Network mining and analysis for social applications

Author(s):  
Feida Zhu ◽  
Huan Sun ◽  
Xifeng Yan
2016 ◽  
Vol 200 (6) ◽  
pp. 1203-1220
Author(s):  
David Cohen ◽  
Sylvie Viaux ◽  
Catherine Saint-georges ◽  
Chloé Leclère ◽  
Mohamed Chétouani ◽  
...  

2016 ◽  
Vol 6 (2) ◽  
Author(s):  
David E. Scharff

Enrique Pichon-Rivière, a pioneer of psychoanalysis, worked and wrote in Argentina in the mid-twentieth century, but his work has not so far been translated into English. From the beginning, Pichon-Rivière understood the social applications of analytic thinking, centring his ideas on "el vinculo", which is generally translated as "the link", but could equally be translated as "the bond". The concept that each individual is born into human social links, is shaped by them, and simultaneously contributes to them inextricably ties people's inner worlds to the social world of family and society in which they live. Pichon-Rivière believed, therefore, that family analysis and group and institutional applications of analysis were as important as individual psychoanalysis. Many of the original family and couple therapists from whom our field learned trained with him. Because his work was centred in the analytic writings of Fairbairn and Klein, as well as those of the anthropologist George Herbert Mead and the field theory of Kurt Lewin, his original ideas have important things to teach us today. This article summarises some of his central ideas such as the link, spiral process, the single determinate illness, and the process of therapy.


2021 ◽  
Vol 27 (3) ◽  
pp. 32-36
Author(s):  
Judith Donath

Though today we think of the web and social media as nearly synonymous, the technology of the early web made social interaction difficult. The author discusses her work creating some of the web's earliest social applications and asks why our interfaces for seeing and communicating with each other online are still so primitive.


Author(s):  
Andrea Calì ◽  
Stefano Capuzzi ◽  
Mirko Michele Dimartino ◽  
Riccardo Frosini

2016 ◽  
Vol 2016 ◽  
pp. 1-12 ◽  
Author(s):  
Wei Jiang ◽  
Ruijin Wang ◽  
Zhiyuan Xu ◽  
Yaodong Huang ◽  
Shuo Chang ◽  
...  

The fast developing social network is a double-edged sword. It remains a serious problem to provide users with excellent mobile social network services as well as protecting privacy data. Most popular social applications utilize behavior of users to build connection with people having similar behavior, thus improving user experience. However, many users do not want to share their certain behavioral information to the recommendation system. In this paper, we aim to design a secure friend recommendation system based on the user behavior, called PRUB. The system proposed aims at achieving fine-grained recommendation to friends who share some same characteristics without exposing the actual user behavior. We utilized the anonymous data from a Chinese ISP, which records the user browsing behavior, for 3 months to test our system. The experiment result shows that our system can achieve a remarkable recommendation goal and, at the same time, protect the privacy of the user behavior information.


2017 ◽  
Vol 117 (10) ◽  
pp. 2417-2430 ◽  
Author(s):  
Juhwan Kim ◽  
Sunghae Jun ◽  
Dong-Sik Jang ◽  
Sangsung Park

Purpose Patent contains vast information on developed technologies because of the patent system. So, it is important to analyze patent data for understanding technologies. Most previous studies on patent analysis were focused on the technology itself. Their research results lacked the consideration of products. But the patent analysis based on products is crucial for company because a company grows by sales of competitive products. The purpose of this paper is to propose a novel methodology of patent analysis for product-based technology. This study contributes to the product development strategy of a company. Design/methodology/approach The primary goal for developing technology is to release a new product. So it is important to analyze the technology based on the product. In this study, the authors analyze Apple’s technologies based in iPod, iPhone, and iPad. In addition, the authors propose a new methodology to analyze product-based technology. The authors call this an integrated social network mining (ISNM). In the ISNM, the authors carry out a social network analysis (SNA) according to each product of Apple, and integrate all SNA results of iPod, iPhone, and iPad using the technological keywords. Findings In this case study, the authors analyze Apple’s technologies according to Apple’s innovative products, such as the iPod, iPhone, and iPad. From the ISNM results of Apple’s technology, the authors can find which technological detail is more important in overall structure of Apple’s technologies. Practical implications This study contributes to the management of technology including new product development, technological innovation, and research and development planning. To know the technological relationship between whole technologies based on products can be the source of intensification of technological competitiveness. Originality/value Most of studies on technology analysis were focused on patent technology itself. Though one of their research goals was to develop new product, they had their limits considering the products because they did not use the technology information in the technology analysis. The originality of this research is to use the product information in technology analysis using the proposed ISNM.


2015 ◽  
Vol 2015 ◽  
pp. 1-18 ◽  
Author(s):  
Na Yu ◽  
Qi Han

Sensor-equipped mobile devices have allowed users to participate in various social networking services. We focus on proximity-based mobile social networking environments where users can share information obtained from different places via their mobile devices when they are in proximity. Since people are more likely to share information if they can benefit from the sharing or if they think the information is of interest to others, there might exist community structures where users who share information more often are grouped together. Communities in proximity-based mobile networks represent social groups where connections are built when people are in proximity. We consider information influence (i.e., specify who shares information with whom) as the connection and the space and time related to the shared information as the contexts. To model the potential information influences, we construct an influence graph by integrating the space and time contexts into the proximity-based contacts of mobile users. Further, we propose a two-phase strategy to detect and track context-aware communities based on the influence graph and show how the context-aware community structure improves the performance of two types of mobile social applications.


Algorithms ◽  
2021 ◽  
Vol 14 (10) ◽  
pp. 290
Author(s):  
Kai Ma ◽  
Ming-Jun Nie ◽  
Sen Lin ◽  
Jianlei Kong ◽  
Cheng-Cai Yang ◽  
...  

Accurate identification of insect pests is the key to improve crop yield and ensure quality and safety. However, under the influence of environmental conditions, the same kind of pests show obvious differences in intraclass representation, while the different kinds of pests show slight similarities. The traditional methods have been difficult to deal with fine-grained identification of pests, and their practical deployment is low. In order to solve this problem, this paper uses a variety of equipment terminals in the agricultural Internet of Things to obtain a large number of pest images and proposes a fine-grained identification model of pests based on probability fusion network FPNT. This model designs a fine-grained feature extractor based on an optimized CSPNet backbone network, mining different levels of local feature expression that can distinguish subtle differences. After the integration of the NetVLAD aggregation layer, the gated probability fusion layer gives full play to the advantages of information complementarity and confidence coupling of multi-model fusion. The comparison test shows that the PFNT model has an average recognition accuracy of 93.18% for all kinds of pests, and its performance is better than other deep-learning methods, with the average processing time drop to 61 ms, which can meet the needs of fine-grained image recognition of pests in the Internet of Things in agricultural and forestry practice, and provide technical application reference for intelligent early warning and prevention of pests.


Author(s):  
Juan Jara ◽  
Florian Daniel ◽  
Fabio Casati ◽  
Maurizio Marchese

Sign in / Sign up

Export Citation Format

Share Document