Graph Mining Techniques for Networking Applications

Author(s):  
Charu C. Aggarwal ◽  
Eric Yu-En Lu

Computer networks are inherently graphical in structure, since they contain multiple geographically distributed nodes, which are connected by communication links. In many cases, such as large military networks, this also leads to a network-centric view of the data. This naturally leads to an information network representation of the data. In information networks, the nodes represent the different elements of information, and the links represent the logical relationships between them. An even higher layer of logical organization is a social network, in which the nodes correspond to the different entities in the network, and the links correspond to the interactions. The common element among the different kinds of networks which are encountered in practical network-centric representation of the data is that they can all be represented in the form of a structural graph. This structural behavior can be used in order to glean different kinds of practical insights. This chapter will provide an overview of these different graph mining techniques and their applications to the various kinds of networks.

Filomat ◽  
2017 ◽  
Vol 31 (5) ◽  
pp. 1423-1434 ◽  
Author(s):  
Sheng Wang ◽  
Min Chen

In this paper, we propose an iterative algorithm for finding the common element of solution set of a split equilibrium problem and common fixed point set of a finite family of asymptotically nonexpansive mappings in Hilbert space. The strong convergence of this algorithm is proved.


Author(s):  
Xiangbing Zhao ◽  
Jianhui Zhou

With the advent of the computer network era, people like to think in deeper ways and methods. In addition, the power information network is facing the problem of information leakage. The research of power information network intrusion detection is helpful to prevent the intrusion and attack of bad factors, ensure the safety of information, and protect state secrets and personal privacy. In this paper, through the NRIDS model and network data analysis method, based on deep learning and cloud computing, the demand analysis of the real-time intrusion detection system for the power information network is carried out. The advantages and disadvantages of this kind of message capture mechanism are compared, and then a high-speed article capture mechanism is designed based on the DPDK research. Since cloud computing and power information networks are the most commonly used tools and ways for us to obtain information in our daily lives, our lives will be difficult to carry out without cloud computing and power information networks, so we must do a good job to ensure the security of network information network intrusion detection and defense measures.


2012 ◽  
Vol 2012 ◽  
pp. 1-13
Author(s):  
Zi-Ming Wang

Equilibrium problem and fixed point problem are considered. A general iterative algorithm is introduced for finding a common element of the set of solutions to the equilibrium problem and the common set of fixed points of two weak relatively uniformly nonexpansive multivalued mappings. Furthermore, strong and weak convergence results for the common element in the two sets mentioned above are established in some Banach space.


2020 ◽  
Vol 4 (2) ◽  
pp. 279
Author(s):  
Evie Ariadne Shinta Dewi ◽  
Nindi Aristi ◽  
Rachmaniar Rachmaniar

This article is based on the results of research which the aim is to find out how is mapping of the education information dissemination network in the community of Cintaratu village, Pangandaran district. The reason for choosing the topic was that Padjadjaran University (Unpad) campus is in the village and it is assumed that the presence of the university in the village could improve the quality of education of its people. To confirm this assumption, it is necessary to map the education sector information network. We use qualitative methods which approach is a descriptive study, the researchers conducted a mapping of educational information dissemination. The main informants of this study are the community and village officials. Data were collected through in-depth interviews, passive participatory observation, and literature studies. The finding of the research are as follows, 1) the initial mapping of educational information dissemination to the community was carried out through direct communication, namely through two major activities - recitation and celebration; 2) recitation and celebration are two activities that are susceptible to physical noise-causing information related to education not conveyed properly to the public. Effective communication does not occur in these two activities. 


2017 ◽  
Vol 3 (2) ◽  
Author(s):  
Indra Yustian ◽  
Arum Setiawan ◽  
Doni Setiawan ◽  
Laila Hanum ◽  
Zulkifli Dahlan

Despite high attention and commitment of Indonesia in biodiversity conservation and its habitat, however, loss of biodiversity and habitat deforestation is also still high. Deforestation rate in Indonesia between period of 2000-2012 reach up 6.02 million ha, and approximately onethird of which is in Sumatra Island. As the fulfillment of CBD and Aichi targets, and in line with the mandate of the Law on the Conservation of Natural Resources and Ecosystems and IBSAP (Indonesian Biodiversity Strategy & Action Plan 2015-2020), we try to support the requires data as well as information on the current state of biodiversity. The aims are to develop an inventory system of biodiversity needed to establish baseline data on biodiversity including its conservation status in South Sumatra, develop a biodiversity monitoring system with qualitative parameters that can be used in the determination and monitoring of degradation rates of biodiversity, and the establishment of data management system and information network of fauna biodiversity in South Sumatera so that it can be utilized in monitoring and reporting of biodiversity at regional, national and international level at the international level. We conduct a comprehensive review of methods and techniques of inventory and monitoring of fauna biodiversity, especially those that have been done in the area of South Sumatra Province. We also analysis of data needs and information network of fauna biodiversity in South Sumatra. The results is shows in the web-application database, called the South Sumatran Biodiversity Information Networks, or SSBIN, and could preview at http://ssbin.unsri.ac.id/.Keywords: south sumatra, biodiversity, information, networks, SSBIN.


2017 ◽  
Vol 37 (4) ◽  
pp. 719-733 ◽  
Author(s):  
ALEJANDRO HORTAL

ABSTRACT This paper contextualizes Simon’s book, Administrative Behavior, within the evolution of his ideas arguing, contrary to what some have posited, that the common element that unites this book with the rest of Simon’s work is not the criticism of the classical approach, but an epistemological frame, based on an empirical methodology. This empiricism is the element that remained constant during his career and led him to introduce psychological factors when explaining the behavior of economic agents under his models of bounded and procedural rationality.


Author(s):  
Joseph T. Gilbert

What does ethics have to do with computer security in the new millennium? What, for that matter, did it have to do with computer security in the old millennium? To answer these two questions, we will start with a more fundamental question: what is ethics? In the first part of this chapter, we will briefly review ethics as a part of philosophy. We will examine three approaches that have been taken for hundreds of years as humans have tried to decide what is the right way to behave. We will then examine business ethics, which is an applied subset of the more general topic. Finally, we will explore specific issues which currently present themselves as matters of ethical concern in the world of computer security, and provide a framework for analyzing issues which have not yet presented themselves, but will do so at some future date. Is it ethical to lend a friend a set of discs which contain a three hundred dollar program that you have purchased, knowing that he intends to load the program onto his computer before returning the discs? Is it ethical to hack into computer systems, as long as you don’t disrupt or corrupt the systems? Is it ethical to monitor the e-mail of your employees? In order to answer these and a host of other questions, it is useful to think about the common element in all these questions: is it ethical?


2018 ◽  
Vol 7 (2.6) ◽  
pp. 293
Author(s):  
Sadhana Kodali ◽  
Madhavi Dabbiru ◽  
B Thirumala Rao

An Information Network is the network formed by the interconnectivity of the objects formed due to the interaction between them. In our day-to-day life we can find these information networks like the social media network, the network formed by the interaction of web objects etc. This paper presents a survey of various Data Mining techniques that can be applicable to information networks. The Data Mining techniques of both homogeneous and heterogeneous information networks are discussed in detail and a comparative study on each problem category is showcased.


1909 ◽  
Vol 2 (3) ◽  
pp. 277-309
Author(s):  
Benjamin Wisner Bacon

No passage of the Synoptic Gospels throws so much light upon Jesus’ sense of his own mission as that which deals with Knowing the Father and Being Known of Him in Mt. 11 25-27, Lk. 10 21-22. It belongs to the common element of Matthew and Luke unknown in Mark, and in the judgment of the great majority of critics must therefore be referred to a common source of high antiquity. In short, as respects attestation, its claims to authenticity are unexcelled. As respects content, it deals with the all-important matter of Jesus’ doctrine of divine sonship, and yet it seems to stand alone among Synoptic sayings, and to be paralleled only by utterances ascribed to Jesus by the fourth evangelist. But the Johannine discourses give every indication of having been composed by the evangelist himself in order to expound in dialogue form his own deutero-pauline Christology. The only instance in all Synoptic tradition of anything comparable to this apposition of “the Son…the Father,” is Mk. 13 32, Mt. 24 36.Of that day or that hour knoweth no one, not even the angels in heaven, neither the Son, but the Father.


Sign in / Sign up

Export Citation Format

Share Document