This is the very first presentation I've made in a international conference. It surely has errors, but it was an inspiring work for me anyway.
I still work with visualization :)
This document summarizes a presentation on social network analysis and visualization. It discusses key concepts like nodes, edges, degree, centrality, and clustering. It also describes a case study that analyzed the Twitter followers of @VTCodeCamp to identify communities. The presentation demonstrated tools for network analysis (Gephi) and visualization (Gephi, Tulip) and discussed relevant data resources and formats (GEXF).
This document provides an overview and comparison of different email programs and services, including Outlook Express, Thunderbird, Opera M2Client, and web-based services like Gmail and Hotmail. It discusses the basic features and configuration of email, including addressing, attachments, addressing books, and etiquette. Issues like spam and privacy related to web-based services are also covered.
Electronic mail, or email, is a method for creating, transmitting, and storing text-based communications over digital systems. Email works by having a client send a message to a mail server via SMTP, which examines the address and helps deliver it like a post office. An email consists of a header with sender, recipient, subject, and time information, a message body for the content, and an optional signature. The header, body, and signature make up the basic parts of an email message.
1. The document discusses completing basic email tasks using MSN Hotmail and exploring its options page.
2. The options page on MSN Hotmail provides helpful explanations and links to manage accounts, customize settings, and address other common user issues.
3. Having an organized options page that explains functions in simple terms is useful for users with different skill levels and needs.
Tutorial 2 - Basic Communication on the Internet: Emaildpd
The document discusses email and how it works. It describes how email is sent and received through servers and protocols like SMTP, POP, and IMAP. It also covers common email features like addresses, headers, signatures, and attachments. Finally, it discusses configuring and using email clients like Outlook Express and Windows Mail to send, receive, and manage emails.
Electronic mail (email) allows digital messages to be exchanged between an author and recipients. An email message consists of a header, body, and can include attachments. Email was originally designed for 7-bit ASCII text but now supports different character sets and attachments through standards like MIME. While initially used for personal communication, email was widely adopted by businesses for its simplicity and ability to solve communication logistics and synchronization issues. Potential problems with email include information overload, attachment size limits, spam, viruses, and privacy concerns.
This document summarizes a presentation on social network analysis and visualization. It discusses key concepts like nodes, edges, degree, centrality, and clustering. It also describes a case study that analyzed the Twitter followers of @VTCodeCamp to identify communities. The presentation demonstrated tools for network analysis (Gephi) and visualization (Gephi, Tulip) and discussed relevant data resources and formats (GEXF).
This document provides an overview and comparison of different email programs and services, including Outlook Express, Thunderbird, Opera M2Client, and web-based services like Gmail and Hotmail. It discusses the basic features and configuration of email, including addressing, attachments, addressing books, and etiquette. Issues like spam and privacy related to web-based services are also covered.
Electronic mail, or email, is a method for creating, transmitting, and storing text-based communications over digital systems. Email works by having a client send a message to a mail server via SMTP, which examines the address and helps deliver it like a post office. An email consists of a header with sender, recipient, subject, and time information, a message body for the content, and an optional signature. The header, body, and signature make up the basic parts of an email message.
1. The document discusses completing basic email tasks using MSN Hotmail and exploring its options page.
2. The options page on MSN Hotmail provides helpful explanations and links to manage accounts, customize settings, and address other common user issues.
3. Having an organized options page that explains functions in simple terms is useful for users with different skill levels and needs.
Tutorial 2 - Basic Communication on the Internet: Emaildpd
The document discusses email and how it works. It describes how email is sent and received through servers and protocols like SMTP, POP, and IMAP. It also covers common email features like addresses, headers, signatures, and attachments. Finally, it discusses configuring and using email clients like Outlook Express and Windows Mail to send, receive, and manage emails.
Electronic mail (email) allows digital messages to be exchanged between an author and recipients. An email message consists of a header, body, and can include attachments. Email was originally designed for 7-bit ASCII text but now supports different character sets and attachments through standards like MIME. While initially used for personal communication, email was widely adopted by businesses for its simplicity and ability to solve communication logistics and synchronization issues. Potential problems with email include information overload, attachment size limits, spam, viruses, and privacy concerns.
Electronic mail : Introduction, drafting effective email, email etiquettesDinesh Sharma
This document discusses email formatting, drafting effective emails, and email etiquette. It explains that email uses a store-and-forward model and contains a heading, salutation, body, closing, and signature. The heading includes date, from, to, subject, bcc, and cc fields. The body describes the central topic. Closings and signatures follow conventional formats. When drafting emails, the writer should identify the problem, analyze the audience, determine scope, outline main points, organize, and revise. Email etiquette includes checking email daily, maintaining accuracy and formality, ensuring readability, and using an appropriate tone.
This document provides instructions on how to use email effectively. It discusses sending, receiving, and organizing emails. Key points include:
- Using folders like Inbox, Sent, Deleted, and Drafts to organize emails
- Features of emails like Cc, Bcc, subject, importance, and adding contacts
- Sending copies to multiple people saves time
- Explaining what Cc and Bcc mean and when to use each
- The importance of including a meaningful subject line
- Setting importance levels for urgent emails
- Adding contacts to save time remembering email addresses
- Keeping your inbox tidy by deleting emails
- Attaching documents and pictures to emails
- Being careful when opening attachments from
A New Architecture for Email Knowledge Extraction dannyijwest
The Semantic Web was designed to represent the enormous data that is existing on the World Wide Web in
a machine readable format. The research shows the long period of time that was spent on the Emails for
communication and information exchange. Adding the semantics to the existing Email systems could not
only provide for the valuable usage of time and resources, but also refreshes the meaning of Email
communication. The presented research work examines the ontology extraction process from the Email
systems adopting scalable pattern rules that is based on the extracted techniques. The proposed
architecture is designed to handle the unstructured Emails and the ontologies that are extracted from the
Email which is divided into four main components as follows: the Ontology Learning Component, the
Management Component, the Semantic Email Component and the Client Side Plugin.
The document discusses email and groupware. It defines email as electronic messages sent over a network between users. Groupware refers to collaborative software that allows dispersed teams to work together synchronously or asynchronously. The document outlines various email providers, how to create an email account, potential email threats, examples of groupware products like Microsoft Exchange, and design considerations for groupware compared to traditional user interfaces.
Basic ideas of making email library newslettersJomy Jose
This document discusses email library newsletters. It begins by defining email newsletters and their purpose of providing timely information about library services and resources to target audiences. It then discusses tools that can be used to create email newsletters, such as MailChimp and Constant Contact, and highlights advantages like easy campaign creation and reporting. The document also provides guidance on key elements of effective email newsletters like concise and relevant content, clear formatting with headings and lists, and building an email list from library membership. The conclusion reiterates that email is an effective low-cost way for libraries to promote services and resources to customers.
Rethinking how your organisation collaboratesStephen Bounds
A presentation given by Stephen Bounds at the Ark Group seminar "Strategic Email Management" in 2007.
Still a useful introduction on how to change the emphasis away from email and towards more appropriate communication methods such as linking files rather than using attachments, blogs, wikis and archived mailing lists.
Mailbeans is a service that aggregates multiple email accounts into a single interface. It treats emails as structured documents that can be organized and queried using a relational database model. This allows users to view their emails in different ways beyond a static list, through various automatically generated reports and views grouped by contact. The goal is to surface the most important information from users' inboxes in a useful manner focused on people rather than individual messages.
The document examines whether short texts like microposts containing up to 140 characters can provide enough information to approximate the knowledge content of longer documents like full emails. It analyzes a corpus of emails from a mailing list, finding that 40% were under 140 characters and 65% were under two microposts. A topic classification experiment showed accuracy was only about 5% lower when classifying microposts versus longer texts, suggesting microposts can provide a good approximation of knowledge in longer documents. Future work could explore enhancing microposts with semantic information and different similarity measures.
The document provides an overview of electronic mail (email) including its definition, history, technical aspects, applications, and role in society. It discusses early host-based and LAN-based email systems from the 1960s and 1970s. Key components of email like SMTP, POP, and MIME protocols are explained. Common email applications include Microsoft Outlook, Outlook Express, and web-based email. The document also briefly discusses the impact and use of email in social communication and business.
Microsoft Outlook 2010 is an email management software that allows users to send and receive emails, manage contacts and calendars. It provides features like emailing, attaching files to emails up to 20MB in size, adding signatures, taking notes, creating appointments and tasks. Outlook will no longer be supported by Microsoft after 2020.
Electronic mail (email) has been in use for over three decades. The document provides an overview of the key components and processes that make up an email system. It discusses the architecture, which consists of user agents that allow people to read and send email, and message transfer agents that move messages between servers. Messages are sent between agents in a standard format defined by RFC 5322 and extended by MIME. The Simple Mail Transfer Protocol (SMTP) is used to transfer messages between agents over the internet.
This document discusses electronic communication services like email, instant messaging, text messaging, voice over IP, online conferencing, and social media. It defines these services and explains how they work. It also covers email specifically, defining parts of an email address and message, as well as how to reply, forward, and courtesy copy or blind copy emails.
Electronic Communication & ToolsPlatforms for online learning ppt _20231026_1...madhav03yad
This document summarizes Anmol Raj's course project on digital empowerment. It discusses various topics of electronic communication including e-mail, blogs, social media, and tools for online learning. For each topic, it provides definitions and highlights some key aspects. It discusses the history of electronic communication from the telegraph to modern technologies. It also outlines advantages and disadvantages of online learning as well as examples of popular learning platforms in India like Udemy, Byju's, and Unacademy. In conclusion, the document emphasizes that India has a diverse landscape of online learning options that provide educational resources and opportunities for lifelong learning.
question 1OSI Model Please respond to the followingThe OSI.docxhildredzr1di
The document discusses using models to describe complex systems by breaking them down into their fundamental components and interactions. It provides an example of using the OSI model to describe how email works. Specifically:
- The physical layer represents the transmission medium that allows an email message to be sent.
- The data link layer handles how the data picks a transmission path and is converted for the receiving end.
- The network layer uses IP addresses to determine the source and destination of an email.
- The transport layer breaks the email down into segments for transmission and reassembles it.
- The session layer adds a header to mark the start and end of an email.
- The presentation layer converts the information
Email allows users to send electronic messages from one computer to another via the internet. It works on a client-server model where clients send and receive email through email servers connected over the internet. Email messages consist of a header containing sender, recipient, date and subject information, and a body containing the text and any attachments. Common email protocols include SMTP for message transfer between servers, and POP and IMAP for client access to messages on servers.
This document discusses technologies for identifying duplicate and near-duplicate electronic documents. It describes exact duplicate detection technology that can remove up to 50% of duplicates from document collections. Near duplicate detection identifies documents with similar but not identical content, such as different versions of the same contract, and can eliminate another 50% of duplicates. The document also discusses email threading technology, which groups related emails and their replies into threads to simplify review and reduce duplication. It explains how comparing documents can highlight differences between near duplicates and inclusive emails within a thread.
E-mail began in 1965 as a way for users of time-sharing computers to communicate. It became popular in 1990 and is now a major form of personal and business communication. E-mail works on a 'store and forward' basis, with messages stored on servers until recipients access their accounts to retrieve messages sent to their username@domain address.
Electronic mail, often abbreviated as email, e.mail or e-mail, is a method of exchanging digital messages. E-mail systems are based on a store-and-forward model in which e-mail computer server systems accept, forward, deliver and store messages on behalf of users, who only need to connect to the e-mail infrastructure, typically an e-mail server, with a network-enabled device (e.g., a personal computer) for the duration of message submission or retrieval. Originally, e-mail was always transmitted directly from one user's device to another's; nowadays this is rarely the case.ThesisScientist.com
This document provides an overview of how to send emails with various headers using PHP. It discusses requirements, examples, the main email fields like sender, recipient, subject and message. It also covers additional fields like carbon copies, blind copies, reply-to, errors to, message ID. It explains how to send HTML vs text emails and attach files. The document includes code examples and links to additional tutorials.
This document presents a new layout algorithm for visualizing communities in clustered social networks that integrates both structural and profile information. The algorithm (1) calculates dissimilarity matrices using profile and structural data, (2) performs multidimensional scaling to reflect node proximity, and (3) defines an interaction zone between communities. Experiments on Facebook, DBLP, and protein networks show it can identify important boundary nodes and observe community interactions. Future work includes extending the model to include viewpoints and applying it to real applications like marketing analysis.
The document presents a socio-semantic network algorithm for visualizing online communities from multiple perspectives. It describes a social network from a bibliographic database that connects authors through papers and topics. This network has two dimensions: a structural dimension defined by connections, and a compositional dimension defined by author attributes. The algorithm integrates these dimensions to detect communities of well-connected authors with similar profiles to answer more complex questions about groups of experts. It was tested on a co-authorship network and found communities crossing domains with better density and entropy than previous methods.
More Related Content
Similar to A Social Network Based Model for e-Mail Information Visualization - Sunbelt 2007
Electronic mail : Introduction, drafting effective email, email etiquettesDinesh Sharma
This document discusses email formatting, drafting effective emails, and email etiquette. It explains that email uses a store-and-forward model and contains a heading, salutation, body, closing, and signature. The heading includes date, from, to, subject, bcc, and cc fields. The body describes the central topic. Closings and signatures follow conventional formats. When drafting emails, the writer should identify the problem, analyze the audience, determine scope, outline main points, organize, and revise. Email etiquette includes checking email daily, maintaining accuracy and formality, ensuring readability, and using an appropriate tone.
This document provides instructions on how to use email effectively. It discusses sending, receiving, and organizing emails. Key points include:
- Using folders like Inbox, Sent, Deleted, and Drafts to organize emails
- Features of emails like Cc, Bcc, subject, importance, and adding contacts
- Sending copies to multiple people saves time
- Explaining what Cc and Bcc mean and when to use each
- The importance of including a meaningful subject line
- Setting importance levels for urgent emails
- Adding contacts to save time remembering email addresses
- Keeping your inbox tidy by deleting emails
- Attaching documents and pictures to emails
- Being careful when opening attachments from
A New Architecture for Email Knowledge Extraction dannyijwest
The Semantic Web was designed to represent the enormous data that is existing on the World Wide Web in
a machine readable format. The research shows the long period of time that was spent on the Emails for
communication and information exchange. Adding the semantics to the existing Email systems could not
only provide for the valuable usage of time and resources, but also refreshes the meaning of Email
communication. The presented research work examines the ontology extraction process from the Email
systems adopting scalable pattern rules that is based on the extracted techniques. The proposed
architecture is designed to handle the unstructured Emails and the ontologies that are extracted from the
Email which is divided into four main components as follows: the Ontology Learning Component, the
Management Component, the Semantic Email Component and the Client Side Plugin.
The document discusses email and groupware. It defines email as electronic messages sent over a network between users. Groupware refers to collaborative software that allows dispersed teams to work together synchronously or asynchronously. The document outlines various email providers, how to create an email account, potential email threats, examples of groupware products like Microsoft Exchange, and design considerations for groupware compared to traditional user interfaces.
Basic ideas of making email library newslettersJomy Jose
This document discusses email library newsletters. It begins by defining email newsletters and their purpose of providing timely information about library services and resources to target audiences. It then discusses tools that can be used to create email newsletters, such as MailChimp and Constant Contact, and highlights advantages like easy campaign creation and reporting. The document also provides guidance on key elements of effective email newsletters like concise and relevant content, clear formatting with headings and lists, and building an email list from library membership. The conclusion reiterates that email is an effective low-cost way for libraries to promote services and resources to customers.
Rethinking how your organisation collaboratesStephen Bounds
A presentation given by Stephen Bounds at the Ark Group seminar "Strategic Email Management" in 2007.
Still a useful introduction on how to change the emphasis away from email and towards more appropriate communication methods such as linking files rather than using attachments, blogs, wikis and archived mailing lists.
Mailbeans is a service that aggregates multiple email accounts into a single interface. It treats emails as structured documents that can be organized and queried using a relational database model. This allows users to view their emails in different ways beyond a static list, through various automatically generated reports and views grouped by contact. The goal is to surface the most important information from users' inboxes in a useful manner focused on people rather than individual messages.
The document examines whether short texts like microposts containing up to 140 characters can provide enough information to approximate the knowledge content of longer documents like full emails. It analyzes a corpus of emails from a mailing list, finding that 40% were under 140 characters and 65% were under two microposts. A topic classification experiment showed accuracy was only about 5% lower when classifying microposts versus longer texts, suggesting microposts can provide a good approximation of knowledge in longer documents. Future work could explore enhancing microposts with semantic information and different similarity measures.
The document provides an overview of electronic mail (email) including its definition, history, technical aspects, applications, and role in society. It discusses early host-based and LAN-based email systems from the 1960s and 1970s. Key components of email like SMTP, POP, and MIME protocols are explained. Common email applications include Microsoft Outlook, Outlook Express, and web-based email. The document also briefly discusses the impact and use of email in social communication and business.
Microsoft Outlook 2010 is an email management software that allows users to send and receive emails, manage contacts and calendars. It provides features like emailing, attaching files to emails up to 20MB in size, adding signatures, taking notes, creating appointments and tasks. Outlook will no longer be supported by Microsoft after 2020.
Electronic mail (email) has been in use for over three decades. The document provides an overview of the key components and processes that make up an email system. It discusses the architecture, which consists of user agents that allow people to read and send email, and message transfer agents that move messages between servers. Messages are sent between agents in a standard format defined by RFC 5322 and extended by MIME. The Simple Mail Transfer Protocol (SMTP) is used to transfer messages between agents over the internet.
This document discusses electronic communication services like email, instant messaging, text messaging, voice over IP, online conferencing, and social media. It defines these services and explains how they work. It also covers email specifically, defining parts of an email address and message, as well as how to reply, forward, and courtesy copy or blind copy emails.
Electronic Communication & ToolsPlatforms for online learning ppt _20231026_1...madhav03yad
This document summarizes Anmol Raj's course project on digital empowerment. It discusses various topics of electronic communication including e-mail, blogs, social media, and tools for online learning. For each topic, it provides definitions and highlights some key aspects. It discusses the history of electronic communication from the telegraph to modern technologies. It also outlines advantages and disadvantages of online learning as well as examples of popular learning platforms in India like Udemy, Byju's, and Unacademy. In conclusion, the document emphasizes that India has a diverse landscape of online learning options that provide educational resources and opportunities for lifelong learning.
question 1OSI Model Please respond to the followingThe OSI.docxhildredzr1di
The document discusses using models to describe complex systems by breaking them down into their fundamental components and interactions. It provides an example of using the OSI model to describe how email works. Specifically:
- The physical layer represents the transmission medium that allows an email message to be sent.
- The data link layer handles how the data picks a transmission path and is converted for the receiving end.
- The network layer uses IP addresses to determine the source and destination of an email.
- The transport layer breaks the email down into segments for transmission and reassembles it.
- The session layer adds a header to mark the start and end of an email.
- The presentation layer converts the information
Email allows users to send electronic messages from one computer to another via the internet. It works on a client-server model where clients send and receive email through email servers connected over the internet. Email messages consist of a header containing sender, recipient, date and subject information, and a body containing the text and any attachments. Common email protocols include SMTP for message transfer between servers, and POP and IMAP for client access to messages on servers.
This document discusses technologies for identifying duplicate and near-duplicate electronic documents. It describes exact duplicate detection technology that can remove up to 50% of duplicates from document collections. Near duplicate detection identifies documents with similar but not identical content, such as different versions of the same contract, and can eliminate another 50% of duplicates. The document also discusses email threading technology, which groups related emails and their replies into threads to simplify review and reduce duplication. It explains how comparing documents can highlight differences between near duplicates and inclusive emails within a thread.
E-mail began in 1965 as a way for users of time-sharing computers to communicate. It became popular in 1990 and is now a major form of personal and business communication. E-mail works on a 'store and forward' basis, with messages stored on servers until recipients access their accounts to retrieve messages sent to their username@domain address.
Electronic mail, often abbreviated as email, e.mail or e-mail, is a method of exchanging digital messages. E-mail systems are based on a store-and-forward model in which e-mail computer server systems accept, forward, deliver and store messages on behalf of users, who only need to connect to the e-mail infrastructure, typically an e-mail server, with a network-enabled device (e.g., a personal computer) for the duration of message submission or retrieval. Originally, e-mail was always transmitted directly from one user's device to another's; nowadays this is rarely the case.ThesisScientist.com
This document provides an overview of how to send emails with various headers using PHP. It discusses requirements, examples, the main email fields like sender, recipient, subject and message. It also covers additional fields like carbon copies, blind copies, reply-to, errors to, message ID. It explains how to send HTML vs text emails and attach files. The document includes code examples and links to additional tutorials.
Similar to A Social Network Based Model for e-Mail Information Visualization - Sunbelt 2007 (20)
This document presents a new layout algorithm for visualizing communities in clustered social networks that integrates both structural and profile information. The algorithm (1) calculates dissimilarity matrices using profile and structural data, (2) performs multidimensional scaling to reflect node proximity, and (3) defines an interaction zone between communities. Experiments on Facebook, DBLP, and protein networks show it can identify important boundary nodes and observe community interactions. Future work includes extending the model to include viewpoints and applying it to real applications like marketing analysis.
The document presents a socio-semantic network algorithm for visualizing online communities from multiple perspectives. It describes a social network from a bibliographic database that connects authors through papers and topics. This network has two dimensions: a structural dimension defined by connections, and a compositional dimension defined by author attributes. The algorithm integrates these dimensions to detect communities of well-connected authors with similar profiles to answer more complex questions about groups of experts. It was tested on a co-authorship network and found communities crossing domains with better density and entropy than previous methods.
Entropy based algorithm for community detection in augmented networksJuan David Cruz-Gómez
The document proposes an entropy-based algorithm to detect communities in augmented social networks. It begins with an introduction that motivates using both the graph structure and node attributes to find communities. It then outlines the clustering algorithm, which first uses modularity optimization on the graph to generate an initial partition, and then performs entropy optimization on the partition using the node attributes. Experimental results on student networks show that using attributes leads to different community configurations than using the graph alone, and that the algorithm runs in linear time and memory usage.
This document discusses point of view based clustering of socio-semantic networks. It describes how points of view can be created from semantic features of actors in a network to analyze the network from different perspectives. Semantic features include roles, names, relationships, and other attributes of actors. A point of view is defined as the set of all binary vectors representing each actor's features as defined by a subset of relevant features. The points of view allow influencing the network clustering process by using both structural and semantic information to extract non-evident information from various angles.
The document presents a method for clustering social networks based on points of view. It uses semantic information associated with nodes to guide the community detection process. Phase 1 clusters nodes with similar feature values using self-organizing maps. Phase 2 assigns weights to edges based on the semantic clustering and detects communities using a graph clustering algorithm. Preliminary experiments on a Twitter network show the method achieves better modularity and intra-cluster distances than alternatives. The authors conclude integrating semantic and graph information improves detection of communities from different points of view.
How to Manage Your Lost Opportunities in Odoo 17 CRMCeline George
Odoo 17 CRM allows us to track why we lose sales opportunities with "Lost Reasons." This helps analyze our sales process and identify areas for improvement. Here's how to configure lost reasons in Odoo 17 CRM
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
A Social Network Based Model for e-Mail Information Visualization - Sunbelt 2007
1. Introduction
Information Contained in E-mail Messages
Visualization Model
Conclusions
Thank You
A Social Network Based Model for e-Mail
Information Visualization
Juan Cruz Fabio González
1 Intelligent
Systems Research Laboratory
National University of Colombia
May, 2007
2. Introduction
Information Contained in E-mail Messages
Visualization Model
Conclusions
Thank You
Outline
1 Introduction
2 Information Contained in E-mail Messages
3 Visualization Model
4 Conclusions
3. Introduction
Information Contained in E-mail Messages
Visualization Model
Conclusions
Thank You
Introduction
E-mail is a growing technology for exchanging information
between people and/or organizations.
In e-mail messages there are information that is not visible to
its owners.
That information could be extracted and delivered to the user
in order to answer questions like Who knows what?.
4. Introduction
Information Contained in E-mail Messages
Visualization Model
Conclusions
Thank You
Types of Information
The information contained in e-mail messages can be divided
in two groups:
Topics treated information that is contained in the body and
the attached files.
Information about the contacts those the messages owner have
communication with.
5. Introduction
Information Contained in E-mail Messages
Visualization Model
Conclusions
Thank You
Types of Information
The information contained in e-mail messages can be divided
in two groups:
Topics treated information that is contained in the body and
the attached files.
Information about the contacts those the messages owner have
communication with.
6. Introduction
Information Contained in E-mail Messages
Visualization Model
Conclusions
Thank You
Types of Information
The information contained in e-mail messages can be divided
in two groups:
Topics treated information that is contained in the body and
the attached files.
Information about the contacts those the messages owner have
communication with.
7. Introduction
Information Contained in E-mail Messages
Visualization Model
Conclusions
Thank You
Information Contained in Messages’ Body
The message’s text body contains the the ideas that the
sender wants other people know.
The written text in some few cases is writed in formal and
structurated way: it could say “I attach the document about
we were discussed this morning”.
Attached documents are included in this group.
There are several types of attachments that have information
easy extractable:
Word documents
Power Point presentations
PDF’s
Excel Spreadsheets
Text files
8. Introduction
Information Contained in E-mail Messages
Visualization Model
Conclusions
Thank You
Information Contained in Messages’ Body
The message’s text body contains the the ideas that the
sender wants other people know.
The written text in some few cases is writed in formal and
structurated way: it could say “I attach the document about
we were discussed this morning”.
Attached documents are included in this group.
There are several types of attachments that have information
easy extractable:
Word documents
Power Point presentations
PDF’s
Excel Spreadsheets
Text files
9. Introduction
Information Contained in E-mail Messages
Visualization Model
Conclusions
Thank You
Information Contained in Messages’ Body
The message’s text body contains the the ideas that the
sender wants other people know.
The written text in some few cases is writed in formal and
structurated way: it could say “I attach the document about
we were discussed this morning”.
Attached documents are included in this group.
There are several types of attachments that have information
easy extractable:
Word documents
Power Point presentations
PDF’s
Excel Spreadsheets
Text files
10. Introduction
Information Contained in E-mail Messages
Visualization Model
Conclusions
Thank You
Information Contained in Messages’ Body
The message’s text body contains the the ideas that the
sender wants other people know.
The written text in some few cases is writed in formal and
structurated way: it could say “I attach the document about
we were discussed this morning”.
Attached documents are included in this group.
There are several types of attachments that have information
easy extractable:
Word documents
Power Point presentations
PDF’s
Excel Spreadsheets
Text files
11. Introduction
Information Contained in E-mail Messages
Visualization Model
Conclusions
Thank You
Contact Information in E-mails Messages
All e-mail messages have a sender, one o more addressees, a
subject and the date when it was created.
Addressees can be laid in any of these fields: To, Cc (Carbon
Copy), BCc (Blind Carbon Copy)
With senders and addressees of all the messages it is possible
to build the messages owner’s personal social network.
In that social network the user could be identify the people
that he have any communication and maybe he knows, also,
can see communications between their direct contacts and
people that perhaps he don’t knows.
This is possible when the user receive a message from a direct
contact with more addressees.
12. Introduction
Information Contained in E-mail Messages
Visualization Model
Conclusions
Thank You
Contact Information in E-mails Messages
All e-mail messages have a sender, one o more addressees, a
subject and the date when it was created.
Addressees can be laid in any of these fields: To, Cc (Carbon
Copy), BCc (Blind Carbon Copy)
With senders and addressees of all the messages it is possible
to build the messages owner’s personal social network.
In that social network the user could be identify the people
that he have any communication and maybe he knows, also,
can see communications between their direct contacts and
people that perhaps he don’t knows.
This is possible when the user receive a message from a direct
contact with more addressees.
13. Introduction
Information Contained in E-mail Messages
Visualization Model
Conclusions
Thank You
Contact Information in E-mails Messages
All e-mail messages have a sender, one o more addressees, a
subject and the date when it was created.
Addressees can be laid in any of these fields: To, Cc (Carbon
Copy), BCc (Blind Carbon Copy)
With senders and addressees of all the messages it is possible
to build the messages owner’s personal social network.
In that social network the user could be identify the people
that he have any communication and maybe he knows, also,
can see communications between their direct contacts and
people that perhaps he don’t knows.
This is possible when the user receive a message from a direct
contact with more addressees.
14. Introduction
Information Contained in E-mail Messages
Visualization Model
Conclusions
Thank You
Contact Information in E-mails Messages
All e-mail messages have a sender, one o more addressees, a
subject and the date when it was created.
Addressees can be laid in any of these fields: To, Cc (Carbon
Copy), BCc (Blind Carbon Copy)
With senders and addressees of all the messages it is possible
to build the messages owner’s personal social network.
In that social network the user could be identify the people
that he have any communication and maybe he knows, also,
can see communications between their direct contacts and
people that perhaps he don’t knows.
This is possible when the user receive a message from a direct
contact with more addressees.
15. Introduction
Information Contained in E-mail Messages
Visualization Model
Conclusions
Thank You
Contact Information in E-mails Messages
All e-mail messages have a sender, one o more addressees, a
subject and the date when it was created.
Addressees can be laid in any of these fields: To, Cc (Carbon
Copy), BCc (Blind Carbon Copy)
With senders and addressees of all the messages it is possible
to build the messages owner’s personal social network.
In that social network the user could be identify the people
that he have any communication and maybe he knows, also,
can see communications between their direct contacts and
people that perhaps he don’t knows.
This is possible when the user receive a message from a direct
contact with more addressees.
16. Introduction
Information Contained in E-mail Messages
Visualization Model
Conclusions
Thank You
E-mail Information Extraction
E-mail messages can be stored in many way, each of these can
use it own format:
POP3 servers uses mbox format.
Netscape, Mozilla and Thunderbird uses mork format.
Outlook and Outlook express uses their propietary format.
XML is a structured-marked language that should be used to
define the structure of an e-mail message.
Thus, the first step is to develop a system capable to take the
e-mail messages from some store and translate it to a
tructured language.
With that translation the messages can be readed in a
standard way.
17. Introduction
Information Contained in E-mail Messages
Visualization Model
Conclusions
Thank You
E-mail Information Extraction
E-mail messages can be stored in many way, each of these can
use it own format:
POP3 servers uses mbox format.
Netscape, Mozilla and Thunderbird uses mork format.
Outlook and Outlook express uses their propietary format.
XML is a structured-marked language that should be used to
define the structure of an e-mail message.
Thus, the first step is to develop a system capable to take the
e-mail messages from some store and translate it to a
tructured language.
With that translation the messages can be readed in a
standard way.
18. Introduction
Information Contained in E-mail Messages
Visualization Model
Conclusions
Thank You
E-mail Information Extraction
E-mail messages can be stored in many way, each of these can
use it own format:
POP3 servers uses mbox format.
Netscape, Mozilla and Thunderbird uses mork format.
Outlook and Outlook express uses their propietary format.
XML is a structured-marked language that should be used to
define the structure of an e-mail message.
Thus, the first step is to develop a system capable to take the
e-mail messages from some store and translate it to a
tructured language.
With that translation the messages can be readed in a
standard way.
19. Introduction
Information Contained in E-mail Messages
Visualization Model
Conclusions
Thank You
E-mail Information Extraction
E-mail messages can be stored in many way, each of these can
use it own format:
POP3 servers uses mbox format.
Netscape, Mozilla and Thunderbird uses mork format.
Outlook and Outlook express uses their propietary format.
XML is a structured-marked language that should be used to
define the structure of an e-mail message.
Thus, the first step is to develop a system capable to take the
e-mail messages from some store and translate it to a
tructured language.
With that translation the messages can be readed in a
standard way.
20. Introduction
Information Contained in E-mail Messages
Visualization Model
Conclusions
Thank You
E-mail Information Extraction System
21. Introduction
Information Contained in E-mail Messages
Visualization Model
Conclusions
Thank You
Ring Force Layout
The messages’ owner is
the network central node.
People who have direct
communication with
central user lay in the first
ring.
People in the second ring
are those who have
comunications only with
people in the first ring.
22. Introduction
Information Contained in E-mail Messages
Visualization Model
Conclusions
Thank You
Force Field Layout
This layout uses a SOM map as force field (gravitational or
magnetic).
Each SOM centroid acts like an attractor point, so each social
network node is attracted to topics of influence.
The central user (the owner) is influenced in different
magnitudes by all the topics treated in the messages.
Positions of the nodes are determined by the influence of the
topics, so, some node will be near to it most treated topic.
In each topic area (cluster) every node in it exert a repulsive
force over the other in order to mantain the representation
clear enough.
23. Introduction
Information Contained in E-mail Messages
Visualization Model
Conclusions
Thank You
Force Field Layout
This layout uses a SOM map as force field (gravitational or
magnetic).
Each SOM centroid acts like an attractor point, so each social
network node is attracted to topics of influence.
The central user (the owner) is influenced in different
magnitudes by all the topics treated in the messages.
Positions of the nodes are determined by the influence of the
topics, so, some node will be near to it most treated topic.
In each topic area (cluster) every node in it exert a repulsive
force over the other in order to mantain the representation
clear enough.
24. Introduction
Information Contained in E-mail Messages
Visualization Model
Conclusions
Thank You
Force Field Layout
This layout uses a SOM map as force field (gravitational or
magnetic).
Each SOM centroid acts like an attractor point, so each social
network node is attracted to topics of influence.
The central user (the owner) is influenced in different
magnitudes by all the topics treated in the messages.
Positions of the nodes are determined by the influence of the
topics, so, some node will be near to it most treated topic.
In each topic area (cluster) every node in it exert a repulsive
force over the other in order to mantain the representation
clear enough.
25. Introduction
Information Contained in E-mail Messages
Visualization Model
Conclusions
Thank You
Force Field Layout
This layout uses a SOM map as force field (gravitational or
magnetic).
Each SOM centroid acts like an attractor point, so each social
network node is attracted to topics of influence.
The central user (the owner) is influenced in different
magnitudes by all the topics treated in the messages.
Positions of the nodes are determined by the influence of the
topics, so, some node will be near to it most treated topic.
In each topic area (cluster) every node in it exert a repulsive
force over the other in order to mantain the representation
clear enough.
26. Introduction
Information Contained in E-mail Messages
Visualization Model
Conclusions
Thank You
Force Field Layout
This layout uses a SOM map as force field (gravitational or
magnetic).
Each SOM centroid acts like an attractor point, so each social
network node is attracted to topics of influence.
The central user (the owner) is influenced in different
magnitudes by all the topics treated in the messages.
Positions of the nodes are determined by the influence of the
topics, so, some node will be near to it most treated topic.
In each topic area (cluster) every node in it exert a repulsive
force over the other in order to mantain the representation
clear enough.
27. Introduction
Information Contained in E-mail Messages
Visualization Model
Conclusions
Thank You
Force Field Layout
28. Introduction
Information Contained in E-mail Messages
Visualization Model
Conclusions
Thank You
Force Field Layout
Using SOM, topics areas was identified, so each message
belongs to one of those areas.
Each area has a centroid, which acts as an attractor point
used for drawing the contact network later.
Experimentation consists of a random rectangles generator and
random weights vectors for each node.
First experiment was constructed using 25 random located and
sized rectangles and a social network with 74 nodes.
29. Introduction
Information Contained in E-mail Messages
Visualization Model
Conclusions
Thank You
Force Field Layout
Using SOM, topics areas was identified, so each message
belongs to one of those areas.
Each area has a centroid, which acts as an attractor point
used for drawing the contact network later.
Experimentation consists of a random rectangles generator and
random weights vectors for each node.
First experiment was constructed using 25 random located and
sized rectangles and a social network with 74 nodes.
30. Introduction
Information Contained in E-mail Messages
Visualization Model
Conclusions
Thank You
Force Field Layout
Using SOM, topics areas was identified, so each message
belongs to one of those areas.
Each area has a centroid, which acts as an attractor point
used for drawing the contact network later.
Experimentation consists of a random rectangles generator and
random weights vectors for each node.
First experiment was constructed using 25 random located and
sized rectangles and a social network with 74 nodes.
31. Introduction
Information Contained in E-mail Messages
Visualization Model
Conclusions
Thank You
Force Field Layout
Using SOM, topics areas was identified, so each message
belongs to one of those areas.
Each area has a centroid, which acts as an attractor point
used for drawing the contact network later.
Experimentation consists of a random rectangles generator and
random weights vectors for each node.
First experiment was constructed using 25 random located and
sized rectangles and a social network with 74 nodes.
32. Introduction
Information Contained in E-mail Messages
Visualization Model
Conclusions
Thank You
Force Field Layout
Twenty five topics were
identified.
A 15x15 SOM was used
Each topic (area) has a
centroid.
33. Introduction
Information Contained in E-mail Messages
Visualization Model
Conclusions
Thank You
Force Field Layout
Each point in the plane has a similarity given by:
2
i − Ci − p
Sim p, C = exp
σ2
where p is the test point, C i is the centroid i and σ 2 define
the radius of each area and is given by:
# email messages
σ2 =
k
34. Introduction
Information Contained in E-mail Messages
Visualization Model
Conclusions
Thank You
Force Field Layout
35. Introduction
Information Contained in E-mail Messages
Visualization Model
Conclusions
Thank You
Force Field Layout
36. Introduction
Information Contained in E-mail Messages
Visualization Model
Conclusions
Thank You
Force Field Layout
37. Introduction
Information Contained in E-mail Messages
Visualization Model
Conclusions
Thank You
Conclusions
E-mail messages has many information that is not evident for
users.
Social network information allows to see people that the user
has not direct interaction with
When the contact and the topic information war merged, the
user can see other people, and the topics treated by they.
So, it is possible to the user identify not only far contacts, the
conversations topics too.
38. Introduction
Information Contained in E-mail Messages
Visualization Model
Conclusions
Thank You
Thank You
Juan David Cruz Gómez: jdcruzg@unal.edu.co
Fabio Gonzélez: fagonzalezo@unal.edu.co