WorldWideScience

Sample records for network text analysis

  1. Temporal Network Analysis of Literary Texts

    OpenAIRE

    Prado, Sandra D.; Dahmen, Silvio R.; Bazzan, Ana L. C.; Mac Carron, Padraig; Kenna, Ralph

    2016-01-01

    We study temporal networks of characters in literature focusing on "Alice's Adventures in Wonderland" (1865) by Lewis Carroll and the anonymous "La Chanson de Roland" (around 1100). The former, one of the most influential pieces of nonsense literature ever written, describes the adventures of Alice in a fantasy world with logic plays interspersed along the narrative. The latter, a song of heroic deeds, depicts the Battle of Roncevaux in 778 A.D. during Charlemagne's campaign on the Iberian Pe...

  2. A Network Text Analysis of David Ayer’s Fury

    Directory of Open Access Journals (Sweden)

    Starling David Hunter

    2015-12-01

    Full Text Available Network Text Analysis (NTA involves the creation of networks of words and/or concepts from linguistic data. Its key insight is that the position of words and concepts in a text network provides vital clues to the central and underlying themes of the text as a whole. Recent research has relied on inductive approaches to identify these themes. In this study we demonstrate a deductive approach that we apply to the screenplay of the 2014 World War II-era film Fury. Specifically, we first use genre expectations theory to establish prior expectations as to the key themes associated with war films. We then empirically test whether words and concepts associated with the most influentially-positioned nodes are consistent with themes common to the war-film genre. As predicted, we find that words and concepts associated with the least constrained nodes in the text network were significantly more likely to be associated with the war, action, and biography genres and significantly less likely to be associated with the mystery, science-fiction, fantasy, and film-noir genres. Keywords: content analysis, text analysis, network text analysis, semantic network analysis, film studies, screenplay, screenwriting, war movies, World War II, tanks

  3. Center of attention: A network text analysis of American Sniper

    Directory of Open Access Journals (Sweden)

    Starling Hunter

    2016-06-01

    Full Text Available Network Text Analysis (NTA is a term used to describe a variety of software - supported methods for modeling texts as networks of concepts. In this study we apply NTA to the screenplay of American Sniper, an Academy Award nominee for Best Adapted Screenplay in 2014. Specifically, we est ablish prior expectations as to the key themes associated with war films. We then empirically test whether words associated with the most influentially - positioned nodes in the network signify themes common to the war - film genre. As predicted, we find tha t words and concepts associated with the least constrained nodes in the text network were significantly more likely to be associated with the war genre and significantly less likely to be associated with genres to which the film did not belong.

  4. Complex network analysis of literary and scientific texts

    CERN Document Server

    Grabska-Gradzinska, Iwona; Kwapien, Jaroslaw; Drozdz, Stanislaw

    2012-01-01

    We present results from our quantitative study of statistical and network properties of literary and scientific texts written in two languages: English and Polish. We show that Polish texts are described by the Zipf law with the scaling exponent smaller than the one for the English language. We also show that the scientific texts are typically characterized by the rank-frequency plots with relatively short range of power-law behavior as compared to the literary texts. We then transform the texts into their word-adjacency network representations and find another difference between the languages. For the majority of the literary texts in both languages, the corresponding networks revealed the scale-free structure, while this was not always the case for the scientific texts. However, all the network representations of texts were hierarchical. We do not observe any qualitative and quantitative difference between the languages. However, if we look at other network statistics like the clustering coefficient and the...

  5. Complex Network Analysis of Literary and Scientific Texts

    Science.gov (United States)

    Grabska-Gradzińska, Iwona; Kulig, Andrzej; Kwapień, Jarosław; Drożdż, Stanisław

    2012-07-01

    We present results from our quantitative study of statistical and network properties of literary and scientific texts written in two languages: English and Polish. We show that Polish texts are described by the Zipf law with the scaling exponent smaller than the one for the English language. We also show that the scientific texts are typically characterized by the rank-frequency plots with relatively short range of power-law behavior as compared to the literary texts. We then transform the texts into their word-adjacency network representations and find another difference between the languages. For the majority of the literary texts in both languages, the corresponding networks revealed the scale-free structure, while this was not always the case for the scientific texts. However, all the network representations of texts were hierarchical. We do not observe any qualitative and quantitative difference between the languages. However, if we look at other network statistics like the clustering coefficient and the average shortest path length, the English texts occur to possess more clustered structure than do the Polish ones. This result was attributed to differences in grammar of both languages, which was also indicated in the Zipf plots. All the texts, however, show network structure that differs from any of the Watts-Strögatz, the Barabási-Albert, and the Erdös-Rényi architectures.

  6. System Analysis of LWDH Related Genes Based on Text Mining in Biological Networks

    Directory of Open Access Journals (Sweden)

    Mingzhi Liao

    2014-01-01

    Full Text Available Liuwei-dihuang (LWDH is widely used in traditional Chinese medicine (TCM, but its molecular mechanism about gene interactions is unclear. LWDH genes were extracted from the existing literatures based on text mining technology. To simulate the complex molecular interactions that occur in the whole body, protein-protein interaction networks (PPINs were constructed and the topological properties of LWDH genes were analyzed. LWDH genes have higher centrality properties and may play important roles in the complex biological network environment. It was also found that the distances within LWDH genes are smaller than expected, which means that the communication of LWDH genes during the biological process is rapid and effectual. At last, a comprehensive network of LWDH genes, including the related drugs and regulatory pathways at both the transcriptional and posttranscriptional levels, was constructed and analyzed. The biological network analysis strategy used in this study may be helpful for the understanding of molecular mechanism of TCM.

  7. Network analysis of named entity co-occurrences in written texts

    Science.gov (United States)

    Amancio, Diego Raphael

    2016-06-01

    The use of methods borrowed from statistics and physics to analyze written texts has allowed the discovery of unprecedent patterns of human behavior and cognition by establishing links between models features and language structure. While current models have been useful to unveil patterns via analysis of syntactical and semantical networks, only a few works have probed the relevance of investigating the structure arising from the relationship between relevant entities such as characters, locations and organizations. In this study, we represent entities appearing in the same context as a co-occurrence network, where links are established according to a null model based on random, shuffled texts. Computational simulations performed in novels revealed that the proposed model displays interesting topological features, such as the small world feature, characterized by high values of clustering coefficient. The effectiveness of our model was verified in a practical pattern recognition task in real networks. When compared with traditional word adjacency networks, our model displayed optimized results in identifying unknown references in texts. Because the proposed representation plays a complementary role in characterizing unstructured documents via topological analysis of named entities, we believe that it could be useful to improve the characterization of written texts (and related systems), specially if combined with traditional approaches based on statistical and deeper paradigms.

  8. [Semantic Network Analysis of Online News and Social Media Text Related to Comprehensive Nursing Care Service].

    Science.gov (United States)

    Kim, Minji; Choi, Mona; Youm, Yoosik

    2017-12-01

    As comprehensive nursing care service has gradually expanded, it has become necessary to explore the various opinions about it. The purpose of this study is to explore the large amount of text data regarding comprehensive nursing care service extracted from online news and social media by applying a semantic network analysis. The web pages of the Korean Nurses Association (KNA) News, major daily newspapers, and Twitter were crawled by searching the keyword 'comprehensive nursing care service' using Python. A morphological analysis was performed using KoNLPy. Nodes on a 'comprehensive nursing care service' cluster were selected, and frequency, edge weight, and degree centrality were calculated and visualized with Gephi for the semantic network. A total of 536 news pages and 464 tweets were analyzed. In the KNA News and major daily newspapers, 'nursing workforce' and 'nursing service' were highly rated in frequency, edge weight, and degree centrality. On Twitter, the most frequent nodes were 'National Health Insurance Service' and 'comprehensive nursing care service hospital.' The nodes with the highest edge weight were 'national health insurance,' 'wards without caregiver presence,' and 'caregiving costs.' 'National Health Insurance Service' was highest in degree centrality. This study provides an example of how to use atypical big data for a nursing issue through semantic network analysis to explore diverse perspectives surrounding the nursing community through various media sources. Applying semantic network analysis to online big data to gather information regarding various nursing issues would help to explore opinions for formulating and implementing nursing policies.

  9. Word-Length Correlations and Memory in Large Texts: A Visibility Network Analysis

    Directory of Open Access Journals (Sweden)

    Lev Guzmán-Vargas

    2015-11-01

    Full Text Available We study the correlation properties of word lengths in large texts from 30 ebooks in the English language from the Gutenberg Project (www.gutenberg.org using the natural visibility graph method (NVG. NVG converts a time series into a graph and then analyzes its graph properties. First, the original sequence of words is transformed into a sequence of values containing the length of each word, and then, it is integrated. Next, we apply the NVG to the integrated word-length series and construct the network. We show that the degree distribution of that network follows a power law, P ( k ∼ k - γ , with two regimes, which are characterized by the exponents γ s ≈ 1 . 7 (at short degree scales and γ l ≈ 1 . 3 (at large degree scales. This suggests that word lengths are much more strongly correlated at large distances between words than at short distances between words. That finding is also supported by the detrended fluctuation analysis (DFA and recurrence time distribution. These results provide new information about the universal characteristics of the structure of written texts beyond that given by word frequencies.

  10. A Robust Text Classifier Based on Denoising Deep Neural Network in the Analysis of Big Data

    Directory of Open Access Journals (Sweden)

    Wulamu Aziguli

    2017-01-01

    Full Text Available Text classification has always been an interesting issue in the research area of natural language processing (NLP. While entering the era of big data, a good text classifier is critical to achieving NLP for scientific big data analytics. With the ever-increasing size of text data, it has posed important challenges in developing effective algorithm for text classification. Given the success of deep neural network (DNN in analyzing big data, this article proposes a novel text classifier using DNN, in an effort to improve the computational performance of addressing big text data with hybrid outliers. Specifically, through the use of denoising autoencoder (DAE and restricted Boltzmann machine (RBM, our proposed method, named denoising deep neural network (DDNN, is able to achieve significant improvement with better performance of antinoise and feature extraction, compared to the traditional text classification algorithms. The simulations on benchmark datasets verify the effectiveness and robustness of our proposed text classifier.

  11. Integrating text mining, data mining, and network analysis for identifying genetic breast cancer trends.

    Science.gov (United States)

    Jurca, Gabriela; Addam, Omar; Aksac, Alper; Gao, Shang; Özyer, Tansel; Demetrick, Douglas; Alhajj, Reda

    2016-04-26

    Breast cancer is a serious disease which affects many women and may lead to death. It has received considerable attention from the research community. Thus, biomedical researchers aim to find genetic biomarkers indicative of the disease. Novel biomarkers can be elucidated from the existing literature. However, the vast amount of scientific publications on breast cancer make this a daunting task. This paper presents a framework which investigates existing literature data for informative discoveries. It integrates text mining and social network analysis in order to identify new potential biomarkers for breast cancer. We utilized PubMed for the testing. We investigated gene-gene interactions, as well as novel interactions such as gene-year, gene-country, and abstract-country to find out how the discoveries varied over time and how overlapping/diverse are the discoveries and the interest of various research groups in different countries. Interesting trends have been identified and discussed, e.g., different genes are highlighted in relationship to different countries though the various genes were found to share functionality. Some text analysis based results have been validated against results from other tools that predict gene-gene relations and gene functions.

  12. Mining for constructions in texts using N-gram and network analysis

    DEFF Research Database (Denmark)

    Shibuya, Yoshikata; Jensen, Kim Ebensgaard

    2015-01-01

    N-gram analysis to Lewis Carroll's novel Alice's Adventures in Wonderland and Mark Twain's novelThe Adventures of Huckleberry Finn and extrapolate a number of likely constructional phenomena from recurring N-gram patterns in the two texts. In addition to simple N-gram analysis, the following....... The main premise is that, if constructions are functional units, then configurations of words that tend to recur together in discourse are likely to have some sort of function that speakers utilize in discourse. Writers of fiction, for instance, may use constructions in characterizations, mind-styles, text...

  13. Text analysis in R

    NARCIS (Netherlands)

    Welbers, K.; van Atteveldt, W.H.; Benoit, K.

    2017-01-01

    Computational text analysis has become an exciting research field with many applications in communication research. It can be a difficult method to apply, however, because it requires knowledge of various techniques, and the software required to perform most of these techniques is not readily

  14. Preserved Network Metrics across Translated Texts

    Science.gov (United States)

    Cabatbat, Josephine Jill T.; Monsanto, Jica P.; Tapang, Giovanni A.

    2014-09-01

    Co-occurrence language networks based on Bible translations and the Universal Declaration of Human Rights (UDHR) translations in different languages were constructed and compared with random text networks. Among the considered network metrics, the network size, N, the normalized betweenness centrality (BC), and the average k-nearest neighbors, knn, were found to be the most preserved across translations. Moreover, similar frequency distributions of co-occurring network motifs were observed for translated texts networks.

  15. Real Time Text Analysis

    Science.gov (United States)

    Senthilkumar, K.; Ruchika Mehra Vijayan, E.

    2017-11-01

    This paper aims to illustrate real time analysis of large scale data. For practical implementation we are performing sentiment analysis on live Twitter feeds for each individual tweet. To analyze sentiments we will train our data model on sentiWordNet, a polarity assigned wordNet sample by Princeton University. Our main objective will be to efficiency analyze large scale data on the fly using distributed computation. Apache Spark and Apache Hadoop eco system is used as distributed computation platform with Java as development language

  16. Text-Attentional Convolutional Neural Network for Scene Text Detection.

    Science.gov (United States)

    He, Tong; Huang, Weilin; Qiao, Yu; Yao, Jian

    2016-06-01

    Recent deep learning models have demonstrated strong capabilities for classifying text and non-text components in natural images. They extract a high-level feature globally computed from a whole image component (patch), where the cluttered background information may dominate true text features in the deep representation. This leads to less discriminative power and poorer robustness. In this paper, we present a new system for scene text detection by proposing a novel text-attentional convolutional neural network (Text-CNN) that particularly focuses on extracting text-related regions and features from the image components. We develop a new learning mechanism to train the Text-CNN with multi-level and rich supervised information, including text region mask, character label, and binary text/non-text information. The rich supervision information enables the Text-CNN with a strong capability for discriminating ambiguous texts, and also increases its robustness against complicated background components. The training process is formulated as a multi-task learning problem, where low-level supervised information greatly facilitates the main task of text/non-text classification. In addition, a powerful low-level detector called contrast-enhancement maximally stable extremal regions (MSERs) is developed, which extends the widely used MSERs by enhancing intensity contrast between text patterns and background. This allows it to detect highly challenging text patterns, resulting in a higher recall. Our approach achieved promising results on the ICDAR 2013 data set, with an F-measure of 0.82, substantially improving the state-of-the-art results.

  17. Text-Attentional Convolutional Neural Networks for Scene Text Detection.

    Science.gov (United States)

    He, Tong; Huang, Weilin; Qiao, Yu; Yao, Jian

    2016-03-28

    Recent deep learning models have demonstrated strong capabilities for classifying text and non-text components in natural images. They extract a high-level feature computed globally from a whole image component (patch), where the cluttered background information may dominate true text features in the deep representation. This leads to less discriminative power and poorer robustness. In this work, we present a new system for scene text detection by proposing a novel Text-Attentional Convolutional Neural Network (Text-CNN) that particularly focuses on extracting text-related regions and features from the image components. We develop a new learning mechanism to train the Text-CNN with multi-level and rich supervised information, including text region mask, character label, and binary text/nontext information. The rich supervision information enables the Text-CNN with a strong capability for discriminating ambiguous texts, and also increases its robustness against complicated background components. The training process is formulated as a multi-task learning problem, where low-level supervised information greatly facilitates main task of text/non-text classification. In addition, a powerful low-level detector called Contrast- Enhancement Maximally Stable Extremal Regions (CE-MSERs) is developed, which extends the widely-used MSERs by enhancing intensity contrast between text patterns and background. This allows it to detect highly challenging text patterns, resulting in a higher recall. Our approach achieved promising results on the ICDAR 2013 dataset, with a F-measure of 0.82, improving the state-of-the-art results substantially.

  18. Medical Text Classification using Convolutional Neural Networks

    OpenAIRE

    Hughes, Mark; Li, Irene; Kotoulas, Spyros; Suzumura, Toyotaro

    2017-01-01

    We present an approach to automatically classify clinical text at a sentence level. We are using deep convolutional neural networks to represent complex features. We train the network on a dataset providing a broad categorization of health information. Through a detailed evaluation, we demonstrate that our method outperforms several approaches widely used in natural language processing tasks by about 15%.

  19. Medical Text Classification Using Convolutional Neural Networks.

    Science.gov (United States)

    Hughes, Mark; Li, Irene; Kotoulas, Spyros; Suzumura, Toyotaro

    2017-01-01

    We present an approach to automatically classify clinical text at a sentence level. We are using deep convolutional neural networks to represent complex features. We train the network on a dataset providing a broad categorization of health information. Through a detailed evaluation, we demonstrate that our method outperforms several approaches widely used in natural language processing tasks by about 15%.

  20. Text analysis methods, text analysis apparatuses, and articles of manufacture

    Science.gov (United States)

    Whitney, Paul D; Willse, Alan R; Lopresti, Charles A; White, Amanda M

    2014-10-28

    Text analysis methods, text analysis apparatuses, and articles of manufacture are described according to some aspects. In one aspect, a text analysis method includes accessing information indicative of data content of a collection of text comprising a plurality of different topics, using a computing device, analyzing the information indicative of the data content, and using results of the analysis, identifying a presence of a new topic in the collection of text.

  1. Multilingual Text Detection with Nonlinear Neural Network

    Directory of Open Access Journals (Sweden)

    Lin Li

    2015-01-01

    Full Text Available Multilingual text detection in natural scenes is still a challenging task in computer vision. In this paper, we apply an unsupervised learning algorithm to learn language-independent stroke feature and combine unsupervised stroke feature learning and automatically multilayer feature extraction to improve the representational power of text feature. We also develop a novel nonlinear network based on traditional Convolutional Neural Network that is able to detect multilingual text regions in the images. The proposed method is evaluated on standard benchmarks and multilingual dataset and demonstrates improvement over the previous work.

  2. Text analysis devices, articles of manufacture, and text analysis methods

    Science.gov (United States)

    Turner, Alan E; Hetzler, Elizabeth G; Nakamura, Grant C

    2013-05-28

    Text analysis devices, articles of manufacture, and text analysis methods are described according to some aspects. In one aspect, a text analysis device includes processing circuitry configured to analyze initial text to generate a measurement basis usable in analysis of subsequent text, wherein the measurement basis comprises a plurality of measurement features from the initial text, a plurality of dimension anchors from the initial text and a plurality of associations of the measurement features with the dimension anchors, and wherein the processing circuitry is configured to access a viewpoint indicative of a perspective of interest of a user with respect to the analysis of the subsequent text, and wherein the processing circuitry is configured to use the viewpoint to generate the measurement basis.

  3. Review network for scene text recognition

    Science.gov (United States)

    Li, Shuohao; Han, Anqi; Chen, Xu; Yin, Xiaoqing; Zhang, Jun

    2017-09-01

    Recognizing text in images captured in the wild is a fundamental preprocessing task for many computer vision and machine learning applications and has gained significant attention in recent years. This paper proposes an end-to-end trainable deep review neural network for scene text recognition, which is a combination of feature extraction, feature reviewing, feature attention, and sequence recognition. Our model can generate the predicted text without any segmentation or grouping algorithm. Because the attention model in the feature attention stage lacks global modeling ability, a review network is applied to extract the global context of sequence data in the feature reviewing stage. We perform rigorous experiments across a number of standard benchmarks, including IIIT5K, SVT, ICDAR03, and ICDAR13 datasets. Experimental results show that our model is comparable to or outperforms state-of-the-art techniques.

  4. Individual Profiling Using Text Analysis

    Science.gov (United States)

    2016-04-15

    likelihood that it belongs to the input text , although early experiments showed that this added no benefit. Parts–of– speech In early experiments all...tweets were POS tagged as part of the pre– processing step using a Twitter specific part–of– speech tagger [8]. Various studies have identified POS tags as...AFRL-AFOSR-UK-TR-2016-0011 Individual Profiling using Text Analysis 140333 Mark Stevenson UNIVERSITY OF SHEFFIELD, DEPARTMENT OF PSYCHOLOGY Final

  5. Automatic Amharic text news classification: Aneural networks ...

    African Journals Online (AJOL)

    The study is on classification of Amharic news automatically using neural networks approach. Learning Vector Quantization (LVQ) algorithm is employed to classify new instance of Amharic news based on classifier developed using training dataset. Two weighting schemes, Term Frequency (TF) and Term Frequency by ...

  6. ParaText : scalable text modeling and analysis.

    Energy Technology Data Exchange (ETDEWEB)

    Dunlavy, Daniel M.; Stanton, Eric T.; Shead, Timothy M.

    2010-06-01

    Automated processing, modeling, and analysis of unstructured text (news documents, web content, journal articles, etc.) is a key task in many data analysis and decision making applications. As data sizes grow, scalability is essential for deep analysis. In many cases, documents are modeled as term or feature vectors and latent semantic analysis (LSA) is used to model latent, or hidden, relationships between documents and terms appearing in those documents. LSA supplies conceptual organization and analysis of document collections by modeling high-dimension feature vectors in many fewer dimensions. While past work on the scalability of LSA modeling has focused on the SVD, the goal of our work is to investigate the use of distributed memory architectures for the entire text analysis process, from data ingestion to semantic modeling and analysis. ParaText is a set of software components for distributed processing, modeling, and analysis of unstructured text. The ParaText source code is available under a BSD license, as an integral part of the Titan toolkit. ParaText components are chained-together into data-parallel pipelines that are replicated across processes on distributed-memory architectures. Individual components can be replaced or rewired to explore different computational strategies and implement new functionality. ParaText functionality can be embedded in applications on any platform using the native C++ API, Python, or Java. The ParaText MPI Process provides a 'generic' text analysis pipeline in a command-line executable that can be used for many serial and parallel analysis tasks. ParaText can also be deployed as a web service accessible via a RESTful (HTTP) API. In the web service configuration, any client can access the functionality provided by ParaText using commodity protocols ... from standard web browsers to custom clients written in any language.

  7. Multilingual Text Analysis for Text-to-Speech Synthesis

    CERN Document Server

    Sproat, R

    1996-01-01

    We present a model of text analysis for text-to-speech (TTS) synthesis based on (weighted) finite-state transducers, which serves as the text-analysis module of the multilingual Bell Labs TTS system. The transducers are constructed using a lexical toolkit that allows declarative descriptions of lexicons, morphological rules, numeral-expansion rules, and phonological rules, inter alia. To date, the model has been applied to eight languages: Spanish, Italian, Romanian, French, German, Russian, Mandarin and Japanese.

  8. Multilingual Text Analysis for Text-to-Speech Synthesis

    OpenAIRE

    Sproat, Richard

    1996-01-01

    We present a model of text analysis for text-to-speech (TTS) synthesis based on (weighted) finite-state transducers, which serves as the text-analysis module of the multilingual Bell Labs TTS system. The transducers are constructed using a lexical toolkit that allows declarative descriptions of lexicons, morphological rules, numeral-expansion rules, and phonological rules, inter alia. To date, the model has been applied to eight languages: Spanish, Italian, Romanian, French, German, Russian, ...

  9. Building a glaucoma interaction network using a text mining approach.

    Science.gov (United States)

    Soliman, Maha; Nasraoui, Olfa; Cooper, Nigel G F

    2016-01-01

    The volume of biomedical literature and its underlying knowledge base is rapidly expanding, making it beyond the ability of a single human being to read through all the literature. Several automated methods have been developed to help make sense of this dilemma. The present study reports on the results of a text mining approach to extract gene interactions from the data warehouse of published experimental results which are then used to benchmark an interaction network associated with glaucoma. To the best of our knowledge, there is, as yet, no glaucoma interaction network derived solely from text mining approaches. The presence of such a network could provide a useful summative knowledge base to complement other forms of clinical information related to this disease. A glaucoma corpus was constructed from PubMed Central and a text mining approach was applied to extract genes and their relations from this corpus. The extracted relations between genes were checked using reference interaction databases and classified generally as known or new relations. The extracted genes and relations were then used to construct a glaucoma interaction network. Analysis of the resulting network indicated that it bears the characteristics of a small world interaction network. Our analysis showed the presence of seven glaucoma linked genes that defined the network modularity. A web-based system for browsing and visualizing the extracted glaucoma related interaction networks is made available at http://neurogene.spd.louisville.edu/GlaucomaINViewer/Form1.aspx. This study has reported the first version of a glaucoma interaction network using a text mining approach. The power of such an approach is in its ability to cover a wide range of glaucoma related studies published over many years. Hence, a bigger picture of the disease can be established. To the best of our knowledge, this is the first glaucoma interaction network to summarize the known literature. The major findings were a set of

  10. Automatic Amharic text news classification: Aneural networks ...

    African Journals Online (AJOL)

    Ethiopian Journal of Science and Technology. Journal Home · ABOUT · Advanced Search · Current Issue · Archives · Journal Home > Vol 6, No 2 (2013) >. Log in or Register to get access to full text downloads.

  11. Building and analysis of protein-protein interactions related to diabetes mellitus using support vector machine, biomedical text mining and network analysis.

    Science.gov (United States)

    Vyas, Renu; Bapat, Sanket; Jain, Esha; Karthikeyan, Muthukumarasamy; Tambe, Sanjeev; Kulkarni, Bhaskar D

    2016-12-01

    In order to understand the molecular mechanism underlying any disease, knowledge about the interacting proteins in the disease pathway is essential. The number of revealed protein-protein interactions (PPI) is still very limited compared to the available protein sequences of different organisms. Experiment based high-throughput technologies though provide some data about these interactions, those are often fairly noisy. Computational techniques for predicting protein-protein interactions therefore assume significance. 1296 binary fingerprints that encode a combination of structural and geometric properties were developed using the crystallographic data of 15,000 protein complexes in the pdb server. In a case study, these fingerprints were created for proteins implicated in the Type 2 diabetes mellitus disease. The fingerprints were input into a SVM based model for discriminating disease proteins from non disease proteins yielding a classification accuracy of 78.2% (AUC value of 0.78) on an external data set composed of proteins retrieved via text mining of diabetes related literature. A PPI network was constructed and analysed to explore new disease targets. The integrated approach exemplified here has a potential for identifying disease related proteins, functional annotation and other proteomics studies. Copyright © 2016 Elsevier Ltd. All rights reserved.

  12. Non Linear Smoothed Transductive Network Embeddingwith Text Information

    Science.gov (United States)

    2016-11-22

    networks, the nodes often have rich text attributes (namely words). For example, users in online social network such as Twitter and Facebook publish a...rich text attributes in real networks. For instance, the users in Twitter and Facebook social network are associated with plenty user generated...anonymous reviewers for their insightful comments . References Mikhail Belkin and Partha Niyogi. Laplacian eigenmaps and spectral techniques for em

  13. English Metafunction Analysis in Chemistry Text: Characterization of Scientific Text

    Directory of Open Access Journals (Sweden)

    Ahmad Amin Dalimunte, M.Hum

    2013-09-01

    Full Text Available The objectives of this research are to identify what Metafunctions are applied in chemistry text and how they characterize a scientific text. It was conducted by applying content analysis. The data for this research was a twelve-paragraph chemistry text. The data were collected by applying a documentary technique. The document was read and analyzed to find out the Metafunction. The data were analyzed by some procedures: identifying the types of process, counting up the number of the processes, categorizing and counting up the cohesion devices, classifying the types of modulation and determining modality value, finally counting up the number of sentences and clauses, then scoring the grammatical intricacy index. The findings of the research show that Material process (71of 100 is mostly used, circumstance of spatial location (26 of 56 is more dominant than the others. Modality (5 is less used in order to avoid from subjectivity. Impersonality is implied through less use of reference either pronouns (7 or demonstrative (7, conjunctions (60 are applied to develop ideas, and the total number of the clauses are found much more dominant (109 than the total number of the sentences (40 which results high grammatical intricacy index. The Metafunction found indicate that the chemistry text has fulfilled the characteristics of scientific or academic text which truly reflects it as a natural science.

  14. Using Semantic Linking to Understand Persons’ Networks Extracted from Text

    Directory of Open Access Journals (Sweden)

    Alessio Palmero Aprosio

    2017-11-01

    Full Text Available In this work, we describe a methodology to interpret large persons’ networks extracted from text by classifying cliques using the DBpedia ontology. The approach relies on a combination of NLP, Semantic web technologies, and network analysis. The classification methodology that first starts from single nodes and then generalizes to cliques is effective in terms of performance and is able to deal also with nodes that are not linked to Wikipedia. The gold standard manually developed for evaluation shows that groups of co-occurring entities share in most of the cases a category that can be automatically assigned. This holds for both languages considered in this study. The outcome of this work may be of interest to enhance the readability of large networks and to provide an additional semantic layer on top of cliques. This would greatly help humanities scholars when dealing with large amounts of textual data that need to be interpreted or categorized. Furthermore, it represents an unsupervised approach to automatically extend DBpedia starting from a corpus.

  15. Using analytic network process for evaluating mobile text entry methods.

    Science.gov (United States)

    Ocampo, Lanndon A; Seva, Rosemary R

    2016-01-01

    This paper highlights a preference evaluation methodology for text entry methods in a touch keyboard smartphone using analytic network process (ANP). Evaluation of text entry methods in literature mainly considers speed and accuracy. This study presents an alternative means for selecting text entry method that considers user preference. A case study was carried out with a group of experts who were asked to develop a selection decision model of five text entry methods. The decision problem is flexible enough to reflect interdependencies of decision elements that are necessary in describing real-life conditions. Results showed that QWERTY method is more preferred than other text entry methods while arrangement of keys is the most preferred criterion in characterizing a sound method. Sensitivity analysis using simulation of normally distributed random numbers under fairly large perturbation reported the foregoing results reliable enough to reflect robust judgment. The main contribution of this paper is the introduction of a multi-criteria decision approach in the preference evaluation of text entry methods. Copyright © 2015 Elsevier Ltd and The Ergonomics Society. All rights reserved.

  16. Text Association Analysis and Ambiguity in Text Mining

    Science.gov (United States)

    Bhonde, S. B.; Paikrao, R. L.; Rahane, K. U.

    2010-11-01

    Text Mining is the process of analyzing a semantically rich document or set of documents to understand the content and meaning of the information they contain. The research in Text Mining will enhance human's ability to process massive quantities of information, and it has high commercial values. Firstly, the paper discusses the introduction of TM its definition and then gives an overview of the process of text mining and the applications. Up to now, not much research in text mining especially in concept/entity extraction has focused on the ambiguity problem. This paper addresses ambiguity issues in natural language texts, and presents a new technique for resolving ambiguity problem in extracting concept/entity from texts. In the end, it shows the importance of TM in knowledge discovery and highlights the up-coming challenges of document mining and the opportunities it offers.

  17. On Extending Neural Networks with Loss Ensembles for Text Classification

    OpenAIRE

    Hajiabadi, Hamideh; Molla-Aliod, Diego; Monsefi, Reza

    2017-01-01

    Ensemble techniques are powerful approaches that combine several weak learners to build a stronger one. As a meta learning framework, ensemble techniques can easily be applied to many machine learning techniques. In this paper we propose a neural network extended with an ensemble loss function for text classification. The weight of each weak loss function is tuned within the training phase through the gradient propagation optimization method of the neural network. The approach is evaluated on...

  18. Self-Taught convolutional neural networks for short text clustering.

    Science.gov (United States)

    Xu, Jiaming; Xu, Bo; Wang, Peng; Zheng, Suncong; Tian, Guanhua; Zhao, Jun; Xu, Bo

    2017-04-01

    Short text clustering is a challenging problem due to its sparseness of text representation. Here we propose a flexible Self-Taught Convolutional neural network framework for Short Text Clustering (dubbed STC(2)), which can flexibly and successfully incorporate more useful semantic features and learn non-biased deep text representation in an unsupervised manner. In our framework, the original raw text features are firstly embedded into compact binary codes by using one existing unsupervised dimensionality reduction method. Then, word embeddings are explored and fed into convolutional neural networks to learn deep feature representations, meanwhile the output units are used to fit the pre-trained binary codes in the training process. Finally, we get the optimal clusters by employing K-means to cluster the learned representations. Extensive experimental results demonstrate that the proposed framework is effective, flexible and outperform several popular clustering methods when tested on three public short text datasets. Copyright © 2017 Elsevier Ltd. All rights reserved.

  19. NEW TECHNIQUES USED IN AUTOMATED TEXT ANALYSIS

    Directory of Open Access Journals (Sweden)

    M. I strate

    2010-12-01

    Full Text Available Automated analysis of natural language texts is one of the most important knowledge discovery tasks for any organization. According to Gartner Group, almost 90% of knowledge available at an organization today is dispersed throughout piles of documents buried within unstructured text. Analyzing huge volumes of textual information is often involved in making informed and correct business decisions. Traditional analysis methods based on statistics fail to help processing unstructured texts and the society is in search of new technologies for text analysis. There exist a variety of approaches to the analysis of natural language texts, but most of them do not provide results that could be successfully applied in practice. This article concentrates on recent ideas and practical implementations in this area.

  20. Cancer Hallmark Text Classification Using Convolutional Neural Networks

    OpenAIRE

    Baker, Simon; Korhonen, Anna-Leena; Pyysalo, S

    2017-01-01

    Methods based on deep learning approaches have recently achieved state-of-the-art performance in a range of machine learning tasks and are increasingly applied to natural language processing (NLP). Despite strong results in various established NLP tasks involving general domain texts, here is only limited work applying these models to biomedical NLP. In this paper, we consider a Convolutional Neural Network (CNN) approach to biomedical text classification. Evaluation using a recently intr...

  1. Polarity Analysis of Texts using Discourse Structure

    NARCIS (Netherlands)

    Heerschop, Bas; Goosen, Frank; Hogenboom, Alexander; Frasincar, Flavius; Kaymak, Uzay; de Jong, Franciska M.G.

    2011-01-01

    Sentiment analysis has applications in many areas and the exploration of its potential has only just begun. We propose Pathos, a framework which performs document sentiment analysis (partly) based on a document’s discourse structure. We hypothesize that by splitting a text into important and less

  2. The Relationship between Paraphrasing and Text Analysis

    Directory of Open Access Journals (Sweden)

    María Luisa Cepeda Islas

    2013-04-01

    Full Text Available Given the importance of paraphrasing in the process of comprehension for college students, this study assessed the level of implementation of text analysis and paraphrases the response of a sample of senior students of the career psychology. We selected a group of freshmen to the Psychology course, which was asked to answer a questionnaire and carry out the summary of an empirical article. The results showed that participants have a low level of text analysis, at the same time had low levels of paraphrasing. It was seen that the predominant textual copy. They envision some possibilities for the structure of a training workshop not only paraphrasing but on the analysis of text.

  3. An Enhanced Probabilistic Neural Network Approach Applied to Text Classification

    Science.gov (United States)

    Marques Ciarelli, Patrick; Oliveira, Elias

    Text classification is still a quite difficult problem to be dealt with both by the academia and by the industrial areas. On the top of that, the importance of aggregating a set of related amount of text documents is steadily growing in importance these days. The presence of multi-labeled texts and great quantity of classes turn this problem even more challenging. In this article we present an enhanced version of Probabilistic Neural Network using centroids to tackle the multi-label classification problem. We carried out some experiments comparing our proposed classifier against the other well known classifiers in the literature which were specially designed to treat this type of problem. By the achieved results, we observed that our novel approach were superior to the other classifiers and faster than the Probabilistic Neural Network without the use of centroids.

  4. Protein interaction network constructing based on text mining and reinforcement learning with application to prostate cancer.

    Science.gov (United States)

    Zhu, Fei; Liu, Quan; Zhang, Xiaofang; Shen, Bairong

    2015-08-01

    Constructing interaction network from biomedical texts is a very important and interesting work. The authors take advantage of text mining and reinforcement learning approaches to establish protein interaction network. Considering the high computational efficiency of co-occurrence-based interaction extraction approaches and high precision of linguistic patterns approaches, the authors propose an interaction extracting algorithm where they utilise frequently used linguistic patterns to extract the interactions from texts and then find out interactions from extended unprocessed texts under the basic idea of co-occurrence approach, meanwhile they discount the interaction extracted from extended texts. They put forward a reinforcement learning-based algorithm to establish a protein interaction network, where nodes represent proteins and edges denote interactions. During the evolutionary process, a node selects another node and the attained reward determines which predicted interaction should be reinforced. The topology of the network is updated by the agent until an optimal network is formed. They used texts downloaded from PubMed to construct a prostate cancer protein interaction network by the proposed methods. The results show that their method brought out pretty good matching rate. Network topology analysis results also demonstrate that the curves of node degree distribution, node degree probability and probability distribution of constructed network accord with those of the scale-free network well.

  5. Semi-supervised Text Classification Using RBF Networks

    Science.gov (United States)

    Jiang, Eric P.

    Semi-supervised text classification has numerous applications and is particularly applicable to the problems where large quantities of unlabeled data are readily available while only a small number of labeled training samples are accessible. The paper proposes a semi-supervised classifier that integrates a clustering based Expectation Maximization (EM) algorithm into radial basis function (RBF) neural networks and can learn for classification from a very small number of labeled training samples and a large pool of unlabeled data effectively. A generalized centroid clustering algorithm is also investigated in this work to balance predictive values between labeled and unlabeled training data and to improve classification accuracy. Experimental results with three popular text classification corpora show that the proper use of additional unlabeled data in this semi-supervised approach can reduce classification errors by up to 26%.

  6. Texting

    Science.gov (United States)

    Tilley, Carol L.

    2009-01-01

    With the increasing ranks of cell phone ownership is an increase in text messaging, or texting. During 2008, more than 2.5 trillion text messages were sent worldwide--that's an average of more than 400 messages for every person on the planet. Although many of the messages teenagers text each day are perhaps nothing more than "how r u?" or "c u…

  7. Clustering Analysis within Text Classification Techniques

    Directory of Open Access Journals (Sweden)

    Madalina ZURINI

    2011-01-01

    Full Text Available The paper represents a personal approach upon the main applications of classification which are presented in the area of knowledge based society by means of methods and techniques widely spread in the literature. Text classification is underlined in chapter two where the main techniques used are described, along with an integrated taxonomy. The transition is made through the concept of spatial representation. Having the elementary elements of geometry and the artificial intelligence analysis, spatial representation models are presented. Using a parallel approach, spatial dimension is introduced in the process of classification. The main clustering methods are described in an aggregated taxonomy. For an example, spam and ham words are clustered and spatial represented, when the concepts of spam, ham and common and linkage word are presented and explained in the xOy space representation.

  8. Rationale-Augmented Convolutional Neural Networks for Text Classification.

    Science.gov (United States)

    Zhang, Ye; Marshall, Iain; Wallace, Byron C

    2016-11-01

    We present a new Convolutional Neural Network (CNN) model for text classification that jointly exploits labels on documents and their constituent sentences. Specifically, we consider scenarios in which annotators explicitly mark sentences (or snippets) that support their overall document categorization, i.e., they provide rationales. Our model exploits such supervision via a hierarchical approach in which each document is represented by a linear combination of the vector representations of its component sentences. We propose a sentence-level convolutional model that estimates the probability that a given sentence is a rationale, and we then scale the contribution of each sentence to the aggregate document representation in proportion to these estimates. Experiments on five classification datasets that have document labels and associated rationales demonstrate that our approach consistently outperforms strong baselines. Moreover, our model naturally provides explanations for its predictions.

  9. Identification of Literary Movements Using Complex Networks to Represent Texts

    CERN Document Server

    Amancio, Diego R; Costa, Luciano da F; 10.1088/1367-2630/14/4/043029

    2013-01-01

    The use of statistical methods to analyze large databases of text has been useful to unveil patterns of human behavior and establish historical links between cultures and languages. In this study, we identify literary movements by treating books published from 1590 to 1922 as complex networks, whose metrics were analyzed with multivariate techniques to generate six clusters of books. The latter correspond to time periods coinciding with relevant literary movements over the last 5 centuries. The most important factor contributing to the distinction between different literary styles was {the average shortest path length (particularly, the asymmetry of the distribution)}. Furthermore, over time there has been a trend toward larger average shortest path lengths, which is correlated with increased syntactic complexity, and a more uniform use of the words reflected in a smaller power-law coefficient for the distribution of word frequency. Changes in literary style were also found to be driven by opposition to earli...

  10. Managing biological networks by using text mining and computer-aided curation

    Science.gov (United States)

    Yu, Seok Jong; Cho, Yongseong; Lee, Min-Ho; Lim, Jongtae; Yoo, Jaesoo

    2015-11-01

    In order to understand a biological mechanism in a cell, a researcher should collect a huge number of protein interactions with experimental data from experiments and the literature. Text mining systems that extract biological interactions from papers have been used to construct biological networks for a few decades. Even though the text mining of literature is necessary to construct a biological network, few systems with a text mining tool are available for biologists who want to construct their own biological networks. We have developed a biological network construction system called BioKnowledge Viewer that can generate a biological interaction network by using a text mining tool and biological taggers. It also Boolean simulation software to provide a biological modeling system to simulate the model that is made with the text mining tool. A user can download PubMed articles and construct a biological network by using the Multi-level Knowledge Emergence Model (KMEM), MetaMap, and A Biomedical Named Entity Recognizer (ABNER) as a text mining tool. To evaluate the system, we constructed an aging-related biological network that consist 9,415 nodes (genes) by using manual curation. With network analysis, we found that several genes, including JNK, AP-1, and BCL-2, were highly related in aging biological network. We provide a semi-automatic curation environment so that users can obtain a graph database for managing text mining results that are generated in the server system and can navigate the network with BioKnowledge Viewer, which is freely available at http://bioknowledgeviewer.kisti.re.kr.

  11. Uncovering the differences in linguistic network dynamics of book and social media texts.

    Science.gov (United States)

    Türker, İlker; Şehirli, Eftal; Demiral, Emrullah

    2016-01-01

    Complex network studies span a large variety of applications including linguistic networks. To investigate the differences in book and social media texts in terms of linguistic typology, we constructed both sequential and sentence collocation networks of book, Facebook and Twitter texts with undirected and weighted edges. The comparisons are performed using the basic parameters like average degree, modularity, average clustering coefficient, average path length, diameter, average link weight etc. We also presented the distribution graphs for node degrees, edge weights and maximum degree differences of the pairing nodes. The degree difference occurrences are furtherly detailed with the grayscale percentile plots with respect to the edge weights. We linked the network analysis with linguistic aspects like word and sentence length distributions. We concluded that linguistic typology demonstrates a formal usage in book that slightly deviates to informal in Twitter. Facebook interpolates between these media by the means of network parameters, while the informality of Twitter is mostly influenced by the character limitations.

  12. Tourism Destinations Network Analysis, Social Network Analysis Approach

    Directory of Open Access Journals (Sweden)

    2015-09-01

    Full Text Available The tourism industry is becoming one of the world's largest economical sources, and is expected to become the world's first industry by 2020. Previous studies have focused on several aspects of this industry including sociology, geography, tourism management and development, but have paid less attention to analytical and quantitative approaches. This study introduces some network analysis techniques and measures aiming at studying the structural characteristics of tourism networks. More specifically, it presents a methodology to analyze tourism destinations network. We apply the methodology to analyze mazandaran’s Tourism destination network, one of the most famous tourism areas of Iran.

  13. Rhetorical Structure Theory and Text Analysis

    Science.gov (United States)

    1989-11-01

    at least these effects. To use language as in the ZPG letter is not merely performing in some role or ritual as an institutional beggar; playing out a...bulletin board: Text Example: "The Los Angeles Chamber Ballet (the ballet company I’m dancing with) is giving 4 concerts next week ... Tickets are $7.50...yielded by the comparison is being made locua of the effect: multiple nuclei Text Example: ’Animals heal , but trees compartmentalize. They endure a

  14. METHODS OF TEXT INFORMATION CLASSIFICATION ON THE BASIS OF ARTIFICIAL NEURAL AND SEMANTIC NETWORKS

    OpenAIRE

    L. V. Serebryanaya; V. V. Potaraev

    2016-01-01

    The article covers the use of perseptron, Hopfild artificial neural network and semantic network for classification of text information. Network training algorithms are studied. An algorithm of inverse mistake spreading for perceptron network and convergence algorithm for Hopfild network are implemented. On the basis of the offered models and algorithms automatic text classification software is developed and its operation results are evaluated.

  15. Social Network Analysis with sna

    Directory of Open Access Journals (Sweden)

    Carter T. Butts

    2007-12-01

    Full Text Available Modern social network analysis---the analysis of relational data arising from social systems---is a computationally intensive area of research. Here, we provide an overview of a software package which provides support for a range of network analytic functionality within the R statistical computing environment. General categories of currently supported functionality are described, and brief examples of package syntax and usage are shown.

  16. Agreement text contrastive analysis: English vs Russian

    OpenAIRE

    STEPANOVA V.V.; KISELEVA L.A.

    2014-01-01

    The article studies the incongruity of the structure and stylistic organization of an agreement as one of the types of legal discourse in English and Russian. The comparative analysis of certain stylistic differences connected with the structure and content of agreement and the tips for translation suggested in this concise work are aimed at better understanding and interpreting the legal document of the given format.

  17. Statistical analysis of network data with R

    CERN Document Server

    Kolaczyk, Eric D

    2014-01-01

    Networks have permeated everyday life through everyday realities like the Internet, social networks, and viral marketing. As such, network analysis is an important growth area in the quantitative sciences, with roots in social network analysis going back to the 1930s and graph theory going back centuries. Measurement and analysis are integral components of network research. As a result, statistical methods play a critical role in network analysis. This book is the first of its kind in network research. It can be used as a stand-alone resource in which multiple R packages are used to illustrate how to conduct a wide range of network analyses, from basic manipulation and visualization, to summary and characterization, to modeling of network data. The central package is igraph, which provides extensive capabilities for studying network graphs in R. This text builds on Eric D. Kolaczyk’s book Statistical Analysis of Network Data (Springer, 2009).

  18. Probing the topological properties of complex networks modeling short written texts.

    Directory of Open Access Journals (Sweden)

    Diego R Amancio

    Full Text Available In recent years, graph theory has been widely employed to probe several language properties. More specifically, the so-called word adjacency model has been proven useful for tackling several practical problems, especially those relying on textual stylistic analysis. The most common approach to treat texts as networks has simply considered either large pieces of texts or entire books. This approach has certainly worked well-many informative discoveries have been made this way-but it raises an uncomfortable question: could there be important topological patterns in small pieces of texts? To address this problem, the topological properties of subtexts sampled from entire books was probed. Statistical analyses performed on a dataset comprising 50 novels revealed that most of the traditional topological measurements are stable for short subtexts. When the performance of the authorship recognition task was analyzed, it was found that a proper sampling yields a discriminability similar to the one found with full texts. Surprisingly, the support vector machine classification based on the characterization of short texts outperformed the one performed with entire books. These findings suggest that a local topological analysis of large documents might improve its global characterization. Most importantly, it was verified, as a proof of principle, that short texts can be analyzed with the methods and concepts of complex networks. As a consequence, the techniques described here can be extended in a straightforward fashion to analyze texts as time-varying complex networks.

  19. Probing the Topological Properties of Complex Networks Modeling Short Written Texts

    Science.gov (United States)

    Amancio, Diego R.

    2015-01-01

    In recent years, graph theory has been widely employed to probe several language properties. More specifically, the so-called word adjacency model has been proven useful for tackling several practical problems, especially those relying on textual stylistic analysis. The most common approach to treat texts as networks has simply considered either large pieces of texts or entire books. This approach has certainly worked well—many informative discoveries have been made this way—but it raises an uncomfortable question: could there be important topological patterns in small pieces of texts? To address this problem, the topological properties of subtexts sampled from entire books was probed. Statistical analyses performed on a dataset comprising 50 novels revealed that most of the traditional topological measurements are stable for short subtexts. When the performance of the authorship recognition task was analyzed, it was found that a proper sampling yields a discriminability similar to the one found with full texts. Surprisingly, the support vector machine classification based on the characterization of short texts outperformed the one performed with entire books. These findings suggest that a local topological analysis of large documents might improve its global characterization. Most importantly, it was verified, as a proof of principle, that short texts can be analyzed with the methods and concepts of complex networks. As a consequence, the techniques described here can be extended in a straightforward fashion to analyze texts as time-varying complex networks. PMID:25719799

  20. METHODS OF TEXT INFORMATION CLASSIFICATION ON THE BASIS OF ARTIFICIAL NEURAL AND SEMANTIC NETWORKS

    Directory of Open Access Journals (Sweden)

    L. V. Serebryanaya

    2016-01-01

    Full Text Available The article covers the use of perseptron, Hopfild artificial neural network and semantic network for classification of text information. Network training algorithms are studied. An algorithm of inverse mistake spreading for perceptron network and convergence algorithm for Hopfild network are implemented. On the basis of the offered models and algorithms automatic text classification software is developed and its operation results are evaluated.

  1. MET network in PubMed: a text-mined network visualization and curation system.

    Science.gov (United States)

    Dai, Hong-Jie; Su, Chu-Hsien; Lai, Po-Ting; Huang, Ming-Siang; Jonnagaddala, Jitendra; Rose Jue, Toni; Rao, Shruti; Chou, Hui-Jou; Milacic, Marija; Singh, Onkar; Syed-Abdul, Shabbir; Hsu, Wen-Lian

    2016-01-01

    Metastasis is the dissemination of a cancer/tumor from one organ to another, and it is the most dangerous stage during cancer progression, causing more than 90% of cancer deaths. Improving the understanding of the complicated cellular mechanisms underlying metastasis requires investigations of the signaling pathways. To this end, we developed a METastasis (MET) network visualization and curation tool to assist metastasis researchers retrieve network information of interest while browsing through the large volume of studies in PubMed. MET can recognize relations among genes, cancers, tissues and organs of metastasis mentioned in the literature through text-mining techniques, and then produce a visualization of all mined relations in a metastasis network. To facilitate the curation process, MET is developed as a browser extension that allows curators to review and edit concepts and relations related to metastasis directly in PubMed. PubMed users can also view the metastatic networks integrated from the large collection of research papers directly through MET. For the BioCreative 2015 interactive track (IAT), a curation task was proposed to curate metastatic networks among PubMed abstracts. Six curators participated in the proposed task and a post-IAT task, curating 963 unique metastatic relations from 174 PubMed abstracts using MET.Database URL: http://btm.tmu.edu.tw/metastasisway. © The Author(s) 2016. Published by Oxford University Press.

  2. Text Classification: Classifying Plain Source Files with Neural Network

    Directory of Open Access Journals (Sweden)

    Jaromir Veber

    2010-10-01

    Full Text Available The automated text file categorization has an important place in computer engineering, particularly in the process called data management automation. A lot has been written about text classification and the methods allowing classification of these files are well known. Unfortunately most studies are theoretical and for practical implementation more research is needed. I decided to contribute with a research focused on creating of a classifier for different kinds of programs (source files, scripts…. This paper will describe practical implementation of the classifier for text files depending on file content.

  3. Network analysis literacy a practical approach to the analysis of networks

    CERN Document Server

    Zweig, Katharina A

    2014-01-01

    Network Analysis Literacy focuses on design principles for network analytics projects. The text enables readers to: pose a defined network analytic question; build a network to answer the question; choose or design the right network analytic methods for a particular purpose, and more.

  4. Text categorization using syllables and recurrent neural networks

    OpenAIRE

    Yar, Ersin

    2017-01-01

    Cataloged from PDF version of article. Thesis (M.S.): Bilkent University, Department of Electrical and Electronics Engineering, İhsan Doğramacı Bilkent University, 2017. Includes bibliographical references (leaves 48-54). We investigate multi class categorization of short texts. To this end, in the third chapter, we introduce highly efficient dimensionality reduction techniques suitable for online processing of high dimensional feature vectors generated from freely-worded te...

  5. Learning from Text: Matching Readers and Texts by Latent Semantic Analysis.

    Science.gov (United States)

    Wolfe, Michael B. W.; Schreiner, M. E.; Rehder, Bob; Laham, Darrell; Foltz, Peter W.; Kintsch, Walter; Landauer, Thomas K

    1998-01-01

    Uses Latent Semantic Analysis (LSA) to predict how much readers would learn from texts based on the estimated conceptual match between their topic knowledge and the text information. Shows a nonmonotonic relationship in which learning was greatest for texts that were neither too easy nor too difficult. Finds LSA was as effective at predicting…

  6. HiPub: translating PubMed and PMC texts to networks for knowledge discovery.

    Science.gov (United States)

    Lee, Kyubum; Shin, Wonho; Kim, Byounggun; Lee, Sunwon; Choi, Yonghwa; Kim, Sunkyu; Jeon, Minji; Tan, Aik Choon; Kang, Jaewoo

    2016-09-15

    We introduce HiPub, a seamless Chrome browser plug-in that automatically recognizes, annotates and translates biomedical entities from texts into networks for knowledge discovery. Using a combination of two different named-entity recognition resources, HiPub can recognize genes, proteins, diseases, drugs, mutations and cell lines in texts, and achieve high precision and recall. HiPub extracts biomedical entity-relationships from texts to construct context-specific networks, and integrates existing network data from external databases for knowledge discovery. It allows users to add additional entities from related articles, as well as user-defined entities for discovering new and unexpected entity-relationships. HiPub provides functional enrichment analysis on the biomedical entity network, and link-outs to external resources to assist users in learning new entities and relations. HiPub and detailed user guide are available at http://hipub.korea.ac.kr kangj@korea.ac.kr, aikchoon.tan@ucdenver.edu Supplementary data are available at Bioinformatics online. © The Author 2016. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.

  7. Topological analysis of telecommunications networks

    Directory of Open Access Journals (Sweden)

    Milojko V. Jevtović

    2011-01-01

    Full Text Available A topological analysis of the structure of telecommunications networks is a very interesting topic in the network research, but also a key issue in their design and planning. Satisfying multiple criteria in terms of locations of switching nodes as well as their connectivity with respect to the requests for capacity, transmission speed, reliability, availability and cost are the main research objectives. There are three ways of presenting the topology of telecommunications networks: table, matrix or graph method. The table method is suitable for a network of a relatively small number of nodes in relation to the number of links. The matrix method involves the formation of a connection matrix in which its columns present source traffic nodes and its rows are the switching systems that belong to the destination. The method of the topology graph means that the network nodes are connected via directional or unidirectional links. We can thus easily analyze the structural parameters of telecommunications networks. This paper presents the mathematical analysis of the star-, ring-, fully connected loop- and grid (matrix-shaped topology as well as the topology based on the shortest path tree. For each of these topologies, the expressions for determining the number of branches, the middle level of reliability, the medium length and the average length of the link are given in tables. For the fully connected loop network with five nodes the values of all topological parameters are calculated. Based on the topological parameters, the relationships that represent integral and distributed indicators of reliability are given in this work as well as the values of the particular network. The main objectives of the topology optimization of telecommunications networks are: achieving the minimum complexity, maximum capacity, the shortest path message transfer, the maximum speed of communication and maximum economy. The performance of telecommunications networks is

  8. Sequential Short-Text Classification with Recurrent and Convolutional Neural Networks

    OpenAIRE

    Lee, Ji Young; Dernoncourt, Franck

    2016-01-01

    Recent approaches based on artificial neural networks (ANNs) have shown promising results for short-text classification. However, many short texts occur in sequences (e.g., sentences in a document or utterances in a dialog), and most existing ANN-based systems do not leverage the preceding short texts when classifying a subsequent one. In this work, we present a model based on recurrent neural networks and convolutional neural networks that incorporates the preceding short texts. Our model ac...

  9. Humanities data in R exploring networks, geospatial data, images, and text

    CERN Document Server

    Arnold, Taylor

    2015-01-01

    This pioneering book teaches readers to use R within four core analytical areas applicable to the Humanities: networks, text, geospatial data, and images. This book is also designed to be a bridge: between quantitative and qualitative methods, individual and collaborative work, and the humanities and social scientists. Exploring Humanities Data Types with R does not presuppose background programming experience. Early chapters take readers from R set-up to exploratory data analysis (continuous and categorical data, multivariate analysis, and advanced graphics with emphasis on aesthetics and facility). Everything is hands-on: networks are explained using U.S. Supreme Court opinions, and low-level NLP methods are applied to short stories by Sir Arthur Conan Doyle. The book’s data, code, appendix with 100 basic programming exercises and solutions, and dedicated website are valuable resources for readers. The methodology will have wide application in classrooms and self-study for the humanities, but also for use...

  10. Social network analysis

    NARCIS (Netherlands)

    de Nooy, W.; Crothers, C.

    2009-01-01

    Social network analysis (SNA) focuses on the structure of ties within a set of social actors, e.g., persons, groups, organizations, and nations, or the products of human activity or cognition such as web sites, semantic concepts, and so on. It is linked to structuralism in sociology stressing the

  11. Network performance analysis

    CERN Document Server

    Bonald, Thomas

    2013-01-01

    The book presents some key mathematical tools for the performance analysis of communication networks and computer systems.Communication networks and computer systems have become extremely complex. The statistical resource sharing induced by the random behavior of users and the underlying protocols and algorithms may affect Quality of Service.This book introduces the main results of queuing theory that are useful for analyzing the performance of these systems. These mathematical tools are key to the development of robust dimensioning rules and engineering methods. A number of examples i

  12. Network systems security analysis

    Science.gov (United States)

    Yilmaz, Ä.°smail

    2015-05-01

    Network Systems Security Analysis has utmost importance in today's world. Many companies, like banks which give priority to data management, test their own data security systems with "Penetration Tests" by time to time. In this context, companies must also test their own network/server systems and take precautions, as the data security draws attention. Based on this idea, the study cyber-attacks are researched throughoutly and Penetration Test technics are examined. With these information on, classification is made for the cyber-attacks and later network systems' security is tested systematically. After the testing period, all data is reported and filed for future reference. Consequently, it is found out that human beings are the weakest circle of the chain and simple mistakes may unintentionally cause huge problems. Thus, it is clear that some precautions must be taken to avoid such threats like updating the security software.

  13. Analysis of computer networks

    CERN Document Server

    Gebali, Fayez

    2015-01-01

    This textbook presents the mathematical theory and techniques necessary for analyzing and modeling high-performance global networks, such as the Internet. The three main building blocks of high-performance networks are links, switching equipment connecting the links together, and software employed at the end nodes and intermediate switches. This book provides the basic techniques for modeling and analyzing these last two components. Topics covered include, but are not limited to: Markov chains and queuing analysis, traffic modeling, interconnection networks and switch architectures and buffering strategies.   ·         Provides techniques for modeling and analysis of network software and switching equipment; ·         Discusses design options used to build efficient switching equipment; ·         Includes many worked examples of the application of discrete-time Markov chains to communication systems; ·         Covers the mathematical theory and techniques necessary for ana...

  14. Estimation of Morphological Tables Using Text Analysis Results

    Directory of Open Access Journals (Sweden)

    Illia Savchenko

    2016-08-01

    Full Text Available This paper proposes methods for obtaining input data, necessary for the modified morphological analysis method, from the text sources of data using text analysis tools. Several methods are described that are suitable for calculating initial estimates of alternatives and cross-consistency matrix values based on processing text fragments by rule-based categorization and sentiment analysis tools. A practical implementation of this tool set for assessing statements in news regarding Ukraine is considered.

  15. Character-level Convolutional Network for Text Classification Applied to Chinese Corpus

    OpenAIRE

    Huang, Weijie; Wang, Jun

    2016-01-01

    This article provides an interesting exploration of character-level convolutional neural network solving Chinese corpus text classification problem. We constructed a large-scale Chinese language dataset, and the result shows that character-level convolutional neural network works better on Chinese corpus than its corresponding pinyin format dataset. This is the first time that character-level convolutional neural network applied to text classification problem.

  16. Review Essay: Does Qualitative Network Analysis Exist?

    Directory of Open Access Journals (Sweden)

    Rainer Diaz-Bone

    2007-01-01

    Full Text Available Social network analysis was formed and established in the 1970s as a way of analyzing systems of social relations. In this review the theoretical-methodological standpoint of social network analysis ("structural analysis" is introduced and the different forms of social network analysis are presented. Structural analysis argues that social actors and social relations are embedded in social networks, meaning that action and perception of actors as well as the performance of social relations are influenced by the network structure. Since the 1990s structural analysis has integrated concepts such as agency, discourse and symbolic orientation and in this way structural analysis has opened itself. Since then there has been increasing use of qualitative methods in network analysis. They are used to include the perspective of the analyzed actors, to explore networks, and to understand network dynamics. In the reviewed book, edited by Betina HOLLSTEIN and Florian STRAUS, the twenty predominantly empirically orientated contributions demonstrate the possibilities of combining quantitative and qualitative methods in network analyses in different research fields. In this review we examine how the contributions succeed in applying and developing the structural analysis perspective, and the self-positioning of "qualitative network analysis" is evaluated. URN: urn:nbn:de:0114-fqs0701287

  17. A Survey of Neural Network Techniques for Feature Extraction from Text

    OpenAIRE

    John, Vineet

    2017-01-01

    This paper aims to catalyze the discussions about text feature extraction techniques using neural network architectures. The research questions discussed in the paper focus on the state-of-the-art neural network techniques that have proven to be useful tools for language processing, language generation, text classification and other computational linguistics tasks.

  18. Text-mining analysis of mHealth research.

    Science.gov (United States)

    Ozaydin, Bunyamin; Zengul, Ferhat; Oner, Nurettin; Delen, Dursun

    2017-01-01

    In recent years, because of the advancements in communication and networking technologies, mobile technologies have been developing at an unprecedented rate. mHealth, the use of mobile technologies in medicine, and the related research has also surged parallel to these technological advancements. Although there have been several attempts to review mHealth research through manual processes such as systematic reviews, the sheer magnitude of the number of studies published in recent years makes this task very challenging. The most recent developments in machine learning and text mining offer some potential solutions to address this challenge by allowing analyses of large volumes of texts through semi-automated processes. The objective of this study is to analyze the evolution of mHealth research by utilizing text-mining and natural language processing (NLP) analyses. The study sample included abstracts of 5,644 mHealth research articles, which were gathered from five academic search engines by using search terms such as mobile health, and mHealth. The analysis used the Text Explorer module of JMP Pro 13 and an iterative semi-automated process involving tokenizing, phrasing, and terming. After developing the document term matrix (DTM) analyses such as single value decomposition (SVD), topic, and hierarchical document clustering were performed, along with the topic-informed document clustering approach. The results were presented in the form of word-clouds and trend analyses. There were several major findings regarding research clusters and trends. First, our results confirmed time-dependent nature of terminology use in mHealth research. For example, in earlier versus recent years the use of terminology changed from "mobile phone" to "smartphone" and from "applications" to "apps". Second, ten clusters for mHealth research were identified including (I) Clinical Research on Lifestyle Management, (II) Community Health, (III) Literature Review, (IV) Medical Interventions

  19. Systematic text condensation: a strategy for qualitative analysis.

    Science.gov (United States)

    Malterud, Kirsti

    2012-12-01

    To present background, principles, and procedures for a strategy for qualitative analysis called systematic text condensation and discuss this approach compared with related strategies. Giorgi's psychological phenomenological analysis is the point of departure and inspiration for systematic text condensation. The basic elements of Giorgi's method and the elaboration of these in systematic text condensation are presented, followed by a detailed description of procedures for analysis according to systematic text condensation. Finally, similarities and differences compared with other frequently applied methods for qualitative analysis are identified, as the foundation of a discussion of strengths and limitations of systematic text condensation. Systematic text condensation is a descriptive and explorative method for thematic cross-case analysis of different types of qualitative data, such as interview studies, observational studies, and analysis of written texts. The method represents a pragmatic approach, although inspired by phenomenological ideas, and various theoretical frameworks can be applied. The procedure consists of the following steps: 1) total impression - from chaos to themes; 2) identifying and sorting meaning units - from themes to codes; 3) condensation - from code to meaning; 4) synthesizing - from condensation to descriptions and concepts. Similarities and differences comparing systematic text condensation with other frequently applied qualitative methods regarding thematic analysis, theoretical methodological framework, analysis procedures, and taxonomy are discussed. Systematic text condensation is a strategy for analysis developed from traditions shared by most of the methods for analysis of qualitative data. The method offers the novice researcher a process of intersubjectivity, reflexivity, and feasibility, while maintaining a responsible level of methodological rigour.

  20. Text Authorship Identified Using the Dynamics of Word Co-Occurrence Networks

    Science.gov (United States)

    Akimushkin, Camilo; Amancio, Diego Raphael; Oliveira, Osvaldo Novais

    2017-01-01

    Automatic identification of authorship in disputed documents has benefited from complex network theory as this approach does not require human expertise or detailed semantic knowledge. Networks modeling entire books can be used to discriminate texts from different sources and understand network growth mechanisms, but only a few studies have probed the suitability of networks in modeling small chunks of text to grasp stylistic features. In this study, we introduce a methodology based on the dynamics of word co-occurrence networks representing written texts to classify a corpus of 80 texts by 8 authors. The texts were divided into sections with equal number of linguistic tokens, from which time series were created for 12 topological metrics. Since 73% of all series were stationary (ARIMA(p, 0, q)) and the remaining were integrable of first order (ARIMA(p, 1, q)), probability distributions could be obtained for the global network metrics. The metrics exhibit bell-shaped non-Gaussian distributions, and therefore distribution moments were used as learning attributes. With an optimized supervised learning procedure based on a nonlinear transformation performed by Isomap, 71 out of 80 texts were correctly classified using the K-nearest neighbors algorithm, i.e. a remarkable 88.75% author matching success rate was achieved. Hence, purely dynamic fluctuations in network metrics can characterize authorship, thus paving the way for a robust description of large texts in terms of small evolving networks. PMID:28125703

  1. Text analysis with R for students of literature

    CERN Document Server

    Jockers, Matthew L

    2014-01-01

    Text Analysis with R for Students of Literature is written with students and scholars of literature in mind but will be applicable to other humanists and social scientists wishing to extend their methodological tool kit to include quantitative and computational approaches to the study of text. Computation provides access to information in text that we simply cannot gather using traditional qualitative methods of close reading and human synthesis. Text Analysis with R for Students of Literature provides a practical introduction to computational text analysis using the open source programming language R. R is extremely popular throughout the sciences and because of its accessibility, R is now used increasingly in other research areas. Readers begin working with text right away and each chapter works through a new technique or process such that readers gain a broad exposure to core R procedures and a basic understanding of the possibilities of computational text analysis at both the micro and macro scale. Each c...

  2. Text Analysis of Chemistry Thesis and Dissertation Titles

    Science.gov (United States)

    Scalfani, Vincent F.

    2017-01-01

    Programmatic text analysis can be used to understand patterns and reveal trends in data that would otherwise be difficult or impossible to uncover with manual coding methods. This work uses programmatic text analysis, specifically term frequency counts, to study nearly 10,000 chemistry thesis and dissertation titles from 1911-2015. The thesis and…

  3. Analysis Of Aspects Of Messages Hiding In Text Environments

    Directory of Open Access Journals (Sweden)

    Afanasyeva Olesya

    2015-09-01

    Full Text Available In the work are researched problems, which arise during hiding of messages in text environments, being transmitted by electronic communication channels and the Internet. The analysis of selection of places in text environment (TE, which can be replaced by word from the message is performed. Selection and replacement of words in the text environment is implemented basing on semantic analysis of text fragment, consisting of the inserted word, and its environment in TE. For implementation of such analysis is used concept of semantic parameters of words coordination and semantic value of separate word. Are used well-known methods of determination of values of these parameters. This allows moving from quality level to quantitative level analysis of text fragments semantics during their modification by word substitution. Invisibility of embedded messages is ensured by providing preset values of the semantic cooperation parameter deviations.

  4. Considerations on a methodological framework for the analysis of texts

    Directory of Open Access Journals (Sweden)

    David Andrés Camargo Mayorga

    2017-03-01

    Full Text Available This article presents a review of relevant literature for the construction of a methodological framework for the analysis of texts in applied social sciences, such as economics, which we have supported in the main hermeneutical approaches from philosophy, linguistics and social sciences. In essence, they assume that every discourse carries meaning - be it truthful or not - and that they express complex social relations. Thus, any analysis of content happens finally to be a certain type of hermeneutics (interpretation, while trying to account for multiple phenomena immersed in the production, application, use and reproduction of knowledge within the text. When applying discourse analysis in teaching texts in economic sciences, we find traces of legalistic, political, ethnocentric tendencies, among other discourses hidden from the text. For this reason, the analysis of the internal discourse of the text allows us to delve inside the state ideology and its underlying or latent discourses.

  5. A comparative analysis of cohesion in academic and newspaper texts

    African Journals Online (AJOL)

    This article presents findings on a comparative analysis of cohesion in academic and newspaper texts on road traffic accidents. Cohesive devices are the surface structure features that link different parts of a text and make it flow logically. They are the necessary reins that hold the clauses of a text together. Coherence, on ...

  6. Social network analysis and supply chain management

    Directory of Open Access Journals (Sweden)

    Raúl Rodríguez Rodríguez

    2016-01-01

    Full Text Available This paper deals with social network analysis and how it could be integrated within supply chain management from a decision-making point of view. Even though the benefits of using social analysis have are widely accepted at both academic and industry/services context, there is still a lack of solid frameworks that allow decision-makers to connect the usage and obtained results of social network analysis – mainly both information and knowledge flows and derived results- with supply chain management objectives and goals. This paper gives an overview of social network analysis, the main social network analysis metrics, supply chain performance and, finally, it identifies how future frameworks could close the gap and link the results of social network analysis with the supply chain management decision-making processes.

  7. Tools for Texts Monitoring and Analysis Aimed at the Field of Social Disasters, Catastrophes, and Terrorism

    Directory of Open Access Journals (Sweden)

    Svetlana Cojocaru

    2016-08-01

    Full Text Available Throughout its life mankind faces various disasters and catastrophes: natural, technogenic, social. One of the important sources of information for these situations is the huge volume of unstructured data available in the global information networks. In this study, we describe a tool set that includes methods for extracting relevant texts from the networks, their classification and analysis. Two stages are described: preparatory and processing. The first one deals with patterns (texts and keywords creation, during the second phase news texts are processed using database and controlled vocabulary.

  8. Multidimensional Analysis of Linguistic Networks

    Science.gov (United States)

    Araújo, Tanya; Banisch, Sven

    Network-based approaches play an increasingly important role in the analysis of data even in systems in which a network representation is not immediately apparent. This is particularly true for linguistic networks, which use to be induced from a linguistic data set for which a network perspective is only one out of several options for representation. Here we introduce a multidimensional framework for network construction and analysis with special focus on linguistic networks. Such a framework is used to show that the higher is the abstraction level of network induction, the harder is the interpretation of the topological indicators used in network analysis. Several examples are provided allowing for the comparison of different linguistic networks as well as to networks in other fields of application of network theory. The computation and the intelligibility of some statistical indicators frequently used in linguistic networks are discussed. It suggests that the field of linguistic networks, by applying statistical tools inspired by network studies in other domains, may, in its current state, have only a limited contribution to the development of linguistic theory.

  9. Analysis of neural networks

    CERN Document Server

    Heiden, Uwe

    1980-01-01

    The purpose of this work is a unified and general treatment of activity in neural networks from a mathematical pOint of view. Possible applications of the theory presented are indica­ ted throughout the text. However, they are not explored in de­ tail for two reasons : first, the universal character of n- ral activity in nearly all animals requires some type of a general approach~ secondly, the mathematical perspicuity would suffer if too many experimental details and empirical peculiarities were interspersed among the mathematical investigation. A guide to many applications is supplied by the references concerning a variety of specific issues. Of course the theory does not aim at covering all individual problems. Moreover there are other approaches to neural network theory (see e.g. Poggio-Torre, 1978) based on the different lev­ els at which the nervous system may be viewed. The theory is a deterministic one reflecting the average be­ havior of neurons or neuron pools. In this respect the essay is writt...

  10. Interactive Visual Analysis of High Throughput Text Streams

    Energy Technology Data Exchange (ETDEWEB)

    Steed, Chad A [ORNL; Potok, Thomas E [ORNL; Patton, Robert M [ORNL; Goodall, John R [ORNL; Maness, Christopher S [ORNL; Senter, James K [ORNL; Potok, Thomas E [ORNL

    2012-01-01

    The scale, velocity, and dynamic nature of large scale social media systems like Twitter demand a new set of visual analytics techniques that support near real-time situational awareness. Social media systems are credited with escalating social protest during recent large scale riots. Virtual communities form rapidly in these online systems, and they occasionally foster violence and unrest which is conveyed in the users language. Techniques for analyzing broad trends over these networks or reconstructing conversations within small groups have been demonstrated in recent years, but state-of- the-art tools are inadequate at supporting near real-time analysis of these high throughput streams of unstructured information. In this paper, we present an adaptive system to discover and interactively explore these virtual networks, as well as detect sentiment, highlight change, and discover spatio- temporal patterns.

  11. TEXTS SENTIMENT-ANALYSIS APPLICATION FOR PUBLIC OPINION ASSESSMENT

    Directory of Open Access Journals (Sweden)

    I. A. Bessmertny

    2015-01-01

    Full Text Available The paper describes an approach to the emotional tonality assessment of natural language texts based on special dictionaries. A method for an automatic assessment of public opinion by means of sentiment-analysis of reviews and discussions followed by published Web-documents is proposed. The method is based on statistics of words in the documents. A pilot model of the software system implementing the sentiment-analysis of natural language text in Russian based on a linear assessment scale is developed. A syntactic analysis and words lemmatization are used to identify terms more correctly. Tonality dictionaries are presented in editable format and are open for enhancing. The program system implementing a sentiment-analysis of the Russian texts based on open dictionaries of tonality is presented for the first time.

  12. Gender Analysis On Islamic Texts: A Study On Its Accuracy

    Directory of Open Access Journals (Sweden)

    Muchammad Ichsan

    2014-06-01

    Full Text Available Gender equality movement is spreading all over the world, including in Indonesia where Muslim gender activists have made hard efforts to ensure gender fairness and equality among people. One of their efforts is emphasizing the urgency of reinterpreting Islamic texts. They insist on the reinterpretation of Islamic texts based on gender perspective and analysis due to the existence of many Islamic texts that trespass the principles of gender equality and fairness they have been fighting for. This paper aims at assuring and examining the accuracy of using gender perspective as a tool for analyzing the Islamic text. It is found that using gender perspective and analysis for reinterpreting Islamic texts is not in line with the Islamic principles and will only produce laws and points of views which deviate from Islamic teachings. To reach the goals of this study, a descriptive-analytical approach is employed.

  13. Effective Use of Word Order for Text Categorization with Convolutional Neural Networks

    OpenAIRE

    Johnson, Rie; Zhang, Tong

    2014-01-01

    Convolutional neural network (CNN) is a neural network that can make use of the internal structure of data such as the 2D structure of image data. This paper studies CNN on text categorization to exploit the 1D structure (namely, word order) of text data for accurate prediction. Instead of using low-dimensional word vectors as input as is often done, we directly apply CNN to high-dimensional text data, which leads to directly learning embedding of small text regions for use in classification....

  14. Gender Analysis On Islamic Texts: A Study On Its Accuracy

    OpenAIRE

    Muchammad Ichsan

    2014-01-01

    Gender equality movement is spreading all over the world, including in Indonesia where Muslim gender activists have made hard efforts to ensure gender fairness and equality among people. One of their efforts is emphasizing the urgency of reinterpreting Islamic texts. They insist on the reinterpretation of Islamic texts based on gender perspective and analysis due to the existence of many Islamic texts that trespass the principles of gender equality and fairness they have been fighting for. Th...

  15. Models of network reliability analysis, combinatorics, and Monte Carlo

    CERN Document Server

    Gertsbakh, Ilya B

    2009-01-01

    Unique in its approach, Models of Network Reliability: Analysis, Combinatorics, and Monte Carlo provides a brief introduction to Monte Carlo methods along with a concise exposition of reliability theory ideas. From there, the text investigates a collection of principal network reliability models, such as terminal connectivity for networks with unreliable edges and/or nodes, network lifetime distribution in the process of its destruction, network stationary behavior for renewable components, importance measures of network elements, reliability gradient, and network optimal reliability synthesis

  16. Network Analysis, Architecture, and Design

    CERN Document Server

    McCabe, James D

    2007-01-01

    Traditionally, networking has had little or no basis in analysis or architectural development, with designers relying on technologies they are most familiar with or being influenced by vendors or consultants. However, the landscape of networking has changed so that network services have now become one of the most important factors to the success of many third generation networks. It has become an important feature of the designer's job to define the problems that exist in his network, choose and analyze several optimization parameters during the analysis process, and then prioritize and evalua

  17. Profiling School Shooters: Automatic Text-Based Analysis

    Directory of Open Access Journals (Sweden)

    Yair eNeuman

    2015-06-01

    Full Text Available School shooters present a challenge to both forensic psychiatry and law enforcement agencies. The relatively small number of school shooters, their various charateristics, and the lack of in-depth analysis of all of the shooters prior to the shooting add complexity to our understanding of this problem. In this short paper, we introduce a new methodology for automatically profiling school shooters. The methodology involves automatic analysis of texts and the production of several measures relevant for the identification of the shooters. Comparing texts written by six school shooters to 6056 texts written by a comparison group of male subjects, we found that the shooters' texts scored significantly higher on the Narcissistic Personality dimension as well as on the Humilated and Revengeful dimensions. Using a ranking/priorization procedure, similar to the one used for the automatic identification of sexual predators, we provide support for the validity and relevance of the proposed methodology.

  18. Scene Text Detection and Segmentation based on Cascaded Convolution Neural Networks.

    Science.gov (United States)

    Tang, Youbao; Wu, Xiangqian

    2017-01-20

    Scene text detection and segmentation are two important and challenging research problems in the field of computer vision. This paper proposes a novel method for scene text detection and segmentation based on cascaded convolution neural networks (CNNs). In this method, a CNN based text-aware candidate text region (CTR) extraction model (named detection network, DNet) is designed and trained using both the edges and the whole regions of text, with which coarse CTRs are detected. A CNN based CTR refinement model (named segmentation network, SNet) is then constructed to precisely segment the coarse CTRs into text to get the refined CTRs. With DNet and SNet, much fewer CTRs are extracted than with traditional approaches while more true text regions are kept. The refined CTRs are finally classified using a CNN based CTR classification model (named classification network, CNet) to get the final text regions. All of these CNN based models are modified from VGGNet-16. Extensive experiments on three benchmark datasets demonstrate that the proposed method achieves state-of-the-art performance and greatly outperforms other scene text detection and segmentation approaches.

  19. Network topology analysis.

    Energy Technology Data Exchange (ETDEWEB)

    Kalb, Jeffrey L.; Lee, David S.

    2008-01-01

    Emerging high-bandwidth, low-latency network technology has made network-based architectures both feasible and potentially desirable for use in satellite payload architectures. The selection of network topology is a critical component when developing these multi-node or multi-point architectures. This study examines network topologies and their effect on overall network performance. Numerous topologies were reviewed against a number of performance, reliability, and cost metrics. This document identifies a handful of good network topologies for satellite applications and the metrics used to justify them as such. Since often multiple topologies will meet the requirements of the satellite payload architecture under development, the choice of network topology is not easy, and in the end the choice of topology is influenced by both the design characteristics and requirements of the overall system and the experience of the developer.

  20. Weighted Complex Network Analysis of Pakistan Highways

    Directory of Open Access Journals (Sweden)

    Yasir Tariq Mohmand

    2013-01-01

    Full Text Available The structure and properties of public transportation networks have great implications in urban planning, public policies, and infectious disease control. This study contributes a weighted complex network analysis of travel routes on the national highway network of Pakistan. The network is responsible for handling 75 percent of the road traffic yet is largely inadequate, poor, and unreliable. The highway network displays small world properties and is assortative in nature. Based on the betweenness centrality of the nodes, the most important cities are identified as this could help in identifying the potential congestion points in the network. Keeping in view the strategic location of Pakistan, such a study is of practical importance and could provide opportunities for policy makers to improve the performance of the highway network.

  1. Large-scale Multi-label Text Classification - Revisiting Neural Networks

    OpenAIRE

    Nam, Jinseok; Kim, Jungi; Mencía, Eneldo Loza; Gurevych, Iryna; Fürnkranz, Johannes

    2013-01-01

    Neural networks have recently been proposed for multi-label classification because they are able to capture and model label dependencies in the output layer. In this work, we investigate limitations of BP-MLL, a neural network (NN) architecture that aims at minimizing pairwise ranking error. Instead, we propose to use a comparably simple NN approach with recently proposed learning techniques for large-scale multi-label text classification tasks. In particular, we show that BP-MLL's ranking lo...

  2. Recurrent Neural Network for Text Classification with Multi-Task Learning

    OpenAIRE

    Liu, Pengfei; Qiu, Xipeng; Huang, Xuanjing

    2016-01-01

    Neural network based methods have obtained great progress on a variety of natural language processing tasks. However, in most previous works, the models are learned based on single-task supervised objectives, which often suffer from insufficient training data. In this paper, we use the multi-task learning framework to jointly learn across multiple related tasks. Based on recurrent neural network, we propose three different mechanisms of sharing information to model text with task-specific and...

  3. Sentiment analysis of Arabic tweets using text mining techniques

    Science.gov (United States)

    Al-Horaibi, Lamia; Khan, Muhammad Badruddin

    2016-07-01

    Sentiment analysis has become a flourishing field of text mining and natural language processing. Sentiment analysis aims to determine whether the text is written to express positive, negative, or neutral emotions about a certain domain. Most sentiment analysis researchers focus on English texts, with very limited resources available for other complex languages, such as Arabic. In this study, the target was to develop an initial model that performs satisfactorily and measures Arabic Twitter sentiment by using machine learning approach, Naïve Bayes and Decision Tree for classification algorithms. The datasets used contains more than 2,000 Arabic tweets collected from Twitter. We performed several experiments to check the performance of the two algorithms classifiers using different combinations of text-processing functions. We found that available facilities for Arabic text processing need to be made from scratch or improved to develop accurate classifiers. The small functionalities developed by us in a Python language environment helped improve the results and proved that sentiment analysis in the Arabic domain needs lot of work on the lexicon side.

  4. Inferring Group Processes from Computer-Mediated Affective Text Analysis

    Energy Technology Data Exchange (ETDEWEB)

    Schryver, Jack C [ORNL; Begoli, Edmon [ORNL; Jose, Ajith [Missouri University of Science and Technology; Griffin, Christopher [Pennsylvania State University

    2011-02-01

    Political communications in the form of unstructured text convey rich connotative meaning that can reveal underlying group social processes. Previous research has focused on sentiment analysis at the document level, but we extend this analysis to sub-document levels through a detailed analysis of affective relationships between entities extracted from a document. Instead of pure sentiment analysis, which is just positive or negative, we explore nuances of affective meaning in 22 affect categories. Our affect propagation algorithm automatically calculates and displays extracted affective relationships among entities in graphical form in our prototype (TEAMSTER), starting with seed lists of affect terms. Several useful metrics are defined to infer underlying group processes by aggregating affective relationships discovered in a text. Our approach has been validated with annotated documents from the MPQA corpus, achieving a performance gain of 74% over comparable random guessers.

  5. A Novel Text Clustering Approach Using Deep-Learning Vocabulary Network

    Directory of Open Access Journals (Sweden)

    Junkai Yi

    2017-01-01

    Full Text Available Text clustering is an effective approach to collect and organize text documents into meaningful groups for mining valuable information on the Internet. However, there exist some issues to tackle such as feature extraction and data dimension reduction. To overcome these problems, we present a novel approach named deep-learning vocabulary network. The vocabulary network is constructed based on related-word set, which contains the “cooccurrence” relations of words or terms. We replace term frequency in feature vectors with the “importance” of words in terms of vocabulary network and PageRank, which can generate more precise feature vectors to represent the meaning of text clustering. Furthermore, sparse-group deep belief network is proposed to reduce the dimensionality of feature vectors, and we introduce coverage rate for similarity measure in Single-Pass clustering. To verify the effectiveness of our work, we compare the approach to the representative algorithms, and experimental results show that feature vectors in terms of deep-learning vocabulary network have better clustering performance.

  6. Computational text analysis and reading comprehension exam complexity towards automatic text classification

    CERN Document Server

    Liontou, Trisevgeni

    2014-01-01

    This book delineates a range of linguistic features that characterise the reading texts used at the B2 (Independent User) and C1 (Proficient User) levels of the Greek State Certificate of English Language Proficiency exams in order to help define text difficulty per level of competence. In addition, it examines whether specific reader variables influence test takers' perceptions of reading comprehension difficulty. The end product is a Text Classification Profile per level of competence and a formula for automatically estimating text difficulty and assigning levels to texts consistently and re

  7. Applications of computer-aided text analysis in natural resources.

    Science.gov (United States)

    David N. Bengston

    2000-01-01

    Ten contributed papers describe the use of a variety of approaches to computer-aided text analysis and their application to a wide range of research questions related to natural resources and the environment. Taken together, these papers paint a picture of a growing and vital area of research on the human dimensions of natural resource management.

  8. A Network of Themes: A Qualitative Approach to Gerhard Richter's Text

    Directory of Open Access Journals (Sweden)

    Narvika Bovcon

    2017-07-01

    Full Text Available Gerhard Richter's books Text – a collection of painter's verbal statements about his artistic method – and Atlas – 783 sheets with images, mainly photographs and visual notations – are two archives that complement the understanding of his diverse artistic practice. The paper presents a textual model that experimentally simulates a possible ordering principle for archives. Richter's statements in the book Text are cut up and used as short quotations. Those that relate to multiple aspects of the painter's oeuvre are identified as hubs in the semantic network. The hubs are organized paratactically, as an array of different themes. The paper presents a methodological hypothesis and an experimental model that aim to connect the research of real networks with the paradigms of humanistic interpretation. We have to bear in mind that the network is a result of the researcher's interpretative approach, which is added to the initial archive included in the book Text. The breaking up of Richter's poetics into atoms of quotations is an experimental proposal of a new textuality in art history and humanities, which has its own history. In comparison to digital archives with complex interfaces that often tend to obscure the content, the elements in our experiment appear as specific configurations of the semantic network and are presented in a limited number of linear texts. The method of listing of quotations gathers the fragments into a potential “whole”, i.e. a narrativized gateway to an archive according to the researcher's interpretation.

  9. Text mining factor analysis (TFA) in green tea patent data

    Science.gov (United States)

    Rahmawati, Sela; Suprijadi, Jadi; Zulhanif

    2017-03-01

    Factor analysis has become one of the most widely used multivariate statistical procedures in applied research endeavors across a multitude of domains. There are two main types of analyses based on factor analysis: Exploratory Factor Analysis (EFA) and Confirmatory Factor Analysis (CFA). Both EFA and CFA aim to observed relationships among a group of indicators with a latent variable, but they differ fundamentally, a priori and restrictions made to the factor model. This method will be applied to patent data technology sector green tea to determine the development technology of green tea in the world. Patent analysis is useful in identifying the future technological trends in a specific field of technology. Database patent are obtained from agency European Patent Organization (EPO). In this paper, CFA model will be applied to the nominal data, which obtain from the presence absence matrix. While doing processing, analysis CFA for nominal data analysis was based on Tetrachoric matrix. Meanwhile, EFA model will be applied on a title from sector technology dominant. Title will be pre-processing first using text mining analysis.

  10. Introduction to Social Network Analysis

    Science.gov (United States)

    Zaphiris, Panayiotis; Ang, Chee Siang

    Social Network analysis focuses on patterns of relations between and among people, organizations, states, etc. It aims to describe networks of relations as fully as possible, identify prominent patterns in such networks, trace the flow of information through them, and discover what effects these relations and networks have on people and organizations. Social network analysis offers a very promising potential for analyzing human-human interactions in online communities (discussion boards, newsgroups, virtual organizations). This Tutorial provides an overview of this analytic technique and demonstrates how it can be used in Human Computer Interaction (HCI) research and practice, focusing especially on Computer Mediated Communication (CMC). This topic acquires particular importance these days, with the increasing popularity of social networking websites (e.g., youtube, myspace, MMORPGs etc.) and the research interest in studying them.

  11. Establishing Reliable miRNA-Cancer Association Network Based on Text-Mining Method

    Directory of Open Access Journals (Sweden)

    Lun Li

    2014-01-01

    Full Text Available Associating microRNAs (miRNAs with cancers is an important step of understanding the mechanisms of cancer pathogenesis and finding novel biomarkers for cancer therapies. In this study, we constructed a miRNA-cancer association network (miCancerna based on more than 1,000 miRNA-cancer associations detected from millions of abstracts with the text-mining method, including 226 miRNA families and 20 common cancers. We further prioritized cancer-related miRNAs at the network level with the random-walk algorithm, achieving a relatively higher performance than previous miRNA disease networks. Finally, we examined the top 5 candidate miRNAs for each kind of cancer and found that 71% of them are confirmed experimentally. miCancerna would be an alternative resource for the cancer-related miRNA identification.

  12. Adapting computational text analysis to social science (and vice versa

    Directory of Open Access Journals (Sweden)

    Paul DiMaggio

    2015-11-01

    Full Text Available Social scientists and computer scientist are divided by small differences in perspective and not by any significant disciplinary divide. In the field of text analysis, several such differences are noted: social scientists often use unsupervised models to explore corpora, whereas many computer scientists employ supervised models to train data; social scientists hold to more conventional causal notions than do most computer scientists, and often favor intense exploitation of existing algorithms, whereas computer scientists focus more on developing new models; and computer scientists tend to trust human judgment more than social scientists do. These differences have implications that potentially can improve the practice of social science.

  13. Complex Network Analysis of Guangzhou Metro

    Directory of Open Access Journals (Sweden)

    Yasir Tariq Mohmand

    2015-11-01

    Full Text Available The structure and properties of public transportation networks can provide suggestions for urban planning and public policies. This study contributes a complex network analysis of the Guangzhou metro. The metro network has 236 kilometers of track and is the 6th busiest metro system of the world. In this paper topological properties of the network are explored. We observed that the network displays small world properties and is assortative in nature. The network possesses a high average degree of 17.5 with a small diameter of 5. Furthermore, we also identified the most important metro stations based on betweenness and closeness centralities. These could help in identifying the probable congestion points in the metro system and provide policy makers with an opportunity to improve the performance of the metro system.

  14. Extending Stochastic Network Calculus to Loss Analysis

    Directory of Open Access Journals (Sweden)

    Chao Luo

    2013-01-01

    Full Text Available Loss is an important parameter of Quality of Service (QoS. Though stochastic network calculus is a very useful tool for performance evaluation of computer networks, existing studies on stochastic service guarantees mainly focused on the delay and backlog. Some efforts have been made to analyse loss by deterministic network calculus, but there are few results to extend stochastic network calculus for loss analysis. In this paper, we introduce a new parameter named loss factor into stochastic network calculus and then derive the loss bound through the existing arrival curve and service curve via this parameter. We then prove that our result is suitable for the networks with multiple input flows. Simulations show the impact of buffer size, arrival traffic, and service on the loss factor.

  15. Network and Ensemble Enabled Entity Extraction in Informal Text (NEEEEIT) final report

    Energy Technology Data Exchange (ETDEWEB)

    Kegelmeyer, Philip W. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Shead, Timothy M. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Dunlavy, Daniel M. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2013-09-01

    This SAND report summarizes the activities and outcomes of the Network and Ensemble Enabled Entity Extraction in Information Text (NEEEEIT) LDRD project, which addressed improving the accuracy of conditional random fields for named entity recognition through the use of ensemble methods.

  16. [Psychophysiological analysis of the reading and text understanding].

    Science.gov (United States)

    Lamminpiya, A M; Zaschirinskaia, O V; Shelepin, Yu E

    2015-01-01

    Presented cognitive studies aimed to identifying the individual properties of macro saccades, one of the most important oculomotor functions during text, the fairy tales reading. We measure, in the form of abstracts, the reduced analogue of the "school essays", the capabilities of our subjects, the students of liberal arts colleges, to understand the presented text (morality of tales). Evaluation of this abstracts was conducted by independent experts using school 6 point scales. The preparing of the abstract wasn't limited in time. We found that there is not any relationship between reading speed and the quality of the interpretation of the text. No relationship of understanding the hidden morality with the number of characters being picked for the fixation and the mean duration of the macro saccades. Correlation analysis showed an inverse relationship between the number of returns and the understanding of the text, more macro saccades returns--the worse was the understanding of the text. There is an inverse relationship between the number of exciting characters and a number of macro saccades. Number of fixations (capture) increases the reading of the text. This means that the bandwidth of visual channel per time unit is determined by the number of captured characters. Less number of captured during fixation of signs--more time reading and less bandwidth of the eyes per time unit.

  17. Practical text mining and statistical analysis for non-structured text data applications

    CERN Document Server

    Miner, Gary; Hill, Thomas; Nisbet, Robert; Delen, Dursun

    2012-01-01

    The world contains an unimaginably vast amount of digital information which is getting ever vaster ever more rapidly. This makes it possible to do many things that previously could not be done: spot business trends, prevent diseases, combat crime and so on. Managed well, the textual data can be used to unlock new sources of economic value, provide fresh insights into science and hold governments to account. As the Internet expands and our natural capacity to process the unstructured text that it contains diminishes, the value of text mining for information retrieval and search will increase d

  18. Named Entity Recognition in Chinese Clinical Text Using Deep Neural Network

    Science.gov (United States)

    Wu, Yonghui; Jiang, Min; Lei, Jianbo; Xu, Hua

    2015-01-01

    Rapid growth in electronic health records (EHRs) use has led to an unprecedented expansion of available clinical data in electronic formats. However, much of the important healthcare information is locked in the narrative documents. Therefore Natural Language Processing (NLP) technologies, e.g., Named Entity Recognition that identifies boundaries and types of entities, have been extensively studied to unlock important clinical information in free text. In this study, we investigated a novel deep learning method to recognize clinical entities in Chinese clinical documents using the minimal feature engineering approach. We developed a deep neural network (DNN) to generate word embeddings from a large unlabeled corpus through unsupervised learning and another DNN for the NER task. The experiment results showed that the DNN with word embeddings trained from the large unlabeled corpus outperformed the state-of-the-art CRF’s model in the minimal feature engineering setting, achieving the highest F1-score of 0.9280. Further analysis showed that word embeddings derived through unsupervised learning from large unlabeled corpus remarkably improved the DNN with randomized embedding, denoting the usefulness of unsupervised feature learning. PMID:26262126

  19. PageRank without hyperlinks: Reranking with PubMed related article networks for biomedical text retrieval

    Directory of Open Access Journals (Sweden)

    Lin Jimmy

    2008-06-01

    Full Text Available Abstract Background Graph analysis algorithms such as PageRank and HITS have been successful in Web environments because they are able to extract important inter-document relationships from manually-created hyperlinks. We consider the application of these techniques to biomedical text retrieval. In the current PubMed® search interface, a MEDLINE® citation is connected to a number of related citations, which are in turn connected to other citations. Thus, a MEDLINE record represents a node in a vast content-similarity network. This article explores the hypothesis that these networks can be exploited for text retrieval, in the same manner as hyperlink graphs on the Web. Results We conducted a number of reranking experiments using the TREC 2005 genomics track test collection in which scores extracted from PageRank and HITS analysis were combined with scores returned by an off-the-shelf retrieval engine. Experiments demonstrate that incorporating PageRank scores yields significant improvements in terms of standard ranked-retrieval metrics. Conclusion The link structure of content-similarity networks can be exploited to improve the effectiveness of information retrieval systems. These results generalize the applicability of graph analysis algorithms to text retrieval in the biomedical domain.

  20. PUBLIC SERVICE ADVERTISING: AN ANALYSIS ON TEXT AND SEMIOTICS

    Directory of Open Access Journals (Sweden)

    Ni Wayan Sukarini

    2012-07-01

    Full Text Available This study concerns with text and semiotics analysis on the use of language in public service advertising (PSA. PSA in this study is the text which is especially on health. There are three problems that are analysed in this research, namely: (1 grammatical structure and the lexical of the text; (2 the relationship of trichotomies (representamen, object, and interpretant with the three components of sign in nonverbal aspect; and (3 ideologies and messages conveyed in the verbal and nonverbal signs. Three methods applied in this research respectively including descriptive, qualitative, and interpretative. The type of data was the written one which was taken from printed media in the forms of poster and brochure. The data was collected through five procedures, they are clipping, numbering, coding, picturing, and documenting. As a scientific writing, a number of theories must be applied for the analysis. The relevant theories are semantics, semiotics, speech act, hermeneutics, language function, and text structure. These six theories were applied eclecticly in analysing the grammatical structure, lexicals, signs, and the structure of texts in order to elaborate the meaning, ideology, and message which were being conveyed through the texts of PSA. The result of the analysis showed that the grammatical structure applied in the PSA of health could be classified into the simple structure in the forms of phrase, clause, and sentence. The use of verbs dominated initially in order to express the imperative meaning but still had the purpose of being persuasive. Kinds of lexicals found were very close to disease, reproduction, and health either the general terms, for example victims, medicine or the specific ones like HIV/AIDS, Odha, perinatal, nifas, jampersal, sadari. From the nonverbal aspect, the relationship of trichotomy with the three of sign components are more realistics in the Object with its three sub components. Triadic relationship of three sub

  1. PUBLIC SERVICE ADVERTISING: AN ANALYSIS ON TEXT AND SEMIOTICS

    Directory of Open Access Journals (Sweden)

    Ni Wayan Sukarini

    2015-07-01

    Full Text Available This study concerns with text and semiotics analysis on the use of language in public service advertising (PSA. PSA in this study is the text which is especially on health. There are three problems that are analysed in this research, namely: (1 grammatical structure and the lexical of the text; (2 the relationship of trichotomies (representamen, object, and interpretant with the three components of sign in nonverbal aspect; and (3 ideologies and messages conveyed in the verbal and nonverbal signs. Three methods applied in this research respectively including descriptive, qualitative, and interpretative. The type of data was the written one which was taken from printed media in the forms of poster and brochure. The data was collected through five procedures, they are clipping, numbering, coding, picturing, and documenting. As a scientific writing, a number of theories must be applied for the analysis. The relevant theories are semantics, semiotics, speech act, hermeneutics, language function, and text structure. These six theories were applied eclecticly in analysing the grammatical structure, lexicals, signs, and the structure of texts in order to elaborate the meaning, ideology, and message which were being conveyed through the texts of PSA. The result of the analysis showed that the grammatical structure applied in the PSA of health could be classified into the simple structure in the forms of phrase, clause, and sentence. The use of verbs dominated initially in order to express the imperative meaning but still had the purpose of being persuasive. Kinds of lexicals found were very close to disease, reproduction, and health either the general terms, for example victims, medicine or the specific ones like HIV/AIDS, Odha, perinatal, nifas, jampersal, sadari. From the nonverbal aspect, the relationship of trichotomy with the three of sign components are more realistics in the Object with its three sub components. Triadic relationship of three sub

  2. A Review Paper On Exploring Text Link And Spacial-Temporal Information In Social Media Networks

    Directory of Open Access Journals (Sweden)

    Dr. Mamta Madan

    2015-03-01

    Full Text Available ABSTRACT The objective of this paper is to have a literature review on the various methods to mine the knowledge from the social media by taking advantage of embedded heterogeneous information. Specifically we are trying to review different types of mining framework which provides us useful information from these networks that have heterogeneous data types including text spacial-temporal and data association LINK information. Firstly we will discuss the link mining to study the link structure with respect to Social Media SM. Secondly we summarize the various text mining models thirdly we shall review spacial as well the temporal models to extract or detect the frequent related topics from SM. Fourthly we will try to figure out few improvised models that take advantage of the link textual temporal and spacial information which motivates to discover progressive principles and fresh methodologies for DM Data Mining in social media networks SMNs.

  3. Interdisciplinary Approach to the Mental Lexicon: Neural Network and Text Extraction From Long-term Memory

    Directory of Open Access Journals (Sweden)

    Vardan G. Arutyunyan

    2013-01-01

    Full Text Available The paper touches upon the principles of mental lexicon organization in the light of recent research in psycho- and neurolinguistics. As a focal point of discussion two main approaches to mental lexicon functioning are considered: modular or dual-system approach, developed within generativism and opposite single-system approach, representatives of which are the connectionists and supporters of network models. The paper is an endeavor towards advocating the viewpoint that mental lexicon is complex psychological organization based upon specific composition of neural network. In this regard, the paper further elaborates on the matter of storing text in human mental space and introduces a model of text extraction from long-term memory. Based upon data available, the author develops a methodology of modeling structures of knowledge representation in the systems of artificial intelligence.

  4. Constructing an Intelligent Patent Network Analysis Method

    Directory of Open Access Journals (Sweden)

    Chao-Chan Wu

    2012-11-01

    Full Text Available Patent network analysis, an advanced method of patent analysis, is a useful tool for technology management. This method visually displays all the relationships among the patents and enables the analysts to intuitively comprehend the overview of a set of patents in the field of the technology being studied. Although patent network analysis possesses relative advantages different from traditional methods of patent analysis, it is subject to several crucial limitations. To overcome the drawbacks of the current method, this study proposes a novel patent analysis method, called the intelligent patent network analysis method, to make a visual network with great precision. Based on artificial intelligence techniques, the proposed method provides an automated procedure for searching patent documents, extracting patent keywords, and determining the weight of each patent keyword in order to generate a sophisticated visualization of the patent network. This study proposes a detailed procedure for generating an intelligent patent network that is helpful for improving the efficiency and quality of patent analysis. Furthermore, patents in the field of Carbon Nanotube Backlight Unit (CNT-BLU were analyzed to verify the utility of the proposed method.

  5. DETECTION OF TEXT OBJECTS IN IMAGES OF REAL SCENES BASED ON CONVOLUTIONAL NEURAL NETWORK MODEL

    Directory of Open Access Journals (Sweden)

    N. N. Kuzmitsky

    2015-01-01

    Full Text Available A model of text image detector based on a convolutional neural network architecture is presented, capable of synthesizing high-level features of images in the «black box» mode. An implementation of the detector application, based on algorithms of multi-scale scanning and local responses interpretation is described, allowing to find out text samples on images of real scenes. Advantages in comparison with analogs are shown and efficiency evaluation on an example of a known database is conducted.

  6. Computational Social Network Analysis

    CERN Document Server

    Hassanien, Aboul-Ella

    2010-01-01

    Presents insight into the social behaviour of animals (including the study of animal tracks and learning by members of the same species). This book provides web-based evidence of social interaction, perceptual learning, information granulation and the behaviour of humans and affinities between web-based social networks

  7. Network analysis applications in hydrology

    Science.gov (United States)

    Price, Katie

    2017-04-01

    Applied network theory has seen pronounced expansion in recent years, in fields such as epidemiology, computer science, and sociology. Concurrent development of analytical methods and frameworks has increased possibilities and tools available to researchers seeking to apply network theory to a variety of problems. While water and nutrient fluxes through stream systems clearly demonstrate a directional network structure, the hydrological applications of network theory remain under­explored. This presentation covers a review of network applications in hydrology, followed by an overview of promising network analytical tools that potentially offer new insights into conceptual modeling of hydrologic systems, identifying behavioral transition zones in stream networks and thresholds of dynamical system response. Network applications were tested along an urbanization gradient in Atlanta, Georgia, USA. Peachtree Creek and Proctor Creek. Peachtree Creek contains a nest of five long­term USGS streamflow and water quality gages, allowing network application of long­term flow statistics. The watershed spans a range of suburban and heavily urbanized conditions. Summary flow statistics and water quality metrics were analyzed using a suite of network analysis techniques, to test the conceptual modeling and predictive potential of the methodologies. Storm events and low flow dynamics during Summer 2016 were analyzed using multiple network approaches, with an emphasis on tomogravity methods. Results indicate that network theory approaches offer novel perspectives for understanding long­ term and event­based hydrological data. Key future directions for network applications include 1) optimizing data collection, 2) identifying "hotspots" of contaminant and overland flow influx to stream systems, 3) defining process domains, and 4) analyzing dynamic connectivity of various system components, including groundwater­surface water interactions.

  8. Spectral signature verification using statistical analysis and text mining

    Science.gov (United States)

    DeCoster, Mallory E.; Firpi, Alexe H.; Jacobs, Samantha K.; Cone, Shelli R.; Tzeng, Nigel H.; Rodriguez, Benjamin M.

    2016-05-01

    In the spectral science community, numerous spectral signatures are stored in databases representative of many sample materials collected from a variety of spectrometers and spectroscopists. Due to the variety and variability of the spectra that comprise many spectral databases, it is necessary to establish a metric for validating the quality of spectral signatures. This has been an area of great discussion and debate in the spectral science community. This paper discusses a method that independently validates two different aspects of a spectral signature to arrive at a final qualitative assessment; the textual meta-data and numerical spectral data. Results associated with the spectral data stored in the Signature Database1 (SigDB) are proposed. The numerical data comprising a sample material's spectrum is validated based on statistical properties derived from an ideal population set. The quality of the test spectrum is ranked based on a spectral angle mapper (SAM) comparison to the mean spectrum derived from the population set. Additionally, the contextual data of a test spectrum is qualitatively analyzed using lexical analysis text mining. This technique analyzes to understand the syntax of the meta-data to provide local learning patterns and trends within the spectral data, indicative of the test spectrum's quality. Text mining applications have successfully been implemented for security2 (text encryption/decryption), biomedical3 , and marketing4 applications. The text mining lexical analysis algorithm is trained on the meta-data patterns of a subset of high and low quality spectra, in order to have a model to apply to the entire SigDB data set. The statistical and textual methods combine to assess the quality of a test spectrum existing in a database without the need of an expert user. This method has been compared to other validation methods accepted by the spectral science community, and has provided promising results when a baseline spectral signature is

  9. HPIminer: A text mining system for building and visualizing human protein interaction networks and pathways.

    Science.gov (United States)

    Subramani, Suresh; Kalpana, Raja; Monickaraj, Pankaj Moses; Natarajan, Jeyakumar

    2015-04-01

    The knowledge on protein-protein interactions (PPI) and their related pathways are equally important to understand the biological functions of the living cell. Such information on human proteins is highly desirable to understand the mechanism of several diseases such as cancer, diabetes, and Alzheimer's disease. Because much of that information is buried in biomedical literature, an automated text mining system for visualizing human PPI and pathways is highly desirable. In this paper, we present HPIminer, a text mining system for visualizing human protein interactions and pathways from biomedical literature. HPIminer extracts human PPI information and PPI pairs from biomedical literature, and visualize their associated interactions, networks and pathways using two curated databases HPRD and KEGG. To our knowledge, HPIminer is the first system to build interaction networks from literature as well as curated databases. Further, the new interactions mined only from literature and not reported earlier in databases are highlighted as new. A comparative study with other similar tools shows that the resultant network is more informative and provides additional information on interacting proteins and their associated networks. Copyright © 2015 Elsevier Inc. All rights reserved.

  10. PageRank without hyperlinks: reranking with PubMed related article networks for biomedical text retrieval.

    Science.gov (United States)

    Lin, Jimmy

    2008-06-06

    Graph analysis algorithms such as PageRank and HITS have been successful in Web environments because they are able to extract important inter-document relationships from manually-created hyperlinks. We consider the application of these techniques to biomedical text retrieval. In the current PubMed(R) search interface, a MEDLINE(R) citation is connected to a number of related citations, which are in turn connected to other citations. Thus, a MEDLINE record represents a node in a vast content-similarity network. This article explores the hypothesis that these networks can be exploited for text retrieval, in the same manner as hyperlink graphs on the Web. We conducted a number of reranking experiments using the TREC 2005 genomics track test collection in which scores extracted from PageRank and HITS analysis were combined with scores returned by an off-the-shelf retrieval engine. Experiments demonstrate that incorporating PageRank scores yields significant improvements in terms of standard ranked-retrieval metrics. The link structure of content-similarity networks can be exploited to improve the effectiveness of information retrieval systems. These results generalize the applicability of graph analysis algorithms to text retrieval in the biomedical domain.

  11. Lightweight Word Spacing Model Based on Short Text Messages for Social Networking in Smart Homes

    OpenAIRE

    Yeongkil Song; Harksoo Kim

    2014-01-01

    In smart homes, information appliances interact with residents via social network services. To capture residents’ intentions, the information appliances should analyze short text messages entered typically through small mobile devices. However, most information appliances have hardware constraints such as small memory, limited battery capacity, and restricted processing power. Therefore, it is not easy to embed intelligent applications based on natural language processing (NLP) techniques, wh...

  12. Network Anomaly Detection Based on Wavelet Analysis

    Directory of Open Access Journals (Sweden)

    Ali A. Ghorbani

    2008-11-01

    Full Text Available Signal processing techniques have been applied recently for analyzing and detecting network anomalies due to their potential to find novel or unknown intrusions. In this paper, we propose a new network signal modelling technique for detecting network anomalies, combining the wavelet approximation and system identification theory. In order to characterize network traffic behaviors, we present fifteen features and use them as the input signals in our system. We then evaluate our approach with the 1999 DARPA intrusion detection dataset and conduct a comprehensive analysis of the intrusions in the dataset. Evaluation results show that the approach achieves high-detection rates in terms of both attack instances and attack types. Furthermore, we conduct a full day's evaluation in a real large-scale WiFi ISP network where five attack types are successfully detected from over 30 millions flows.

  13. Optimizing text-independent speaker recognition using an LSTM neural network

    OpenAIRE

    Larsson, Joel

    2014-01-01

    In this paper a novel speaker recognition system is introduced. Automated speaker recognition has become increasingly popular to aid in crime investigations and authorization processes with the advances in computer science. Here, a recurrent neural network approach is used to learn to identify ten speakers within a set of 21 audio books. Audio signals are processed via spectral analysis into Mel Frequency Cepstral Coefficients that serve as speaker specific features, which are input to the ne...

  14. Network value and optimum analysis on the mode of networked marketing in TV media

    Directory of Open Access Journals (Sweden)

    Xiao Dongpo

    2012-12-01

    Full Text Available Purpose: With the development of the networked marketing in TV media, it is important to do the research on network value and optimum analysis in this field.Design/methodology/approach: According to the research on the mode of networked marketing in TV media and Correlation theory, the essence of media marketing is creating, spreading and transferring values. The Participants of marketing value activities are in network, and value activities proceed in networked form. Network capability is important to TV media marketing activities.Findings: This article raises the direction of research of analysis and optimization about network based on the mode of networked marketing in TV media by studying TV media marketing Development Mechanism , network analysis and network value structure.

  15. Scene text detection via extremal region based double threshold convolutional network classification.

    Directory of Open Access Journals (Sweden)

    Wei Zhu

    Full Text Available In this paper, we present a robust text detection approach in natural images which is based on region proposal mechanism. A powerful low-level detector named saliency enhanced-MSER extended from the widely-used MSER is proposed by incorporating saliency detection methods, which ensures a high recall rate. Given a natural image, character candidates are extracted from three channels in a perception-based illumination invariant color space by saliency-enhanced MSER algorithm. A discriminative convolutional neural network (CNN is jointly trained with multi-level information including pixel-level and character-level information as character candidate classifier. Each image patch is classified as strong text, weak text and non-text by double threshold filtering instead of conventional one-step classification, leveraging confident scores obtained via CNN. To further prune non-text regions, we develop a recursive neighborhood search algorithm to track credible texts from weak text set. Finally, characters are grouped into text lines using heuristic features such as spatial location, size, color, and stroke width. We compare our approach with several state-of-the-art methods, and experiments show that our method achieves competitive performance on public datasets ICDAR 2011 and ICDAR 2013.

  16. An open stylometric system based on multilevel text analysis

    Directory of Open Access Journals (Sweden)

    Maciej Eder

    2017-12-01

    Full Text Available An open stylometric system based on multilevel text analysis Stylometric techniques are usually applied to a limited number of typical tasks, such as authorship attribution, genre analysis, or gender studies. However, they could be applied to several tasks beyond this canonical set, if only stylometric tools were more accessible to users from different areas of the humanities and social sciences. This paper presents a general idea, followed by a fully functional prototype of an open stylometric system that facilitates its wide use through to two aspects: technical and research flexibility. The system relies on a server installation combined with a web-based user interface. This frees the user from the necessity of installing any additional software. At the same time, the system offers a variety of ways in which the input texts can be analysed: they include not only the usual lexical level, but also deep-level linguistic features. This enables a range of possible applications, from typical stylometric tasks to the semantic analysis of text documents. The internal architecture of the system relies on several well-known software packages: a collection of language tools (for text pre-processing, Stylo (for stylometric analysis and Cluto (for text clustering. The paper presents: (1 The idea behind the system from the user’s perspective. (2 The architecture of the system, with a focus on data processing. (3 Features for text description. (4 The use of analytical systems such as Stylo and Cluto. The presentation is illustrated with example applications.   Otwarty system stylometryczny wykorzystujący wielopoziomową analizę języka  Zastosowania metod stylometrycznych na ogół ograniczają się do kilku typowych problemów badawczych, takich jak atrybucja autorska, styl gatunków literackich czy studia nad zróżnicowaniem stylistycznym kobiet i mężczyzn. Z pewnością dałoby się je z powodzeniem zastosować również do wielu innych problem

  17. Statistical network analysis for analyzing policy networks

    DEFF Research Database (Denmark)

    Robins, Garry; Lewis, Jenny; Wang, Peng

    2012-01-01

    To analyze social network data using standard statistical approaches is to risk incorrect inference. The dependencies among observations implied in a network conceptualization undermine standard assumptions of the usual general linear models. One of the most quickly expanding areas of social...... and policy network methodology is the development of statistical modeling approaches that can accommodate such dependent data. In this article, we review three network statistical methods commonly used in the current literature: quadratic assignment procedures, exponential random graph models (ERGMs...

  18. Intertextuality within the linguistic analysis of a literary text

    Directory of Open Access Journals (Sweden)

    Л Н Лунькова

    2008-12-01

    Full Text Available The article is devoted to the phenomenon of precedent texts in fiction, the ways they are introduced into it and the possibilities of their linguistic interpretation within secondary texts.

  19. Scene text detection via extremal region based double threshold convolutional network classification.

    Science.gov (United States)

    Zhu, Wei; Lou, Jing; Chen, Longtao; Xia, Qingyuan; Ren, Mingwu

    2017-01-01

    In this paper, we present a robust text detection approach in natural images which is based on region proposal mechanism. A powerful low-level detector named saliency enhanced-MSER extended from the widely-used MSER is proposed by incorporating saliency detection methods, which ensures a high recall rate. Given a natural image, character candidates are extracted from three channels in a perception-based illumination invariant color space by saliency-enhanced MSER algorithm. A discriminative convolutional neural network (CNN) is jointly trained with multi-level information including pixel-level and character-level information as character candidate classifier. Each image patch is classified as strong text, weak text and non-text by double threshold filtering instead of conventional one-step classification, leveraging confident scores obtained via CNN. To further prune non-text regions, we develop a recursive neighborhood search algorithm to track credible texts from weak text set. Finally, characters are grouped into text lines using heuristic features such as spatial location, size, color, and stroke width. We compare our approach with several state-of-the-art methods, and experiments show that our method achieves competitive performance on public datasets ICDAR 2011 and ICDAR 2013.

  20. Text Message Delivered Peer Network Counseling for Adolescent Smokers: A Randomized Controlled Trial.

    Science.gov (United States)

    Mason, Michael; Mennis, Jeremy; Way, Thomas; Zaharakis, Nikola; Campbell, Leah Floyd; Benotsch, Eric G; Keyser-Marcus, Lori; King, Laura

    2016-10-01

    Although adolescent tobacco use has declined in the last 10 years, African American high school seniors' past 30-day use has increased by 12 %, and as they age they are more likely to report lifetime use of tobacco. Very few urban youth are enrolled in evidenced-based smoking prevention and cessation programming. Therefore, we tested a text messaging smoking cessation intervention designed to engage urban youth through an automated texting program utilizing motivational interviewing-based peer network counseling. We recruited 200 adolescents (90.5 % African American) into a randomized controlled trial that delivered either the experimental intervention of 30 personalized motivational interviewing-based peer network counseling messages, or the attention control intervention, consisting of text messages covering general (non-smoking related) health habits. All adolescents were provided smart phones for the study and were assessed at baseline, and at 1, 3, and 6 months post intervention. Utilizing repeated measures general linear models we examined the effects of the intervention while controlling for race, gender, age, presence of a smoker in the home, and mental health counseling. At 6 months, participants in the experimental condition significantly decreased the number of days they smoked cigarettes and the number of cigarettes they smoked per day; they significantly increased their intentions not to smoke in the future; and significantly increased peer social support among girls. For boys, participants in the experimental condition significantly reduced the number of close friends in their networks who smoke daily compared to those in the control condition. Effect sizes ranged from small to large. These results provide encouraging evidence of the efficacy of text messaging interventions to reduce smoking among adolescents and our intervention holds promise as a large-scale public health preventive intervention platform.

  1. Performance Analysis of 3G Communication Network

    Directory of Open Access Journals (Sweden)

    Toni Anwar

    2013-09-01

    Full Text Available In this project, third generation (3G technologies research had been carried out to design and optimization conditions for 3G network. The 3G wireless mobile communication networks are growing at an ever faster rate, and this is likely to continue in the foreseeable future. Some services such as e-mail, web browsing etc allow the transition of the network from circuit switched to packet switched operation, resulting in increased overall network performance. Higher reliability, better coverage and services, higher capacity, mobility management, and wireless multimedia are all parts of the network performance. Throughput and spectral efficiency are fundamental parameters in capacity planning for 3G cellular network deployments. This project investigates also the downlink (DL and uplink (UL throughput and spectral efficiency performance of the standard Universal Mobile Telecommunications system (UMTS system for different scenarios of user and different technologies. Power consumption comparison for different mobile technology is also discussed. The analysis can significantly help system engineers to obtain crucial performance characteristics of 3G network. At the end of the paper, coverage area of 3G from one of the mobile network in Malaysia is presented.

  2. Fast network centrality analysis using GPUs

    Directory of Open Access Journals (Sweden)

    Shi Zhiao

    2011-05-01

    Full Text Available Abstract Background With the exploding volume of data generated by continuously evolving high-throughput technologies, biological network analysis problems are growing larger in scale and craving for more computational power. General Purpose computation on Graphics Processing Units (GPGPU provides a cost-effective technology for the study of large-scale biological networks. Designing algorithms that maximize data parallelism is the key in leveraging the power of GPUs. Results We proposed an efficient data parallel formulation of the All-Pairs Shortest Path problem, which is the key component for shortest path-based centrality computation. A betweenness centrality algorithm built upon this formulation was developed and benchmarked against the most recent GPU-based algorithm. Speedup between 11 to 19% was observed in various simulated scale-free networks. We further designed three algorithms based on this core component to compute closeness centrality, eccentricity centrality and stress centrality. To make all these algorithms available to the research community, we developed a software package gpu-fan (GPU-based Fast Analysis of Networks for CUDA enabled GPUs. Speedup of 10-50× compared with CPU implementations was observed for simulated scale-free networks and real world biological networks. Conclusions gpu-fan provides a significant performance improvement for centrality computation in large-scale networks. Source code is available under the GNU Public License (GPL at http://bioinfo.vanderbilt.edu/gpu-fan/.

  3. Models as Tools of Analysis of a Network Organisation

    Directory of Open Access Journals (Sweden)

    Wojciech Pająk

    2013-06-01

    Full Text Available The paper presents models which may be applied as tools of analysis of a network organisation. The starting point of the discussion is defining the following terms: supply chain and network organisation. Further parts of the paper present basic assumptions analysis of a network organisation. Then the study characterises the best known models utilised in analysis of a network organisation. The purpose of the article is to define the notion and the essence of network organizations and to present the models used for their analysis.

  4. TextTile: An Interactive Visualization Tool for Seamless Exploratory Analysis of Structured Data and Unstructured Text.

    Science.gov (United States)

    Felix, Cristian; Pandey, Anshul Vikram; Bertini, Enrico

    2017-01-01

    We describe TextTile, a data visualization tool for investigation of datasets and questions that require seamless and flexible analysis of structured data and unstructured text. TextTile is based on real-world data analysis problems gathered through our interaction with a number of domain experts and provides a general purpose solution to such problems. The system integrates a set of operations that can interchangeably be applied to the structured as well as to unstructured text part of the data to generate useful data summaries. Such summaries are then organized in visual tiles in a grid layout to allow their analysis and comparison. We validate TextTile with task analysis, use cases and a user study showing the system can be easily learned and proficiently used to carry out nontrivial tasks.

  5. NEAT : an efficient network enrichment analysis test

    NARCIS (Netherlands)

    Signorelli, Mirko; Vinciotti, Veronica; Wit, Ernst C

    2016-01-01

    BACKGROUND: Network enrichment analysis is a powerful method, which allows to integrate gene enrichment analysis with the information on relationships between genes that is provided by gene networks. Existing tests for network enrichment analysis deal only with undirected networks, they can be

  6. Theoretical Analysis of Understanding the Text in a Foreign Language

    Directory of Open Access Journals (Sweden)

    Aleksandras Velička

    2011-04-01

    Full Text Available The article contains the examination of the important problem of teaching the foreign languages. The theoretical interpretation and understanding of the text consist of two components: perceptive comprehension of the text and semantic decoding of the text contents. The author underlines that for understanding of the text the linguistic and extralinguistic elements; quantity of information, its presentation, visual aids are of the particular importance. The speech competency of the reader is also accented in the work. The article is useful in both theoretical and practical aspects.

  7. Vocabulary Analysis On Reading Texts Used By EFL Students

    Directory of Open Access Journals (Sweden)

    C Sutarsyah

    2001-01-01

    Full Text Available Abstract: The vocabulary in the texts is the aspect that needs to identify. It is claimed that the condition of the words in a text has a great influence to readers' comprehension. It is also commonly believed that compre­hension depends on the extent that the words in a text are familiar to the readers. This case study was carried out in the English Education De­partment of University of Malang. The aim of the study is to identify and describe the vocabulary in the text and to seek if the text is useful for reading skill development. The reading materials under investigation were a collection of reading passages based on the syllabus (Reading Com­prehension I and limited to the passages that were used in class during the second semester, 1999. Based on the nature of the investigation, a descriptive qualitative design was applied to obtain the data. For this purpose, some available computer programs were used. They were used to find the description of vocabulary in the texts. The vocabulary analy­ses in the texts reveal some constrains. It was found that the texts, con­taining 7,945 words of 20 different texts, are dominated by low frequency words which account for 16.97% of the words in the texts. In terms of high frequency words occurring in the texts, function words dominate the texts. Of the 50 most frequent words, only two content words (people and say were found. In the case of word level, it was found that the texts being used have very limited number of words from GSL (General Service List of English Words (West, 1953. The proportion of the first 1,000 words of GSL only accounts for 44.6%. The data also show that the texts contain too large proportion of words which are not in the three levels (the first 2,000 and UWL. These words account for 26.44% of the run­ning words in the texts. Based on the findings, some conclusions were drawn, it is believed that the constraints are due to the selection of the texts which are

  8. Analysis of Layered Social Networks

    Science.gov (United States)

    2006-09-01

    xiii List of Abbreviations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv I. Introduction ...Islamiya JP Joint Publication JTC Joint Targeting Cycle KPP Key Player Problem MCDM Multi-Criteria Decision Making MP Mathematical Programming MST...ANALYSIS OF LAYERED SOCIAL NETWORKS I. Introduction “To know them means to eliminate them” - Colonel Mathieu in the movie, Battle of Algiers

  9. Analysis of Tense Interferential of Verbs in Old Narrative Texts

    Directory of Open Access Journals (Sweden)

    Mahmood Barati khansari

    2014-08-01

    Full Text Available Abstract One of the admirable methods to compose stories in Persian verse and prose, is the present Tense verbs in the meaning of past tense. This grammatical point has been hidden in the grammarian and stylist's point of view although it has been repeatedly mentioned in the texts and this point has been not mentioned in the grammatical books but some of the investigators and literati have pointed out it in their correction works. We mention their sayings: firstly, Allame Qazvini, doubtfully, mentions the interferential times of the verbs and inconsistencies of the Tenses in the correction of texts of Jahangoshaye – Joveini Book. He writes in the second footnote 2-3, that the verb Mikonam( I do is in the form of present Tense but its meaning is in the simple past Tense. As it has been observed, in the most old books the form of the verb is in the present tense but its meaning is in simple Tense ( Joveini, 1367, p. 357. Later, Fruzanfar in the correction of grammatical notes of ouhadoddin Kermani's Manaqeb, points to this point and counted it of the Eltefat Literary art ( Fruzanfar, 1347. P. 61 Mohammad Roushan informed this grammatical rule and he writes in the introduction of his book: the application of this kind of verb that is not on the basis of the dependent and independent verbs (Khagushi, 1361, p. 24. Yusofi in his correction on Bidpay Stories points to this grammatical point that it has been hidden of correctors of the book. Ha says that this grammatical point is the prose characteristic of the book. He adds that the characteristic includes in the present stories (Yusofi, 1364, p. 36. Finally, Dr. shfi'ee in his valuable notes on the Mateqol altei their mentions that this style of telling stories – the verb in the present Tense- is less in verse but the verbs in the same meaning and forms were used in old Persian as in the present time but there were inconsistence in the time and the form of the verbs in the past and the grammarians

  10. Analysis of Tense Interferential of Verbs in Old Narrative Texts

    Directory of Open Access Journals (Sweden)

    Amir Zeighami

    2014-07-01

    Full Text Available Abstract One of the admirable methods to compose stories in Persian verse and prose, is the present Tense verbs in the meaning of past tense. This grammatical point has been hidden in the grammarian and stylist's point of view although it has been repeatedly mentioned in the texts and this point has been not mentioned in the grammatical books but some of the investigators and literati have pointed out it in their correction works. We mention their sayings: firstly, Allame Qazvini, doubtfully, mentions the interferential times of the verbs and inconsistencies of the Tenses in the correction of texts of Jahangoshaye – Joveini Book. He writes in the second footnote 2-3, that the verb Mikonam( I do is in the form of present Tense but its meaning is in the simple past Tense. As it has been observed, in the most old books the form of the verb is in the present tense but its meaning is in simple Tense ( Joveini, 1367, p. 357. Later, Fruzanfar in the correction of grammatical notes of ouhadoddin Kermani's Manaqeb, points to this point and counted it of the Eltefat Literary art ( Fruzanfar, 1347. P. 61 Mohammad Roushan informed this grammatical rule and he writes in the introduction of his book: the application of this kind of verb that is not on the basis of the dependent and independent verbs (Khagushi, 1361, p. 24. Yusofi in his correction on Bidpay Stories points to this grammatical point that it has been hidden of correctors of the book. Ha says that this grammatical point is the prose characteristic of the book. He adds that the characteristic includes in the present stories (Yusofi, 1364, p. 36. Finally, Dr. shfi'ee in his valuable notes on the Mateqol altei their mentions that this style of telling stories – the verb in the present Tense- is less in verse but the verbs in the same meaning and forms were used in old Persian as in the present time but there were inconsistence in the time and the form of the verbs in the past and

  11. Social network analysis of study environment

    Directory of Open Access Journals (Sweden)

    Blaženka Divjak

    2010-06-01

    Full Text Available Student working environment influences student learning and achievement level. In this respect social aspects of students’ formal and non-formal learning play special role in learning environment. The main research problem of this paper is to find out if students' academic performance influences their position in different students' social networks. Further, there is a need to identify other predictors of this position. In the process of problem solving we use the Social Network Analysis (SNA that is based on the data we collected from the students at the Faculty of Organization and Informatics, University of Zagreb. There are two data samples: in the basic sample N=27 and in the extended sample N=52. We collected data on social-demographic position, academic performance, learning and motivation styles, student status (full-time/part-time, attitudes towards individual and teamwork as well as informal cooperation. Afterwards five different networks (exchange of learning materials, teamwork, informal communication, basic and aggregated social network were constructed. These networks were analyzed with different metrics and the most important were betweenness, closeness and degree centrality. The main result is, firstly, that the position in a social network cannot be forecast only by academic success and, secondly, that part-time students tend to form separate groups that are poorly connected with full-time students. In general, position of a student in social networks in study environment can influence student learning as well as her/his future employability and therefore it is worthwhile to be investigated.

  12. Comparative Analysis of Document level Text Classification Algorithms using R

    Science.gov (United States)

    Syamala, Maganti; Nalini, N. J., Dr; Maguluri, Lakshamanaphaneendra; Ragupathy, R., Dr.

    2017-08-01

    From the past few decades there has been tremendous volumes of data available in Internet either in structured or unstructured form. Also, there is an exponential growth of information on Internet, so there is an emergent need of text classifiers. Text mining is an interdisciplinary field which draws attention on information retrieval, data mining, machine learning, statistics and computational linguistics. And to handle this situation, a wide range of supervised learning algorithms has been introduced. Among all these K-Nearest Neighbor(KNN) is efficient and simplest classifier in text classification family. But KNN suffers from imbalanced class distribution and noisy term features. So, to cope up with this challenge we use document based centroid dimensionality reduction(CentroidDR) using R Programming. By combining these two text classification techniques, KNN and Centroid classifiers, we propose a scalable and effective flat classifier, called MCenKNN which works well substantially better than CenKNN.

  13. Social network analysis to cluster sociobibliometric information

    Directory of Open Access Journals (Sweden)

    Jorge Ricardo Vivas

    Full Text Available This paper examines the benefits of using Social Network Analysis in the field of sociobibliometric exploration. There are considered practical and conceptual limits and reaches. The proposal is illustrated through a study about a journals network of behavior modification by Peiró and Carpintero (1981. In this context it is shown the utility of using reticular properties of Density, Centrality, Betweenness, Power and Clusterig as indicators that allow obtaining novel and complementary information to the one extracted by the classic methods of bibliometric exploration.

  14. Large-scale analysis of Zipf's law in English texts

    CERN Document Server

    Moreno-Sánchez, Isabel; Corral, Álvaro

    2015-01-01

    Despite being a paradigm of quantitative linguistics, Zipf's law for words suffers from three main problems: its formulation is ambiguous, its validity has not been tested rigorously from a statistical point of view, and it has not been confronted to a representatively large number of texts. So, we can summarize the current support of Zipf's law in texts as anecdotic. We try to solve these issues by studying three different versions of Zipf's law and fitting them to all available English texts in the Project Gutenberg database (consisting of more than 30000 texts). To do so we use state-of-the art tools in fitting and goodness-of-fit tests, carefully tailored to the peculiarities of text statistics. Remarkably, one of the three versions of Zipf's law, consisting of a pure power-law form in the complementary cumulative distribution function of word frequencies, is able to fit more than 40% of the texts in the database (at the 0.05 significance level), for the whole domain of frequencies (from 1 to the maximum ...

  15. An Analysis on Reading Texts in Teaching Turkish to Foreigners

    Directory of Open Access Journals (Sweden)

    Adem İŞCAN

    2017-09-01

    Full Text Available Being one of the four basic language skills, reading has a great importance in teaching Turkish to foreigners. It is required to develop reading skills to develop vocabulary. There have been some problems in teaching Turkish as second language. These problems are generally related to difference in alphabet, inadequacy of the sources used in teaching Turkish, methods and techniques used and the texts used. The basic sources used in teaching Turkish to foreigners are texts. This study aims at determination of the opinions of students in Gaziosmanpaşa University and Ondokuz Mayıs University Turkish Education and Application Center (TOMER concerning Turkish reading texts. General browsing method was used in the study. The questionnaire comprising of 24 items was applied to 25 students in beginner level and 7 students in advanced level. With this study, it is foreseen to arrange the texts being the key stone according to the wishes of and in compliance with the levels of students; giving importance to pre-reading, reading and post-reading activities and including questions with short-answer about the text as well as questions to develop high level skills.

  16. Transmission analysis in WDM networks

    DEFF Research Database (Denmark)

    Rasmussen, Christian Jørgen

    1999-01-01

    This thesis describes the development of a computer-based simulator for transmission analysis in optical wavelength division multiplexing networks. A great part of the work concerns fundamental optical network simulator issues. Among these issues are identification of the versatility and user......-friendliness demands which such a simulator must meet, development of the "spectral window representation" for representation of the optical signals and finding an effective way of handling the optical signals in the computer memory. One important issue more is the rules for the determination of the order in which...... the different component models are invoked during the simulation of a system. A simple set of rules which makes it possible to simulate any network architectures is laid down. The modelling of the nonlinear fibre and the optical receiver is also treated. The work on the fibre concerns the numerical solution...

  17. Analysis of short non-literary texts: Elements for a conceptual approach to the mini-text

    Directory of Open Access Journals (Sweden)

    Javier Oswaldo Moreno Caro

    2015-12-01

    Full Text Available A theoretical and didactic approach to the mini-text is proposed: a conceptual category for analysis and pedagogic treatment of non-literary-short-texts. The proposal is based on four theoretical paradigms: one related to the bakhtinian approach of enunciation and discourse genres; other circumscribed by text linguistics and discourse studies; a third approach related to flash fiction theory and criticism; and a fourth paradigm that suggests taking advantage of immersion and entertainment features that underlay videogames as mechanisms to promote meaningful learnings.

  18. In search for martyrdom. Analysis of the Orthodox liturgical texts

    Directory of Open Access Journals (Sweden)

    Marek Ławreszuk

    2015-11-01

    Full Text Available In the hagiographic literature, descriptions of the martyrdom appeared an uncompromising stance a man who did not hesitate to confess and defend their faith, knowing that this may lead to martyrdom. The lives of the saints and liturgical texts often contain the term “desire to die” or “desire for martyrdom”. How should we understand these words? Are they an expression of contempt for earthly life and the expectation of eternity with God? Are the roots of this idea dates back to the Gospel, or rather born with a Gnostic inspiration, and contempt for what earthly and material? The answers to these questions we will seek above all in the liturgical texts.

  19. CONVERTING RETRIEVED SPOKEN DOCUMENTS INTO TEXT USING AN AUTO ASSOCIATIVE NEURAL NETWORK

    Directory of Open Access Journals (Sweden)

    J. SANGEETHA

    2016-06-01

    Full Text Available This paper frames a novel methodology for spoken document information retrieval to the spontaneous speech corpora and converting the retrieved document into the corresponding language text. The proposed work involves the three major areas namely spoken keyword detection, spoken document retrieval and automatic speech recognition. The keyword spotting is concerned with the exploit of the distribution capturing capability of the Auto Associative Neural Network (AANN for spoken keyword detection. It involves sliding a frame-based keyword template along the audio documents and by means of confidence score acquired from the normalized squared error of AANN to search for a match. This work benevolences a new spoken keyword spotting algorithm. Based on the match the spoken documents are retrieved and clustered together. In speech recognition step, the retrieved documents are converted into the corresponding language text using the AANN classifier. The experiments are conducted using the Dravidian language database and the results recommend that the proposed method is promising for retrieving the relevant documents of a spoken query as a key and transform it into the corresponding language.

  20. Exploration Knowledge Sharing Networks Using Social Network Analysis Methods

    Directory of Open Access Journals (Sweden)

    Győző Attila Szilágyi

    2017-10-01

    Full Text Available Knowledge sharing within organization is one of the key factor for success. The organization, where knowledge sharing takes place faster and more efficiently, is able to adapt to changes in the market environment more successfully, and as a result, it may obtain a competitive advantage. Knowledge sharing in an organization is carried out through formal and informal human communication contacts during work. This forms a multi-level complex network whose quantitative and topological characteristics largely determine how quickly and to what extent the knowledge travels within organization. The study presents how different networks of knowledge sharing in the organization can be explored by means of network analysis methods through a case study, and which role play the properties of these networks in fast and sufficient spread of knowledge in organizations. The study also demonstrates the practical applications of our research results. Namely, on the basis of knowledge sharing educational strategies can be developed in an organization, and further, competitiveness of an organization may increase due to those strategies’ application.

  1. Peer Interaction in Text Chat: Qualitative Analysis of Chat Transcripts

    Science.gov (United States)

    Golonka, Ewa M.; Tare, Medha; Bonilla, Carrie

    2017-01-01

    Prior research has shown that intermediate-level adult learners of Russian who worked interactively with partners using text chat improved their vocabulary and oral production skills more than students who worked independently (Tare et al., 2014). Drawing on the dataset from Tare et al. (2014), the current study follows up to explore the nature of…

  2. The literary text as the object of conceptual analysis

    OpenAIRE

    Юлия Александровна Карасёва

    2011-01-01

    The article is devoted to the study of the conceptual space of the literary text as a source of linguistic and cultural information. It deals with some types of national-specific concepts, that form the sphere of concepts of the national language.

  3. Temporal analysis of text data using latent variable models

    DEFF Research Database (Denmark)

    Mølgaard, Lasse Lohilahti; Larsen, Jan; Goutte, Cyril

    2009-01-01

    Detecting and tracking of temporal data is an important task in multiple applications. In this paper we study temporal text mining methods for Music Information Retrieval. We compare two ways of detecting the temporal latent semantics of a corpus extracted from Wikipedia, using a stepwise...

  4. Trimming of mammalian transcriptional networks using network component analysis

    Directory of Open Access Journals (Sweden)

    Liao James C

    2010-10-01

    Full Text Available Abstract Background Network Component Analysis (NCA has been used to deduce the activities of transcription factors (TFs from gene expression data and the TF-gene binding relationship. However, the TF-gene interaction varies in different environmental conditions and tissues, but such information is rarely available and cannot be predicted simply by motif analysis. Thus, it is beneficial to identify key TF-gene interactions under the experimental condition based on transcriptome data. Such information would be useful in identifying key regulatory pathways and gene markers of TFs in further studies. Results We developed an algorithm to trim network connectivity such that the important regulatory interactions between the TFs and the genes were retained and the regulatory signals were deduced. Theoretical studies demonstrated that the regulatory signals were accurately reconstructed even in the case where only three independent transcriptome datasets were available. At least 80% of the main target genes were correctly predicted in the extreme condition of high noise level and small number of datasets. Our algorithm was tested with transcriptome data taken from mice under rapamycin treatment. The initial network topology from the literature contains 70 TFs, 778 genes, and 1423 edges between the TFs and genes. Our method retained 1074 edges (i.e. 75% of the original edge number and identified 17 TFs as being significantly perturbed under the experimental condition. Twelve of these TFs are involved in MAPK signaling or myeloid leukemia pathways defined in the KEGG database, or are known to physically interact with each other. Additionally, four of these TFs, which are Hif1a, Cebpb, Nfkb1, and Atf1, are known targets of rapamycin. Furthermore, the trimmed network was able to predict Eno1 as an important target of Hif1a; this key interaction could not be detected without trimming the regulatory network. Conclusions The advantage of our new algorithm

  5. Spectral Analysis of Rich Network Topology in Social Networks

    Science.gov (United States)

    Wu, Leting

    2013-01-01

    Social networks have received much attention these days. Researchers have developed different methods to study the structure and characteristics of the network topology. Our focus is on spectral analysis of the adjacency matrix of the underlying network. Recent work showed good properties in the adjacency spectral space but there are few…

  6. Phylodynamic analysis of a viral infection network

    Directory of Open Access Journals (Sweden)

    Teiichiro eShiino

    2012-07-01

    Full Text Available Viral infections by sexual and droplet transmission routes typically spread through a complex host-to-host contact network. Clarifying the transmission network and epidemiological parameters affecting the variations and dynamics of a specific pathogen is a major issue in the control of infectious diseases. However, conventional methods such as interview and/or classical phylogenetic analysis of viral gene sequences have inherent limitations and often fail to detect infectious clusters and transmission connections. Recent improvements in computational environments now permit the analysis of large datasets. In addition, novel analytical methods have been developed that serve to infer the evolutionary dynamics of virus genetic diversity using sample date information and sequence data. This type of framework, termed phylodynamics, helps connect some of the missing links on viral transmission networks, which are often hard to detect by conventional methods of epidemiology. With sufficient number of sequences available, one can use this new inference method to estimate theoretical epidemiological parameters such as temporal distributions of the primary infection, fluctuation of the pathogen population size, basic reproductive number, and the mean time span of disease infectiousness. Transmission networks estimated by this framework often have the properties of a scale-free network, which are characteristic of infectious and social communication processes. Network analysis based on phylodynamics has alluded to various suggestions concerning the infection dynamics associated with a given community and/or risk behavior. In this review, I will summarize the current methods available for identifying the transmission network using phylogeny, and present an argument on the possibilities of applying the scale-free properties to these existing frameworks.

  7. Popular Songs, Literary Texts: A Literary Analysis of Fuji Songs ...

    African Journals Online (AJOL)

    ... attention and yield fruits which are as illuminating aesthetically and culturally as the analysis of written literature. Finally, the paper establishes the fact that popular songs, though orally composed, orally transmitted and aurally perceived, contribute significantly to man‟s apprehension of life and the human condition.

  8. The tool for the automatic analysis of text cohesion (TAACO): Automatic assessment of local, global, and text cohesion.

    Science.gov (United States)

    Crossley, Scott A; Kyle, Kristopher; McNamara, Danielle S

    2016-12-01

    This study introduces the Tool for the Automatic Analysis of Cohesion (TAACO), a freely available text analysis tool that is easy to use, works on most operating systems (Windows, Mac, and Linux), is housed on a user's hard drive (rather than having an Internet interface), allows for the batch processing of text files, and incorporates over 150 classic and recently developed indices related to text cohesion. The study validates TAACO by investigating how its indices related to local, global, and overall text cohesion can predict expert judgments of text coherence and essay quality. The findings of this study provide predictive validation of TAACO and support the notion that expert judgments of text coherence and quality are either negatively correlated or not predicted by local and overall text cohesion indices, but are positively predicted by global indices of cohesion. Combined, these findings provide supporting evidence that coherence for expert raters is a property of global cohesion and not of local cohesion, and that expert ratings of text quality are positively related to global cohesion.

  9. A text analysis of the poems of Sylvia Plath.

    Science.gov (United States)

    Lester, David; McSwain, Stephanie

    2011-08-01

    Changes in the words used in the poems of Sylvia Plath were examined using the Linguistic Inquiry and Word Count, a computer program for analyzing the content of texts. Major changes in the content of her poems were observed over the course of Plath's career, as well as in the final year of her life. As the time of her suicide came closer, words expressing positive emotions became more frequent, while words concerned with causation and insight became less frequent.

  10. Changing Text: A Social Semiotic Analysis of Textbooks

    Directory of Open Access Journals (Sweden)

    Jeff Bezemer

    2010-12-01

    Full Text Available In this paper we provide a multimodal account of historical changes in secondary school textbooks in England and their social significance. Adopting a social semiotic approach to text and text making we review learning resources across core subjects of the English national curriculum, English, Science and Mathematics. Comparing textbooks from the 1930s, 1980s and 2000s, we show that a all modes operating in textbooks -typography, image, writing and layout- contribute to meaning and potential for learning b that the use of these modes has changed between 1930 and now, in ways significant for social relations between and across makers and users of textbooks. Designers and readers / learners now take responsibility for coherence, which was previously the exclusive domain of authors. Where previously reading paths were fixed by makers it may now be left to learners to establish these according to their interests. For users of textbooks the changes in design demand new forms of ‘literacy’; a fluency not only in ‘reading’ writing, image, typography and layout jointly, but in the overall design of learning environments. We place these changes against the backdrop of wider social changes and features of the contemporary media landscape, recognizing a shift from stability, canonicity and vertical power structures to ‘horizontal’, more open, participatory relations in the production of knowledge.

  11. Diversity Performance Analysis on Multiple HAP Networks

    Directory of Open Access Journals (Sweden)

    Feihong Dong

    2015-06-01

    Full Text Available One of the main design challenges in wireless sensor networks (WSNs is achieving a high-data-rate transmission for individual sensor devices. The high altitude platform (HAP is an important communication relay platform for WSNs and next-generation wireless networks. Multiple-input multiple-output (MIMO techniques provide the diversity and multiplexing gain, which can improve the network performance effectively. In this paper, a virtual MIMO (V-MIMO model is proposed by networking multiple HAPs with the concept of multiple assets in view (MAV. In a shadowed Rician fading channel, the diversity performance is investigated. The probability density function (PDF and cumulative distribution function (CDF of the received signal-to-noise ratio (SNR are derived. In addition, the average symbol error rate (ASER with BPSK and QPSK is given for the V-MIMO model. The system capacity is studied for both perfect channel state information (CSI and unknown CSI individually. The ergodic capacity with various SNR and Rician factors for different network configurations is also analyzed. The simulation results validate the effectiveness of the performance analysis. It is shown that the performance of the HAPs network in WSNs can be significantly improved by utilizing the MAV to achieve overlapping coverage, with the help of the V-MIMO techniques.

  12. Analysis of Semantic Networks using Complex Networks Concepts

    DEFF Research Database (Denmark)

    Ortiz-Arroyo, Daniel

    2013-01-01

    In this paper we perform a preliminary analysis of semantic networks to determine the most important terms that could be used to optimize a summarization task. In our experiments, we measure how the properties of a semantic network change, when the terms in the network are removed. Our preliminar...... results indicate that this approach provides good results on the semantic network analyzed in this paper....

  13. Social science and linguistic text analysis of nurses’ records

    DEFF Research Database (Denmark)

    Buus, N.; Hamilton, B. E.

    2016-01-01

    The two aims of the paper were to systematically review and critique social science and linguistic text analyses of nursing records in order to inform future research in this emerging area of research. Systematic searches in reference databases and in citation indexes identified 12 articles...... that included analyses of the social and linguistic features of records and recording. Two reviewers extracted data using established criteria for the evaluation of qualitative research papers. A common characteristic of nursing records was the economical use of language with local meanings that conveyed little...

  14. Analysis of Tense Interferential of Verbs in Old Narrative Texts

    OpenAIRE

    Amir Zeighami; Mahmood Barati khansari; Hassan Ziyari

    2014-01-01

    Abstract One of the admirable methods to compose stories in Persian verse and prose, is the present Tense verbs in the meaning of past tense. This grammatical point has been hidden in the grammarian and stylist's point of view although it has been repeatedly mentioned in the texts and this point has been not mentioned in the grammatical books but some of the investigators and literati have pointed out it in their correction works. We mention their sayings: firstly, Allame Qazvini, doub...

  15. COalitions in COOperation Networks (COCOON): Social Network Analysis and Game Theory to Enhance Cooperation Networks

    NARCIS (Netherlands)

    Sie, Rory

    2012-01-01

    Sie, R. L. L. (2012). COalitions in COOperation Networks (COCOON): Social Network Analysis and Game Theory to Enhance Cooperation Networks (Unpublished doctoral dissertation). September, 28, 2012, Open Universiteit in the Netherlands (CELSTEC), Heerlen, The Netherlands.

  16. Deep Learning Neural Networks and Bayesian Neural Networks in Data Analysis

    Directory of Open Access Journals (Sweden)

    Chernoded Andrey

    2017-01-01

    Full Text Available Most of the modern analyses in high energy physics use signal-versus-background classification techniques of machine learning methods and neural networks in particular. Deep learning neural network is the most promising modern technique to separate signal and background and now days can be widely and successfully implemented as a part of physical analysis. In this article we compare Deep learning and Bayesian neural networks application as a classifiers in an instance of top quark analysis.

  17. Mining Sequential Update Summarization with Hierarchical Text Analysis

    Directory of Open Access Journals (Sweden)

    Chunyun Zhang

    2016-01-01

    Full Text Available The outbreak of unexpected news events such as large human accident or natural disaster brings about a new information access problem where traditional approaches fail. Mostly, news of these events shows characteristics that are early sparse and later redundant. Hence, it is very important to get updates and provide individuals with timely and important information of these incidents during their development, especially when being applied in wireless and mobile Internet of Things (IoT. In this paper, we define the problem of sequential update summarization extraction and present a new hierarchical update mining system which can broadcast with useful, new, and timely sentence-length updates about a developing event. The new system proposes a novel method, which incorporates techniques from topic-level and sentence-level summarization. To evaluate the performance of the proposed system, we apply it to the task of sequential update summarization of temporal summarization (TS track at Text Retrieval Conference (TREC 2013 to compute four measurements of the update mining system: the expected gain, expected latency gain, comprehensiveness, and latency comprehensiveness. Experimental results show that our proposed method has good performance.

  18. Identification of candidate genes in Populus cell wall biosynthesis using text-mining, co-expression network and comparative genomics

    Energy Technology Data Exchange (ETDEWEB)

    Yang, Xiaohan [ORNL; Ye, Chuyu [ORNL; Bisaria, Anjali [ORNL; Tuskan, Gerald A [ORNL; Kalluri, Udaya C [ORNL

    2011-01-01

    Populus is an important bioenergy crop for bioethanol production. A greater understanding of cell wall biosynthesis processes is critical in reducing biomass recalcitrance, a major hindrance in efficient generation of ethanol from lignocellulosic biomass. Here, we report the identification of candidate cell wall biosynthesis genes through the development and application of a novel bioinformatics pipeline. As a first step, via text-mining of PubMed publications, we obtained 121 Arabidopsis genes that had the experimental evidences supporting their involvement in cell wall biosynthesis or remodeling. The 121 genes were then used as bait genes to query an Arabidopsis co-expression database and additional genes were identified as neighbors of the bait genes in the network, increasing the number of genes to 548. The 548 Arabidopsis genes were then used to re-query the Arabidopsis co-expression database and re-construct a network that captured additional network neighbors, expanding to a total of 694 genes. The 694 Arabidopsis genes were computationally divided into 22 clusters. Queries of the Populus genome using the Arabidopsis genes revealed 817 Populus orthologs. Functional analysis of gene ontology and tissue-specific gene expression indicated that these Arabidopsis and Populus genes are high likelihood candidates for functional genomics in relation to cell wall biosynthesis.

  19. GEOMORPHOLOGIC ANALYSIS OF DRAINAGE NETWORKS ON MARS

    Directory of Open Access Journals (Sweden)

    KERESZTURI ÁKOS

    2012-06-01

    Full Text Available Altogether 327 valleys and their 314 cross-sectional profiles were analyzed on Mars, including width, depth, length, eroded volume, drainage and spatial density, as well as the network structure.According to this systematic analysis, five possible drainage network types were identified such as (a small valleys, (b integrated small valleys, (c individual, medium-sized valleys, (d unconfined,anastomosing outflow valleys, and (e confined outflow valleys. Measuring their various morphometric parameters, these five networks differ from each other in terms of parameters of the eroded volume, drainage density and depth values. This classification is more detailed than those described in the literature previously and correlated to several numerical parameters for the first time.These different types were probably formed during different periods of the evolution of Mars, and sprung from differently localized water sources, and they could be correlated to similar fluvialnetwork types from the Earth.

  20. Systematic analysis of molecular mechanisms for HCC metastasis via text mining approach.

    Science.gov (United States)

    Zhen, Cheng; Zhu, Caizhong; Chen, Haoyang; Xiong, Yiru; Tan, Junyuan; Chen, Dong; Li, Jin

    2017-02-21

    To systematically explore the molecular mechanism for hepatocellular carcinoma (HCC) metastasis and identify regulatory genes with text mining methods. Genes with highest frequencies and significant pathways related to HCC metastasis were listed. A handful of proteins such as EGFR, MDM2, TP53 and APP, were identified as hub nodes in PPI (protein-protein interaction) network. Compared with unique genes for HBV-HCCs, genes particular to HCV-HCCs were less, but may participate in more extensive signaling processes. VEGFA, PI3KCA, MAPK1, MMP9 and other genes may play important roles in multiple phenotypes of metastasis. Genes in abstracts of HCC-metastasis literatures were identified. Word frequency analysis, KEGG pathway and PPI network analysis were performed. Then co-occurrence analysis between genes and metastasis-related phenotypes were carried out. Text mining is effective for revealing potential regulators or pathways, but the purpose of it should be specific, and the combination of various methods will be more useful.

  1. Analysis on policies text of air pollution control in Beijing

    Science.gov (United States)

    ZHANG, Yujuan; WANG, Wen; ZHANG, Wei

    2017-04-01

    Air pollution is one of the most serious environmental problems, and it is also the inevitable result of the extensive economic development mode. The matter of air pollution in Beijing is becoming more and more serious since 2010, which has a great impact on the normal social production, living and human health. These hazards have been highly valued by the whole society. More than 30 years have been pasted since controlling the air pollution and the system of policies was relatively complete. These policies have improved the quality of atmospheric and prevented environment further deterioration. The policies performance is not obvious. It is urgent trouble to improve policy performance. This paper analyzes the 103 policies text of air pollution control in Beijing, and researches status, history and problems, and put forward suggestions on policy improvement and innovation at last.

  2. Neurolinguistic approach to natural language processing with applications to medical text analysis.

    Science.gov (United States)

    Duch, Włodzisław; Matykiewicz, Paweł; Pestian, John

    2008-12-01

    Understanding written or spoken language presumably involves spreading neural activation in the brain. This process may be approximated by spreading activation in semantic networks, providing enhanced representations that involve concepts not found directly in the text. The approximation of this process is of great practical and theoretical interest. Although activations of neural circuits involved in representation of words rapidly change in time snapshots of these activations spreading through associative networks may be captured in a vector model. Concepts of similar type activate larger clusters of neurons, priming areas in the left and right hemisphere. Analysis of recent brain imaging experiments shows the importance of the right hemisphere non-verbal clusterization. Medical ontologies enable development of a large-scale practical algorithm to re-create pathways of spreading neural activations. First concepts of specific semantic type are identified in the text, and then all related concepts of the same type are added to the text, providing expanded representations. To avoid rapid growth of the extended feature space after each step only the most useful features that increase document clusterization are retained. Short hospital discharge summaries are used to illustrate how this process works on a real, very noisy data. Expanded texts show significantly improved clustering and may be classified with much higher accuracy. Although better approximations to the spreading of neural activations may be devised a practical approach presented in this paper helps to discover pathways used by the brain to process specific concepts, and may be used in large-scale applications.

  3. Networks and network analysis for defence and security

    CERN Document Server

    Masys, Anthony J

    2014-01-01

    Networks and Network Analysis for Defence and Security discusses relevant theoretical frameworks and applications of network analysis in support of the defence and security domains. This book details real world applications of network analysis to support defence and security. Shocks to regional, national and global systems stemming from natural hazards, acts of armed violence, terrorism and serious and organized crime have significant defence and security implications. Today, nations face an uncertain and complex security landscape in which threats impact/target the physical, social, economic

  4. Unraveling protein networks with power graph analysis.

    Science.gov (United States)

    Royer, Loïc; Reimann, Matthias; Andreopoulos, Bill; Schroeder, Michael

    2008-07-11

    Networks play a crucial role in computational biology, yet their analysis and representation is still an open problem. Power Graph Analysis is a lossless transformation of biological networks into a compact, less redundant representation, exploiting the abundance of cliques and bicliques as elementary topological motifs. We demonstrate with five examples the advantages of Power Graph Analysis. Investigating protein-protein interaction networks, we show how the catalytic subunits of the casein kinase II complex are distinguishable from the regulatory subunits, how interaction profiles and sequence phylogeny of SH3 domains correlate, and how false positive interactions among high-throughput interactions are spotted. Additionally, we demonstrate the generality of Power Graph Analysis by applying it to two other types of networks. We show how power graphs induce a clustering of both transcription factors and target genes in bipartite transcription networks, and how the erosion of a phosphatase domain in type 22 non-receptor tyrosine phosphatases is detected. We apply Power Graph Analysis to high-throughput protein interaction networks and show that up to 85% (56% on average) of the information is redundant. Experimental networks are more compressible than rewired ones of same degree distribution, indicating that experimental networks are rich in cliques and bicliques. Power Graphs are a novel representation of networks, which reduces network complexity by explicitly representing re-occurring network motifs. Power Graphs compress up to 85% of the edges in protein interaction networks and are applicable to all types of networks such as protein interactions, regulatory networks, or homology networks.

  5. Signed Link Analysis in Social Media Networks

    OpenAIRE

    Beigi, Ghazaleh; Tang, Jiliang; Liu, Huan

    2016-01-01

    Numerous real-world relations can be represented by signed networks with positive links (e.g., trust) and negative links (e.g., distrust). Link analysis plays a crucial role in understanding the link formation and can advance various tasks in social network analysis such as link prediction. The majority of existing works on link analysis have focused on unsigned social networks. The existence of negative links determines that properties and principles of signed networks are substantially dist...

  6. Social network analysis in medical education

    OpenAIRE

    Isba, Rachel; Woolf, Katherine; Hanneman, Robert

    2016-01-01

    Content\\ud Humans are fundamentally social beings. The social systems within which we live our lives (families, schools, workplaces, professions, friendship groups) have a significant influence on our health, success and well-being. These groups can be characterised as networks and analysed using social network analysis.\\ud \\ud Social Network Analysis\\ud Social network analysis is a mainly quantitative method for analysing how relationships between individuals form and affect those individual...

  7. Learning Spatial-Semantic Context with Fully Convolutional Recurrent Network for Online Handwritten Chinese Text Recognition.

    Science.gov (United States)

    Xie, Zecheng; Sun, Zenghui; Jin, Lianwen; Ni, Hao; Lyons, Terry

    2017-07-28

    Online handwritten Chinese text recognition (OHCTR) is a challenging problem as it involves a large-scale character set, ambiguous segmentation, and variable-length input sequences. In this paper, we exploit the outstanding capability of path signature to translate online pen-tip trajectories into informative signature feature maps, successfully capturing the analytic and geometric properties of pen strokes with strong local invariance and robustness. A multi-spatial-context fully convolutional recurrent network (MC-FCRN) is proposed to exploit the multiple spatial contexts from the signature feature maps and generate a prediction sequence while completely avoiding the difficult segmentation problem. Furthermore, an implicit language model is developed to make predictions based on semantic context within a predicting feature sequence, providing a new perspective for incorporating lexicon constraints and prior knowledge about a certain language in the recognition procedure. Experiments on two standard benchmarks, Dataset-CASIA and Dataset-ICDAR, yielded outstanding results, with correct rates of 97.50% and 96.58%, respectively, which are significantly better than the best result reported thus far in the literature.

  8. Sensor Network Information Analytical Methods: Analysis of Similarities and Differences

    Directory of Open Access Journals (Sweden)

    Chen Jian

    2014-04-01

    Full Text Available In the Sensor Network information engineering literature, few references focus on the definition and design of Sensor Network information analytical methods. Among those that do are Munson, et al. and the ISO standards on functional size analysis. To avoid inconsistent vocabulary and potentially incorrect interpretation of data, Sensor Network information analytical methods must be better designed, including definitions, analysis principles, analysis rules, and base units. This paper analyzes the similarities and differences across three different views of analytical methods, and uses a process proposed for the design of Sensor Network information analytical methods to analyze two examples of such methods selected from the literature.

  9. Data Farming Process and Initial Network Analysis Capabilities

    Directory of Open Access Journals (Sweden)

    Gary Horne

    2016-01-01

    Full Text Available Data Farming, network applications and approaches to integrate network analysis and processes to the data farming paradigm are presented as approaches to address complex system questions. Data Farming is a quantified approach that examines questions in large possibility spaces using modeling and simulation. It evaluates whole landscapes of outcomes to draw insights from outcome distributions and outliers. Social network analysis and graph theory are widely used techniques for the evaluation of social systems. Incorporation of these techniques into the data farming process provides analysts examining complex systems with a powerful new suite of tools for more fully exploring and understanding the effect of interactions in complex systems. The integration of network analysis with data farming techniques provides modelers with the capability to gain insight into the effect of network attributes, whether the network is explicitly defined or emergent, on the breadth of the model outcome space and the effect of model inputs on the resultant network statistics.

  10. Analysis of cascading failure in gene networks

    Directory of Open Access Journals (Sweden)

    Shudong eWang

    2012-12-01

    Full Text Available It is an important subject to research the functional mechanism of cancer-related genes make in formation and development of cancers. The modern methodology of data analysis plays a very important role for deducing the relationship between cancers and cancer-related genes and analyzing functional mechanism of genome. In this research, we construct mutual information networks using gene expression profiles of glioblast and renal in normal condition and cancer conditions. We investigate the relationship between structure and robustness in gene networks of the two tissues using a cascading failure model based on betweenness centrality. Define some important parameters such as the percentage of failure nodes of the network, the average size-ratio of cascading failure and the cumulative probability of size-ratio of cascading failure to measure the robustness of the networks. By comparing control group and experiment groups, we find that the networks of experiment groups are more robust than that of control group. The gene that can cause large scale failure is called structural key gene (SKG. Some of them have been confirmed to be closely related to the formation and development of glioma and renal cancer respectively. Most of them are predicted to play important roles during the formation of glioma and renal cancer, maybe the oncogenes, suppressor genes, and other cancer candidate genes in the glioma and renal cancer cells. However, these studies provide little information about the detailed roles of identified cancer genes.

  11. Structural Analysis of Complex Networks

    CERN Document Server

    Dehmer, Matthias

    2011-01-01

    Filling a gap in literature, this self-contained book presents theoretical and application-oriented results that allow for a structural exploration of complex networks. The work focuses not only on classical graph-theoretic methods, but also demonstrates the usefulness of structural graph theory as a tool for solving interdisciplinary problems. Applications to biology, chemistry, linguistics, and data analysis are emphasized. The book is suitable for a broad, interdisciplinary readership of researchers, practitioners, and graduate students in discrete mathematics, statistics, computer science,

  12. Topological Analysis of Wireless Networks (TAWN)

    Science.gov (United States)

    2016-05-31

    19b. TELEPHONE NUMBER (Include area code) 31-05-2016 FINAL REPORT 12-02-2015 -- 31-05-2016 Topological Analysis of Wireless Networks (TAWN) Robinson...mathematical literature on sheaves that describes how to draw global ( network -wide) inferences from them. Wireless network , local homology, sheaf...topology U U U UU 32 Michael Robinson 202-885-3681 Final Report: May 2016 Topological Analysis of Wireless Networks Principal Investigator: Prof. Michael

  13. Interdependent multi-layer networks: modeling and survivability analysis with applications to space-based networks.

    Directory of Open Access Journals (Sweden)

    Jean-Francois Castet

    Full Text Available This article develops a novel approach and algorithmic tools for the modeling and survivability analysis of networks with heterogeneous nodes, and examines their application to space-based networks. Space-based networks (SBNs allow the sharing of spacecraft on-orbit resources, such as data storage, processing, and downlink. Each spacecraft in the network can have different subsystem composition and functionality, thus resulting in node heterogeneity. Most traditional survivability analyses of networks assume node homogeneity and as a result, are not suited for the analysis of SBNs. This work proposes that heterogeneous networks can be modeled as interdependent multi-layer networks, which enables their survivability analysis. The multi-layer aspect captures the breakdown of the network according to common functionalities across the different nodes, and it allows the emergence of homogeneous sub-networks, while the interdependency aspect constrains the network to capture the physical characteristics of each node. Definitions of primitives of failure propagation are devised. Formal characterization of interdependent multi-layer networks, as well as algorithmic tools for the analysis of failure propagation across the network are developed and illustrated with space applications. The SBN applications considered consist of several networked spacecraft that can tap into each other's Command and Data Handling subsystem, in case of failure of its own, including the Telemetry, Tracking and Command, the Control Processor, and the Data Handling sub-subsystems. Various design insights are derived and discussed, and the capability to perform trade-space analysis with the proposed approach for various network characteristics is indicated. The select results here shown quantify the incremental survivability gains (with respect to a particular class of threats of the SBN over the traditional monolith spacecraft. Failure of the connectivity between nodes is also

  14. Use of sentiment analysis for capturing patient experience from free-text comments posted online.

    Science.gov (United States)

    Greaves, Felix; Ramirez-Cano, Daniel; Millett, Christopher; Darzi, Ara; Donaldson, Liam

    2013-11-01

    There are large amounts of unstructured, free-text information about quality of health care available on the Internet in blogs, social networks, and on physician rating websites that are not captured in a systematic way. New analytical techniques, such as sentiment analysis, may allow us to understand and use this information more effectively to improve the quality of health care. We attempted to use machine learning to understand patients' unstructured comments about their care. We used sentiment analysis techniques to categorize online free-text comments by patients as either positive or negative descriptions of their health care. We tried to automatically predict whether a patient would recommend a hospital, whether the hospital was clean, and whether they were treated with dignity from their free-text description, compared to the patient's own quantitative rating of their care. We applied machine learning techniques to all 6412 online comments about hospitals on the English National Health Service website in 2010 using Weka data-mining software. We also compared the results obtained from sentiment analysis with the paper-based national inpatient survey results at the hospital level using Spearman rank correlation for all 161 acute adult hospital trusts in England. There was 81%, 84%, and 89% agreement between quantitative ratings of care and those derived from free-text comments using sentiment analysis for cleanliness, being treated with dignity, and overall recommendation of hospital respectively (kappa scores: .40-.74, P<.001 for all). We observed mild to moderate associations between our machine learning predictions and responses to the large patient survey for the three categories examined (Spearman rho 0.37-0.51, P<.001 for all). The prediction accuracy that we have achieved using this machine learning process suggests that we are able to predict, from free-text, a reasonably accurate assessment of patients' opinion about different performance aspects of

  15. Google matrix analysis of directed networks

    Science.gov (United States)

    Ermann, Leonardo; Frahm, Klaus M.; Shepelyansky, Dima L.

    2015-10-01

    In the past decade modern societies have developed enormous communication and social networks. Their classification and information retrieval processing has become a formidable task for the society. Because of the rapid growth of the World Wide Web, and social and communication networks, new mathematical methods have been invented to characterize the properties of these networks in a more detailed and precise way. Various search engines extensively use such methods. It is highly important to develop new tools to classify and rank a massive amount of network information in a way that is adapted to internal network structures and characteristics. This review describes the Google matrix analysis of directed complex networks demonstrating its efficiency using various examples including the World Wide Web, Wikipedia, software architectures, world trade, social and citation networks, brain neural networks, DNA sequences, and Ulam networks. The analytical and numerical matrix methods used in this analysis originate from the fields of Markov chains, quantum chaos, and random matrix theory.

  16. Reliability Analysis of Wireless Sensor Networks Using Markovian Model

    Directory of Open Access Journals (Sweden)

    Jin Zhu

    2012-01-01

    Full Text Available This paper investigates reliability analysis of wireless sensor networks whose topology is switching among possible connections which are governed by a Markovian chain. We give the quantized relations between network topology, data acquisition rate, nodes' calculation ability, and network reliability. By applying Lyapunov method, sufficient conditions of network reliability are proposed for such topology switching networks with constant or varying data acquisition rate. With the conditions satisfied, the quantity of data transported over wireless network node will not exceed node capacity such that reliability is ensured. Our theoretical work helps to provide a deeper understanding of real-world wireless sensor networks, which may find its application in the fields of network design and topology control.

  17. Investigating communication networks contextually: Qualitative network analysis as cross-media research

    Directory of Open Access Journals (Sweden)

    Andreas Hepp

    2016-06-01

    Full Text Available This article introduces the approach of contextualised communication network analysis as a qualitative procedure for researching communicative relationships realised through the media. It combines qualitative interviews on media appropriation, egocentric network maps, and media diaries. Through the triangulation of these methods of data collection, it is possible to gain a differentiated insight into the specific meanings, structures and processes of communication networks across a variety of media. The approach is illustrated using a recent study dealing with the mediatisation of community building among young people. In this context, the qualitative communication network analysis has been applied to distinguish “localists” from “centrists”, “multilocalists”, and “pluralists”. These different “horizons of mediatised communitisation” are connected to distinct communication networks. Since this involves today a variety of different media, the contextual analysis of communication networks necessarily has to imply a cross-media perspective.

  18. Social network analysis community detection and evolution

    CERN Document Server

    Missaoui, Rokia

    2015-01-01

    This book is devoted to recent progress in social network analysis with a high focus on community detection and evolution. The eleven chapters cover the identification of cohesive groups, core components and key players either in static or dynamic networks of different kinds and levels of heterogeneity. Other important topics in social network analysis such as influential detection and maximization, information propagation, user behavior analysis, as well as network modeling and visualization are also presented. Many studies are validated through real social networks such as Twitter. This edit

  19. Social network analysis and dual rover communications

    Science.gov (United States)

    Litaker, Harry L.; Howard, Robert L.

    2013-10-01

    Social network analysis (SNA) refers to the collection of techniques, tools, and methods used in sociometry aiming at the analysis of social networks to investigate decision making, group communication, and the distribution of information. Human factors engineers at the National Aeronautics and Space Administration (NASA) conducted a social network analysis on communication data collected during a 14-day field study operating a dual rover exploration mission to better understand the relationships between certain network groups such as ground control, flight teams, and planetary science. The analysis identified two communication network structures for the continuous communication and Twice-a-Day Communication scenarios as a split network and negotiated network respectfully. The major nodes or groups for the networks' architecture, transmittal status, and information were identified using graphical network mapping, quantitative analysis of subjective impressions, and quantified statistical analysis using Sociometric Statue and Centrality. Post-questionnaire analysis along with interviews revealed advantages and disadvantages of each network structure with team members identifying the need for a more stable continuous communication network, improved robustness of voice loops, and better systems training/capabilities for scientific imagery data and operational data during Twice-a-Day Communications.

  20. Network of anatomical texts (NAnaTex), an open-source project for visualizing the interaction between anatomical terms.

    Science.gov (United States)

    Momota, Ryusuke; Ohtsuka, Aiji

    2018-01-01

    Anatomy is the science and art of understanding the structure of the body and its components in relation to the functions of the whole-body system. Medicine is based on a deep understanding of anatomy, but quite a few introductory-level learners are overwhelmed by the sheer amount of anatomical terminology that must be understood, so they regard anatomy as a dull and dense subject. To help them learn anatomical terms in a more contextual way, we started a new open-source project, the Network of Anatomical Texts (NAnaTex), which visualizes relationships of body components by integrating text-based anatomical information using Cytoscape, a network visualization software platform. Here, we present a network of bones and muscles produced from literature descriptions. As this network is primarily text-based and does not require any programming knowledge, it is easy to implement new functions or provide extra information by making changes to the original text files. To facilitate collaborations, we deposited the source code files for the network into the GitHub repository ( https://github.com/ryusukemomota/nanatex ) so that anybody can participate in the evolution of the network and use it for their own non-profit purposes. This project should help not only introductory-level learners but also professional medical practitioners, who could use it as a quick reference.

  1. Service network analysis for agricultural mental health

    Directory of Open Access Journals (Sweden)

    Fuller Jeffrey D

    2009-05-01

    Full Text Available Abstract Background Farmers represent a subgroup of rural and remote communities at higher risk of suicide attributed to insecure economic futures, self-reliant cultures and poor access to health services. Early intervention models are required that tap into existing farming networks. This study describes service networks in rural shires that relate to the mental health needs of farming families. This serves as a baseline to inform service network improvements. Methods A network survey of mental health related links between agricultural support, health and other human services in four drought declared shires in comparable districts in rural New South Wales, Australia. Mental health links covered information exchange, referral recommendations and program development. Results 87 agencies from 111 (78% completed a survey. 79% indicated that two thirds of their clients needed assistance for mental health related problems. The highest mean number of interagency links concerned information exchange and the frequency of these links between sectors was monthly to three monthly. The effectiveness of agricultural support and health sector links were rated as less effective by the agricultural support sector than by the health sector (p Conclusion Aligning with agricultural agencies is important to build effective mental health service pathways to address the needs of farming populations. Work is required to ensure that these agricultural support agencies have operational and effective links to primary mental health care services. Network analysis provides a baseline to inform this work. With interventions such as local mental health training and joint service planning to promote network development we would expect to see over time an increase in the mean number of links, the frequency in which these links are used and the rated effectiveness of these links.

  2. Applications of Social Network Analysis

    Science.gov (United States)

    Thilagam, P. Santhi

    A social network [2] is a description of the social structure between actors, mostly persons, groups or organizations. It indicates the ways in which they are connected with each other by some relationship such as friendship, kinship, finance exchange etc. In a nutshell, when the person uses already known/unknown people to create new contacts, it forms social networking. The social network is not a new concept rather it can be formed when similar people interact with each other directly or indirectly to perform particular task. Examples of social networks include a friendship networks, collaboration networks, co-authorship networks, and co-employees networks which depict the direct interaction among the people. There are also other forms of social networks, such as entertainment networks, business Networks, citation networks, and hyperlink networks, in which interaction among the people is indirect. Generally, social networks operate on many levels, from families up to the level of nations and assists in improving interactive knowledge sharing, interoperability and collaboration.

  3. Understanding complex interactions using social network analysis.

    Science.gov (United States)

    Pow, Janette; Gayen, Kaberi; Elliott, Lawrie; Raeside, Robert

    2012-10-01

    The aim of this paper is to raise the awareness of social network analysis as a method to facilitate research in nursing research. The application of social network analysis in assessing network properties has allowed greater insight to be gained in many areas including sociology, politics, business organisation and health care. However, the use of social networks in nursing has not received sufficient attention. Review of literature and illustration of the application of the method of social network analysis using research examples. First, the value of social networks will be discussed. Then by using illustrative examples, the value of social network analysis to nursing will be demonstrated. The method of social network analysis is found to give greater insights into social situations involving interactions between individuals and has particular application to the study of interactions between nurses and between nurses and patients and other actors. Social networks are systems in which people interact. Two quantitative techniques help our understanding of these networks. The first is visualisation of the network. The second is centrality. Individuals with high centrality are key communicators in a network. Applying social network analysis to nursing provides a simple method that helps gain an understanding of human interaction and how this might influence various health outcomes. It allows influential individuals (actors) to be identified. Their influence on the formation of social norms and communication can determine the extent to which new interventions or ways of thinking are accepted by a group. Thus, working with key individuals in a network could be critical to the success and sustainability of an intervention. Social network analysis can also help to assess the effectiveness of such interventions for the recipient and the service provider. © 2012 Blackwell Publishing Ltd.

  4. Network meta-analysis, electrical networks and graph theory.

    Science.gov (United States)

    Rücker, Gerta

    2012-12-01

    Network meta-analysis is an active field of research in clinical biostatistics. It aims to combine information from all randomized comparisons among a set of treatments for a given medical condition. We show how graph-theoretical methods can be applied to network meta-analysis. A meta-analytic graph consists of vertices (treatments) and edges (randomized comparisons). We illustrate the correspondence between meta-analytic networks and electrical networks, where variance corresponds to resistance, treatment effects to voltage, and weighted treatment effects to current flows. Based thereon, we then show that graph-theoretical methods that have been routinely applied to electrical networks also work well in network meta-analysis. In more detail, the resulting consistent treatment effects induced in the edges can be estimated via the Moore-Penrose pseudoinverse of the Laplacian matrix. Moreover, the variances of the treatment effects are estimated in analogy to electrical effective resistances. It is shown that this method, being computationally simple, leads to the usual fixed effect model estimate when applied to pairwise meta-analysis and is consistent with published results when applied to network meta-analysis examples from the literature. Moreover, problems of heterogeneity and inconsistency, random effects modeling and including multi-armed trials are addressed. Copyright © 2012 John Wiley & Sons, Ltd. Copyright © 2012 John Wiley & Sons, Ltd.

  5. Statistical Analysis of Bus Networks in India

    CERN Document Server

    Chatterjee, Atanu; Ramadurai, Gitakrishnan

    2015-01-01

    Through the past decade the field of network science has established itself as a common ground for the cross-fertilization of exciting inter-disciplinary studies which has motivated researchers to model almost every physical system as an interacting network consisting of nodes and links. Although public transport networks such as airline and railway networks have been extensively studied, the status of bus networks still remains in obscurity. In developing countries like India, where bus networks play an important role in day-to-day commutation, it is of significant interest to analyze its topological structure and answer some of the basic questions on its evolution, growth, robustness and resiliency. In this paper, we model the bus networks of major Indian cities as graphs in \\textit{L}-space, and evaluate their various statistical properties using concepts from network science. Our analysis reveals a wide spectrum of network topology with the common underlying feature of small-world property. We observe tha...

  6. Hearing health network: a spatial analysis

    Directory of Open Access Journals (Sweden)

    Camila Ferreira de Rezende

    2015-06-01

    Full Text Available INTRODUCTION: In order to meet the demands of the patient population with hearing impairment, the Hearing Health Care Network was created, consisting of primary care actions of medium and high complexity. Spatial analysis through geoprocessing is a way to understand the organization of such services. OBJECTIVE: To analyze the organization of the Hearing Health Care Network of the State of Minas Gerais. METHODS: Cross-sectional analytical study using geoprocessing techniques. The absolute frequency and the frequency per 1000 inhabitants of the following variables were analyzed: assessment and diagnosis, selection and adaptation of hearing aids, follow-up, and speech therapy. The spatial analysis unit was the health micro-region. RESULTS: The assessment and diagnosis, selection, and adaptation of hearing aids and follow-up had a higher absolute number in the micro-regions with hearing health services. The follow-up procedure showed the lowest occurrence. Speech therapy showed higher occurrence in the state, both in absolute numbers, as well as per population. CONCLUSION: The use of geoprocessing techniques allowed the identification of the care flow as a function of the procedure performance frequency, population concentration, and territory distribution. All procedures offered by the Hearing Health Care Network are performed for users of all micro-regions of the state.

  7. Using Web Crawler Technology for Text Analysis of Geo-Events: A Case Study of the Huangyan Island Incident

    Science.gov (United States)

    Hu, H.; Ge, Y. J.

    2013-11-01

    With the social networking and network socialisation have brought more text information and social relationships into our daily lives, the question of whether big data can be fully used to study the phenomenon and discipline of natural sciences has prompted many specialists and scholars to innovate their research. Though politics were integrally involved in the hyperlinked word issues since 1990s, automatic assembly of different geospatial web and distributed geospatial information systems utilizing service chaining have explored and built recently, the information collection and data visualisation of geo-events have always faced the bottleneck of traditional manual analysis because of the sensibility, complexity, relativity, timeliness and unexpected characteristics of political events. Based on the framework of Heritrix and the analysis of web-based text, word frequency, sentiment tendency and dissemination path of the Huangyan Island incident is studied here by combining web crawler technology and the text analysis method. The results indicate that tag cloud, frequency map, attitudes pie, individual mention ratios and dissemination flow graph based on the data collection and processing not only highlight the subject and theme vocabularies of related topics but also certain issues and problems behind it. Being able to express the time-space relationship of text information and to disseminate the information regarding geo-events, the text analysis of network information based on focused web crawler technology can be a tool for understanding the formation and diffusion of web-based public opinions in political events.

  8. Egocentric social network analysis of pathological gambling.

    Science.gov (United States)

    Meisel, Matthew K; Clifton, Allan D; Mackillop, James; Miller, Joshua D; Campbell, W Keith; Goodie, Adam S

    2013-03-01

    To apply social network analysis (SNA) to investigate whether frequency and severity of gambling problems were associated with different network characteristics among friends, family and co-workers is an innovative way to look at relationships among individuals; the current study was the first, to our knowledge, to apply SNA to gambling behaviors. Egocentric social network analysis was used to characterize formally the relationships between social network characteristics and gambling pathology. Laboratory-based questionnaire and interview administration. Forty frequent gamblers (22 non-pathological gamblers, 18 pathological gamblers) were recruited from the community. The SNA revealed significant social network compositional differences between the two groups: pathological gamblers (PGs) had more gamblers, smokers and drinkers in their social networks than did non-pathological gamblers (NPGs). PGs had more individuals in their network with whom they personally gambled, smoked and drank than those with who were NPG. Network ties were closer to individuals in their networks who gambled, smoked and drank more frequently. Associations between gambling severity and structural network characteristics were not significant. Pathological gambling is associated with compositional but not structural differences in social networks. Pathological gamblers differ from non-pathological gamblers in the number of gamblers, smokers and drinkers in their social networks. Homophily within the networks also indicates that gamblers tend to be closer with other gamblers. This homophily may serve to reinforce addictive behaviors, and may suggest avenues for future study or intervention. © 2012 The Authors, Addiction © 2012 Society for the Study of Addiction.

  9. Statistical Network Analysis for Functional MRI: Mean Networks and Group Comparisons.

    Directory of Open Access Journals (Sweden)

    Cedric E Ginestet

    2014-05-01

    Full Text Available Comparing networks in neuroscience is hard, because the topological properties of a given network are necessarily dependent on the number of edges of that network. This problem arises in the analysis of both weighted and unweighted networks. The term density is often used in this context, in order to refer to the mean edge weight of a weighted network, or to the number of edges in an unweighted one. Comparing families of networks is therefore statistically difficult because differences in topology are necessarily associated with differences in density. In this review paper, we consider this problem from two different perspectives, which include (i the construction of summary networks, such as how to compute and visualize the mean network from a sample of network-valued data points; and (ii how to test for topological differences, when two families of networks also exhibit significant differences in density. In the first instance, we show that the issue of summarizing a family of networks can be conducted by either adopting a mass-univariate approach, which produces a statistical parametric network (SPN, or by directly computing the mean network, provided that a metric has been specified on the space of all networks with a given number of nodes. In the second part of this review, we then highlight the inherent problems associated with the comparison of topological functions of families of networks that differ in density. In particular, we show that a wide range of topological summaries, such as global efficiency and network modularity are highly sensitive to differences in density. Moreover, these problems are not restricted to unweighted metrics, as we demonstrate that the same issues remain present when considering the weighted versions of these metrics. We conclude by encouraging caution, when reporting such statistical comparisons, and by emphasizing the importance of constructing summary networks.

  10. The potential of text mining in data integration and network biology for plant research: a case study on Arabidopsis.

    Science.gov (United States)

    Van Landeghem, Sofie; De Bodt, Stefanie; Drebert, Zuzanna J; Inzé, Dirk; Van de Peer, Yves

    2013-03-01

    Despite the availability of various data repositories for plant research, a wealth of information currently remains hidden within the biomolecular literature. Text mining provides the necessary means to retrieve these data through automated processing of texts. However, only recently has advanced text mining methodology been implemented with sufficient computational power to process texts at a large scale. In this study, we assess the potential of large-scale text mining for plant biology research in general and for network biology in particular using a state-of-the-art text mining system applied to all PubMed abstracts and PubMed Central full texts. We present extensive evaluation of the textual data for Arabidopsis thaliana, assessing the overall accuracy of this new resource for usage in plant network analyses. Furthermore, we combine text mining information with both protein-protein and regulatory interactions from experimental databases. Clusters of tightly connected genes are delineated from the resulting network, illustrating how such an integrative approach is essential to grasp the current knowledge available for Arabidopsis and to uncover gene information through guilt by association. All large-scale data sets, as well as the manually curated textual data, are made publicly available, hereby stimulating the application of text mining data in future plant biology studies.

  11. Fishing for Clickbaits in Social Images and Texts with Linguistically-Infused Neural Network Models

    OpenAIRE

    Glenski, Maria; Ayton, Ellyn; Arendt, Dustin; Volkova, Svitlana

    2017-01-01

    This paper presents the results and conclusions of our participation in the Clickbait Challenge 2017 on automatic clickbait detection in social media. We first describe linguistically-infused neural network models and identify informative representations to predict the level of clickbaiting present in Twitter posts. Our models allow to answer the question not only whether a post is a clickbait or not, but to what extent it is a clickbait post e.g., not at all, slightly, considerably, or heavi...

  12. Network externalities in telecommunication industry: An analysis of Serbian market

    Directory of Open Access Journals (Sweden)

    Trifunović Dejan

    2016-01-01

    Full Text Available This paper deals with network competition and provides empirical analysis of market concentration, network and call externalities, access pricing, price discrimination and switching costs in Serbian mobile phone telecommunications market. It is shown that network externalities governed the expansion of this market until 2008. Upon entry of VIP incumbents didn't engage in predatory behaviour towards entrant aiming to benefit from locked- in users. The policy of mobile phone number portability reduced on-net prices and substantially increased consumer's surplus. In contrast to some previous research, this policy was pro-competitive in Serbia. We have also determined that users of the network with the largest market share benefit the most from call externalities. Finally, one network does not price discriminate between outgoing and incoming roaming calls, which implies that users of this network have higher level pecuniary externalities in roaming compared to users of price discriminating networks.

  13. Satellite image analysis using neural networks

    Science.gov (United States)

    Sheldon, Roger A.

    1990-01-01

    The tremendous backlog of unanalyzed satellite data necessitates the development of improved methods for data cataloging and analysis. Ford Aerospace has developed an image analysis system, SIANN (Satellite Image Analysis using Neural Networks) that integrates the technologies necessary to satisfy NASA's science data analysis requirements for the next generation of satellites. SIANN will enable scientists to train a neural network to recognize image data containing scenes of interest and then rapidly search data archives for all such images. The approach combines conventional image processing technology with recent advances in neural networks to provide improved classification capabilities. SIANN allows users to proceed through a four step process of image classification: filtering and enhancement, creation of neural network training data via application of feature extraction algorithms, configuring and training a neural network model, and classification of images by application of the trained neural network. A prototype experimentation testbed was completed and applied to climatological data.

  14. Social Network Analysis and informal trade

    DEFF Research Database (Denmark)

    Walther, Olivier

    networks can be applied to better understand informal trade in developing countries, with a particular focus on Africa. The paper starts by discussing some of the fundamental concepts developed by social network analysis. Through a number of case studies, we show how social network analysis can...... illuminate the relevant causes of social patterns, the impact of social ties on economic performance, the diffusion of resources and information, and the exercise of power. The paper then examines some of the methodological challenges of social network analysis and how it can be combined with other...

  15. Network analysis of unstructured EHR data for clinical research.

    Science.gov (United States)

    Bauer-Mehren, Anna; Lependu, Paea; Iyer, Srinivasan V; Harpaz, Rave; Leeper, Nicholas J; Shah, Nigam H

    2013-01-01

    In biomedical research, network analysis provides a conceptual framework for interpreting data from high-throughput experiments. For example, protein-protein interaction networks have been successfully used to identify candidate disease genes. Recently, advances in clinical text processing and the increasing availability of clinical data have enabled analogous analyses on data from electronic medical records. We constructed networks of diseases, drugs, medical devices and procedures using concepts recognized in clinical notes from the Stanford clinical data warehouse. We demonstrate the use of the resulting networks for clinical research informatics in two ways-cohort construction and outcomes analysis-by examining the safety of cilostazol in peripheral artery disease patients as a use case. We show that the network-based approaches can be used for constructing patient cohorts as well as for analyzing differences in outcomes by comparing with standard methods, and discuss the advantages offered by network-based approaches.

  16. 4th International Conference in Network Analysis

    CERN Document Server

    Koldanov, Petr; Pardalos, Panos

    2016-01-01

    The contributions in this volume cover a broad range of topics including maximum cliques, graph coloring, data mining, brain networks, Steiner forest, logistic and supply chain networks. Network algorithms and their applications to market graphs, manufacturing problems, internet networks and social networks are highlighted. The "Fourth International Conference in Network Analysis," held at the Higher School of Economics, Nizhny Novgorod in May 2014, initiated joint research between scientists, engineers and researchers from academia, industry and government; the major results of conference participants have been reviewed and collected in this Work. Researchers and students in mathematics, economics, statistics, computer science and engineering will find this collection a valuable resource filled with the latest research in network analysis.

  17. Improving Feature Representation Based on a Neural Network for Author Profiling in Social Media Texts.

    Science.gov (United States)

    Gómez-Adorno, Helena; Markov, Ilia; Sidorov, Grigori; Posadas-Durán, Juan-Pablo; Sanchez-Perez, Miguel A; Chanona-Hernandez, Liliana

    2016-01-01

    We introduce a lexical resource for preprocessing social media data. We show that a neural network-based feature representation is enhanced by using this resource. We conducted experiments on the PAN 2015 and PAN 2016 author profiling corpora and obtained better results when performing the data preprocessing using the developed lexical resource. The resource includes dictionaries of slang words, contractions, abbreviations, and emoticons commonly used in social media. Each of the dictionaries was built for the English, Spanish, Dutch, and Italian languages. The resource is freely available.

  18. Weighted Complex Network Analysis of Shanghai Rail Transit System

    Directory of Open Access Journals (Sweden)

    Yingying Xing

    2016-01-01

    Full Text Available With increasing passenger flows and construction scale, Shanghai rail transit system (RTS has entered a new era of networking operation. In addition, the structure and properties of the RTS network have great implications for urban traffic planning, design, and management. Thus, it is necessary to acquire their network properties and impacts. In this paper, the Shanghai RTS, as well as passenger flows, will be investigated by using complex network theory. Both the topological and dynamic properties of the RTS network are analyzed and the largest connected cluster is introduced to assess the reliability and robustness of the RTS network. Simulation results show that the distribution of nodes strength exhibits a power-law behavior and Shanghai RTS network shows a strong weighted rich-club effect. This study also indicates that the intentional attacks are more detrimental to the RTS network than to the random weighted network, but the random attacks can cause slightly more damage to the random weighted network than to the RTS network. Our results provide a richer view of complex weighted networks in real world and possibilities of risk analysis and policy decisions for the RTS operation department.

  19. METHODOLOGY OF MATHEMATICAL ANALYSIS IN POWER NETWORK

    OpenAIRE

    Jerzy Szkutnik; Mariusz Kawecki

    2008-01-01

    Power distribution network analysis is taken into account. Based on correlation coefficient authors establish methodology of mathematical analysis useful in finding substations bear responsibility for power stoppage. Also methodology of risk assessment will be carried out.

  20. Measuring Road Network Vulnerability with Sensitivity Analysis

    Science.gov (United States)

    Jun-qiang, Leng; Long-hai, Yang; Liu, Wei-yi; Zhao, Lin

    2017-01-01

    This paper focuses on the development of a method for road network vulnerability analysis, from the perspective of capacity degradation, which seeks to identify the critical infrastructures in the road network and the operational performance of the whole traffic system. This research involves defining the traffic utility index and modeling vulnerability of road segment, route, OD (Origin Destination) pair and road network. Meanwhile, sensitivity analysis method is utilized to calculate the change of traffic utility index due to capacity degradation. This method, compared to traditional traffic assignment, can improve calculation efficiency and make the application of vulnerability analysis to large actual road network possible. Finally, all the above models and calculation method is applied to actual road network evaluation to verify its efficiency and utility. This approach can be used as a decision-supporting tool for evaluating the performance of road network and identifying critical infrastructures in transportation planning and management, especially in the resource allocation for mitigation and recovery. PMID:28125706

  1. Constructing an Intelligent Patent Network Analysis Method

    OpenAIRE

    Chao-Chan Wu; Ching-Bang Yao

    2012-01-01

    Patent network analysis, an advanced method of patent analysis, is a useful tool for technology management. This method visually displays all the relationships among the patents and enables the analysts to intuitively comprehend the overview of a set of patents in the field of the technology being studied. Although patent network analysis possesses relative advantages different from traditional methods of patent analysis, it is subject to several crucial limitations. To overcome the drawbacks...

  2. Complex Network Analysis of Pakistan Railways

    Directory of Open Access Journals (Sweden)

    Yasir Tariq Mohmand

    2014-01-01

    Full Text Available We study the structural properties of Pakistan railway network (PRN, where railway stations are considered as nodes while edges are represented by trains directly linking two stations. The network displays small world properties and is assortative in nature. Based on betweenness and closeness centralities of the nodes, the most important cities are identified with respect to connectivity as this could help in identifying the potential congestion points in the network.

  3. Sharing Feelings Online: Studying Emotional Well-Being via Automated Text Analysis of Facebook Posts

    Directory of Open Access Journals (Sweden)

    Michele eSettanni

    2015-07-01

    Full Text Available Digital traces of activity on social network sites represent a vast source of ecological data with potential connections with individual behavioral and psychological characteristics. The present study investigates the relationship between user-generated textual content shared on Facebook and emotional well-being. Self-report measures of depression, anxiety and stress were collected from 201 adult Facebook users from North Italy. Emotion-related textual indicators, including emoticon use, were extracted form users’ Facebook posts via automated text analysis. Correlation analyses revealed that individuals with higher levels of depression, anxiety expressed negative emotions on Facebook more frequently. In addition, use of emoticons expressing positive emotions correlated negatively with stress level. When comparing age groups, younger users reported higher frequency of both emotion-related words and emoticon use in their posts. Also, the relationship between online emotional expression and self-report emotional well-being was generally stronger in the younger group. Overall, findings support the feasibility and validity of studying individual emotional well-being by means of examination of Facebook profiles. Implications for online screening purposes and future research directions are discussed.

  4. Predictive structural dynamic network analysis.

    Science.gov (United States)

    Chen, Rong; Herskovits, Edward H

    2015-04-30

    Classifying individuals based on magnetic resonance data is an important task in neuroscience. Existing brain network-based methods to classify subjects analyze data from a cross-sectional study and these methods cannot classify subjects based on longitudinal data. We propose a network-based predictive modeling method to classify subjects based on longitudinal magnetic resonance data. Our method generates a dynamic Bayesian network model for each group which represents complex spatiotemporal interactions among brain regions, and then calculates a score representing that subject's deviation from expected network patterns. This network-derived score, along with other candidate predictors, are used to construct predictive models. We validated the proposed method based on simulated data and the Alzheimer's Disease Neuroimaging Initiative study. For the Alzheimer's Disease Neuroimaging Initiative study, we built a predictive model based on the baseline biomarker characterizing the baseline state and the network-based score which was constructed based on the state transition probability matrix. We found that this combined model achieved 0.86 accuracy, 0.85 sensitivity, and 0.87 specificity. For the Alzheimer's Disease Neuroimaging Initiative study, the model based on the baseline biomarkers achieved 0.77 accuracy. The accuracy of our model is significantly better than the model based on the baseline biomarkers (p-value=0.002). We have presented a method to classify subjects based on structural dynamic network model based scores. This method is of great importance to distinguish subjects based on structural network dynamics and the understanding of the network architecture of brain processes and disorders. Copyright © 2015 Elsevier B.V. All rights reserved.

  5. Twitter User Geolocation Using a Unified Text and Network Prediction Model

    OpenAIRE

    Rahimi, Afshin; Cohn, Trevor; Baldwin, Timothy

    2015-01-01

    We propose a label propagation approach to geolocation prediction based on Modified Adsorption, with two enhancements:(1) the removal of "celebrity" nodes to increase location homophily and boost tractability, and (2) he incorporation of text-based geolocation priors for test users. Experiments over three Twitter benchmark datasets achieve state-of-the-art results, and demonstrate the effectiveness of the enhancements.

  6. Turning text into research networks: information retrieval and computational ontologies in the creation of scientific databases.

    Science.gov (United States)

    Ceci, Flávio; Pietrobon, Ricardo; Gonçalves, Alexandre Leopoldo

    2012-01-01

    Web-based, free-text documents on science and technology have been increasing growing on the web. However, most of these documents are not immediately processable by computers slowing down the acquisition of useful information. Computational ontologies might represent a possible solution by enabling semantically machine readable data sets. But, the process of ontology creation, instantiation and maintenance is still based on manual methodologies and thus time and cost intensive. We focused on a large corpus containing information on researchers, research fields, and institutions. We based our strategy on traditional entity recognition, social computing and correlation. We devised a semi automatic approach for the recognition, correlation and extraction of named entities and relations from textual documents which are then used to create, instantiate, and maintain an ontology. We present a prototype demonstrating the applicability of the proposed strategy, along with a case study describing how direct and indirect relations can be extracted from academic and professional activities registered in a database of curriculum vitae in free-text format. We present evidence that this system can identify entities to assist in the process of knowledge extraction and representation to support ontology maintenance. We also demonstrate the extraction of relationships among ontology classes and their instances. We have demonstrated that our system can be used for the conversion of research information in free text format into database with a semantic structure. Future studies should test this system using the growing number of free-text information available at the institutional and national levels.

  7. NEAT: an efficient network enrichment analysis test.

    Science.gov (United States)

    Signorelli, Mirko; Vinciotti, Veronica; Wit, Ernst C

    2016-09-05

    Network enrichment analysis is a powerful method, which allows to integrate gene enrichment analysis with the information on relationships between genes that is provided by gene networks. Existing tests for network enrichment analysis deal only with undirected networks, they can be computationally slow and are based on normality assumptions. We propose NEAT, a test for network enrichment analysis. The test is based on the hypergeometric distribution, which naturally arises as the null distribution in this context. NEAT can be applied not only to undirected, but to directed and partially directed networks as well. Our simulations indicate that NEAT is considerably faster than alternative resampling-based methods, and that its capacity to detect enrichments is at least as good as the one of alternative tests. We discuss applications of NEAT to network analyses in yeast by testing for enrichment of the Environmental Stress Response target gene set with GO Slim and KEGG functional gene sets, and also by inspecting associations between functional sets themselves. NEAT is a flexible and efficient test for network enrichment analysis that aims to overcome some limitations of existing resampling-based tests. The method is implemented in the R package neat, which can be freely downloaded from CRAN ( https://cran.r-project.org/package=neat ).

  8. Structure-semantics interplay in complex networks and its effects on the predictability of similarity in texts

    Science.gov (United States)

    Amancio, Diego R.; Oliveira, Osvaldo N., Jr.; Costa, Luciano da F.

    2012-09-01

    The classification of texts has become a major endeavor with so much electronic material available, for it is an essential task in several applications, including search engines and information retrieval. There are different ways to define similarity for grouping similar texts into clusters, as the concept of similarity may depend on the purpose of the task. For instance, in topic extraction similar texts mean those within the same semantic field, whereas in author recognition stylistic features should be considered. In this study, we introduce ways to classify texts employing concepts of complex networks, which may be able to capture syntactic, semantic and even pragmatic features. The interplay between various metrics of the complex networks is analyzed with three applications, namely identification of machine translation (MT) systems, evaluation of quality of machine translated texts and authorship recognition. We shall show that topological features of the networks representing texts can enhance the ability to identify MT systems in particular cases. For evaluating the quality of MT texts, on the other hand, high correlation was obtained with methods capable of capturing the semantics. This was expected because the golden standards used are themselves based on word co-occurrence. Notwithstanding, the Katz similarity, which involves semantic and structure in the comparison of texts, achieved the highest correlation with the NIST measurement, indicating that in some cases the combination of both approaches can improve the ability to quantify quality in MT. In authorship recognition, again the topological features were relevant in some contexts, though for the books and authors analyzed good results were obtained with semantic features as well. Because hybrid approaches encompassing semantic and topological features have not been extensively used, we believe that the methodology proposed here may be useful to enhance text classification considerably, as it

  9. Turning text into research networks: information retrieval and computational ontologies in the creation of scientific databases.

    Directory of Open Access Journals (Sweden)

    Flávio Ceci

    Full Text Available BACKGROUND: Web-based, free-text documents on science and technology have been increasing growing on the web. However, most of these documents are not immediately processable by computers slowing down the acquisition of useful information. Computational ontologies might represent a possible solution by enabling semantically machine readable data sets. But, the process of ontology creation, instantiation and maintenance is still based on manual methodologies and thus time and cost intensive. METHOD: We focused on a large corpus containing information on researchers, research fields, and institutions. We based our strategy on traditional entity recognition, social computing and correlation. We devised a semi automatic approach for the recognition, correlation and extraction of named entities and relations from textual documents which are then used to create, instantiate, and maintain an ontology. RESULTS: We present a prototype demonstrating the applicability of the proposed strategy, along with a case study describing how direct and indirect relations can be extracted from academic and professional activities registered in a database of curriculum vitae in free-text format. We present evidence that this system can identify entities to assist in the process of knowledge extraction and representation to support ontology maintenance. We also demonstrate the extraction of relationships among ontology classes and their instances. CONCLUSION: We have demonstrated that our system can be used for the conversion of research information in free text format into database with a semantic structure. Future studies should test this system using the growing number of free-text information available at the institutional and national levels.

  10. Reaction network analysis in biochemical signaling pathways

    OpenAIRE

    Martinez-Forero, I. (Iván); Pelaez, A. (Antonio); Villoslada, P. (Pablo)

    2010-01-01

    The aim of this thesis is to improve the understanding of signaling pathways through a theoretical study of chemical reaction networks. The equilibirum solution to the equations derived from chemical networks will be analytically resolved using tools from algebraic geometry. The chapters are organized as follows: 1. An introduction to chemical dynamics in biological systems with a special emphasis on steady state analysis 2. Complete description of the chemical reaction network theor...

  11. An Approach to Data Analysis in 5G Networks

    Directory of Open Access Journals (Sweden)

    Lorena Isabel Barona López

    2017-02-01

    Full Text Available 5G networks expect to provide significant advances in network management compared to traditional mobile infrastructures by leveraging intelligence capabilities such as data analysis, prediction, pattern recognition and artificial intelligence. The key idea behind these actions is to facilitate the decision-making process in order to solve or mitigate common network problems in a dynamic and proactive way. In this context, this paper presents the design of Self-Organized Network Management in Virtualized and Software Defined Networks (SELFNET Analyzer Module, which main objective is to identify suspicious or unexpected situations based on metrics provided by different network components and sensors. The SELFNET Analyzer Module provides a modular architecture driven by use cases where analytic functions can be easily extended. This paper also proposes the data specification to define the data inputs to be taking into account in diagnosis process. This data specification has been implemented with different use cases within SELFNET Project, proving its effectiveness.

  12. Throughput Analysis of Large Wireless Networks with Regular Topologies

    Directory of Open Access Journals (Sweden)

    Kezhu Hong

    2007-04-01

    Full Text Available The throughput of large wireless networks with regular topologies is analyzed under two medium-access control schemes: synchronous array method (SAM and slotted ALOHA. The regular topologies considered are square, hexagon, and triangle. Both nonfading channels and Rayleigh fading channels are examined. Furthermore, both omnidirectional antennas and directional antennas are considered. Our analysis shows that the SAM leads to a much higher network throughput than the slotted ALOHA. The network throughput in this paper is measured in either bits-hops per second per Hertz per node or bits-meters per second per Hertz per node. The exact connection between the two measures is shown for each topology. With these two fundamental units, the network throughput shown in this paper can serve as a reliable benchmark for future works on network throughput of large networks.

  13. Throughput Analysis of Large Wireless Networks with Regular Topologies

    Directory of Open Access Journals (Sweden)

    Hong Kezhu

    2007-01-01

    Full Text Available The throughput of large wireless networks with regular topologies is analyzed under two medium-access control schemes: synchronous array method (SAM and slotted ALOHA. The regular topologies considered are square, hexagon, and triangle. Both nonfading channels and Rayleigh fading channels are examined. Furthermore, both omnidirectional antennas and directional antennas are considered. Our analysis shows that the SAM leads to a much higher network throughput than the slotted ALOHA. The network throughput in this paper is measured in either bits-hops per second per Hertz per node or bits-meters per second per Hertz per node. The exact connection between the two measures is shown for each topology. With these two fundamental units, the network throughput shown in this paper can serve as a reliable benchmark for future works on network throughput of large networks.

  14. Industrial entrepreneurial network: Structural and functional analysis

    Science.gov (United States)

    Medvedeva, M. A.; Davletbaev, R. H.; Berg, D. B.; Nazarova, J. J.; Parusheva, S. S.

    2016-12-01

    Structure and functioning of two model industrial entrepreneurial networks are investigated in the present paper. One of these networks is forming when implementing an integrated project and consists of eight agents, which interact with each other and external environment. The other one is obtained from the municipal economy and is based on the set of the 12 real business entities. Analysis of the networks is carried out on the basis of the matrix of mutual payments aggregated over the certain time period. The matrix is created by the methods of experimental economics. Social Network Analysis (SNA) methods and instruments were used in the present research. The set of basic structural characteristics was investigated: set of quantitative parameters such as density, diameter, clustering coefficient, different kinds of centrality, and etc. They were compared with the random Bernoulli graphs of the corresponding size and density. Discovered variations of random and entrepreneurial networks structure are explained by the peculiarities of agents functioning in production network. Separately, were identified the closed exchange circuits (cyclically closed contours of graph) forming an autopoietic (self-replicating) network pattern. The purpose of the functional analysis was to identify the contribution of the autopoietic network pattern in its gross product. It was found that the magnitude of this contribution is more than 20%. Such value allows using of the complementary currency in order to stimulate economic activity of network agents.

  15. 3rd International Conference on Network Analysis

    CERN Document Server

    Kalyagin, Valery; Pardalos, Panos

    2014-01-01

    This volume compiles the major results of conference participants from the "Third International Conference in Network Analysis" held at the Higher School of Economics, Nizhny Novgorod in May 2013, with the aim to initiate further joint research among different groups. The contributions in this book cover a broad range of topics relevant to the theory and practice of network analysis, including the reliability of complex networks, software, theory, methodology, and applications.  Network analysis has become a major research topic over the last several years. The broad range of applications that can be described and analyzed by means of a network has brought together researchers, practitioners from numerous fields such as operations research, computer science, transportation, energy, biomedicine, computational neuroscience and social sciences. In addition, new approaches and computer environments such as parallel computing, grid computing, cloud computing, and quantum computing have helped to solve large scale...

  16. Social network analysis in medical education.

    Science.gov (United States)

    Isba, Rachel; Woolf, Katherine; Hanneman, Robert

    2017-01-01

    Humans are fundamentally social beings. The social systems within which we live our lives (families, schools, workplaces, professions, friendship groups) have a significant influence on our health, success and well-being. These groups can be characterised as networks and analysed using social network analysis. Social network analysis is a mainly quantitative method for analysing how relationships between individuals form and affect those individuals, but also how individual relationships build up into wider social structures that influence outcomes at a group level. Recent increases in computational power have increased the accessibility of social network analysis methods for application to medical education research. Social network analysis has been used to explore team-working, social influences on attitudes and behaviours, the influence of social position on individual success, and the relationship between social cohesion and power. This makes social network analysis theories and methods relevant to understanding the social processes underlying academic performance, workplace learning and policy-making and implementation in medical education contexts. Social network analysis is underused in medical education, yet it is a method that could yield significant insights that would improve experiences and outcomes for medical trainees and educators, and ultimately for patients. © 2016 John Wiley & Sons Ltd and The Association for the Study of Medical Education.

  17. Analysis of complex networks using aggressive abstraction.

    Energy Technology Data Exchange (ETDEWEB)

    Colbaugh, Richard; Glass, Kristin.; Willard, Gerald

    2008-10-01

    This paper presents a new methodology for analyzing complex networks in which the network of interest is first abstracted to a much simpler (but equivalent) representation, the required analysis is performed using the abstraction, and analytic conclusions are then mapped back to the original network and interpreted there. We begin by identifying a broad and important class of complex networks which admit abstractions that are simultaneously dramatically simplifying and property preserving we call these aggressive abstractions -- and which can therefore be analyzed using the proposed approach. We then introduce and develop two forms of aggressive abstraction: 1.) finite state abstraction, in which dynamical networks with uncountable state spaces are modeled using finite state systems, and 2.) onedimensional abstraction, whereby high dimensional network dynamics are captured in a meaningful way using a single scalar variable. In each case, the property preserving nature of the abstraction process is rigorously established and efficient algorithms are presented for computing the abstraction. The considerable potential of the proposed approach to complex networks analysis is illustrated through case studies involving vulnerability analysis of technological networks and predictive analysis for social processes.

  18. Social Network Analysis and Critical Realism

    DEFF Research Database (Denmark)

    Buch-Hansen, Hubert

    2014-01-01

    Social network analysis ( SNA) is an increasingly popular approach that provides researchers with highly developed tools to map and analyze complexes of social relations. Although a number of network scholars have explicated the assumptions that underpin SNA, the approach has yet to be discussed ...

  19. GRETNA: a graph theoretical network analysis toolbox for imaging connectomics

    Directory of Open Access Journals (Sweden)

    Jinhui eWang

    2015-06-01

    Full Text Available Recent studies have suggested that the brain’s structural and functional networks (i.e., connectomics can be constructed by various imaging technologies (e.g., EEG/MEG; structural, diffusion and functional MRI and further characterized by graph theory. Given the huge complexity of network construction, analysis and statistics, toolboxes incorporating these functions are largely lacking. Here, we developed the GRaph thEoreTical Network Analysis (GRETNA toolbox for imaging connectomics. The GRETNA contains several key features as follows: (i an open-source, Matlab-based, cross-platform (Windows and UNIX OS package with a graphical user interface; (ii allowing topological analyses of global and local network properties with parallel computing ability, independent of imaging modality and species; (iii providing flexible manipulations in several key steps during network construction and analysis, which include network node definition, network connectivity processing, network type selection and choice of thresholding procedure; (iv allowing statistical comparisons of global, nodal and connectional network metrics and assessments of relationship between these network metrics and clinical or behavioral variables of interest; and (v including functionality in image preprocessing and network construction based on resting-state functional MRI (R-fMRI data. After applying the GRETNA to a publicly released R-fMRI dataset of 54 healthy young adults, we demonstrated that human brain functional networks exhibit efficient small-world, assortative, hierarchical and modular organizations and possess highly connected hubs and that these findings are robust against different analytical strategies. With these efforts, we anticipate that GRETNA will accelerate imaging connectomics in an easy, quick and flexible manner. GRETNA is freely available on the NITRC website (http://www.nitrc.org/projects/gretna/.

  20. Cohesion network analysis of CSCL participation.

    Science.gov (United States)

    Dascalu, Mihai; McNamara, Danielle S; Trausan-Matu, Stefan; Allen, Laura K

    2017-04-13

    The broad use of computer-supported collaborative-learning (CSCL) environments (e.g., instant messenger-chats, forums, blogs in online communities, and massive open online courses) calls for automated tools to support tutors in the time-consuming process of analyzing collaborative conversations. In this article, the authors propose and validate the cohesion network analysis (CNA) model, housed within the ReaderBench platform. CNA, grounded in theories of cohesion, dialogism, and polyphony, is similar to social network analysis (SNA), but it also considers text content and discourse structure and, uniquely, uses automated cohesion indices to generate the underlying discourse representation. Thus, CNA enhances the power of SNA by explicitly considering semantic cohesion while modeling interactions between participants. The primary purpose of this article is to describe CNA analysis and to provide a proof of concept, by using ten chat conversations in which multiple participants debated the advantages of CSCL technologies. Each participant's contributions were human-scored on the basis of their relevance in terms of covering the central concepts of the conversation. SNA metrics, applied to the CNA sociogram, were then used to assess the quality of each member's degree of participation. The results revealed that the CNA indices were strongly correlated to the human evaluations of the conversations. Furthermore, a stepwise regression analysis indicated that the CNA indices collectively predicted 54% of the variance in the human ratings of participation. The results provide promising support for the use of automated computational assessments of collaborative participation and of individuals' degrees of active involvement in CSCL environments.

  1. Dynamic analysis of biochemical network using complex network method

    Directory of Open Access Journals (Sweden)

    Wang Shuqiang

    2015-01-01

    Full Text Available In this study, the stochastic biochemical reaction model is proposed based on the law of mass action and complex network theory. The dynamics of biochemical reaction system is presented as a set of non-linear differential equations and analyzed at the molecular-scale. Given the initial state and the evolution rules of the biochemical reaction system, the system can achieve homeostasis. Compared with random graph, the biochemical reaction network has larger information capacity and is more efficient in information transmission. This is consistent with theory of evolution.

  2. Spectrum-Based and Collaborative Network Topology Analysis and Visualization

    Science.gov (United States)

    Hu, Xianlin

    2013-01-01

    Networks are of significant importance in many application domains, such as World Wide Web and social networks, which often embed rich topological information. Since network topology captures the organization of network nodes and links, studying network topology is very important to network analysis. In this dissertation, we study networks by…

  3. Text linguistics and critical discourse analysis: A multimodal analysis of a magazine advertisement

    Directory of Open Access Journals (Sweden)

    Sidnéa Nunes Ferreira

    2013-07-01

    Full Text Available http://dx.doi.org/10.5007/2175-8026.2013n64p111 Drawing on Fairclough’s (1995 three-dimensional framework of discourse analysis of communicative events, in this paper we carry out a multimodal analysis of a diners Club international magazine advertisement. Moving from the description of how textimage (Mitchell 1995 constructs a problem-solution structure in the advertisement to the discussion of its discourse and sociocultural practices, the paper foregrounds a multi-layered ideological message, besides the construal of a need (problem for a product (solution. Through its multimodal structure, the advertisement seems to tap on two important sociological issues: the avoidance of human togetherness and the colonization of travelling by consumer markets (bauman  2007.

  4. Statistical Analysis of Bus Networks in India.

    Science.gov (United States)

    Chatterjee, Atanu; Manohar, Manju; Ramadurai, Gitakrishnan

    2016-01-01

    In this paper, we model the bus networks of six major Indian cities as graphs in L-space, and evaluate their various statistical properties. While airline and railway networks have been extensively studied, a comprehensive study on the structure and growth of bus networks is lacking. In India, where bus transport plays an important role in day-to-day commutation, it is of significant interest to analyze its topological structure and answer basic questions on its evolution, growth, robustness and resiliency. Although the common feature of small-world property is observed, our analysis reveals a wide spectrum of network topologies arising due to significant variation in the degree-distribution patterns in the networks. We also observe that these networks although, robust and resilient to random attacks are particularly degree-sensitive. Unlike real-world networks, such as Internet, WWW and airline, that are virtual, bus networks are physically constrained. Our findings therefore, throw light on the evolution of such geographically and constrained networks that will help us in designing more efficient bus networks in the future.

  5. DataToText: A Consumer-Oriented Approach to Data Analysis

    Science.gov (United States)

    Kenny, David A.

    2010-01-01

    DataToText is a project developed where the user communicates the relevant information for an analysis and DataToText computer routine produces text output that describes in words, tables, and figures the results from the analyses. Two extended examples are given, one an example of a moderator analysis and the other an example of a dyadic data…

  6. De l'analyse de contextes a la pedagogie des textes (From Analysis of Context to Pedagogy of Texts)

    Science.gov (United States)

    Lehmann, Denis

    1976-01-01

    A detailed description of the "Dictionnaire contextual de francais pour la geologie." This study is used as an example of such a dictionary serving as a basic tool in the study of functional French. Such dictionaries can be useful in conceptual approaches to language learning. (Text is in French.) (AMH)

  7. Analysis of the Air Transport Network Characteristics of Major Airports

    Directory of Open Access Journals (Sweden)

    Min Geun Song

    2017-09-01

    Full Text Available The world's major airports are directly connected to hundreds of airports without intermediate routes. This connectivity can be described as the network in which the airport becomes a node and the route becomes a connection line. In this regard, this study analyzes the air transport network of 1,060 airports using the social network analysis (SNA methodology. We consolidated the data from three airline alliances and established a network of 1,060 airports and 5,580 routes in 173 countries. Many previous studies on air transport network examined several specific airports or regions and mainly utilized the internal indicators of airports. Conversely, this study conducted a comprehensive analysis covering 173 countries by using air route, which is an external indicator of airports. This study presented the general characteristics of major countries and regions from the perspective of SNA and compared the individual networks of the United States and China, which have the greatest influence on international air logistics within the scope of the entire network analysis. This study can aid in the understanding of air transport networks and logistics connectivity in inter-city and inter-country transport.

  8. Sharing feelings online: studying emotional well-being via automated text analysis of Facebook posts.

    Science.gov (United States)

    Settanni, Michele; Marengo, Davide

    2015-01-01

    Digital traces of activity on social network sites represent a vast source of ecological data with potential connections with individual behavioral and psychological characteristics. The present study investigates the relationship between user-generated textual content shared on Facebook and emotional well-being. Self-report measures of depression, anxiety, and stress were collected from 201 adult Facebook users from North Italy. Emotion-related textual indicators, including emoticon use, were extracted form users' Facebook posts via automated text analysis. Correlation analyses revealed that individuals with higher levels of depression, anxiety expressed negative emotions on Facebook more frequently. In addition, use of emoticons expressing positive emotions correlated negatively with stress level. When comparing age groups, younger users reported higher frequency of both emotion-related words and emoticon use in their posts. Also, the relationship between online emotional expression and self-report emotional well-being was generally stronger in the younger group. Overall, findings support the feasibility and validity of studying individual emotional well-being by means of examination of Facebook profiles. Implications for online screening purposes and future research directions are discussed.

  9. Social network analysis for program implementation.

    Science.gov (United States)

    Valente, Thomas W; Palinkas, Lawrence A; Czaja, Sara; Chu, Kar-Hai; Brown, C Hendricks

    2015-01-01

    This paper introduces the use of social network analysis theory and tools for implementation research. The social network perspective is useful for understanding, monitoring, influencing, or evaluating the implementation process when programs, policies, practices, or principles are designed and scaled up or adapted to different settings. We briefly describe common barriers to implementation success and relate them to the social networks of implementation stakeholders. We introduce a few simple measures commonly used in social network analysis and discuss how these measures can be used in program implementation. Using the four stage model of program implementation (exploration, adoption, implementation, and sustainment) proposed by Aarons and colleagues [1] and our experience in developing multi-sector partnerships involving community leaders, organizations, practitioners, and researchers, we show how network measures can be used at each stage to monitor, intervene, and improve the implementation process. Examples are provided to illustrate these concepts. We conclude with expected benefits and challenges associated with this approach.

  10. Spectral Analysis Methods of Social Networks

    Directory of Open Access Journals (Sweden)

    P. G. Klyucharev

    2017-01-01

    Full Text Available Online social networks (such as Facebook, Twitter, VKontakte, etc. being an important channel for disseminating information are often used to arrange an impact on the social consciousness for various purposes - from advertising products or services to the full-scale information war thereby making them to be a very relevant object of research. The paper reviewed the analysis methods of social networks (primarily, online, based on the spectral theory of graphs. Such methods use the spectrum of the social graph, i.e. a set of eigenvalues of its adjacency matrix, and also the eigenvectors of the adjacency matrix.Described measures of centrality (in particular, centrality based on the eigenvector and PageRank, which reflect a degree of impact one or another user of the social network has. A very popular PageRank measure uses, as a measure of centrality, the graph vertices, the final probabilities of the Markov chain, whose matrix of transition probabilities is calculated on the basis of the adjacency matrix of the social graph. The vector of final probabilities is an eigenvector of the matrix of transition probabilities.Presented a method of dividing the graph vertices into two groups. It is based on maximizing the network modularity by computing the eigenvector of the modularity matrix.Considered a method for detecting bots based on the non-randomness measure of a graph to be computed using the spectral coordinates of vertices - sets of eigenvector components of the adjacency matrix of a social graph.In general, there are a number of algorithms to analyse social networks based on the spectral theory of graphs. These algorithms show very good results, but their disadvantage is the relatively high (albeit polynomial computational complexity for large graphs.At the same time it is obvious that the practical application capacity of the spectral graph theory methods is still underestimated, and it may be used as a basis to develop new methods.The work

  11. Tweeting about Mental Health: Big Data Text Analysis of Twitter for Public Policy

    Science.gov (United States)

    Zaydman, Mikhail

    2017-01-01

    This dissertation examines conversations and attitudes about mental health in Twitter discourse. The research uses big data collection, machine learning classification, and social network analysis to answer the following questions (1) what mental health topics do people discuss on Twitter? (2) Have patterns of conversation changed over time? Have…

  12. Multilayer motif analysis of brain networks

    Science.gov (United States)

    Battiston, Federico; Nicosia, Vincenzo; Chavez, Mario; Latora, Vito

    2017-04-01

    In the last decade, network science has shed new light both on the structural (anatomical) and on the functional (correlations in the activity) connectivity among the different areas of the human brain. The analysis of brain networks has made possible to detect the central areas of a neural system and to identify its building blocks by looking at overabundant small subgraphs, known as motifs. However, network analysis of the brain has so far mainly focused on anatomical and functional networks as separate entities. The recently developed mathematical framework of multi-layer networks allows us to perform an analysis of the human brain where the structural and functional layers are considered together. In this work, we describe how to classify the subgraphs of a multiplex network, and we extend the motif analysis to networks with an arbitrary number of layers. We then extract multi-layer motifs in brain networks of healthy subjects by considering networks with two layers, anatomical and functional, respectively, obtained from diffusion and functional magnetic resonance imaging. Results indicate that subgraphs in which the presence of a physical connection between brain areas (links at the structural layer) coexists with a non-trivial positive correlation in their activities are statistically overabundant. Finally, we investigate the existence of a reinforcement mechanism between the two layers by looking at how the probability to find a link in one layer depends on the intensity of the connection in the other one. Showing that functional connectivity is non-trivially constrained by the underlying anatomical network, our work contributes to a better understanding of the interplay between the structure and function in the human brain.

  13. Detecting Distributed Network Traffic Anomaly with Network-Wide Correlation Analysis

    Directory of Open Access Journals (Sweden)

    Yang Dan

    2008-12-01

    Full Text Available Distributed network traffic anomaly refers to a traffic abnormal behavior involving many links of a network and caused by the same source (e.g., DDoS attack, worm propagation. The anomaly transiting in a single link might be unnoticeable and hard to detect, while the anomalous aggregation from many links can be prevailing, and does more harm to the networks. Aiming at the similar features of distributed traffic anomaly on many links, this paper proposes a network-wide detection method by performing anomalous correlation analysis of traffic signals' instantaneous parameters. In our method, traffic signals' instantaneous parameters are firstly computed, and their network-wide anomalous space is then extracted via traffic prediction. Finally, an anomaly is detected by a global correlation coefficient of anomalous space. Our evaluation using Abilene traffic traces demonstrates the excellent performance of this approach for distributed traffic anomaly detection.

  14. Forcast of TEXT plasma disruptions using soft X-rays as input signal in a neural network

    Energy Technology Data Exchange (ETDEWEB)

    Vannucci, A.; Oliveira, K.A.; Tajima, T.

    1998-03-03

    A feed-forward neural network with two hidden layers is used in this work to forecast major and minor disruptive instabilities in TEXT discharges. Using soft X-ray signals as input data, the neural net is trained with one disruptive plasma pulse, and a different disruptive discharge is used for validation. After being properly trained the networks, with the same set of weights. is then used to forecast disruptions in two others different plasma pulses. It is observed that the neural net is able to predict the incoming of a disruption more than 3 ms in advance. This time interval is almost three times longer than the one already obtained previously when magnetic signal from a Mirnov coil was used to feed the neural networks with. To our own eye we fail to see any indication of an upcoming disruption from the experimental data this far back from the time of disruption. Finally, from what we observe in the predictive behavior of our network, speculations are made whether the disruption triggering mechanism would be associated to an increase of the m = 2 magnetic island, that disturbs the central part of the plasma column afterwards or, in face of the results from this work, the initial perturbation would have occurred first in the central part of the plasma column, within the q = 1 magnetic surface, and then the m = 2 MHD mode would be destabilized afterwards.

  15. Urdu Nasta'liq text recognition using implicit segmentation based on multi-dimensional long short term memory neural networks.

    Science.gov (United States)

    Naz, Saeeda; Umar, Arif Iqbal; Ahmed, Riaz; Razzak, Muhammad Imran; Rashid, Sheikh Faisal; Shafait, Faisal

    2016-01-01

    The recognition of Arabic script and its derivatives such as Urdu, Persian, Pashto etc. is a difficult task due to complexity of this script. Particularly, Urdu text recognition is more difficult due to its Nasta'liq writing style. Nasta'liq writing style inherits complex calligraphic nature, which presents major issues to recognition of Urdu text owing to diagonality in writing, high cursiveness, context sensitivity and overlapping of characters. Therefore, the work done for recognition of Arabic script cannot be directly applied to Urdu recognition. We present Multi-dimensional Long Short Term Memory (MDLSTM) Recurrent Neural Networks with an output layer designed for sequence labeling for recognition of printed Urdu text-lines written in the Nasta'liq writing style. Experiments show that MDLSTM attained a recognition accuracy of 98% for the unconstrained Urdu Nasta'liq printed text, which significantly outperforms the state-of-the-art techniques.

  16. Analysis of Network Topologies Underlying Ethylene Growth Response Kinetics

    Directory of Open Access Journals (Sweden)

    Aaron M. Prescott

    2016-08-01

    Full Text Available Most models for ethylene signaling involve a linear pathway. However, measurements of seedling growth kinetics when ethylene is applied and removed have resulted in more complex network models that include coherent feedforward, negative feedback, and positive feedback motifs. However, the dynamical responses of the proposed networks have not been explored in a quantitative manner. Here, we explore (i whether any of the proposed models are capable of producing growth-response behaviors consistent with experimental observations and (ii what mechanistic roles various parts of the network topologies play in ethylene signaling. To address this, we used computational methods to explore two general network topologies: The first contains a coherent feedforward loop that inhibits growth and a negative feedback from growth onto itself (CFF/NFB. In the second, ethylene promotes the cleavage of EIN2, with the product of the cleavage inhibiting growth and promoting the production of EIN2 through a positive feedback loop (PFB. Since few network parameters for ethylene signaling are known in detail, we used an evolutionary algorithm to explore sets of parameters that produce behaviors similar to experimental growth response kinetics of both wildtype and mutant seedlings. We generated a library of parameter sets by independently running the evolutionary algorithm many times. Both network topologies produce behavior consistent with experimental observations and analysis of the parameter sets allows us to identify important network interactions and parameter constraints. We additionally screened these parameter sets for growth recovery in the presence of sub-saturating ethylene doses, which is an experimentally-observed property that emerges in some of the evolved parameter sets. Finally, we probed simplified networks maintaining key features of the CFF/NFB and PFB topologies. From this, we verified observations drawn from the larger networks about mechanisms

  17. 1st International Conference on Network Analysis

    CERN Document Server

    Kalyagin, Valery; Pardalos, Panos

    2013-01-01

    This volume contains a selection of contributions from the "First International Conference in Network Analysis," held at the University of Florida, Gainesville, on December 14-16, 2011. The remarkable diversity of fields that take advantage of Network Analysis makes the endeavor of gathering up-to-date material in a single compilation a useful, yet very difficult, task. The purpose of this volume is to overcome this difficulty by collecting the major results found by the participants and combining them in one easily accessible compilation. Network analysis has become a major research topic over the last several years. The broad range of applications that can be described and analyzed by means of a network is bringing together researchers, practitioners and other scientific communities from numerous fields such as Operations Research, Computer Science, Transportation, Energy, Social Sciences, and more. The contributions not only come from different fields, but also cover a broad range of topics relevant to the...

  18. Modeling and Analysis of New Products Diffusion on Heterogeneous Networks

    Directory of Open Access Journals (Sweden)

    Shuping Li

    2014-01-01

    Full Text Available We present a heterogeneous networks model with the awareness stage and the decision-making stage to explain the process of new products diffusion. If mass media is neglected in the decision-making stage, there is a threshold whether the innovation diffusion is successful or not, or else it is proved that the network model has at least one positive equilibrium. For networks with the power-law degree distribution, numerical simulations confirm analytical results, and also at the same time, by numerical analysis of the influence of the network structure and persuasive advertisements on the density of adopters, we give two different products propagation strategies for two classes of nodes in scale-free networks.

  19. Social network analysis applied to team sports analysis

    CERN Document Server

    Clemente, Filipe Manuel; Mendes, Rui Sousa

    2016-01-01

    Explaining how graph theory and social network analysis can be applied to team sports analysis, This book presents useful approaches, models and methods that can be used to characterise the overall properties of team networks and identify the prominence of each team player. Exploring the different possible network metrics that can be utilised in sports analysis, their possible applications and variances from situation to situation, the respective chapters present an array of illustrative case studies. Identifying the general concepts of social network analysis and network centrality metrics, readers are shown how to generate a methodological protocol for data collection. As such, the book provides a valuable resource for students of the sport sciences, sports engineering, applied computation and the social sciences.

  20. Aesthetic Analysis of Media Texts in the Classroom at the Student Audience

    Science.gov (United States)

    Fedorov, Alexander

    2015-01-01

    Aesthetic analysis of media texts, ie the analysis of art concept of the media texts of different types and genres, is closely related to the aesthetic (artistic) theory of media (Aesthetical Approach, Media as Popular Arts Approach, Discriminatory Approach). Aesthetic theory of media literacy education has been very popular in the 1960s…

  1. Features of Gender: An Analysis of the Visual Texts of Third Grade Children

    Science.gov (United States)

    Albers, Peggy; Frederick, Tammy; Cowan, Kay

    2009-01-01

    How do primary students construct understandings of the opposite sex? In what ways do these constructions manifest in the visual texts created in literacy and language arts classrooms? Using visual discourse analysis (Albers, 2007) and scheme analysis (Sonesson, 1988) as interpretive methods, we analyzed the visual texts created by 23 third grade…

  2. An NLP Framework for Non-Topical Text Analysis in Urdu--A Resource Poor Language

    Science.gov (United States)

    Mukund, Smruthi

    2012-01-01

    Language plays a very important role in understanding the culture and mindset of people. Given the abundance of electronic multilingual data, it is interesting to see what insight can be gained by automatic analysis of text. This in turn calls for text analysis which is focused on non-topical information such as emotions being expressed that is in…

  3. Network graph analysis of category fluency testing.

    Science.gov (United States)

    Lerner, Alan J; Ogrocki, Paula K; Thomas, Peter J

    2009-03-01

    Category fluency is impaired early in Alzheimer disease (AD). Graph theory is a technique to analyze complex relationships in networks. Features of interest in network analysis include the number of nodes and edges, and variables related to their interconnectedness. Other properties important in network analysis are "small world properties" and "scale-free" properties. The small world property (popularized as the so-called "6 degrees of separation") arises when the majority of connections are local, but a number of connections are to distant nodes. Scale-free networks are characterized by the presence of a few nodes with many connections, and many more nodes with fewer connections. To determine if category fluency data can be analyzed using graph theory. To compare normal elderly, mild cognitive impairment (MCI) and AD network graphs, and characterize changes seen with increasing cognitive impairment. Category fluency results ("animals" recorded over 60 s) from normals (n=38), MCI (n=33), and AD (n=40) completing uniform data set evaluations were converted to network graphs of all unique cooccurring neighbors, and compared for network variables. For Normal, MCI and AD, mean clustering coefficients were 0.21, 0.22, 0.30; characteristic path lengths were 3.27, 3.17, and 2.65; small world properties decreased with increasing cognitive impairment, and all graphs showed scale-free properties. Rank correlations of the 25 commonest items ranged from 0.75 to 0.83. Filtering of low-degree nodes in normal and MCI graphs resulted in properties similar to the AD network graph. Network graph analysis is a promising technique for analyzing changes in category fluency. Our technique results in nonrandom graphs consistent with well-characterized properties for these types of graphs.

  4. Topology analysis of social networks extracted from literature.

    Directory of Open Access Journals (Sweden)

    Michaël C Waumans

    Full Text Available In a world where complex networks are an increasingly important part of science, it is interesting to question how the new reading of social realities they provide applies to our cultural background and in particular, popular culture. Are authors of successful novels able to reproduce social networks faithful to the ones found in reality? Is there any common trend connecting an author's oeuvre, or a genre of fiction? Such an analysis could provide new insight on how we, as a culture, perceive human interactions and consume media. The purpose of the work presented in this paper is to define the signature of a novel's story based on the topological analysis of its social network of characters. For this purpose, an automated tool was built that analyses the dialogs in novels, identifies characters and computes their relationships in a time-dependent manner in order to assess the network's evolution over the course of the story.

  5. On the Optimality of Trust Network Analysis with Subjective Logic

    Directory of Open Access Journals (Sweden)

    PARK, Y.

    2014-08-01

    Full Text Available Building and measuring trust is one of crucial aspects in e-commerce, social networking and computer security. Trust networks are widely used to formalize trust relationships and to conduct formal reasoning of trust values. Diverse trust network analysis methods have been developed so far and one of the most widely used schemes is TNA-SL (Trust Network Analysis with Subjective Logic. Recent papers claimed that TNA-SL always finds the optimal solution by producing the least uncertainty. In this paper, we present some counter-examples, which imply that TNA-SL is not an optimal algorithm. Furthermore, we present a probabilistic algorithm in edge splitting to minimize uncertainty.

  6. A New Approach for the Stability Analysis of Wave Networks

    Directory of Open Access Journals (Sweden)

    Ya Xuan Zhang

    2014-01-01

    Full Text Available We introduce a new approach to investigate the stability of controlled tree-shaped wave networks and subtrees of complex wave networks. It is motivated by regarding the network as branching out from a single edge. We present the recursive relations of the Laplacian transforms of adjacent edges of the system in its branching order, which form the characteristic equation. In the stability analysis, we estimate the infimums of the recursive expressions in the inverse order based on the spectral analysis. It is a feasible way to check whether the system is exponentially stable under any control strategy or parameter choice. As an application we design the control law and study the stability of a 12-edge tree-shaped wave network.

  7. Medical image analysis with artificial neural networks.

    Science.gov (United States)

    Jiang, J; Trundle, P; Ren, J

    2010-12-01

    Given that neural networks have been widely reported in the research community of medical imaging, we provide a focused literature survey on recent neural network developments in computer-aided diagnosis, medical image segmentation and edge detection towards visual content analysis, and medical image registration for its pre-processing and post-processing, with the aims of increasing awareness of how neural networks can be applied to these areas and to provide a foundation for further research and practical development. Representative techniques and algorithms are explained in detail to provide inspiring examples illustrating: (i) how a known neural network with fixed structure and training procedure could be applied to resolve a medical imaging problem; (ii) how medical images could be analysed, processed, and characterised by neural networks; and (iii) how neural networks could be expanded further to resolve problems relevant to medical imaging. In the concluding section, a highlight of comparisons among many neural network applications is included to provide a global view on computational intelligence with neural networks in medical imaging. Copyright © 2010 Elsevier Ltd. All rights reserved.

  8. Kinetic analysis of complex metabolic networks

    Energy Technology Data Exchange (ETDEWEB)

    Stephanopoulos, G. [MIT, Cambridge, MA (United States)

    1996-12-31

    A new methodology is presented for the analysis of complex metabolic networks with the goal of metabolite overproduction. The objective is to locate a small number of reaction steps in a network that have maximum impact on network flux amplification and whose rate can also be increased without functional network derangement. This method extends the concepts of Metabolic Control Analysis to groups of reactions and offers the means for calculating group control coefficients as measures of the control exercised by groups of reactions on the overall network fluxes and intracellular metabolite pools. It is further demonstrated that the optimal strategy for the effective increase of network fluxes, while maintaining an uninterrupted supply of intermediate metabolites, is through the coordinated amplification of multiple (as opposed to a single) reaction steps. Satisfying this requirement invokes the concept of the concentration control to coefficient, which emerges as a critical parameter in the identification of feasible enzymatic modifications with maximal impact on the network flux. A case study of aromatic aminoacid production is provided to illustrate these concepts.

  9. Investigating scientific literacy documents with linguistic network analysis

    DEFF Research Database (Denmark)

    Bruun, Jesper; Evans, Robert Harry; Dolin, Jens

    2009-01-01

    International discussions of scientific literacy (SL) are extensive and numerous sizeable documents on SL exist. Thus, comparing different conceptions of SL is methodologically challenging. We developed an analytical tool which couples the theory of complex networks with text analysis in order...

  10. [An analysis of cancer survival narratives using computerized text analysis program].

    Science.gov (United States)

    Kim, Dal Sook; Park, Ah Hyun; Kang, Nam Jun

    2014-06-01

    This study was done to explore experiences of persons living through the periods of cancer diagnosis, treatment, and self-care. With permission, texts of 29 cancer survival narratives (8 men and 21 women, winners in contests sponsored by two institutes), were analyzed using Kang's Korean-Computerized-Text-Analysis-Program where the commonly used Korean-Morphological-Analyzer and the 21st-century-Sejong-Modern-Korean-Corpora representing laymen's Korean-language-use are connected. Experiences were explored based on words included in 100 highly-used-morphemes. For interpretation, we used 'categorizing words by meaning', 'comparing use-rate by periods and to the 21st-century-Sejong-Modern-Korean-Corpora', and highly-used-morphemes that appeared only in a specific period. The most highly-used-word-morpheme was first-person-pronouns followed by, diagnosis·treatment-related-words, mind-expression-words, cancer, persons-in-meaningful-interaction, living and eating, information-related-verbs, emotion-expression-words, with 240 to 0.8 times for layman use-rate. 'Diagnosis-process', 'cancer-thought', 'things-to-come-after-diagnosis', 'physician·husband', 'result-related-information', 'meaningful-things before diagnosis-period', and 'locus-of-cause' dominated the life of the diagnosis-period. 'Treatment', 'unreliable-body', 'husband · people · mother · physician', 'treatment-related-uncertainty', 'hard-time', and 'waiting-time represented experiences in the treatment-period. Themes of living in the self-care-period were complex and included 'living-as-a-human', 'self-managing-of-diseased-body', 'positive-emotion', and 'connecting past · present · future'. The results show that the experience of living for persons with cancer is influenced by each period's own situational-characteristics. Experiences of the diagnosis and treatment-period are negative disease-oriented while that of the self-care period is positive present-oriented.

  11. statnet: Software Tools for the Representation, Visualization, Analysis and Simulation of Network Data

    Directory of Open Access Journals (Sweden)

    Mark S. Handcock

    2007-12-01

    Full Text Available statnet is a suite of software packages for statistical network analysis. The packages implement recent advances in network modeling based on exponential-family random graph models (ERGM. The components of the package provide a comprehensive framework for ERGM-based network modeling, including tools for model estimation, model evaluation, model-based network simulation, and network visualization. This broad functionality is powered by a central Markov chain Monte Carlo (MCMC algorithm. The coding is optimized for speed and robustness.

  12. Using Granular-Evidence-Based Adaptive Networks for Sensitivity Analysis

    OpenAIRE

    Vališevskis, A.

    2002-01-01

    This paper considers the possibility of using adaptive networks for sensitivity analysis. Adaptive network that processes fuzzy granules is described. The adaptive network training algorithm can be used for sensitivity analysis of decision making models. Furthermore, a case study concerning sensitivity analysis is described, which shows in what way the adaptive network can be used for sensitivity analysis.

  13. NEXCADE: perturbation analysis for complex networks.

    Directory of Open Access Journals (Sweden)

    Gitanjali Yadav

    Full Text Available Recent advances in network theory have led to considerable progress in our understanding of complex real world systems and their behavior in response to external threats or fluctuations. Much of this research has been invigorated by demonstration of the 'robust, yet fragile' nature of cellular and large-scale systems transcending biology, sociology, and ecology, through application of the network theory to diverse interactions observed in nature such as plant-pollinator, seed-dispersal agent and host-parasite relationships. In this work, we report the development of NEXCADE, an automated and interactive program for inducing disturbances into complex systems defined by networks, focusing on the changes in global network topology and connectivity as a function of the perturbation. NEXCADE uses a graph theoretical approach to simulate perturbations in a user-defined manner, singly, in clusters, or sequentially. To demonstrate the promise it holds for broader adoption by the research community, we provide pre-simulated examples from diverse real-world networks including eukaryotic protein-protein interaction networks, fungal biochemical networks, a variety of ecological food webs in nature as well as social networks. NEXCADE not only enables network visualization at every step of the targeted attacks, but also allows risk assessment, i.e. identification of nodes critical for the robustness of the system of interest, in order to devise and implement context-based strategies for restructuring a network, or to achieve resilience against link or node failures. Source code and license for the software, designed to work on a Linux-based operating system (OS can be downloaded at http://www.nipgr.res.in/nexcade_download.html. In addition, we have developed NEXCADE as an OS-independent online web server freely available to the scientific community without any login requirement at http://www.nipgr.res.in/nexcade.html.

  14. Study of co-authorship network of papers in the Journal of Research in Medical Sciences using social network analysis

    Directory of Open Access Journals (Sweden)

    Firoozeh Zare-Farashbandi

    2014-01-01

    Full Text Available Background: Co-authorship is one of the most tangible forms of research collaboration. A co-authorship network is a social network in which the authors through participation in one or more publication through an indirect path have linked to each other. The present research using the social network analysis studied co-authorship network of 681 articles published in Journal of Research in Medical Sciences (JRMS during 2008-2012. Materials and Methods: The study was carried out with the scientometrics approach and using co-authorship network analysis of authors. The topology of the co-authorship network of 681 published articles in JRMS between 2008 and 2012 was analyzed using macro-level metrics indicators of network analysis such as density, clustering coefficient, components and mean distance. In addition, in order to evaluate the performance of each authors and countries in the network, the micro-level indicators such as degree centrality, closeness centrality and betweenness centrality as well as productivity index were used. The UCINET and NetDraw softwares were used to draw and analyze the co-authorship network of the papers. Results: The assessment of the authors productivity in this journal showed that the first ranks were belonged to only five authors, respectively. Furthermore, analysis of the co-authorship of the authors in the network demonstrated that in the betweenness centrality index, three authors of them had the good position in the network. They can be considered as the network leaders able to control the flow of information in the network compared with the other members based on the shortest paths. On the other hand, the key role of the network according to the productivity and centrality indexes was belonged to Iran, Malaysia and United States of America. Conclusion: Co-authorship network of JRMS has the characteristics of a small world network. In addition, the theory of 6° separation is valid in this network was also true.

  15. Platform for the analysis of written texts in terms of conceptual graphs: study case, Cybernetics of Cybernetics course

    Directory of Open Access Journals (Sweden)

    Sebastián Contreras

    2009-02-01

    Full Text Available The objective of this work is to observe and analyze the conceptual-relation structures in texts written in Spanish, from the perspective of second-order cybernetics. Texts are shaped by the syntactic structure of the sentences they contain. Conceptual-relationships emerge by transforming the text, using a text analysis platform named PAST. The transformation is guided by a set of established rules, permitting to observe a system. PAST can be defined as a powerful operator to transform texts written by the students in a Master's Program class. The platform is introduced as a tool enabling a graph representation of relationships among the concepts in the text. The internal procedure of the platform and the graph construction concerns the linguistic analysis. Although the resulting graphic representation does not follow a formal definition, it reflects an iterative construction to define a topology to create a semantic network. This network only makes sense to the author of the text. In other words, the author (observer, based on the cybernetics of the observing systems, uses a tool that enables him to make a second-order observation of a document that he/she has linearly written. The main epistemological concepts mentioned throughout the development of the proposal are discourse and distinction. The contribution of this work is the application of a methodology that conducts a recursive observation of both the direct and indirect relationships established by the words the author puts together in his/her written discourse. In the discussion of results the next phases of this work are presented.

  16. Contrastive analysis of a text-type: English and Czech restaurant menus.

    OpenAIRE

    Hryzbylová, Eva

    2012-01-01

    This thesis carries out a contrastive analysis of English and Czech restaurant menus. A restaurant menu is a specific type of text that deserves a detailed examination. The theoretical background outlines the various uses of the concepts genre, text type, register and style. The further study of this specific text type is carried out on the basis of an existing theoretical material that focuses on texts of a similar nature. Ten samples of British and Irish menus, ten samples of Czech menus an...

  17. Organizational Patterns of english and Foreign Texts for Language Teaching: A Contrastive Analysis

    OpenAIRE

    Fabiola D. Kurnia

    2001-01-01

    The purpose of this paper is to analyses the organizational patterns of imaginative English and foreign texts in an English speaking community of a mixed cultural literaty work. A contrastive list of foreign English text in Galsorthy's Quality and the standard English texts was used as the data. The data were then analysed according to the organizational patterns of sound systems, grammatical structures, vocabulary system, and cultural features. The analysis suggests that foreign English text...

  18. Collaborative human-machine analysis to disambiguate entities in unstructured text and structured datasets

    Science.gov (United States)

    Davenport, Jack H.

    2016-05-01

    Intelligence analysts demand rapid information fusion capabilities to develop and maintain accurate situational awareness and understanding of dynamic enemy threats in asymmetric military operations. The ability to extract relationships between people, groups, and locations from a variety of text datasets is critical to proactive decision making. The derived network of entities must be automatically created and presented to analysts to assist in decision making. DECISIVE ANALYTICS Corporation (DAC) provides capabilities to automatically extract entities, relationships between entities, semantic concepts about entities, and network models of entities from text and multi-source datasets. DAC's Natural Language Processing (NLP) Entity Analytics model entities as complex systems of attributes and interrelationships which are extracted from unstructured text via NLP algorithms. The extracted entities are automatically disambiguated via machine learning algorithms, and resolution recommendations are presented to the analyst for validation; the analyst's expertise is leveraged in this hybrid human/computer collaborative model. Military capability is enhanced by these NLP Entity Analytics because analysts can now create/update an entity profile with intelligence automatically extracted from unstructured text, thereby fusing entity knowledge from structured and unstructured data sources. Operational and sustainment costs are reduced since analysts do not have to manually tag and resolve entities.

  19. Tensor Fusion Network for Multimodal Sentiment Analysis

    OpenAIRE

    Zadeh, Amir; Chen, Minghai; Poria, Soujanya; Cambria, Erik; Morency, Louis-Philippe

    2017-01-01

    Multimodal sentiment analysis is an increasingly popular research area, which extends the conventional language-based definition of sentiment analysis to a multimodal setup where other relevant modalities accompany language. In this paper, we pose the problem of multimodal sentiment analysis as modeling intra-modality and inter-modality dynamics. We introduce a novel model, termed Tensor Fusion Network, which learns both such dynamics end-to-end. The proposed approach is tailored for the vola...

  20. Network analysis of eight industrial symbiosis systems

    Science.gov (United States)

    Zhang, Yan; Zheng, Hongmei; Shi, Han; Yu, Xiangyi; Liu, Gengyuan; Su, Meirong; Li, Yating; Chai, Yingying

    2016-06-01

    Industrial symbiosis is the quintessential characteristic of an eco-industrial park. To divide parks into different types, previous studies mostly focused on qualitative judgments, and failed to use metrics to conduct quantitative research on the internal structural or functional characteristics of a park. To analyze a park's structural attributes, a range of metrics from network analysis have been applied, but few researchers have compared two or more symbioses using multiple metrics. In this study, we used two metrics (density and network degree centralization) to compare the degrees of completeness and dependence of eight diverse but representative industrial symbiosis networks. Through the combination of the two metrics, we divided the networks into three types: weak completeness, and two forms of strong completeness, namely "anchor tenant" mutualism and "equality-oriented" mutualism. The results showed that the networks with a weak degree of completeness were sparse and had few connections among nodes; for "anchor tenant" mutualism, the degree of completeness was relatively high, but the affiliated members were too dependent on core members; and the members in "equality-oriented" mutualism had equal roles, with diverse and flexible symbiotic paths. These results revealed some of the systems' internal structure and how different structures influenced the exchanges of materials, energy, and knowledge among members of a system, thereby providing insights into threats that may destabilize the network. Based on this analysis, we provide examples of the advantages and effectiveness of recent improvement projects in a typical Chinese eco-industrial park (Shandong Lubei).

  1. Automated Analysis of Security in Networking Systems

    DEFF Research Database (Denmark)

    Buchholtz, Mikael

    2004-01-01

    It has for a long time been a challenge to built secure networking systems. One way to counter this problem is to provide developers of software applications for networking systems with easy-to-use tools that can check security properties before the applications ever reach the marked. These tools...... will both help raise the general level of awareness of the problems and prevent the most basic flaws from occurring. This thesis contributes to the development of such tools. Networking systems typically try to attain secure communication by applying standard cryptographic techniques. In this thesis...... attacks, and attacks launched by insiders. Finally, the perspectives for the application of the analysis techniques are discussed, thereby, coming a small step closer to providing developers with easy- to-use tools for validating the security of networking applications....

  2. Functional stoichiometric analysis of metabolic networks.

    Science.gov (United States)

    Urbanczik, R; Wagner, C

    2005-11-15

    An important tool in Systems Biology is the stoichiometric modeling of metabolic networks, where the stationary states of the network are described by a high-dimensional polyhedral cone, the so-called flux cone. Exhaustive descriptions of the metabolism can be obtained by computing the elementary vectors of this cone but, owing to a combinatorial explosion of the number of elementary vectors, this approach becomes computationally intractable for genome scale networks. Hence, we propose to instead focus on the conversion cone, a projection of the flux cone, which describes the interaction of the metabolism with its external chemical environment. We present a direct method for calculating the elementary vectors of this cone and, by studying the metabolism of Saccharomyces cerevisiae, we demonstrate that such an analysis is computationally feasible even for genome scale networks.

  3. A statistical analysis of UK financial networks

    Science.gov (United States)

    Chu, J.; Nadarajah, S.

    2017-04-01

    In recent years, with a growing interest in big or large datasets, there has been a rise in the application of large graphs and networks to financial big data. Much of this research has focused on the construction and analysis of the network structure of stock markets, based on the relationships between stock prices. Motivated by Boginski et al. (2005), who studied the characteristics of a network structure of the US stock market, we construct network graphs of the UK stock market using same method. We fit four distributions to the degree density of the vertices from these graphs, the Pareto I, Fréchet, lognormal, and generalised Pareto distributions, and assess the goodness of fit. Our results show that the degree density of the complements of the market graphs, constructed using a negative threshold value close to zero, can be fitted well with the Fréchet and lognormal distributions.

  4. Visualization and Analysis of Complex Covert Networks

    DEFF Research Database (Denmark)

    Memon, Bisharat

    This report discusses and summarize the results of my work so far in relation to my Ph.D. project entitled "Visualization and Analysis of Complex Covert Networks". The focus of my research is primarily on development of methods and supporting tools for visualization and analysis of networked...... systems that are covert and hence inherently complex. My Ph.D. is positioned within the wider framework of CrimeFighter project. The framework envisions a number of key knowledge management processes that are involved in the workflow, and the toolbox provides supporting tools to assist human end...

  5. In silico Biochemical Reaction Network Analysis (IBRENA): a package for simulation and analysis of reaction networks.

    Science.gov (United States)

    Liu, Gang; Neelamegham, Sriram

    2008-04-15

    We present In silico Biochemical Reaction Network Analysis (IBRENA), a software package which facilitates multiple functions including cellular reaction network simulation and sensitivity analysis (both forward and adjoint methods), coupled with principal component analysis, singular-value decomposition and model reduction. The software features a graphical user interface that aids simulation and plotting of in silico results. While the primary focus is to aid formulation, testing and reduction of theoretical biochemical reaction networks, the program can also be used for analysis of high-throughput genomic and proteomic data. The software package, manual and examples are available at http://www.eng.buffalo.edu/~neel/ibrena

  6. Analysis of the experimental positron lifetime spectra by neural networks

    Directory of Open Access Journals (Sweden)

    Avdić Senada

    2003-01-01

    Full Text Available This paper deals with the analysis of experimental positron lifetime spectra in polymer materials by using various algorithms of neural networks. A method based on the use of artificial neural networks for unfolding the mean lifetime and intensity of the spectral components of simulated positron lifetime spectra was previously suggested and tested on simulated data [Pžzsitetal, Applied Surface Science, 149 (1998, 97]. In this work, the applicability of the method to the analysis of experimental positron spectra has been verified in the case of spectra from polymer materials with three components. It has been demonstrated that the backpropagation neural network can determine the spectral parameters with a high accuracy and perform the decomposi-tion of lifetimes which differ by 10% or more. The backpropagation network has not been suitable for the identification of both the parameters and the number of spectral components. Therefore, a separate artificial neural network module has been designed to solve the classification problem. Module types based on self-organizing map and learning vector quantization algorithms have been tested. The learning vector quantization algorithm was found to have better performance and reliability. A complete artificial neural network analysis tool of positron lifetime spectra has been constructed to include a spectra classification module and parameter evaluation modules for spectra with a different number of components. In this way, both flexibility and high resolution can be achieved.

  7. Organizational network analysis for two networks in the Washington State Department of Transportation.

    Science.gov (United States)

    2010-10-01

    Organizational network analysis (ONA) consists of gathering data on information sharing and : connectivity in a group, calculating network measures, creating network maps, and using this : information to analyze and improve the functionality of the g...

  8. Developing an intelligence analysis process through social network analysis

    Science.gov (United States)

    Waskiewicz, Todd; LaMonica, Peter

    2008-04-01

    Intelligence analysts are tasked with making sense of enormous amounts of data and gaining an awareness of a situation that can be acted upon. This process can be extremely difficult and time consuming. Trying to differentiate between important pieces of information and extraneous data only complicates the problem. When dealing with data containing entities and relationships, social network analysis (SNA) techniques can be employed to make this job easier. Applying network measures to social network graphs can identify the most significant nodes (entities) and edges (relationships) and help the analyst further focus on key areas of concern. Strange developed a model that identifies high value targets such as centers of gravity and critical vulnerabilities. SNA lends itself to the discovery of these high value targets and the Air Force Research Laboratory (AFRL) has investigated several network measures such as centrality, betweenness, and grouping to identify centers of gravity and critical vulnerabilities. Using these network measures, a process for the intelligence analyst has been developed to aid analysts in identifying points of tactical emphasis. Organizational Risk Analyzer (ORA) and Terrorist Modus Operandi Discovery System (TMODS) are the two applications used to compute the network measures and identify the points to be acted upon. Therefore, the result of leveraging social network analysis techniques and applications will provide the analyst and the intelligence community with more focused and concentrated analysis results allowing them to more easily exploit key attributes of a network, thus saving time, money, and manpower.

  9. The Deference Due the Oracle: Computerized Text Analysis in a Basic Writing Class.

    Science.gov (United States)

    Otte, George

    1989-01-01

    Describes how a computerized text analysis program can help students discover error patterns in their writing, and notes how students' responses to analyses can reduce errors and improve their writing. (MM)

  10. Architecture Analysis of an FPGA-Based Hopfield Neural Network

    Directory of Open Access Journals (Sweden)

    Miguel Angelo de Abreu de Sousa

    2014-01-01

    Full Text Available Interconnections between electronic circuits and neural computation have been a strongly researched topic in the machine learning field in order to approach several practical requirements, including decreasing training and operation times in high performance applications and reducing cost, size, and energy consumption for autonomous or embedded developments. Field programmable gate array (FPGA hardware shows some inherent features typically associated with neural networks, such as, parallel processing, modular executions, and dynamic adaptation, and works on different types of FPGA-based neural networks were presented in recent years. This paper aims to address different aspects of architectural characteristics analysis on a Hopfield Neural Network implemented in FPGA, such as maximum operating frequency and chip-area occupancy according to the network capacity. Also, the FPGA implementation methodology, which does not employ multipliers in the architecture developed for the Hopfield neural model, is presented, in detail.

  11. Nonprofit Organizations in Disaster Response and Management: A Network Analysis

    Directory of Open Access Journals (Sweden)

    NAIM KAPUCU

    2018-01-01

    Full Text Available This paper tracks changes in the national disaster management system with regard to the nonprofit sector by looking at the roles ascribed to nonprofit organizations in the Federal Response Plan (FRP, National Response Plan (NRP, and National Response Framework (NRF. Additionally, the data collected from news reports and organizational after action reports about the inter-organizational interactions of emergency management agencies during the September 11th attacks and Hurricane Katrina are analyzed by using network analysis tools. The findings of the study indicate that there has been an increase in the interactions of the National Voluntary Organizations Active in Disasters (NVOAD network member organizations on par with policy changes in the NRP to involve nonprofit organizations in the national disaster planning process. In addition, those organizations close to the center of the network experienced enhanced communication and resource acquisition allowing them to successfully accomplish their missions, a finding that supports the development of strong network connections.

  12. Stochastic approach to observability analysis in water networks

    Directory of Open Access Journals (Sweden)

    S. Díaz

    2016-07-01

    Full Text Available This work presents an alternative technique to the existing methods for observability analysis (OA in water networks, which is a prior essential step for the implementation of state estimation (SE techniques within such systems. The methodology presented here starts from a known hydraulic state and assumes random gaussian distributions for the uncertainty of some hydraulic variables, which is then propagated to the rest of the system. This process is repeated again to analyze the change in the network uncertainty when metering devices considered as error-free are included, based on which the network observability can be evaluated. The method’s potential is presented in an illustrative example, which shows the additional information that this methodology provides with respect to traditional OA approaches. This proposal allows a better understanding of the network and constitutes a practical tool to prioritize the location of additional meters, thus enhancing the transformation of large urban areas into actual smart cities.

  13. Multifractal analysis of mobile social networks

    Science.gov (United States)

    Zheng, Wei; Zhang, Zifeng; Deng, Yufan

    2017-09-01

    As Wireless Fidelity (Wi-Fi)-enabled handheld devices have been widely used, the mobile social networks (MSNs) has been attracting extensive attention. Fractal approaches have also been widely applied to characterierize natural networks as useful tools to depict their spatial distribution and scaling properties. Moreover, when the complexity of the spatial distribution of MSNs cannot be properly charaterized by single fractal dimension, multifractal analysis is required. For further research, we introduced a multifractal analysis method based on box-covering algorithm to describe the structure of MSNs. Using this method, we find that the networks are multifractal at different time interval. The simulation results demonstrate that the proposed method is efficient for analyzing the multifractal characteristic of MSNs, which provides a distribution of singularities adequately describing both the heterogeneity of fractal patterns and the statistics of measurements across spatial scales in MSNs.

  14. Classification and Analysis of Computer Network Traffic

    DEFF Research Database (Denmark)

    Bujlow, Tomasz

    2014-01-01

    for traffic classification, which can be used for nearly real-time processing of big amounts of data using affordable CPU and memory resources. Other questions are related to methods for real-time estimation of the application Quality of Service (QoS) level based on the results obtained by the traffic......Traffic monitoring and analysis can be done for multiple different reasons: to investigate the usage of network resources, assess the performance of network applications, adjust Quality of Service (QoS) policies in the network, log the traffic to comply with the law, or create realistic models...... classifier. This thesis is focused on topics connected with traffic classification and analysis, while the work on methods for QoS assessment is limited to defining the connections with the traffic classification and proposing a general algorithm. We introduced the already known methods for traffic...

  15. Bandwidth Analysis of Smart Meter Network Infrastructure

    DEFF Research Database (Denmark)

    Balachandran, Kardi; Olsen, Rasmus Løvenstein; Pedersen, Jens Myrup

    2014-01-01

    Advanced Metering Infrastructure (AMI) is a net-work infrastructure in Smart Grid, which links the electricity customers to the utility company. This network enables smart services by making it possible for the utility company to get an overview of their customers power consumption and also control...... to utilize smart meters and which existing broadband network technologies can facilitate this smart meter service. Initially, scenarios for smart meter infrastructure are identified. The paper defines abstraction models which cover the AMI scenarios. When the scenario has been identified a general overview...... of the bandwidth requirements are analysed. For this analysis the assumptions and limitations are defined. The results obtained by the analysis show, that the amount of data collected and transferred by a smart meter is very low compared to the available bandwidth of most internet connections. The results show...

  16. Dynamic network-based epistasis analysis: Boolean examples

    Directory of Open Access Journals (Sweden)

    Eugenio eAzpeitia

    2011-12-01

    Full Text Available In this review we focus on how the hierarchical and single-path assumptions of epistasis analysis can bias the topologies of gene interactions infered. This has been acknowledged in several previous papers and reviews, but here we emphasize the critical importance of dynamic analyses, and specifically illustrate the use of Boolean network models. Epistasis in a broad sense refers to gene interactions, however, as originally proposed by Bateson (herein, classical epistasis, defined as the blocking of a particular allelic effect due to the effect of another allele at a different locus. Classical epistasis analysis has proven powerful and useful, allowing researchers to infer and assign directionality to gene interactions. As larger data sets are becoming available, the analysis of classical epistasis is being complemented with computer science tools and system biology approaches. We show that when the hierarchical and single-path assumptions are not met in classical epistasis analysis, the access to relevant information and the correct gene interaction topologies are hindered, and it becomes necessary to consider the temporal dynamics of gene interactions. The use of dynamical networks can overcome these limitations. We particularly focus on the use of Boolean networks that, like classical epistasis analysis, relies on logical formalisms, and hence can complement classical epistasis analysis and relax its assumptions. We develop a couple of theoretical examples and analyze them from a dynamic Boolean network model perspective. Boolean networks could help to guide additional experiments and discern among alternative regulatory schemes that would be impossible or difficult to infer without the elimination of these assumption from the classical epistasis analysis. We also use examples from the literature to show how a Boolean network-based approach has resolved ambiguities and guided epistasis analysis. Our review complements previous accounts, not

  17. From text to political positions: The convergence of political, linguistic and discourse analysis

    NARCIS (Netherlands)

    van Elfrinkhof, A.M.E.; Maks, I.; Kaal, A.R.; Kaal, A.R.; Maks, I.; van Elfrinkhof, A.M.E.

    2014-01-01

    Abstract: This chapter explores how three methods of political text analysis can complement each other to differentiate parties in detail. A word-frequency method and corpus linguistic techniques are joined by critical discourse analysis in an attempt to assess the ideological relation between

  18. Complementing the Numbers: A Text Mining Analysis of College Course Withdrawals

    Science.gov (United States)

    Michalski, Greg V.

    2011-01-01

    Excessive college course withdrawals are costly to the student and the institution in terms of time to degree completion, available classroom space, and other resources. Although generally well quantified, detailed analysis of the reasons given by students for course withdrawal is less common. To address this, a text mining analysis was performed…

  19. Mixed Methods Analysis of Enterprise Social Networks

    DEFF Research Database (Denmark)

    Behrendt, Sebastian; Richter, Alexander; Trier, Matthias

    2014-01-01

    The increasing use of enterprise social networks (ESN) generates vast amounts of data, giving researchers and managerial decision makers unprecedented opportunities for analysis. However, more transparency about the available data dimensions and how these can be combined is needed to yield accurate...

  20. Nonlinear Time Series Analysis via Neural Networks

    Science.gov (United States)

    Volná, Eva; Janošek, Michal; Kocian, Václav; Kotyrba, Martin

    This article deals with a time series analysis based on neural networks in order to make an effective forex market [Moore and Roche, J. Int. Econ. 58, 387-411 (2002)] pattern recognition. Our goal is to find and recognize important patterns which repeatedly appear in the market history to adapt our trading system behaviour based on them.

  1. Combining morphological analysis and Bayesian networks for ...

    African Journals Online (AJOL)

    Morphological analysis (MA) and Bayesian networks (BN) are two closely related modelling methods, each of which has its advantages and disadvantages for strategic decision support modelling. MA is a method for defining, linking and evaluating problem spaces. BNs are graphical models which consist of a qualitative ...

  2. Hydraulic Analysis of Water Distribution Network Using Shuffled Complex Evolution

    Directory of Open Access Journals (Sweden)

    Naser Moosavian

    2014-01-01

    Full Text Available Hydraulic analysis of water distribution networks is an important problem in civil engineering. A widely used approach in steady-state analysis of water distribution networks is the global gradient algorithm (GGA. However, when the GGA is applied to solve these networks, zero flows cause a computation failure. On the other hand, there are different mathematical formulations for hydraulic analysis under pressure-driven demand and leakage simulation. This paper introduces an optimization model for the hydraulic analysis of water distribution networks using a metaheuristic method called shuffled complex evolution (SCE algorithm. In this method, applying if-then rules in the optimization model is a simple way in handling pressure-driven demand and leakage simulation, and there is no need for an initial solution vector which must be chosen carefully in many other procedures if numerical convergence is to be achieved. The overall results indicate that the proposed method has the capability of handling various pipe networks problems without changing in model or mathematical formulation. Application of SCE in optimization model can lead to accurate solutions in pipes with zero flows. Finally, it can be concluded that the proposed method is a suitable alternative optimizer challenging other methods especially in terms of accuracy.

  3. An Analysis of Text Genres Belonging to Bilateral Commissive Text Types Used in the Management of Multinational Corporations for Communication Purposes

    Directory of Open Access Journals (Sweden)

    Suzana Jurin

    2012-06-01

    Full Text Available The aim of this article is to present and analyse text genres of the bilateral commissive type that are mostly used in management communication for attaining objectives of a particular corporation. This paper aims at providing a linguistic analysis of the text. Materials which have been used for the analysis of text genres and text types are based on theoretical principles of text linguistics. The literature and research related to the link between corporate discourse and corporations’ ideologies will not be taken into consideration in this paper. This topic will not be considered as important for this research.Text genres are dealt with in this paper as implementations of texts in communication. Their communicative function is the most important classification parameter. The analysis of text genres belonging to bilateral commissive text types that can be found in the corpus, aims at showing that management uses a specific vocabulary, grammatical structures and syntax in the communication by means of bilateral commissives and that text genres which have been analysed according to their micro structural and macro structural features make up a specific communication model that management uses in a given communicational situation.

  4. Text analysis and automatic creation of English reading activities using corpora

    Directory of Open Access Journals (Sweden)

    José Lopes Moreira Filho

    2015-07-01

    Full Text Available The use of corpora in language teaching is an important topic, since practice is aimed at ensuring that the teaching material is focused on the language in use. The process of creating activities for language teaching can be improved by using corpus data and computational tools in linguistic analysis. This study describes a system for text analysis and automatic creation of English reading activities. The results show that the system allows the development of teaching materials that focus on language in use and it also provides varied linguistic analysis, with less human effort, to the task of developing reading activities.

  5. Large-Scale Road Network Vulnerability Analysis

    OpenAIRE

    Jenelius, Erik

    2010-01-01

    Disruptions in the transport system can have severe impacts for affected individuals, businesses and the society as a whole. In this research, vulnerability is seen as the risk of unplanned system disruptions, with a focus on large, rare events. Vulnerability analysis aims to provide decision support regarding preventive and restorative actions, ideally as an integrated part of the planning process.The thesis specifically develops the methodology for vulnerability analysis of road networks an...

  6. Computer methods in electric network analysis

    Energy Technology Data Exchange (ETDEWEB)

    Saver, P.; Hajj, I.; Pai, M.; Trick, T.

    1983-06-01

    The computational algorithms utilized in power system analysis have more than just a minor overlap with those used in electronic circuit computer aided design. This paper describes the computer methods that are common to both areas and highlights the differences in application through brief examples. Recognizing this commonality has stimulated the exchange of useful techniques in both areas and has the potential of fostering new approaches to electric network analysis through the interchange of ideas.

  7. Time series analysis of temporal networks

    Science.gov (United States)

    Sikdar, Sandipan; Ganguly, Niloy; Mukherjee, Animesh

    2016-01-01

    A common but an important feature of all real-world networks is that they are temporal in nature, i.e., the network structure changes over time. Due to this dynamic nature, it becomes difficult to propose suitable growth models that can explain the various important characteristic properties of these networks. In fact, in many application oriented studies only knowing these properties is sufficient. For instance, if one wishes to launch a targeted attack on a network, this can be done even without the knowledge of the full network structure; rather an estimate of some of the properties is sufficient enough to launch the attack. We, in this paper show that even if the network structure at a future time point is not available one can still manage to estimate its properties. We propose a novel method to map a temporal network to a set of time series instances, analyze them and using a standard forecast model of time series, try to predict the properties of a temporal network at a later time instance. To our aim, we consider eight properties such as number of active nodes, average degree, clustering coefficient etc. and apply our prediction framework on them. We mainly focus on the temporal network of human face-to-face contacts and observe that it represents a stochastic process with memory that can be modeled as Auto-Regressive-Integrated-Moving-Average (ARIMA). We use cross validation techniques to find the percentage accuracy of our predictions. An important observation is that the frequency domain properties of the time series obtained from spectrogram analysis could be used to refine the prediction framework by identifying beforehand the cases where the error in prediction is likely to be high. This leads to an improvement of 7.96% (for error level ≤20%) in prediction accuracy on an average across all datasets. As an application we show how such prediction scheme can be used to launch targeted attacks on temporal networks. Contribution to the Topical Issue

  8. Critical Analysis of Media Violence Text on the Media Education Lessons

    Directory of Open Access Journals (Sweden)

    Alexander Fedorov

    2015-06-01

    Full Text Available The media violence is the important problem for education. Based on of Len Masterman’s media education theory of critical thinking and the methods of Umbeto Eco, the author of this article selected the following significant items for the analysis of media texts: author's ideology; socio-cultural, market and political environment, the process of creating a media text, audience perceptions, structure and narrative techniques. This approach is quite corresponds to the method of media texts analysis, building on media literacy education aspects such as media agencies, media / media text categories, media technologies, media languages, media representations and media audiences, because all these concepts are directly related to the ideological, socio-cultural and structural aspects.

  9. Text localization using standard deviation analysis of structure elements and support vector machines

    Directory of Open Access Journals (Sweden)

    Zagoris Konstantinos

    2011-01-01

    Full Text Available Abstract A text localization technique is required to successfully exploit document images such as technical articles and letters. The proposed method detects and extracts text areas from document images. Initially a connected components analysis technique detects blocks of foreground objects. Then, a descriptor that consists of a set of suitable document structure elements is extracted from the blocks. This is achieved by incorporating an algorithm called Standard Deviation Analysis of Structure Elements (SDASE which maximizes the separability between the blocks. Another feature of the SDASE is that its length adapts according to the requirements of the application. Finally, the descriptor of each block is used as input to a trained support vector machines that classify the block as text or not. The proposed technique is also capable of adjusting to the text structure of the documents. Experimental results on benchmarking databases demonstrate the effectiveness of the proposed method.

  10. Homonyms's complex networks to semantic analysis textual

    Directory of Open Access Journals (Sweden)

    Jadson da Silva Santos

    2017-04-01

    Full Text Available Introduction: Study centres in natural language processing already spread and the study have several applications. Relate with this research area, it is common the use technic for manipulation a text. These technic is be able to determine the word morphology and the word syntax. There are tools that do this work, however adding engines for semantic identification of the words is essential for increase the automatic understanding the used language. Objective: On the basis of that, This paper present the process of using complex networks as a comparative database to determine by context the meaning of words that express different positions. Moreover, they are classified as same morphology and syntax , as with some homonyms. Methodology: Through of a experimental methodology, the model proposed it is based in consolidate researches in Natural Language Processing for building a Complex Network that receives as vertices the words of a certain text and establishes its connections from the occurrence of adjacency between these terms. Therefore, observing the variations of network, it is identified how to textual namesakes are related and through an context analyzed how if be there, check whether it is used to express more than one meaning. Results: A generic process with stages of preprocessing, building of a Complex Network used to Natural Language Processing for the building of a network homonyms to extract semantic information textual. Conclusions: The analyze of homonyms selected and labeled is the process not only morphosyntatic, adding semantic in the phrase, paragraph or text where the words are applied. However, with Natural Language Processing an events and philosophical facts can be better analyzed through of a world written textually, for example, the power of argument and the writing of an author profile.

  11. Capacity analysis of vehicular communication networks

    CERN Document Server

    Lu, Ning

    2013-01-01

    This SpringerBrief focuses on the network capacity analysis of VANETs, a key topic as fundamental guidance on design and deployment of VANETs is very limited. Moreover, unique characteristics of VANETs impose distinguished challenges on such an investigation. This SpringerBrief first introduces capacity scaling laws for wireless networks and briefly reviews the prior arts in deriving the capacity of VANETs. It then studies the unicast capacity considering the socialized mobility model of VANETs. With vehicles communicating based on a two-hop relaying scheme, the unicast capacity bound is deriv

  12. Historical Network Analysis of the Web

    DEFF Research Database (Denmark)

    Brügger, Niels

    2013-01-01

    of the online web has for a number of years gained currency within Internet studies. However, the combination of these two phenomena—historical network analysis of material in web archives—can at best be characterized as an emerging new area of study. Most of the methodological challenges within this new area...... at the Danish parliamentary elections in 2011, 2007, and 2001. As the Internet grows older historical studies of networks on the web will probably become more widespread and therefore it may be about time to begin debating the methodological challenges within this emerging field....

  13. "I'll See You on IM, Text, or Call You": A Social Network Approach of Adolescents' Use of Communication Media

    Science.gov (United States)

    Van Cleemput, Katrien

    2010-01-01

    This study explores some possibilities of social network analysis for studying adolescents' communication patterns. A full network analysis was conducted on third-grade high school students (15 year olds, 137 students) in Belgium. The results pointed out that face-to-face communication was still the most prominent way for information to flow…

  14. Text mining of full-text journal articles combined with gene expression analysis reveals a relationship between sphingosine-1-phosphate and invasiveness of a glioblastoma cell line

    Directory of Open Access Journals (Sweden)

    DeSesa Catherine

    2006-08-01

    Full Text Available Abstract Background Sphingosine 1-phosphate (S1P, a lysophospholipid, is involved in various cellular processes such as migration, proliferation, and survival. To date, the impact of S1P on human glioblastoma is not fully understood. Particularly, the concerted role played by matrix metalloproteinases (MMP and S1P in aggressive tumor behavior and angiogenesis remains to be elucidated. Results To gain new insights in the effect of S1P on angiogenesis and invasion of this type of malignant tumor, we used microarrays to investigate the gene expression in glioblastoma as a response to S1P administration in vitro. We compared the expression profiles for the same cell lines under the influence of epidermal growth factor (EGF, an important growth factor. We found a set of 72 genes that are significantly differentially expressed as a unique response to S1P. Based on the result of mining full-text articles from 20 scientific journals in the field of cancer research published over a period of five years, we inferred gene-gene interaction networks for these 72 differentially expressed genes. Among the generated networks, we identified a particularly interesting one. It describes a cascading event, triggered by S1P, leading to the transactivation of MMP-9 via neuregulin-1 (NRG-1, vascular endothelial growth factor (VEGF, and the urokinase-type plasminogen activator (uPA. This interaction network has the potential to shed new light on our understanding of the role played by MMP-9 in invasive glioblastomas. Conclusion Automated extraction of information from biological literature promises to play an increasingly important role in biological knowledge discovery. This is particularly true for high-throughput approaches, such as microarrays, and for combining and integrating data from different sources. Text mining may hold the key to unraveling previously unknown relationships between biological entities and could develop into an indispensable instrument in the

  15. PROJECT ACTIVITY ANALYSIS WITHOUT THE NETWORK MODEL

    Directory of Open Access Journals (Sweden)

    S. Munapo

    2012-01-01

    Full Text Available

    ENGLISH ABSTRACT: This paper presents a new procedure for analysing and managing activity sequences in projects. The new procedure determines critical activities, critical path, start times, free floats, crash limits, and other useful information without the use of the network model. Even though network models have been successfully used in project management so far, there are weaknesses associated with the use. A network is not easy to generate, and dummies that are usually associated with it make the network diagram complex – and dummy activities have no meaning in the original project management problem. The network model for projects can be avoided while still obtaining all the useful information that is required for project management. What are required are the activities, their accurate durations, and their predecessors.

    AFRIKAANSE OPSOMMING: Die navorsing beskryf ’n nuwerwetse metode vir die ontleding en bestuur van die sekwensiële aktiwiteite van projekte. Die voorgestelde metode bepaal kritiese aktiwiteite, die kritieke pad, aanvangstye, speling, verhasing, en ander groothede sonder die gebruik van ’n netwerkmodel. Die metode funksioneer bevredigend in die praktyk, en omseil die administratiewe rompslomp van die tradisionele netwerkmodelle.

  16. Psychometric evaluation of the Serbian dictionary for automatic text analysis - LIWCser

    Directory of Open Access Journals (Sweden)

    Bjekić Jovana

    2014-01-01

    Full Text Available LIWC (Linguistic Inquiry and Word Count is widely used word-level content analysis software. It was used in large number of studies in the fields of clinical, social and personality psychology, and it is adapted for text analysis in 11 world languages. The aim of this research was to validate empirically newly constructed adaptation of LIWC software for Serbian language (LIWCser. The sample of the texts consisted of 384 texts in Serbian and 141 texts in English. It included scientific paper abstracts, newspaper articles, movie subtitles, short stories and essays. Comparative analysis of Serbian and English version of the software demonstrated acceptable level of equivalence (ICCM=.70. Average coverage of the texts with LIWCser dictionary was 69.93%, and variability of this measure in different types of texts is in line with expected. Adaptation of LIWC software for Serbian opens entirely new possibilities of assessment of spontaneous verbal behaviour that is highly relevant for different fields of psychology. [Projekat Ministarstva nauke Republike Srbije, br. 179018 i br. 175012

  17. Integrated Network Analysis and Effective Tools in Plant Systems Biology

    Directory of Open Access Journals (Sweden)

    Atsushi eFukushima

    2014-11-01

    Full Text Available One of the ultimate goals in plant systems biology is to elucidate the genotype-phenotype relationship in plant cellular systems. Integrated network analysis that combines omics data with mathematical models has received particular attention. Here we focus on the latest cutting-edge computational advances that facilitate their combination. We highlight (1 network visualization tools, (2 pathway analyses, (3 genome-scale metabolic reconstruction, and (4 the integration of high-throughput experimental data and mathematical models. Multi-omics data that contain the genome, transcriptome, proteome, and metabolome and mathematical models are expected to integrate and expand our knowledge of complex plant metabolisms.

  18. INVESTIGATING TEACHERS’ PROFESSIONAL COMPETENCE: A SYSTEMIC FUNCTIONAL LINGUISTIC ANALYSIS OF TEACHERS’ REPORT TEXTS

    Directory of Open Access Journals (Sweden)

    Sudarsono M. I. Sudarsono

    2017-05-01

    Full Text Available This research aims at observing the teachers’ professional competence by investigating the report texts written by three English teachers in a junior high school in terms of their schematic structures and linguistic features. To achieve this aim, a qualitative case study design involving analysis of English teachers’ report texts and interviews with these English teachers was employed in this research. The results of this research showed that generally the three English teachers have demonstrated sufficient ability in applying appropriate schematic structures and linguistic features relevant to the criteria of a report text. However, the results of this research also indicate that some improvements in understanding and writing a report text, especially in terms of schematic structure, linguistic features, and theme progressions, are needed to enhance the teachers’ subject matter content knowledge about report text.

  19. Opinion Mining in Latvian Text Using Semantic Polarity Analysis and Machine Learning Approach

    Directory of Open Access Journals (Sweden)

    Gatis Špats

    2016-07-01

    Full Text Available In this paper we demonstrate approaches for opinion mining in Latvian text. Authors have applied, combined and extended results of several previous studies and public resources to perform opinion mining in Latvian text using two approaches, namely, semantic polarity analysis and machine learning. One of the most significant constraints that make application of opinion mining for written content classification in Latvian text challenging is the limited publicly available text corpora for classifier training. We have joined several sources and created a publically available extended lexicon. Our results are comparable to or outperform current achievements in opinion mining in Latvian. Experiments show that lexicon-based methods provide more accurate opinion mining than the application of Naive Bayes machine learning classifier on Latvian tweets. Methods used during this study could be further extended using human annotators, unsupervised machine learning and bootstrapping to create larger corpora of classified text.

  20. Mathematical Analysis of Urban Spatial Networks

    CERN Document Server

    Blanchard, Philippe

    2009-01-01

    Cities can be considered to be among the largest and most complex artificial networks created by human beings. Due to the numerous and diverse human-driven activities, urban network topology and dynamics can differ quite substantially from that of natural networks and so call for an alternative method of analysis. The intent of the present monograph is to lay down the theoretical foundations for studying the topology of compact urban patterns, using methods from spectral graph theory and statistical physics. These methods are demonstrated as tools to investigate the structure of a number of real cities with widely differing properties: medieval German cities, the webs of city canals in Amsterdam and Venice, and a modern urban structure such as found in Manhattan. Last but not least, the book concludes by providing a brief overview of possible applications that will eventually lead to a useful body of knowledge for architects, urban planners and civil engineers.

  1. A network analysis of Sibiu County, Romania

    CERN Document Server

    Grama, Cristina-Nicol

    2013-01-01

    Network science methods have proved to be able to provide useful insights from both a theoretical and a practical point of view in that they can better inform governance policies in complex dynamic environments. The tourism research community has provided an increasing number of works that analyse destinations from a network science perspective. However, most of the studies refer to relatively small samples of actors and linkages. With this note we provide a full network study, although at a preliminary stage, that reports a complete analysis of a Romanian destination (Sibiu). Our intention is to increase the set of similar studies with the aim of supporting the investigations in structural and dynamical characteristics of tourism destinations.

  2. Intentional risk management through complex networks analysis

    CERN Document Server

    Chapela, Victor; Moral, Santiago; Romance, Miguel

    2015-01-01

    This book combines game theory and complex networks to examine intentional technological risk through modeling. As information security risks are in constant evolution,  the methodologies and tools to manage them must evolve to an ever-changing environment. A formal global methodology is explained  in this book, which is able to analyze risks in cyber security based on complex network models and ideas extracted from the Nash equilibrium. A risk management methodology for IT critical infrastructures is introduced which provides guidance and analysis on decision making models and real situations. This model manages the risk of succumbing to a digital attack and assesses an attack from the following three variables: income obtained, expense needed to carry out an attack, and the potential consequences for an attack. Graduate students and researchers interested in cyber security, complex network applications and intentional risk will find this book useful as it is filled with a number of models, methodologies a...

  3. Micro-macro analysis of complex networks.

    Science.gov (United States)

    Marchiori, Massimo; Possamai, Lino

    2015-01-01

    Complex systems have attracted considerable interest because of their wide range of applications, and are often studied via a "classic" approach: study a specific system, find a complex network behind it, and analyze the corresponding properties. This simple methodology has produced a great deal of interesting results, but relies on an often implicit underlying assumption: the level of detail on which the system is observed. However, in many situations, physical or abstract, the level of detail can be one out of many, and might also depend on intrinsic limitations in viewing the data with a different level of abstraction or precision. So, a fundamental question arises: do properties of a network depend on its level of observability, or are they invariant? If there is a dependence, then an apparently correct network modeling could in fact just be a bad approximation of the true behavior of a complex system. In order to answer this question, we propose a novel micro-macro analysis of complex systems that quantitatively describes how the structure of complex networks varies as a function of the detail level. To this extent, we have developed a new telescopic algorithm that abstracts from the local properties of a system and reconstructs the original structure according to a fuzziness level. This way we can study what happens when passing from a fine level of detail ("micro") to a different scale level ("macro"), and analyze the corresponding behavior in this transition, obtaining a deeper spectrum analysis. The obtained results show that many important properties are not universally invariant with respect to the level of detail, but instead strongly depend on the specific level on which a network is observed. Therefore, caution should be taken in every situation where a complex network is considered, if its context allows for different levels of observability.

  4. Development of Network Analysis and Visualization System for KEGG Pathways

    Directory of Open Access Journals (Sweden)

    Dongmin Seo

    2015-07-01

    Full Text Available Big data refers to informationalization technology for extracting valuable information through the use and analysis of large-scale data and, based on that data, deriving plans for response or predicting changes. With the development of software and devices for next generation sequencing, a vast amount of bioinformatics data has been generated recently. Also, bioinformatics data based big-data technology is rising rapidly as a core technology by the bioinformatician, biologist and big-data scientist. KEGG pathway is bioinformatics data for understanding high-level functions and utilities of the biological system. However, KEGG pathway analysis requires a lot of time and effort because KEGG pathways are high volume and very diverse. In this paper, we proposed a network analysis and visualization system that crawl user interest KEGG pathways, construct a pathway network based on a hierarchy structure of pathways and visualize relations and interactions of pathways by clustering and selecting core pathways from the network. Finally, we construct a pathway network collected by starting with an Alzheimer’s disease pathway and show the results on clustering and selecting core pathways from the pathway network.

  5. English Language Error Analysis of the Written Texts Produced by Ukrainian Learners: Data Collection

    Directory of Open Access Journals (Sweden)

    Lessia Mykolayivna Kotsyuk

    2015-12-01

    Full Text Available English Language Error Analysis of the Written Texts Produced by Ukrainian Learners: Data Collection Recently, the studies of second language acquisition have tended to focus on learners errors as they help to predict the difficulties involved in acquiring a second language. Thus, teachers can be made aware of the difficult areas to be encountered by the students and pay special attention and devote emphasis to them. The research goals of the article are to define what error analysis is and how it is important in L2 teaching process, to state the significance of corpus studies in identifying of different types of errors and mistakes, to provide the results of error analysis of the corpus of written texts produced by Ukrainian learners. In this article, major types of errors in English as a second language for Ukrainian students are mentioned.

  6. Text localization using standard deviation analysis of structure elements and support vector machines

    Science.gov (United States)

    Zagoris, Konstantinos; Chatzichristofis, Savvas A.; Papamarkos, Nikos

    2011-12-01

    A text localization technique is required to successfully exploit document images such as technical articles and letters. The proposed method detects and extracts text areas from document images. Initially a connected components analysis technique detects blocks of foreground objects. Then, a descriptor that consists of a set of suitable document structure elements is extracted from the blocks. This is achieved by incorporating an algorithm called Standard Deviation Analysis of Structure Elements (SDASE) which maximizes the separability between the blocks. Another feature of the SDASE is that its length adapts according to the requirements of the application. Finally, the descriptor of each block is used as input to a trained support vector machines that classify the block as text or not. The proposed technique is also capable of adjusting to the text structure of the documents. Experimental results on benchmarking databases demonstrate the effectiveness of the proposed method.

  7. OBJECT ORIENTED METRIC BASED ANALYSIS OF TEXT TRANSMISSION IN E-LEARNING THROUGH NATURAL LANGUAGE STEGANOGRAPHY

    OpenAIRE

    Soumendu Banerjee; Kh Amirul Islam; Sunil Karforma; Akash Nag

    2017-01-01

    E-learning is an application of information and communication technology in the field of learning. Through steganography the e-learning institution can provide security to other participants of e-learning like teacher and learner. Here we use text steganography with modified SNOW algorithm while passing secret texts from the administrator to the learner in an e-learning system. In this paper, we calculate the object oriented metric based analysis of CK and MOOD metrics of our proposed model, ...

  8. Network analysis of breast cancer progression and reversal using a tree-evolving network algorithm.

    Directory of Open Access Journals (Sweden)

    Ankur P Parikh

    2014-07-01

    Full Text Available The HMT3522 progression series of human breast cells have been used to discover how tissue architecture, microenvironment and signaling molecules affect breast cell growth and behaviors. However, much remains to be elucidated about malignant and phenotypic reversion behaviors of the HMT3522-T4-2 cells of this series. We employed a "pan-cell-state" strategy, and analyzed jointly microarray profiles obtained from different state-specific cell populations from this progression and reversion model of the breast cells using a tree-lineage multi-network inference algorithm, Treegl. We found that different breast cell states contain distinct gene networks. The network specific to non-malignant HMT3522-S1 cells is dominated by genes involved in normal processes, whereas the T4-2-specific network is enriched with cancer-related genes. The networks specific to various conditions of the reverted T4-2 cells are enriched with pathways suggestive of compensatory effects, consistent with clinical data showing patient resistance to anticancer drugs. We validated the findings using an external dataset, and showed that aberrant expression values of certain hubs in the identified networks are associated with poor clinical outcomes. Thus, analysis of various reversion conditions (including non-reverted of HMT3522 cells using Treegl can be a good model system to study drug effects on breast cancer.

  9. Research trends on Big Data in Marketing: A text mining and topic modeling based literature analysis

    OpenAIRE

    Alexandra Amado; Paulo Cortez; Paulo Rita; Sérgio Moro

    2018-01-01

    Given the research interest on Big Data in Marketing, we present a research literature analysis based on a text mining semi-automated approach with the goal of identifying the main trends in this domain. In particular, the analysis focuses on relevant terms and topics related with five dimensions: Big Data, Marketing, Geographic location of authors’ affiliation (countries and continents), Products, and Sectors. A total of 1560 articles published from 2010 to 2015 were scrutinized. The finding...

  10. The Network's Data Security Risk Analysis

    Directory of Open Access Journals (Sweden)

    Emil BURTESCU

    2008-01-01

    Full Text Available Establishing the networks security risk can be a very difficult operation especially for the small companies which, from financial reasons can't appeal at specialist in this domain, or for the medium or large companies that don't have experience. The following method proposes not to use complex financial calculus to determine the loss level and the value of impact making the determination of risk level a lot easier.

  11. The interplay of text, meaning and practice: methodological considerations on discourse analysis in medical education.

    Science.gov (United States)

    Kärreman, Dan; Levay, Charlotta

    2017-01-01

    The study of discourses (i.e. verbal interactions or written accounts) is increasingly used in social sciences to gain insight into issues connected to discourse, such as meanings, behaviours and actions. This paper situates discourse analysis in medical education, based on a framework developed in organisational discourse analysis and widely deployed in other social science disciplines. This paper aims to examine the constructs of 'discourse' and 'discourse analysis', and how various understandings of discourse and discourse analysis may play out in empirical and analytical settings, with a particular focus on the field of medical education. The study is based on a literature analysis of discourse analysis approaches published in Medical Education. Findings suggest that empirical studies through discourse analysis can be heuristically understood in terms of the links between text, practices and meaning. Discourse analysis provides a more strongly supported argument when it is possible to defend claims on three levels: practice, using observational data; meaning, using ethnographic data, and text, using conversational and textual data. © 2016 John Wiley & Sons Ltd and The Association for the Study of Medical Education.

  12. Analysis of texts produced by students of the early years: guidelines for a possible diagnosis

    Directory of Open Access Journals (Sweden)

    Terezinha da Conceição Costa-Hübes

    2012-12-01

    Full Text Available The analysis of students’ texts requires from the teacher scientific knowledge about language which provides him subsidies for the diagnosis of the writings. Thus, this paper aims to present some reflections on the possibilities of using a diagnostic table, designed with the purpose of guiding the teacher – when assessing the student’s text – in the identification of the mastered and non-mastered aspects in writing. The designing of the table is the result of studies carried out by a study group on Portuguese language, consisting of teachers of the early years and supported by the theories of speech genres (BAKHTIN, 2003 and text genres (BRONCKART, 2003, the concept of text as a teaching unit (GERALDI, 1984 and, more specifically, the discussions on practices of linguistic analysis (GERALDI, 1984 and 1997. In order to test the use of the table, we will take texts of the genre ‘note’ produced by students of the 3rd year of elementary school, considering genre, text and spelling aspects.

  13. Social network analysis and network connectedness analysis for industrial symbiotic systems: model development and case study

    Science.gov (United States)

    Zhang, Yan; Zheng, Hongmei; Chen, Bin; Yang, Naijin

    2013-06-01

    An important and practical pattern of industrial symbiosis is rapidly developing: eco-industrial parks. In this study, we used social network analysis to study the network connectedness (i.e., the proportion of the theoretical number of connections that had been achieved) and related attributes of these hybrid ecological and industrial symbiotic systems. This approach provided insights into details of the network's interior and analyzed the overall degree of connectedness and the relationships among the nodes within the network. We then characterized the structural attributes of the network and subnetwork nodes at two levels (core and periphery), thereby providing insights into the operational problems within each eco-industrial park. We chose ten typical ecoindustrial parks in China and around the world and compared the degree of network connectedness of these systems that resulted from exchanges of products, byproducts, and wastes. By analyzing the density and nodal degree, we determined the relative power and status of the nodes in these networks, as well as other structural attributes such as the core-periphery structure and the degree of sub-network connectedness. The results reveal the operational problems created by the structure of the industrial networks and provide a basis for improving the degree of completeness, thereby increasing their potential for sustainable development and enriching the methods available for the study of industrial symbiosis.

  14. The Text-mining based PubChem Bioassay neighboring analysis.

    Science.gov (United States)

    Han, Lianyi; Suzek, Tugba O; Wang, Yanli; Bryant, Steve H

    2010-11-08

    In recent years, the number of High Throughput Screening (HTS) assays deposited in PubChem has grown quickly. As a result, the volume of both the structured information (i.e. molecular structure, bioactivities) and the unstructured information (such as descriptions of bioassay experiments), has been increasing exponentially. As a result, it has become even more demanding and challenging to efficiently assemble the bioactivity data by mining the huge amount of information to identify and interpret the relationships among the diversified bioassay experiments. In this work, we propose a text-mining based approach for bioassay neighboring analysis from the unstructured text descriptions contained in the PubChem BioAssay database. The neighboring analysis is achieved by evaluating the cosine scores of each bioassay pair and fraction of overlaps among the human-curated neighbors. Our results from the cosine score distribution analysis and assay neighbor clustering analysis on all PubChem bioassays suggest that strong correlations among the bioassays can be identified from their conceptual relevance. A comparison with other existing assay neighboring methods suggests that the text-mining based bioassay neighboring approach provides meaningful linkages among the PubChem bioassays, and complements the existing methods by identifying additional relationships among the bioassay entries. The text-mining based bioassay neighboring analysis is efficient for correlating bioassays and studying different aspects of a biological process, which are otherwise difficult to achieve by existing neighboring procedures due to the lack of specific annotations and structured information. It is suggested that the text-mining based bioassay neighboring analysis can be used as a standalone or as a complementary tool for the PubChem bioassay neighboring process to enable efficient integration of assay results and generate hypotheses for the discovery of bioactivities of the tested reagents.

  15. Introduction to stream network habitat analysis

    Science.gov (United States)

    Bartholow, John M.; Waddle, Terry J.

    1986-01-01

    Increasing demands on stream resources by a variety of users have resulted in an increased emphasis on studies that evaluate the cumulative effects of basinwide water management programs. Network habitat analysis refers to the evaluation of an entire river basin (or network) by predicting its habitat response to alternative management regimes. The analysis principally focuses on the biological and hydrological components of the riv er basin, which include both micro- and macrohabitat. (The terms micro- and macrohabitat are further defined and discussed later in this document.) Both conceptual and analytic models are frequently used for simplifying and integrating the various components of the basin. The model predictions can be used in developing management recommendations to preserve, restore, or enhance instream fish habitat. A network habitat analysis should begin with a clear and concise statement of the study objectives and a thorough understanding of the institutional setting in which the study results will be applied. This includes the legal, social, and political considerations inherent in any water management setting. The institutional environment may dictate the focus and level of detail required of the study to a far greater extent than the technical considerations. After the study objectives, including species on interest, and institutional setting are collectively defined, the technical aspects should be scoped to determine the spatial and temporal requirements of the analysis. A macro level approach should be taken first to identify critical biological elements and requirements. Next, habitat availability is quantified much as in a "standard" river segment analysis, with the likely incorporation of some macrohabitat components, such as stream temperature. Individual river segments may be aggregated to represent the networkwide habitat response of alternative water management schemes. Things learned about problems caused or opportunities generated may

  16. Principal component analysis networks and algorithms

    CERN Document Server

    Kong, Xiangyu; Duan, Zhansheng

    2017-01-01

    This book not only provides a comprehensive introduction to neural-based PCA methods in control science, but also presents many novel PCA algorithms and their extensions and generalizations, e.g., dual purpose, coupled PCA, GED, neural based SVD algorithms, etc. It also discusses in detail various analysis methods for the convergence, stabilizing, self-stabilizing property of algorithms, and introduces the deterministic discrete-time systems method to analyze the convergence of PCA/MCA algorithms. Readers should be familiar with numerical analysis and the fundamentals of statistics, such as the basics of least squares and stochastic algorithms. Although it focuses on neural networks, the book only presents their learning law, which is simply an iterative algorithm. Therefore, no a priori knowledge of neural networks is required. This book will be of interest and serve as a reference source to researchers and students in applied mathematics, statistics, engineering, and other related fields.

  17. EFL Reading as Seen through Translation and Discourse Analysis: Narrative vs. Expository Texts.

    Science.gov (United States)

    Bensoussan, Marsha

    1990-01-01

    Proposes to examine reading problems by means of discourse analysis of students' translations. The study is based on two previous experiments in which first-year university students translated English texts into their native language (Hebrew or Arabic). (37 references) (Author/VWL)

  18. Visual to Print Transfer: A Literacy Strategy for Theme Analysis of Text

    Science.gov (United States)

    Buelow, Stephanie

    2015-01-01

    This article shares a literacy strategy to support students' analysis of the theme of text and provide evidence to support their assertion. The strategy is called Visual to Print Transfer (VPT). The VPT strategy leverages students' out-of-school literacy practices involving media images of Hollywood icons as a way to support their understanding of…

  19. The Effect of Literature Circles on Text Analysis and Reading Desire

    Science.gov (United States)

    Karatay, Halit

    2017-01-01

    In order to make teaching activities more appealing, different techniques and strategies have been constantly employed. This study utilized the strategy of "literature circles" to improve the text-analysis skills, reading desires, and interests of prospective teachers of Turkish. "Literature circles" was not chosen to be used…

  20. Intellectual Disabilities, Challenging Behaviour and Referral Texts: A Critical Discourse Analysis

    Science.gov (United States)

    Nunkoosing, Karl; Haydon-Laurelut, Mark

    2011-01-01

    The texts of referrals written by workers in residential services for people with learning difficulties constitute sites where contemporary discourses of intellectual disabilities are being constructed. This paper uses Critical Discourse Analysis to examine referrals made to a Community Learning Disability Team (CLDT). The study finds referral…

  1. The Determination of Children's Knowledge of Global Lunar Patterns from Online Essays Using Text Mining Analysis

    Science.gov (United States)

    Cheon, Jongpil; Lee, Sangno; Smith, Walter; Song, Jaeki; Kim, Yongjin

    2013-01-01

    The purpose of this study was to use text mining analysis of early adolescents' online essays to determine their knowledge of global lunar patterns. Australian and American students in grades five to seven wrote about global lunar patterns they had discovered by sharing observations with each other via the Internet. These essays were analyzed for…

  2. Utilization of Selected Data Mining Methods for Communication Network Analysis

    Directory of Open Access Journals (Sweden)

    V. Ondryhal

    2011-06-01

    Full Text Available The aim of the project was to analyze the behavior of military communication networks based on work with real data collected continuously since 2005. With regard to the nature and amount of the data, data mining methods were selected for the purpose of analyses and experiments. The quality of real data is often insufficient for an immediate analysis. The article presents the data cleaning operations which have been carried out with the aim to improve the input data sample to obtain reliable models. Gradually, by means of properly chosen SW, network models were developed to verify generally valid patterns of network behavior as a bulk service. Furthermore, unlike the commercially available communication networks simulators, the models designed allowed us to capture nonstandard models of network behavior under an increased load, verify the correct sizing of the network to the increased load, and thus test its reliability. Finally, based on previous experience, the models enabled us to predict emergency situations with a reasonable accuracy.

  3. Network Analysis and Modeling in Systems Biology

    OpenAIRE

    Bosque Chacón, Gabriel

    2017-01-01

    This thesis is dedicated to the study and comprehension of biological networks at the molecular level. The objectives were to analyse their topology, integrate it in a genotype-phenotype analysis, develop richer mathematical descriptions for them, study their community structure and compare different methodologies for estimating their internal fluxes. The work presented in this document moves around three main axes. The first one is the biological. Which organisms were studied in this ...

  4. A user’s guide to network analysis in R

    CERN Document Server

    Luke, Douglas

    2015-01-01

    Presenting a comprehensive resource for the mastery of network analysis in R, the goal of Network Analysis with R is to introduce modern network analysis techniques in R to social, physical, and health scientists. The mathematical foundations of network analysis are emphasized in an accessible way and readers are guided through the basic steps of network studies: network conceptualization, data collection and management, network description, visualization, and building and testing statistical models of networks. As with all of the books in the Use R! series, each chapter contains extensive R code and detailed visualizations of datasets. Appendices will describe the R network packages and the datasets used in the book. An R package developed specifically for the book, available to readers on GitHub, contains relevant code and real-world network datasets as well.

  5. Reconstructing networks of pathways via significance analysis of their intersections

    Directory of Open Access Journals (Sweden)

    Francesconi Mirko

    2008-04-01

    Full Text Available Abstract Background Significance analysis at single gene level may suffer from the limited number of samples and experimental noise that can severely limit the power of the chosen statistical test. This problem is typically approached by applying post hoc corrections to control the false discovery rate, without taking into account prior biological knowledge. Pathway or gene ontology analysis can provide an alternative way to relax the significance threshold applied to single genes and may lead to a better biological interpretation. Results Here we propose a new analysis method based on the study of networks of pathways. These networks are reconstructed considering both the significance of single pathways (network nodes and the intersection between them (links. We apply this method for the reconstruction of networks of pathways to two gene expression datasets: the first one obtained from a c-Myc rat fibroblast cell line expressing a conditional Myc-estrogen receptor oncoprotein; the second one obtained from the comparison of Acute Myeloid Leukemia and Acute Lymphoblastic Leukemia derived from bone marrow samples. Conclusion Our method extends statistical models that have been recently adopted for the significance analysis of functional groups of genes to infer links between these groups. We show that groups of genes at the interface between different pathways can be considered as relevant even if the pathways they belong to are not significant by themselves.

  6. Orthographic Structuring of Human Speech and Texts Linguistic Application of Recurrence Quantification Analysis

    CERN Document Server

    Orsucci, F; Giuliani, A; Webber, C L; Zbilut, J P

    1997-01-01

    A methodology based upon recurrence quantification analysis is proposed for the study of orthographic structure of written texts. Five different orthographic data sets (20th century Italian poems, 20th century American poems, contemporary Swedish poems with their corresponding Italian translations, Italian speech samples, and American speech samples) were subjected to recurrence quantification analysis, a procedure which has been found to be diagnostically useful in the quantitative assessment of ordered series in fields such as physics, molecular dynamics, physiology, and general signal processing. Recurrence quantification was developed from recurrence plots as applied to the analysis of nonlinear, complex systems in the physical sciences, and is based on the computation of a distance matrix of the elements of an ordered series (in this case the letters consituting selected speech and poetic texts). From a strictly mathematical view, the results show the possibility of demonstrating invariance between diffe...

  7. A meta-analysis of the effects of texting on driving.

    Science.gov (United States)

    Caird, Jeff K; Johnston, Kate A; Willness, Chelsea R; Asbridge, Mark; Steel, Piers

    2014-10-01

    Text messaging while driving is considered dangerous and known to produce injuries and fatalities. However, the effects of text messaging on driving performance have not been synthesized or summarily estimated. All available experimental studies that measured the effects of text messaging on driving were identified through database searches using variants of "driving" and "texting" without restriction on year of publication through March 2014. Of the 1476 abstracts reviewed, 82 met general inclusion criteria. Of these, 28 studies were found to sufficiently compare reading or typing text messages while driving with a control or baseline condition. Independent variables (text-messaging tasks) were coded as typing, reading, or a combination of both. Dependent variables included eye movements, stimulus detection, reaction time, collisions, lane positioning, speed and headway. Statistics were extracted from studies to compute effect sizes (rc). A total sample of 977 participants from 28 experimental studies yielded 234 effect size estimates of the relationships among independent and dependent variables. Typing and reading text messages while driving adversely affected eye movements, stimulus detection, reaction time, collisions, lane positioning, speed and headway. Typing text messages alone produced similar decrements as typing and reading, whereas reading alone had smaller decrements over fewer dependent variables. Typing and reading text messages affects drivers' capability to adequately direct attention to the roadway, respond to important traffic events, control a vehicle within a lane and maintain speed and headway. This meta-analysis provides convergent evidence that texting compromises the safety of the driver, passengers and other road users. Combined efforts, including legislation, enforcement, blocking technologies, parent modeling, social media, social norms and education, will be required to prevent continued deaths and injuries from texting and driving

  8. Static Voltage Stability Analysis by Using SVM and Neural Network

    Directory of Open Access Journals (Sweden)

    Mehdi Hajian

    2013-01-01

    Full Text Available Voltage stability is an important problem in power system networks. In this paper, in terms of static voltage stability, and application of Neural Networks (NN and Supported Vector Machine (SVM for estimating of voltage stability margin (VSM and predicting of voltage collapse has been investigated. This paper considers voltage stability in power system in two parts. The first part calculates static voltage stability margin by Radial Basis Function Neural Network (RBFNN. The advantage of the used method is high accuracy in online detecting the VSM. Whereas the second one, voltage collapse analysis of power system is performed by Probabilistic Neural Network (PNN and SVM. The obtained results in this paper indicate, that time and number of training samples of SVM, are less than NN. In this paper, a new model of training samples for detection system, using the normal distribution load curve at each load feeder, has been used. Voltage stability analysis is estimated by well-know L and VSM indexes. To demonstrate the validity of the proposed methods, IEEE 14 bus grid and the actual network of Yazd Province are used.

  9. Structure analysis of growing network based on partial differential equations

    Directory of Open Access Journals (Sweden)

    Junbo JIA

    2016-04-01

    Full Text Available The topological structure is one of the most important contents in the complex network research. Therein the node degree and the degree distribution are the most basic characteristic quantities to describe topological structure. In order to calculate the degree distribution, first of all, the node degree is considered as a continuous variable. Then, according to the Markov Property of growing network, the cumulative distribution function's evolution equation with time can be obtained. Finally, the partial differential equation (PDE model can be established through distortion processing. Taking the growing network with preferential and random attachment mechanism as an example, the PDE model is obtained. The analytic expression of degree distribution is obtained when this model is solved. Besides, the degree function over time is the same as the characteristic line of PDE. At last, the model is simulated. This PDE method of changing the degree distribution calculation into problem of solving PDE makes the structure analysis more accurate.

  10. A statistical framework for differential network analysis from microarray data

    Directory of Open Access Journals (Sweden)

    Datta Somnath

    2010-02-01

    Full Text Available Abstract Background It has been long well known that genes do not act alone; rather groups of genes act in consort during a biological process. Consequently, the expression levels of genes are dependent on each other. Experimental techniques to detect such interacting pairs of genes have been in place for quite some time. With the advent of microarray technology, newer computational techniques to detect such interaction or association between gene expressions are being proposed which lead to an association network. While most microarray analyses look for genes that are differentially expressed, it is of potentially greater significance to identify how entire association network structures change between two or more biological settings, say normal versus diseased cell types. Results We provide a recipe for conducting a differential analysis of networks constructed from microarray data under two experimental settings. At the core of our approach lies a connectivity score that represents the strength of genetic association or interaction between two genes. We use this score to propose formal statistical tests for each of following queries: (i whether the overall modular structures of the two networks are different, (ii whether the connectivity of a particular set of "interesting genes" has changed between the two networks, and (iii whether the connectivity of a given single gene has changed between the two networks. A number of examples of this score is provided. We carried out our method on two types of simulated data: Gaussian networks and networks based on differential equations. We show that, for appropriate choices of the connectivity scores and tuning parameters, our method works well on simulated data. We also analyze a real data set involving normal versus heavy mice and identify an interesting set of genes that may play key roles in obesity. Conclusions Examining changes in network structure can provide valuable information about the

  11. The Application of Social Network Analysis to Team Sports

    Science.gov (United States)

    Lusher, Dean; Robins, Garry; Kremer, Peter

    2010-01-01

    This article reviews how current social network analysis might be used to investigate individual and group behavior in sporting teams. Social network analysis methods permit researchers to explore social relations between team members and their individual-level qualities simultaneously. As such, social network analysis can be seen as augmenting…

  12. Analysis and visualization of citation networks

    CERN Document Server

    Zhao, Dangzhi

    2015-01-01

    Citation analysis-the exploration of reference patterns in the scholarly and scientific literature-has long been applied in a number of social sciences to study research impact, knowledge flows, and knowledge networks. It has important information science applications as well, particularly in knowledge representation and in information retrieval.Recent years have seen a burgeoning interest in citation analysis to help address research, management, or information service issues such as university rankings, research evaluation, or knowledge domain visualization. This renewed and growing interest

  13. On the Reconstruction of Text Phylogeny Trees: Evaluation and Analysis of Textual Relationships.

    Science.gov (United States)

    Marmerola, Guilherme D; Oikawa, Marina A; Dias, Zanoni; Goldenstein, Siome; Rocha, Anderson

    2016-01-01

    Over the history of mankind, textual records change. Sometimes due to mistakes during transcription, sometimes on purpose, as a way to rewrite facts and reinterpret history. There are several classical cases, such as the logarithmic tables, and the transmission of antique and medieval scholarship. Today, text documents are largely edited and redistributed on the Web. Articles on news portals and collaborative platforms (such as Wikipedia), source code, posts on social networks, and even scientific publications or literary works are some examples in which textual content can be subject to changes in an evolutionary process. In this scenario, given a set of near-duplicate documents, it is worthwhile to find which one is the original and the history of changes that created the whole set. Such functionality would have immediate applications on news tracking services, detection of plagiarism, textual criticism, and copyright enforcement, for instance. However, this is not an easy task, as textual features pointing to the documents' evolutionary direction may not be evident and are often dataset dependent. Moreover, side information, such as time stamps, are neither always available nor reliable. In this paper, we propose a framework for reliably reconstructing text phylogeny trees, and seamlessly exploring new approaches on a wide range of scenarios of text reusage. We employ and evaluate distinct combinations of dissimilarity measures and reconstruction strategies within the proposed framework, and evaluate each approach with extensive experiments, including a set of artificial near-duplicate documents with known phylogeny, and from documents collected from Wikipedia, whose modifications were made by Internet users. We also present results from qualitative experiments in two different applications: text plagiarism and reconstruction of evolutionary trees for manuscripts (stemmatology).

  14. Text grouping in patent analysis using adaptive K-means clustering algorithm

    Science.gov (United States)

    Shanie, Tiara; Suprijadi, Jadi; Zulhanif

    2017-03-01

    Patents are one of the Intellectual Property. Analyzing patent is one requirement in knowing well the development of technology in each country and in the world now. This study uses the patent document coming from the Espacenet server about Green Tea. Patent documents related to the technology in the field of tea is still widespread, so it will be difficult for users to information retrieval (IR). Therefore, it is necessary efforts to categorize documents in a specific group of related terms contained therein. This study uses titles patent text data with the proposed Green Tea in Statistical Text Mining methods consists of two phases: data preparation and data analysis stage. The data preparation phase uses Text Mining methods and data analysis stage is done by statistics. Statistical analysis in this study using a cluster analysis algorithm, the Adaptive K-Means Clustering Algorithm. Results from this study showed that based on the maximum value Silhouette, generate 87 clusters associated fifteen terms therein that can be utilized in the process of information retrieval needs.

  15. Investment Valuation Analysis with Artificial Neural Networks

    Directory of Open Access Journals (Sweden)

    Hüseyin İNCE

    2017-07-01

    Full Text Available This paper shows that discounted cash flow and net present value, which are traditional investment valuation models, can be combined with artificial neural network model forecasting. The main inputs for the valuation models, such as revenue, costs, capital expenditure, and their growth rates, are heavily related to sector dynamics and macroeconomics. The growth rates of those inputs are related to inflation and exchange rates. Therefore, predicting inflation and exchange rates is a critical issue for the valuation output. In this paper, the Turkish economy’s inflation rate and the exchange rate of USD/TRY are forecast by artificial neural networks and implemented to the discounted cash flow model. Finally, the results are benchmarked with conventional practices.

  16. Using computerized text analysis to assess communication within an Italian type 1 diabetes Facebook group

    Directory of Open Access Journals (Sweden)

    Alda Troncone

    2015-11-01

    Full Text Available The purpose of this study was to assess messages posted by mothers of children with type 1 diabetes in the Italian Facebook group “Mamme e diabete” using computerized text analysis. The data suggest that these mothers use online discussion boards as a place to seek and provide information to better manage the disease’s daily demands—especially those tasks linked to insulin correction and administration, control of food intake, and bureaucratic duties, as well as to seek and give encouragement and to share experiences regarding diabetes and related impact on their life. The implications of these findings for the management of diabetes are discussed.

  17. Ensemble approach to the analysis of weighted networks

    Science.gov (United States)

    Ahnert, S. E.; Garlaschelli, D.; Fink, T. M. A.; Caldarelli, G.

    2007-07-01

    We present an approach to the analysis of weighted networks, by providing a straightforward generalization of any network measure defined on unweighted networks, such as the average degree of the nearest neighbors, the clustering coefficient, the “betweenness,” the distance between two nodes, and the diameter of a network. All these measures are well established for unweighted networks but have hitherto proven difficult to define for weighted networks. Our approach is based on the translation of a weighted network into an ensemble of edges. Further introducing this approach we demonstrate its advantages by applying the clustering coefficient constructed in this way to two real-world weighted networks.

  18. Design Criteria For Networked Image Analysis System

    Science.gov (United States)

    Reader, Cliff; Nitteberg, Alan

    1982-01-01

    Image systems design is currently undergoing a metamorphosis from the conventional computing systems of the past into a new generation of special purpose designs. This change is motivated by several factors, notably among which is the increased opportunity for high performance with low cost offered by advances in semiconductor technology. Another key issue is a maturing in understanding of problems and the applicability of digital processing techniques. These factors allow the design of cost-effective systems that are functionally dedicated to specific applications and used in a utilitarian fashion. Following an overview of the above stated issues, the paper presents a top-down approach to the design of networked image analysis systems. The requirements for such a system are presented, with orientation toward the hospital environment. The three main areas are image data base management, viewing of image data and image data processing. This is followed by a survey of the current state of the art, covering image display systems, data base techniques, communications networks and software systems control. The paper concludes with a description of the functional subystems and architectural framework for networked image analysis in a production environment.

  19. Text Messaging-Based Interventions for Smoking Cessation: A Systematic Review and Meta-Analysis

    Science.gov (United States)

    Lantini, Ryan; Jennings, Ernestine G; Thind, Herpreet; Rosen, Rochelle K; Salmoirago-Blotcher, Elena; Bock, Beth C

    2016-01-01

    Background Tobacco use is one of the leading preventable global health problems producing nearly 6 million smoking-related deaths per year. Interventions delivered via text messaging (short message service, SMS) may increase access to educational and support services that promote smoking cessation across diverse populations. Objective The purpose of this meta-analysis is to (1) evaluate the efficacy of text messaging interventions on smoking outcomes, (2) determine the robustness of the evidence, and (3) identify moderators of intervention efficacy. Methods Electronic bibliographic databases were searched for records with relevant key terms. Studies were included if they used a randomized controlled trial (RCT) to examine a text messaging intervention focusing on smoking cessation. Raters coded sample and design characteristics, and intervention content. Summary effect sizes, using random-effects models, were calculated and potential moderators were examined. Results The meta-analysis included 20 manuscripts with 22 interventions (N=15,593; 8128 (54%) women; mean age=29) from 10 countries. Smokers who received a text messaging intervention were more likely to abstain from smoking relative to controls across a number of measures of smoking abstinence including 7-day point prevalence (odds ratio (OR)=1.38, 95% confidence interval (CI)=1.22, 1.55, k=16) and continuous abstinence (OR=1.63, 95% CI=1.19, 2.24, k=7). Text messaging interventions were also more successful in reducing cigarette consumption relative to controls (d+=0.14, 95% CI=0.05, 0.23, k=9). The effect size estimates were biased when participants who were lost to follow-up were excluded from the analyses. Cumulative meta-analysis using the 18 studies (k=19) measuring abstinence revealed that the benefits of using text message interventions were established only after only five RCTs (k=5) involving 8383 smokers (OR=1.39, 95% CI=1.15, 1.67, Pinterventions for smoking abstinence (OR=1.37, 95% CI=1.25, 1

  20. Capacity analysis of wireless mesh networks | Gumel | Nigerian ...

    African Journals Online (AJOL)

    The next generation wireless· netWorks experienced agreat development with emergence of wireless mesh networks (WMNs), which can be regarded as a realistic solution that provides wireless broadband access. The limited available bandwidth makes capacity analysis of the network very essential. While the network ...

  1. Network Analysis: A Novel Approach to Understand Suicidal Behaviour

    Directory of Open Access Journals (Sweden)

    Derek de Beurs

    2017-02-01

    Full Text Available Although suicide is a major public health issue worldwide, we understand little of the onset and development of suicidal behaviour. Suicidal behaviour is argued to be the end result of the complex interaction between psychological, social and biological factors. Epidemiological studies resulted in a range of risk factors for suicidal behaviour, but we do not yet understand how their interaction increases the risk for suicidal behaviour. A new approach called network analysis can help us better understand this process as it allows us to visualize and quantify the complex association between many different symptoms or risk factors. A network analysis of data containing information on suicidal patients can help us understand how risk factors interact and how their interaction is related to suicidal thoughts and behaviour. A network perspective has been successfully applied to the field of depression and psychosis, but not yet to the field of suicidology. In this theoretical article, I will introduce the concept of network analysis to the field of suicide prevention, and offer directions for future applications and studies.

  2. Activity Recognition Using Complex Network Analysis.

    Science.gov (United States)

    Jalloul, Nahed; Poree, Fabienne; Viardot, Geoffrey; L'Hostis, Phillipe; Carrault, Guy

    2017-10-12

    In this paper, we perform complex network analysis on a connectivity dataset retrieved from a monitoring system in order to classify simple daily activities. The monitoring system is composed of a set of wearable sensing modules positioned on the subject's body and the connectivity data consists of the correlation between each pair of modules. A number of network measures are then computed followed by the application of statistical significance and feature selection methods. These methods were implemented for the purpose of reducing the total number of modules in the monitoring system required to provide accurate activity classification. The obtained results show that an overall accuracy of 84.6% for activity classification is achieved, using a Random Forest (RF) classifier, and when considering a monitoring system composed of only two modules positioned at the Neck and Thigh of the subject's body.

  3. Research trends on Big Data in Marketing: A text mining and topic modeling based literature analysis

    Directory of Open Access Journals (Sweden)

    Alexandra Amado

    2018-01-01

    Full Text Available Given the research interest on Big Data in Marketing, we present a research literature analysis based on a text mining semi-automated approach with the goal of identifying the main trends in this domain. In particular, the analysis focuses on relevant terms and topics related with five dimensions: Big Data, Marketing, Geographic location of authors’ affiliation (countries and continents, Products, and Sectors. A total of 1560 articles published from 2010 to 2015 were scrutinized. The findings revealed that research is bipartite between technological and research domains, with Big Data publications not clearly aligning cutting edge techniques toward Marketing benefits. Also, few inter-continental co-authored publications were found. Moreover, findings show that research in Big Data applications to Marketing is still in an embryonic stage, thus making it essential to develop more direct efforts toward business for Big Data to thrive in the Marketing arena.

  4. Integrated Adaptive Analysis and Visualization of Satellite Network Data Project

    Data.gov (United States)

    National Aeronautics and Space Administration — We propose to develop a system that enables integrated and adaptive analysis and visualization of satellite network management data. Integrated analysis and...

  5. A GENRE ANALYSIS OF PROMOTIONAL TEXTS IN AN INDONESIAN BATIK INDUSTRY

    Directory of Open Access Journals (Sweden)

    Diah Kristina

    2017-09-01

    Full Text Available This study explored sales promotion letters (SPLs and company profiles (CPs of two prominent batik companies in Solo, Central Java, Indonesia. This essay draws its data from the most important primary source of information on sales promotion letters and company profiles namely words, phrases, and clauses taken from the SPLs and CPs of batik written in Indonesian. Secondary sources were also consulted in this research, among these transcribed data obtained from in-depth interviews with the text writers and buyers. Three SPLs and two batik CPs were analyzed. In addition, two informants (marketing and promotion managers typifying the text production perspective and two buyers typifying the text consumption perspective were interviewed. This research was guided by theories of genre analysis which focuses on patterns of rhetorical organization and genre-specific language features. This study employed the multi-dimensional and multi perspective model of analysis focusing on textual, socio-cognitive and ethnographic aspects of the texts. This study concludes that the strong Javanese cultural influence has made the underlying intention of gaining profits to be less explicitly stated. Secondly, the textual analysis and the in-depth interviews supported the view that CPs of batik had been ideally used to create a favorable image of the company. Thirdly, the most distinctive feature that differentiated establishing credentials in the Indonesian batik business context had been the utilization of a sense of moral obligation to preserve native culture. Fourthly, the chemistry between writers and readers of SPLs and CPs built a strong foundation for mutual understanding and thus paved the way for making purchases. To conclude, this study has shown how the wider culture and the culture of the discourse community has contributed to the framing and formatting of SPLs and CPs of batik in terms of lexico-grammar, cognitive structuring, intertextuality and

  6. Analysis of Ego Network Structure in Online Social Networks

    OpenAIRE

    Arnaboldi, Valerio; Conti, Marco; Passarella, Andrea; Pezzoni, Fabio

    2012-01-01

    Results about offline social networks demonstrated that the social relationships that an individual (ego) maintains with other people (alters) can be organised into different groups according to the ego network model. In this model the ego can be seen as the centre of a series of layers of increasing size. Social relationships between ego and alters in layers close to ego are stronger than those belonging to more external layers. Online Social Networks are becoming a fundamental medium for hu...

  7. A Wavelet Analysis-Based Dynamic Prediction Algorithm to Network Traffic

    Directory of Open Access Journals (Sweden)

    Meng Fan-Bo

    2016-01-01

    Full Text Available Network traffic is a significantly important parameter for network traffic engineering, while it holds highly dynamic nature in the network. Accordingly, it is difficult and impossible to directly predict traffic amount of end-to-end flows. This paper proposes a new prediction algorithm to network traffic using the wavelet analysis. Firstly, network traffic is converted into the time-frequency domain to capture time-frequency feature of network traffic. Secondly, in different frequency components, we model network traffic in the time-frequency domain. Finally, we build the prediction model about network traffic. At the same time, the corresponding prediction algorithm is presented to attain network traffic prediction. Simulation results indicates that our approach is promising.

  8. Understanding resilience in industrial symbiosis networks: insights from network analysis.

    Science.gov (United States)

    Chopra, Shauhrat S; Khanna, Vikas

    2014-08-01

    Industrial symbiotic networks are based on the principles of ecological systems where waste equals food, to develop synergistic networks. For example, industrial symbiosis (IS) at Kalundborg, Denmark, creates an exchange network of waste, water, and energy among companies based on contractual dependency. Since most of the industrial symbiotic networks are based on ad-hoc opportunities rather than strategic planning, gaining insight into disruptive scenarios is pivotal for understanding the balance of resilience and sustainability and developing heuristics for designing resilient IS networks. The present work focuses on understanding resilience as an emergent property of an IS network via a network-based approach with application to the Kalundborg Industrial Symbiosis (KIS). Results from network metrics and simulated disruptive scenarios reveal Asnaes power plant as the most critical node in the system. We also observe a decrease in the vulnerability of nodes and reduction in single points of failure in the system, suggesting an increase in the overall resilience of the KIS system from 1960 to 2010. Based on our findings, we recommend design strategies, such as increasing diversity, redundancy, and multi-functionality to ensure flexibility and plasticity, to develop resilient and sustainable industrial symbiotic networks. Copyright © 2014 Elsevier Ltd. All rights reserved.

  9. Synchronization analysis of coloured delayed networks under ...

    Indian Academy of Sciences (India)

    Up to now, many network models on synchronization have been put forward, such as, the small-world network, directed network, neural network etc. Previous efforts were mainly to study the outer relationship between the nodes. But, the inner interaction is always overlooked. Afterwards, the coloured network model has ...

  10. Text mining and manual curation of chemical-gene-disease networks for the comparative toxicogenomics database (CTD).

    Science.gov (United States)

    Wiegers, Thomas C; Davis, Allan Peter; Cohen, K Bretonnel; Hirschman, Lynette; Mattingly, Carolyn J

    2009-10-08

    The Comparative Toxicogenomics Database (CTD) is a publicly available resource that promotes understanding about the etiology of environmental diseases. It provides manually curated chemical-gene/protein interactions and chemical- and gene-disease relationships from the peer-reviewed, published literature. The goals of the research reported here were to establish a baseline analysis of current CTD curation, develop a text-mining prototype from readily available open source components, and evaluate its potential value in augmenting curation efficiency and increasing data coverage. Prototype text-mining applications were developed and evaluated using a CTD data set consisting of manually curated molecular interactions and relationships from 1,600 documents. Preliminary results indicated that the prototype found 80% of the gene, chemical, and disease terms appearing in curated interactions. These terms were used to re-rank documents for curation, resulting in increases in mean average precision (63% for the baseline vs. 73% for a rule-based re-ranking), and in the correlation coefficient of rank vs. number of curatable interactions per document (baseline 0.14 vs. 0.38 for the rule-based re-ranking). This text-mining project is unique in its integration of existing tools into a single workflow with direct application to CTD. We performed a baseline assessment of the inter-curator consistency and coverage in CTD, which allowed us to measure the potential of these integrated tools to improve prioritization of journal articles for manual curation. Our study presents a feasible and cost-effective approach for developing a text mining solution to enhance manual curation throughput and efficiency.

  11. Geographical Text Analysis: A new approach to understanding nineteenth-century mortality.

    Science.gov (United States)

    Porter, Catherine; Atkinson, Paul; Gregory, Ian

    2015-11-01

    This paper uses a combination of Geographic Information Systems (GIS) and corpus linguistic analysis to extract and analyse disease related keywords from the Registrar-General's Decennial Supplements. Combined with known mortality figures, this provides, for the first time, a spatial picture of the relationship between the Registrar-General's discussion of disease and deaths in England and Wales in the nineteenth and early twentieth centuries. Techniques such as collocation, density analysis, the Hierarchical Regional Settlement matrix and regression analysis are employed to extract and analyse the data resulting in new insight into the relationship between the Registrar-General's published texts and the changing mortality patterns during this time. Copyright © 2015 Elsevier Ltd. All rights reserved.

  12. Social Network Analysis and Qualitative Interviews for Assessing Geographic Characteristics of Tourism Business Networks.

    Directory of Open Access Journals (Sweden)

    Ilan Kelman

    Full Text Available This study integrates quantitative social network analysis (SNA and qualitative interviews for understanding tourism business links in isolated communities through analysing spatial characteristics. Two case studies are used, the Surselva-Gotthard region in the Swiss Alps and Longyearbyen in the Arctic archipelago of Svalbard, to test the spatial characteristics of physical proximity, isolation, and smallness for understanding tourism business links. In the larger Surselva-Gotthard region, we found a strong relationship between geographic separation of the three communities on compartmentalization of the collaboration network. A small set of businesses played a central role in steering collaborative decisions for this community, while a group of structurally 'peripheral' actors were less influential. By contrast, the business community in Svalbard showed compartmentalization that was independent of geographic distance between actors. Within towns of similar size and governance scale, Svalbard is more compartmentalized, and those compartments are not driven by geographic separation of the collaboration clusters. This compartmentalization in Svalbard was reflected in a lower density of formal business collaboration ties compared to the communities of the Alps. We infer that the difference is due to Svalbard having higher cultural diversity and population turnover than the Alps communities. We propose that integrating quantitative network analysis from simple surveys with qualitative interviews targeted from the network results is an efficient general approach to identify regionally specific constraints and opportunities for effective governance.

  13. Analysis and design of networked control systems

    CERN Document Server

    You, Keyou; Xie, Lihua

    2015-01-01

    This monograph focuses on characterizing the stability and performance consequences of inserting limited-capacity communication networks within a control loop. The text shows how integration of the ideas of control and estimation with those of communication and information theory can be used to provide important insights concerning several fundamental problems such as: ·         minimum data rate for stabilization of linear systems over noisy channels; ·         minimum network requirement for stabilization of linear systems over fading channels; and ·         stability of Kalman filtering with intermittent observations. A fundamental link is revealed between the topological entropy of linear dynamical systems and the capacities of communication channels. The design of a logarithmic quantizer for the stabilization of linear systems under various network environments is also extensively discussed and solutions to many problems of Kalman filtering with intermittent observations are de...

  14. SHAPE OF FEMININITY IN THE TEXT OF GEGURITAN (PHILOSOPICAL VERSE IN BALI: ANALYSIS OF FEMINISM

    Directory of Open Access Journals (Sweden)

    Ni Nyoman Karmini

    2012-11-01

    Full Text Available The object of this study is Balinese traditional literature which is the form of geguritan(philosophical verse. The reason why such texts are used as the object of the study is that theycontain very complex and interesting narrations about feminism. The objectives of this studyare to find out the formal and narrative structure of the texts and to describe the shape offemininity in the texts and its relevance to the lives of Balinese women who are Hindufollowers in the society. The objectives are all at once the answers to the problems of the study.The theory applied is that of feminism which emphasizes the concept ofRadical-Cultural Feminism. This study is a qualitative one of which the data were collected bydocumentation method, that is, by the techniques of note taking, observation and interview. Thedata were analyzed using the formal method in accordance with literature studies.There were nine geguritan (philosophical verses which were used as the object of thestudy. From the formal structural analysis, the pupuh (strophe used, its function and literarystyle could be identified. From the content, religious and amusement functions could beidentified. From the narrative structural analysis, it could be identified that the plot waschronological and sorot balik (backward directed; the characters and characterization weredescribed to express extraordinary ability, which was based on Hinduism, while the theme wasdescribed to express the application of panca crada (the five principles in Hinduism. Therewere seven findings as far as the analysis of the text is concerned: they are: (1 the educatedwomen could determine their attitudes, make decisions, show prestige and maintain theirdignity; (2 the women in the texts had extraordinary power. This means that the women werenot weak. Therefore, the stereotype that women were weak was neglected; (3 the educatedwomen who used Hinduism as the reference could become the men’s power; (4 the womenwho could

  15. Protocol vulnerability detection based on network traffic analysis and binary reverse engineering.

    Directory of Open Access Journals (Sweden)

    Shameng Wen

    Full Text Available Network protocol vulnerability detection plays an important role in many domains, including protocol security analysis, application security, and network intrusion detection. In this study, by analyzing the general fuzzing method of network protocols, we propose a novel approach that combines network traffic analysis with the binary reverse engineering method. For network traffic analysis, the block-based protocol description language is introduced to construct test scripts, while the binary reverse engineering method employs the genetic algorithm with a fitness function designed to focus on code coverage. This combination leads to a substantial improvement in fuzz testing for network protocols. We build a prototype system and use it to test several real-world network protocol implementations. The experimental results show that the proposed approach detects vulnerabilities more efficiently and effectively than general fuzzing methods such as SPIKE.

  16. Network meta-analysis: an introduction for clinicians.

    Science.gov (United States)

    Rouse, Benjamin; Chaimani, Anna; Li, Tianjing

    2017-02-01

    Network meta-analysis is a technique for comparing multiple treatments simultaneously in a single analysis by combining direct and indirect evidence within a network of randomized controlled trials. Network meta-analysis may assist assessing the comparative effectiveness of different treatments regularly used in clinical practice and, therefore, has become attractive among clinicians. However, if proper caution is not taken in conducting and interpreting network meta-analysis, inferences might be biased. The aim of this paper is to illustrate the process of network meta-analysis with the aid of a working example on first-line medical treatment for primary open-angle glaucoma. We discuss the key assumption of network meta-analysis, as well as the unique considerations for developing appropriate research questions, conducting the literature search, abstracting data, performing qualitative and quantitative synthesis, presenting results, drawing conclusions, and reporting the findings in a network meta-analysis.

  17. MARRIAGE RITUAL TEXT OF BALINESE TRADITIONAL COMMUNITY: AN ANALYSIS OF FUNCTIONAL SYSTEMIC LINGUISTICS

    Directory of Open Access Journals (Sweden)

    Putu Sutama

    2012-11-01

    Full Text Available The Marriage Ritual Text of Balinese Traditional Community (Teks Ritual‘Pewiwahan’ Masyarakat Adat Bali, hereon abbreviated to TRPMAB in this dissertationis analyzed in the perspective of linguistic studies using the functional systemic linguistictheory. TRPMAB is a dialogic text containing a discussion, and is terminologicallytermed as a conversational text. It refers to the use of Balinese language (Bahasa Bali,hereon abbreviated to BB in a marriage ritual. There are two inseparable systems in it;they are BB system and social system, which are widely termed as cultural system.The method employed in this study is field method, meaning that the researcherwent directly to the field or to the location where TRPMAP took place. The researcherdirectly took part as both the active and passive participant. In this way, the researchcould observe TRPMAB directly.The population of the study includes all TPRB in Bali. Considering that thepopulation is too wide, then samples were taken to represent all the population. Thesamples total 10 which were obtained from the biggest marriage processions in Bali. Outof the 10 samples, 6 units of text were selected as the corpus of the study. The selectionwas made based on particular criteria including quality. It is this corpus which wasanalyzed to support and examine the hypothesis related to the text analyzed.The analysis of TRPMAB includes: the structure of the texts, the mood, thetransitivity, the theme-rheme and the logical relationship between the clause and theideology. The findings are as follows:(1 TRPMAB is a text which has a number of structural dimensions such as (acultural structure, (b macro structure, that is, the structure related to the situationalcontext made up of field, tenor and mode, (c micro structure, (d structure of meaning,that is, the structure related to the sequence of meanings between the participants withinthe dialogue, and (e the texture, that is, the intact successive relationship

  18. Network Analysis of Time-Lapse Microscopy Recordings

    Directory of Open Access Journals (Sweden)

    Erik eSmedler

    2014-09-01

    Full Text Available Multicellular organisms rely on intercellular communication to regulate important cellular processes critical to life. To further our understanding of those processes there is a need to scrutinize dynamical signaling events and their functions in both cells and organisms. Here, we report a method and provide MATLAB code that analyzes time-lapse microscopy recordings to identify and characterize network structures within large cell populations, such as interconnected neurons. The approach is demonstrated using intracellular calcium (Ca2+ recordings in neural progenitors and cardiac myocytes, but could be applied to a wide variety of biosensors employed in diverse cell types and organisms. In this method, network structures are analyzed by applying cross-correlation signal processing and graph theory to single-cell recordings. The goal of the analysis is to determine if the single cell activity constitutes a network of interconnected cells and to decipher the properties of this network. The method can be applied in many fields of biology in which biosensors are used to monitor signaling events in living cells. Analyzing intercellular communication in cell ensembles can reveal essential network structures that provide important biological insights.

  19. Applications of social media and social network analysis

    CERN Document Server

    Kazienko, Przemyslaw

    2015-01-01

    This collection of contributed chapters demonstrates a wide range of applications within two overlapping research domains: social media analysis and social network analysis. Various methodologies were utilized in the twelve individual chapters including static, dynamic and real-time approaches to graph, textual and multimedia data analysis. The topics apply to reputation computation, emotion detection, topic evolution, rumor propagation, evaluation of textual opinions, friend ranking, analysis of public transportation networks, diffusion in dynamic networks, analysis of contributors to commun

  20. The Statistical Analysis in the Problem of the Author Identification of a Natural Language Text

    Directory of Open Access Journals (Sweden)

    E. A. Tikhomirova

    2017-01-01

    Full Text Available The paper analyses the known available method to search for the author of the text in the natural language base of knowledge proposed by O. Khrulev in which the minimum distance between the frequency dictionaries of the presumed authors and the text under analysis is accepted as a criterion for the successful identification of the author. The patterns and drawbacks of the method are revealed.The paper suggested that since the distance value is based on the average values of this lexeme-usage in all papers of the author on the basis of which frequency dictionaries are created, such leaps will show up when the specific value of the lexeme-usage frequency stands in stark difference to the average one.To test this hypothesis, the paper determines a variation coefficient of each lexeme-usage frequency in the texts under analysis.The analysis of frequency dictionaries of Russian canonical writers conducted in the paper has shown that on average about 90% of the authors' frequency dictionaries contain lexemes whose frequencies of usage are inhomogeneous.The author of the paper suggested that the coefficient of variation shows increase in author's word-hoard, i.e. the larger the vocabulary size, the richer the speech, and, therefore, the less frequently the author uses the same lexemes.In the paper there is a hypothesis that it is wrong to reduce the analysed size of the authors' frequency dictionaries only by critical boundaries: it is necessary to analyse lexemes with a variation coefficient over 33%, which illustrate rich word-hoard.The paper also proposes to define only one specific critical boundary of 10 thousand lexemes, since the indefinite boundary of 5 - 10 thousand lexemes offered by O. Khrulev makes it difficult to identify the author of unknown text. In this case, the lexemes with a variation coefficient over 33% of the total vocabulary size of the studied authors beyond the critical boundary are subjected to analysis.To test this

  1. Deep tissue near-infrared imaging for vascular network analysis

    Directory of Open Access Journals (Sweden)

    Kübra Seker

    2017-05-01

    Full Text Available Subcutaneous vein network plays important roles to maintain microcirculation that is related to some diagnostic aspects. Despite developments of optical imaging technologies, still the difficulties about deep skin vascular imaging have been continued. On the other hand, since hemoglobin concentration of human blood has key role in the veins imaging by optical manner, the used wavelength in vascular imaging, must be chosen considering absorption of hemoglobin. In this research, we constructed a near infrared (NIR light source because of lower absorption of hemoglobin in this optical region. To obtain vascular image, reflectance geometry was used. Next, from recorded images, vascular network analysis, such as calculation of width of vascular of interest and complexity of selected region were implemented. By comparing with other modalities, we observed that proposed imaging system has great advantages including nonionized radiation, moderate penetration depth of 0.5–3mm and diameter of 1mm, cost-effective and algorithmic simplicity for analysis.

  2. Preventive Health Behavior Change Text Message Interventions: A Meta-analysis.

    Science.gov (United States)

    Armanasco, Ashleigh A; Miller, Yvette D; Fjeldsoe, Brianna S; Marshall, Alison L

    2017-03-01

    Existing evidence shows that text message interventions can produce short-term health behavior change. However, understanding is limited regarding intervention characteristics moderating this effect or the long-term effectiveness of text message interventions on behavior change after contact stops. MEDLINE, PubMed Central, ERIC, PsycINFO, and Web of Science were searched for articles published between April 2008 and December 2014 that evaluated an intervention targeting preventive health behaviors, delivered primarily by text message. Intervention development and design characteristics and research outcomes were evaluated for 51 studies. Thirty-five studies were included in a meta-analysis (conducted in 2015) examining overall effect size and moderators of effect size. The overall pooled effect of interventions was d=0.24 (95% CI=0.16, 0.32, pmaintenance period and showed a small but significant pooled maintenance effect (d=0.17, 95% CI=0.03, 0.31, p=0.017, k=7). Few variables significantly moderated intervention efficacy. Interventions that did not use a theoretic basis, used supplementary intervention components, and had a duration of 6-12 months were most effective. The specific behavior being targeted was not associated with differences in efficacy nor was tailoring, targeting, or personalization of text message content. Text message interventions are capable of producing positive change in preventive health behaviors. Preliminary evidence indicates that these effects can be maintained after the intervention stops. The moderator analysis findings are at odds with previous research, suggesting a need to examine moderators at the behavior-specific level. Copyright © 2017 American Journal of Preventive Medicine. Published by Elsevier Inc. All rights reserved.

  3. Network-based analysis of proteomic profiles

    KAUST Repository

    Wong, Limsoon

    2016-01-26

    Mass spectrometry (MS)-based proteomics is a widely used and powerful tool for profiling systems-wide protein expression changes. It can be applied for various purposes, e.g. biomarker discovery in diseases and study of drug responses. Although RNA-based high-throughput methods have been useful in providing glimpses into the underlying molecular processes, the evidences they provide are indirect. Furthermore, RNA and corresponding protein levels have been known to have poor correlation. On the other hand, MS-based proteomics tend to have consistency issues (poor reproducibility and inter-sample agreement) and coverage issues (inability to detect the entire proteome) that need to be urgently addressed. In this talk, I will discuss how these issues can be addressed by proteomic profile analysis techniques that use biological networks (especially protein complexes) as the biological context. In particular, I will describe several techniques that we have been developing for network-based analysis of proteomics profile. And I will present evidence that these techniques are useful in identifying proteomics-profile analysis results that are more consistent, more reproducible, and more biologically coherent, and that these techniques allow expansion of the detected proteome to uncover and/or discover novel proteins.

  4. SOME ASPECTS OF THE USE OF MATHEMATICAL-STATISTICAL METHODS IN THE ANALYSIS OF SOCIO-HUMANISTIC TEXTS Humanities and social text, mathematics, method, statistics, probability

    Directory of Open Access Journals (Sweden)

    Zaira M Alieva

    2016-01-01

    Full Text Available The article analyzes the application of mathematical and statistical methods in the analysis of socio-humanistic texts. The essence of mathematical and statistical methods, presents examples of their use in the study of Humanities and social phenomena. Considers the key issues faced by the expert in the application of mathematical-statistical methods in socio-humanitarian sphere, including the availability of sustainable contrasting socio-humanitarian Sciences and mathematics; the complexity of the allocation of the object that is the bearer of the problem; having the use of a probabilistic approach. The conclusion according to the results of the study.

  5. Social sciences via network analysis and computation

    CERN Document Server

    Kanduc, Tadej

    2015-01-01

    In recent years information and communication technologies have gained significant importance in the social sciences. Because there is such rapid growth of knowledge, methods and computer infrastructure, research can now seamlessly connect interdisciplinary fields such as business process management, data processing and mathematics. This study presents some of the latest results, practices and state-of-the-art approaches in network analysis, machine learning, data mining, data clustering and classifications in the contents of social sciences. It also covers various real-life examples such as t

  6. Patients covertly recording clinical encounters: threat or opportunity? A qualitative analysis of online texts.

    Directory of Open Access Journals (Sweden)

    Maka Tsulukidze

    Full Text Available The phenomenon of patients covertly recording clinical encounters has generated controversial media reports. This study aims to examine the phenomenon and analyze the underlying issues.We conducted a qualitative analysis of online posts, articles, blogs, and forums (texts discussing patients covertly recording clinical encounters. Using Google and Google Blog search engines, we identified and analyzed 62 eligible texts published in multiple countries between 2006 and 2013. Thematic analysis revealed four key themes: 1 a new behavior that elicits strong reactions, both positive and negative, 2 an erosion of trust, 3 shifting patient-clinician roles and relationships, and 4 the existence of confused and conflicting responses. When patients covertly record clinical encounters - a behavior made possible by various digital recording technologies - strong reactions are evoked among a range of stakeholders. The behavior represents one consequence of an erosion of trust between patients and clinicians, and when discovered, leads to further deterioration of trust. Confused and conflicting responses to the phenomenon by patients and clinicians highlight the need for policy guidance.This study describes strong reactions, both positive and negative, to the phenomenon of patients covertly recording clinical encounters. The availability of smartphones capable of digital recording, and shifting attitudes to patient-clinician relationships, seems to have led to this behavior, mostly viewed as a threat by clinicians but as a welcome and helpful innovation by some patients, possibly indicating a perception of subordination and a lack of empowerment. Further examination of this tension and its implications is needed.

  7. A Framework for Designing Training Programs to Foster Self-Regulated Learning and Text Analysis Skills

    Directory of Open Access Journals (Sweden)

    Daniela Wagner

    2014-01-01

    Full Text Available The study’s aim was to develop an intervention program and to evaluate its contribution to students’ self-regulated learning (SRL and text analysis skills. In a student-focused training approach, the students themselves acquired the training strategies, whereas in the teacher-focused training, the teachers were enabled to explicitly impart these strategies to their students. In order to investigate the effectiveness of the intervention in terms of transfer benefits on SRL and text analysis skills, 274 lower secondary students were examined in a pretest-training-posttest design. Based on two different training approaches, a distinction was made between four groups: student training (singleST, teacher training (singleTT, combination of student and teacher training (ComT, and control group (CG. Substantially more transfer was revealed in all training conditions as compared to the control group. Specifically, the singleST group showed the highest learning gains for all variables. Conversely, a combination of both approaches (ComT did not result in synergetic effects, but rather in reciprocal interferences.

  8. Intelligent future wireless networks for energy efficiency: overall analysis and standardization activities

    CSIR Research Space (South Africa)

    Kliks, A

    2013-10-01

    Full Text Available This chapter addresses a number of issues related to standardization and regulatory policies aiming at promoting energy-efficient communications and networking, highlighting the need of synergic approach. It encompasses the analysis of various...

  9. Network analysis of perception-action coupling in infants

    Directory of Open Access Journals (Sweden)

    Naama eRotem-Kohavi

    2014-04-01

    Full Text Available The functional networks that support action observation are of great interest in understanding the development of social cognition and motor learning. How infants learn to represent and understand the world around them remains one of the most intriguing questions in developmental cognitive neuroscience. Recently, mathematical measures derived from graph theory have been used to study connectivity networks in the developing brain. Thus far, this type of analysis in infancy has only been applied to the resting state. In this study, we recorded electroencephalography (EEG from infants (ages 4-11 months of age and adults while they observed three types of actions: a reaching for an object, b walking and c object motion. Graph theory based analysis was applied to these data to evaluate changes in brain networks. Global metrics that provide measures of the structural properties of the network (characteristic path, density, global efficiency, and modularity were calculated for each group and for each condition. We found statistically significant differences in measures for the observation of walking condition only. Specifically, in comparison to adults, infants showed increased density and global efficiency in combination with decreased modularity during observation of an action that is not within their motor repertoire (i.e. independent walking, suggesting a less structured organization. There were no group differences in global metric measures for observation of object motion or for observation of actions that are within the repertoire of infants (i.e. reaching. These preliminary results suggest that infants and adults may share a basic functional network for action observation that is sculpted by experience. Motor experience may lead to a shift towards a more efficient functional network.

  10. The conceptualization of childhood in North American pediatric dentistry texts: a discursive case study analysis.

    Science.gov (United States)

    Makansi, Nora; Carnevale, Franco A; Macdonald, Mary Ellen

    2018-03-01

    In recent years, conceptions of childhood have been evolving towards an increased recognition of children as active agents, capable of participating in the determination of their wellbeing. In pediatric dentistry, the extent to which these conceptions are being discursively endorsed is not well known. The aim of this investigation was to examine the discursive construction of childhood in seminal North American pedagogical dentistry materials. We conducted a qualitative discourse analysis of a sample of prominent texts using a sociological discourse analysis approach. We analyzed the latest edition of Macdonald and Avery's textbook (Chapter: Non pharmacologic management of children's behaviors) and the clinical practice guidelines published by the American Academy of Pediatric Dentistry, AAPD (Behavior guidance for the pediatric dental patient). The analysis produced five salient discursive categories: socialization through behavior modification; development and behavior; paternalism; the utility of child-centered communication; and consequentialism. While there were instances of a child-centered focus in the texts, the main discourses were rooted in developmentalism and behaviorism. There was scant acknowledgment of the importance of children's agency or voice, which runs contrary to child-centered discourses and practices in related disciplines (e.g., pediatric medicine, nursing). Predominant discourses in pediatric dentistry suggest a paternalistic, behaviorist approach to the 'management' of children in the dental office, focused primarily on completing interventions. Priorities for the future development of pediatric dentistry are discussed, integrating more child-centered approaches. © 2017 BSPD, IAPD and John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  11. Sharing problem gamblers’ experiences: a text analysis of gambling stories via online forum

    Directory of Open Access Journals (Sweden)

    Andrea Caputo

    2015-05-01

    Full Text Available The present study explored some common thematic domains which characterised problem gambling experiences of adult Italian participants with the aim of understanding motivations and expectations of problem gamblers and thus promoting better psychological interventions. Emotional Text Analysis was performed on 24 problem gambling stories collected via online forum in order to detect the main themes (cluster analysis and latent factors (correspondence analysis emerging in gamblers’ narratives. Five themes emerged which respectively refer to guilt (16.15%, obsession (27.60%, disease (30.77%, risk taking (15.89% and emotion regulation (4.17%. In addition, four synthetic dimensions were detected which consent to account the variability of problem gambling experience based on: struggle against compulsion (F1, ambivalent acceptance of gambling (F2, interpersonal detachment (F3 and illusion of control (F4. From the emotional experience shaping the problem gamblers’ narratives, this research study allows the identification of some factors which can contribute to quality research on problem gambling and which can provide some useful suggestion for treatment.

  12. TACIT: An open-source text analysis, crawling, and interpretation tool.

    Science.gov (United States)

    Dehghani, Morteza; Johnson, Kate M; Garten, Justin; Boghrati, Reihane; Hoover, Joe; Balasubramanian, Vijayan; Singh, Anurag; Shankar, Yuvarani; Pulickal, Linda; Rajkumar, Aswin; Parmar, Niki Jitendra

    2017-04-01

    As human activity and interaction increasingly take place online, the digital residues of these activities provide a valuable window into a range of psychological and social processes. A great deal of progress has been made toward utilizing these opportunities; however, the complexity of managing and analyzing the quantities of data currently available has limited both the types of analysis used and the number of researchers able to make use of these data. Although fields such as computer science have developed a range of techniques and methods for handling these difficulties, making use of those tools has often required specialized knowledge and programming experience. The Text Analysis, Crawling, and Interpretation Tool (TACIT) is designed to bridge this gap by providing an intuitive tool and interface for making use of state-of-the-art methods in text analysis and large-scale data management. Furthermore, TACIT is implemented as an open, extensible, plugin-driven architecture, which will allow other researchers to extend and expand these capabilities as new methods become available.

  13. Network Analysis of Human Genes Influencing Susceptibility to Mycobacterial Infections.

    Directory of Open Access Journals (Sweden)

    Ettie M Lipner

    Full Text Available Tuberculosis and nontuberculous mycobacterial infections constitute a high burden of pulmonary disease in humans, resulting in over 1.5 million deaths per year. Building on the premise that genetic factors influence the instance, progression, and defense of infectious disease, we undertook a systems biology approach to investigate relationships among genetic factors that may play a role in increased susceptibility or control of mycobacterial infections. We combined literature and database mining with network analysis and pathway enrichment analysis to examine genes, pathways, and networks, involved in the human response to Mycobacterium tuberculosis and nontuberculous mycobacterial infections. This approach allowed us to examine functional relationships among reported genes, and to identify novel genes and enriched pathways that may play a role in mycobacterial susceptibility or control. Our findings suggest that the primary pathways and genes influencing mycobacterial infection control involve an interplay between innate and adaptive immune proteins and pathways. Signaling pathways involved in autoimmune disease were significantly enriched as revealed in our networks. Mycobacterial disease susceptibility networks were also examined within the context of gene-chemical relationships, in order to identify putative drugs and nutrients with potential beneficial immunomodulatory or anti-mycobacterial effects.

  14. Network structure detection and analysis of Shanghai stock market

    Directory of Open Access Journals (Sweden)

    Sen Wu

    2015-04-01

    Full Text Available Purpose: In order to investigate community structure of the component stocks of SSE (Shanghai Stock Exchange 180-index, a stock correlation network is built to find the intra-community and inter-community relationship. Design/methodology/approach: The stock correlation network is built taking the vertices as stocks and edges as correlation coefficients of logarithm returns of stock price. It is built as undirected weighted at first. GN algorithm is selected to detect community structure after transferring the network into un-weighted with different thresholds. Findings: The result of the network community structure analysis shows that the stock market has obvious industrial characteristics. Most of the stocks in the same industry or in the same supply chain are assigned to the same community. The correlation of the internal stock prices’ fluctuation is closer than in different communities. The result of community structure detection also reflects correlations among different industries. Originality/value: Based on the analysis of the community structure in Shanghai stock market, the result reflects some industrial characteristics, which has reference value to relationship among industries or sub-sectors of listed companies.

  15. 3D NETWORK ANALYSIS FOR INDOOR SPACE APPLICATIONS

    Directory of Open Access Journals (Sweden)

    E. Tsiliakou

    2016-10-01

    Full Text Available Indoor space differs from outdoor environments, since it is characterized by a higher level of structural complexity, geometry, as well as topological relations. Indoor space can be considered as the most important component in a building’s conceptual modelling, on which applications such as indoor navigation, routing or analysis are performed. Therefore, the conceptual meaning of sub spaces or the activities taking place in physical building boundaries (e.g. walls, require the comprehension of the building’s indoor hierarchical structure. The scope of this paper is to perform 3D network analysis in a building’s interior and is structured as follows: In Section 1 the definition of indoor space is provided and indoor navigation requirements are analysed. Section 2 describes the processes of indoor space modeling, as well as routing applications. In Section 3, a case study is examined involving a 3D building model generated in CityEngine (exterior shell and ArcScene (interior parts, in which the use of commercially available software tools (ArcGIS, ESRI, in terms of indoor routing and 3D network analysis, are explored. The fundamentals of performing 3D analysis with the ArcGIS Network Analyst extension were tested. Finally a geoprocessing model was presented, which was specifically designed to be used to interactively find the best route in ArcScene. The paper ends with discussion and concluding remarks on Section 4.

  16. Analysis of regulatory networks constructed based on gene ...

    Indian Academy of Sciences (India)

    Gene coexpression patterns can reveal gene collections with functional consistency. This study systematically constructs regulatory networks for pituitary tumours by integrating gene coexpression, transcriptional and posttranscriptional regulation. Through network analysis, we elaborate the incidence mechanism of pituitary ...

  17. Analysis of regulatory networks constructed based on gene ...

    Indian Academy of Sciences (India)

    2013-12-09

    Dec 9, 2013 ... Abstract. Gene coexpression patterns can reveal gene collections with functional consistency. This study systematically constructs regulatory networks for pituitary tumours by integrating gene coexpression, transcriptional and posttranscriptional regulation. Through network analysis, we elaborate the ...

  18. Robustness Analysis of Real Network Topologies Under Multiple Failure Scenarios

    DEFF Research Database (Denmark)

    Manzano, M.; Marzo, J. L.; Calle, E.

    2012-01-01

    on topological characteristics. Recently approaches also consider the services supported by such networks. In this paper we carry out a robustness analysis of five real backbone telecommunication networks under defined multiple failure scenarios, taking into account the consequences of the loss of established......Nowadays the ubiquity of telecommunication networks, which underpin and fulfill key aspects of modern day living, is taken for granted. Significant large-scale failures have occurred in the last years affecting telecommunication networks. Traditionally, network robustness analysis has been focused...... connections. Results show which networks are more robust in response to a specific type of failure....

  19. Exploring the Construction of ‘National Unity’ in Malaysia: Framing Analysis of Texts and Audiences

    Directory of Open Access Journals (Sweden)

    Ahmad Tajuddin Siti Nor Amalina

    2017-01-01

    Full Text Available This paper examines the construction of ‘national unity’ within the culturally diverse society of Malaysia. It does so through a framing analysis of 102 recent Malaysian government advertisements. Audience responses, based on a series of focus group interviews, were also analysed. Although the power of visual advertisements comes from its capacity to blend fact and emotion, to engage audiences, and to add the narrative complexity of ethnicities, this paper also discovers a struggle over the meaning when the frames become contested. The findings suggest that multiple, often conflicting frames are involved in making sense of ‘national unity’ for different stakeholders, yet contested narratives of nationhood and ethnic identity is a central theme of the analysis. This paper contributes to a critical understanding of ‘national unity’ beyond culture, images and identity of multi-ethnic groups from two different narratives: the government through which discourse is constructed and the presence discourse of ethnicity.

  20. Identifying changes in the support networks of end-of-life carers using social network analysis.

    Science.gov (United States)

    Leonard, Rosemary; Horsfall, Debbie; Noonan, Kerrie

    2015-06-01

    End-of-life caring is often associated with reduced social networks for both the dying person and for the carer. However, those adopting a community participation and development approach, see the potential for the expansion and strengthening of networks. This paper uses Knox, Savage and Harvey's definitions of three generations social network analysis to analyse the caring networks of people with a terminal illness who are being cared for at home and identifies changes in these caring networks that occurred over the period of caring. Participatory network mapping of initial and current networks was used in nine focus groups. The analysis used key concepts from social network analysis (size, density, transitivity, betweenness and local clustering) together with qualitative analyses of the group's reflections on the maps. The results showed an increase in the size of the networks and that ties between the original members of the network strengthened. The qualitative data revealed the importance between core and peripheral network members and the diverse contributions of the network members. The research supports the value of third generation social network analysis and the potential for end-of-life caring to build social capital. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  1. Differential Regulatory Analysis Based on Coexpression Network in Cancer Research

    Directory of Open Access Journals (Sweden)

    Junyi Li

    2016-01-01

    Full Text Available With rapid development of high-throughput techniques and accumulation of big transcriptomic data, plenty of computational methods and algorithms such as differential analysis and network analysis have been proposed to explore genome-wide gene expression characteristics. These efforts are aiming to transform underlying genomic information into valuable knowledges in biological and medical research fields. Recently, tremendous integrative research methods are dedicated to interpret the development and progress of neoplastic diseases, whereas differential regulatory analysis (DRA based on gene coexpression network (GCN increasingly plays a robust complement to regular differential expression analysis in revealing regulatory functions of cancer related genes such as evading growth suppressors and resisting cell death. Differential regulatory analysis based on GCN is prospective and shows its essential role in discovering the system properties of carcinogenesis features. Here we briefly review the paradigm of differential regulatory analysis based on GCN. We also focus on the applications of differential regulatory analysis based on GCN in cancer research and point out that DRA is necessary and extraordinary to reveal underlying molecular mechanism in large-scale carcinogenesis studies.

  2. Advantages of Social Network Analysis in Educational Research

    Science.gov (United States)

    Ushakov, K. M.; Kukso, K. N.

    2015-01-01

    Currently one of the main tools for the large scale studies of schools is statistical analysis. Although it is the most common method and it offers greatest opportunities for analysis, there are other quantitative methods for studying schools, such as network analysis. We discuss the potential advantages that network analysis has for educational…

  3. Using Web Crawler Technology for Text Analysis of Geo-Events: A Case Study of the Huangyan Island Incident

    OpenAIRE

    Hu, H.; Ge, Y. J.

    2013-01-01

    With the social networking and network socialisation have brought more text information and social relationships into our daily lives, the question of whether big data can be fully used to study the phenomenon and discipline of natural sciences has prompted many specialists and scholars to innovate their research. Though politics were integrally involved in the hyperlinked word issues since 1990s, automatic assembly of different geospatial web and distributed geospatial information s...

  4. Patients covertly recording clinical encounters: threat or opportunity? A qualitative analysis of online texts.

    Science.gov (United States)

    Tsulukidze, Maka; Grande, Stuart W; Thompson, Rachel; Rudd, Kenneth; Elwyn, Glyn

    2015-01-01

    The phenomenon of patients covertly recording clinical encounters has generated controversial media reports. This study aims to examine the phenomenon and analyze the underlying issues. We conducted a qualitative analysis of online posts, articles, blogs, and forums (texts) discussing patients covertly recording clinical encounters. Using Google and Google Blog search engines, we identified and analyzed 62 eligible texts published in multiple countries between 2006 and 2013. Thematic analysis revealed four key themes: 1) a new behavior that elicits strong reactions, both positive and negative, 2) an erosion of trust, 3) shifting patient-clinician roles and relationships, and 4) the existence of confused and conflicting responses. When patients covertly record clinical encounters - a behavior made possible by various digital recording technologies - strong reactions are evoked among a range of stakeholders. The behavior represents one consequence of an erosion of trust between patients and clinicians, and when discovered, leads to further deterioration of trust. Confused and conflicting responses to the phenomenon by patients and clinicians highlight the need for policy guidance. This study describes strong reactions, both positive and negative, to the phenomenon of patients covertly recording clinical encounters. The availability of smartphones capable of digital recording, and shifting attitudes to patient-clinician relationships, seems to have led to this behavior, mostly viewed as a threat by clinicians but as a welcome and helpful innovation by some patients, possibly indicating a perception of subordination and a lack of empowerment. Further examination of this tension and its implications is needed.

  5. Social science and linguistic text analysis of nurses' records: a systematic review and critique.

    Science.gov (United States)

    Buus, Niels; Hamilton, Bridget Elizabeth

    2016-03-01

    The two aims of the paper were to systematically review and critique social science and linguistic text analyses of nursing records in order to inform future research in this emerging area of research. Systematic searches in reference databases and in citation indexes identified 12 articles that included analyses of the social and linguistic features of records and recording. Two reviewers extracted data using established criteria for the evaluation of qualitative research papers. A common characteristic of nursing records was the economical use of language with local meanings that conveyed little information to the uninitiated reader. Records were dominated by technocratic-medical discourse focused on patients' bodies, and they depicted only very limited aspects of nursing practice. Nurses made moral evaluations in their categorisation of patients, which reflected detailed surveillance of patients' disturbing behaviour. The text analysis methods were rarely transparent in the articles, which could suggest research quality problems. For most articles, the significance of the findings was substantiated more by theoretical readings of the institutional settings than by the analysis of textual data. More probing empirical research of nurses' records and a wider range of theoretical perspectives has the potential to expose the situated meanings of nursing work in healthcare organisations. © 2015 John Wiley & Sons Ltd.

  6. Development of Workshops on Biodiversity and Evaluation of the Educational Effect by Text Mining Analysis

    Science.gov (United States)

    Baba, R.; Iijima, A.

    2014-12-01

    Conservation of biodiversity is one of the key issues in the environmental studies. As means to solve this issue, education is becoming increasingly important. In the previous work, we have developed a course of workshops on the conservation of biodiversity. To disseminate the course as a tool for environmental education, determination of the educational effect is essential. A text mining enables analyses of frequency and co-occurrence of words in the freely described texts. This study is intended to evaluate the effect of workshop by using text mining technique. We hosted the originally developed workshop on the conservation of biodiversity for 22 college students. The aim of the workshop was to inform the definition of biodiversity. Generally, biodiversity refers to the diversity of ecosystem, diversity between species, and diversity within species. To facilitate discussion, supplementary materials were used. For instance, field guides of wildlife species were used to discuss about the diversity of ecosystem. Moreover, a hierarchical framework in an ecological pyramid was shown for understanding the role of diversity between species. Besides, we offered a document material on the historical affair of Potato Famine in Ireland to discuss about the diversity within species from the genetic viewpoint. Before and after the workshop, we asked students for free description on the definition of biodiversity, and analyzed by using Tiny Text Miner. This technique enables Japanese language morphological analysis. Frequently-used words were sorted into some categories. Moreover, a principle component analysis was carried out. After the workshop, frequency of the words tagged to diversity between species and diversity within species has significantly increased. From a principle component analysis, the 1st component consists of the words such as producer, consumer, decomposer, and food chain. This indicates that the students have comprehended the close relationship between

  7. NetworkAnalyst--integrative approaches for protein-protein interaction network analysis and visual exploration.

    Science.gov (United States)

    Xia, Jianguo; Benner, Maia J; Hancock, Robert E W

    2014-07-01

    Biological network analysis is a powerful approach to gain systems-level understanding of patterns of gene expression in different cell types, disease states and other biological/experimental conditions. Three consecutive steps are required--identification of genes or proteins of interest, network construction and network analysis and visualization. To date, researchers have to learn to use a combination of several tools to accomplish this task. In addition, interactive visualization of large networks has been primarily restricted to locally installed programs. To address these challenges, we have developed NetworkAnalyst, taking advantage of state-of-the-art web technologies, to enable high performance network analysis with rich user experience. NetworkAnalyst integrates all three steps and presents the results via a powerful online network visualization framework. Users can upload gene or protein lists, single or multiple gene expression datasets to perform comprehensive gene annotation and differential expression analysis. Significant genes are mapped to our manually curated protein-protein interaction database to construct relevant networks. The results are presented through standard web browsers for network analysis and interactive exploration. NetworkAnalyst supports common functions for network topology and module analyses. Users can easily search, zoom and highlight nodes or modules, as well as perform functional enrichment analysis on these selections. The networks can be customized with different layouts, colors or node sizes, and exported as PNG, PDF or GraphML files. Comprehensive FAQs, tutorials and context-based tips and instructions are provided. NetworkAnalyst currently supports protein-protein interaction network analysis for human and mouse and is freely available at http://www.networkanalyst.ca. © The Author(s) 2014. Published by Oxford University Press on behalf of Nucleic Acids Research.

  8. Co-occurrence network analysis of Chinese and English poems

    Science.gov (United States)

    Liang, Wei; Wang, Yanli; Shi, Yuming; Chen, Guanrong

    2015-02-01

    A total of 572 co-occurrence networks of Chinese characters and words as well as English words are constructed from both Chinese and English poems. It is found that most of the networks have small-world features; more Chinese networks have scale-free properties and hierarchical structures as compared with the English networks; all the networks are disassortative, and the disassortativeness of the Chinese word networks is more prominent than those of the English networks; the spectral densities of the Chinese word networks and English networks are similar, but they are different from those of the ER, BA, and WS networks. For the above observed phenomena, analysis is provided with interpretation from a linguistic perspective.

  9. Unveiling the Trans-Pacific Partnership: An Analysis of the Full Text

    Directory of Open Access Journals (Sweden)

    Yan Dong

    2016-12-01

    Full Text Available This article systematically analyzes the full text of the Trans-Pacific Partnership (TPP from the perspectives of breadth, depth and new concepts. First, by comparing it to free trade agreements (FTAs that the United States has signed with economies in the Asia-Pacific region and FTAs other economies have signed in the region, it assesses the extension of the TPP text’s chapters. Second, it classifies those chapters into four categories: deepening traditional topics, deeper integration, new topics and other institutional topics. Third, the article summarizes four new concepts based on an analysis of the text: to generalize the U.S. idea of international trade and investment rules, to respond to the demand for change in global value chains on global trade governance, to consider the interests of multinational corporations and small and medium-sized enterprises, and to prioritize U.S. interests while taking into account other members’ interests. Finally, the article analyzes the comprehensive impact of TPP rules on China.

  10. Making computers noble. An experiment in automatic analysis of medieval texts

    Directory of Open Access Journals (Sweden)

    Andrea Colli

    2016-02-01

    Full Text Available L’analisi informatica di testi filosofici, la creazione di database, ipertesti o edizioni elettroniche non costituiscono più unicamente una ricerca di frontiera, ma sono da molti anni una risorsa preziosa per gli studi umanistici. Ora, non si tratta di richiedere alle macchine un ulteriore sforzo per comprendere il linguaggio umano, quanto piuttosto di perfezionare gli strumenti affinché esse possano essere a tutti gli effetti collaboratori di ricerca. Questo articolo è concepito come il resoconto di un esperimento finalizzato a documentare come le associazioni lessicali di un gruppo selezionato di testi medievali possa offrire qualche suggerimento in merito ai loro contenuti teorici. Computer analysis of texts, creation of databases hypertexts and digital editions are not the final frontier of research anymore. Quite the contrary, from many years they have been representing a significant contribution to medieval studies. Therefore, we do not mean to make the computer able to grasp the meaning of human language and penetrate its secrets, but rather we aim at improving their tools, so that they will become an even more efficient equipment employed in research activities. This paper is thought as a sort of technical report with the proposed task to verify if an automatic identification of some word associations within a selected groups of medieval writings produces suggestions on the subject of the processed texts, able to be used in a theoretical inquiry.

  11. Mayo clinical Text Analysis and Knowledge Extraction System (cTAKES): architecture, component evaluation and applications.

    Science.gov (United States)

    Savova, Guergana K; Masanz, James J; Ogren, Philip V; Zheng, Jiaping; Sohn, Sunghwan; Kipper-Schuler, Karin C; Chute, Christopher G

    2010-01-01

    We aim to build and evaluate an open-source natural language processing system for information extraction from electronic medical record clinical free-text. We describe and evaluate our system, the clinical Text Analysis and Knowledge Extraction System (cTAKES), released open-source at http://www.ohnlp.org. The cTAKES builds on existing open-source technologies-the Unstructured Information Management Architecture framework and OpenNLP natural language processing toolkit. Its components, specifically trained for the clinical domain, create rich linguistic and semantic annotations. Performance of individual components: sentence boundary detector accuracy=0.949; tokenizer accuracy=0.949; part-of-speech tagger accuracy=0.936; shallow parser F-score=0.924; named entity recognizer and system-level evaluation F-score=0.715 for exact and 0.824 for overlapping spans, and accuracy for concept mapping, negation, and status attributes for exact and overlapping spans of 0.957, 0.943, 0.859, and 0.580, 0.939, and 0.839, respectively. Overall performance is discussed against five applications. The cTAKES annotations are the foundation for methods and modules for higher-level semantic processing of clinical free-text.

  12. Analysis of first-year college chemistry students' knowledge about and usage of text

    Science.gov (United States)

    Pentecost, Thomas Crawford

    This study analyzed the usage of textbooks by 58 students in a first-year college chemistry course, the students' approaches to studying, and their knowledge about science reading. Student success in the course was measured by the final exam score. To analyze students' textbook usage the Science Reading Strategy Survey (SRSS) was developed. The SRSS allowed students' usage of the textbook to be categorized into one of three groups: methodical/linear use, efficient use, and making connections/deep use. Seventy-one percent of chemistry students were categorized as using the textbook in a deep/making connections manner, while 15% reported text usage that was categorized as efficient and 11% reported a methodical/linear approach to text use. The students' approaches to studying were determined by using the Study Process Questionnaire (SPQ). The internal structure of the SPQ was confirmed by factor analysis. Forty-three percent of students adopted an achieving approach and 41% approached their studies with a surface approach. Only 7.1% of students had a deep approach to learning. The disconnect between approach (SPQ) and reading strategies (SRSS) could be due to the students finding their general chemistry textbook a valuable resource for getting through a difficult subject they are not strongly motivated to learn. Student's knowledge about reading science text was measured by the Index of Science Reading Awareness (ISRA). This was the first time this instrument had been used with college students. The ISRA was analyzed and the instrument was used to measure students' knowledge about science reading strategies and their general knowledge about science reading and text. The majority, 62%, of first-year chemistry students possess comprehensive knowledge about science reading strategies and science text. The remainder of students had surface knowledge and no students in this study were found to have an incomplete knowledge. There was no correlation between the student

  13. Toward a Theory of Industrial Supply Networks: A Multi-Level Perspective via Network Analysis

    Directory of Open Access Journals (Sweden)

    Yi Zuo

    2017-07-01

    Full Text Available In most supply chains (SCs, transaction relationships between suppliers and customers are commonly considered to be an extrapolation from a linear perspective. However, this traditional linear concept of an SC is egotistic and oversimplified and does not sufficiently reflect the complex and cyclical structure of supplier-customer relationships in current economic and industrial situations. The interactional relationships and topological characteristics between suppliers and customers should be analyzed using supply networks (SNs rather than traditional linear SCs. Therefore, this paper reconceptualizes SCs as SNs in complex adaptive systems (CAS, and presents three main contributions. First, we propose an integrated framework of CAS network by synthesizing multi-level network analysis from the network-, community- and vertex-perspective. The CAS perspective enables us to understand the advances of SN properties. Second, in order to emphasize the CAS properties of SNs, we conducted a real-world SN based on the Japanese industry and describe an advanced investigation of SN theory. The CAS properties help in enriching the SN theory, which can benefit SN management, community economics and industrial resilience. Third, we propose a quantitative metric of entropy to measure the complexity and robustness of SNs. The results not only support a specific understanding of the structural outcomes relevant to SNs, but also deliver efficient and effective support to the management and design of SNs.

  14. Comparative analysis of quantitative efficiency evaluation methods for transportation networks.

    Science.gov (United States)

    He, Yuxin; Qin, Jin; Hong, Jian

    2017-01-01

    An effective evaluation of transportation network efficiency could offer guidance for the optimal control of urban traffic. Based on the introduction and related mathematical analysis of three quantitative evaluation methods for transportation network efficiency, this paper compares the information measured by them, including network structure, traffic demand, travel choice behavior and other factors which affect network efficiency. Accordingly, the applicability of various evaluation methods is discussed. Through analyzing different transportation network examples it is obtained that Q-H method could reflect the influence of network structure, traffic demand and user route choice behavior on transportation network efficiency well. In addition, the transportation network efficiency measured by this method and Braess's Paradox can be explained with each other, which indicates a better evaluation of the real operation condition of transportation network. Through the analysis of the network efficiency calculated by Q-H method, it can also be drawn that a specific appropriate demand is existed to a given transportation network. Meanwhile, under the fixed demand, both the critical network structure that guarantees the stability and the basic operation of the network and a specific network structure contributing to the largest value of the transportation network efficiency can be identified.

  15. Deriving pathway maps from automated text analysis using a grammar-based approach.

    Science.gov (United States)

    Olsson, Björn; Gawronska, Barbara; Erlendsson, Björn

    2006-04-01

    We demonstrate how automated text analysis can be used to support the large-scale analysis of metabolic and regulatory pathways by deriving pathway maps from textual descriptions found in the scientific literature. The main assumption is that correct syntactic analysis combined with domain-specific heuristics provides a good basis for relation extraction. Our method uses an algorithm that searches through the syntactic trees produced by a parser based on a Referent Grammar formalism, identifies relations mentioned in the sentence, and classifies them with respect to their semantic class and epistemic status (facts, counterfactuals, hypotheses). The semantic categories used in the classification are based on the relation set used in KEGG (Kyoto Encyclopedia of Genes and Genomes), so that pathway maps using KEGG notation can be automatically generated. We present the current version of the relation extraction algorithm and an evaluation based on a corpus of abstracts obtained from PubMed. The results indicate that the method is able to combine a reasonable coverage with high accuracy. We found that 61% of all sentences were parsed, and 97% of the parse trees were judged to be correct. The extraction algorithm was tested on a sample of 300 parse trees and was found to produce correct extractions in 90.5% of the cases.

  16. Quantitative analysis of the text and graphic content in ophthalmic slide presentations.

    Science.gov (United States)

    Ing, Edsel; Celo, Erdit; Ing, Royce; Weisbrod, Lawrence; Ing, Mercedes

    2017-04-01

    To determine the characteristics of ophthalmic digital slide presentations. Retrospective quantitative analysis. Slide presentations from a 2015 Canadian primary eye care conference were analyzed for their duration, character and word count, font size, words per minute (wpm), lines per slide, words per slide, slides per minute (spm), text density product (wpm × spm), proportion of graphic content, and Flesch Reading Ease (FRE) score using Microsoft PowerPoint and Word. The median audience evaluation score for the lectures was used to dichotomize the higher scoring lectures (HSL) from the lower scoring lectures (LSL). A priori we hypothesized that there would be a difference in the wpm, spm, text density product, and FRE score between HSL and LSL. Wilcoxon rank-sum tests with Bonferroni correction were utilized. The 17 lectures had medians of 2.5 spm, 20.3 words per slide, 5.0 lines per slide, 28-point sans serif font, 36% graphic content, and text density product of 136.4 words × slides/minute 2 . Although not statistically significant, the HSL had more wpm, fewer words per slide, more graphics per slide, greater text density, and higher FRE score than LSL. There was a statistically significant difference in the spm of the HSL (3.1 ± 1.0) versus the LSL (2.2 ± 1.0) at p = 0.0124. All presenters showed more than 1 slide per minute. The HSL showed more spm than the LSL. The descriptive statistics from this study may aid in the preparation of slides used for teaching and conferences. Copyright © 2017 Canadian Ophthalmological Society. Published by Elsevier Inc. All rights reserved.

  17. Introducing the Interactive Model for the Training of Audiovisual Translators and Analysis of Multimodal Texts

    Directory of Open Access Journals (Sweden)

    Pietro Luigi Iaia

    2015-07-01

    Full Text Available Abstract – This paper introduces the ‘Interactive Model’ of audiovisual translation developed in the context of my PhD research on the cognitive-semantic, functional and socio-cultural features of the Italian-dubbing translation of a corpus of humorous texts. The Model is based on two interactive macro-phases – ‘Multimodal Critical Analysis of Scripts’ (MuCrAS and ‘Multimodal Re-Textualization of Scripts’ (MuReTS. Its construction and application are justified by a multidisciplinary approach to the analysis and translation of audiovisual texts, so as to focus on the linguistic and extralinguistic dimensions affecting both the reception of source texts and the production of target ones (Chaume 2004; Díaz Cintas 2004. By resorting to Critical Discourse Analysis (Fairclough 1995, 2001, to a process-based approach to translation and to a socio-semiotic analysis of multimodal texts (van Leeuwen 2004; Kress and van Leeuwen 2006, the Model is meant to be applied to the training of audiovisual translators and discourse analysts in order to help them enquire into the levels of pragmalinguistic equivalence between the source and the target versions. Finally, a practical application shall be discussed, detailing the Italian rendering of a comic sketch from the American late-night talk show Conan.Abstract – Questo studio introduce il ‘Modello Interattivo’ di traduzione audiovisiva sviluppato durante il mio dottorato di ricerca incentrato sulle caratteristiche cognitivo-semantiche, funzionali e socio-culturali della traduzione italiana per il doppiaggio di un corpus di testi comici. Il Modello è costituito da due fasi: la prima, di ‘Analisi critica e multimodale degli script’ (MuCrAS e la seconda, di ‘Ritestualizzazione critica e multimodale degli script’ (MuReTS, e la sua costruzione e applicazione sono frutto di un approccio multidisciplinare all’analisi e traduzione dei testi audiovisivi, al fine di esaminare le

  18. Analysis and Comparison on Novel Sensor Network Security Access Technology

    Directory of Open Access Journals (Sweden)

    Ping LIU

    2014-01-01

    Full Text Available The article introduces against technical defects of traditional network access control system, detail NAC, NAP, UAC and TNC four kinds of new network security access technology, and this article analyzes and compares them. Security framework for wireless sensor networks SPINS defines the mechanism and algorithm of complete and effective in confidentiality, point-to-point message authentication, integrity, authentication, broadcast authentication.

  19. Analysis and monitoring design for networks

    Energy Technology Data Exchange (ETDEWEB)

    Fedorov, V.; Flanagan, D.; Rowan, T.; Batsell, S.

    1998-06-01

    The idea of applying experimental design methodologies to develop monitoring systems for computer networks is relatively novel even though it was applied in other areas such as meteorology, seismology, and transportation. One objective of a monitoring system should always be to collect as little data as necessary to be able to monitor specific parameters of the system with respect to assigned targets and objectives. This implies a purposeful monitoring where each piece of data has a reason to be collected and stored for future use. When a computer network system as large and complex as the Internet is the monitoring subject, providing an optimal and parsimonious observing system becomes even more important. Many data collection decisions must be made by the developers of a monitoring system. These decisions include but are not limited to the following: (1) The type data collection hardware and software instruments to be used; (2) How to minimize interruption of regular network activities during data collection; (3) Quantification of the objectives and the formulation of optimality criteria; (4) The placement of data collection hardware and software devices; (5) The amount of data to be collected in a given time period, how large a subset of the available data to collect during the period, the length of the period, and the frequency of data collection; (6) The determination of the data to be collected (for instance, selection of response and explanatory variables); (7) Which data will be retained and how long (i.e., data storage and retention issues); and (8) The cost analysis of experiments. Mathematical statistics, and, in particular, optimal experimental design methods, may be used to address the majority of problems generated by 3--7. In this study, the authors focus their efforts on topics 3--5.

  20. Survey on the cryptanalysis of wireless sensor networks using side-channel analysis

    CSIR Research Space (South Africa)

    Moabalobelo, T

    2012-09-01

    Full Text Available cryptographic device independent of the intermediate values of the cryptographic algorithm. Countermeasures against power analysis attacks are classified into several levels [21]: i. The transistor level: logic gates and circuits can be built in such a way... consider implementation of multiple countermeasures (e.g., combination of transistor and algorithmic level). VI. REFERENCES [1] Zheng , J. and Jamalipour, A., "Introduction to Wireless Sensor Networks," in Wireless Sensor Networks: A Networking...

  1. Network theory: key issues for the analysis of the "brain drain"

    Directory of Open Access Journals (Sweden)

    Diana Carolina Henao

    2012-12-01

    Full Text Available This paper offers an analysis of the brain drain from the perspective of the network theory. Some definitions and key concepts of the network theory have been discussed in relation to criteria and reasons that are taken into account by people with broad educational capital from developing countries who are involved in the research in different areas of knowledge and who seek to adapt to other scientific collaboration networks in the developed countries.

  2. A networks analysis of terrorism in Africa: implications for Kenya

    Directory of Open Access Journals (Sweden)

    Steven Kigen Morumbasi

    2016-12-01

    Full Text Available This paper highlights the challenges that the international community faces in responding to the terrorists and the need to change tactics to respond more effectively to an increasingly nebulous enemy. Terrorism can take different forms and is perpetrated by both state and non-state actors. This research looks into the network structure of terrorism and terrorist groups. In the contemporary setting, terrorist organizations operate transnationally hence the use of the term ‘terrorism without borders’. An enabling factor of terrorism today is the network structure that it has adopted which gives it the ability to both project its reach and prevent easy infiltration. The network structure has also brought about renewed interests in Africa, where global terror networks such as al-Qaeda and the Islamic State compete for influence. Boko Haram in West Africa is an affiliate of the Islamic State and this provides possible linkages with the Islamic State in Libya. Boko Haram refers to itself as the Islamic State’s Western Province. Al-Shabaab has dominated headlines by carrying out deadly attacks in East Africa. The al-Qaeda affiliate has however faced resistance from a section of its members who seek ties with the Islamic State. This resulted in the formation of Jabha East Africa, a group that aligns itself to the Islamic State. The Sinai Peninsula has also witnessed an upsurge of terror attacks perpetrated by the Sinai Province, which views itself as a province of the Islamic State. This surmounts to a complex network structure of terrorist networks in Africa and the growing threat to militant Islam. The special attention is paid to analysis of terrorist challenges in Kenia.

  3. Network analysis of intrinsic functional brain connectivity in Alzheimer's disease.

    Directory of Open Access Journals (Sweden)

    Kaustubh Supekar

    2008-06-01

    Full Text Available Functional brain networks detected in task-free ("resting-state" functional magnetic resonance imaging (fMRI have a small-world architecture that reflects a robust functional organization of the brain. Here, we examined whether this functional organization is disrupted in Alzheimer's disease (AD. Task-free fMRI data from 21 AD subjects and 18 age-matched controls were obtained. Wavelet analysis was applied to the fMRI data to compute frequency-dependent correlation matrices. Correlation matrices were thresholded to create 90-node undirected-graphs of functional brain networks. Small-world metrics (characteristic path length and clustering coefficient were computed using graph analytical methods. In the low frequency interval 0.01 to 0.05 Hz, functional brain networks in controls showed small-world organization of brain activity, characterized by a high clustering coefficient and a low characteristic path length. In contrast, functional brain networks in AD showed loss of small-world properties, characterized by a significantly lower clustering coefficient (p<0.01, indicative of disrupted local connectivity. Clustering coefficients for the left and right hippocampus were significantly lower (p<0.01 in the AD group compared to the control group. Furthermore, the clustering coefficient distinguished AD participants from the controls with a sensitivity of 72% and specificity of 78%. Our study provides new evidence that there is disrupted organization of functional brain networks in AD. Small-world metrics can characterize the functional organization of the brain in AD, and our findings further suggest that these network measures may be useful as an imaging-based biomarker to distinguish AD from healthy aging.

  4. The Potential of Text Mining in Data Integration and Network Biology for Plant Research: A Case Study on Arabidopsis[C][W

    Science.gov (United States)

    Van Landeghem, Sofie; De Bodt, Stefanie; Drebert, Zuzanna J.; Inzé, Dirk; Van de Peer, Yves

    2013-01-01

    Despite the availability of various data repositories for plant research, a wealth of information currently remains hidden within the biomolecular literature. Text mining provides the necessary means to retrieve these data through automated processing of texts. However, only recently has advanced text mining methodology been implemented with sufficient computational power to process texts at a large scale. In this study, we assess the potential of large-scale text mining for plant biology research in general and for network biology in particular using a state-of-the-art text mining system applied to all PubMed abstracts and PubMed Central full texts. We present extensive evaluation of the textual data for Arabidopsis thaliana, assessing the overall accuracy of this new resource for usage in plant network analyses. Furthermore, we combine text mining information with both protein–protein and regulatory interactions from experimental databases. Clusters of tightly connected genes are delineated from the resulting network, illustrating how such an integrative approach is essential to grasp the current knowledge available for Arabidopsis and to uncover gene information through guilt by association. All large-scale data sets, as well as the manually curated textual data, are made publicly available, hereby stimulating the application of text mining data in future plant biology studies. PMID:23532071

  5. Social Network Analysis and Qualitative Interviews for Assessing Geographic Characteristics of Tourism Business Networks

    National Research Council Canada - National Science Library

    Kelman, Ilan; Luthe, Tobias; Wyss, Romano; Tørnblad, Silje H; Evers, Yvette; Curran, Marina Martin; Williams, Richard J; Berlow, Eric L

    2016-01-01

    This study integrates quantitative social network analysis (SNA) and qualitative interviews for understanding tourism business links in isolated communities through analysing spatial characteristics...

  6. 6th International Conference on Network Analysis

    CERN Document Server

    Nikolaev, Alexey; Pardalos, Panos; Prokopyev, Oleg

    2017-01-01

    This valuable source for graduate students and researchers provides a comprehensive introduction to current theories and applications in optimization methods and network models. Contributions to this book are focused on new efficient algorithms and rigorous mathematical theories, which can be used to optimize and analyze mathematical graph structures with massive size and high density induced by natural or artificial complex networks. Applications to social networks, power transmission grids, telecommunication networks, stock market networks, and human brain networks are presented. Chapters in this book cover the following topics: Linear max min fairness Heuristic approaches for high-quality solutions Efficient approaches for complex multi-criteria optimization problems Comparison of heuristic algorithms New heuristic iterative local search Power in network structures Clustering nodes in random graphs Power transmission grid structure Network decomposition problems Homogeneity hypothesis testing Network analy...

  7. Differential network analysis with multiply imputed lipidomic data.

    Directory of Open Access Journals (Sweden)

    Maiju Kujala

    Full Text Available The importance of lipids for cell function and health has been widely recognized, e.g., a disorder in the lipid composition of cells has been related to atherosclerosis caused cardiovascular disease (CVD. Lipidomics analyses are characterized by large yet not a huge number of mutually correlated variables measured and their associations to outcomes are potentially of a complex nature. Differential network analysis provides a formal statistical method capable of inferential analysis to examine differences in network structures of the lipids under two biological conditions. It also guides us to identify potential relationships requiring further biological investigation. We provide a recipe to conduct permutation test on association scores resulted from partial least square regression with multiple imputed lipidomic data from the LUdwigshafen RIsk and Cardiovascular Health (LURIC study, particularly paying attention to the left-censored missing values typical for a wide range of data sets in life sciences. Left-censored missing values are low-level concentrations that are known to exist somewhere between zero and a lower limit of quantification. To make full use of the LURIC data with the missing values, we utilize state of the art multiple imputation techniques and propose solutions to the challenges that incomplete data sets bring to differential network analysis. The customized network analysis helps us to understand the complexities of the underlying biological processes by identifying lipids and lipid classes that interact with each other, and by recognizing the most important differentially expressed lipids between two subgroups of coronary artery disease (CAD patients, the patients that had a fatal CVD event and the ones who remained stable during two year follow-up.

  8. Cluster Analysis Based on Bipartite Network

    Directory of Open Access Journals (Sweden)

    Dawei Zhang

    2014-01-01

    Full Text Available Clustering data has a wide range of applications and has attracted considerable attention in data mining and artificial intelligence. However it is difficult to find a set of clusters that best fits natural partitions without any class information. In this paper, a method for detecting the optimal cluster number is proposed. The optimal cluster number can be obtained by the proposal, while partitioning the data into clusters by FCM (Fuzzy c-means algorithm. It overcomes the drawback of FCM algorithm which needs to define the cluster number c in advance. The method works by converting the fuzzy cluster result into a weighted bipartite network and then the optimal cluster number can be detected by the improved bipartite modularity. The experimental results on artificial and real data sets show the validity of the proposed method.

  9. Quantitative methods for ecological network analysis.

    Science.gov (United States)

    Ulanowicz, Robert E

    2004-12-01

    The analysis of networks of ecological trophic transfers is a useful complement to simulation modeling in the quest for understanding whole-ecosystem dynamics. Trophic networks can be studied in quantitative and systematic fashion at several levels. Indirect relationships between any two individual taxa in an ecosystem, which often differ in either nature or magnitude from their direct influences, can be assayed using techniques from linear algebra. The same mathematics can also be employed to ascertain where along the trophic continuum any individual taxon is operating, or to map the web of connections into a virtual linear chain that summarizes trophodynamic performance by the system. Backtracking algorithms with pruning have been written which identify pathways for the recycle of materials and energy within the system. The pattern of such cycling often reveals modes of control or types of functions exhibited by various groups of taxa. The performance of the system as a whole at processing material and energy can be quantified using information theory. In particular, the complexity of process interactions can be parsed into separate terms that distinguish organized, efficient performance from the capacity for further development and recovery from disturbance. Finally, the sensitivities of the information-theoretic system indices appear to identify the dynamical bottlenecks in ecosystem functioning.

  10. Detecting and Analyzing Cybercrime in Text-Based Communication of Cybercriminal Networks through Computational Linguistic and Psycholinguistic Feature Modeling

    Science.gov (United States)

    Mbaziira, Alex Vincent

    2017-01-01

    Cybercriminals are increasingly using Internet-based text messaging applications to exploit their victims. Incidents of deceptive cybercrime in text-based communication are increasing and include fraud, scams, as well as favorable and unfavorable fake reviews. In this work, we use a text-based deception detection approach to train models for…

  11. The Determination of Children's Knowledge of Global Lunar Patterns from Online Essays Using Text Mining Analysis

    Science.gov (United States)

    Cheon, Jongpil; Lee, Sangno; Smith, Walter; Song, Jaeki; Kim, Yongjin

    2013-04-01

    The purpose of this study was to use text mining analysis of early adolescents' online essays to determine their knowledge of global lunar patterns. Australian and American students in grades five to seven wrote about global lunar patterns they had discovered by sharing observations with each other via the Internet. These essays were analyzed for the students' inclusion of words associated with the shape (i.e., phase), orientation and location of the Moon along with words about similarities and differences. Almost all students wrote about shape but fewer wrote about orientation or location. Students infrequently included words about similarities or differences in the same sentence with shape, orientation or location. Similar to studies about children's and adults' lunar misconceptions, it was found that male and female early adolescents also lacked a robust understanding of global lunar patterns.

  12. Determining Women’s Sexual Self-Schemas Through Advanced Computerized Text Analysis

    Science.gov (United States)

    Stanton, Amelia M.; Boyd, Ryan L.; Pulverman, Carey S.; Meston, Cindy M.

    2015-01-01

    The meaning extraction method (MEM), an advanced computerized text analysis technique, was used to analyze women’s sexual self-schemas. Participants (n = 239) completed open-ended essays about their personal feelings associated with sex and sexuality. These essays were analyzed using the MEM, a procedure designed to extract common themes from natural language. Using the MEM procedure, we extracted seven unique themes germane to sexual self-schemas: family and development, virginity, abuse, relationship, sexual activity, attraction, and existentialism. Each of these themes is comprised of frequently used words across the participants’ descriptions of their sexual selves. Significant differences in sexual self-schemas were observed to covary with age, relationship status, and sexual abuse history. PMID:26146161

  13. Determining women's sexual self-schemas through advanced computerized text analysis.

    Science.gov (United States)

    Stanton, Amelia M; Boyd, Ryan L; Pulverman, Carey S; Meston, Cindy M

    2015-08-01

    The meaning extraction method (MEM), an advanced computerized text analysis technique, was used to analyze women's sexual self-schemas. Participants (n=239) completed open-ended essays about their personal feelings associated with sex and sexuality. These essays were analyzed using the MEM, a procedure designed to extract common themes from natural language. Using the MEM procedure, we extracted seven unique themes germane to sexual self-schemas: family and development, virginity, abuse, relationship, sexual activity, attraction, and existentialism. Each of these themes is comprised of frequently used words across the participants' descriptions of their sexual selves. Significant differences in sexual self-schemas were observed to covary with age, relationship status, and sexual abuse history. Copyright © 2015 Elsevier Ltd. All rights reserved.

  14. The Analysis of Heterogeneous Text Documents with the Help of the Computer Program NUD*IST

    Directory of Open Access Journals (Sweden)

    Christine Plaß

    2000-12-01

    Full Text Available On the basis of a current research project we discuss the use of the computer program NUD*IST for the analysis and archiving of qualitative documents. Our project examines the social evaluation of spectacular criminal offenses and we identify, digitize and analyze documents from the entire 20th century. Since public and scientific discourses are examined, the data of the project are extraordinarily heterogeneous: scientific publications, court records, newspaper reports, and administrative documents. We want to show how to transfer general questions into a systematic categorization with the assistance of NUD*IST. Apart from the functions, possibilities and limitations of the application of NUD*IST, concrete work procedures and difficulties encountered are described. URN: urn:nbn:de:0114-fqs0003211

  15. Multiorientation/multiscript scene text detection based on projection profile analysis and graph segmentation

    Science.gov (United States)

    Koo, Hyung Il

    2016-11-01

    Textline detection in natural images has been an important problem and researchers have attempted to address this problem by grouping connected components (CCs) into clusters corresponding to textlines. However, developing bottom-up rules that work for multiorientation and/or multiscript textlines is not a simple task. In order to address this problem, we propose a framework that incorporates projection profile analysis (PPA) into the CC-based approach. Specifically, we build a graph of CCs and recursively partition the graph into subgraphs, until textline structures are detected by PPA. Although PPA has been a common technique in document image processing, it was developed for scanned documents, and we also propose a method to compute projection profiles for CCs. Experimental results show that our method is efficient and achieves better or comparable performance on conventional datasets (ICDAR 2011/2013 and MSRA-TD500), and shows promising results on a challenging dataset (ICDAR 2015 incidental text localization dataset).

  16. Interdependent multi-layer networks: modeling and survivability analysis with applications to space-based networks.

    Science.gov (United States)

    Castet, Jean-Francois; Saleh, Joseph H

    2013-01-01

    This article develops a novel approach and algorithmic tools for the modeling and survivability analysis of networks with heterogeneous nodes, and examines their application to space-based networks. Space-based networks (SBNs) allow the sharing of spacecraft on-orbit resources, such as data storage, processing, and downlink. Each spacecraft in the network can have different subsystem composition and functionality, thus resulting in node heterogeneity. Most traditional survivability analyses of networks assume node homogeneity and as a result, are not suited for the analysis of SBNs. This work proposes that heterogeneous networks can be modeled as interdependent multi-layer networks, which enables their survivability analysis. The multi-layer aspect captures the breakdown of the network according to common functionalities across the different nodes, and it allows the emergence of homogeneous sub-networks, while the interdependency aspect constrains the network to capture the physical characteristics of each node. Definitions of primitives of failure propagation are devised. Formal characterization of interdependent multi-layer networks, as well as algorithmic tools for the analysis of failure propagation across the network are developed and illustrated with space applications. The SBN applications considered consist of several networked spacecraft that can tap into each other's Command and Data Handling subsystem, in case of failure of its own, including the Telemetry, Tracking and Command, the Control Processor, and the Data Handling sub-subsystems. Various design insights are derived and discussed, and the capability to perform trade-space analysis with the proposed approach for various network characteristics is indicated. The select results here shown quantify the incremental survivability gains (with respect to a particular class of threats) of the SBN over the traditional monolith spacecraft. Failure of the connectivity between nodes is also examined, and the

  17. An analysis of problems in statistics and probability in second year educational text books

    Directory of Open Access Journals (Sweden)

    Nicolás Andrés Sánchez

    2017-09-01

    Full Text Available At present society demands that every citizen manage to develop the capacity to interpret and question different phenomena present in tables, graphs and data, capacities that must be developed progressively from the earliest years of education. For this, it is also necessary that the resources point to the development of these skills, such as the textbook of Mathematics. The objective of the present work is to analyze the types of problems proposed in two Secondary Mathematics textbooks in the thematic area of Statistics and Probability. Both texts were those that were tendered and distributed free of charge and respond to two different curricular periods: 1 the one in which the old curriculum bases were in force and the other 2 when the current curricula were implemented. The use of the school textbook book by students and teachers assumes the premise that the various tasks proposed should tend to solve problems. The research was carried out through a qualitative methodology through content analysis. The theoretical categories proposed by Díaz and Poblete (2001 were used. Among the results found most routine problems are identified that serve to mechanize processes; The non-routine problems or real context, appear in very few cases.

  18. Analysis of Computer Network Information Based on "Big Data"

    Science.gov (United States)

    Li, Tianli

    2017-11-01

    With the development of the current era, computer network and large data gradually become part of the people's life, people use the computer to provide convenience for their own life, but at the same time there are many network information problems has to pay attention. This paper analyzes the information security of computer network based on "big data" analysis, and puts forward some solutions.

  19. Road Transport Network Analysis In Port-Harcourt Metropolics ...

    African Journals Online (AJOL)

    Road transport network contributes to the economy of an area as it connects points of origin to destinations. The thrust of this article therefore, is on the analysis of the road networks in Port – Harcourt metropolis with the aim of determining the connectivity of the road networks and the most accessible node. Consequently ...

  20. Neural network analysis of varying trends in real exchange rates

    NARCIS (Netherlands)

    J.F. Kaashoek (Johan); H.K. van Dijk (Herman)

    1999-01-01

    textabstractIn this paper neural networks are fitted to the real exchange rates of seven industrialized countries. The size and topology of the used networks is found by reducing the size of the network through the use of multiple correlation coefficients, principal component analysis of residuals

  1. Method and tool for network vulnerability analysis

    Science.gov (United States)

    Swiler, Laura Painton [Albuquerque, NM; Phillips, Cynthia A [Albuquerque, NM

    2006-03-14

    A computer system analysis tool and method that will allow for qualitative and quantitative assessment of security attributes and vulnerabilities in systems including computer networks. The invention is based on generation of attack graphs wherein each node represents a possible attack state and each edge represents a change in state caused by a single action taken by an attacker or unwitting assistant. Edges are weighted using metrics such as attacker effort, likelihood of attack success, or time to succeed. Generation of an attack graph is accomplished by matching information about attack requirements (specified in "attack templates") to information about computer system configuration (contained in a configuration file that can be updated to reflect system changes occurring during the course of an attack) and assumed attacker capabilities (reflected in "attacker profiles"). High risk attack paths, which correspond to those considered suited to application of attack countermeasures given limited resources for applying countermeasures, are identified by finding "epsilon optimal paths."

  2. Co-occurrence network analysis of modern Chinese poems

    Science.gov (United States)

    Liang, Wei; Wang, Yanli; Shi, Yuming; Chen, Guanrong

    2015-02-01

    A total of 606 co-occurrence networks of Chinese characters and words are constructed from rhymes, free verses, and prose poems. It is found that 98.5 % of networks have scale-free properties, while 19.8 % of networks do not have small-world features, especially the clustering coefficients in 5.6 % of networks are zero. In addition, 61.4 % of networks have significant hierarchical structures, and 98 % of networks are disassortative. For the above observed phenomena, analysis is provided with interpretation from a linguistic perspective.

  3. A Survey of Key Technology of Network Public Opinion Analysis

    Directory of Open Access Journals (Sweden)

    Li Su Ying

    2016-01-01

    Full Text Available The internet has become an important base for internet users to make comments because of its interactivity and fast dissemination. The outbreak of internet public opinion has become a major risk for network information security. Domestic and foreign researchers had carried out extensive and in-depth study on public opinion. Fruitful results have achieved in the basic theory research and emergency handling and other aspects of public opinion. But research on the public opinion in China is still in the initial stage, the key technology of the public opinion analysis is still as a starting point for in-depth study and discussion.

  4. Analysis of clusterization and networking processes in developing intermodal transportation

    Directory of Open Access Journals (Sweden)

    Sinkevičius Gintaras

    2016-06-01

    Full Text Available Analysis of the processes of clusterization and networking draws attention to the necessity of integration of railway transport into the intermodal or multimodal transport chain. One of the most widespread methods of combined transport is interoperability of railway and road transport. The objective is to create an uninterrupted transport chain in combining several modes of transport. The aim of this is to save energy resources, to form an effective, competitive, attractive to the client and safe and environmentally friendly transport system.

  5. Complex Network Analysis of Brazilian Power Grid

    CERN Document Server

    Martins, Gabriela C; Ribeiro, Fabiano L; Forgerini, Fabricio L

    2016-01-01

    Power Grids and other delivery networks has been attracted some attention by the network literature last decades. Despite the Power Grids dynamics has been controlled by computer systems and human operators, the static features of this type of network can be studied and analyzed. The topology of the Brazilian Power Grid (BPG) was studied in this work. We obtained the spatial structure of the BPG from the ONS (electric systems national operator), consisting of high-voltage transmission lines, generating stations and substations. The local low-voltage substations and local power delivery as well the dynamic features of the network were neglected. We analyze the complex network of the BPG and identify the main topological information, such as the mean degree, the degree distribution, the network size and the clustering coefficient to caracterize the complex network. We also detected the critical locations on the network and, therefore, the more susceptible points to lead to a cascading failure and even to a blac...

  6. Advanced functional network analysis in the geosciences: The pyunicorn package

    Science.gov (United States)

    Donges, Jonathan F.; Heitzig, Jobst; Runge, Jakob; Schultz, Hanna C. H.; Wiedermann, Marc; Zech, Alraune; Feldhoff, Jan; Rheinwalt, Aljoscha; Kutza, Hannes; Radebach, Alexander; Marwan, Norbert; Kurths, Jürgen

    2013-04-01

    Functional networks are a powerful tool for analyzing large geoscientific datasets such as global fields of climate time series originating from observations or model simulations. pyunicorn (pythonic unified complex network and recurrence analysis toolbox) is an open-source, fully object-oriented and easily parallelizable package written in the language Python. It allows for constructing functional networks (aka climate networks) representing the structure of statistical interrelationships in large datasets and, subsequently, investigating this structure using advanced methods of complex network theory such as measures for networks of interacting networks, node-weighted statistics or network surrogates. Additionally, pyunicorn allows to study the complex dynamics of geoscientific systems as recorded by time series by means of recurrence networks and visibility graphs. The range of possible applications of the package is outlined drawing on several examples from climatology.

  7. The network researchers' network: A social network analysis of the IMP Group 1985-2006

    DEFF Research Database (Denmark)

    Henneberg, Stephan C. M.; Ziang, Zhizhong; Naudé, Peter

    ). In this paper, based upon the papers presented at the 22 conferences held to date, we undertake a Social Network Analysis in order to examine the degree of co-publishing that has taken place between this group of researchers. We identify the different components in this database, and examine the large main...... components in some detail. The egonets of three of the original 'founding fathers' are examined in detail, and we draw comparisons as to how their publishing strategies vary. Finally, the paper draws some more general conclusions as to the insights that SNA can bring to those working within business...

  8. 'Working is out of the question': a qualitative text analysis of medical certificates of disability.

    Science.gov (United States)

    Aarseth, Guri; Natvig, Bård; Engebretsen, Eivind; Lie, Anne Kveim

    2017-04-20

    Medical certificates influence the distribution of economic benefits in welfare states; however, the qualitative aspects of these texts remain largely unexplored. The present study is the first systematic investigation done of these texts. Our aim was to investigate how GPs select and mediate information about their patients' health and how they support their conclusions about illness, functioning and fitness for work in medical certificates. We performed a textual analysis of thirty-three medical certificates produced by general practitioners (GP) in Norway at the request of the Norwegian Labour and Welfare Administration (NAV).The certificates were subjected to critical reading using the combined analytic methods of narratology and linguistics. Some of the medical information was unclear, ambiguous, and possibly misleading. Evaluations of functioning related to illness were scarce or absent, regardless of diagnosis, and, hence, the basis of working incapacity was unclear. Voices in the text frequently conflated, obscuring the source of speaker. In some documents, the expert's subtle use of language implied doubts about the claimant's credibility, but explicit advocacy also occurred. GPs show little insight into their patients' working lives, but rather than express uncertainty and incompetence, they may resort to making too absolute and too general statements about patients' working capacity, and fail to report thorough assessments. A number of the texts in our material may not function as sufficient or reliable sources for making decisions regarding social benefits. Certificates as these may be deficient for several reasons, and textual incompetence may be one of them. Physicians in Norway receive no systematic training in professional writing. High-quality medical certificates, we believe, might be economical in the long term: it might increase the efficiency with which NAV processes cases and save costs by eliminating the need for unnecessary and expensive

  9. Analysis of neural networks through base functions

    NARCIS (Netherlands)

    van der Zwaag, B.J.; Slump, Cornelis H.; Spaanenburg, L.

    Problem statement. Despite their success-story, neural networks have one major disadvantage compared to other techniques: the inability to explain comprehensively how a trained neural network reaches its output; neural networks are not only (incorrectly) seen as a "magic tool" but possibly even more

  10. Synchronization analysis of coloured delayed networks under ...

    Indian Academy of Sciences (India)

    This paper investigates synchronization of coloured delayed networks under decentralized pinning intermittent control. To begin with, the time delays are taken into account in the coloured networks. In addition, we propose a decentralized pinning intermittent control for coloured delayed networks, which is different from that ...

  11. Spectral Modelling for Spatial Network Analysis

    NARCIS (Netherlands)

    Nourian, P.; Rezvani, S.; Sariyildiz, I.S.; van der Hoeven, F.D.; Attar, Ramtin; Chronis, Angelos; Hanna, Sean; Turrin, Michela

    2016-01-01

    Spatial Networks represent the connectivity structure between units of space as a weighted graph whose links are weighted as to the strength of connections. In case of urban spatial networks, the units of space correspond closely to streets and in architectural spatial networks the units correspond

  12. Deep Learning Neural Networks and Bayesian Neural Networks in Data Analysis

    Science.gov (United States)

    Chernoded, Andrey; Dudko, Lev; Myagkov, Igor; Volkov, Petr

    2017-10-01

    Most of the modern analyses in high energy physics use signal-versus-background classification techniques of machine learning methods and neural networks in particular. Deep learning neural network is the most promising modern technique to separate signal and background and now days can be widely and successfully implemented as a part of physical analysis. In this article we compare Deep learning and Bayesian neural networks application as a classifiers in an instance of top quark analysis.

  13. Privacy Breach Analysis in Social Networks

    Science.gov (United States)

    Nagle, Frank

    This chapter addresses various aspects of analyzing privacy breaches in social networks. We first review literature that defines three types of privacy breaches in social networks: interactive, active, and passive. We then survey the various network anonymization schemes that have been constructed to address these privacy breaches. After exploring these breaches and anonymization schemes, we evaluate a measure for determining the level of anonymity inherent in a network graph based on its topological structure. Finally, we close by emphasizing the difficulty of anonymizing social network data while maintaining usability for research purposes and offering areas for future work.

  14. Assertions of Japanese Websites for and Against Cancer Screening: a Text Mining Analysis

    Science.gov (United States)

    Okuhara, Tsuyoshi; Ishikawa, Hirono; Okada, Masahumi; Kato, Mio; Kiuchi, Takahiro

    2017-04-01

    Background: Cancer screening rates are lower in Japan than in Western countries such as the United States and the United Kingdom. While health professionals publish pro-cancer-screening messages online to encourage proactive seeking for screening, anti-screening activists use the same medium to warn readers against following guidelines. Contents of pro- and anti-cancer-screening sites may contribute to readers’ acceptance of one or the other position. We aimed to use a text-mining method to examine frequently appearing contents on sites for and against cancer screening. Methods: We conducted online searches in December 2016 using two major search engines in Japan (Google Japan and Yahoo! Japan). Targeted websites were classified as “pro”, “anti”, or “neutral” depending on their claims, with the author(s) classified as “health professional”, “mass media”, or “layperson”. Text-mining analyses were conducted, and statistical analysis was performed using the chi-square test. Results: Of the 169 websites analyzed, the top-three most frequently appearing content topics in pro sites were reducing mortality via cancer screening, benefits of early detection, and recommendations for obtaining detailed examination. The top three most frequent in anti-sites were harm from radiation exposure, non-efficacy of cancer screening, and lack of necessity of early detection. Anti-sites also frequently referred to a well-known Japanese radiologist, Makoto Kondo, who rejects the standard forms of cancer care. Conclusion: Our findings should enable authors of pro-cancer-screening sites to write to counter misleading anti-cancer-screening messages and facilitate dissemination of accurate information. Creative Commons Attribution License

  15. MULTI-LEVEL NETWORK RESILIENCE: TRAFFIC ANALYSIS, ANOMALY DETECTION AND SIMULATION

    Directory of Open Access Journals (Sweden)

    Angelos Marnerides

    2011-06-01

    Full Text Available Traffic analysis and anomaly detection have been extensively used to characterize network utilization as well as to identify abnormal network traffic such as malicious attacks. However, so far, techniques for traffic analysis and anomaly detection have been carried out independently, relying on mechanisms and algorithms either in edge or in core networks alone. In this paper we propose the notion of multi-level network resilience, in order to provide a more robust traffic analysis and anomaly detection architecture, combining mechanisms and algorithms operating in a coordinated fashion both in the edge and in the core networks. This work is motivated by the potential complementarities between the research being developed at IIT Madras and Lancaster University. In this paper we describe the current work being developed at IIT Madras and Lancaster on traffic analysis and anomaly detection, and outline the principles of a multi-level resilience architecture.

  16. NETWORK ANALYSIS OF PORTUGUESE TEAM ON FIFA WORLD CUP 2014

    Directory of Open Access Journals (Sweden)

    Rui Sousa Mendes,

    2015-05-01

    Full Text Available Match analysis has been using in football case to identify properties and patterns of teams (Sarmento et al., 2014. From the regular notational analysis until the most recent computational tactical metrics, a lot of different outcomes can be possible to extract from a single match (Clemente, Couceiro, Martins, & Mendes, 2015. In the specific case of football, the cooperation among team-members is one of the main factors that contribute for a better performance (Grund, 2012. Thus, to analyse such cooperation the Social Network Analysis have been used to identify how team-members are connected and if there are cooperation tendencies inside the team (Clemente et al., 2015. The prominent players have been also analysed in order to identify the central players in the team (Clemente, Couceiro, Martins, & Mendes, 2014.Objectives: Therefore, using the social network analysis approach the aim of this study was to analyse the centrality levels of Portuguese positional roles during the FIFA World Cup 2014 and to identify the prominent tactical positions that determined the moments with ball.

  17. A user exposure based approach for non-structural road network vulnerability analysis.

    Directory of Open Access Journals (Sweden)

    Lei Jin

    Full Text Available Aiming at the dense urban road network vulnerability without structural negative consequences, this paper proposes a novel non-structural road network vulnerability analysis framework. Three aspects of the framework are mainly described: (i the rationality of non-structural road network vulnerability, (ii the metrics for negative consequences accounting for variant road conditions, and (iii the introduction of a new vulnerability index based on user exposure. Based on the proposed methodology, a case study in the Sioux Falls network which was usually threatened by regular heavy snow during wintertime is detailedly discussed. The vulnerability ranking of links of Sioux Falls network with respect to heavy snow scenario is identified. As a result of non-structural consequences accompanied by conceivable degeneration of network, there are significant increases in generalized travel time costs which are measurements for "emotionally hurt" of topological road network.

  18. A social network analysis of treatment discoveries in cancer.

    Directory of Open Access Journals (Sweden)

    Athanasios Tsalatsanis

    Full Text Available Controlled clinical trials are widely considered to be the vehicle to treatment discovery in cancer that leads to significant improvements in health outcomes including an increase in life expectancy. We have previously shown that the pattern of therapeutic discovery in randomized controlled trials (RCTs can be described by a power law distribution. However, the mechanism generating this pattern is unknown. Here, we propose an explanation in terms of the social relations between researchers in RCTs. We use social network analysis to study the impact of interactions between RCTs on treatment success. Our dataset consists of 280 phase III RCTs conducted by the NCI from 1955 to 2006. The RCT networks are formed through trial interactions formed i at random, ii based on common characteristics, or iii based on treatment success. We analyze treatment success in terms of survival hazard ratio as a function of the network structures. Our results show that the discovery process displays power law if there are preferential interactions between trials that may stem from researchers' tendency to interact selectively with established and successful peers. Furthermore, the RCT networks are "small worlds": trials are connected through a small number of ties, yet there is much clustering among subsets of trials. We also find that treatment success (improved survival is proportional to the network centrality measures of closeness and betweenness. Negative correlation exists between survival and the extent to which trials operate within a limited scope of information. Finally, the trials testing curative treatments in solid tumors showed the highest centrality and the most influential group was the ECOG. We conclude that the chances of discovering life-saving treatments are directly related to the richness of social interactions between researchers inherent in a preferential interaction model.

  19. Contents of Japanese pro- and anti-HPV vaccination websites: A text mining analysis.

    Science.gov (United States)

    Okuhara, Tsuyoshi; Ishikawa, Hirono; Okada, Masahumi; Kato, Mio; Kiuchi, Takahiro

    2017-09-23

    In Japan, the human papillomavirus (HPV) vaccination rate has sharply fallen to nearly 0% due to sensational media reports of adverse events. Online anti-HPV-vaccination activists often warn readers of the vaccine's dangers. Here, we aimed to examine frequently appearing contents on pro- and anti-HPV vaccination websites. We conducted online searches via two major search engines (Google Japan and Yahoo! Japan). Targeted websites were classified as "pro," "anti," or "neutral" according to their claims, with the author(s) classified as "health professionals," "mass media," or "laypersons." We then conducted a text mining analysis. Of the 270 sites analyzed, 16 contents were identified. The most frequently appearing contents on pro websites were vaccine side effects, preventable effect of vaccination, and cause of cervical cancer. The most frequently appearing contents on anti websites were vaccine side effects, vaccine toxicity, and girls who suffer from vaccine side effects. Main disseminators of each content according to the author's expertise were also revealed. Pro-HPV vaccination websites should supplement deficient contents and respond to frequent contents on anti-HPV websites. Effective tactics are needed to better communicate susceptibility to cervical cancer, frequency of side effects, and responses to vaccine toxicity and conspiracy theories. Copyright © 2017 Elsevier B.V. All rights reserved.

  20. Network analysis and synthesis a modern systems theory approach

    CERN Document Server

    Anderson, Brian D O

    2006-01-01

    Geared toward upper-level undergraduates and graduate students, this book offers a comprehensive look at linear network analysis and synthesis. It explores state-space synthesis as well as analysis, employing modern systems theory to unite the classical concepts of network theory. The authors stress passive networks but include material on active networks. They avoid topology in dealing with analysis problems and discuss computational techniques. The concepts of controllability, observability, and degree are emphasized in reviewing the state-variable description of linear systems. Explorations

  1. State of the art applications of social network analysis

    CERN Document Server

    Can, Fazli; Polat, Faruk

    2014-01-01

    Social network analysis increasingly bridges the discovery of patterns in diverse areas of study as more data becomes available and complex. Yet the construction of huge networks from large data often requires entirely different approaches for analysis including; graph theory, statistics, machine learning and data mining. This work covers frontier studies on social network analysis and mining from different perspectives such as social network sites, financial data, e-mails, forums, academic research funds, XML technology, blog content, community detection and clique finding, prediction of user

  2. Graph theoretical analysis and application of fMRI-based brain network in Alzheimer's disease

    Directory of Open Access Journals (Sweden)

    LIU Xue-na

    2012-08-01

    Full Text Available Alzheimer's disease (AD, a progressive neurodegenerative disease, is clinically characterized by impaired memory and many other cognitive functions. However, the pathophysiological mechanisms underlying the disease are not thoroughly understood. In recent years, using functional magnetic resonance imaging (fMRI as well as advanced graph theory based network analysis approach, several studies of patients with AD suggested abnormal topological organization in both global and regional properties of functional brain networks, specifically, as demonstrated by a loss of small-world network characteristics. These studies provide novel insights into the pathophysiological mechanisms of AD and could be helpful in developing imaging biomarkers for disease diagnosis. In this paper we introduce the essential concepts of complex brain networks theory, and review recent advances of the study on human functional brain networks in AD, especially focusing on the graph theoretical analysis of small-world network based on fMRI. We also propound the existent problems and research orientation.

  3. INVESTIGATION OF SPATIAL DATA WITH OPEN SOURCE SOCIAL NETWORK ANALYSIS AND GEOGRAPHIC INFORMATION SYSTEMS APPLICATIONS

    Directory of Open Access Journals (Sweden)

    L. Sabah

    2017-11-01

    Full Text Available Social networks are the real social experience of individuals in the online environment. In this environment, people use symbolic gestures and mimics, sharing thoughts and content. Social network analysis is the visualization of complex and large quantities of data to ensure that the overall picture appears. It is the understanding, development, quantitative and qualitative analysis of the relations in the social networks of Graph theory. Social networks are expressed in the form of nodes and edges. Nodes are people/organizations, and edges are relationships between nodes. Relations are directional, non-directional, weighted, and weightless. The purpose of this study is to examine the effects of social networks on the evaluation of person data with spatial coordinates. For this, the cluster size and the effect on the geographical area of the circle where the placements of the individual are influenced by the frequently used placeholder feature in the social networks have been studied.

  4. A window on emergent European social network analysis

    OpenAIRE

    Cronin, Bruce

    2011-01-01

    This paper introduces the collection of papers in this issue, providing context in the recent development of social network analysis in Europe and the catalytic contributions of the Essex University Summer School and latterly the UK Social Networks Association. While these organisations have provided important focuses for social network analysis in the UK their reach has been much broader, principally among graduate students across Europe and the emergent research agenda they are forging. Fiv...

  5. Methodologies and techniques for analysis of network flow data

    Energy Technology Data Exchange (ETDEWEB)

    Bobyshev, A.; Grigoriev, M.; /Fermilab

    2004-12-01

    Network flow data gathered at the border routers and core switches is used at Fermilab for statistical analysis of traffic patterns, passive network monitoring, and estimation of network performance characteristics. Flow data is also a critical tool in the investigation of computer security incidents. Development and enhancement of flow based tools is an on-going effort. This paper describes the most recent developments in flow analysis at Fermilab.

  6. Sharing feelings online: studying emotional well-being via automated text analysis of Facebook posts

    OpenAIRE

    Settanni, Michele; Marengo, Davide

    2015-01-01

    Digital traces of activity on social network sites represent a vast source of ecological data with potential connections with individual behavioral and psychological characteristics. The present study investigates the relationship between user-generated textual content shared on Facebook and emotional well-being. Self-report measures of depression, anxiety, and stress were collected from 201 adult Facebook users from North Italy. Emotion-related textual indicators, including emoticon use, wer...

  7. Node Identification Using Inter-Regional Correlation Analysis for Mapping Detailed Connections in Resting State Networks

    Directory of Open Access Journals (Sweden)

    Yong Jeong

    2017-05-01

    Full Text Available Brain function is often characterized by the connections and interactions between highly interconnected brain regions. Pathological disruptions in these networks often result in brain dysfunction, which manifests as brain disease. Typical analysis investigates disruptions in network connectivity based correlations between large brain regions. To obtain a more detailed description of disruptions in network connectivity, we propose a new method where functional nodes are identified in each region based on their maximum connectivity to another brain region in a given network. Since this method provides a unique approach to identifying functionally relevant nodes in a given network, we can provide a more detailed map of brain connectivity and determine new measures of network connectivity. We applied this method to resting state fMRI of Alzheimer's disease patients to validate our method and found decreased connectivity within the default mode network. In addition, new measure of network connectivity revealed a more detailed description of how the network connections deteriorate with disease progression. This suggests that analysis using key relative network hub regions based on regional correlation can be used to detect detailed changes in resting state network connectivity.

  8. District heating and cooling systems for communities through power plant retrofit and distribution network. Final report. Volume I. Text

    Energy Technology Data Exchange (ETDEWEB)

    None

    1979-09-15

    An analysis was performed investigating the potential of retrofitting Detroit Edison's Conners Creek power plant to supply district heating and cooling to an area surrounding the plant and within the City of Detroit. A detailed analysis was made of the types and ages of the buildings in the service area as a basis for establishing loads. The analysis of the power plant established possible modifications to the turbines to serve the load in the area. Based upon the service area data and plant retrofit schemes, a distribution system was developed incrementally over a 20-y period. An economic analysis of the system was performed to provide cash flows and payback periods for a variety of energy costs, system costs, and escalation rates to determine the economic viability of the system analyzed. The legal and regulatory requirements required of the district heating and cooling system owner in Michigan were also analyzed to determine what conditions must be met to own and operate the system.

  9. Centrality measures in temporal networks with time series analysis

    Science.gov (United States)

    Huang, Qiangjuan; Zhao, Chengli; Zhang, Xue; Wang, Xiaojie; Yi, Dongyun

    2017-05-01

    The study of identifying important nodes in networks has a wide application in different fields. However, the current researches are mostly based on static or aggregated networks. Recently, the increasing attention to networks with time-varying structure promotes the study of node centrality in temporal networks. In this paper, we define a supra-evolution matrix to depict the temporal network structure. With using of the time series analysis, the relationships between different time layers can be learned automatically. Based on the special form of the supra-evolution matrix, the eigenvector centrality calculating problem is turned into the calculation of eigenvectors of several low-dimensional matrices through iteration, which effectively reduces the computational complexity. Experiments are carried out on two real-world temporal networks, Enron email communication network and DBLP co-authorship network, the results of which show that our method is more efficient at discovering the important nodes than the common aggregating method.

  10. The reconstruction and analysis of tissue specific human metabolic networks.

    Science.gov (United States)

    Hao, Tong; Ma, Hong-Wu; Zhao, Xue-Ming; Goryanin, Igor

    2012-02-01

    Human tissues have distinct biological functions. Many proteins/enzymes are known to be expressed only in specific tissues and therefore the metabolic networks in various tissues are different. Though high quality global human metabolic networks and metabolic networks for certain tissues such as liver have already been studied, a systematic study of tissue specific metabolic networks for all main tissues is still missing. In this work, we reconstruct the tissue specific metabolic networks for 15 main tissues in human based on the previously reconstructed Edinburgh Human Metabolic Network (EHMN). The tissue information is firstly obtained for enzymes from Human Protein Reference Database (HPRD) and UniprotKB databases and transfers to reactions through the enzyme-reaction relationships in EHMN. As our knowledge of tissue distribution of proteins is still very limited, we replenish the tissue information of the metabolic network based on network connectivity analysis and thorough examination of the literature. Finally, about 80% of proteins and reactions in EHMN are determined to be in at least one of the 15 tissues. To validate the quality of the tissue specific network, the brain specific metabolic network is taken as an example for functional module analysis and the results reveal that the function of the brain metabolic network is closely related with its function as the centre of the human nervous system. The tissue specific human metabolic networks are available at .

  11. Exploratory social network analysis with Pajek. - 2nd ed.

    NARCIS (Netherlands)

    de Nooy, W.; Mrvar, A.; Batagelj, V.

    2011-01-01

    This is an extensively revised and expanded second edition of the successful textbook on social network analysis integrating theory, applications, and network analysis using Pajek. The main structural concepts and their applications in social research are introduced with exercises. Pajek software

  12. Efficient health care service delivery using network analysis: a case ...

    African Journals Online (AJOL)

    Efficient health care service delivery using network analysis: a case study of Kwara State, Nigeria. ... Ethiopian Journal of Environmental Studies and Management ... This paper addresses challenges with prompt health care delivery using Network Analysis of Critical Path Model (CPM) to plan the hospital capacity with a ...

  13. A Social Network Analysis of Occupational Segregation

    OpenAIRE

    Buhai, Sebastian; van der Leij, Marco

    2006-01-01

    We develop a social network model of occupational segregation between different social groups, generated by the existence of positive inbreeding bias among individuals from the same group. If network referrals are important in getting a job, then expected inbreeding bias in the contact network structure induces different career choices for individuals from different social groups. This further translates into stable occupational segregation equilibria in the labour market. We derive the condi...

  14. Stories of change: the text analysis of handovers in an Italian psychiatric residential care home.

    Science.gov (United States)

    Accordini, M; Saita, E; Irtelli, F; Buratti, M; Savuto, G

    2017-05-01

    two decades. Method Emotional text analysis (ETA) was used to analyse the MHWs' handovers completed from 1990 to 2011. Results The analysis generated four clusters and three main factors illustrating the change in the MHWs' representations of the residential care home and its occupants. The factors showed: (1) the shift from an individualistic, problem-focused view to an inclusive, community-based approach; (2) the presence of a descriptive as well as a specialized language; and (3) the presence of a double focus: on patients and professionals. Conclusions Handovers transcripts document the following changes: (1) a shift from a symptom-based to a recovery-oriented approach; (2) a modification of the MHWs values towards an holistic view of the patient; (3) a growing importance assigned to accountability, services integration and teamwork. The paper shows that handovers can be used diachronically to document organizational change. © 2017 John Wiley & Sons Ltd.

  15. Traffic characteristics analysis in optical burst switching networks with optical label processing

    Directory of Open Access Journals (Sweden)

    Edson Moschim

    2007-03-01

    Full Text Available An analysis is carried out with burst-switching optical networks which use label processing consisting of orthogonal optical codes (OOC, considering traffic characteristics such as length/duration and arrival rate of bursts. Main results show that the use of OOC label processing influences on the decrease of burst loss probability, especially for short-lived bursts. Therefore, short bursts that would be blocked in conventional electronic processing networks are transmitted when the OOC label processing is used. Thus, an increase in the network use occurs as well as a decrease in the burst transmission latency, reaching a granularity close to packets networks.

  16. Exploring Social Meaning in Online Bilingual Text through Social Network Analysis

    Science.gov (United States)

    2015-09-01

    p. 1). 30 GATE development began in 1995. As techniques for natural language processing ( NLP ) are investigated by the research community and...become part of the NLP repetoire, developers incorporate them with wrappers, which allow the output from GATE processes to be recognized as input by...University NEE Named Entity Extraction NLP natural language processing OSD Office of the Secretary of Defense POS parts of speech SBIR Small Business

  17. The Analysis of SARDANA HPON Networks Using the HPON Network Configurator

    Directory of Open Access Journals (Sweden)

    Rastislav Roka

    2013-01-01

    Full Text Available NG-PON systems present optical access infrastructures to support various applications of the many service providers. In the near future, we can expect NG-PON technologies with different motivations for developing of HPON networks. The HPON is a hybrid passive optical network in a way that utilizes on a physical layer both TDM and WDM multiplexing principles together. The HPON network utilizes similar or soft revised topologies as TDM-PON architectures. In this second paper, requirements for the SARDANA HPON networks are introduced. A main part of the paper is dedicated to presentation of the HPON network configurator that allows configurating and analyzing the SARDANA HPON characteristics from a viewpoint of various specific network parameters. Finally, a short introduction to the comparison of the SARDANA and SUCCESS HPON networks based on simulation results is presented.

  18. The Analysis of SUCCESS HPON Networks Using the HPON Network Configurator

    Directory of Open Access Journals (Sweden)

    Rastislav Roka

    2013-01-01

    Full Text Available NG-PON systems present optical access infrastructures to support various applications of the many service providers. In the near future, we can expect NG-PON technologies with different motivations for developing of HPON networks. The HPON is a hybrid passive optical network in a way that utilizes on a physical layer both TDM and WDM multiplexing principles together. The HPON network utilizes similar or soft revised topologies as TDM-PON architectures. In this first paper, design requirements for SUCCESS HPON networks are introduced. A main part of the paper is dedicated to presentation of the HPON network configurator that allows configurating and analyzing the SUCCESS HPON characteristics from a viewpoint of various specific network parameters. Finally, a short introduction to the comparison of the SUCCESS and SARDANA HPON networks based on simulation results is presented.

  19. Healthy Aging and Concerns Among Elderly Japanese: A Text Analysis Approach.

    Science.gov (United States)

    Tsuchiya, Yoko; Shida, Naoki; Tsujiuchi, Takuya; Machida, Kazuhiko

    2015-01-01

    Japan is facing an unprecedented aging society. In 2013, 25.1% of the total population in Japan was 65 years old and over. One third of the population in Japan will be at least 65 years old in 2035; healthy aging is crucial for public health and society in Japan. Under the budget limitations of social security, policies and frequent policy changes have created great uncertainty and concern for the elderly population. Given these circumstances, we conducted questionnaire surveys in 2010 to examine concerns in this age-group. In 2010, we sent questionnaires to university graduates 65 years old and older, randomly selected from a list of an alumni association of 11 universities. The questionnaires were open-ended and asked them to write any concerns that they had about health care, health policy, health systems, and their future. We received 344 responses. Among those who responded, 271 (78.8%) respondents said that they had concerns. We conducted a text analysis (Trend Search-Keyword Associator 2008) and extracted the keywords from their responses. The keywords that were extracted frequently included hospitals, doctors, health-care system, health care, Japanese government policies, government, medical insurance system for the elderly, support, increase, copayment, health (their own), scarcities, and burdens. In this study, many elderly people in Japan are concerned about health-care expenditures, health-care systems, and health policies. This may be caused by frequent health policy changes and uncertainty due to frequent administration changes such as the lack of clarity concerning raising the out of pocket payment rate from 10% to 20% for elderly people under budget constraints in Japan. Correct policy making and determination to eliminate the concerns from this vulnerable population in Japan are necessary for healthy aging. © The Author(s) 2015 Reprints and permissions: sagepub.co.uk/journalsPermissions.nav.

  20. Frequency and content analysis of chronic fatigue syndrome in medical text books.

    Science.gov (United States)

    Jason, Leonard A; Paavola, Erin; Porter, Nicole; Morello, Morgan L

    2010-01-01

    Text books are a cornerstone in the training of medical staff and students, and they are an important source of references and reviews for these professionals. The objective of this study was to determine both the quantity and quality of chronic fatigue syndrome (CFS) information included in medical texts. After reviewing 119 medical text books from various medical specialties, we found that 48 (40.3%) of the medical text books included information on CFS. However, among the 129 527 total pages within these medical text books, the CFS content was presented on only 116.3 (0.090%) pages. Other illnesses that are less prevalent, such as multiple sclerosis and Lyme disease, were more frequently represented in medical text books. These findings suggest that the topic ofCFS is underreported in published medical text books.

  1. Analysis of friendship network from MMORPG based data

    OpenAIRE

    Črnigoj, Dean

    2016-01-01

    This work analyzes friendship network from a Massively Multiplayer Online Role-Playing Game (MMORPG). The network is based on data from a private server that was active from 2007 until 2011. The work conducts a standard analysis of the network and then divides players according to different groups based on their activity. Work checks how friendship network can be correlated to the clan (a self-organized group of players who often form a league and play on the same side in a match) network. Ma...

  2. Applying temporal network analysis to the venture capital market

    Science.gov (United States)

    Zhang, Xin; Feng, Ling; Zhu, Rongqian; Stanley, H. Eugene

    2015-10-01

    Using complex network theory to study the investment relationships of venture capital firms has produced a number of significant results. However, previous studies have often neglected the temporal properties of those relationships, which in real-world scenarios play a pivotal role. Here we examine the time-evolving dynamics of venture capital investment in China by constructing temporal networks to represent (i) investment relationships between venture capital firms and portfolio companies and (ii) the syndication ties between venture capital investors. The evolution of the networks exhibits rich variations in centrality, connectivity and local topology. We demonstrate that a temporal network approach provides a dynamic and comprehensive analysis of real-world networks.

  3. Dynamical Graph Theory Networks Methods for the Analysis of Sparse Functional Connectivity Networks and for Determining Pinning Observability in Brain Networks

    Directory of Open Access Journals (Sweden)

    Anke Meyer-Bäse

    2017-10-01

    Full Text Available Neuroimaging in combination with graph theory has been successful in analyzing the functional connectome. However almost all analysis are performed based on static graph theory. The derived quantitative graph measures can only describe a snap shot of the disease over time. Neurodegenerative disease evolution is poorly understood and treatment strategies are consequently only of limited efficiency. Fusing modern dynamic graph network theory techniques and modeling strategies at different time scales with pinning observability of complex brain networks will lay the foundation for a transformational paradigm in neurodegnerative diseases research regarding disease evolution at the patient level, treatment response evaluation and revealing some central mechanism in a network that drives alterations in these diseases. We model and analyze brain networks as two-time scale sparse dynamic graph networks with hubs (clusters representing the fast sub-system and the interconnections between hubs the slow sub-system. Alterations in brain function as seen in dementia can be dynamically modeled by determining the clusters in which disturbance inputs have entered and the impact they have on the large-scale dementia dynamic system. Observing a small fraction of specific nodes in dementia networks such that the others can be recovered is accomplished by the novel concept of pinning observability. In addition, how to control this complex network seems to be crucial in understanding the progressive abnormal neural circuits in many neurodegenerative diseases. Detecting the controlling regions in the networks, which serve as key nodes to control the aberrant dynamics of the networks to a desired state and thus influence the progressive abnormal behavior, will have a huge impact in understanding and developing therapeutic solutions and also will provide useful information about the trajectory of the disease. In this paper, we present the theoretical framework and

  4. Publishing Patterns in BRIC Countries: A Network Analysis

    Directory of Open Access Journals (Sweden)

    Miguel R. Guevara

    2016-07-01

    Full Text Available How similar are the publishing patterns of among Brazil, Russia, India and China (BRIC countries in comparison with other countries? This is a question that we addressed by using networks as a tool to analyze the structure of similarities and disparities between countries. We analyzed the number of publications from 2006 to 2015 that are reported by SCImago Journal and Country Rank. With this information, we created a network in order to find the closest countries to BRIC ones, and also to find communities of similar countries favoring data analysis. We found that Brazil, China and Russia are not that close to the core cluster of countries that are more diversified. In opposition, India is closer to a community of countries that are more diverse in terms of publishing patterns. Furthermore, we found that, for different network topologies, Brazil acts as a bridge to connect developing countries and that Russia practices patterns that tend to isolate it from most of the countries.

  5. Vulnerability Analysis of Urban Drainage Systems: Tree vs. Loop Networks

    Directory of Open Access Journals (Sweden)

    Chi Zhang

    2017-03-01

    Full Text Available Vulnerability analysis of urban drainage networks plays an important role in urban flood management. This study analyzes and compares the vulnerability of tree and loop systems under various rainfall events to structural failure represented by pipe blockage. Different pipe blockage scenarios, in which one of the pipes in an urban drainage network is assumed to be blocked individually, are constructed and their impacts on the network are simulated under different storm events. Furthermore, a vulnerability index is defined to measure the vulnerability of the drainage systems before and after the implementation of adaptation measures. The results obtained indicate that the tree systems have a relatively larger proportion of critical hydraulic pipes than the loop systems, thus the vulnerability of tree systems is substantially greater than that of the loop systems. Furthermore, the vulnerability index of tree systems is reduced after they are converted into a loop system with the implementation of adaptation measures. This paper provides an insight into the differences in the vulnerability of tree and loop systems, and provides more evidence for development of adaptation measures (e.g., tanks to reduce urban flooding.

  6. Dimensionality reduction using Principal Component Analysis for network intrusion detection

    Directory of Open Access Journals (Sweden)

    K. Keerthi Vasan

    2016-09-01

    Full Text Available Intrusion detection is the identification of malicious activities in a given network by analyzing its traffic. Data mining techniques used for this analysis study the traffic traces and identify hostile flows in the traffic. Dimensionality reduction in data mining focuses on representing data with minimum number of dimensions such that its properties are not lost and hence reducing the underlying complexity in processing the data. Principal Component Analysis (PCA is one of the prominent dimensionality reduction techniques widely used in network traffic analysis. In this paper, we focus on the efficiency of PCA for intrusion detection and determine its Reduction Ratio (RR, ideal number of Principal Components needed for intrusion detection and the impact of noisy data on PCA. We carried out experiments with PCA using various classifier algorithms on two benchmark datasets namely, KDD CUP and UNB ISCX. Experiments show that the first 10 Principal Components are effective for classification. The classification accuracy for 10 Principal Components is about 99.7% and 98.8%, nearly same as the accuracy obtained using original 41 features for KDD and 28 features for ISCX, respectively.

  7. Dynamical Networks for Smog Pattern Analysis

    CERN Document Server

    Zong, Linqi; Zhu, Jia

    2015-01-01

    Smog, as a form of air pollution, poses as a serious problem to the environment, health, and economy of the world[1-4] . Previous studies on smog mostly focused on the components and the effects of smog [5-10]. However, as the smog happens with increased frequency and duration, the smog pattern which is critical for smog forecast and control, is rarely investigated, mainly due to the complexity of the components, the causes, and the spreading processes of smog. Here we report the first analysis on smog pattern applying the model of dynamical networks with spontaneous recovery. We show that many phenomena such as the sudden outbreak and dissipation of smog and the long duration smog can be revealed with the mathematical mechanism under a random walk simulation. We present real-world air quality index data in accord with the predictions of the model. Also we found that compared to external causes such as pollution spreading from nearby, internal causes such as industrial pollution and vehicle emission generated...

  8. Fractal and multifractal analysis of complex networks: Estonian network of payments

    Science.gov (United States)

    Rendón de la Torre, Stephanie; Kalda, Jaan; Kitt, Robert; Engelbrecht, Jüri

    2017-12-01

    Complex networks have gained much attention from different areas of knowledge in recent years. Particularly, the structures and dynamics of such systems have attracted considerable interest. Complex networks may have characteristics of multifractality. In this study, we analyze fractal and multifractal properties of a novel network: the large scale economic network of payments of Estonia, where companies are represented by nodes and the payments done between companies are represented by links. We present a fractal scaling analysis and examine the multifractal behavior of this network by using a sandbox algorithm. Our results indicate the existence of multifractality in this network and consequently, the existence of multifractality in the Estonian economy. To the best of our knowledge, this is the first study that analyzes multifractality of a complex network of payments.

  9. A Social Network Analysis of Occupational Segregation

    NARCIS (Netherlands)

    I.S. Buhai (Sebastian); M.J. van der Leij (Marco)

    2006-01-01

    textabstractThis paper proposes a simple social network model of occupational segregation, generated by the existence of inbreeding bias among individuals of the same social group. If network referrals are important in getting a job, then expected inbreeding bias in the social structure results in

  10. Analysis and study on text representation to improve the accuracy of the Normalized Compression Distance

    CERN Document Server

    Granados, Ana

    2012-01-01

    The huge amount of information stored in text form makes methods that deal with texts really interesting. This thesis focuses on dealing with texts using compression distances. More specifically, the thesis takes a small step towards understanding both the nature of texts and the nature of compression distances. Broadly speaking, the way in which this is done is exploring the effects that several distortion techniques have on one of the most successful distances in the family of compression distances, the Normalized Compression Distance -NCD-.

  11. Stability Analysis of Neural Networks-Based System Identification

    Directory of Open Access Journals (Sweden)

    Talel Korkobi

    2008-01-01

    Full Text Available This paper treats some problems related to nonlinear systems identification. A stability analysis neural network model for identifying nonlinear dynamic systems is presented. A constrained adaptive stable backpropagation updating law is presented and used in the proposed identification approach. The proposed backpropagation training algorithm is modified to obtain an adaptive learning rate guarantying convergence stability. The proposed learning rule is the backpropagation algorithm under the condition that the learning rate belongs to a specified range defining the stability domain. Satisfying such condition, unstable phenomena during the learning process are avoided. A Lyapunov analysis leads to the computation of the expression of a convenient adaptive learning rate verifying the convergence stability criteria. Finally, the elaborated training algorithm is applied in several simulations. The results confirm the effectiveness of the CSBP algorithm.

  12. Formal Food-related Networks in Ireland: A Case Study Analysis

    Directory of Open Access Journals (Sweden)

    Maeve Henchion

    2012-03-01

    Full Text Available  Strategic networking is of crucial importance for innovation in small and medium sized enterprises (SMEs as it enables these companies access external resources and overcome internal constraints. However, SMEs often lack the skills and competencies to engage in and benefit from networks. Consequently SMEs often fail in establishing strategic and efficient networks. To date, there is limited guidance available on the optimal design of such networks. Furthermore, limited guidance is available on the number of networks, and level of engagement therein, that companies should be involved with. Using case studies across a range of formal networks within the food sector in Ireland, insights into the success factors and barriers to network learning are presented, which provide a foundation for such guidelines. Three case studies were selected for analysis in Ireland. Up to ten in-depth interviews were scheduled with the network managers and key informants from the triple helix (i.e. policy, research and industry sectors within each formal network. Initially, interviewees were identified as a result of a review of secondary sources and personal knowledge of the authors. The snowball sampling technique was then employed to identify additional interviewees within each network. The findings from this study revealed that some formal networks had a strong institutional influence, including significant financial inputs, whilst others had bottom-up origins. Many networks had strong levels of interaction prior to formalisation, which provided solid trust-based foundations. Innovation and/or learning were not the expressed objectives of all networks at the outset. However, interviewees across all three networks felt that positive impacts had been achieved in these areas. Whilst being involved in a broad network can provide access to a wider range of ideas, these case studies suggest that being involved in a smaller, dense network, with high levels of IP

  13. "Us and them": a social network analysis of physicians' professional networks and their attitudes towards EBM.

    Science.gov (United States)

    Mascia, Daniele; Cicchetti, Americo; Damiani, Gianfranco

    2013-10-22

    Extant research suggests that there is a strong social component to Evidence-Based Medicine (EBM) adoption since professional networks amongst physicians are strongly associated with their attitudes towards EBM. Despite this evidence, it is still unknown whether individual attitudes to use scientific evidence in clinical decision-making influence the position that physicians hold in their professional network. This paper explores how physicians' attitudes towards EBM is related to the network position they occupy within healthcare organizations. Data pertain to a sample of Italian physicians, whose professional network relationships, demographics and work-profile characteristics were collected. A social network analysis was performed to capture the structural importance of physicians in the collaboration network by the means of a core-periphery analysis and the computation of network centrality indicators. Then, regression analysis was used to test the association between the network position of individual clinicians and their attitudes towards EBM. Findings documented that the overall network structure is made up of a dense cohesive core of physicians and of less connected clinicians who occupy the periphery. A negative association between the physicians' attitudes towards EBM and the coreness they exhibited in the professional network was also found. Network centrality indicators confirmed these results documenting a negative association between physicians' propensity to use EBM and their structural importance in the professional network. Attitudes that physicians show towards EBM are related to the part (core or periphery) of the professional networks to which they belong as well as to their structural importance. By identifying virtuous attitudes and behaviors of professionals within their organizations, policymakers and executives may avoid marginalization and stimulate integration and continuity of care, both within and across the boundaries of healthcare

  14. Network performance analysis of the Limpopo TV white space (TVWS) trial network

    CSIR Research Space (South Africa)

    Masonta, MT

    2015-09-01

    Full Text Available the spectrum allocation is managed appropriately, SUs can co-exist on the same radio frequency (RF) spectrum band with licensed networks. This paper introduces the Limpopo TVWS trial network, which provides a point-to-point Internet connectivity to five rural...

  15. egoSlider: Visual Analysis of Egocentric Network Evolution.

    Science.gov (United States)

    Wu, Yanhong; Pitipornvivat, Naveen; Zhao, Jian; Yang, Sixiao; Huang, Guowei; Qu, Huamin

    2016-01-01

    Ego-network, which represents relationships between a specific individual, i.e., the ego, and people connected to it, i.e., alters, is a critical target to study in social network analysis. Evolutionary patterns of ego-networks along time provide huge insights to many domains such as sociology, anthropology, and psychology. However, the analysis of dynamic ego-networks remains challenging due to its complicated time-varying graph structures, for example: alters come and leave, ties grow stronger and fade away, and alter communities merge and split. Most of the existing dynamic graph visualization techniques mainly focus on topological changes of the entire network, which is not adequate for egocentric analytical tasks. In this paper, we present egoSlider, a visual analysis system for exploring and comparing dynamic ego-networks. egoSlider provides a holistic picture of the data through multiple interactively coordinated views, revealing ego-network evolutionary patterns at three different layers: a macroscopic level for summarizing the entire ego-network data, a mesoscopic level for overviewing specific individuals' ego-network evolutions, and a microscopic level for displaying detailed temporal information of egos and their alters. We demonstrate the effectiveness of egoSlider with a usage scenario with the DBLP publication records. Also, a controlled user study indicates that in general egoSlider outperforms a baseline visualization of dynamic networks for completing egocentric analytical tasks.

  16. An Approach to a Comprehensive Test Framework for Analysis and Evaluation of Text Line Segmentation Algorithms

    Directory of Open Access Journals (Sweden)

    Zoran N. Milivojevic

    2011-09-01

    Full Text Available The paper introduces a testing framework for the evaluation and validation of text line segmentation algorithms. Text line segmentation represents the key action for correct optical character recognition. Many of the tests for the evaluation of text line segmentation algorithms deal with text databases as reference templates. Because of the mismatch, the reliable testing framework is required. Hence, a new approach to a comprehensive experimental framework for the evaluation of text line segmentation algorithms is proposed. It consists of synthetic multi-like text samples and real handwritten text as well. Although the tests are mutually independent, the results are cross-linked. The proposed method can be used for different types of scripts and languages. Furthermore, two different procedures for the evaluation of algorithm efficiency based on the obtained error type classification are proposed. The first is based on the segmentation line error description, while the second one incorporates well-known signal detection theory. Each of them has different capabilities and convenience, but they can be used as supplements to make the evaluation process efficient. Overall the proposed procedure based on the segmentation line error description has some advantages, characterized by five measures that describe measurement procedures.

  17. Graphics in Children's Informational Texts: A Content Analysis

    Science.gov (United States)

    Fingeret, Lauren

    2012-01-01

    This dissertation is comprised of two manuscripts resulting from a single study, which examines a) the types of graphics that appear, and in what frequencies, in children's informational texts, and b) the defining features of different graphics. Graphics are ubiquitous in children's informational texts and a lot is known about the impact…

  18. An Analysis of the Text Complexity of Leveled Passages in Four Popular Classroom Reading Assessments

    Science.gov (United States)

    Toyama, Yukie; Hiebert, Elfrieda H.; Pearson, P. David

    2017-01-01

    This study investigated the complexity of leveled passages used in four classroom reading assessments. A total of 167 passages leveled for Grades 1-6 from these assessments were analyzed using four analytical tools of text complexity. More traditional, two-factor measures of text complexity found a general trend of fairly consistent across-grade…

  19. Assessing a Sport/Cultural Events Network: An Application of Social Network Analysis

    OpenAIRE

    Ziakas, V; Costa, CA

    2009-01-01

    The purpose of this study was to assess the complexity of a sport/cultural events network. To that intent, a social network analysis was conducted in a small community in the US. The study had three main objectives: (1) Examine relationships among organisations involved in planning and implementing sport and cultural events based on their communication, exchange of resources, and assistance; (2) Identify the most important actors within the events network and their relationships; (3) Investig...

  20. Social Network Analysis of a Supply Network Structural Investigation of the South Korean Automotive Industry

    OpenAIRE

    Kim, Jin-Baek

    2015-01-01

    Part 3: Knowledge Based Production Management; International audience; In this paper, we analyzed the structure of the South Korean automotive industry using social network analysis (SNA) metrics. Based on the data collected from 275 companies, a social network model of the supply network was constructed. Centrality measures in the SNA field were used to interpret the result and identify key companies. The results show that SNA metrics can be useful to understand the structure of a supply net...