Introduction to DiNA: An Extendable Web-application for Directed Network Analysis

Author(s):  
Máté Széll ◽  
Miklós Becsei ◽  
Gergely Kocsis
Author(s):  
Joshua A. Adkinson ◽  
Bharat Karumuri ◽  
Timothy N. Hutson ◽  
Rui Liu ◽  
Omar Alamoudi ◽  
...  

2020 ◽  
Vol 144 ◽  
pp. 66-75
Author(s):  
Georg Summer ◽  
Annika R. Kuhn ◽  
Chantal Munts ◽  
Daniela Miranda-Silva ◽  
Adelino F. Leite-Moreira ◽  
...  

Author(s):  
Rebecca Ramb ◽  
Michael Eichler ◽  
Alex Ing ◽  
Marco Thiel ◽  
Cornelius Weiller ◽  
...  

In the analysis of neuroscience data, the identification of task-related causal relationships between various areas of the brain gives insights about the network of physiological pathways that are active during the task. One increasingly used approach to identify causal connectivity uses the concept of Granger causality that exploits predictability of activity in one region by past activity in other regions of the brain. Owing to the complexity of the data, selecting components for the analysis of causality as a preprocessing step has to be performed. This includes predetermined—and often arbitrary—exclusion of information. Therefore, the system is confounded by latent sources. In this paper, the effect of latent confounders is demonstrated, and paths of influence among three components are studied. While methods for analysing Granger causality are commonly based on linear vector autoregressive models, the effects of latent confounders are expected to be present also in nonlinear systems. Therefore, all analyses are also performed for a simulated nonlinear system and discussed with regard to applications in neuroscience.


2014 ◽  
Vol 56 (2) ◽  
pp. 105-112 ◽  
Author(s):  
Michał Brach ◽  
Dariusz Górski

Abstract The issue of sustainable tourism within valuable natural areas has been extensively discussed ever since the emergence of sustainable development philosophy in the 1990s. In view of growing public interest in nature recreation and tourism development, the importance of addressing this subject matter has hitherto increased significantly. The main objective of the present paper was to offer a tool for supporting development and promotion of sustainable tourism in Poland’s forests managed by the State Forests - National Forest Holding. GIS technology, and specific tools for network analysis were used in the project. During task realization, only free and open software sources were used. The work was performed based on the example of the Forest District Żołędowo (Regional Directorate of State Forests in Toruń, Poland) with the use of District’s spatial data resources. A web application was created to present information about tourist attractions and infrastructure on an interactive map with tools for route planning. As a result, there has been developed the web mapping application which provides general access to tourism related information and enables planning touristic routes by pre-specified criteria. Implemented routing algorithms can help traffic management and further protection of the areas vulnerable to anthropogenic pressures. The system created not only promotes attractive tourist sites but also, supports targeting tourist traffic, and accordingly - adds to the progress of sustainable tourism


Stroke ◽  
2021 ◽  
Vol 52 (Suppl_1) ◽  
Author(s):  
Tom Sather ◽  
Anna Livera

Introduction: Among the many negative consequences of aphasia is an altered social network. Social network analysis supports an objective, quantitative evaluation of social networks among individuals with aphasia along with potential impacts of social programming and interventions on an individual’s social network. Social network analysis may also support better understanding of the impact of Covid on individuals with aphasia. Aims: This pilot evaluation utilized social network analysis via R to evaluate the social network characteristics of a community-based aphasia network across a 12-month pre-Covid period. Social network aphasia group data for a standard duration of time pre- and post-Covid were also compared to identify potential social implications of Covid in a population already at higher risk for reduced social interactions. This presentation will also provide fundamental concepts relevant to social network analysis for those interested in pursuing such analysis in further depth. Methods: Twelve months of pre-Covid aphasia group program attendance data were examined using the visNetwork R package. An additional six months of Covid-era time frame data were also analyzed.The primary relationship function of “ a attended b” (where a = individual participant and b = event/setting) was used in the analysis. Multiple social network characteristics were analyzed and displayed including node, edgeness, directionality, weight, and centrality indices across individuals with aphasia, care partners and community members and settings. Results and Conclusions: Network analysis reveals a directed network graph with primarily unidirectional relationships. There is an emergence of several aphasia group participant behavior types, both pre- and post-Covid, relevant for future planning including: communities of individuals who have similar behaviors in terms of type of event attendance; key individuals who are "heavy users" of various services in terms of frequency and breadth of event attendance; and peripheral users who use only one service. Post-Covid social network implications are discussed including supports to mitigate negative impacts of Covid on social network composition.


This chapter discusses different essential ethical hacking tools developed by various researchers in detail. Tools discussed here include Netcat network analysis tool, Macof from Dsniff suit toolset for DOS attack, Yersinia for dhcp starvation attack, Dnsspoof tool for MITM attacks, Ettercap for network-based attacks, Cain and Abel, Sslstrip tool, and SEToolkit. These tools are used for carrying out DOS attack, DHCP starvation attack, DNS spoofing attack, session hijacking attacks, social engineering attacks, and many other network-based attacks. Also, the detailed steps to configure WAMP server as part of ethical hacking lab setup is also discussed in this chapter in order to simulate web application-based attacks. There are large numbers of ethical hacking tools developed by the researchers working in this domain for computer security, network security, and web server security. This chapter discusses some of the essential tools in detail.


Sign in / Sign up

Export Citation Format

Share Document