / Redes sociales y desarrollo humano

    Directory of Open Access Journals (Sweden)

    Sara Gallego Trijueque

    2011-10-01

    Full Text Available The aim of this work is a brief introduction to the concept of social networks and their importance in society. Social networks have been responsible over the centuries to preserve community values, in addition to being facilitators of social interaction in human development processes, through communication and relationships between individuals.

  9. Evolving Social Networks via Friend Recommendations

    OpenAIRE

    Verma, Amit Kumar; Pal, Manjish

    2015-01-01

    A social network grows over a period of time with the formation of new connections and relations. In recent years we have witnessed a massive growth of online social networks like Facebook, Twitter etc. So it has become a problem of extreme importance to know the destiny of these networks. Thus predicting the evolution of a social network is a question of extreme importance. A good model for evolution of a social network can help in understanding the properties responsible for the changes occ...

  10. Location Privacy Protection on Social Networks

    Science.gov (United States)

    Zhan, Justin; Fang, Xing

    Location information is considered as private in many scenarios. Protecting location information on mobile ad-hoc networks has attracted much research in past years. However, location information protection on social networks has not been paid much attention. In this paper, we present a novel location privacy protection approach on the basis of user messages in social networks. Our approach grants flexibility to users by offering them multiple protecting options. To the best of our knowledge, this is the first attempt to protect social network users' location information via text messages. We propose five algorithms for location privacy protection on social networks.

  11. Will Learning Social Inclusion Assist Rural Networks

    Science.gov (United States)

    Marchant, Jillian

    2013-01-01

    Current research on social networks in some rural communities reports continuing demise despite efforts to build resilient communities. Several factors are identified as contributing to social decline including globalisation and rural social characteristics. Particular rural social characteristics, such as strong social bonds among members of…

  12. Will Learning Social Inclusion Assist Rural Networks

    Science.gov (United States)

    Marchant, Jillian

    2013-01-01

    Current research on social networks in some rural communities reports continuing demise despite efforts to build resilient communities. Several factors are identified as contributing to social decline including globalisation and rural social characteristics. Particular rural social characteristics, such as strong social bonds among members of…

  13. NHRPA: a novel hierarchical routing protocol algorithm for wireless sensor networks

    Institute of Scientific and Technical Information of China (English)

    CHENG Hong-bing; YANG Geng; HU Su-jun

    2008-01-01

    Considering severe resources constraints and security threat of wireless sensor networks (WSN), the article proposed a novel hierarchical routing protocol algorithm. The proposed routing protocol algorithm can adopt suitable routing technology for the nodes according to the distance of nodes to the base station, density of nodes distribution, and residual energy of nodes. Comparing the proposed routing protocol algorithm with simple direction diffusion routing technology, cluster-based routing mechanisms, and simple hierarchical routing protocol algorithm through comprehensive analysis and simulation in terms of the energy usage, packet latency, and security in the presence of node compromise attacks, the results show that the proposed routing protocol algorithm is more efficient for wireless sensor networks.

  14. Identifying Overlapping and Hierarchical Thematic Structures in Networks of Scholarly Papers: A Comparison of Three Approaches

    CERN Document Server

    Havemann, Frank; Heinz, Michael; Struck, Alexander

    2011-01-01

    We implemented three recently proposed approaches to the identification of overlapping and hierarchical substructures in graphs and applied the corresponding algorithms to a network of 492 information-science papers coupled via their cited sources. The thematic substructures obtained and overlaps produced by the three hierarchical cluster algorithms were compared to a content-based categorisation, which we based on the interpretation of titles and keywords. We defined sets of papers dealing with three topics located on different levels of aggregation: h-index, webometrics, and bibliometrics. We identified these topics with branches in the dendrograms produced by the three cluster algorithms and compared the overlapping topics they detected with one another and with the three pre-defined paper sets. We discuss the advantages and drawbacks of applying the three approaches to paper networks in research fields.

  15. Mobile Social Network in a Cultural Context

    DEFF Research Database (Denmark)

    Liu, Jun

    2010-01-01

    the chapter “Mobile Social Network in a Cultural Context” examines the guanxi-embedded mobile social network in China. By focusing on three concrete case studies with 56 in-depth interviews, including New Year text message greetings, mobile social networks for job allocations among migrant workers...... contributes to the explosive growth of the message within mobile social networks under special circumstances, such as during festivals and holidays and social disturbances. This circulation in turn increases both the dissemination and credibility of messages, and rumours. The characteristics and strength...

  16. Systemic risk and hierarchical transitions of financial networks

    Science.gov (United States)

    Nobi, Ashadun; Lee, Jae Woo

    2017-06-01

    In this paper, the change in topological hierarchy, which is measured by the minimum spanning tree constructed from the cross-correlations between the stock indices from the S & P 500 for 1998-2012 in a one year moving time window, was used to analyze a financial crisis. The hierarchy increased in all minor crises in the observation time window except for the sharp crisis of 2007-2008 when the global financial crisis occurred. The sudden increase in hierarchy just before the global financial crisis can be used for the early detection of an upcoming crisis. Clearly, the higher the hierarchy, the higher the threats to financial stability. The scaling relations were developed to observe the changes in hierarchy with the network topology. These scaling relations can also identify and quantify the financial crisis periods, and appear to contain the predictive power of an upcoming crisis.

  17. Communication Theories and Protocols for Smart Grid Hierarchical Network

    Directory of Open Access Journals (Sweden)

    CHHAYA Lipi

    2017-05-01

    Full Text Available Smart grid technology is a revolutionary approach for improvisation in existing power grid. Integration of electrical and communication infrastructure is inevitable for the deployment of Smart grid network. Smart grid infrastructure is characterized by full duplex communication, automatic metering infrastructure, renewable energy integration, distribution automation and complete monitoring and control of entire power grid. Different levels of smart grid deployment require diverse set of communication protocols. Application of information theory and optimization of various communication technologies is essential for layered architecture of smart grid technology. This paper is anticipated to serve as a comprehensive survey and analysis of communication theories and wireless communication protocols for optimization and design of energy efficient smart grid communication infrastructure.

  18. A Social Network Analysis of Occupational Segregation

    DEFF Research Database (Denmark)

    Buhai, Ioan Sebastian; van der Leij, Marco

    We develop a social network model of occupational segregation between different social groups, generated by the existence of positive inbreeding bias among individuals from the same group. If network referrals are important for job search, then expected homophily in the contact network structure...

  19. A Computer Network for Social Scientists.

    Science.gov (United States)

    Gerber, Barry

    1989-01-01

    Describes a microcomputer-based network developed at the University of California Los Angeles to support education in the social sciences. Topics discussed include technological, managerial, and academic considerations of university networking; the use of the network in teaching macroeconomics, social demographics, and symbolic logic; and possible…

  20. Computational social networks security and privacy

    CERN Document Server

    2012-01-01

    Presents the latest advances in security and privacy issues in computational social networks, and illustrates how both organizations and individuals can be protected from real-world threats Discusses the design and use of a wide range of computational tools and software for social network analysis Provides experience reports, survey articles, and intelligence techniques and theories relating to specific problems in network technology

  1. An evolutionary model of social networks

    Science.gov (United States)

    Ludwig, M.; Abell, P.

    2007-07-01

    Social networks in communities, markets, and societies self-organise through the interactions of many individuals. In this paper we use a well-known mechanism of social interactions — the balance of sentiment in triadic relations — to describe the development of social networks. Our model contrasts with many existing network models, in that people not only establish but also break up relations whilst the network evolves. The procedure generates several interesting network features such as a variety of degree distributions and degree correlations. The resulting network converges under certain conditions to a steady critical state where temporal disruptions in triangles follow a power-law distribution.

  2. Trust transitivity in social networks

    CERN Document Server

    Richters, Oliver

    2010-01-01

    Non-centralized recommendation-based decision making is a central feature of several social and technological processes, such as market dynamics, peer-to-peer file-sharing and the web of trust of digital certification. We investigate the properties of trust propagation on networks, based on a simple metric of trust transitivity. We investigate analytically the percolation properties of trust transitivity in random networks with arbitrary degree distribution, and compare with numerical realizations. We find that the existence of a non-zero fraction of absolute trust (i.e. entirely confident trust) is a requirement for the viability of global trust propagation in large systems: The average pair-wise trust is marked by a discontinuous transition at a specific fraction of absolute trust, below which it vanishes. Furthermore, we perform an extensive analysis of the Pretty Good Privacy (PGP) web of trust, in view of the concepts introduced. We compare different scenarios of trust distribution: community- and author...

  3. Sensor Network Data Fault Detection using Hierarchical Bayesian Space-Time Modeling

    OpenAIRE

    Ni, Kevin; Pottie, G J

    2009-01-01

    We present a new application of hierarchical Bayesian space-time (HBST) modeling: data fault detection in sensor networks primarily used in environmental monitoring situations. To show the effectiveness of HBST modeling, we develop a rudimentary tagging system to mark data that does not fit with given models. Using this, we compare HBST modeling against first order linear autoregressive (AR) modeling, which is a commonly used alternative due to its simplicity. We show that while HBST is mo...

  4. An energy efficient cooperative hierarchical MIMO clustering scheme for wireless sensor networks.

    Science.gov (United States)

    Nasim, Mehwish; Qaisar, Saad; Lee, Sungyoung

    2012-01-01

    In this work, we present an energy efficient hierarchical cooperative clustering scheme for wireless sensor networks. Communication cost is a crucial factor in depleting the energy of sensor nodes. In the proposed scheme, nodes cooperate to form clusters at each level of network hierarchy ensuring maximal coverage and minimal energy expenditure with relatively uniform distribution of load within the network. Performance is enhanced by cooperative multiple-input multiple-output (MIMO) communication ensuring energy efficiency for WSN deployments over large geographical areas. We test our scheme using TOSSIM and compare the proposed scheme with cooperative multiple-input multiple-output (CMIMO) clustering scheme and traditional multihop Single-Input-Single-Output (SISO) routing approach. Performance is evaluated on the basis of number of clusters, number of hops, energy consumption and network lifetime. Experimental results show significant energy conservation and increase in network lifetime as compared to existing schemes.

  5. A hierarchical P2P overlay network for interest-based media contents lookup

    Science.gov (United States)

    Lee, HyunRyong; Kim, JongWon

    2006-10-01

    We propose a P2P (peer-to-peer) overlay architecture, called IGN (interest grouping network), for contents lookup in the DHC (digital home community), which aims to provide a formalized home-network-extended construction of current P2P file sharing community. The IGN utilizes the Chord and de Bruijn graph for its hierarchical overlay network construction. By combining two schemes and by inheriting its features, the IGN efficiently supports contents lookup. More specifically, by introducing metadata-based lookup keyword, the IGN offers detailed contents lookup that can reflect the user interests. Moreover, the IGN tries to reflect home network environments of DHC by utilizing HG (home gateway) of each home network as a participating node of the IGN. Through experimental and analysis results, we show that the IGN is more efficient than Chord, a well-known DHT (distributed hash table)-based lookup protocol.

  6. Psychology and social networks: a dynamic network theory perspective.

    Science.gov (United States)

    Westaby, James D; Pfaff, Danielle L; Redding, Nicholas

    2014-04-01

    Research on social networks has grown exponentially in recent years. However, despite its relevance, the field of psychology has been relatively slow to explain the underlying goal pursuit and resistance processes influencing social networks in the first place. In this vein, this article aims to demonstrate how a dynamic network theory perspective explains the way in which social networks influence these processes and related outcomes, such as goal achievement, performance, learning, and emotional contagion at the interpersonal level of analysis. The theory integrates goal pursuit, motivation, and conflict conceptualizations from psychology with social network concepts from sociology and organizational science to provide a taxonomy of social network role behaviors, such as goal striving, system supporting, goal preventing, system negating, and observing. This theoretical perspective provides psychologists with new tools to map social networks (e.g., dynamic network charts), which can help inform the development of change interventions. Implications for social, industrial-organizational, and counseling psychology as well as conflict resolution are discussed, and new opportunities for research are highlighted, such as those related to dynamic network intelligence (also known as cognitive accuracy), levels of analysis, methodological/ethical issues, and the need to theoretically broaden the study of social networking and social media behavior. (PsycINFO Database Record (c) 2014 APA, all rights reserved).

  7. Impact of informal networks on opinion dynamics in hierarchically formal organization

    Science.gov (United States)

    Song, Xiao; Shi, Wen; Ma, Yaofei; Yang, Chen

    2015-10-01

    Traditional opinion dynamics model focused mainly on the conditions under which a group of agents would reach a consensus. Conclusion has been gained that continuous opinion dynamics are subject to the constraint that convergent opinion adjustment only proceeds when opinion difference is below a given tolerance. This conclusion is useful but neglected the fact that an organization often consists of overlapped networks including formally hierarchical network and small-world/scale-free informal networks. To study the impact of different types of informal networks on converging speed or the number of opinion clusters, four typical types of informal networks (small-world, scale-free, tree and fully connected) are modeled and proposed as complements to formal communications. Experiments to compare formal network and hybrid networks are then carried out. It is observed that opinion dynamics with supplemented communications of informal networks can benefit convergence speed and reduce opinion clusters. More importantly, it is revealed that three key factors of informal networks affect their impact on formal network. These factors of informal network in descending orders are: agents' tolerances, scale and number of links.

  8. Networked Learning in Networks: infrastructures for social learning & distributed innovation

    NARCIS (Netherlands)

    Sloep, Peter

    2011-01-01

    Sloep, P. B. (2011, 1-3 September). Networked Learning in Networks: infrastructures for social learning & distributed innovation. Presentation at the Third International Conference on Software, Services and Semantic Technologies (S3T 2011), Bourgas, Bulgaria.

  9. Mouse Social Network Dynamics and Community Structure are Associated with Plasticity-Related Brain Gene Expression.

    Science.gov (United States)

    Williamson, Cait M; Franks, Becca; Curley, James P

    2016-01-01

    Laboratory studies of social behavior have typically focused on dyadic interactions occurring within a limited spatiotemporal context. However, this strategy prevents analyses of the dynamics of group social behavior and constrains identification of the biological pathways mediating individual differences in behavior. In the current study, we aimed to identify the spatiotemporal dynamics and hierarchical organization of a large social network of male mice. We also sought to determine if standard assays of social and exploratory behavior are predictive of social behavior in this social network and whether individual network position was associated with the mRNA expression of two plasticity-related genes, DNA methyltransferase 1 and 3a. Mice were observed to form a hierarchically organized social network and self-organized into two separate social network communities. Members of both communities exhibited distinct patterns of socio-spatial organization within the vivaria that was not limited to only agonistic interactions. We further established that exploratory and social behaviors in standard behavioral assays conducted prior to placing the mice into the large group was predictive of initial network position and behavior but were not associated with final social network position. Finally, we determined that social network position is associated with variation in mRNA levels of two neural plasticity genes, DNMT1 and DNMT3a, in the hippocampus but not the mPOA. This work demonstrates the importance of understanding the role of social context and complex social dynamics in determining the relationship between individual differences in social behavior and brain gene expression.

  10. Social networks in cardiovascular disease management.

    Science.gov (United States)

    Shaya, Fadia T; Yan, Xia; Farshid, Maryam; Barakat, Samer; Jung, Miah; Low, Sara; Fedder, Donald

    2010-12-01

    Cardiovascular disease remains the leading cause of death in the USA. Social networks have a positive association with obesity, smoking cessation and weight loss. This article summarizes studies evaluating the impact of social networks on the management of cardiovascular disease. The 35 studies included in the article describe the impact of social networks on a decreased incidence of cardiovascular disease, depression and mortality. In addition, having a large-sized social network is also associated with better outcomes and improved health. The role of pharmacists is beginning to play an important role in the patient-centered medical home, which needs to be incorporated into social networks. The patient-centered medical home can serve as an adaptive source for social network evolvement.

  11. Matching Community Structure Across Online Social Networks

    CERN Document Server

    Li, Lin

    2016-01-01

    The discovery of community structure in networks is a problem of considerable interest in recent years. In online social networks, often times, users are simultaneously involved in multiple social media sites, some of which share common social relationships. It is of great interest to uncover a shared community structure across these networks. However, in reality, users typically identify themselves with different usernames across social media sites. This creates a great difficulty in detecting the community structure. In this paper, we explore several approaches for community detection across online social networks with limited knowledge of username alignment across the networks. We refer to the known alignment of usernames as seeds. We investigate strategies for seed selection and its impact on networks with a different fraction of overlapping vertices. The goal is to study the interplay between network topologies and seed selection strategies, and to understand how it affects the detected community structu...

  12. A new Hierarchical Group Key Management based on Clustering Scheme for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Ayman EL-SAYED

    2014-05-01

    Full Text Available The migration from wired network to wireless network has been a global trend in the past few decades because they provide anytime-anywhere networking services. The wireless networks are rapidly deployed in the future, secure wireless environment will be mandatory. As well, The mobility and scalability brought by wireless network made it possible in many applications. Among all the contemporary wireless networks,Mobile Ad hoc Networks (MANET is one of the most important and unique applications. MANET is a collection of autonomous nodes or terminals which communicate with each other by forming a multihop radio network and maintaining connectivity in a decentralized manner. Due to the nature of unreliable wireless medium data transfer is a major problem in MANET and it lacks security and reliability of data. The most suitable solution to provide the expected level of security to these services is the provision of a key management protocol. A Key management is vital part of security. This issue is even bigger in wireless network compared to wired network. The distribution of keys in an authenticated manner is a difficult task in MANET. When a member leaves or joins the group, it needs to generate a new key to maintain forward and backward secrecy. In this paper, we propose a new group key management schemes namely a Hierarchical, Simple, Efficient and Scalable Group Key (HSESGK based on clustering management scheme for MANETs and different other schemes are classified. Group members deduce the group key in a distributed manner.

  13. CONNECTIONS USING SOCIAL NETWORKS AND SOCIAL INTELLIGENCE OF STUDENTS

    Directory of Open Access Journals (Sweden)

    Belma Duvnjak

    2013-05-01

    Full Text Available Social intelligence is the ability and skills to cope with everyday life situations and how to cope with interpersonal relationships. Today's generation of relationships based, carried and nurtured through various social networks. The aim of the presented research is to identify the impact of social networks on the development of social intelligence. The study was done on a sample, which makes the 208 students from the Faculty of Education at the University "Džemal Bijedić" in Mostar. The results show that the impact of social networks on the development of positive social intelligence. Greater achievement on tests of social intelligence (SI were significantly correlated with the amount of time spent using different social networks.

  14. Social networks in borderline personality disorder.

    Science.gov (United States)

    Clifton, Allan; Pilkonis, Paul A; McCarty, Christopher

    2007-08-01

    The interpersonal dysfunction that characterizes borderline personality disorder (BPD) has generally been studied using broad global measures, leading to a lack of precision. We report on a novel methodology using social network analysis (SNA) to quantify interactions with others in the patient's social world. We assessed the social networks of 22 clinical patients, diagnosed with either BPD (N = 11) or no personality disorder (No PD; N = 11). The social networks of patients with BPD contained a greater number of former romantic partners, and a greater number of relationships that had been terminated. Mixed model analyses found that the No PD group reported higher levels of positive relationships (e.g., trust, social support) with more central members of their social networks, whereas the BPD group did not discriminate among members of their networks. Results suggest deficits in social cognition for positive relations, but not for negative relations such as interpersonal conflict.

  15. A User Perspective on Social Networking Sites

    DEFF Research Database (Denmark)

    Sørensen, Lene Tolstrup; Porras, Jari; Hajikhani, Arash

    2014-01-01

    For years, social media have been a part of daily life. Within the last 5-10 years, the use of social media (and in particular social networking sites) has expanded to almost all sides of life: private people, businesses and public institutions. This paper presents an overview of different uses...... of social networks to give a picture of the variety in use. The paper describes differences in private persons’ use of social networking sites, different business purposes, and how social networking sites can challenge public administrations. Throughout the paper there are provided small cases...... and situations where the social networking sites have been used in a remarkable way. The paper is made in collaboration between partners in the World Wide Research Forum....

  16. Role of Security in Social Networking

    Directory of Open Access Journals (Sweden)

    David Hiatt

    2016-02-01

    Full Text Available In this paper, the concept of security and privacy in social media, or social networking will be discussed. First, a brief history and the concept of social networking will be introduced. Many of the security risks associated with using social media are presented. Also, the issue of privacy and how it relates to security are described. Based on these discussions, some solutions to improve a user’s privacy and security on social networks will be suggested. Our research will help the readers to understand the security and privacy issues for the social network users, and some steps which can be taken by both users and social network organizations to help improve security and privacy.

  17. A User Perspective on Social Networking Sites

    DEFF Research Database (Denmark)

    Sørensen, Lene Tolstrup; Porras, Jari; Hajikhani, Arash

    2014-01-01

    For years, social media have been a part of daily life. Within the last 5-10 years, the use of social media (and in particular social networking sites) has expanded to almost all sides of life: private people, businesses and public institutions. This paper presents an overview of different uses...... of social networks to give a picture of the variety in use. The paper describes differences in private persons’ use of social networking sites, different business purposes, and how social networking sites can challenge public administrations. Throughout the paper there are provided small cases...... and situations where the social networking sites have been used in a remarkable way. The paper is made in collaboration between partners in the World Wide Research Forum....

  18. Hierarchically Coordinated Power Management for Target Tracking in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Feng Juan

    2013-10-01

    Full Text Available Energy efficiency is very important for wireless sensor networks (WSNs since sensor nodes have a limited energy supply from a battery. So far, a lot research has focused on this issue, while less emphasis has been placed on the adaptive sleep time for each node with a consideration for the application constraints. In this paper, we propose a hierarchically coordinated power management (HCPM approach, which both addresses the energy conservation problem and reduces the packet forwarding delay for target tracking WSNs based on a virtual‐grid‐based network structure. We extend the network lifetime by adopting an adaptive sleep scheduling scheme that combines the local power management (PM and the adaptive coordinate PM strategies to schedule the activities of the sensor nodes at the surveillance stage. Furthermore, we propose a hierarchical structure for the tracking stage. Experimental results show that the proposed approach has a greater capability of extending the network lifetime while maintaining a short transmission delay when compared with the protocol which does not consider the application constraints in target tracking sensor networks.

  19. SOCIAL NETWORK EFFECTS ON ROMANTIC RELATIONSHIP

    OpenAIRE

    Can, Fatma; Selim HOVARDAOGLU

    2015-01-01

    The main objective of the study was to obtain information about social network variables in order to predict the relational commitment of married individuals and people having dating relationships. For this purpose, social network analysis has been carried out on 134 people having dating relationship and 154 married individuals and then Relationship Stability Scale, Subjective Norm Scale and Social Network Feature Survey prepared by the researcher were used. The results indicated that the app...

  20. Regional Use of Social Networking Tools

    Science.gov (United States)

    2014-12-01

    4 2.1.7 Tumblr 4 2.1.8 Instagram 4 2.2 Local Social Networking Services 5 3 Regional Preferences for Social Networking Tools 6 4 African Region...comScore, GlobalWebIndex, Alexa, and financial reports for the parent companies of the social networking tools. The subsequent list includes global... company websites and financial reports. LinkedIn does not provide a monthly active user number, but it reports 300 million regis- tered users. Because

  1. Discovering Mobile Social Networks by Semantic Technologies

    Science.gov (United States)

    Jung, Jason J.; Choi, Kwang Sun; Park, Sung Hyuk

    It has been important for telecommunication companies to discover social networks from mobile subscribers. They have attempted to provide a number of recommendation services, but they realized that the services were not successful. In this chapter, we present semantic technologies for discovering social networks. The process is mainly composed of two steps; (1) profile identification and (2) context understanding. Through developing a Next generation Contents dElivery (NICE) platform, we were able to generate various services based on the discovered social networks.

  2. Group Evolution Discovery in Social Networks

    OpenAIRE

    Bródka, Piotr; Saganowski, Stanisław; Kazienko, Przemysław

    2013-01-01

    Group extraction and their evolution are among the topics which arouse the greatest interest in the domain of social network analysis. However, while the grouping methods in social networks are developed very dynamically, the methods of group evolution discovery and analysis are still uncharted territory on the social network analysis map. Therefore the new method for the group evolution discovery called GED is proposed in this paper. Additionally, the results of the first experiments on the ...

  3. A Dynamic Algebraic Specification for Social Networks

    CERN Document Server

    Ksystra, Katerina; Triantafyllou, Nikolaos; Stefaneas, Petros

    2011-01-01

    With the help of the Internet, social networks have grown rapidly. This has increased security requirements. We present a formalization of social networks as composite behavioral objects, defined using the Observational Transition System (OTS) approach. Our definition is then translated to the OTS/CafeOBJ algebraic specification methodology. This translation allows the formal verification of safety properties for social networks via the Proof Score method. Finally, using this methodology we formally verify some security properties.

  4. The Strategic Paradox of Social Networks

    Science.gov (United States)

    2011-03-18

    cause long-lasting effects. For example, a recent Career Builder survey found the number of civilian employers who used social networking sites as...Service members discussing political subjects on social networking sites can quickly attract negative attention. In March 2010, Marine Corps Sergeant...on social networking sites . In March 2010, stories surfaced reporting the Israeli army canceled a mission after a soldier “disclosed the name of the

  5. Networking for philanthropy: increasing volunteer behavior via social networking sites.

    Science.gov (United States)

    Kim, Yoojung; Lee, Wei-Na

    2014-03-01

    Social networking sites (SNSs) provide a unique social venue to engage the young generation in philanthropy through their networking capabilities. An integrated model that incorporates social capital into the Theory of Reasoned Action is developed to explain volunteer behavior through social networks. As expected, volunteer behavior was predicted by volunteer intention, which was influenced by attitudes and subjective norms. In addition, social capital, an outcome of the extensive use of SNSs, was as an important driver of users' attitude and subjective norms toward volunteering via SNSs.

  6. Evolution of individual versus social learning on social networks.

    Science.gov (United States)

    Tamura, Kohei; Kobayashi, Yutaka; Ihara, Yasuo

    2015-03-06

    A number of studies have investigated the roles played by individual and social learning in cultural phenomena and the relative advantages of the two learning strategies in variable environments. Because social learning involves the acquisition of behaviours from others, its utility depends on the availability of 'cultural models' exhibiting adaptive behaviours. This indicates that social networks play an essential role in the evolution of learning. However, possible effects of social structure on the evolution of learning have not been fully explored. Here, we develop a mathematical model to explore the evolutionary dynamics of learning strategies on social networks. We first derive the condition under which social learners (SLs) are selectively favoured over individual learners in a broad range of social network. We then obtain an analytical approximation of the long-term average frequency of SLs in homogeneous networks, from which we specify the condition, in terms of three relatedness measures, for social structure to facilitate the long-term evolution of social learning. Finally, we evaluate our approximation by Monte Carlo simulations in complete graphs, regular random graphs and scale-free networks. We formally show that whether social structure favours the evolution of social learning is determined by the relative magnitudes of two effects of social structure: localization in competition, by which competition between learning strategies is evaded, and localization in cultural transmission, which slows down the spread of adaptive traits. In addition, our estimates of the relatedness measures suggest that social structure disfavours the evolution of social learning when selection is weak.

  7. Data mining for social network data

    CERN Document Server

    Memon, Nasrullah; Hicks, David L; Chen, Hsinchun

    2010-01-01

    Driven by counter-terrorism efforts, marketing analysis and an explosion in online social networking in recent years, data mining has moved to the forefront of information science. This proposed Special Issue on ""Data Mining for Social Network Data"" will present a broad range of recent studies in social networking analysis. It will focus on emerging trends and needs in discovery and analysis of communities, solitary and social activities, and activities in open fora, and commercial sites as well. It will also look at network modeling, infrastructure construction, dynamic growth and evolution

  8. Individual Differences as Predictors of Social Networking

    National Research Council Canada - National Science Library

    Orchard, Lisa J; Fullwood, Chris; Galbraith, Niall; Morris, Neil

    2014-01-01

    Research suggests that personality dictates specific Internet preferences. One area that remains relatively unexplored is the influence of personality on engagement with social networking sites ( SNSs...

  9. Information and influence propagation in social networks

    CERN Document Server

    Chen, Wei; Lakshmanan, Laks V S

    2013-01-01

    Research on social networks has exploded over the last decade. To a large extent, this has been fueled by the spectacular growth of social media and online social networking sites, which continue growing at a very fast pace, as well as by the increasing availability of very large social network datasets for purposes of research. A rich body of this research has been devoted to the analysis of the propagation of information, influence, innovations, infections, practices and customs through networks. Can we build models to explain the way these propagations occur? How can we validate our models

  10. Animal welfare: a social networks perspective.

    Science.gov (United States)

    Kleinhappel, Tanja K; John, Elizabeth A; Pike, Thomas W; Wilkinson, Anna; Burman, Oliver H P

    2016-01-01

    Social network theory provides a useful tool to study complex social relationships in animals. The possibility to look beyond dyadic interactions by considering whole networks of social relationships allows researchers the opportunity to study social groups in more natural ways. As such, network-based analyses provide an informative way to investigate the factors influencing the social environment of group-living animals, and so has direct application to animal welfare. For example, animal groups in captivity are frequently disrupted by separations, reintroductions and/or mixing with unfamiliar individuals and this can lead to social stress and associated aggression. Social network analysis ofanimal groups can help identify the underlying causes of these socially-derived animal welfare concerns. In this review we discuss how this approach can be applied, and how it could be used to identify potential interventions and solutions in the area of animal welfare.

  11. The Social Side of Information Networking.

    Science.gov (United States)

    Katz, James E.

    1997-01-01

    Explores the social issues, including manners, security, crime (fraud), and social control associated with information networking, with emphasis on the Internet. Also addresses the influence of cellular phones, the Internet and other information technologies on society. (GR)

  12. Social network analysis community detection and evolution

    CERN Document Server

    Missaoui, Rokia

    2015-01-01

    This book is devoted to recent progress in social network analysis with a high focus on community detection and evolution. The eleven chapters cover the identification of cohesive groups, core components and key players either in static or dynamic networks of different kinds and levels of heterogeneity. Other important topics in social network analysis such as influential detection and maximization, information propagation, user behavior analysis, as well as network modeling and visualization are also presented. Many studies are validated through real social networks such as Twitter. This edit

  13. Hierarchical differentiation of myeloid progenitors is encoded in the transcription factor network.

    Science.gov (United States)

    Krumsiek, Jan; Marr, Carsten; Schroeder, Timm; Theis, Fabian J

    2011-01-01

    Hematopoiesis is an ideal model system for stem cell biology with advanced experimental access. A systems view on the interactions of core transcription factors is important for understanding differentiation mechanisms and dynamics. In this manuscript, we construct a Boolean network to model myeloid differentiation, specifically from common myeloid progenitors to megakaryocytes, erythrocytes, granulocytes and monocytes. By interpreting the hematopoietic literature and translating experimental evidence into Boolean rules, we implement binary dynamics on the resulting 11-factor regulatory network. Our network contains interesting functional modules and a concatenation of mutual antagonistic pairs. The state space of our model is a hierarchical, acyclic graph, typifying the principles of myeloid differentiation. We observe excellent agreement between the steady states of our model and microarray expression profiles of two different studies. Moreover, perturbations of the network topology correctly reproduce reported knockout phenotypes in silico. We predict previously uncharacterized regulatory interactions and alterations of the differentiation process, and line out reprogramming strategies.

  14. Spectral dimensions of hierarchical scale-free networks with weighted shortcuts

    Science.gov (United States)

    Hwang, S.; Yun, C.-K.; Lee, D.-S.; Kahng, B.; Kim, D.

    2010-11-01

    Spectral dimensions have been widely used to understand transport properties on regular and fractal lattices. However, they have received little attention with regard to complex networks such as scale-free and small-world networks. Here, we study the spectral dimension and the return-to-origin probability of random walks on hierarchical scale-free networks, which can be either fractal or nonfractal depending on the weight of the shortcuts. Applying the renormalization-group (RG) approach to a Gaussian model, we obtain the exact spectral dimension. While the spectral dimension varies between 1 and 2 for the fractal case, it remains at 2, independent of the variation in the network structure, for the nonfractal case. The crossover behavior between the two cases is studied by carrying out the RG flow analysis. The analytical results are confirmed by simulation results and their implications for the architecture of complex systems are discussed.

  15. Hierarchical Location Service with Prediction in Mobile Ad-Hoc Networks

    CERN Document Server

    Amar, Ebtisam; Renault, Éric; 10.5121/ijcnc.2010.2204

    2010-01-01

    Position-based routing protocols take advantage of location information to perform a stateless and efficient routing. To enable position-based routing, a node must be able to discover the location of the messages' destination node. This task is typically accomplished by a location service. Recently, several location service protocols have been developed for ad hoc networks. In this paper we propose a novel location service called PHLS: Predictive Hierarchical Location Service. In PHLS, the entire network is partitioned into a hierarchy of smaller and smaller regions. For each node, one node in each-level region of the hierarchy is chosen as its local location server. When the network initializes or when a node attaches the network, nodes contact their local location server with their current location information (ie. position and velocity). Then, they only need to update their location server when they move away from their current region. Finally, nodes query their location servers and get the exact or predic...

  16. Social network in patient safety: Social media visibility

    Directory of Open Access Journals (Sweden)

    Azucena Santillán García

    2011-11-01

    Full Text Available Internet social network (social media is a powerful communication tool, and its use is expanding significantly. This paper seeks to know the current state of visibility in online social networks of active citizen talking about patient safety. This is an observational cross-sectional study whose target population is the websites Facebook, Twitter and Tuenti in Spain. By three consecutive cuts social profiles were found using the searching terms “seguridad+paciente” and “safety+patient”. There were found 5 profiles on Facebook that met the search criteria, 6 on Twitter and none were found on Tuenti. It is concluded that although there is evidence of the rise of social networking, citizen network involved in patient safety appears not to be significantly represented within the social networks examined.

  17. Social network and lifestyle in Danish adults

    DEFF Research Database (Denmark)

    Osler, Merete

    1995-01-01

    Analyzed associations between 2,987 adults' social networks and lifestyles in terms of leisure activity, smoking, and the intake of vegetables. Compared with socially integrated men, those with few social contacts or little social support were more often inactive during leisure time and did not e...... health related behaviors. (PsycINFO Database Record (c) 2012 APA, all rights reserved)...

  18. Predicting Anchor Links between Heterogeneous Social Networks

    CERN Document Server

    Sajadmanesh, Sina; Khodadadi, Ali

    2016-01-01

    People usually get involved in multiple social networks to enjoy new services or to fulfill their needs. Many new social networks try to attract users of other existing networks to increase the number of their users. Once a user (called source user) of a social network (called source network) joins a new social network (called target network), a new inter-network link (called anchor link) is formed between the source and target networks. In this paper, we concentrated on predicting the formation of such anchor links between heterogeneous social networks. Unlike conventional link prediction problems in which the formation of a link between two existing users within a single network is predicted, in anchor link prediction, the target user is missing and will be added to the target network once the anchor link is created. To solve this problem, we use meta-paths as a powerful tool for utilizing heterogeneous information in both the source and target networks. To this end, we propose an effective general meta-pat...

  19. Mobile social networking an innovative approach

    CERN Document Server

    Zhang, Daqing

    2014-01-01

    The use of contextually aware, pervasive, distributed computing, and sensor networks to bridge the gap between the physical and online worlds is the basis of mobile social networking. This book shows how applications can be built to provide mobile social networking, the research issues that need to be solved to enable this vision, and how mobile social networking can be used to provide computational intelligence that will improve daily life. With contributions from the fields of sociology, computer science, human-computer interaction and design, this book demonstrates how mobile social networks can be inferred from users' physical interactions both with the environment and with others, as well as how users behave around them and how their behavior differs on mobile vs. traditional online social networks.

  20. Mobile Social Network in a Cultural Context

    DEFF Research Database (Denmark)

    Liu, Jun

    2010-01-01

    the chapter “Mobile Social Network in a Cultural Context” examines the guanxi-embedded mobile social network in China. By focusing on three concrete case studies with 56 in-depth interviews, including New Year text message greetings, mobile social networks for job allocations among migrant workers......, and mobile phone rumours, this study observes that mobile social networks are a way that Chinese people cultivate, maintain and strengthen their guanxi networks. Embedding the reliability of guanxi, the message spreading via mobile communication always enjoys high credibility, while mutual obligation...... of mobile social network in China therefore emanate not only from Information and Communication Technologies, but also from the socio-cultural source - guanxi - deeply rooted in Chinese society....

  1. Social network analysis and supply chain management

    Directory of Open Access Journals (Sweden)

    Raúl Rodríguez Rodríguez

    2016-01-01

    Full Text Available This paper deals with social network analysis and how it could be integrated within supply chain management from a decision-making point of view. Even though the benefits of using social analysis have are widely accepted at both academic and industry/services context, there is still a lack of solid frameworks that allow decision-makers to connect the usage and obtained results of social network analysis – mainly both information and knowledge flows and derived results- with supply chain management objectives and goals. This paper gives an overview of social network analysis, the main social network analysis metrics, supply chain performance and, finally, it identifies how future frameworks could close the gap and link the results of social network analysis with the supply chain management decision-making processes.

  2. SOCIAL NETWORK ANALYSIS IN AN ONLINE BLOGOSPHERE

    Directory of Open Access Journals (Sweden)

    DR. M. MOHAMED SATHIK

    2011-01-01

    Full Text Available Social network is a social structure that exists among the similar interest of individuals, organizations or even on relations like friendship. Social network analysis is the measure of relationship between people, organizations and processing entities. In today’s scenario, Internet is acting as an interface for the people who spread across the globe to exchange their ideas. Social network analysis is a Web 2.0 application, which facilitates the users tointeract, response and express their views. Social network analysis has greatest attention as a research area in computer science in the recent past. Blogs or weblogs are like catalogs that are maintained by individuals related to a particular topic of interest. In this problem, we analyze the blog responses as social networks that are posted by AIDS patients over a period of time.

  3. Link prediction in multiplex online social networks.

    Science.gov (United States)

    Jalili, Mahdi; Orouskhani, Yasin; Asgari, Milad; Alipourfard, Nazanin; Perc, Matjaž

    2017-02-01

    Online social networks play a major role in modern societies, and they have shaped the way social relationships evolve. Link prediction in social networks has many potential applications such as recommending new items to users, friendship suggestion and discovering spurious connections. Many real social networks evolve the connections in multiple layers (e.g. multiple social networking platforms). In this article, we study the link prediction problem in multiplex networks. As an example, we consider a multiplex network of Twitter (as a microblogging service) and Foursquare (as a location-based social network). We consider social networks of the same users in these two platforms and develop a meta-path-based algorithm for predicting the links. The connectivity information of the two layers is used to predict the links in Foursquare network. Three classical classifiers (naive Bayes, support vector machines (SVM) and K-nearest neighbour) are used for the classification task. Although the networks are not highly correlated in the layers, our experiments show that including the cross-layer information significantly improves the prediction performance. The SVM classifier results in the best performance with an average accuracy of 89%.

  4. Link prediction in multiplex online social networks

    Science.gov (United States)

    Jalili, Mahdi; Orouskhani, Yasin; Asgari, Milad; Alipourfard, Nazanin; Perc, Matjaž

    2017-02-01

    Online social networks play a major role in modern societies, and they have shaped the way social relationships evolve. Link prediction in social networks has many potential applications such as recommending new items to users, friendship suggestion and discovering spurious connections. Many real social networks evolve the connections in multiple layers (e.g. multiple social networking platforms). In this article, we study the link prediction problem in multiplex networks. As an example, we consider a multiplex network of Twitter (as a microblogging service) and Foursquare (as a location-based social network). We consider social networks of the same users in these two platforms and develop a meta-path-based algorithm for predicting the links. The connectivity information of the two layers is used to predict the links in Foursquare network. Three classical classifiers (naive Bayes, support vector machines (SVM) and K-nearest neighbour) are used for the classification task. Although the networks are not highly correlated in the layers, our experiments show that including the cross-layer information significantly improves the prediction performance. The SVM classifier results in the best performance with an average accuracy of 89%.

  5. TWO-LEVEL HIERARCHICAL COORDINATION QUEUING METHOD FOR TELECOMMUNICATION NETWORK NODES

    Directory of Open Access Journals (Sweden)

    M. V. Semenyaka

    2014-07-01

    Full Text Available The paper presents hierarchical coordination queuing method. Within the proposed method a queuing problem has been reduced to optimization problem solving that was presented as two-level hierarchical structure. The required distribution of flows and bandwidth allocation was calculated at the first level independently for each macro-queue; at the second level solutions obtained on lower level for each queue were coordinated in order to prevent probable network link overload. The method of goal coordination has been determined for multilevel structure managing, which makes it possible to define the order for consideration of queue cooperation restrictions and calculation tasks distribution between levels of hierarchy. Decisions coordination was performed by the method of Lagrange multipliers. The study of method convergence has been carried out by analytical modeling.

  6. Secure Session Mobility using Hierarchical Authentication Key Management in Next Generation Networks

    Directory of Open Access Journals (Sweden)

    Muhammad Zubair

    2014-05-01

    Full Text Available In this paper we propose a novel authentication mechanism for session mobility in Next Generation Networks named as Hierarchical Authentication Key Management (HAKM. The design objectives of HAKM are twofold: i to minimize the authentication latency in NGNs; ii to provide protection against an assortment of attacks such as denial-of-service attacks, man-in-the-middle attacks, guessing attacks, and capturing node attacks. In order to achieve these objectives, we combine Session Initiation Protocol (SIP with Hierarchical Mobile IPv6 (HMIPv6 to perform local authentication for session mobility. The concept of group keys and pairwise keys with one way hash function is employed to make HAKM vigorous against the aforesaid attacks. The performance analysis and numerical results demonstrate that HAKM outperforms the existing approaches in terms of latency and protection against the abovementioned attacks

  7. A Hybrid P2P Overlay Network for Non-strictly Hierarchically Categorized Content

    Science.gov (United States)

    Wan, Yi; Asaka, Takuya; Takahashi, Tatsuro

    In P2P content distribution systems, there are many cases in which the content can be classified into hierarchically organized categories. In this paper, we propose a hybrid overlay network design suitable for such content called Pastry/NSHCC (Pastry for Non-Strictly Hierarchically Categorized Content). The semantic information of classification hierarchies of the content can be utilized regardless of whether they are in a strict tree structure or not. By doing so, the search scope can be restrained to any granularity, and the number of query messages also decreases while maintaining keyword searching availability. Through simulation, we showed that the proposed method provides better performance and lower overhead than unstructured overlays exploiting the same semantic information.

  8. Coevolution of information processing and topology in hierarchical adaptive random Boolean networks

    Science.gov (United States)

    Górski, Piotr J.; Czaplicka, Agnieszka; Hołyst, Janusz A.

    2016-02-01

    Random Boolean Networks (RBNs) are frequently used for modeling complex systems driven by information processing, e.g. for gene regulatory networks (GRNs). Here we propose a hierarchical adaptive random Boolean Network (HARBN) as a system consisting of distinct adaptive RBNs (ARBNs) - subnetworks - connected by a set of permanent interlinks. We investigate mean node information, mean edge information as well as mean node degree. Information measures and internal subnetworks topology of HARBN coevolve and reach steady-states that are specific for a given network structure. The main natural feature of ARBNs, i.e. their adaptability, is preserved in HARBNs and they evolve towards critical configurations which is documented by power law distributions of network attractor lengths. The mean information processed by a single node or a single link increases with the number of interlinks added to the system. The mean length of network attractors and the mean steady-state connectivity possess minima for certain specific values of the quotient between the density of interlinks and the density of all links in networks. It means that the modular network displays extremal values of its observables when subnetworks are connected with a density a few times lower than a mean density of all links.

  9. Going Social: The Impact of Social Networking in Promoting Education

    Science.gov (United States)

    Jain, Neelesh Kumar; Verma, Ashish; Verma, Rama Shankar; Tiwari, Prashant

    2012-01-01

    The growth and the popularity of the Social networks has a high impact on the development of the students in the field of Personality, Attitudes, Knowledge and on its whole academic performance in classroom and society. This paper envisage on the impact of Social Network on Education and Training of the students.

  10. Social Software: Participants' Experience Using Social Networking for Learning

    Science.gov (United States)

    Batchelder, Cecil W.

    2010-01-01

    Social networking tools used in learning provides instructional design with tools for transformative change in education. This study focused on defining the meanings and essences of social networking through the lived common experiences of 7 college students. The problem of the study was a lack of learner voice in understanding the value of social…

  11. Social Software: Participants' Experience Using Social Networking for Learning

    Science.gov (United States)

    Batchelder, Cecil W.

    2010-01-01

    Social networking tools used in learning provides instructional design with tools for transformative change in education. This study focused on defining the meanings and essences of social networking through the lived common experiences of 7 college students. The problem of the study was a lack of learner voice in understanding the value of social…

  12. Web Mining and Social Networking

    DEFF Research Database (Denmark)

    Xu, Guandong; Zhang, Yanchun; Li, Lin

    sense of individuals or communities. The volume will benefit both academic and industry communities interested in the techniques and applications of web search, web data management, web mining and web knowledge discovery, as well as web community and social network analysis.......This book examines the techniques and applications involved in the Web Mining, Web Personalization and Recommendation and Web Community Analysis domains, including a detailed presentation of the principles, developed algorithms, and systems of the research in these areas. The applications of web...... mining, and the issue of how to incorporate web mining into web personalization and recommendation systems are also reviewed. Additionally, the volume explores web community mining and analysis to find the structural, organizational and temporal developments of web communities and reveal the societal...

  13. Vertical Transmission of Social Roles Drives Resilience to Poaching in Elephant Networks.

    Science.gov (United States)

    Goldenberg, Shifra Z; Douglas-Hamilton, Iain; Wittemyer, George

    2016-01-11

    Network resilience to perturbation is fundamental to functionality in systems ranging from synthetic communication networks to evolved social organization [1]. While theoretical work offers insight into causes of network robustness, examination of natural networks can identify evolved mechanisms of resilience and how they are related to the selective pressures driving structure. Female African elephants (Loxodonta africana) exhibit complex social networks with node heterogeneity in which older individuals serve as connectivity hubs [2, 3]. Recent ivory poaching targeting older elephants in a well-studied population has mirrored the targeted removal of highly connected nodes in the theoretical literature that leads to structural collapse [4, 5]. Here we tested the response of this natural network to selective knockouts. We find that the hierarchical network topology characteristic of elephant societies was highly conserved across the 16-year study despite ∼70% turnover in individual composition of the population. At a population level, the oldest available individuals persisted to fill socially central positions in the network. For analyses using known mother-daughter pairs, social positions of daughters during the disrupted period were predicted by those of their mothers in years prior, were unrelated to individual histories of family mortality, and were actively built. As such, daughters replicated the social network roles of their mothers, driving the observed network resilience. Our study provides a rare bridge between network theory and an evolved system, demonstrating social redundancy to be the mechanism by which resilience to perturbation occurred in this socially advanced species.

  14. ONLINE SOCIAL NETWORK INTERNETWORKING ANALYSIS

    Directory of Open Access Journals (Sweden)

    Bassant E.Youssef

    2014-10-01

    Full Text Available Online social networks (OSNs contain data about users, their relations, interests and daily activities andthe great value of this data results in ever growing popularity of OSNs. There are two types of OSNs data,semantic and topological. Both can be used to support decision making processes in many applicationssuch as in information diffusion, viral marketing and epidemiology. Online Social network analysis (OSNAresearch is used to maximize the benefits gained from OSNs’ data. This paper provides a comprehensive study of OSNs and OSNA to provide analysts with the knowledge needed to analyse OSNs. OSNs’internetworking was found to increase the wealth of the analysed data by depending on more than one OSNas the source of the analysed data. Paper proposes a generic model of OSNs’ internetworking system that an analyst can rely on. Twodifferent data sources in OSNs were identified in our efforts to provide a thorough study of OSNs, whichare the OSN User data and the OSN platform data. Additionally, we propose a classification of the OSNUser data according to its analysis models for different data types to shed some light into the current usedOSNA methodologies. We also highlight the different metrics and parameters that analysts can use toevaluate semantic or topologic OSN user data. Further, we present a classification of the other data typesand OSN platform data that can be used to compare the capabilities of different OSNs whether separate orin a OSNs’ internetworking system. To increase analysts’ awareness about the available tools they can use,we overview some of the currently publically available OSNs’ datasets and simulation tools and identifywhether they are capable of being used in semantic, topological OSNA, or both. The overview identifiesthat only few datasets includes both data types (semantic and topological and there are few analysis toolsthat can perform analysis on both data types. Finally paper present a scenario that

  15. Mining of the social network extraction

    Science.gov (United States)

    Nasution, M. K. M.; Hardi, M.; Syah, R.

    2017-01-01

    The use of Web as social media is steadily gaining ground in the study of social actor behaviour. However, information in Web can be interpreted in accordance with the ability of the method such as superficial methods for extracting social networks. Each method however has features and drawbacks: it cannot reveal the behaviour of social actors, but it has the hidden information about them. Therefore, this paper aims to reveal such information in the social networks mining. Social behaviour could be expressed through a set of words extracted from the list of snippets.

  16. Social network sites: Indispensable or optional social tools?

    DEFF Research Database (Denmark)

    Shklovski, Irina

    2012-01-01

    Much research has enumerated potential benefits of online social network sites. Given the pervasiveness of these sites and the numbers of people that use them daily, both re-search and media tend to make the assumption that social network sites have become indispensible to their users. Based...... on the analysis of qualitative data from users of social network sites in Russia and Kazakhstan, this paper consid-ers under what conditions social network sites can become indispensable to their users and when these technologies remain on the periphery of life despite fulfilling useful func-tions. For some...... respondents, these sites had become indis-pensable tools as they were integrated into everyday rou-tines of communicating with emotionally important and proximal contacts and were often used for coordination of offline activities. For others social network sites remained spaces where they occasionally visited...

  17. Science, Society, and Social Networking

    Science.gov (United States)

    White, K. S.; Lohwater, T.

    2009-12-01

    The increased use of social networking is changing the way that scientific societies interact with their members and others. The American Association for the Advancement of Science (AAAS) uses a variety of online networks to engage its members and the broader scientific community. AAAS members and non-members can interact with AAAS staff and each other on AAAS sites on Facebook, YouTube, and Twitter, as well as blogs and forums on the AAAS website (www.aaas.org). These tools allow scientists to more readily become engaged in policy by providing information on current science policy topics as well as methods of involvement. For example, members and the public can comment on policy-relevant stories from Science magazine’s ScienceInsider blog, download a weekly policy podcast, receive a weekly email update of policy issues affecting the scientific community, or watch a congressional hearing from their computer. AAAS resource websites and outreach programs, including Communicating Science (www.aaas.org/communicatingscience), Working with Congress (www.aaas.org/spp/cstc/) and Science Careers (http://sciencecareers.sciencemag.org) also provide tools for scientists to become more personally engaged in communicating their findings and involved in the policy process.

  18. Kinship, family and social network

    Directory of Open Access Journals (Sweden)

    2000-12-01

    Full Text Available There is considerable overlap between Le Play's mid-eighteenth-century household model map and the regional TFR map of central-southern Europe in the 1980s. The author examines the overall structure of relationships involved in Le Play's typology and observes that both the stem-family and the unstable family area in the Southern Europe are marked by a small, close-knit network of strong ties, with kinship predominance. Vice versa, the social support hinges upon a network of kin in the stem-family area, upon an alliance among different kindred units in the unstable Mediterranean area. All this leads to formulating a hypothesis of a tri-partite model for Western European relationship models. How can we explain the relationship between family predominance as anthropological embedding and family collapse as demographic reaction? The author reconsiders this question in the light of Festinger's cognitive dissonance theory and Elder's 'principle of accentuation': different, regionally rooted, family and kinship patterns "react" in contact with an appropriate reagent, such as the macro-process of modernisation, generating different patterns of today's demographic behaviour.

  19. Integration of relational and hierarchical network information for protein function prediction

    Directory of Open Access Journals (Sweden)

    Jiang Xiaoyu

    2008-08-01

    Full Text Available Abstract Background In the current climate of high-throughput computational biology, the inference of a protein's function from related measurements, such as protein-protein interaction relations, has become a canonical task. Most existing technologies pursue this task as a classification problem, on a term-by-term basis, for each term in a database, such as the Gene Ontology (GO database, a popular rigorous vocabulary for biological functions. However, ontology structures are essentially hierarchies, with certain top to bottom annotation rules which protein function predictions should in principle follow. Currently, the most common approach to imposing these hierarchical constraints on network-based classifiers is through the use of transitive closure to predictions. Results We propose a probabilistic framework to integrate information in relational data, in the form of a protein-protein interaction network, and a hierarchically structured database of terms, in the form of the GO database, for the purpose of protein function prediction. At the heart of our framework is a factorization of local neighborhood information in the protein-protein interaction network across successive ancestral terms in the GO hierarchy. We introduce a classifier within this framework, with computationally efficient implementation, that produces GO-term predictions that naturally obey a hierarchical 'true-path' consistency from root to leaves, without the need for further post-processing. Conclusion A cross-validation study, using data from the yeast Saccharomyces cerevisiae, shows our method offers substantial improvements over both standard 'guilt-by-association' (i.e., Nearest-Neighbor and more refined Markov random field methods, whether in their original form or when post-processed to artificially impose 'true-path' consistency. Further analysis of the results indicates that these improvements are associated with increased predictive capabilities (i.e., increased

  20. A Logic for Diffusion in Social Networks

    NARCIS (Netherlands)

    Christoff, Z.; Hansen, J.U.

    2015-01-01

    This paper introduces a general logical framework for reasoning about diffusion processes within social networks. The new "Logic for Diffusion in Social Networks" is a dynamic extension of standard hybrid logic, allowing to model complex phenomena involving several properties of agents. We provide a

  1. Enhancing Classroom Effectiveness through Social Networking Tools

    Science.gov (United States)

    Kurthakoti, Raghu; Boostrom, Robert E., Jr.; Summey, John H.; Campbell, David A.

    2013-01-01

    To determine the usefulness of social networking Web sites such as Ning.com as a communication tool in marketing courses, a study was designed with special concern for social network use in comparison to Blackboard. Students from multiple marketing courses were surveyed. Assessments of Ning.com and Blackboard were performed both to understand how…

  2. Mapping social networks in software process improvement

    DEFF Research Database (Denmark)

    Tjørnehøj, Gitte; Nielsen, Peter Axel

    2005-01-01

    to map social networks and suggest how it can be used in software process improvement. We applied the mapping approach in a small software company to support the realization of new ways of improving software processes. The mapping approach was found useful in improving social networks, and thus furthers...

  3. Social Networks: Gated Communities or Free Cantons?

    CERN Document Server

    CERN. Geneva

    2017-01-01

    Online social networks and other cloud-based services have concentrated the control of the web in the hands of a few corporations. Our personal data has been commodified, often without our knowledge or consent. Is there a way to retain all the benefits of social networking without giving up control of our data?

  4. Social Networking on the Semantic Web

    Science.gov (United States)

    Finin, Tim; Ding, Li; Zhou, Lina; Joshi, Anupam

    2005-01-01

    Purpose: Aims to investigate the way that the semantic web is being used to represent and process social network information. Design/methodology/approach: The Swoogle semantic web search engine was used to construct several large data sets of Resource Description Framework (RDF) documents with social network information that were encoded using the…

  5. Intercultural Communication in Online Social Networking Discourse

    Science.gov (United States)

    Chen, Hsin-I

    2017-01-01

    This article presents a case study that examines how an online social networking community is constituted through intercultural discourse on the part of one learner sojourning in the US. Using Byram's model of intercultural communicative competence, this study examines the learner's naturalistic communication in a social networking site (SNS). The…

  6. Social networking sites and adolescent health.

    Science.gov (United States)

    Moreno, Megan A; Kolb, Jennifer

    2012-06-01

    Social networking sites are popular among and consistently used by adolescents. These sites present benefits as well as risks to adolescent health. Recently, pediatric providers have also considered the benefits and risks of using social networking sites in their own practices.

  7. Entrepreneurial Idea Identification through Online Social Networks

    Science.gov (United States)

    Lang, Matthew C.

    2010-01-01

    The increasing use of social network websites may signal a change in the way the next generation of entrepreneurs identify entrepreneurial ideas. An important part of the entrepreneurship literature emphasizes how vital the use of social networks is to entrepreneurial idea identification, opportunity recognition, and ultimately new venture…

  8. Mapping social networks in software process improvement

    DEFF Research Database (Denmark)

    Tjørnehøj, Gitte; Nielsen, Peter Axel

    2005-01-01

    to map social networks and suggest how it can be used in software process improvement. We applied the mapping approach in a small software company to support the realization of new ways of improving software processes. The mapping approach was found useful in improving social networks, and thus furthers...

  9. Spectral Analysis of Rich Network Topology in Social Networks

    Science.gov (United States)

    Wu, Leting

    2013-01-01

    Social networks have received much attention these days. Researchers have developed different methods to study the structure and characteristics of the network topology. Our focus is on spectral analysis of the adjacency matrix of the underlying network. Recent work showed good properties in the adjacency spectral space but there are few…

  10. Spectral Analysis of Rich Network Topology in Social Networks

    Science.gov (United States)

    Wu, Leting

    2013-01-01

    Social networks have received much attention these days. Researchers have developed different methods to study the structure and characteristics of the network topology. Our focus is on spectral analysis of the adjacency matrix of the underlying network. Recent work showed good properties in the adjacency spectral space but there are few…

  11. Applications of social media and social network analysis

    CERN Document Server

    Kazienko, Przemyslaw

    2015-01-01

    This collection of contributed chapters demonstrates a wide range of applications within two overlapping research domains: social media analysis and social network analysis. Various methodologies were utilized in the twelve individual chapters including static, dynamic and real-time approaches to graph, textual and multimedia data analysis. The topics apply to reputation computation, emotion detection, topic evolution, rumor propagation, evaluation of textual opinions, friend ranking, analysis of public transportation networks, diffusion in dynamic networks, analysis of contributors to commun

  12. A Hierarchical Energy Efficient Reliable Transport Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Prabhudutta Mohanty

    2014-12-01

    Full Text Available The two important requirements for many Wireless Senor Networks (WSNs are prolonged network lifetime and end-to-end reliability. The sensor nodes consume more energy during data transmission than the data sensing. In WSN, the redundant data increase the energy consumption, latency and reduce reliability during data transmission. Therefore, it is important to support energy efficient reliable data transport in WSNs. In this paper, we present a Hierarchical Energy Efficient Reliable Transport Protocol (HEERTP for the data transmission within the WSN. This protocol maximises the network lifetime by controlling the redundant data transmission with the co-ordination of Base Station (BS. The proposed protocol also achieves end-to-end reliability using a hop-by-hop acknowledgement scheme. We evaluate the performance of the proposed protocol through simulation. The simulation results reveal that our proposed protocol achieves better performance in terms of energy efficiency, latency and reliability than the existing protocols.

  13. A Hierarchical Approach to Real-time Activity Recognition in Body Sensor Networks

    DEFF Research Database (Denmark)

    Wang, Liang; Gu, Tao; Tao, Xianping

    2012-01-01

    algorithm to detect gestures at the sensor node level, and then propose a pattern based real-time algorithm to recognize complex, high-level activities at the portable device level. We evaluate our algorithms over a real-world dataset. The results show that the proposed system not only achieves good......Real-time activity recognition in body sensor networks is an important and challenging task. In this paper, we propose a real-time, hierarchical model to recognize both simple gestures and complex activities using a wireless body sensor network. In this model, we rst use a fast and lightweight...... performance (an average utility of 0.81, an average accuracy of 82.87%, and an average real-time delay of 5.7 seconds), but also signicantly reduces the network communication cost by 60.2%....

  14. Toughening mystery of natural rubber deciphered by double network incorporating hierarchical structures.

    Science.gov (United States)

    Zhou, Weiming; Li, Xiangyang; Lu, Jie; Huang, Ningdong; Chen, Liang; Qi, Zeming; Li, Liangbin; Liang, Haiyi

    2014-12-16

    As an indispensible material for modern society, natural rubber possesses peerless mechanical properties such as strength and toughness over its artificial analogues, which remains a mystery. Intensive experimental and theoretical investigations have revealed the self-enhancement of natural rubber due to strain-induced crystallization. However a rigorous model on the self-enhancement, elucidating natural rubber's extraordinary mechanical properties, is obscured by deficient understanding of the local hierarchical structure under strain. With spatially resolved synchrotron radiation micro-beam scanning X-ray diffraction we discover weak oscillation in distributions of strain-induced crystallinity around crack tip for stretched natural rubber film, demonstrating a soft-hard double network structure. The fracture energy enhancement factor obtained by utilizing the double network model indicates an enhancement of toughness by 3 orders. It's proposed that upon stretching spontaneously developed double network structures integrating hierarchy at multi length-scale in natural rubber play an essential role in its remarkable mechanical performance.

  15. Decentralized Cooperative TOA/AOA Target Tracking for Hierarchical Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chih-Yu Wen

    2012-11-01

    Full Text Available This paper proposes a distributed method for cooperative target tracking in hierarchical wireless sensor networks. The concept of leader-based information processingis conducted to achieve object positioning, considering a cluster-based network topology. Random timers and local information are applied to adaptively select a sub-cluster for thelocalization task. The proposed energy-efficient tracking algorithm allows each sub-clustermember to locally estimate the target position with a Bayesian filtering framework and a neural networking model, and further performs estimation fusion in the leader node with the covariance intersection algorithm. This paper evaluates the merits and trade-offs of the protocol design towards developing more efficient and practical algorithms for objectposition estimation. 

  16. Decentralized cooperative TOA/AOA target tracking for hierarchical wireless sensor networks.

    Science.gov (United States)

    Chen, Ying-Chih; Wen, Chih-Yu

    2012-11-08

    This paper proposes a distributed method for cooperative target tracking in hierarchical wireless sensor networks. The concept of leader-based information processing is conducted to achieve object positioning, considering a cluster-based network topology. Random timers and local information are applied to adaptively select a sub-cluster for the localization task. The proposed energy-efficient tracking algorithm allows each sub-cluster member to locally estimate the target position with a Bayesian filtering framework and a neural networking model, and further performs estimation fusion in the leader node with the covariance intersection algorithm. This paper evaluates the merits and trade-offs of the protocol design towards developing more efficient and practical algorithms for object position estimation.

  17. Social relations: network, support and relational strain

    DEFF Research Database (Denmark)

    Due, P; Holstein, B; Lund, Rikke

    1999-01-01

    ,011. The postal questionnaires were answered by a random sample in each of the age groups. The results show marked age and gender differences in both the structure and the function of social relations. The social network, measured as weekly contacts, weakens with age and so does instrumental support. Emotional......We introduce a conceptual framework with social relations as the main concept and the structure and the function of social relations as subconcepts. The structure of social relations covers aspects of formal relations and social network. The function of social relations covers social support......, social anchorage and relational strain. We use this conceptual framework to describe social relations in the Danish population, with questionnaire data from the Danish Longitudinal Health Behaviour Study including a random sample of each of the age groups 25-, 50-, 60-and 70-year olds, N = 2...

  18. Dynamics of deceptive interactions in social networks

    CERN Document Server

    Barrio, Rafael A; Dunbar, Robin; Iñiguez, Gerardo; Kaski, Kimmo

    2015-01-01

    In this paper we examine the role of lies in human social relations by implementing some salient characteristics of deceptive interactions into an opinion formation model, so as to describe the dynamical behaviour of a social network more realistically. In this model we take into account such basic properties of social networks as the dynamics of the intensity of interactions, the influence of public opinion, and the fact that in every human interaction it might be convenient to deceive or withhold information depending on the instantaneous situation of each individual in the network. We find that lies shape the topology of social networks, especially the formation of tightly linked, small communities with loose connections between them. We also find that agents with a larger proportion of deceptive interactions are the ones that connect communities of different opinion, and in this sense they have substantial centrality in the network. We then discuss the consequences of these results for the social behaviou...

  19. Firm Performance-A Social Networks Perspective

    Directory of Open Access Journals (Sweden)

    Jane Tung

    2012-01-01

    Full Text Available Problem statement: The study aims to offer a discussion on social networks and their effect on firm performance and also to illustrate the ways by which the firms utilize social capital through networks. Approach: The literature review and arguments were conducted to provide a systematic discussion of social networks and their effects. Results: The study had provided with a detailed understanding of the strategies that had been found to be highly significant in successful organizational performance. The results of this discussion suggested that social networks affect firm performance in a positive manner and can contribute to sustainable competitive advantage. Conclusion: It confirms that building up of social networks for big and small firms provides valuable links and solves numerous issues which auger well for the companies and should be treated with great importance.

  20. Structure function relationship in complex brain networks expressed by hierarchical synchronization

    Science.gov (United States)

    Zhou, Changsong; Zemanová, Lucia; Zamora-López, Gorka; Hilgetag, Claus C.; Kurths, Jürgen

    2007-06-01

    The brain is one of the most complex systems in nature, with a structured complex connectivity. Recently, large-scale corticocortical connectivities, both structural and functional, have received a great deal of research attention, especially using the approach of complex network analysis. Understanding the relationship between structural and functional connectivity is of crucial importance in neuroscience. Here we try to illuminate this relationship by studying synchronization dynamics in a realistic anatomical network of cat cortical connectivity. We model the nodes (cortical areas) by a neural mass model (population model) or by a subnetwork of interacting excitable neurons (multilevel model). We show that if the dynamics is characterized by well-defined oscillations (neural mass model and subnetworks with strong couplings), the synchronization patterns are mainly determined by the node intensity (total input strengths of a node) and the detailed network topology is rather irrelevant. On the other hand, the multilevel model with weak couplings displays more irregular, biologically plausible dynamics, and the synchronization patterns reveal a hierarchical cluster organization in the network structure. The relationship between structural and functional connectivity at different levels of synchronization is explored. Thus, the study of synchronization in a multilevel complex network model of cortex can provide insights into the relationship between network topology and functional organization of complex brain networks.

  1. A method for identifying hierarchical sub-networks / modules and weighting network links based on their similarity in sub-network / module affiliation

    Directory of Open Access Journals (Sweden)

    WenJun Zhang

    2016-06-01

    Full Text Available Some networks, including biological networks, consist of hierarchical sub-networks / modules. Based on my previous study, in present study a method for both identifying hierarchical sub-networks / modules and weighting network links is proposed. It is based on the cluster analysis in which between-node similarity in sets of adjacency nodes is used. Two matrices, linkWeightMat and linkClusterIDs, are achieved by using the algorithm. Two links with both the same weight in linkWeightMat and the same cluster ID in linkClusterIDs belong to the same sub-network / module. Two links with the same weight in linkWeightMat but different cluster IDs in linkClusterIDs belong to two sub-networks / modules at the same hirarchical level. However, a link with an unique cluster ID in linkClusterIDs does not belong to any sub-networks / modules. A sub-network / module of the greater weight is the more connected sub-network / modules. Matlab codes of the algorithm are presented.

  2. Social Network Influence on Online Behavioral Choices: Exploring Group Formation on Social Network Sites

    OpenAIRE

    Kwon, KH; Stefanone, MA; Barnett, GA

    2014-01-01

    Social media communication is characterized by reduced anonymity and off-to-online social interactions. These characteristics require scholars to revisit social influence mechanisms online. The current study builds on social influence literature to explore social network and gender effects on online behavior. Findings from a quasi-experiment suggest that both network-related variables and gender are significantly associated with online behavior. Perceived social environment, measured by perso...

  3. Hierarchical neural network model of the visual system determining figure/ground relation

    Science.gov (United States)

    Kikuchi, Masayuki

    2017-07-01

    One of the most important functions of the visual perception in the brain is figure/ground interpretation from input images. Figural region in 2D image corresponding to object in 3D space are distinguished from background region extended behind the object. Previously the author proposed a neural network model of figure/ground separation constructed on the standpoint that local geometric features such as curvatures and outer angles at corners are extracted and propagated along input contour in a single layer network (Kikuchi & Akashi, 2001). However, such a processing principle has the defect that signal propagation requires manyiterations despite the fact that actual visual system determines figure/ground relation within the short period (Zhou et al., 2000). In order to attain speed-up for determining figure/ground, this study incorporates hierarchical architecture into the previous model. This study confirmed the effect of the hierarchization as for the computation time by simulation. As the number of layers increased, the required computation time reduced. However, such speed-up effect was saturatedas the layers increased to some extent. This study attempted to explain this saturation effect by the notion of average distance between vertices in the area of complex network, and succeeded to mimic the saturation effect by computer simulation.

  4. Information filtering on coupled social networks.

    Science.gov (United States)

    Nie, Da-Cheng; Zhang, Zi-Ke; Zhou, Jun-Lin; Fu, Yan; Zhang, Kui

    2014-01-01

    In this paper, based on the coupled social networks (CSN), we propose a hybrid algorithm to nonlinearly integrate both social and behavior information of online users. Filtering algorithm, based on the coupled social networks, considers the effects of both social similarity and personalized preference. Experimental results based on two real datasets, Epinions and Friendfeed, show that the hybrid pattern can not only provide more accurate recommendations, but also enlarge the recommendation coverage while adopting global metric. Further empirical analyses demonstrate that the mutual reinforcement and rich-club phenomenon can also be found in coupled social networks where the identical individuals occupy the core position of the online system. This work may shed some light on the in-depth understanding of the structure and function of coupled social networks.

  5. Information filtering on coupled social networks.

    Directory of Open Access Journals (Sweden)

    Da-Cheng Nie

    Full Text Available In this paper, based on the coupled social networks (CSN, we propose a hybrid algorithm to nonlinearly integrate both social and behavior information of online users. Filtering algorithm, based on the coupled social networks, considers the effects of both social similarity and personalized preference. Experimental results based on two real datasets, Epinions and Friendfeed, show that the hybrid pattern can not only provide more accurate recommendations, but also enlarge the recommendation coverage while adopting global metric. Further empirical analyses demonstrate that the mutual reinforcement and rich-club phenomenon can also be found in coupled social networks where the identical individuals occupy the core position of the online system. This work may shed some light on the in-depth understanding of the structure and function of coupled social networks.

  6. Preserving Communities in Anonymized Social Networks

    Directory of Open Access Journals (Sweden)

    Alina Campan

    2015-04-01

    Full Text Available Social media and social networks are embedded in our society to a point that could not have been imagined only ten years ago. Facebook, LinkedIn, and Twitter are already well known social networks that have a large audience in all age groups. The amount of data that those social sites gather from their users is continually increasing and this data is very valuable for marketing, research, and various other purposes. At the same time, this data usually contain a significant amount of sensitive information which should be protected against unauthorized disclosure. To protect the privacy of individuals, this data must be anonymized such that the risk of re-identification of specific individuals is very low. In this paper we study if anonymized social networks preserve existing communities from the original social networks. To perform this study, we introduce two approaches to measure the community preservation between the initial network and its anonymized version. In the first approach we simply count how many nodes from the original communities remained in the same community after the processes of anonymization and de-anonymization. In the second approach we consider the community preservation for each node individually. Specifically, for each node, we compare the original and final communities to which the node belongs. To anonymize social networks we use two models, namely, k-anonymity for social networks and k-degree anonymity. To determine communities in social networks we use an existing community detection algorithm based on modularity quality function. Our experiments on publically available datasets show that anonymized social networks satisfactorily preserve the community structure of their original networks.

  7. Mining social networks and security informatics

    CERN Document Server

    Özyer, Tansel; Rokne, Jon; Khoury, Suheil

    2013-01-01

    Crime, terrorism and security are in the forefront of current societal concerns. This edited volume presents research based on social network techniques showing how data from crime and terror networks can be analyzed and how information can be extracted. The topics covered include crime data mining and visualization; organized crime detection; crime network visualization; computational criminology; aspects of terror network analyses and threat prediction including cyberterrorism and the related area of dark web; privacy issues in social networks; security informatics; graph algorithms for soci

  8. Developmental evolution in social insects: regulatory networks from genes to societies.

    Science.gov (United States)

    Linksvayer, Timothy A; Fewell, Jennifer H; Gadau, Jürgen; Laubichler, Manfred D

    2012-05-01

    The evolution and development of complex phenotypes in social insect colonies, such as queen-worker dimorphism or division of labor, can, in our opinion, only be fully understood within an expanded mechanistic framework of Developmental Evolution. Conversely, social insects offer a fertile research area in which fundamental questions of Developmental Evolution can be addressed empirically. We review the concept of gene regulatory networks (GRNs) that aims to fully describe the battery of interacting genomic modules that are differentially expressed during the development of individual organisms. We discuss how distinct types of network models have been used to study different levels of biological organization in social insects, from GRNs to social networks. We propose that these hierarchical networks spanning different organizational levels from genes to societies should be integrated and incorporated into full GRN models to elucidate the evolutionary and developmental mechanisms underlying social insect phenotypes. Finally, we discuss prospects and approaches to achieve such an integration.

  9. Modern Social Support Structures: Online Social Networks and their Implications for Social Workers

    Directory of Open Access Journals (Sweden)

    Kala Chakradhar

    2009-03-01

    Full Text Available Mapping and assessing social networks and the quality of their social support is a valuable intervention strategy for social workers. These networks have now spread onto the digital realm in the form of Online Social Networks (OSNs. This study investigated the nature of social support provided by such networks to their users in a rural mid-South University (USA and explored parallels with the current understanding of social support in conventional social networks. A web-based survey administered to college students revealed that users of these online networks were predominantly undergraduate first year students, female, single, unemployed and from a variety of academic disciplines. The examination of the components of OSNs appears to mirror those of offline networks. They also seem to complement the effects of each other while contributing to an individual's support system. The paper concludes with critical implications of such online social networking for University students and social workers in practice and education.

  10. Social Network Sites, Individual Social Capital and Happiness

    NARCIS (Netherlands)

    E. Arampatzi (Efstratia); M.J. Burger (Martijn); N.A. Novik (Natallia)

    2016-01-01

    textabstractCan online social contacts replace the importance of real-life social connections in our pursuit of happiness? With the growing use of social network sites (SNSs), attention has been increasingly drawn to this topic. Our study empirically examines the effect of SNS use on happiness for d

  11. One Health in social networks and social media.

    Science.gov (United States)

    Mekaru, S R; Brownstein, J S

    2014-08-01

    In the rapidly evolving world of social media, social networks, mobile applications and citizen science, online communities can develop organically and separately from larger or more established organisations. The One Health online community is experiencing expansion from both the bottom up and the top down. In this paper, the authors review social media's strengths and weaknesses, earlier work examining Internet resources for One Health, the current state of One Health in social media (e.g. Facebook, Twitter, YouTube) and online social networking sites (e.g. LinkedIn and ResearchGate), as well as social media in One Health-related citizen science projects. While One Health has a fairly strong presence on websites, its social media presence is more limited and has an uneven geographic distribution. In work following the Stone Mountain Meeting,the One Health Global Network Task Force Report recommended the creation of an online community of practice. Professional social networks as well as the strategic use of social media should be employed in this effort. Finally, One Health-related research projects using volunteers (citizen science) often use social media to enhance their recruitment. Including these researchers in a community of practitioners would take full advantage of their existing social media presence. In conclusion, the interactive nature of social media, combined with increasing global Internet access, provides the One Health community with opportunities to meaningfully expand their community and promote their message.

  12. Analyzing negative ties in social networks

    Directory of Open Access Journals (Sweden)

    Mankirat Kaur

    2016-03-01

    Full Text Available Online social networks are a source of sharing information and maintaining personal contacts with other people through social interactions and thus forming virtual communities online. Social networks are crowded with positive and negative relations. Positive relations are formed by support, endorsement and friendship and thus, create a network of well-connected users whereas negative relations are a result of opposition, distrust and avoidance creating disconnected networks. Due to increase in illegal activities such as masquerading, conspiring and creating fake profiles on online social networks, exploring and analyzing these negative activities becomes the need of hour. Usually negative ties are treated in same way as positive ties in many theories such as balance theory and blockmodeling analysis. But the standard concepts of social network analysis do not yield same results in respect of each tie. This paper presents a survey on analyzing negative ties in social networks through various types of network analysis techniques that are used for examining ties such as status, centrality and power measures. Due to the difference in characteristics of flow in positive and negative tie networks some of these measures are not applicable on negative ties. This paper also discusses new methods that have been developed specifically for analyzing negative ties such as negative degree, and h∗ measure along with the measures based on mixture of positive and negative ties. The different types of social network analysis approaches have been reviewed and compared to determine the best approach that can appropriately identify the negative ties in online networks. It has been analyzed that only few measures such as Degree and PN centrality are applicable for identifying outsiders in network. For applicability in online networks, the performance of PN measure needs to be verified and further, new measures should be developed based upon negative clique concept.

  13. Hierarchical self-assembly of a striped gyroid formed by threaded chiral mesoscale networks

    DEFF Research Database (Denmark)

    Kirkensgaard, Jacob Judas Kain; Evans, Myfanwy; de Campo, Lilliana;

    2014-01-01

    the gyroid film are densely packed and contain either graphitic hcb nets (chicken wire) or srs nets, forming convoluted intergrowths of multiple nets. Furthermore, each net is ideally a single chiral enantiomer, induced by the gyroid architecture. However, the numerical simulations result in defect......Numerical simulations reveal a family of hierarchical and chiral multicontinuous network structures self-assembled from a melt blend of Y-shaped ABC and ABD three-miktoarm star terpolymers, constrained to have equal-sized A/B and C/D chains, respectively. The C and D majority domains within...

  14. A hierarchical virtual backbone construction protocol for mobile ad hoc networks

    Directory of Open Access Journals (Sweden)

    Bharti Sharma

    2016-07-01

    Full Text Available We propose a hierarchical backbone construction protocol for mobile ad hoc networks. Our protocol is based on the idea of using an efficient extrema finding method to create clusters comprising the nodes that are within certain prespecified wireless hop distance. Afterward, we apply our ‘diameter’ algorithm among clusters to identify the dominating nodes that are, finally, connected via multi-hop virtual links to construct the backbone. We present the analytic as well as simulation study of our algorithm and also a method for the dynamic maintenance of constructed backbone. In the end, we illustrate the use of the virtual backbone with the help of an interesting application.

  15. On Hierarchical Extensions of Large-Scale 4-regular Grid Network Structures

    DEFF Research Database (Denmark)

    Pedersen, Jens Myrup; Patel, A.; Knudsen, Thomas Phillip

    It is studied how the introduction of ordered hierarchies in 4-regular grid network structures decreses distances remarkably, while at the same time allowing for simple topological routing schemes. Both meshes and tori are considered; in both cases non-hierarchical structures have power law......, and it is shown that while they allow for more flexibility in design and construction of structures supporting topological routing, their performances are comparable to the performance of the perfect square mesh. Finally suggestions for further research within the field are given....

  16. On Hierarchical Extensions of Large-Scale 4-regular Grid Network Structures

    DEFF Research Database (Denmark)

    Pedersen, Jens Myrup; Patel, A.; Knudsen, Thomas Phillip

    2004-01-01

    It is studied how the introduction of ordered hierarchies in 4-regular grid network structures decreases distances remarkably, while at the same time allowing for simple topological routing schemes. Both meshes and tori are considered; in both cases non-hierarchical structures have power law......, and it is shown that while they allow for more flexibility in design and construction of structures supporting topological routing, their performances are comparable to the performance of the perfect square mesh. Finally suggestions for further research within the field are given....

  17. Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks

    Science.gov (United States)

    Yang, Yanjiang; Zhou, Jianying; Deng, Robert H.; Bao, Feng

    Self-healing group key distribution aims to achieve robust key distribution over lossy channels in wireless sensor networks (WSNs). However, all existing self-healing group key distribution schemes in the literature consider homogenous WSNs which are known to be unscalable. Heterogeneous WSNs have better scalability and performance than homogenous ones. We are thus motivated to study hierarchial self-healing group key distribution, tailored to the heterogeneous WSN architecture. In particular, we revisit and adapt Dutta et al.’s model to the setting of hierarchical self-healing group key distribution, and propose a concrete scheme that achieves computational security and high efficiency.

  18. Socially-Aware Networking: A Survey

    OpenAIRE

    Xia, Feng; Liu, Li; Li, Jie; Ma, Jianhua; Vasilakos, Athanasios V.

    2013-01-01

    The widespread proliferation of handheld devices enables mobile carriers to be connected at anytime and anywhere. Meanwhile, the mobility patterns of mobile devices strongly depend on the users' movements, which are closely related to their social relationships and behaviors. Consequently, today's mobile networks are becoming increasingly human centric. This leads to the emergence of a new field which we call socially-aware networking (SAN). One of the major features of SAN is that social awa...

  19. DEPENDENCE ON SOCIAL NETWORKING SITES IN ADOLESCENTS

    Directory of Open Access Journals (Sweden)

    Ranjith

    2016-03-01

    Full Text Available BACKGROUND Social Networking Sites (SNSs are “web-based services” that allow individuals to: (1 Construct a public or semi-public profile within a bounded system, (2 Articulate a list of other users with whom they share a connection, and (3 View and traverse their list of connections and those made by others within the system.” Social networking sites like Facebook, WhatsApp, Snapchat, Twitter, etc. are virtual communities where users can create individual public profiles, interact with real life friends and meet other people based on shared interests. Negative correlates of Social Networking Sites usage include the decrease in real life social community participation and academic achievement as well as relationship problems, each of which may be indicative of potential addiction. AIMS AND OBJECTIVES To study and assess the dependence on social networking sites among medical college students of adolescent age group. MATERIALS AND METHODOLOGY 200 subjects, both boys and girls were included in the cross-sectional study who were given a 20-item Young’s internet addiction test modified for social networking sites. The responses were analysed using Chi square test and Fisher’s exact test. RESULTS Of 198 students, 24.74% of them had occasional or ‘frequency’ problems, while 2.02% of them were experiencing severe problems due to excessive time spent using social networking sites and boys spent excessive time on internet compared to girls. CONCLUSION With the growth of technology and increasing popularity of social media, social networking sites have become a part and parcel of adolescent life. Though it is helping students in emotional development and connecting with friends and family, adolescents are devoting significant time to social networking on websites and are prone to become dependent to such form of online social interaction which can affect their academics and decrease real life social community participation.

  20. SOCIAL NETWORKS AS DISPOSITIVES OF NEOLIBERAL GOVERNMENTALITY

    OpenAIRE

    Julio Cesar Lemes de Castro

    2016-01-01

    This article of theoretical reflection investigates the social networks that emerge in the context of Web 2.0, such as Facebook, as dispositives of neoliberal governmentality in the sense proposed by Foucault. From the standpoint of government of self, the design of social networks establishes a competition for attention that tends to favor the neoliberal culture of performance. In terms of social organization, the way in which users intertwine their connections is paralleled by the neolibera...

  1. Structural Holes in Directed Fuzzy Social Networks

    OpenAIRE

    Renjie Hu; Guangyu Zhang

    2014-01-01

    The structural holes have been a key issue in fuzzy social network analysis. For undirected fuzzy social networks where edges are just present or absent undirected fuzzy relation and have no more information attached, many structural holes measures have been presented, such as key fuzzy structural holes, general fuzzy structural holes, strong fuzzy structural holes, and weak fuzzy structural holes. There has been a growing need to design structural holes measures for directed fuzzy social net...

  2. Hierarchical organization of functional connectivity in the mouse brain: a complex network approach

    Science.gov (United States)

    Bardella, Giampiero; Bifone, Angelo; Gabrielli, Andrea; Gozzi, Alessandro; Squartini, Tiziano

    2016-08-01

    This paper represents a contribution to the study of the brain functional connectivity from the perspective of complex networks theory. More specifically, we apply graph theoretical analyses to provide evidence of the modular structure of the mouse brain and to shed light on its hierarchical organization. We propose a novel percolation analysis and we apply our approach to the analysis of a resting-state functional MRI data set from 41 mice. This approach reveals a robust hierarchical structure of modules persistent across different subjects. Importantly, we test this approach against a statistical benchmark (or null model) which constrains only the distributions of empirical correlations. Our results unambiguously show that the hierarchical character of the mouse brain modular structure is not trivially encoded into this lower-order constraint. Finally, we investigate the modular structure of the mouse brain by computing the Minimal Spanning Forest, a technique that identifies subnetworks characterized by the strongest internal correlations. This approach represents a faster alternative to other community detection methods and provides a means to rank modules on the basis of the strength of their internal edges.

  3. An Introduction to Social Network Data Analytics

    Science.gov (United States)

    Aggarwal, Charu C.

    The advent of online social networks has been one of the most exciting events in this decade. Many popular online social networks such as Twitter, LinkedIn, and Facebook have become increasingly popular. In addition, a number of multimedia networks such as Flickr have also seen an increasing level of popularity in recent years. Many such social networks are extremely rich in content, and they typically contain a tremendous amount of content and linkage data which can be leveraged for analysis. The linkage data is essentially the graph structure of the social network and the communications between entities; whereas the content data contains the text, images and other multimedia data in the network. The richness of this network provides unprecedented opportunities for data analytics in the context of social networks. This book provides a data-centric view of online social networks; a topic which has been missing from much of the literature. This chapter provides an overview of the key topics in this field, and their coverage in this book.

  4. Heads First: Visual Aftereffects Reveal Hierarchical Integration of Cues to Social Attention.

    Directory of Open Access Journals (Sweden)

    Sarah Cooney

    Full Text Available Determining where another person is attending is an important skill for social interaction that relies on various visual cues, including the turning direction of the head and body. This study reports a novel high-level visual aftereffect that addresses the important question of how these sources of information are combined in gauging social attention. We show that adapting to images of heads turned 25° to the right or left produces a perceptual bias in judging the turning direction of subsequently presented bodies. In contrast, little to no change in the judgment of head orientation occurs after adapting to extremely oriented bodies. The unidirectional nature of the aftereffect suggests that cues from the human body signaling social attention are combined in a hierarchical fashion and is consistent with evidence from single-cell recording studies in nonhuman primates showing that information about head orientation can override information about body posture when both are visible.

  5. Evaluating the Performance of Fast Handover for Hierarchical MIPv6 in Cellular Networks

    Directory of Open Access Journals (Sweden)

    Li Jun Zhang

    2008-06-01

    Full Text Available Next-Generation Wireless Networks (NGWNs present an all-IP-based architecture integrating existing cellular networks with Wireless Local Area Networks (WLANs, Wireless Metropolitan Area Networks (WMANs, ad hoc networks, Bluetooth, etc. This makes mobility management an important issue for users roaming among these networks/systems. On one hand, intelligent schemes need to be devised to empower mobile users to benefit from the IP-based technology. On the other hand, new solutions are required to take into account global roaming among various radio access technologies and support of real-time multimedia services. This paper presents a comprehensive performance analysis of Fast handover for Hierarchical Mobile IPv6 (F-HMIPv6 using the fluid-flow and randomwalk mobility models. Location update cost, packet delivery cost and total cost functions are formulated based on the proposed analytical models. We investigate the impact of several wireless system factors such as user velocity, user density, mobility domain size, session-to-mobility ratio on these costs, and present some numerical results.

  6. Mobile Agent Based Hierarchical Intrusion Detection System in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Surraya Khanum

    2012-01-01

    Full Text Available Security mechanism is a fundamental requirement of wireless networks in general and Wireless Sensor Networks (WSN in particular. Therefore, it is necessary that this security concern must be articulate right from the beginning of the network design and deployment. WSN needs strong security mechanism as it is usually deployed in a critical, hostile and sensitive environment where human labour is usually not involved. However, due to inbuilt resource and computing restriction, security in WSN needs a special consideration. Traditional security techniques such as encryption, VPN, authentication and firewalls cannot be directly applied to WSN as it provides defence only against external threats. The existing literature shows that there seems an inverse relationship between strong security mechanism and efficient network resource utilization. In this research article, we have proposed a Mobile Agent Based Hierarchical Intrusion Detection System (MABHIDS for WSN. The Proposed scheme performs two levels of intrusion detection by utilizing minimum possible network resources. Our proposed idea enhance network lifetime by reducing the work load on Cluster Head (CH and it also provide enhanced level of security in WSN.

  7. Hierarchical Supervisor and Agent Routing Algorithm in LEO/MEO Double-layered Optical Satellite Network

    Science.gov (United States)

    Li, Yongjun; Zhao, Shanghong

    2016-09-01

    A novel routing algorithm (Hierarchical Supervisor and Agent Routing Algorithm, HSARA) for LEO/MEO (low earth orbit/medium earth orbit) double-layered optical satellite network is brought forward. The so-called supervisor (MEO satellite) is designed for failure recovery and network management. LEO satellites are grouped according to the virtual managed field of MEO which is different from coverage area of MEO satellite in RF satellite network. In each LEO group, one LEO satellite which has maximal persistent link with its supervisor is called the agent. A LEO group is updated when this optical inter-orbit links between agent LEO satellite and the corresponding MEO satellite supervisor cuts off. In this way, computations of topology changes and LEO group updating can be decreased. Expense of routing is integration of delay and wavelength utilization. HSARA algorithm simulations are implemented and the results are as follows: average network delay of HSARA can reduce 21 ms and 31.2 ms compared with traditional multilayered satellite routing and single-layer LEO satellite respectively; LEO/MEO double-layered optical satellite network can cover polar region which cannot be covered by single-layered LEO satellite and throughput is 1% more than that of single-layered LEO satellite averagely. Therefore, exact global coverage can be achieved with this double-layered optical satellite network.

  8. Spreading paths in partially observed social networks

    CERN Document Server

    Onnela, Jukka-Pekka

    2011-01-01

    Understanding how far information, behaviors, or pathogens spread in social networks is an important problem, having implications for both predicting the size of epidemics, as well as for planning effective interventions. There are, however, two main challenges for inferring spreading path lengths in real-world networks. One is the practical difficulty of observing a dynamic process on a network, and the other is the typical constraint of only partially observing a network. Using a static, structurally realistic social network as a platform for simulations, we juxtapose three distinct paths: (1) the stochastic path taken by a simulated spreading process from source to target; (2) the topologically shortest path in the fully observed network, and hence the single most likely stochastic path, between the two nodes; and (3) the topologically shortest path in a partially observed network. In a sampled network, how closely does the partially observed shortest path (3) emulate the unobserved spreading path (1)? Alt...

  9. Loneliness, Social Networks, and Social Functioning in Borderline Personality Disorder.

    Science.gov (United States)

    Liebke, Lisa; Bungert, Melanie; Thome, Janine; Hauschild, Sophie; Gescher, Dorothee Maria; Schmahl, Christian; Bohus, Martin; Lis, Stefanie

    2016-08-08

    Persistent loneliness is often reported by patients with borderline personality disorder (BPD). However, empirical studies investigating this aspect of BPD psychopathology are sparse. Studies from social psychology revealed that social isolation and low social functioning contribute to loneliness, that is, the subjective feeling of being alone. The aim of the present study was to contribute to the understanding of loneliness in BPD by investigating its relation to social isolation and functioning in different domains of life. Subjective experience of loneliness was measured in 80 women (40 BPD patients, 40 healthy controls) with the UCLA Loneliness Scale. Social isolation and social functioning were assessed with the Social Network Inventory and the Social Functioning Scale. In addition, we assessed global functioning with the Global Assessment of Functioning. BPD patients reported stronger feelings of loneliness compared to healthy participants. In general, the level of loneliness was linked to network size, social engagement, and prosocial behavior. Diversity of social networks and functioning in the domain of interpersonal communication were associated with the level of loneliness only in BPD. A reduced variety of roles in social life together with impairments in interpersonal communication were particularly relevant for the experience of loneliness in BPD, suggesting an indirect path to target this psychopathological feature in therapeutic interventions. However, both social isolation and social functioning were not sufficient to explain the severely increased loneliness experienced by these patients, stressing the need for further investigation of determinants of loneliness in this clinical population. (PsycINFO Database Record

  10. The Social Origins of Networks and Diffusion.

    Science.gov (United States)

    Centola, Damon

    2015-03-01

    Recent research on social contagion has demonstrated significant effects of network topology on the dynamics of diffusion. However, network topologies are not given a priori. Rather, they are patterns of relations that emerge from individual and structural features of society, such as population composition, group heterogeneity, homophily, and social consolidation. Following Blau and Schwartz, the author develops a model of social network formation that explores how social and structural constraints on tie formation generate emergent social topologies and then explores the effectiveness of these social networks for the dynamics of social diffusion. Results show that, at one extreme, high levels of consolidation can create highly balkanized communities with poor integration of shared norms and practices. As suggested by Blau and Schwartz, reducing consolidation creates more crosscutting circles and significantly improves the dynamics of social diffusion across the population. However, the author finds that further reducing consolidation creates highly intersecting social networks that fail to support the widespread diffusion of norms and practices, indicating that successful social diffusion can depend on moderate to high levels of structural consolidation.

  11. Anomaly detection in online social networks

    CERN Document Server

    Savage, David; Yu, Xinghuo; Chou, Pauline; Wang, Qingmai

    2016-01-01

    Anomalies in online social networks can signify irregular, and often illegal behaviour. Anomalies in online social networks can signify irregular, and often illegal behaviour. Detection of such anomalies has been used to identify malicious individuals, including spammers, sexual predators, and online fraudsters. In this paper we survey existing computational techniques for detecting anomalies in online social networks. We characterise anomalies as being either static or dynamic, and as being labelled or unlabelled, and survey methods for detecting these different types of anomalies. We suggest that the detection of anomalies in online social networks is composed of two sub-processes; the selection and calculation of network features, and the classification of observations from this feature space. In addition, this paper provides an overview of the types of problems that anomaly detection can address and identifies key areas of future research.

  12. Social networks a framework of computational intelligence

    CERN Document Server

    Chen, Shyi-Ming

    2014-01-01

    This volume provides the audience with an updated, in-depth and highly coherent material on the conceptually appealing and practically sound information technology of Computational Intelligence applied to the analysis, synthesis and evaluation of social networks. The volume involves studies devoted to key issues of social networks including community structure detection in networks, online social networks, knowledge growth and evaluation, and diversity of collaboration mechanisms.  The book engages a wealth of methods of Computational Intelligence along with well-known techniques of linear programming, Formal Concept Analysis, machine learning, and agent modeling.  Human-centricity is of paramount relevance and this facet manifests in many ways including personalized semantics, trust metric, and personal knowledge management; just to highlight a few of these aspects. The contributors to this volume report on various essential applications including cyber attacks detection, building enterprise social network...

  13. SOCIAL NETWORKS AS DISPOSITIVES OF NEOLIBERAL GOVERNMENTALITY

    Directory of Open Access Journals (Sweden)

    Julio Cesar Lemes de Castro

    2016-10-01

    Full Text Available This article of theoretical reflection investigates the social networks that emerge in the context of Web 2.0, such as Facebook, as dispositives of neoliberal governmentality in the sense proposed by Foucault. From the standpoint of government of self, the design of social networks establishes a competition for attention that tends to favor the neoliberal culture of performance. In terms of social organization, the way in which users intertwine their connections is paralleled by the neoliberal paradigm of spontaneous market order. Furthermore, the use of personal information on these users, encompassing all their activities within the networks, in order to set up databases to attract advertisers reflects the neoliberal tendency of colonization of the different realms of existence by economic forces. However, the tensions that accompany neoliberal governmentality in social networks reveal its limitations, opening the possibility for these networks to also act as instruments of resistance to neoliberalism.

  14. Temporal fidelity in dynamic social networks

    DEFF Research Database (Denmark)

    Stopczynski, Arkadiusz; Sapiezynski, Piotr; Pentland, Alex ‘Sandy’

    2015-01-01

    of the network dynamics can be used to inform the process of measuring social networks. The details of measurement are of particular importance when considering dynamic processes where minute-to-minute details are important, because collection of physical proximity interactions with high temporal resolution......It has recently become possible to record detailed social interactions in large social systems with high resolution. As we study these datasets, human social interactions display patterns that emerge at multiple time scales, from minutes to months. On a fundamental level, understanding...... is difficult and expensive. Here, we consider the dynamic network of proximity-interactions between approximately 500 individuals participating in the Copenhagen Networks Study. We show that in order to accurately model spreading processes in the network, the dynamic processes that occur on the order...

  15. Corporate Social Responsibility in Online Social Networks

    DEFF Research Database (Denmark)

    Horn, Christian; Brem, Alexander; Wölfl, S.

    2014-01-01

    Considering growing public awareness of social, ethical and ecological responsibility, companies have constantly been increasing their efforts in CSR communications. Social Media as tools of brand communication receive increasing attention and it is expected that the marketing sector...... will experience changes through this phenomenon in the future. This empirical study investigates the types of content that is communicated for different brands and industries in leading Social Media portals on the German market in 2011. It turns out that this kind of CSR communication differs in terms of portals...

  16. Corporate Social Responsibility in Online Social Networks

    DEFF Research Database (Denmark)

    Horn, Christian; Brem, Alexander; Wölfl, S.

    2014-01-01

    Considering growing public awareness of social, ethical and ecological responsibility, companies have constantly been increasing their efforts in CSR communications. Social Media as tools of brand communication receive increasing attention and it is expected that the marketing sector...... will experience changes through this phenomenon in the future. This empirical study investigates the types of content that is communicated for different brands and industries in leading Social Media portals on the German market in 2011. It turns out that this kind of CSR communication differs in terms of portals...

  17. Social network analysis of study environment

    Directory of Open Access Journals (Sweden)

    Blaženka Divjak

    2010-06-01

    Full Text Available Student working environment influences student learning and achievement level. In this respect social aspects of students’ formal and non-formal learning play special role in learning environment. The main research problem of this paper is to find out if students' academic performance influences their position in different students' social networks. Further, there is a need to identify other predictors of this position. In the process of problem solving we use the Social Network Analysis (SNA that is based on the data we collected from the students at the Faculty of Organization and Informatics, University of Zagreb. There are two data samples: in the basic sample N=27 and in the extended sample N=52. We collected data on social-demographic position, academic performance, learning and motivation styles, student status (full-time/part-time, attitudes towards individual and teamwork as well as informal cooperation. Afterwards five different networks (exchange of learning materials, teamwork, informal communication, basic and aggregated social network were constructed. These networks were analyzed with different metrics and the most important were betweenness, closeness and degree centrality. The main result is, firstly, that the position in a social network cannot be forecast only by academic success and, secondly, that part-time students tend to form separate groups that are poorly connected with full-time students. In general, position of a student in social networks in study environment can influence student learning as well as her/his future employability and therefore it is worthwhile to be investigated.

  18. Hierarchical alteration of brain structural and functional networks in female migraine sufferers.

    Directory of Open Access Journals (Sweden)

    Jixin Liu

    Full Text Available BACKGROUND: Little is known about the changes of brain structural and functional connectivity networks underlying the pathophysiology in migraine. We aimed to investigate how the cortical network reorganization is altered by frequent cortical overstimulation associated with migraine. METHODOLOGY/PRINCIPAL FINDINGS: Gray matter volumes and resting-state functional magnetic resonance imaging signal correlations were employed to construct structural and functional networks between brain regions in 43 female patients with migraine (PM and 43 gender-matched healthy controls (HC by using graph theory-based approaches. Compared with the HC group, the patients showed abnormal global topology in both structural and functional networks, characterized by higher mean clustering coefficients without significant change in the shortest absolute path length, which indicated that the PM lost optimal topological organization in their cortical networks. Brain hubs related to pain-processing revealed abnormal nodal centrality in both structural and functional networks, including the precentral gyrus, orbital part of the inferior frontal gyrus, parahippocampal gyrus, anterior cingulate gyrus, thalamus, temporal pole of the middle temporal gyrus and the inferior parietal gyrus. Negative correlations were found between migraine duration and regions with abnormal centrality. Furthermore, the dysfunctional connections in patients' cortical networks formed into a connected component and three dysregulated modules were identified involving pain-related information processing and motion-processing visual networks. CONCLUSIONS: Our results may reflect brain alteration dynamics resulting from migraine and suggest that long-term and high-frequency headache attacks may cause both structural and functional connectivity network reorganization. The disrupted information exchange between brain areas in migraine may be reshaped into a hierarchical modular structure progressively.

  19. Fundamental structures of dynamic social networks

    DEFF Research Database (Denmark)

    Sekara, Vedran; Stopczynski, Arkadiusz; Jørgensen, Sune Lehmann

    2016-01-01

    and their interactions in the network of real-world person-to-person proximity measured via Bluetooth, as well as their telecommunication networks, online social media contacts, geolocation, and demographic data. These high-resolution data allow us to observe social groups directly, rendering community detection...... a pattern of recurring meetings across weeks and months, each with varying degrees of regularity. Taken together, these findings provide a powerful simplification of the social network, where cores represent fundamental structures expressed with strong temporal and spatial regularity. Using this framework......, we explore the complex interplay between social and geospatial behavior, documenting how the formation of cores is preceded by coordination behavior in the communication networks and demonstrating that social behavior can be predicted with high precision....

  20. Benford's Law Applies to Online Social Networks.

    Directory of Open Access Journals (Sweden)

    Jennifer Golbeck

    Full Text Available Benford's Law states that, in naturally occurring systems, the frequency of numbers' first digits is not evenly distributed. Numbers beginning with a 1 occur roughly 30% of the time, and are six times more common than numbers beginning with a 9. We show that Benford's Law applies to social and behavioral features of users in online social networks. Using social data from five major social networks (Facebook, Twitter, Google Plus, Pinterest, and LiveJournal, we show that the distribution of first significant digits of friend and follower counts for users in these systems follow Benford's Law. The same is true for the number of posts users make. We extend this to egocentric networks, showing that friend counts among the people in an individual's social network also follows the expected distribution. We discuss how this can be used to detect suspicious or fraudulent activity online and to validate datasets.

  1. The international entrepreneurial firms' social networks

    Directory of Open Access Journals (Sweden)

    Manuel Portugal Ferreira

    Full Text Available This paper investigates theoretically the importance and impact of the international entrepreneurial firms' (IEFs social networks on selected firms' strategies. We focus specifically on some core attributes of IEFs and the impact of social networks on such strategies as the choice of the foreign markets to operate and the foreign entry modes. The social networks are a major driver of the internationalization from inception and help in overcoming a variety of physical and social resource limitations as well as transactional hazards. We conclude that it is likely that both some fundamental characteristics of the IEFs and those of the foreign markets entered account for these firms reliance on their social networks.

  2. Organ trade using social networks

    Directory of Open Access Journals (Sweden)

    Waleed Alrogy

    2016-01-01

    Full Text Available Organ transplantation is recognized worldwide as an effective treatment for organ failure. However, due to the increase in the number of patients requiring a transplant, a shortage of suitable organs for transplantation has become a global problem. Human organ trade is an illegal practice of buying or selling organs and is universally sentenced. The aim of this study was to search social network for organ trade and offerings in Saudi Arabia. The study was conducted from June 22, 2015 to February 19, 2016. The search was conducted on Twitter, Google answers, and Facebook using the following terms: kidney for sale, kidneys for sale, liver for sale, kidney wanted, liver wanted, kidney donor, and liver donor. We found a total of 557 adverts on organ trade, 165 (30% from donors or sellers, and 392 (70% from recipients or buyers. On Twitter, we found 472 (85% adverts, on Google answers 61 (11%, and on Facebook 24 (4%. Organ trade is a global problem, and yet it is increasingly seen in many countries. Although the Saudi Center for Organ Transplantation by-laws specifically prohibits and monitors any form of commercial transplantation, it is still essential to enforce guidelines for medical professionals to detect and prevent such criminal acts.

  3. Social network sampling using spanning trees

    Science.gov (United States)

    Jalali, Zeinab S.; Rezvanian, Alireza; Meybodi, Mohammad Reza

    2016-12-01

    Due to the large scales and limitations in accessing most online social networks, it is hard or infeasible to directly access them in a reasonable amount of time for studying and analysis. Hence, network sampling has emerged as a suitable technique to study and analyze real networks. The main goal of sampling online social networks is constructing a small scale sampled network which preserves the most important properties of the original network. In this paper, we propose two sampling algorithms for sampling online social networks using spanning trees. The first proposed sampling algorithm finds several spanning trees from randomly chosen starting nodes; then the edges in these spanning trees are ranked according to the number of times that each edge has appeared in the set of found spanning trees in the given network. The sampled network is then constructed as a sub-graph of the original network which contains a fraction of nodes that are incident on highly ranked edges. In order to avoid traversing the entire network, the second sampling algorithm is proposed using partial spanning trees. The second sampling algorithm is similar to the first algorithm except that it uses partial spanning trees. Several experiments are conducted to examine the performance of the proposed sampling algorithms on well-known real networks. The obtained results in comparison with other popular sampling methods demonstrate the efficiency of the proposed sampling algorithms in terms of Kolmogorov-Smirnov distance (KSD), skew divergence distance (SDD) and normalized distance (ND).

  4. Analysis of Hierarchical Diff-EDF Schedulability over Heterogeneous Real-Time Packet Networks

    Directory of Open Access Journals (Sweden)

    M. Saleh

    2007-01-01

    Full Text Available Packet networks are currently enabling the integration of traffic with a wide range of characteristics that extend from video traffic with stringent QoS requirements to the best-effort traffic requiring no guarantees. QoS guarantees can be provided in conventional packet networks by the use of proper packet scheduling algorithms. As a computer revolution, many scheduling algorithms have been proposed to provide different schemes of QoS guarantees with Earliest Deadline First (EDF as the most popular one. With EDF scheduling, all flows receive the same miss rate regardless of their traffic characteristics and deadlines. This makes the standard EDF algorithm unsuitable for situations in which the different flows have different miss rate requirements since in order to meet all miss rate requirements it is necessary to limit admissions so as to satisfy the flow with the most stringent miss rate requirements. In this paper, we propose a new priority assignment scheduling algorithm, Hierarchal Diff-EDF (Differentiate Earliest Deadline First, which can meet the real-time needs of these applications while continuing to provide best effort service to non-real time traffic. The Hierarchal Diff-EDF features a feedback control mechanism that detects overload conditions and modifies packet priority assignments accordingly. To examine our proposed scheduler model, we introduced our attempt to provide an exact analytical solution. The attempt showed that the solution was apparently very complicated due to the high interdependence between the system queues' service. Hence, the use of simulation techniques seems inevitable. The simulation results showed that the Hierarchical Diff-EDF achieved the minimum packet average delay when compared with both EDF and Diff-EDF schedulers.

  5. Hierarchical structures of correlations networks among Turkey’s exports and imports by currencies

    Science.gov (United States)

    Kocakaplan, Yusuf; Deviren, Bayram; Keskin, Mustafa

    2012-12-01

    We have examined the hierarchical structures of correlations networks among Turkey’s exports and imports by currencies for the 1996-2010 periods, using the concept of a minimal spanning tree (MST) and hierarchical tree (HT) which depend on the concept of ultrametricity. These trees are useful tools for understanding and detecting the global structure, taxonomy and hierarchy in financial markets. We derived a hierarchical organization and build the MSTs and HTs during the 1996-2001 and 2002-2010 periods. The reason for studying two different sub-periods, namely 1996-2001 and 2002-2010, is that the Euro (EUR) came into use in 2001, and some countries have made their exports and imports with Turkey via the EUR since 2002, and in order to test various time-windows and observe temporal evolution. We have carried out bootstrap analysis to associate a value of the statistical reliability to the links of the MSTs and HTs. We have also used the average linkage cluster analysis (ALCA) to observe the cluster structure more clearly. Moreover, we have obtained the bidimensional minimal spanning tree (BMST) due to economic trade being a bidimensional problem. From the structural topologies of these trees, we have identified different clusters of currencies according to their proximity and economic ties. Our results show that some currencies are more important within the network, due to a tighter connection with other currencies. We have also found that the obtained currencies play a key role for Turkey’s exports and imports and have important implications for the design of portfolio and investment strategies.

  6. Social networking among upper extremity patients.

    Science.gov (United States)

    Rozental, Tamara D; George, Tina M; Chacko, Aron T

    2010-05-01

    Despite their rising popularity, the health care profession has been slow to embrace social networking sites. These are Web-based initiatives, designed to bring people with common interests or activities under a common umbrella. The purpose of this study is to evaluate social networking patterns among upper extremity patients. A total of 742 anonymous questionnaires were distributed among upper extremity outpatients, with a 62% response rate (462 were completed). Demographic characteristics (gender, age, level of education, employment, type of health insurance, and income stratification) were defined, and data on computer ownership and frequency of social networking use were collected. Social network users and nonusers were compared according to their demographic and socioeconomic characteristics. Our patient cohort consisted of 450 patients. Of those 450 patients, 418 had a high school education or higher, and 293 reported a college or graduate degree. The majority of patients (282) were employed at the time of the survey, and income was evenly distributed among U.S. Census Bureau quintiles. A total of 349 patients reported computer ownership, and 170 reported using social networking sites. When compared to nonusers, social networking users were younger (pnetworking use. Most users (n = 114) regularly visit a single site. Facebook was the most popular site visited (n=142), followed by MySpace (n=28) and Twitter (n=16). Of the 450 upper extremity patients in our sample, 170 use social networking sites. Younger age, higher level of education, and computer ownership were associated with social networking use. Physicians should consider expanding their use of social networking sites to reach their online patient populations. Copyright 2010 American Society for Surgery of the Hand. Published by Elsevier Inc. All rights reserved.

  7. Gel-based composite polymer electrolytes with novel hierarchical mesoporous silica network for lithium batteries

    Energy Technology Data Exchange (ETDEWEB)

    Wang Xiaoliang; Cai Qiang [Department of Materials Science and Engineering, and State Key Laboratory of New Ceramics and Fine Processing, Tsinghua University, Beijing 100084 (China); Fan Lizhen [School of Materials Science and Engineering, University of Science and Technology Beijing, Beijing 100083 (China); Hua Tao; Lin Yuanhua [Department of Materials Science and Engineering, and State Key Laboratory of New Ceramics and Fine Processing, Tsinghua University, Beijing 100084 (China); Nan Cewen [Department of Materials Science and Engineering, and State Key Laboratory of New Ceramics and Fine Processing, Tsinghua University, Beijing 100084 (China)], E-mail: cwnan@tsinghua.edu.cn

    2008-11-15

    In the present work, novel gel-based composite polymer electrolytes for lithium batteries were prepared by introducing a hierarchical mesoporous silica network to the poly(vinylidene fluoride-hexafluoropropylene) (PVDF-HFP)-based gel electrolytes. As compared with the PVDF-HFP-based gel electrolytes with/without conventional nano-sized silica fillers, the novel electrolytes have shown more homogeneous microstructure, higher ionic conductivity and better mechanical stability, which could be caused by the strong silica network and the effective interactions among the polymer, the liquid electrolytes and the silica. Moreover, the cell with this kind of electrolytes could achieve a discharge capacity as much as 150 mAh g{sup -1} at room temperature (LiCoO{sub 2} as the cathode active material), with high Coulomb efficiency.

  8. Gel-based composite polymer electrolytes with novel hierarchical mesoporous silica network for lithium batteries

    Energy Technology Data Exchange (ETDEWEB)

    Wang, Xiao-Liang; Cai, Qiang; Hua, Tao; Lin, Yuan-Hua; Nan, Ce-Wen [Department of Materials Science and Engineering, and State Key Laboratory of New Ceramics and Fine Processing, Tsinghua University, Beijing 100084 (China); Fan, Li-Zhen [School of Materials Science and Engineering, University of Science and Technology Beijing, Beijing 100083 (China)

    2008-11-15

    In the present work, novel gel-based composite polymer electrolytes for lithium batteries were prepared by introducing a hierarchical mesoporous silica network to the poly(vinylidene fluoride-hexafluoropropylene) (PVDF-HFP)-based gel electrolytes. As compared with the PVDF-HFP-based gel electrolytes with/without conventional nano-sized silica fillers, the novel electrolytes have shown more homogeneous microstructure, higher ionic conductivity and better mechanical stability, which could be caused by the strong silica network and the effective interactions among the polymer, the liquid electrolytes and the silica. Moreover, the cell with this kind of electrolytes could achieve a discharge capacity as much as 150 mAh g{sup -1} at room temperature (LiCoO{sub 2} as the cathode active material), with high Coulomb efficiency. (author)

  9. A New Enhanced Fast Handover Algorithm in Hierarchical Mobile IPv6 Network

    Institute of Scientific and Technical Information of China (English)

    XU Kai; JI Hong; YUE Guang-xin

    2004-01-01

    Hierarchical Mobile IPv6 (HMIPv6) can reduce the delay and the amount of signaling during handover compared with the basic mobile IPv6. However, the protocol still cannot meet the requirement for traffic that is delay sensitive, such as voice, especially in macro mobility handover. Duplicate address detection and the transmission time for the handover operation could cause high handover delay. This paper proposes a new mechanism to improve the fast handover algorithms efficiency in HMIPv6 network. And we present and analyze the performance testing for our proposal by comparing it with the traditional HMIPv6 fast handover algorithm. The results of simulation show that our scheme can reduce the handover delay much more than the traditional fast handover method for HMIPv6 network.

  10. A special hierarchical fuzzy neural-networks based reinforcement learning for multi-variables system

    Institute of Scientific and Technical Information of China (English)

    ZHANG Wen-zhi; LU Tian-sheng

    2005-01-01

    Proposes a reinforcement learning scheme based on a special Hierarchical Fuzzy Neural-Networks (HFNN) for solving complicated learning tasks in a continuous multi-variables environment. The output of the previous layer in the HFNN is no longer used as if-part of the next layer, but used only in then-part. Thus it can deal with the difficulty when the output of the previous layer is meaningless or its meaning is uncertain. The proposed HFNN has a minimal number of fuzzy rules and can successfully solve the problem of rules combination explosion and decrease the quantity of computation and memory requirement. In the learning process, two HFNN with the same structure perform fuzzy action composition and evaluation function approximation simultaneously where the parameters of neural-networks are tuned and updated on line by using gradient descent algorithm. The reinforcement learning method is proved to be correct and feasible by simulation of a double inverted pendulum system.

  11. Hierarchical Neural Networks Method for Fault Diagnosis of Large-Scale Analog Circuits

    Institute of Scientific and Technical Information of China (English)

    TAN Yanghong; HE Yigang; FANG Gefeng

    2007-01-01

    A novel hierarchical neural networks (HNNs) method for fault diagnosis of large-scale circuits is proposed. The presented techniques using neural networks(NNs) approaches require a large amount of computation for simulating various faulty component possibilities. For large scale circuits, the number of possible faults, and hence the simulations, grow rapidly and become tedious and sometimes even impractical. Some NNs are distributed to the torn sub-blocks according to the proposed torn principles of large scale circuits. And the NNs are trained in batches by different patterns in the light of the presented rules of various patterns when the DC, AC and transient responses of the circuit are available. The method is characterized by decreasing the over-lapped feasible domains of responses of circuits with tolerance and leads to better performance and higher correct classification. The methodology is illustrated by means of diagnosis examples.

  12. Robustness Results for Hierarchical Diff-EDF Scheduling upon Heterogeneous Real-Time Packet Networks

    Directory of Open Access Journals (Sweden)

    Moutaz Saleh

    2007-01-01

    Full Text Available Packet networks are currently enabling the integration of traffic with a wide range of characteristics that extend from video traffic with stringent QoS requirements to the best-effort traffic requiring no guarantees. QoS guarantees can be provided in conventional packet networks by the use of proper packet scheduling algorithms. As a computer revolution, many scheduling algorithms have been proposed to provide different schemes of QoS guarantees with Earliest Deadline First (EDF as the most popular one. With EDF scheduling, all flows receive the same miss rate regardless of their traffic characteristics and deadlines. This makes the standard EDF algorithm unsuitable for situations in which the different flows have different miss rate requirements since in order to meet all miss rate requirements it is necessary to limit admissions so as to satisfy the flow with the most stringent miss rate requirements. In this study, we propose a new priority assignment scheduling algorithm, Hierarchal Diff-EDF (Differentiate Earliest Deadline First, which can meet the real-time needs of these applications while continuing to provide best effort service to non-real time traffic. The Hierarchal Diff-EDF features a feedback control mechanism that detects overload conditions and modifies packet priority assignments accordingly.

  13. SMR-Based Adaptive Mobility Management Scheme in Hierarchical SIP Networks

    Directory of Open Access Journals (Sweden)

    KwangHee Choi

    2014-10-01

    Full Text Available In hierarchical SIP networks, paging is performed to reduce location update signaling cost for mobility management. However, the cost efficiency largely depends on each mobile node’s session-to-mobility-ratio (SMR, which is defined as a ratio of the session arrival rate to the movement rate. In this paper, we propose the adaptive mobility management scheme that can determine the policy regarding to each mobile node’s SMR. Each mobile node determines whether the paging is applied or not after comparing its SMR with the threshold. In other words, the paging is applied to a mobile node when a mobile node’s SMR is less than the threshold. Therefore, the proposed scheme provides a way to minimize signaling costs according to each mobile node’s SMR. We find out the optimal threshold through performance analysis, and show that the proposed scheme can reduce signaling cost than the existing SIP and paging schemes in hierarchical SIP networks.

  14. A Social Network Analysis of Occupational Segregation

    DEFF Research Database (Denmark)

    Buhai, Ioan Sebastian; van der Leij, Marco

    We develop a social network model of occupational segregation between different social groups, generated by the existence of positive inbreeding bias among individuals from the same group. If network referrals are important for job search, then expected homophily in the contact network structure...... induces different career choices for individuals from different social groups. This further translates into stable occupational segregation equilibria in the labor market. We derive the conditions for wage and unemployment inequality in the segregation equilibria and characterize first and second best...

  15. The genre tutorial and social networks terminology

    Directory of Open Access Journals (Sweden)

    Márcio Sales Santiago

    2014-02-01

    Full Text Available This paper analyzes the terminology in the Internet social networks tutorials. A tutorial is a specialized text, full of terms, aiming to teach an individual or group of individuals who need some guidelines to operationalize a computerized tool, such as a social network. It is necessary to identify linguistic and terminological characteristics from the specialized lexical units in this digital genre. Social networks terminology is described and exemplified here. The results show that it is possible to refer to two specific terminologies in tutorials which help to determine the terminological profile of the thematic area, specifically from the point of view of denomination.

  16. Fundamental structures of dynamic social networks.

    Science.gov (United States)

    Sekara, Vedran; Stopczynski, Arkadiusz; Lehmann, Sune

    2016-09-06

    Social systems are in a constant state of flux, with dynamics spanning from minute-by-minute changes to patterns present on the timescale of years. Accurate models of social dynamics are important for understanding the spreading of influence or diseases, formation of friendships, and the productivity of teams. Although there has been much progress on understanding complex networks over the past decade, little is known about the regularities governing the microdynamics of social networks. Here, we explore the dynamic social network of a densely-connected population of ∼1,000 individuals and their interactions in the network of real-world person-to-person proximity measured via Bluetooth, as well as their telecommunication networks, online social media contacts, geolocation, and demographic data. These high-resolution data allow us to observe social groups directly, rendering community detection unnecessary. Starting from 5-min time slices, we uncover dynamic social structures expressed on multiple timescales. On the hourly timescale, we find that gatherings are fluid, with members coming and going, but organized via a stable core of individuals. Each core represents a social context. Cores exhibit a pattern of recurring meetings across weeks and months, each with varying degrees of regularity. Taken together, these findings provide a powerful simplification of the social network, where cores represent fundamental structures expressed with strong temporal and spatial regularity. Using this framework, we explore the complex interplay between social and geospatial behavior, documenting how the formation of cores is preceded by coordination behavior in the communication networks and demonstrating that social behavior can be predicted with high precision.

  17. COalitions in COOperation Networks (COCOON): Social Network Analysis and Game Theory to Enhance Cooperation Networks

    NARCIS (Netherlands)

    Sie, Rory

    2012-01-01

    Sie, R. L. L. (2012). COalitions in COOperation Networks (COCOON): Social Network Analysis and Game Theory to Enhance Cooperation Networks (Unpublished doctoral dissertation). September, 28, 2012, Open Universiteit in the Netherlands (CELSTEC), Heerlen, The Netherlands.

  18. COalitions in COOperation Networks (COCOON): Social Network Analysis and Game Theory to Enhance Cooperation Networks

    NARCIS (Netherlands)

    Sie, Rory

    2012-01-01

    Sie, R. L. L. (2012). COalitions in COOperation Networks (COCOON): Social Network Analysis and Game Theory to Enhance Cooperation Networks (Unpublished doctoral dissertation). September, 28, 2012, Open Universiteit in the Netherlands (CELSTEC), Heerlen, The Netherlands.

  19. Hierarchical modularity in ERα transcriptional network is associated with distinct functions and implicates clinical outcomes.

    Science.gov (United States)

    Tang, Binhua; Hsu, Hang-Kai; Hsu, Pei-Yin; Bonneville, Russell; Chen, Su-Shing; Huang, Tim H-M; Jin, Victor X

    2012-01-01

    Recent genome-wide profiling reveals highly complex regulation networks among ERα and its targets. We integrated estrogen (E2)-stimulated time-series ERα ChIP-seq and gene expression data to identify the ERα-centered transcription factor (TF) hubs and their target genes, and inferred the time-variant hierarchical network structures using a Bayesian multivariate modeling approach. With its recurrent motif patterns, we determined three embedded regulatory modules from the ERα core transcriptional network. The GO analyses revealed the distinct biological function associated with each of three embedded modules. The survival analysis showed the genes in each module were able to render a significant survival correlation in breast cancer patient cohorts. In summary, our Bayesian statistical modeling and modularity analysis not only reveals the dynamic properties of the ERα-centered regulatory network and associated distinct biological functions, but also provides a reliable and effective genomic analytical approach for the analysis of dynamic regulatory network for any given TF.

  20. Maintenance of cultural diversity: social roles, social networks, and cognitive networks.

    Science.gov (United States)

    Abrams, Marshall

    2014-06-01

    Smaldino suggests that patterns that give rise to group-level cultural traits can also increase individual-level cultural diversity. I distinguish social roles and related social network structures and discuss ways in which each might maintain diversity. I suggest that cognitive analogs of "cohesion," a property of networks that helps maintenance of diversity, might mediate the effects of social roles on diversity.

  1. Social network analysis and dual rover communications

    Science.gov (United States)

    Litaker, Harry L.; Howard, Robert L.

    2013-10-01

    Social network analysis (SNA) refers to the collection of techniques, tools, and methods used in sociometry aiming at the analysis of social networks to investigate decision making, group communication, and the distribution of information. Human factors engineers at the National Aeronautics and Space Administration (NASA) conducted a social network analysis on communication data collected during a 14-day field study operating a dual rover exploration mission to better understand the relationships between certain network groups such as ground control, flight teams, and planetary science. The analysis identified two communication network structures for the continuous communication and Twice-a-Day Communication scenarios as a split network and negotiated network respectfully. The major nodes or groups for the networks' architecture, transmittal status, and information were identified using graphical network mapping, quantitative analysis of subjective impressions, and quantified statistical analysis using Sociometric Statue and Centrality. Post-questionnaire analysis along with interviews revealed advantages and disadvantages of each network structure with team members identifying the need for a more stable continuous communication network, improved robustness of voice loops, and better systems training/capabilities for scientific imagery data and operational data during Twice-a-Day Communications.

  2. Social network sites: Indispensable or optional social tools?

    DEFF Research Database (Denmark)

    Shklovski, Irina

    2012-01-01

    on the analysis of qualitative data from users of social network sites in Russia and Kazakhstan, this paper consid-ers under what conditions social network sites can become indispensable to their users and when these technologies remain on the periphery of life despite fulfilling useful func-tions. For some...... respondents, these sites had become indis-pensable tools as they were integrated into everyday rou-tines of communicating with emotionally important and proximal contacts and were often used for coordination of offline activities. For others social network sites remained spaces where they occasionally visited...... with people who may have been important at some point in the past but who had little connection to the daily business of living. In these cases social network sites were seen as convenient spaces of lightweight connectivity, but by no means indispensable....

  3. A Comprehensive Survey on Hierarchical-Based Routing Protocols for Mobile Wireless Sensor Networks: Review, Taxonomy, and Future Directions

    Directory of Open Access Journals (Sweden)

    Nabil Sabor

    2017-01-01

    Full Text Available Introducing mobility to Wireless Sensor Networks (WSNs puts new challenges particularly in designing of routing protocols. Mobility can be applied to the sensor nodes and/or the sink node in the network. Many routing protocols have been developed to support the mobility of WSNs. These protocols are divided depending on the routing structure into hierarchical-based, flat-based, and location-based routing protocols. However, the hierarchical-based routing protocols outperform the other routing types in saving energy, scalability, and extending lifetime of Mobile WSNs (MWSNs. Selecting an appropriate hierarchical routing protocol for specific applications is an important and difficult task. Therefore, this paper focuses on reviewing some of the recently hierarchical-based routing protocols that are developed in the last five years for MWSNs. This survey divides the hierarchical-based routing protocols into two broad groups, namely, classical-based and optimized-based routing protocols. Also, we present a detailed classification of the reviewed protocols according to the routing approach, control manner, mobile element, mobility pattern, network architecture, clustering attributes, protocol operation, path establishment, communication paradigm, energy model, protocol objectives, and applications. Moreover, a comparison between the reviewed protocols is investigated in this survey depending on delay, network size, energy-efficiency, and scalability while mentioning the advantages and drawbacks of each protocol. Finally, we summarize and conclude the paper with future directions.

  4. [Social networks in drinking behaviors among Japanese: support network, drinking network, and intervening network].

    Science.gov (United States)

    Yoshihara, Chika; Shimizu, Shinji

    2005-10-01

    The national representative sample was analyzed to examine the relationship between respondents' drinking practice and the social network which was constructed of three different types of network: support network, drinking network, and intervening network. Non-parametric statistical analysis was conducted with chi square method and ANOVA analysis, due to the risk of small samples in some basic tabulation cells. The main results are as follows: (1) In the support network of workplace associates, moderate drinkers enjoyed much more sociable support care than both nondrinkers and hard drinkers, which might suggest a similar effect as the French paradox. Meanwhile in the familial and kinship network, the more intervening care support was provided, the harder respondents' drinking practice. (2) The drinking network among Japanese people for both sexes is likely to be convergent upon certain types of network categories and not decentralized in various categories. This might reflect of the drinking culture of Japan, which permits people to drink everyday as a practice, especially male drinkers. Subsequently, solitary drinking is not optional for female drinkers. (3) Intervening network analysis showed that the harder the respondents' drinking practices, the more frequently their drinking behaviors were checked in almost all the categories of network. A rather complicated gender double-standard was found in the network of hard drinkers with their friends, particularly for female drinkers. Medical professionals played a similar intervening role for men as family and kinship networks but to a less degree than friends for females. The social network is considerably associated with respondents' drinking, providing both sociability for moderate drinkers and intervention for hard drinkers, depending on network categories. To minimize the risk of hard drinking and advance self-healthy drinking there should be more research development on drinking practice and the social network.

  5. Geographies of an online social network

    CERN Document Server

    Lengyel, Balázs; Ságvári, Bence; Jakobi, Ákos; Kertész, János

    2015-01-01

    How is online social media activity structured in the geographical space? Recent studies have shown that in spite of earlier visions about the "death of distance", physical proximity is still a major factor in social tie formation and maintenance in virtual social networks. Yet, it is unclear, what are the characteristics of the distance dependence in online social networks. In order to explore this issue the complete network of the former major Hungarian online social network is analyzed. We find that the distance dependence is weaker for the online social network ties than what was found earlier for phone communication networks. For a further analysis we introduced a coarser granularity: We identified the settlements with the nodes of a network and assigned two kinds of weights to the links between them. When the weights are proportional to the number of contacts we observed weakly formed, but spatially based modules resembling to the borders of macro-regions, the highest level of regional administration in...

  6. Social Support and Social Networks in COPD: A Scoping Review.

    Science.gov (United States)

    Barton, Christopher; Effing, Tanya W; Cafarella, Paul

    2015-01-01

    A scoping review was conducted to determine the size and nature of the evidence describing associations between social support and networks on health, management and clinical outcomes amongst patients with COPD. Searches of PubMed, PsychInfo and CINAHL were undertaken for the period 1966-December 2013. A descriptive synthesis of the main findings was undertaken to demonstrate where there is current evidence for associations between social support, networks and health outcomes, and where further research is needed. The search yielded 318 papers of which 287 were excluded after applying selection criteria. Two areas emerged in which there was consistent evidence of benefit of social support; namely mental health and self-efficacy. There was inconsistent evidence for a relationship between perceived social support and quality of life, physical functioning and self-rated health. Hospital readmission was not associated with level of perceived social support. Only a small number of studies (3 articles) have reported on the social network of individuals with COPD. There remains a need to identify the factors that promote and enable social support. In particular, there is a need to further understand the characteristics of social networks within the broader social structural conditions in which COPD patients live and manage their illness.

  7. Social networks in improvement of health care.

    Science.gov (United States)

    Masic, Izet; Sivic, Suad; Toromanovic, Selim; Borojevic, Tea; Pandza, Haris

    2012-01-01

    Social network is a social structure made of individuals or organizations associated with one or more types of interdependence (friendship, common interests, work, knowledge, prestige, etc.) which are the "nodes" of the network. Networks can be organized to exchange information, knowledge or financial assistance under the various interest groups in universities, workplaces and associations of citizens. Today the most popular and widely used networks are based on application of the Internet as the main ICT. Depending on the method of connection, their field of activity and expertise of those who participate in certain networks, the network can be classified into the following groups: a) Social Networks with personal physical connectivity (the citizens' associations, transplant networks, etc.), b) Global social internet network (Facebook, Twitter, Skype), c) specific health internet social network (forums, Health Care Forums, Healthcare Industry Forum), d) The health community internet network of non professionals (DailyStrength, CaringBridge, CarePages, MyFamilyHealth), e) Scientific social internet network (BiomedExperts, ResearchGate, iMedExchange), f) Social internet network which supported professionals (HealthBoards, Spas and Hope Association of Disabled and diabetic Enurgi), g) Scientific medical internet network databases in the system of scientific and technical information (CC, Pubmed/Medline, Excerpta Medica/EMBASE, ISI Web Knowledge, EBSCO, Index Copernicus, Social Science Index, etc.). The information in the network are exchanged in real time and in a way that has until recently been impossible in real life of people in the community. Networks allow tens of thousands of specific groups of people performing a series of social, professional and educational activities in the place of living and housing, place of work or other locations where individuals are. Network provides access to information related to education, health, nutrition, drugs, procedures

  8. HIV/AIDS, social capital, and online social networks.

    Science.gov (United States)

    Drushel, Bruce E

    2013-01-01

    The prospects for online social networks as sites of information-gathering and affiliation for persons with AIDS and others concerned about HIV/AIDS not only represent the latest development in a trend toward circumventing traditional media and official information sources, but also may offer hope for a revitalization of HIV/AIDS discourse in the public sphere. This article provides an overview of three decades of information-seeking on the pandemic and its social and personal implications, as well as case studies of three examples of social networking surrounding HIV/AIDS. It finds preliminary evidence of the formation of strong and weak ties as described in Social Network Theory and suggests that the online accumulation of social capital by opinion leaders could facilitate dissemination of messages on HIV/AIDS awareness and testing.

  9. Social networking policies in nursing education.

    Science.gov (United States)

    Frazier, Blake; Culley, Joan M; Hein, Laura C; Williams, Amber; Tavakoli, Abbas S

    2014-03-01

    Social networking use has increased exponentially in the past few years. A literature review related to social networking and nursing revealed a research gap between nursing practice and education. Although there was information available on the appropriate use of social networking sites, there was limited research on the use of social networking policies within nursing education. The purpose of this study was to identify current use of social media by faculty and students and a need for policies within nursing education at one institution. A survey was developed and administered to nursing students (n = 273) and nursing faculty (n = 33). Inferential statistics included χ², Fisher exact test, t test, and General Linear Model. Cronbach's α was used to assess internal consistency of social media scales. The χ² result indicates that there were associations with the group and several social media items. t Test results indicate significant differences between student and faculty for average of policies are good (P = .0127), policies and discipline (P = .0315), and policy at the study school (P = .0013). General Linear Model analyses revealed significant differences for "friend" a patient with a bond, unprofessional posts, policy, and nursing with class level. Results showed that students and faculty supported the development of a social networking policy.

  10. Hypothesis testing in animal social networks.

    Science.gov (United States)

    Croft, Darren P; Madden, Joah R; Franks, Daniel W; James, Richard

    2011-10-01

    Behavioural ecologists are increasingly using social network analysis to describe the social organisation of animal populations and to test hypotheses. However, the statistical analysis of network data presents a number of challenges. In particular the non-independent nature of the data violates the assumptions of many common statistical approaches. In our opinion there is currently confusion and uncertainty amongst behavioural ecologists concerning the potential pitfalls when hypotheses testing using social network data. Here we review what we consider to be key considerations associated with the analysis of animal social networks and provide a practical guide to the use of null models based on randomisation to control for structure and non-independence in the data.

  11. Designing for Privacy in Ubiquitous Social Networking

    DEFF Research Database (Denmark)

    Sapuppo, Antonio; Figueiras, Joao

    2015-01-01

    , automatically exchanging personal user data. The main goal of these services is to facilitate the initialisation of relationships between people who do not know each other, but they probably should. Given that sharing of personal information is an intrinsic part of ubiquitous social networking, these services......Improving human communication during face–to–face meetings is nowadays possible by transferring online social networking benefits to the physical world. This is enabled by the ubiquitous social networking services that became available by means of wirelessly interconnected smart devices...... are subject to crucial privacy threats. Inspired by the usability and privacy limitations of existing design solutions, we identify, describe and qualitatively evaluate four drawbacks to be avoided when designing ubiquitous social networking applications. By addressing these drawbacks, services become more...

  12. Virtual communities, social networks and collaboration

    CERN Document Server

    Lazakidou, Athina A

    2012-01-01

    Social networks and virtual communities are often in the news, either being censored or facilitating academic cooperation. Here, leading researchers cover cutting-edge topics such as the requirements for effective collaboration in on-line communities.

  13. Social networking mining, visualization, and security

    CERN Document Server

    Dehuri, Satchidananda; Wang, Gi-Nam

    2014-01-01

    With the proliferation of social media and on-line communities in networked world a large gamut of data has been collected and stored in databases. The rate at which such data is stored is growing at a phenomenal rate and pushing the classical methods of data analysis to their limits. This book presents an integrated framework of recent empirical and theoretical research on social network analysis based on a wide range of techniques from various disciplines like data mining, social sciences, mathematics, statistics, physics, network science, machine learning with visualization techniques, and security. The book illustrates the potential of multi-disciplinary techniques in various real life problems and intends to motivate researchers in social network analysis to design more effective tools by integrating swarm intelligence and data mining.  

  14. Staying Safe on Social Network Sites

    Science.gov (United States)

    ... friend" sites, build upon the concept of traditional social networks where you are connected to new people through ... 0870 Send us email Download PGP/GPG keys Home FAQ Contact Us Traffic Light Protocol PCII DHS ...

  15. Communication, knowledge, social network and family planning ...

    African Journals Online (AJOL)

    AJRH Managing Editor

    demographic variables, social networks, knowledge and communication among the ... Information, education and communication materials and to promote family planning in Tanzania should ..... Every day after field work the researcher and.

  16. Community extraction for social networks

    CERN Document Server

    Zhao, Yunpeng; Zhu, Ji

    2010-01-01

    Analysis of networks and in particular discovering communities within networks has been a focus of recent work in several fields, with applications ranging from citation and friendship networks to food webs and gene regulatory networks. Most of the existing community detection methods focus on partitioning the entire network into communities, with the expectation of many ties within communities and few ties between. However, many networks contain nodes that do not fit in with any of the communities, and forcing every node into a community can distort results. Here we propose a new framework that focuses on community extraction instead of partition, extracting one community at a time. The main idea behind extraction is that the strength of a community should not depend on ties between members of other communities, but only on ties within that community and its ties to the outside world. We show that the new extraction criterion performs well on simulated and real networks, and establish asymptotic consistency ...

  17. Tra blog, Twitter e social network

    Directory of Open Access Journals (Sweden)

    Filippo Bruni

    2013-03-01

    Full Text Available Quali sono gli scenari possibili per i blog didattici? I social network in generale e servizi di microblogging più in particolare costituiscono una radicale alternativa o sono pensabili processi di integrazione? Il tentativo di individuare similitudini e differenze tra blog e social network/microblogging apre la prospettiva di una valorizzazione del microblogging per le attività di formazione in una logica di integrazione con altri strumenti.

  18. Binary Classification Method of Social Network Users

    Directory of Open Access Journals (Sweden)

    I. A. Poryadin

    2017-01-01

    Full Text Available The subject of research is a binary classification method of social network users based on the data analysis they have placed. Relevance of the task to gain information about a person by examining the content of his/her pages in social networks is exemplified. The most common approach to its solution is a visual browsing. The order of the regional authority in our country illustrates that its using in school education is needed. The article shows restrictions on the visual browsing of pupil’s pages in social networks as a tool for the teacher and the school psychologist and justifies that a process of social network users’ data analysis should be automated. Explores publications, which describe such data acquisition, processing, and analysis methods and considers their advantages and disadvantages. The article also gives arguments to support a proposal to study the classification method of social network users. One such method is credit scoring, which is used in banks and credit institutions to assess the solvency of clients. Based on the high efficiency of the method there is a proposal for significant expansion of its using in other areas of society. The possibility to use logistic regression as the mathematical apparatus of the proposed method of binary classification has been justified. Such an approach enables taking into account the different types of data extracted from social networks. Among them: the personal user data, information about hobbies, friends, graphic and text information, behaviour characteristics. The article describes a number of existing methods of data transformation that can be applied to solve the problem. An experiment of binary gender-based classification of social network users is described. A logistic model obtained for this example includes multiple logical variables obtained by transforming the user surnames. This experiment confirms the feasibility of the proposed method. Further work is to define a system

  19. Privacy policies for health social networking sites

    OpenAIRE

    2013-01-01

    Health social networking sites (HSNS), virtual communities where users connect with each other around common problems and share relevant health data, have been increasingly adopted by medical professionals and patients. The growing use of HSNS like Sermo and PatientsLikeMe has prompted public concerns about the risks that such online data-sharing platforms pose to the privacy and security of personal health data. This paper articulates a set of privacy risks introduced by social networking in...

  20. The Commercial Utilization of Social Networks

    OpenAIRE

    Adlaf, Petr

    2011-01-01

    The presented bachelor's thesis deals with advertisement. It answers the question of what advertisement is, why firms use advertisement and what its benefits are. It concentrates especially on Internet advertisement presented through social networks. These social networks have come to occupy a significant position on the Internet during the last five years and offer new possibilities in terms of creating advertising campaigns (Hypertargeting). The thesis presents the division and comparison o...

  1. Integrating Decision Support and Social Networks

    Directory of Open Access Journals (Sweden)

    Francisco Antunes

    2012-01-01

    Full Text Available We elaborate on the shifting of decision support systems towards social networking, which is based on the concepts of Web 2.0 and Semantic Web technology. As the characteristics of the relevant components are different from traditional decision support systems, we present necessary adaptations when adopting social networks for decision support within an organization. We also present organizational obstacles when adopting/using such systems and clues to overcome them.

  2. Digital Stylometry: Linking Profiles Across Social Networks

    OpenAIRE

    Vosoughi, Soroush; Zhou, Helen; Roy, Deb

    2015-01-01

    There is an ever growing number of users with accounts on multiple social media and networking sites. Consequently, there is increasing interest in matching user accounts and profiles across different social networks in order to create aggregate profiles of users. In this paper, we present models for Digital Stylometry, which is a method for matching users through stylometry inspired techniques. We experimented with linguistic, temporal, and combined temporal-linguistic models for matching us...

  3. The Commercial Utilization of Social Networks

    OpenAIRE

    Adlaf, Petr

    2011-01-01

    The presented bachelor's thesis deals with advertisement. It answers the question of what advertisement is, why firms use advertisement and what its benefits are. It concentrates especially on Internet advertisement presented through social networks. These social networks have come to occupy a significant position on the Internet during the last five years and offer new possibilities in terms of creating advertising campaigns (Hypertargeting). The thesis presents the division and comparison o...

  4. Social Networks in Software Process Improvement

    DEFF Research Database (Denmark)

    Nielsen, Peter Axel; Tjørnehøj, Gitte

    2010-01-01

    . In the action research we have applied the framework of social network analysis and we show this can be used to understand the underlying structures of communication and knowledge sharing between software developers and managers. We show in detail how the analysis can be done and how the management can utilise...... the findings. From this we conclude that social network analysis was a useful framework together with accompanying tools and techniques. Copyright © 2009 John Wiley & Sons, Ltd....

  5. Knowledge in a Social Network

    OpenAIRE

    Angere, Staffan

    2010-01-01

    The purpose of this paper is to present a formal model of social net- works suitable for studying questions in social epistemology. We show how to use this model, in conjunction with a computer program for simulating groups of inquirers, to draw conclusions about the epistemological prop- erties of different social practices. This furnishes us with the beginnings of a systematic research program in social epistemology, from which to approach problems pertaining to epistemic value, optimal org...

  6. Knowledge in a Social Network

    OpenAIRE

    Angere, Staffan

    2010-01-01

    The purpose of this paper is to present a formal model of social net- works suitable for studying questions in social epistemology. We show how to use this model, in conjunction with a computer program for simulating groups of inquirers, to draw conclusions about the epistemological prop- erties of different social practices. This furnishes us with the beginnings of a systematic research program in social epistemology, from which to approach problems pertaining to epistemic value, optimal org...

  7. Brand communities embedded in social networks.

    Science.gov (United States)

    Zaglia, Melanie E

    2013-02-01

    Brand communities represent highly valuable marketing, innovation management, and customer relationship management tools. However, applying successful marketing strategies today, and in the future, also means exploring and seizing the unprecedented opportunities of social network environments. This study combines these two social phenomena which have largely been researched separately, and aims to investigate the existence, functionality and different types of brand communities within social networks. The netnographic approach yields strong evidence of this existence; leading to a better understanding of such embedded brand communities, their peculiarities, and motivational drivers for participation; therefore the findings contribute to theory by combining two separate research streams. Due to the advantages of social networks, brand management is now able to implement brand communities with less time and financial effort; however, choosing the appropriate brand community type, cultivating consumers' interaction, and staying tuned to this social engagement are critical factors to gain anticipated brand outcomes.

  8. Cyber Threats In Social Networking Websites

    Directory of Open Access Journals (Sweden)

    Wajeb Ghari

    2012-02-01

    Full Text Available A social network is a social structure made up of individuals or organizations called nodes, which areconnected by one or more specific types of interdependency, such as friendship, common interest, and exchange of finance, relationships of beliefs, knowledge or prestige. A cyber threat can be both unintentional and intentional, targeted or non targeted, and it can come from a variety of sources, including foreign nations engaged in espionage and information warfare, criminals, hackers, virus writers, disgruntled employees and contractors working within an organization. Social networking sitesare not only to communicate or interact with other people globally, but also one effective way for business promotion. In this paper, we investigate and study the cyber threats in social networking websites. We go through the amassing history of online social websites, classify their types and also discuss the cyber threats, suggest the anti-threats strategies and visualize the future trends of such hoppy popular websites.

  9. Cyber threats in social networking websites

    CERN Document Server

    Gharibi, Wajeb

    2012-01-01

    A social network is a social structure made up of individuals or organizations called nodes, which are connected by one or more specific types of interdependency, such as friendship, common interest, and exchange of finance, relationships of beliefs, knowledge or prestige. A cyber threat can be both unintentional and intentional, targeted or non targeted, and it can come from a variety of sources, including foreign nations engaged in espionage and information warfare, criminals, hackers, virus writers, disgruntled employees and contractors working within an organization. Social networking sites are not only to communicate or interact with other people globally, but also one effective way for business promotion. In this paper, we investigate and study the cyber threats in social networking websites. We go through the amassing history of online social websites, classify their types and also discuss the cyber threats, suggest the anti-threats strategies and visualize the future trends of such hoppy popular websi...

  10. Scalable Hierarchical Network Management System for Displaying Network Information in Three Dimensions

    Science.gov (United States)

    George, Jude (Inventor); Schlecht, Leslie (Inventor); McCabe, James D. (Inventor); LeKashman, John Jr. (Inventor)

    1998-01-01

    A network management system has SNMP agents distributed at one or more sites, an input output module at each site, and a server module located at a selected site for communicating with input output modules, each of which is configured for both SNMP and HNMP communications. The server module is configured exclusively for HNMP communications, and it communicates with each input output module according to the HNMP. Non-iconified, informationally complete views are provided of network elements to aid in network management.

  11. AN OPTIMUM VEHICULAR PATH ALGORITHM FOR TRAFFIC NETWORK BASED ON HIERARCHICAL SPATIAL REASONING

    Institute of Scientific and Technical Information of China (English)

    2000-01-01

    Human beings' intellection is the characteristic of a distinct hierarchy and can be taken to construct a heuristic in the shortest path algorithms.It is detailed in this paper how to utilize the hierarchical reasoning on the basis of greedy and directional strategy to establish a spatial heuristic,so as to improve running efficiency and suitability of shortest path algorithm for traffic network.The authors divide urban traffic network into three hierarchies and set forward a new node hierarchy division rule to avoid the unreliable solution of shortest path.It is argued that the shortest path,no matter distance shortest or time shortest,is usually not the favorite of drivers in practice.Some factors difficult to expect or quantify influence the drivers' choice greatly.It makes the drivers prefer choosing a less shortest,but more reliable or flexible path to travel on.The presented optimum path algorithm,in addition to the improvement of the running efficiency of shortest path algorithms up to several times,reduces the emergence of those factors,conforms to the intellection characteristic of human beings,and is more easily accepted by drivers.Moreover,it does not require the completeness of networks in the lowest hierarchy and the applicability and fault tolerance of the algorithm have improved.The experiment result shows the advantages of the presented algorithm.The authors argued that the algorithm has great potential application for navigation systems of large-scale traffic networks.

  12. Viewing Attractiveness Socialization from a Social Network Perspective.

    Science.gov (United States)

    Downs, A. Chris

    Providing a framework for a symposium exploring the influence of physical attractiveness on the socialization process, this paper (1) offers a working definition of physical attractiveness, (2) reviews stereotypes associated with attractiveness, and (3) discusses a social network perspective on the influence of attractiveness. Physical…

  13. Designing for Privacy in Ubiquitous Social Networking

    DEFF Research Database (Denmark)

    Sapuppo, Antonio; Figueiras, Joao

    2015-01-01

    Improving human communication during face–to–face meetings is nowadays possible by transferring online social networking benefits to the physical world. This is enabled by the ubiquitous social networking services that became available by means of wirelessly interconnected smart devices, automati......Improving human communication during face–to–face meetings is nowadays possible by transferring online social networking benefits to the physical world. This is enabled by the ubiquitous social networking services that became available by means of wirelessly interconnected smart devices......, automatically exchanging personal user data. The main goal of these services is to facilitate the initialisation of relationships between people who do not know each other, but they probably should. Given that sharing of personal information is an intrinsic part of ubiquitous social networking, these services...... are subject to crucial privacy threats. Inspired by the usability and privacy limitations of existing design solutions, we identify, describe and qualitatively evaluate four drawbacks to be avoided when designing ubiquitous social networking applications. By addressing these drawbacks, services become more...

  14. Information diffusion in structured online social networks

    Science.gov (United States)

    Li, Pei; Zhang, Yini; Qiao, Fengcai; Wang, Hui

    2015-05-01

    Nowadays, due to the word-of-mouth effect, online social networks have been considered to be efficient approaches to conduct viral marketing, which makes it of great importance to understand the diffusion dynamics in online social networks. However, most research on diffusion dynamics in epidemiology and existing social networks cannot be applied directly to characterize online social networks. In this paper, we propose models to characterize the information diffusion in structured online social networks with push-based forwarding mechanism. We introduce the term user influence to characterize the average number of times that messages are browsed which is incurred by a given type user generating a message, and study the diffusion threshold, above which the user influence of generating a message will approach infinity. We conduct simulations and provide the simulation results, which are consistent with the theoretical analysis results perfectly. These results are of use in understanding the diffusion dynamics in online social networks and also critical for advertisers in viral marketing who want to estimate the user influence before posting an advertisement.

  15. Multimedia Information Networks in Social Media

    Science.gov (United States)

    Cao, Liangliang; Qi, Guojun; Tsai, Shen-Fu; Tsai, Min-Hsuan; Pozo, Andrey Del; Huang, Thomas S.; Zhang, Xuemei; Lim, Suk Hwan

    The popularity of personal digital cameras and online photo/video sharing community has lead to an explosion of multimedia information. Unlike traditional multimedia data, many new multimedia datasets are organized in a structural way, incorporating rich information such as semantic ontology, social interaction, community media, geographical maps, in addition to the multimedia contents by themselves. Studies of such structured multimedia data have resulted in a new research area, which is referred to as Multimedia Information Networks. Multimedia information networks are closely related to social networks, but especially focus on understanding the topics and semantics of the multimedia files in the context of network structure. This chapter reviews different categories of recent systems related to multimedia information networks, summarizes the popular inference methods used in recent works, and discusses the applications related to multimedia information networks. We also discuss a wide range of topics including public datasets, related industrial systems, and potential future research directions in this field.

  16. Clustering-based classification of road traffic accidents using hierarchical clustering and artificial neural networks.

    Science.gov (United States)

    Taamneh, Madhar; Taamneh, Salah; Alkheder, Sharaf

    2017-09-01

    Artificial neural networks (ANNs) have been widely used in predicting the severity of road traffic crashes. All available information about previously occurred accidents is typically used for building a single prediction model (i.e., classifier). Too little attention has been paid to the differences between these accidents, leading, in most cases, to build less accurate predictors. Hierarchical clustering is a well-known clustering method that seeks to group data by creating a hierarchy of clusters. Using hierarchical clustering and ANNs, a clustering-based classification approach for predicting the injury severity of road traffic accidents was proposed. About 6000 road accidents occurred over a six-year period from 2008 to 2013 in Abu Dhabi were used throughout this study. In order to reduce the amount of variation in data, hierarchical clustering was applied on the data set to organize it into six different forms, each with different number of clusters (i.e., clusters from 1 to 6). Two ANN models were subsequently built for each cluster of accidents in each generated form. The first model was built and validated using all accidents (training set), whereas only 66% of the accidents were used to build the second model, and the remaining 34% were used to test it (percentage split). Finally, the weighted average accuracy was computed for each type of models in each from of data. The results show that when testing the models using the training set, clustering prior to classification achieves (11%-16%) more accuracy than without using clustering, while the percentage split achieves (2%-5%) more accuracy. The results also suggest that partitioning the accidents into six clusters achieves the best accuracy if both types of models are taken into account.

  17. The Nature Terrorism Reports on Social Networks

    Directory of Open Access Journals (Sweden)

    James Okolie-Osemene

    2015-12-01

    Full Text Available As new tools of communication, an in-depth study of social networking in the era of global terrorism is attempted in this article. This emerging tradition of information sharing is driven by social media technology which has greatly revolutionalised communication in all sectors. The article explored the information sharing relevance of new technologies in the age of terrorism and counterterrorism. It focused on how social networks are increasingly utilised by different groups. In terms of methodology, the study extracted and utilised positive, negative and neutral posts, updates, tweets and reports on social networks through different individual and organisational media accounts and blogs, and analysed the data qualitatively. Findings show that despite being used by extremist groups in promoting their political agenda, social networks are also useful in promoting positive perceptions that society has about Muslims in the era of terrorism, emphasising that Muslims are not terrorists. Through the instrumentality of social media, users are able to map the trends of terrorism and responses from stakeholders in government and security sector in curbing the menace. Given their capacity to reach a wider audience, breaking cultural and religious barriers, social networks serve as early warning signs and make it possible for people to share new ideas on possible ways of curbing the proliferation of terrorist organisations.

  18. SOCIAL NETWORKS BETWEEN ICTS AND MORAL DECADENCE

    Directory of Open Access Journals (Sweden)

    Domingo Alarcón Ortiz

    2013-07-01

    Full Text Available The paradox of social networks in organizations is that they are a very important means of formation, training, update, information and communication, but also represent a symptom of cultural decay, because with them have been provided and processes of disinformation uncontrolled distribution of malicious information, which is assaulted by people. The abuse as to upload information indiscriminately leads to pathological, anti-social and cynical time’s behaviors. As many users of social networks does not assume a code of ethics according to social needs, then its limits of performance in terms of dignity and self-respect will not operate, constitute a serious social threat, against which the appropriate response has not been generated.  To participate in social networks, people end up exposing itself to that your privacy was hurt with impunity and thereby will limit or annul the opportunity to defend their dignity, turning them into a set of highly vulnerable entities. But as there is social by joining the network pressure, the question is it worth being in these networks? If you want to stay informed and share information, raises the dilemma of to where it can and should go.

  19. The Elderly and Their Informal Social Networks.

    Science.gov (United States)

    Thompson, J. Victor

    1989-01-01

    A sample of 334 people aged 56 and older living in British Columbia were interviewed about their supportive social network. Four supportive roles were investigated: caretaker, helper, confident, and advisor. The research supports earlier findings about the vulnerability of widows over 74 years old. They are most in need of networks. (Author/JOW)

  20. Segmentation of users of social networking websites

    NARCIS (Netherlands)

    Lorenzo-Romero, C.; Alarcon-del-Amo, M.d.C.; Constantinides, Efthymios

    2012-01-01

    The typology of networked consumers in The Netherlands presented in this study, was based on an online survey and obtained using latent segmentation analysis. This approach is based on the frequency with which users perform different activities, their sociodemographic variables, social networking ex

  1. Segmentation of users of social networking websites

    NARCIS (Netherlands)

    Lorenzo-Romero, C.; Alarcon-del-Amo, M.d.C.; Constantinides, E.

    2012-01-01

    The typology of networked consumers in The Netherlands presented in this study, was based on an online survey and obtained using latent segmentation analysis. This approach is based on the frequency with which users perform different activities, their sociodemographic variables, social networking ex

  2. Content Propagation in Online Social Networks

    NARCIS (Netherlands)

    Blenn, N.

    2014-01-01

    This thesis presents methods and techniques to analyze content propagation within online social networks (OSNs) using a graph theoretical approach. Important factors and different techniques to analyze and describe content propagation, starting from the smallest entity in a network, representing a u

  3. Computational social networks tools, perspectives and applications

    CERN Document Server

    Abraham, Ajith

    2012-01-01

    Provides the latest advances in computational social networks, and illustrates how organizations can gain a competitive advantage by applying these ideas in real-world scenarios Presents a specific focus on practical tools and applications Provides experience reports, survey articles, and intelligence techniques and theories relating to specific problems in network technology

  4. Mother's Social Network and Family Language Maintenance

    Science.gov (United States)

    Velazquez, Isabel

    2013-01-01

    This article reports the results of a social network analysis (SNA) performed on the mother's primary network of interaction in 15 Mexican American families in the city of El Paso, Texas, the neighbourhood of La Villita, in Chicago, and the city of Lincoln, Nebraska. The goal of this study was to examine potential opportunities for Spanish use by…

  5. Object Oriented Modeling Of Social Networks

    NARCIS (Netherlands)

    Zeggelink, Evelien P.H.; Oosten, Reinier van; Stokman, Frans N.

    1996-01-01

    The aim of this paper is to explain principles of object oriented modeling in the scope of modeling dynamic social networks. As such, the approach of object oriented modeling is advocated within the field of organizational research that focuses on networks. We provide a brief introduction into the f

  6. Mother's Social Network and Family Language Maintenance

    Science.gov (United States)

    Velazquez, Isabel

    2013-01-01

    This article reports the results of a social network analysis (SNA) performed on the mother's primary network of interaction in 15 Mexican American families in the city of El Paso, Texas, the neighbourhood of La Villita, in Chicago, and the city of Lincoln, Nebraska. The goal of this study was to examine potential opportunities for Spanish use by…

  7. Multiagent task allocation in social networks

    NARCIS (Netherlands)

    De Weerdt, M.M.; Zhang, Y.; Klos, T.

    2011-01-01

    This paper proposes a new variant of the task allocation problem, where the agents are connected in a social network and tasks arrive at the agents distributed over the network. We show that the complexity of this problem remains NP-complete. Moreover, it is not approximable within some factor. In c

  8. Distributed Task Allocation in Social Networks

    NARCIS (Netherlands)

    De Weerdt, M.M.; Zhang, Y.; Klos, T.

    2007-01-01

    This paper proposes a new variant of the task allocation problem, where the agents are connected in a social network and tasks arrive at the agents distributed over the network. We show that the complexity of this problem remains NPhard. Moreover, it is not approximable within some factor. We develo

  9. Multiagent task allocation in social networks

    NARCIS (Netherlands)

    M.M. de Weerdt (Mathijs); Y. Zhang (Yingqian); T.B. Klos (Tomas)

    2011-01-01

    textabstractThis paper proposes a new variant of the task allocation problem, where the agents are connected in a social network and tasks arrive at the agents distributed over the network. We show that the complexity of this problem remains NP-complete. Moreover, it is not approximable within some

  10. Data Storage for Social Networks A Socially Aware Approach

    CERN Document Server

    Tran, Duc A

    2012-01-01

    Evidenced by the success of Facebook, Twitter, and LinkedIn, online social networks (OSNs) have become ubiquitous, offering novel ways for people to access information and communicate with each other. As the increasing popularity of social networking is undeniable, scalability is an important issue for any OSN that wants to serve a large number of users. Storing user data for the entire network on a single server can quickly lead to a bottleneck, and, consequently, more servers are needed to expand storage capacity and lower data request traffic per server. Adding more servers is just one step

  11. Personal well-being networks, social capital and severe mental illness: exploratory study.

    Science.gov (United States)

    Sweet, Daryl; Byng, Richard; Webber, Martin; Enki, Doyo Gragn; Porter, Ian; Larsen, John; Huxley, Peter; Pinfold, Vanessa

    2017-10-05

    BackgroundConnectedness is a central dimension of personal recovery from severe mental illness (SMI). Research reports that people with SMI have lower social capital and poorer-quality social networks compared to the general population.AimsTo identify personal well-being network (PWN) types and explore additional insights from mapping connections to places and activities alongside social ties.MethodWe carried out 150 interviews with individuals with SMI and mapped social ties, places and activities and their impact on well-being. PWN types were developed using social network analysis and hierarchical k-means clustering of this data.ResultsThree PWN types were identified: formal and sparse; family and stable; and diverse and active. Well-being and social capital varied within and among types. Place and activity data indicated important contextual differences within social connections that were not found by mapping social networks alone.ConclusionsPlace locations and meaningful activities are important aspects of people's social worlds. Mapped alongside social networks, PWNs have important implications for person-centred recovery approaches through providing a broader understanding of individual's lives and resources. © The Royal College of Psychiatrists 2017.

  12. Social media networking: Facebook and Twitter.

    Science.gov (United States)

    Schneider, Andrew; Jackson, Rem; Baum, Neil

    2010-01-01

    The new wave of marketing and practice promotion will include social media networking. This article will discuss Facebook and Twitter. After reading this article you, will have an understanding of these two important aspects of social media and how you might use Facebook and Twitter in your practice to enhance your communication with your existing patients and attract new patients.

  13. Online Formative Assessments with Social Network Awareness

    Science.gov (United States)

    Lin, Jian-Wei; Lai, Yuan-Cheng

    2013-01-01

    Social network awareness (SNA) has been used extensively as one of the strategies to increase knowledge sharing and collaboration opportunities. However, most SNA studies either focus on being aware of peer's knowledge context or on social context. This work proposes online formative assessments with SNA, trying to address the problems of online…

  14. Online Formative Assessments with Social Network Awareness

    Science.gov (United States)

    Lin, Jian-Wei; Lai, Yuan-Cheng

    2013-01-01

    Social network awareness (SNA) has been used extensively as one of the strategies to increase knowledge sharing and collaboration opportunities. However, most SNA studies either focus on being aware of peer's knowledge context or on social context. This work proposes online formative assessments with SNA, trying to address the problems of online…

  15. Social Networks and Home-Schooling Relations.

    Science.gov (United States)

    Graue, M. Elizabeth

    1993-01-01

    Describes how parents in two communities constructed their roles in a social context shaped by economic resources, local notions of home-school relations, and information networks. Examines parenting as a social activity internalized by individuals through their daily interactions. Shows how family-role perceptions and school practices are…

  16. Facebook, Social Networking, and Business Education

    Science.gov (United States)

    Taylor, Steven A.; Mulligan, Jamie R.; Ishida, Chiharu

    2012-01-01

    Brown (2012) asserts that faculty perceptions of Web 2.0 for teaching will influence its adoption. For example, social media's influence on educational delivery is growing (Hrastinski and Dennon 2012). Zulu et al. (2011) note that business educators are only beginning to understand social networking related to education. We report an exploratory…

  17. Spatial and Social Networks in Organizational Innovation

    Science.gov (United States)

    Wineman, Jean D.; Kabo, Felichism W.; Davis, Gerald F.

    2009-01-01

    Research on the enabling factors of innovation has focused on either the social component of organizations or on the spatial dimensions involved in the innovation process. But no one has examined the aggregate consequences of the link from spatial layout, to social networks, to innovation. This project enriches our understanding of how innovation…

  18. PERSONIFICATION OF INFORMATION IN SOCIAL NETWORKS

    Directory of Open Access Journals (Sweden)

    G. K. Kadyrova

    2016-01-01

    Full Text Available This article is devoted to a phenomenon of personification of information in social networks, which are becoming an important media space not only for users, but also for the mass media. Many of the events that have got a response in popular social networks are further reflected in the journalistic articles. The famous personalities acting as newsmakers express their position on any relevant issue on their personal pages. In many popular social networks are presented the official communities of federal and regional mass media. Thus, the content of social networks becomes some kind of media resource and media platform for audience and traditional mass media. Today social networks act as a peculiar source of information through which users receive information corresponding to specific classroom expectations. In this article the author connects such “point wise” oriented content with concept of personification of information – feature of the communication allowing to connect content of the information with perception of an image of the communicant. The presence of journalists and edition in social networks becomes necessary in new mass media space because a modern media text ceases to be distanced from the audience. The space of social networks initially allows Internet users to personalize information posting personal data, commenting on actual events. In this article author considers the peculiarities of this phenomenon on the example of personal pages of different types of users. Depending on the types of users (public personalities, representatives of professional community, ordinary users publications can have the character of information occasion, transmit personal attitude of journalists to the described events, allow to the actual important social and political issues.

  19. Hierarchical transport networks optimizing dynamic response of permeable energy-storage materials.

    Science.gov (United States)

    Nilson, Robert H; Griffiths, Stewart K

    2009-07-01

    Channel widths and spacing in latticelike hierarchical transport networks are optimized to achieve maximum extraction of gas or electrical charge from nanoporous energy-storage materials during charge and discharge cycles of specified duration. To address a range of physics, the effective transport diffusivity is taken to vary as a power, m , of channel width. Optimal channel widths and spacing in all levels of the hierarchy are found to increase in a power-law manner with normalized system size, facilitating the derivation of closed-form approximations for the optimal dimensions. Characteristic response times and ratios of channel width to spacing are both shown to vary by the factor 2/m between successive levels of any optimal hierarchy. This leads to fractal-like self-similar geometry, but only for m=2 . For this case of quadratic dependence of diffusivity on channel width, the introduction of transport channels permits increases in system size on the order of 10;{4} , 10;{8} , and 10;{10} , without any reduction in extraction efficiency, for hierarchies having 1, 2 and, 8 levels, respectively. However, we also find that for a given system size there is an optimum number of hierarchical levels that maximizes extraction efficiency.

  20. Emergence of hierarchical structure mirroring linguistic composition in a recurrent neural network.

    Science.gov (United States)

    Hinoshita, Wataru; Arie, Hiroaki; Tani, Jun; Okuno, Hiroshi G; Ogata, Tetsuya

    2011-05-01

    We show that a Multiple Timescale Recurrent Neural Network (MTRNN) can acquire the capabilities to recognize, generate, and correct sentences by self-organizing in a way that mirrors the hierarchical structure of sentences: characters grouped into words, and words into sentences. The model can control which sentence to generate depending on its initial states (generation phase) and the initial states can be calculated from the target sentence (recognition phase). In an experiment, we trained our model over a set of unannotated sentences from an artificial language, represented as sequences of characters. Once trained, the model could recognize and generate grammatical sentences, even if they were not learned. Moreover, we found that our model could correct a few substitution errors in a sentence, and the correction performance was improved by adding the errors to the training sentences in each training iteration with a certain probability. An analysis of the neural activations in our model revealed that the MTRNN had self-organized, reflecting the hierarchical linguistic structure by taking advantage of the differences in timescale among its neurons: in particular, neurons that change the fastest represented "characters", those that change more slowly, "words", and those that change the slowest, "sentences".