Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Singapore Management University (17)
- Selected Works (10)
- San Jose State University (7)
- TÜBİTAK (6)
- University at Albany, State University of New York (3)
-
- University for Business and Technology in Kosovo (3)
- Air Force Institute of Technology (2)
- Boise State University (2)
- China Simulation Federation (2)
- City University of New York (CUNY) (2)
- Edith Cowan University (2)
- Old Dominion University (2)
- SelectedWorks (2)
- Smith College (2)
- United Arab Emirates University (2)
- University of Kentucky (2)
- University of South Florida (2)
- Ursinus College (2)
- California Polytechnic State University, San Luis Obispo (1)
- Dakota State University (1)
- Embry-Riddle Aeronautical University (1)
- Illinois State University (1)
- Loyola University Chicago (1)
- Marquette University (1)
- Michigan Technological University (1)
- Northern Illinois University (1)
- Technological University Dublin (1)
- The University of Maine (1)
- University of Central Florida (1)
- University of Dayton (1)
- Publication Year
- Publication
-
- Research Collection School Of Computing and Information Systems (16)
- Turkish Journal of Electrical Engineering and Computer Sciences (6)
- Master's Projects (4)
- Faculty Publications (3)
- Legacy Theses & Dissertations (2009 - 2024) (3)
-
- UBT International Conference (3)
- Andrew G. West (2)
- Australian Information Security Management Conference (2)
- Computer Science Faculty Publications (2)
- David LO (2)
- Dissertations (2)
- Electronic Theses and Dissertations (2)
- Journal of System Simulation (2)
- Ole J Mengshoel (2)
- Professor Katina Michael (2)
- Statistical and Data Sciences: Faculty Publications (2)
- USF Tampa Graduate Theses and Dissertations (2)
- Boise State University Theses and Dissertations (1)
- Browse all Theses and Dissertations (1)
- Computer Science ETDs (1)
- Computer Science Faculty Publications and Presentations (1)
- Computer Science Faculty Research and Publications (1)
- Computer Science Honors Papers (1)
- Computer Science: Faculty Publications and Other Works (1)
- Conference papers (1)
- Department of Computer Science Publications (1)
- Dissertations and Theses Collection (Open Access) (1)
- Dissertations, Theses, and Capstone Projects (1)
- Electrical & Computer Engineering Faculty Publications (1)
- Engineering Management & Systems Engineering Faculty Publications (1)
- Publication Type
Articles 1 - 30 of 90
Full-Text Articles in Physical Sciences and Mathematics
Actionpoint: An App To Combat Cyberbullying Via The Strengthening Of Parent-Teen Relationships, Maddie Juarez, Natali Barragan, Deborah Hall, George K. Thiruvathukal, Yasin N. Silva
Actionpoint: An App To Combat Cyberbullying Via The Strengthening Of Parent-Teen Relationships, Maddie Juarez, Natali Barragan, Deborah Hall, George K. Thiruvathukal, Yasin N. Silva
Computer Science: Faculty Publications and Other Works
Due to the increased prevalence of cyberbullying and the detrimental impact it can have on adolescents, there is a critical need for tools to help combat cyberbullying. This paper introduces the ActionPoint app, a mobile application based on empirical work highlighting the importance of strong parent-teen relationships for reducing cyberbullying risk. The app is designed to help families improve their communication skills, set healthy boundaries for social media use, identify instances of cyberbullying and cyberbullying risk, and, ultimately, decrease the negative outcomes associated with cyberbullying. The app guides parents and teens through a series of interactive modules that engage them …
Understanding The Contribution Of Recommendation Algorithms On Misinformation Recommendation And Misinformation Dissemination On Social Networks, Royal Pathak, Francesca Spezzano, Maria Soledad Pera
Understanding The Contribution Of Recommendation Algorithms On Misinformation Recommendation And Misinformation Dissemination On Social Networks, Royal Pathak, Francesca Spezzano, Maria Soledad Pera
Computer Science Faculty Publications and Presentations
Social networks are a platform for individuals and organizations to connect with each other and inform, advertise, spread ideas, and ultimately influence opinions. These platforms have been known to propel misinformation. We argue that this could be compounded by the recommender algorithms that these platforms use to suggest items potentially of interest to their users, given the known biases and filter bubbles issues affecting recommender systems. While much has been studied about misinformation on social networks, the potential exacerbation that could result from recommender algorithms in this environment is in its infancy. In this manuscript, we present the result of …
The Locals Casino As A Social Network – Can An Interconnected Community Of Players Detect Differences In Hold?, Jason D. Fiege, Anastasia (Stasi) D. Baran
The Locals Casino As A Social Network – Can An Interconnected Community Of Players Detect Differences In Hold?, Jason D. Fiege, Anastasia (Stasi) D. Baran
International Conference on Gambling & Risk Taking
Abstract
It is difficult for individual players to detect differences in theoretical hold between slot machines without playing an unrealistically large number of games. This difficulty occurs because the fractional loss incurred by a player converges only slowly to the theoretical hold in the presence of volatility designed into slot pay tables. Nevertheless, many operators believe that players can detect changes in hold or differences compared to competition, especially in a locals casino market, and therefore resist increasing holds. Instead of investigating whether individual players can detect differences in hold, we ask whether a population of casino regulars who share …
Influence Level Prediction On Social Media Through Multi-Task And Sociolinguistic User Characteristics Modeling, Denys Katerenchuk
Influence Level Prediction On Social Media Through Multi-Task And Sociolinguistic User Characteristics Modeling, Denys Katerenchuk
Dissertations, Theses, and Capstone Projects
Prediction of a user’s influence level on social networks has attracted a lot of attention as human interactions move online. Influential users have the ability to influence others’ behavior to achieve their own agenda. As a result, predicting users’ level of influence online can help to understand social networks, forecast trends, prevent misinformation, etc. The research on user influence in social networks has attracted much attention across multiple disciplines, from social sciences to mathematics, yet it is still not well understood. One of the difficulties is that the definition of influence is specific to a particular problem or a domain, …
Jlootbox: An Agent-Based Model Of Social Influence And Gambling In Online Video Games, Lila Zayed
Jlootbox: An Agent-Based Model Of Social Influence And Gambling In Online Video Games, Lila Zayed
Honors Capstones
Loot boxes are digital treasure chests that players spend real money to purchase, wherein the contents are randomly generated. Since players spend money on the pretense they might receive something valuable, many comparisons have been drawn to gambling behavior as the reward is up to chance. To explore this phenomenon, agent-based modeling will be used to simulate this behavior. Agent-based modeling allows us to create heterogenous agents who follow simple rules so that we may observe emergent behavior in a population. An agent-based model was created using Repast Simphony for this end.
Parameters included the player’s internal decision strategy around …
Codis: Community Detection Via Distributed Seed-Set Expansion On Graph Streams, Austin Anderson
Codis: Community Detection Via Distributed Seed-Set Expansion On Graph Streams, Austin Anderson
Master's Projects
Community detection has been and remains a very important topic in several fields. From marketing and social networking to biological studies, community detec- tion plays a key role in advancing research in many different fields. Research on this topic originally looked at classifying nodes into discrete communities, but eventually moved forward to placing nodes in multiple communities. Unfortunately, community detection has always been a time-inefficient process, and recent data sets have been simply to large to realistically process using traditional methods. Because of this, recent methods have turned to parallelism, but all these methods, while offering sig- nificant decrease in …
Privacy Concerns With Using Public Data For Suicide Risk Prediction Algorithms: A Public Opinion Survey Of Contextual Appropriateness, Michael Zimmer, Sarah Logan
Privacy Concerns With Using Public Data For Suicide Risk Prediction Algorithms: A Public Opinion Survey Of Contextual Appropriateness, Michael Zimmer, Sarah Logan
Computer Science Faculty Research and Publications
Purpose
Existing algorithms for predicting suicide risk rely solely on data from electronic health records, but such models could be improved through the incorporation of publicly available socioeconomic data – such as financial, legal, life event and sociodemographic data. The purpose of this study is to understand the complex ethical and privacy implications of incorporating sociodemographic data within the health context. This paper presents results from a survey exploring what the general public’s knowledge and concerns are about such publicly available data and the appropriateness of using it in suicide risk prediction algorithms.
Design/methodology/approach
A survey was developed to measure …
Exploring Cyberterrorism, Topic Models And Social Networks Of Jihadists Dark Web Forums: A Computational Social Science Approach, Vivian Fiona Guetler
Exploring Cyberterrorism, Topic Models And Social Networks Of Jihadists Dark Web Forums: A Computational Social Science Approach, Vivian Fiona Guetler
Graduate Theses, Dissertations, and Problem Reports
This three-article dissertation focuses on cyber-related topics on terrorist groups, specifically Jihadists’ use of technology, the application of natural language processing, and social networks in analyzing text data derived from terrorists' Dark Web forums. The first article explores cybercrime and cyberterrorism. As technology progresses, it facilitates new forms of behavior, including tech-related crimes known as cybercrime and cyberterrorism. In this article, I provide an analysis of the problems of cybercrime and cyberterrorism within the field of criminology by reviewing existing literature focusing on (a) the issues in defining terrorism, cybercrime, and cyberterrorism, (b) ways that cybercriminals commit a crime in …
Exploring The Impact Of Social Influence Mechanisms And Network Density On Societal Polarization, Justin Mittereder
Exploring The Impact Of Social Influence Mechanisms And Network Density On Societal Polarization, Justin Mittereder
Student Research Submissions
I present an agent-based model, inspired by the opinion dynamics
(OD) literature, to explore the underlying behaviors that may induce
societal polarization. My agents interact on a social network, in which
adjacent nodes can influence each other, and each agent holds an array
of continuous opinion values (on a 0-1 scale) on a number of separate
issues. I use three measures as a proxy for the virtual society’s “po-
larization:” the average assortativity of the graph with respect to the
agents’ opinions, the number of non-uniform issues, and the number
of distinct opinion buckets in which agents have the same …
Modeling Real And Fake News Sharing In Social Networks, Abishai Joy
Modeling Real And Fake News Sharing In Social Networks, Abishai Joy
Boise State University Theses and Dissertations
Online media is changing the traditional news industry and diminishing the role of journalists, newspapers, and even news channels. This in turn is enhancing the ability of fake news to influence public opinion on important topics. The threat of fake news is quite imminent, as it allows malicious users to share their agenda with a larger audience. Major social media platforms like Twitter, Facebook, etc., are making it easy to spread fake news due to the minimal moderation/ fact-checking on these platforms.
This work aims at predicting fake and real news sharing in social media. Specifically, we employ a multi-level …
Thinking Spatial, Mohamed F. Mokbel
Thinking Spatial, Mohamed F. Mokbel
Journal of Spatial Information Science
The systems community in both academia and industry has tremendous success in building widely used general purpose systems for various types of data and applications. Examples include database systems, big data systems, data streaming systems, and machine learning systems. The vast majority of these systems are ill equipped in terms of supporting spatial data. The main reason is that system builders mostly think of spatial data as just one more type of data. Any spatial support can be considered as an afterthought problem that can be supported via on-top functions or spatial cartridges that can be added to the already …
Overlapping Community Detection In Social Networks, Akshar Panchal
Overlapping Community Detection In Social Networks, Akshar Panchal
Master's Projects
Social networking sites are important to connect with the world virtually. As the number of users accessing these sites increase, the data and information keeps on increasing. There are communities and groups which are formed virtually based on different factors. We can visualize these communities as networks of users or nodes and the relationships or connections between them as edges. This helps in evaluating and analyzing different factors that influence community formation in such a dense network. Community detection helps in revealing certain characteristics which makes these groups in the network unique and different from one another. We can use …
Negative Influence Minimization Algorithm For Social Networks, Yang Yi, Chunxiao Wu, He Ming, Zhou Bo
Negative Influence Minimization Algorithm For Social Networks, Yang Yi, Chunxiao Wu, He Ming, Zhou Bo
Journal of System Simulation
Abstract: While positive information is spreading in social networks, there is still a large amount of negative information spreading in the network. Aiming at the fact that there is few researches on suppressing the spread of negative information, a negative influence minimization algorithm for social networks is proposed. When negative information appears in social networks and some initial nodes are infected, the behavior of nodes propagating information depends on its coordination game with neighbor nodes. The objective function with minimal influence is used to find the K optimal blocking nodes, and finally the size of the final infected node is …
Matters Of Biocybersecurity With Consideration To Propaganda Outlets And Biological Agents, Xavier-Lewis Palmer, Ernestine Powell, Lucas Potter, Thaddeus Eze (Ed.), Lee Speakman (Ed.), Cyril Onwubiko (Ed.)
Matters Of Biocybersecurity With Consideration To Propaganda Outlets And Biological Agents, Xavier-Lewis Palmer, Ernestine Powell, Lucas Potter, Thaddeus Eze (Ed.), Lee Speakman (Ed.), Cyril Onwubiko (Ed.)
Electrical & Computer Engineering Faculty Publications
The modern era holds vast modalities in human data utilization. Within Biocybersecurity (BCS), categories of biological information, especially medical information transmitted online, can be viewed as pathways to destabilize organizations. Therefore, analysis of how the public, along with medical providers, process such data, and the methods by which false information, particularly propaganda, can be used to upset the flow of verified information to populations of medical professionals, is important for maintenance of public health. Herein, we discuss some interplay of BCS within the scope of propaganda and considerations for navigating the field.
Bots And Humans On Social Media, Lale Madahali
Bots And Humans On Social Media, Lale Madahali
Interdisciplinary Informatics Faculty Proceedings & Presentations
Social networks are an important part of today’s life. They are used for entertainment, getting the news, advertisements, and branding for businesses and individuals alike. Research shows that automated accounts, also known as bots, contribute to the content spread on social media allowing the the environment pollution and public opinion manipulation. This research aims at investigating bots’ behavior on Twitter and examine how different and similar they are compared to humans. I will investigate their underlying network, whether it is an information network or social network. In the second step, I attempt to answer whether they follow the structure of …
Data Mining Of Chinese Social Networks: Factors That Indicate Post Deletion, Meisam Navaki Arefi
Data Mining Of Chinese Social Networks: Factors That Indicate Post Deletion, Meisam Navaki Arefi
Computer Science ETDs
Widespread Chinese social media applications such as Sina Weibo (Chinese Twitter), the most popular social network in China, are widely known for monitoring and deleting posts to conform to Chinese government requirements. Censorship of Chinese social media is a complex process that involves many factors. There are multiple stakeholders and many different interests: economic, political, legal, personal, etc., which means that there is not a single strategy dictated by a single government authority. Moreover, sometimes Chinese social media do not follow the directives of government, out of concern that they are more strictly censoring than their competitors.
One crucial question …
“Distance Learning” In The Ninth Century?: Micro-Cluster Analysis Of The Epistolary Network Of Alcuin After 796, William James Mattingly
“Distance Learning” In The Ninth Century?: Micro-Cluster Analysis Of The Epistolary Network Of Alcuin After 796, William James Mattingly
Theses and Dissertations--History
Scholars of eighth- and ninth-century education have assumed that intellectuals did not write works of Scriptural interpretation until that intellectual had a firm foundation in the seven liberal arts.This ensured that anyone who embarked on work of Scriptural interpretation would have the required knowledge and methods to read and interpret Scripture correctly. The potential for theological error and the transmission of those errors was too great unless the interpreter had the requisite training. This dissertation employs computistical methods, specifically the techniques of social network mapping and cluster analysis, to study closely the correspondence of Alcuin, a late-eighth- and early-ninth-century scholar …
Disaster Damage Categorization Applying Satellite Images And Machine Learning Algorithm, Farinaz Sabz Ali Pour, Adrian Gheorghe
Disaster Damage Categorization Applying Satellite Images And Machine Learning Algorithm, Farinaz Sabz Ali Pour, Adrian Gheorghe
Engineering Management & Systems Engineering Faculty Publications
Special information has a significant role in disaster management. Land cover mapping can detect short- and long-term changes and monitor the vulnerable habitats. It is an effective evaluation to be included in the disaster management system to protect the conservation areas. The critical visual and statistical information presented to the decision-makers can help in mitigation or adaption before crossing a threshold. This paper aims to contribute in the academic and the practice aspects by offering a potential solution to enhance the disaster data source effectiveness. The key research question that the authors try to answer in this paper is how …
Wrinkles In Time : An Exploration Of Non-Uniform Temporal Resolution In Network Data, Daniel John Ditursi
Wrinkles In Time : An Exploration Of Non-Uniform Temporal Resolution In Network Data, Daniel John Ditursi
Legacy Theses & Dissertations (2009 - 2024)
The continued proliferation of timestamped network data demands increasing sophistication in the analysis of that data. In particular, the literature amply demonstrates that the choice of temporal resolution has a profound impact on the solutions produced by many different methods in this domain -- answers differ when data is viewed second-by-second as opposed to week-by-week. Additionally, research also shows quite clearly that the rates at which network events happen are not constant -- some times are "faster" or "slower" than others, and these variations are not necessarily predictable. Given the above, it is clear that there must be problem settings …
Influence Spread In Two-Layer Interdependent Networks: Designed Single-Layer Or Random Two-Layer Initial Spreaders?, Hana Khamfroush, Nathaniel Hudson, Samuel Iloo, Mahshid R. Naeini
Influence Spread In Two-Layer Interdependent Networks: Designed Single-Layer Or Random Two-Layer Initial Spreaders?, Hana Khamfroush, Nathaniel Hudson, Samuel Iloo, Mahshid R. Naeini
Computer Science Faculty Publications
Influence spread in multi-layer interdependent networks (M-IDN) has been studied in the last few years; however, prior works mostly focused on the spread that is initiated in a single layer of an M-IDN. In real world scenarios, influence spread can happen concurrently among many or all components making up the topology of an M-IDN. This paper investigates the effectiveness of different influence spread strategies in M-IDNs by providing a comprehensive analysis of the time evolution of influence propagation given different initial spreader strategies. For this study we consider a two-layer interdependent network and a general probabilistic threshold influence spread model …
Simulating Epidemics And Interventions On High Resolution Social Networks, Christopher E. Siu
Simulating Epidemics And Interventions On High Resolution Social Networks, Christopher E. Siu
Master's Theses
Mathematical models of disease spreading are a key factor of ensuring that we are prepared to deal with the next epidemic. They allow us to predict how an infection will spread throughout a population, thereby allowing us to make intelligent choices when attempting to contain the disease. Whether due to a lack of empirical data, a lack of computational power, a lack of biological understanding, or some combination thereof, traditional models must make sweeping assumptions about the behavior of a population during an epidemic.
In this thesis, we implement granular epidemic simulations using a rich social network constructed from real-world …
Tsar : A System For Defending Hate Speech Detection Models Against Adversaries, Brian Tuan Khieu
Tsar : A System For Defending Hate Speech Detection Models Against Adversaries, Brian Tuan Khieu
Master's Projects
Although current state-of-the-art hate speech detection models achieve praiseworthy results, these models have shown themselves to be vulnerable to attack. Easy to execute lexical manipulations such as the removal of whitespace from a given text create significant issues for word-based hate speech detection models. In this paper, we reproduce the results of five cutting edge models as well as four significant evasion schemes from prior work. Only a limited amount of evasion schemes that also maintain readability exists, and this works to our advantage in the recreation of the original data. Furthermore, we demonstrate that each lexical attack or evasion …
Community Detection Via Neighborhood Overlap And Spanning Tree Computations, Ketki Kulkarni, Aris Pagourtzis, Katerina Potika, Petros Potikas, Dora Souliou
Community Detection Via Neighborhood Overlap And Spanning Tree Computations, Ketki Kulkarni, Aris Pagourtzis, Katerina Potika, Petros Potikas, Dora Souliou
Faculty Publications, Computer Science
Most social networks of today are populated with several millions of active users, while the most popular of them accommodate way more than one billion. Analyzing such huge complex networks has become particularly demanding in computational terms. A task of paramount importance for understanding the structure of social networks as well as of many other real-world systems is to identify communities, that is, sets of nodes that are more densely connected to each other than to other nodes of the network. In this paper we propose two algorithms for community detection in networks, by employing the neighborhood overlap metric …
De-Anonymyzing Scale-Free Social Networks By Using Spectrum Partitioning Method, Qi Sun, Jiguo Yu, Honglu Jiang, Yixian Chen, Xiuzhen Cheng
De-Anonymyzing Scale-Free Social Networks By Using Spectrum Partitioning Method, Qi Sun, Jiguo Yu, Honglu Jiang, Yixian Chen, Xiuzhen Cheng
Department of Computer Science Publications
Social network data is widely shared, forwarded and published to third parties, which led to the risks of privacy disclosure. Even thought the network provider always perturbs the data before publishing it, attackers can still recover anonymous data according to the collected auxiliary information. In this paper, we transform the problem of de-anonymization into node matching problem in graph, and the de-anonymization method can reduce the number of nodes to be matched at each time. In addition, we use spectrum partitioning method to divide the social graph into disjoint subgraphs, and it can effectively be applied to large-scale social networks …
Trust Model And Simulation Of E-Commerce Based On Social Networks, Yu Zhen, Zhu Jie, Guicheng Shen
Trust Model And Simulation Of E-Commerce Based On Social Networks, Yu Zhen, Zhu Jie, Guicheng Shen
Journal of System Simulation
Abstract: In the current e-commerce industry, users need to check for the historical evaluation of the commodity before buying goods mostly, but false recommendations and massive redundancy recommendation problem which widely exists at present seriously affect the effectiveness and accuracy of users’ obtaining recommendations. For getting trust in e-commerce transactions, an e-commerce trust model SNTrust based on social networks is proposed. In SNTrust model, each user maintains a trusted social network set; a topological structure of the user information diffusion in the social network is described in the model, and the recommendation node trust is introduced to measure its credibility, …
Cidf: A Clustering-Based Interaction-Driven Friending Algorithm For The Next-Generation Social Networks, Aadil Alshammari, Abdelmounaam Rezgui
Cidf: A Clustering-Based Interaction-Driven Friending Algorithm For The Next-Generation Social Networks, Aadil Alshammari, Abdelmounaam Rezgui
Faculty Publications - Information Technology
Online social networks, such as Facebook, have been massively growing over the past decade. Recommender algorithms are a key factor that contributes to the success of social networks. These algorithms, such as friendship recommendation algorithms, are used to suggest connections within social networks. Current friending algorithms are built to generate new friendship recommendations that are most likely to be accepted. Yet, most of them are weak connections as they do not lead to any interactions. Facebook is well known for its Friends-of-Friends approach which recommends familiar people. This approach has a higher acceptance rate but the strength of the connections, …
Securing Modern Cyberspace Using A Multi-Faceted Approach, Yu Li
Securing Modern Cyberspace Using A Multi-Faceted Approach, Yu Li
Browse all Theses and Dissertations
Security has become one of the most significant concerns for our cyberspace. Securing the cyberspace, however, becomes increasingly challenging. This can be attributed to the rapidly growing diversities and complexity of the modern cyberspace. Specifically, it is not any more dominated by connected personal computers (PCs); instead, it is greatly characterized by cyber-physical systems (CPS), embedded systems, dynamic services, and human-computer interactions. Securing modern cyberspace therefore calls for a multi-faceted approach capable of systematically integrating these emerging characteristics. This dissertation presents our novel and significant solutions towards this direction. Specifically, we have devised automated, systematic security solutions to three critical …
Privacy Issues In Post Dissemination On Facebook, Burcu Sayi̇n Günel, Serap Şahi̇n, Dimitris G. Kogias, Charalampos Z. Patrikakis
Privacy Issues In Post Dissemination On Facebook, Burcu Sayi̇n Günel, Serap Şahi̇n, Dimitris G. Kogias, Charalampos Z. Patrikakis
Turkish Journal of Electrical Engineering and Computer Sciences
With social networks (SNs) being populated by a still increasing numbers of people who take advantage of the communication and collaboration capabilities that they offer, the probability of the exposure of people's personal moments to a wider than expected audience is also increasing. By studying the functionalities and characteristics that modern SNs offer, along with the people's habits and common behaviors in them, it is easy to understand that several privacy risks may exist, many of which people may be unaware of. In this paper, we focus on users' interactions with posts in a social network (SN), using Facebook as …
Community Detection In Complex Networks Using A New Agglomerative Approach, Majid Arasteh, Somayeh Alizadeh
Community Detection In Complex Networks Using A New Agglomerative Approach, Majid Arasteh, Somayeh Alizadeh
Turkish Journal of Electrical Engineering and Computer Sciences
Complex networks are used for the representation of complex systems such as social networks. Graph analysis comprises various tools such as community detection algorithms to uncover hidden data. Community detection aims to detect similar subgroups of networks that have tight interconnections with each other while, there is a sparse connection among different subgroups. In this paper, a greedy and agglomerative approach is proposed to detect communities. The proposed method is fast and often detects high-quality communities. The suggested method has several steps. In the first step, each node is assigned to a separated community. In the second step, a vertex …
Understanding Attribute And Social Circle Correlation In Social Networks, Pranav Nerurkar, Madhav Chandane, Sunil Bhirud
Understanding Attribute And Social Circle Correlation In Social Networks, Pranav Nerurkar, Madhav Chandane, Sunil Bhirud
Turkish Journal of Electrical Engineering and Computer Sciences
Social circles, groups, lists, etc. are functionalities that allow users of online social network (OSN) platforms to manually organize their social media contacts. However, this facility provided by OSNs has not received appreciation from users due to the tedious nature of the task of organizing the ones that are only contacted periodically. In view of the numerous benefits of this functionality, it may be advantageous to investigate measures that lead to enhancements in its efficacy by allowing for automatic creation of customized groups of users (social circles, groups, lists, etc). The field of study for this purpose, i.e. creating coarse-grained …