scholarly journals Network Structure of Intercity Trips by Chinese Residents under Different Travel Modes: A Case Study of the Spring Festival Travel Rush

Complexity ◽  
2021 ◽  
Vol 2021 ◽  
pp. 1-19
Author(s):  
Rong Zhang ◽  
Jinghu Pan ◽  
Jianbo Lai

With the advent of big data, the use of network data to characterize travel has gradually become a trend. Tencent Migration big data can fully, dynamically, immediately, and visually record the trajectories of population migrations with location-based service technology. Here, the daily population flow data of 346 cities during the Spring Festival travel rush in China were combined with different travel modes to measure the spatial structure and spatial patterns of an intercity trip network of Chinese residents. These data were then used for a comprehensive depiction of the complex relationships between the population flows of cities. The results showed that there were obvious differences in the characteristics of urban networks from the perspective of different modes of travel. The intercity flow of aviation trips showed a core-periphery structure with national hub cities as the core distribution. Trips by train showed a core-periphery structure with cities along the national railway artery as the core. This gradually decreased toward hinterland cities. Moreover, the intercity flow of highway trips indicated a spatial pattern of strong local aggregation that matched the population scale.

Author(s):  
León Darío Parra ◽  
Milenka Linneth Argote Cusi

Modern society generates about 7 Zetabytes each year, of which 75% comes from the connectivity of individuals to social networks. In this regard, the chapter presents a case study of the application of big data technologies for entrepreneurial analysis using global entrepreneurship monitor (GEM) data as a new tool of analysis. Therefore, the core of this chapter is to present the methodology that was used to develop and implement the big data app of GEM as well as the main results of project. On the other hand, the chapter remarks the advantages and disadvantages of this kind of technology for the case of GEM data. Finally, it presents the respective dashboards that interrelate the gem data with Word Bank indicators as a case study of the application of big data for entrepreneurship research.


2019 ◽  
Vol 12 (2) ◽  
pp. 131-156 ◽  
Author(s):  
Päivikki Kuoppakangas ◽  
Tony Kinder ◽  
Jari Stenvall ◽  
Ilpo Laitinen ◽  
Olli-Pekka Ruuskanen ◽  
...  

AbstractThis study examines public organisations planning big data-driven transformations in their service provision. Without radical structural change or managerial system changes, leaders face dilemmas: simply bolting on big data makes little difference. This study is based on a qualitative empirical case study using data collected from the cities of Helsinki and Tampere in Finland. The three core dilemma pairs detected and connected to the big data-related organisational changes are: (1) repetitive continuity vs. visionary change, (2) risk-taking vs. security-seeking and (3) technology-based development vs. human-based development. This study suggests that organisational readiness involves not only capabilities; instead, readiness involves absorbing knowledge, making decisions, handling ambiguities, managing dilemmas. Thus, big data-related transformations in public organisations require embracing the world of dilemmas, since selected and cancelled experiments may each have valuable outcomes. The capability to act on intentions is a prerequisite for readiness; however, a preparedness to detect and address dilemmas is central to big data-related transformations. Thus, the ability to make dilemma decisions is a more complicated characteristic of readiness. In conclusion, our data analysis suggests that traditional public organisational and chance management approaches produce unsolved dilemmas in big data-related organisational changes.


2012 ◽  
Vol 6 (1-3) ◽  
pp. 309-329
Author(s):  
Claudia V. Camp

I propose that the notion of possession adds an important ideological nuance to the analyses of iconic books set forth by Martin Marty (1980) and, more recently, by James Watts (2006). Using the early second century BCE book of Sirach as a case study, I tease out some of the symbolic dynamics through which the Bible achieved iconic status in the first place, that is, the conditions in which significance was attached to its material, finite shape. For Ben Sira, this symbolism was deeply tied to his honor-shame ethos in which women posed a threat to the honor of his eternal name, a threat resolved through his possession of Torah figured as the Woman Wisdom. What my analysis suggests is that the conflicted perceptions of gender in Ben Sira’s text is fundamental to his appropriation of, and attempt to produce, authoritative religious literature, and thus essential for understanding his relationship to this emerging canon. Torah, conceived as female, was the core of this canon, but Ben Sira adds his own literary production to this female “body” (or feminized corpus, if you will), becoming the voice of both through the experience of perfect possession.


Author(s):  
Andrew Bednarski ◽  
Gemma Tully

Epigraphers and archaeologists working in Egypt must navigate a host of complex relationships both on and off site. This chapter explores the multifaceted nature of local Egyptian peoples’ relationships with nearby monuments through the lens of a single case study: the site of Sheikh Abd al-Qurna and its local population, the Qurnawi. Egyptologists have not traditionally sought to incorporate formally the stories and histories of local populations in their studies of pharaonic sites. An increasing blend of social awareness and the desire for social action on the part of both foreign professionals and local activists, however, is pushing Egyptologists to re-evaluate their practices, which, in turn, is moving the discipline in new and positive directions.


2020 ◽  
pp. 095792652097721
Author(s):  
Janaina Negreiros Persson

In this article, we explore how the discourses around gender are evolving at the core of Brazilian politics. Our focus lies on the discourses at the public hearing on the bill 3.492/19, which aimed at including “gender ideology” on the list of heinous crimes. We aim to identify the deputies’ linguistic representation of social actors as pertaining to in- and outgroups. In addition, the article analyzes through Critical Discourse Analysis how the terminology gender is represented in this particular hearing. The analysis shows how some of the conservative parliamentarians give a clearly negative meaning to the term gender, by labeling it “gender ideology” and additionally connecting it with heinous crimes. We propose that the re-signification of “gender ideology,” from rhetorical invention to heinous crime, is not only an attempt to undermine scientific gender studies but also a way for conservative deputies to gain more political power.


2021 ◽  
Vol 7 (12) ◽  
pp. eabc9800
Author(s):  
Ryan J. Gallagher ◽  
Jean-Gabriel Young ◽  
Brooke Foucault Welles

Core-periphery structure, the arrangement of a network into a dense core and sparse periphery, is a versatile descriptor of various social, biological, and technological networks. In practice, different core-periphery algorithms are often applied interchangeably despite the fact that they can yield inconsistent descriptions of core-periphery structure. For example, two of the most widely used algorithms, the k-cores decomposition and the classic two-block model of Borgatti and Everett, extract fundamentally different structures: The latter partitions a network into a binary hub-and-spoke layout, while the former divides it into a layered hierarchy. We introduce a core-periphery typology to clarify these differences, along with Bayesian stochastic block modeling techniques to classify networks in accordance with this typology. Empirically, we find a rich diversity of core-periphery structure among networks. Through a detailed case study, we demonstrate the importance of acknowledging this diversity and situating networks within the core-periphery typology when conducting domain-specific analyses.


Sign in / Sign up

Export Citation Format

Share Document