SlideShare a Scribd company logo
International Refereed Journal of Engineering and Science (IRJES)
ISSN (Online) 2319-183X, (Print) 2319-1821
Volume 2, Issue 2(February 2013), PP.35-39
www.irjes.com

                            Current Trends in Reality Mining

                                     Jyoti More1, Chelpa Lingam2
                                1
                                 Lokmanya Tilak College of Engg., Koparkhairane
                                     (affiliated to Mumbai University), INDIA
                         2
                          Pillai's HOC College of Engineering & Technology, Rasayani
                                    (affiliated to Mumbai University), INDIA

Abstract: We live in a technology driven society where, each one of us continuously leaves digital traces
behind. Our mobile phones, for example, continuously sense our movements and interactions. This socio-
geographic data could be continuously captured by millions of people around the world and promises to reveal
important behavioral clues about humans. Mining patterns of human behavior from large-scale mobile phone
data has deep potential impact on society. Reality Mining, pioneered by Nathan Eagle and Alex Pentland,
(Massachusetts Institute of Technology (MIT)) is defined as the study of human social behavior based on
wireless mobile phone sensed data. Reality mining is based on data collected by sensors in mobile phones, cars,
security cameras, RFID ('smart card') readers, and others, all allow for the measurement of human physical
and social activity. Applications of reality mining are in diverse fields like epidemiology, psychology, urban
planning, security, marketing and even analysis of poverty. This paper attempts to overview and analyzes the
current trends in reality mining. It also presents the current challenges in this field.

Keywords: Reality Mining, Social Network Mining, Context aware computing

                                                  I. INTRODUCTION
          Reality Mining is defined as the study of human social behavior based on wireless mobile phone
sensed data by Nathan Eagle and Alex Pentland, (Massachusetts Institute of Technology (MIT). It is the
collection and analysis of machine-sensed environmental data pertaining to human social behavior, with the goal
of identifying predictable patterns of behavior.
          Mobile phones are promising electronic devices as sensors due to their vast usage over the world on a
daily continuous basis, and also due to the numerous types of sensors embedded in the device. The mobile
phone has developed, due to its paramount nature, from a simple communication device to include many other
tools such as a cameras, browsers, games, calendars, alarm clocks, and will surely continue to develop in the
future. All of these forms of data can be analyzed to reveal details about human behavior.
          Sensors are everywhere, continuously gathering information as we live our daily lives. Whether using
email, the telephone, a bank machine, or even simpler activities such as driving, using a photocopy machine,
and a camera, all of these activities leave traces of our behavior. Recently, the communication devices have
been viewed from an engineering perspective as sensors, capturing data which scientists in many disciplines are
very excited about. This data potentially impacts every one of us as researchers begin to study the possibilities
of their use. Research using mobile phone data has mostly focused on location-driven data analysis, more
specifically, using Global Positioning System (GPS) data to predict transportation modes to predict user
destinations or paths, and to predict daily step count. Other location-driven tasks have made use of Global
System for Mobile Communications (GSM) data for indoor localization or WiFi for large-scale localization .
There are several works related to activity modeling from location-driven phone sensor data. CitySense is a
mobile application which uses GPS and WiFi data to summarize “hotspots” of activity a city, which can then be
used to make recommendations to people regarding, for example, preferred restaurants. Applications to society
as a whole are being investigated in terms of epidemiology and psychology, urban planning, security, and even
in the analysis of poverty.
          This paper focuses on the possibilities, scope and challenges related to reality mining. A brief review
has been carried out for this purpose.
                                               II. SOCIAL NETWORKS
         A Social network is defined as a set of actors (individuals) and the ties (relationships) among them.
Important research problems include the study of social networks’ structural properties (such as community
detection and evolution), user properties (such as reputation and trustworthiness), and user social relations
(including influence and trust). Social networks are either explicitly specified, such as a Facebook friends list, or

                                                    www.irjes.com                                         35 | Page
Current Trends in Reality Mining

implicitly inferred from social interactions such as email or mobile phone communications. Important research
problems include the study of social networks’ structural properties (such as community detection and
evolution), user properties (such as reputation and trustworthiness), and user social relations (including
influence and trust).
         2.1 Social Networks as Graphs
         Social networks are naturally modeled as undirected graphs(fig 1). The entities are the nodes, and an
edge connects two nodes if the nodes are related by the relationship that characterizes the network. If there is a
degree associated with the relationship, this degree is represented by labeling the edges.




                        Fig 1.: Example of a small social network represented as graph


                                    Many Interations similar opinion




                                      Few interactions, different opinion
                  Fig 2.: Using Social Network Mining to estimate strengths of social relations

         2.2 Social network mining
         In social network mining, we apply data mining algorithms to study large-scale social networks. Social
network mining has attracted a lot of attention for many reasons. For example, studying large social networks
allows us to understand social behaviors in different contexts. In addition, by analyzing the roles of the people
involved in the network, we can understand how information and opinions spread within the network, and who
are the most influential people . In addition, since social network users may receive too much information from
time to time, social network mining can be used to support them by providing recommendations and filtering
information on their behalf.

                                     III. CONTEXT AWARE COMPUTING
Context is a combination of any information that can be sensed or received by an entity which is useful to catch
events and situations.Context-aware computing uses information about an end user’s or object’s environment,
activities, connections and preferences to improve the quality of interaction with that end user or object. A
contextually aware system anticipates the user’s needs and proactively serves up the most appropriate and
customized content, product or service. Applications that use context, whether on a desktop or in a mobile or
ubiquitous computing environment, are called context-aware.
There are four catagories of context aware applications:
      Proximate Selection: Presents information, which is selected considering some context to ease a
          choice.


                                                    www.irjes.com                                      36 | Page
Current Trends in Reality Mining

        Automatic Contextual Reconfiguration: Current context automatically leads to new information.The
         entity creates new bindings to context resources.
        Contextual Information and Commands: Information and commands are shown / executed manually
         and adapted to the current situation.
        Context-Triggered Actions: The current context leads an application to start a process automatically
         [2]

                                              IV. CURRENT TRENDS
    The Pioneers of reality Mining, the researchers of MIT, Nathan Eagle & Alex (Sandy) Pentland et.al [4]
introduced a system for sensing complex social systems with data collected from 100 mobile phones over the
course of 9 months. They demonstrated the ability to use standard Bluetooth-enabled mobile telephones to
measure information access and use in different contexts, recognize social patterns in daily user activity, infer
relationships, identify socially significant locations, and model organizational rhythms. The major findings
included Behavior Prediction, Relationship Inference and Computational Social Science. Further, N. Eagle, A.
Pentland, and D. Lazer et. al[5] analyzed 330,000 hours of continuous behavioral data logged by the mobile
phones of 94 subjects, and compared these observations with self report relational data. The information from
these two data sources is overlapping but distinct, and the accuracy of self report data is considerably affected
by such factors as the recency and salience of particular interactions. A new method is proposed for precise
measurements of large-scale human behavior based on contextualized proximity and communication data alone,
and identify characteristic behavioral signatures of relationships that allowed to accurately predict 95% of the
reciprocated friendships in the study. Using these behavioral signatures it could be possible to predict,
individual-level outcomes such as job satisfaction. The dataset built during these experiments is still being used
by many researchers for their experimentation.
     Further the field was explored by many researchers for various applications. Huiqi Zhang; Dantu, R.;
Cangussu, J.W. et.al [6] proposed in their paper, a socioscope model for social-network and human-behavior
analysis based on mobile-phone call-detail records. Because of the diversity and complexity of human social
behavior, no one technique will detect every attribute that arises when humans engage in social behaviors. They
used multiple probability and statistical methods for quantifying social groups, relationships, and
communication patterns and for detecting human-behavior changes. They proposed a new index to measure the
level of reciprocity between users and their communication partners. This reciprocity index has application in
homeland security, detection of unwanted calls (e.g., spam), telecommunication presence, and product
marketing.
          Zhang, Huiqi; Dantu, Ram et. al [7] proposed that the social-tie strengths of person-to-person are
different one another even though they are in the same group. In this paper the researchers investigated the
evolution of person-to-person social relationships, quantify and predict social tie strengths based on call-detail
records of mobile phones. They proposed an affinity model for quantifying social-tie strengths in which a
reciprocity index is integrated to measure the level of reciprocity between users and their communication
partners. Since human social relationships change over time, they map the call-log data to time series of the
social-tie strengths by the affinity model. Then they used ARIMA model to predict social-tie strengths. Farrahi,
K.; Gatica-Perez, D. et. al.[8] suggested that human interaction data, or human proximity, obtained by mobile
phone Bluetooth sensor data, can be integrated with human location data, obtained by mobile cell tower
connections, to mine meaningful details about human activities from large and noisy datasets. They propose a
model, called bag of multimodal behavior, that integrates the modeling of variations of location over multiple
time-scales, and the modeling of interaction types from proximity. They further demonstrate the feasibility of
the topic modeling framework for human routine discovery by predicting missing multimodal phone data at
specific times of the day.
          Simoes J., Magedanz, T. et. al. [9] proposed a work by combining social network
analysis, reality mining techniques and context-aware systems. This work provides an architecture and ground
steps for understanding and predicting human behavior and preferences within one of the most promising
business models of the future: “Advertising”. Furthermore, it shows how user related data (context) can be
securely managed and exposed to 3rd party providers, taking into account user context-aware privacy settings.
The presented concepts are then realized in a prototype, which evaluates the basic functionalities previously
described. Xu Yang, Yapeng Wang, et. al.[10] studied data mining for social network analysis purpose, which
aims at finding people's social network patterns by analyzing the information about their mobile phone usage. In
this research, the real database of MIT's Reality Mining project is employed. The classification model presented
in this project provides a new approach to find the proximity between users - based on their registration
frequencies to specific cellular towers associated their working places. K-means Algorithm is applied for
clustering.


                                                  www.irjes.com                                        37 | Page
Current Trends in Reality Mining

          Huiqi Zhang; Dantu, R. et. al.[11] proposed the Bayesian inference model to calculate the willingness
level of the callee to accept calls. Before making a call, the caller may use the willingness calculator to find out
whether the callee is available. Based on this level the user can make a decision whether to make a call. They
used time of the day, day of the week, talk-time and location for calculating the willingness level.
          Michal Ficek, Lukas Kencl [12] proposed that the data captured from a live cellular network with the
real users during their common daily routine help to understand how the users move within the network. Unlike
the simulations with limited potential or expensive experimental studies, the research in user-mobility or spatio-
temporal user behavior can be conducted on publicly available datasets such as the Reality Mining Dataset.
These data have been for many years a source of valuable information about social interconnection between
users and user-network associations. However, an important, spatial dimension is missing in this dataset. In this
paper, the researchers present a methodology for retrieving geographical locations matching the GSM cell
identifiers in the Reality Mining Dataset, an approach based on querying the Google Location API. A statistical
analysis of the measure of success of locations retrieval is provided. Further, they presented the LAC-clustering
method for detecting and removing outliers, a heuristic extension of general agglomerative hierarchical
clustering. This methodology enables further, previously impossible analysis of the Reality Mining Dataset,
such as studying user mobility patterns, describing spatial trajectories and mining the spatio-temporal data.
          Zhenhui Li, Cindy Xide Lin et. al.[13] emphasized that Spatio-temporal data collected from GPS have
become an important resource to study the relationships of moving objects. While previous studies focus on
mining objects being together for a long time, discovering real-world relationships, such as friends or colleagues
in human trajectory data, is a fundamentally different challenge. For example, it is possible that two individuals
are friends but do not spend a lot of time being together every day. However, spending just one or two hours
together at a location away from work on a Saturday night could be a strong indicator of friend relationship.
Based on the above observations, in this paper the researchers aim to analyze and detect semantically
meaningful relationships in a supervised way. That is, with an interested relationship in mind, a user can label
some object pairs with and without such relationship. From labeled pairs, it is learnt that time intervals are the
most important ones in order to characterize this relationship. These significant time intervals, namely T-Motifs,
are then used to discover relationships hidden in the unlabeled moving object pairs.
          Xiaowen Dong, Pascal Frossard et. al.[14] proposed that mobile phone data provides rich dynamic
information on human activities in social network analysis. In this paper, the researchers represent data from
two different modalities as a graph and functions defined on the vertex set of the graph. They propose a
regularization framework for the joint utilization of these two modalities of data, which enables them to model
evolution of social network information and efficiently classify relationships among mobile phone users.
          From the above survey it is observed that the reality mining still has a large potential of getting
explored and contribute to ubiquitous computing field. It is one aspect of digital footprint analysis. Much more
experimentations could be carried out to analyze the social ties and predict human behavior that could be helpful
in exploring parallel universes of opinion mining, emotional mining, social network mining, etc.

                                       V. SIGNIFICANCE OF THE STUDY
        Security: Reality mining can be a great tool to track terrorists as mobile phone networks can identify
         unusual patterns of movement and communication. GPS-enabled mobile phones and tracking devices
         are installed on commercial vehicles to monitor traffic conditions. It facilitates in tracking of real-time
         traffic congestion data.
        Business: It can help companies to boost inter-office cooperation. Mining Task-Based Social Networks
         can be used to explore Collaboration in Software Teams. Event planners who manage multi-million
         dollar conventions and conferences can avail the data and make the best out of it. Telecom companies
         can analyze the service usage and can enhance customer service.
        Healthcare: Reality mining has the ability to contribute immensely towards healthcare. By gathering
         health related information through mobiles, they can predict disease outbreaks. With the aid of audio or
         motion sensors, changes in the nervous system can be deducted and this information could be used to
         screen depression.
        Viral marketing, viral advertising: these are the buzzwords referring to marketing techniques that
         use pre-existing social networks and other technologies to produce increases in brand awareness or to
         achieve other marketing objectives (such as product sales) through self-replicating viral processes,
         analogous to the spread of viruses or computer viruses. It can be delivered by word of mouth or
         enhanced by the network effects of the Internet and mobile networks. Viral marketing may take the
         form           of video        clips,        interactive Flash games, advergames, ebooks, images, text
         messages,email messages, or web pages.
        Digital Footprinting: Uncovering or tracing the tourists with User-Generated Content[3]


                                                   www.irjes.com                                         38 | Page
Current Trends in Reality Mining

                                                 VI. CURRENT CHALLENGES
          The need for effective methods and mathematical models for analysis becomes crucial in order to make
good use of the sources. In machine learning, algorithms have been developed to recognize complex patterns
and make intelligent decisions based on data. Traditional machine learning models are recognized as useful
tools for large- scale data analysis. They have been used in the domain of human behavior analysis, though their
limitations with new types of data and human-centric questions become apparent. For example, many of the
traditional machine learning models is supervised, requiring training data which is often impossible or illegal to
collect on human subjects. Other specifications related to human-centric data include the multimodal aspect, the
noise, the massive quantity, and the complex questions of interest.
          More specifically, data collected by mobile phone sensors include many types, ranging from GPS,
Bluetooth, accelerometer, to voice features. Each of these sensors may be sampled with varying frequencies,
each has varying timescales and differing characteristics, and each has its own sources of noise.
          Although many basic conceptual questions remain unresolved, the major roadblock in defining the
fundamental predictability limits for technosocial systems is their sensitivity and dependence on social adaptive
behavior.
          Addressing these problems involves tackling three major scientific challenges. The first is the gathering
of large-scale data on information spread and social reactions that occur during periods of crisis. This is not
presently out of reach, via largescale mobile communication databases (such as mobile telephones, Twitter logs,
and social Web tools) operating at the moment of specific disaster or crisis events.        The second challenge
is the formulation of formal models that make it possible to quantify the effect of risk perception and awareness
phenomena of individuals on the technosocial network structure and dynamics. The third challenge is that of
maintaining privacy i.e. to do privacy –preserving-mining.

                                                        REFERENCES
Books:
[1]    Earl Cox , “Fuzzy Modeling and Genetic Algorithms for Data mining and Exploration”, Morgan Kaufmann Publishers/ Elsevier
[2]    B. Schilit, N. Adams, R. Want, “Context-Aware Computing Applications” Proceedings of Workshop on Mobile Computing
       Systems and Applications, 1994

Theses:
[3]    Katayoun Farrahi, “A Probabilistic Approach to Socio-Geographic Reality Mining” THESIS No5018 (2011) submitted to the
       Faculty of Science and Technology Engineer École Polytechnique Fédérale de Lausanne to obtain the degree of Doctor of Science

Journal Papers:
[4]    Nathan Eagle & Alex (Sandy) Pentland, “Reality mining: sensing complex social systems” Pers Ubiquit Comput (2006) 10: 255–
       268, Springer-Verlag London Limited 2005

Proceedings Papers:
[5]    N. Eagle, A. Pentland, and D. Lazer, “Inferring Social Network Structure using Mobile Phone Data,” Proceedings of theNational
       Academy of Sciences (PNAS), vol. 106, no. 36, pp.15274–15278, September 2007
[6]    Huiqi Zhang; Dantu, R.; Cangussu, J.W. , “ Socioscope: Human Relationship and Behavior Analysis in Social Networks”, IEEE
       Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans, Volume: 41, Issue: 6, Publication Year: 2011 ,
       Page(s): 1122 – 1143
[7]     Zhang,       Huiqi;      Dantu,       Ram,       “Predicting      social     ties     in      mobile      phone      networks”,
       IEEEInternational Conference on Intelligence and Security Informatics(ISI)2010, pages: 25-30
[8]    Farrahi, K.; Gatica-Perez, D. , “Probabilistic Mining of Socio-Geographic Routines From Mobile Phone Data”, IEEE Journal of
       Selected Topics in Signal Processing, Volume: 4, Issue: 4 Publication Year: 2010 , Page(s): 746 – 755
[9]    Simoes, J. Magedanz, T., “Can you predict human behavior?”, 14 th International Conference on Intelligence in Next Generation
       Networks (ICIN), 2010, Page(s): 1 – 6
[10]   Xu Yang; Yapeng Wang; Dan Wu; Ma, A., “K-means based clustering on mobile usage for social network analysis purpose”, IEEE,
       6 th International Conference on Advanced Information Management and Service(IMS), 2010, Page(s)-223-228
[11]   Huiqi Zhang; Dantu R., “Quantifying the presence of Phone Users”, 5 th IEEE Conference on Consumer Communication and
       Networking Conference, 2008, Page(s): 883 - 887
[12]   Michal Ficek, Lukas Kencl, “Spatial Extension of the Reality Mining Dataset”, Proceedings of IEEE 7 th International Conference
       on Mobild Adhoc and Sensor Systems(MASS), 2010
[13]   Zhenhui Li, Cindy Xide Lin, Bolin Ding, Jiawei Han, “Mining Significant time intervals for relationship detection” Proceedings of
       the 12 th international conference on Advances in spatial and temporal databases, 2011
[14]   Xiaowen Dong, Pascal Frossard, Pierre Vandergheynst, Nikolai Nefedov, “A regularization framework for mobile social network
       analysis” IEEE International Conference on Acoustics, Speech and Signal Processing, 2011




                                                           www.irjes.com                                                   39 | Page

More Related Content

What's hot

Internet of Things: Surveys for Measuring Human Activities from Everywhere
Internet of Things: Surveys for Measuring Human Activities from Everywhere Internet of Things: Surveys for Measuring Human Activities from Everywhere
Internet of Things: Surveys for Measuring Human Activities from Everywhere
IJECEIAES
 
Multi-objective NSGA-II based community detection using dynamical evolution s...
Multi-objective NSGA-II based community detection using dynamical evolution s...Multi-objective NSGA-II based community detection using dynamical evolution s...
Multi-objective NSGA-II based community detection using dynamical evolution s...
IJECEIAES
 
2012.03 social neuroscience for investigating social interaction in entrepris...
2012.03 social neuroscience for investigating social interaction in entrepris...2012.03 social neuroscience for investigating social interaction in entrepris...
2012.03 social neuroscience for investigating social interaction in entrepris...
Thierry Nabeth
 
Physical Cyber Social Computing
Physical Cyber Social ComputingPhysical Cyber Social Computing
Physical Cyber Social Computing
Amit Sheth
 
Matching Mobile Applications for Cross Promotion
Matching Mobile Applications for Cross PromotionMatching Mobile Applications for Cross Promotion
Matching Mobile Applications for Cross Promotion
Gene Moo Lee
 
Social Group Recommendation based on Big Data
Social Group Recommendation based on Big DataSocial Group Recommendation based on Big Data
Social Group Recommendation based on Big Data
ijtsrd
 
Relation of Coffee Break and Productivity
Relation of Coffee Break and ProductivityRelation of Coffee Break and Productivity
Relation of Coffee Break and Productivity
JavaCoffeeIQ.com
 
Online social network mining current trends and research issues
Online social network mining current trends and research issuesOnline social network mining current trends and research issues
Online social network mining current trends and research issues
eSAT Publishing House
 
2000-ACM-SigMobile-Mobile computing and communications review - Marc Smith - ...
2000-ACM-SigMobile-Mobile computing and communications review - Marc Smith - ...2000-ACM-SigMobile-Mobile computing and communications review - Marc Smith - ...
2000-ACM-SigMobile-Mobile computing and communications review - Marc Smith - ...
Marc Smith
 
Physical Cyber Social Computing: An early 21st century approach to Computing ...
Physical Cyber Social Computing: An early 21st century approach to Computing ...Physical Cyber Social Computing: An early 21st century approach to Computing ...
Physical Cyber Social Computing: An early 21st century approach to Computing ...
Amit Sheth
 
RoutineMaker: Towards End-User Automation of Daily Routines Using Smartphones
RoutineMaker: Towards End-User Automation of Daily Routines Using SmartphonesRoutineMaker: Towards End-User Automation of Daily Routines Using Smartphones
RoutineMaker: Towards End-User Automation of Daily Routines Using Smartphones
Ville Antila
 
Understanding the Privacy Implications of Using Context-based Awareness Cues ...
Understanding the Privacy Implications of Using Context-based Awareness Cues ...Understanding the Privacy Implications of Using Context-based Awareness Cues ...
Understanding the Privacy Implications of Using Context-based Awareness Cues ...
Ville Antila
 
Patterns based information systems organization (@ InFuture 2015)
Patterns based information systems organization (@ InFuture 2015) Patterns based information systems organization (@ InFuture 2015)
Patterns based information systems organization (@ InFuture 2015)
Sergej Lugovic
 
UbiComp2011: ContextCapture (Poster)
UbiComp2011: ContextCapture (Poster)UbiComp2011: ContextCapture (Poster)
UbiComp2011: ContextCapture (Poster)
Ville Antila
 
Event detection in twitter using text and image fusion
Event detection in twitter using text and image fusionEvent detection in twitter using text and image fusion
Event detection in twitter using text and image fusion
csandit
 
2009 - Connected Action - Marc Smith - Social Media Network Analysis
2009 - Connected Action - Marc Smith - Social Media Network Analysis2009 - Connected Action - Marc Smith - Social Media Network Analysis
2009 - Connected Action - Marc Smith - Social Media Network Analysis
Marc Smith
 
Social media platform and Our right to privacy
Social media platform and Our right to privacySocial media platform and Our right to privacy
Social media platform and Our right to privacy
vivatechijri
 
APPLYING THE TECHNOLOGY ACCEPTANCE MODEL TO UNDERSTAND SOCIAL NETWORKING
APPLYING THE TECHNOLOGY ACCEPTANCE MODEL TO UNDERSTAND SOCIAL NETWORKING APPLYING THE TECHNOLOGY ACCEPTANCE MODEL TO UNDERSTAND SOCIAL NETWORKING
APPLYING THE TECHNOLOGY ACCEPTANCE MODEL TO UNDERSTAND SOCIAL NETWORKING
ijcsit
 
Gordana Dodig-Crnkovic: Participating and Anticipating. Actors and Agents Net...
Gordana Dodig-Crnkovic: Participating and Anticipating. Actors and Agents Net...Gordana Dodig-Crnkovic: Participating and Anticipating. Actors and Agents Net...
Gordana Dodig-Crnkovic: Participating and Anticipating. Actors and Agents Net...
José Nafría
 
A Semantics-based Approach to Machine Perception
A Semantics-based Approach to Machine PerceptionA Semantics-based Approach to Machine Perception
A Semantics-based Approach to Machine Perception
Cory Andrew Henson
 

What's hot (20)

Internet of Things: Surveys for Measuring Human Activities from Everywhere
Internet of Things: Surveys for Measuring Human Activities from Everywhere Internet of Things: Surveys for Measuring Human Activities from Everywhere
Internet of Things: Surveys for Measuring Human Activities from Everywhere
 
Multi-objective NSGA-II based community detection using dynamical evolution s...
Multi-objective NSGA-II based community detection using dynamical evolution s...Multi-objective NSGA-II based community detection using dynamical evolution s...
Multi-objective NSGA-II based community detection using dynamical evolution s...
 
2012.03 social neuroscience for investigating social interaction in entrepris...
2012.03 social neuroscience for investigating social interaction in entrepris...2012.03 social neuroscience for investigating social interaction in entrepris...
2012.03 social neuroscience for investigating social interaction in entrepris...
 
Physical Cyber Social Computing
Physical Cyber Social ComputingPhysical Cyber Social Computing
Physical Cyber Social Computing
 
Matching Mobile Applications for Cross Promotion
Matching Mobile Applications for Cross PromotionMatching Mobile Applications for Cross Promotion
Matching Mobile Applications for Cross Promotion
 
Social Group Recommendation based on Big Data
Social Group Recommendation based on Big DataSocial Group Recommendation based on Big Data
Social Group Recommendation based on Big Data
 
Relation of Coffee Break and Productivity
Relation of Coffee Break and ProductivityRelation of Coffee Break and Productivity
Relation of Coffee Break and Productivity
 
Online social network mining current trends and research issues
Online social network mining current trends and research issuesOnline social network mining current trends and research issues
Online social network mining current trends and research issues
 
2000-ACM-SigMobile-Mobile computing and communications review - Marc Smith - ...
2000-ACM-SigMobile-Mobile computing and communications review - Marc Smith - ...2000-ACM-SigMobile-Mobile computing and communications review - Marc Smith - ...
2000-ACM-SigMobile-Mobile computing and communications review - Marc Smith - ...
 
Physical Cyber Social Computing: An early 21st century approach to Computing ...
Physical Cyber Social Computing: An early 21st century approach to Computing ...Physical Cyber Social Computing: An early 21st century approach to Computing ...
Physical Cyber Social Computing: An early 21st century approach to Computing ...
 
RoutineMaker: Towards End-User Automation of Daily Routines Using Smartphones
RoutineMaker: Towards End-User Automation of Daily Routines Using SmartphonesRoutineMaker: Towards End-User Automation of Daily Routines Using Smartphones
RoutineMaker: Towards End-User Automation of Daily Routines Using Smartphones
 
Understanding the Privacy Implications of Using Context-based Awareness Cues ...
Understanding the Privacy Implications of Using Context-based Awareness Cues ...Understanding the Privacy Implications of Using Context-based Awareness Cues ...
Understanding the Privacy Implications of Using Context-based Awareness Cues ...
 
Patterns based information systems organization (@ InFuture 2015)
Patterns based information systems organization (@ InFuture 2015) Patterns based information systems organization (@ InFuture 2015)
Patterns based information systems organization (@ InFuture 2015)
 
UbiComp2011: ContextCapture (Poster)
UbiComp2011: ContextCapture (Poster)UbiComp2011: ContextCapture (Poster)
UbiComp2011: ContextCapture (Poster)
 
Event detection in twitter using text and image fusion
Event detection in twitter using text and image fusionEvent detection in twitter using text and image fusion
Event detection in twitter using text and image fusion
 
2009 - Connected Action - Marc Smith - Social Media Network Analysis
2009 - Connected Action - Marc Smith - Social Media Network Analysis2009 - Connected Action - Marc Smith - Social Media Network Analysis
2009 - Connected Action - Marc Smith - Social Media Network Analysis
 
Social media platform and Our right to privacy
Social media platform and Our right to privacySocial media platform and Our right to privacy
Social media platform and Our right to privacy
 
APPLYING THE TECHNOLOGY ACCEPTANCE MODEL TO UNDERSTAND SOCIAL NETWORKING
APPLYING THE TECHNOLOGY ACCEPTANCE MODEL TO UNDERSTAND SOCIAL NETWORKING APPLYING THE TECHNOLOGY ACCEPTANCE MODEL TO UNDERSTAND SOCIAL NETWORKING
APPLYING THE TECHNOLOGY ACCEPTANCE MODEL TO UNDERSTAND SOCIAL NETWORKING
 
Gordana Dodig-Crnkovic: Participating and Anticipating. Actors and Agents Net...
Gordana Dodig-Crnkovic: Participating and Anticipating. Actors and Agents Net...Gordana Dodig-Crnkovic: Participating and Anticipating. Actors and Agents Net...
Gordana Dodig-Crnkovic: Participating and Anticipating. Actors and Agents Net...
 
A Semantics-based Approach to Machine Perception
A Semantics-based Approach to Machine PerceptionA Semantics-based Approach to Machine Perception
A Semantics-based Approach to Machine Perception
 

Viewers also liked

Blogging4Good @ BlogCamp Mumbai 2010 - Ads4Good.org
Blogging4Good @ BlogCamp Mumbai 2010 - Ads4Good.orgBlogging4Good @ BlogCamp Mumbai 2010 - Ads4Good.org
Blogging4Good @ BlogCamp Mumbai 2010 - Ads4Good.org
★ Akshay Surve
 
seguridad
seguridadseguridad
seguridad
phunziker
 
Putting Medical Officer of Health Reports on the map - Natalie Pollecutt, Wel...
Putting Medical Officer of Health Reports on the map - Natalie Pollecutt, Wel...Putting Medical Officer of Health Reports on the map - Natalie Pollecutt, Wel...
Putting Medical Officer of Health Reports on the map - Natalie Pollecutt, Wel...
JISC GECO
 
De normalised london aggregation framework overview
De normalised london  aggregation framework overview De normalised london  aggregation framework overview
De normalised london aggregation framework overview
Chris Harris
 
Proyecto tabletas
Proyecto tabletasProyecto tabletas
Proyecto tabletas
Fabian Roldan
 
Os Harris
Os HarrisOs Harris
Os Harris
oscon2007
 
Misión Comercial a México
Misión Comercial  a MéxicoMisión Comercial  a México
Misión Comercial a México
pymesaldia
 

Viewers also liked (7)

Blogging4Good @ BlogCamp Mumbai 2010 - Ads4Good.org
Blogging4Good @ BlogCamp Mumbai 2010 - Ads4Good.orgBlogging4Good @ BlogCamp Mumbai 2010 - Ads4Good.org
Blogging4Good @ BlogCamp Mumbai 2010 - Ads4Good.org
 
seguridad
seguridadseguridad
seguridad
 
Putting Medical Officer of Health Reports on the map - Natalie Pollecutt, Wel...
Putting Medical Officer of Health Reports on the map - Natalie Pollecutt, Wel...Putting Medical Officer of Health Reports on the map - Natalie Pollecutt, Wel...
Putting Medical Officer of Health Reports on the map - Natalie Pollecutt, Wel...
 
De normalised london aggregation framework overview
De normalised london  aggregation framework overview De normalised london  aggregation framework overview
De normalised london aggregation framework overview
 
Proyecto tabletas
Proyecto tabletasProyecto tabletas
Proyecto tabletas
 
Os Harris
Os HarrisOs Harris
Os Harris
 
Misión Comercial a México
Misión Comercial  a MéxicoMisión Comercial  a México
Misión Comercial a México
 

Similar to E223539

Oulasvirta 2011 puc habits make smart phone use more pervasive
Oulasvirta 2011 puc habits make smart phone use more pervasiveOulasvirta 2011 puc habits make smart phone use more pervasive
Oulasvirta 2011 puc habits make smart phone use more pervasive
Constantin Cocioaba
 
Visually Exploring Social Participation in Encyclopedia of Life
Visually Exploring Social Participation in Encyclopedia of LifeVisually Exploring Social Participation in Encyclopedia of Life
Visually Exploring Social Participation in Encyclopedia of Life
Harish Vaidyanathan
 
Emerged computer interaction with humanity social computing
Emerged computer interaction with humanity social computingEmerged computer interaction with humanity social computing
Emerged computer interaction with humanity social computing
ijcsa
 
Towards the Integration of Spatiotemporal User-Generated Content and Sensor Data
Towards the Integration of Spatiotemporal User-Generated Content and Sensor DataTowards the Integration of Spatiotemporal User-Generated Content and Sensor Data
Towards the Integration of Spatiotemporal User-Generated Content and Sensor Data
Cornelius Rabsch
 
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET Journal
 
Expelling Information of Events from Critical Public Space using Social Senso...
Expelling Information of Events from Critical Public Space using Social Senso...Expelling Information of Events from Critical Public Space using Social Senso...
Expelling Information of Events from Critical Public Space using Social Senso...
ijtsrd
 
Дорожная карта промышленного интернета
Дорожная карта промышленного интернетаДорожная карта промышленного интернета
Дорожная карта промышленного интернета
Sergey Zhdanov
 
Big Data for Development: Opportunities and Challenges, Summary Slidedeck
Big Data for Development: Opportunities and Challenges, Summary SlidedeckBig Data for Development: Opportunities and Challenges, Summary Slidedeck
Big Data for Development: Opportunities and Challenges, Summary Slidedeck
UN Global Pulse
 
Digital Trails Dave King 1 5 10 Part 1 D3
Digital Trails   Dave King   1 5 10   Part 1 D3Digital Trails   Dave King   1 5 10   Part 1 D3
Digital Trails Dave King 1 5 10 Part 1 D3
Dave King
 
A Survey On Recent Research Areas In Computer Science
A Survey On Recent Research Areas In Computer ScienceA Survey On Recent Research Areas In Computer Science
A Survey On Recent Research Areas In Computer Science
Christine Williams
 
An updated look at social network extraction system a personal data analysis ...
An updated look at social network extraction system a personal data analysis ...An updated look at social network extraction system a personal data analysis ...
An updated look at social network extraction system a personal data analysis ...
eSAT Publishing House
 
Online social network
Online social networkOnline social network
Online social network
ingenioustech
 
Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...
Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...
Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...
BAINIDA
 
1999 ACM SIGCHI - Counting on Community in Cyberspace
1999   ACM SIGCHI - Counting on Community in Cyberspace1999   ACM SIGCHI - Counting on Community in Cyberspace
1999 ACM SIGCHI - Counting on Community in Cyberspace
Marc Smith
 
Current trends of opinion mining and sentiment analysis in social networks
Current trends of opinion mining and sentiment analysis in social networksCurrent trends of opinion mining and sentiment analysis in social networks
Current trends of opinion mining and sentiment analysis in social networks
eSAT Publishing House
 
Computational Social Science
Computational Social ScienceComputational Social Science
Computational Social Science
journal ijrtem
 
The evolution of AI in workplaces
The evolution of AI in workplacesThe evolution of AI in workplaces
The evolution of AI in workplaces
Elisabetta Delponte
 
Framework for A Personalized Intelligent Assistant to Elderly People for Acti...
Framework for A Personalized Intelligent Assistant to Elderly People for Acti...Framework for A Personalized Intelligent Assistant to Elderly People for Acti...
Framework for A Personalized Intelligent Assistant to Elderly People for Acti...
CSCJournals
 
Increasing the Investment’s Opportunities in Kingdom of Saudi Arabia By Study...
Increasing the Investment’s Opportunities in Kingdom of Saudi Arabia By Study...Increasing the Investment’s Opportunities in Kingdom of Saudi Arabia By Study...
Increasing the Investment’s Opportunities in Kingdom of Saudi Arabia By Study...
AIRCC Publishing Corporation
 
INCREASING THE INVESTMENT’S OPPORTUNITIES IN KINGDOM OF SAUDI ARABIA BY STUDY...
INCREASING THE INVESTMENT’S OPPORTUNITIES IN KINGDOM OF SAUDI ARABIA BY STUDY...INCREASING THE INVESTMENT’S OPPORTUNITIES IN KINGDOM OF SAUDI ARABIA BY STUDY...
INCREASING THE INVESTMENT’S OPPORTUNITIES IN KINGDOM OF SAUDI ARABIA BY STUDY...
ijcsit
 

Similar to E223539 (20)

Oulasvirta 2011 puc habits make smart phone use more pervasive
Oulasvirta 2011 puc habits make smart phone use more pervasiveOulasvirta 2011 puc habits make smart phone use more pervasive
Oulasvirta 2011 puc habits make smart phone use more pervasive
 
Visually Exploring Social Participation in Encyclopedia of Life
Visually Exploring Social Participation in Encyclopedia of LifeVisually Exploring Social Participation in Encyclopedia of Life
Visually Exploring Social Participation in Encyclopedia of Life
 
Emerged computer interaction with humanity social computing
Emerged computer interaction with humanity social computingEmerged computer interaction with humanity social computing
Emerged computer interaction with humanity social computing
 
Towards the Integration of Spatiotemporal User-Generated Content and Sensor Data
Towards the Integration of Spatiotemporal User-Generated Content and Sensor DataTowards the Integration of Spatiotemporal User-Generated Content and Sensor Data
Towards the Integration of Spatiotemporal User-Generated Content and Sensor Data
 
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
 
Expelling Information of Events from Critical Public Space using Social Senso...
Expelling Information of Events from Critical Public Space using Social Senso...Expelling Information of Events from Critical Public Space using Social Senso...
Expelling Information of Events from Critical Public Space using Social Senso...
 
Дорожная карта промышленного интернета
Дорожная карта промышленного интернетаДорожная карта промышленного интернета
Дорожная карта промышленного интернета
 
Big Data for Development: Opportunities and Challenges, Summary Slidedeck
Big Data for Development: Opportunities and Challenges, Summary SlidedeckBig Data for Development: Opportunities and Challenges, Summary Slidedeck
Big Data for Development: Opportunities and Challenges, Summary Slidedeck
 
Digital Trails Dave King 1 5 10 Part 1 D3
Digital Trails   Dave King   1 5 10   Part 1 D3Digital Trails   Dave King   1 5 10   Part 1 D3
Digital Trails Dave King 1 5 10 Part 1 D3
 
A Survey On Recent Research Areas In Computer Science
A Survey On Recent Research Areas In Computer ScienceA Survey On Recent Research Areas In Computer Science
A Survey On Recent Research Areas In Computer Science
 
An updated look at social network extraction system a personal data analysis ...
An updated look at social network extraction system a personal data analysis ...An updated look at social network extraction system a personal data analysis ...
An updated look at social network extraction system a personal data analysis ...
 
Online social network
Online social networkOnline social network
Online social network
 
Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...
Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...
Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...
 
1999 ACM SIGCHI - Counting on Community in Cyberspace
1999   ACM SIGCHI - Counting on Community in Cyberspace1999   ACM SIGCHI - Counting on Community in Cyberspace
1999 ACM SIGCHI - Counting on Community in Cyberspace
 
Current trends of opinion mining and sentiment analysis in social networks
Current trends of opinion mining and sentiment analysis in social networksCurrent trends of opinion mining and sentiment analysis in social networks
Current trends of opinion mining and sentiment analysis in social networks
 
Computational Social Science
Computational Social ScienceComputational Social Science
Computational Social Science
 
The evolution of AI in workplaces
The evolution of AI in workplacesThe evolution of AI in workplaces
The evolution of AI in workplaces
 
Framework for A Personalized Intelligent Assistant to Elderly People for Acti...
Framework for A Personalized Intelligent Assistant to Elderly People for Acti...Framework for A Personalized Intelligent Assistant to Elderly People for Acti...
Framework for A Personalized Intelligent Assistant to Elderly People for Acti...
 
Increasing the Investment’s Opportunities in Kingdom of Saudi Arabia By Study...
Increasing the Investment’s Opportunities in Kingdom of Saudi Arabia By Study...Increasing the Investment’s Opportunities in Kingdom of Saudi Arabia By Study...
Increasing the Investment’s Opportunities in Kingdom of Saudi Arabia By Study...
 
INCREASING THE INVESTMENT’S OPPORTUNITIES IN KINGDOM OF SAUDI ARABIA BY STUDY...
INCREASING THE INVESTMENT’S OPPORTUNITIES IN KINGDOM OF SAUDI ARABIA BY STUDY...INCREASING THE INVESTMENT’S OPPORTUNITIES IN KINGDOM OF SAUDI ARABIA BY STUDY...
INCREASING THE INVESTMENT’S OPPORTUNITIES IN KINGDOM OF SAUDI ARABIA BY STUDY...
 

More from irjes

Automatic Safety Door Lock System for Car
Automatic Safety Door Lock System for CarAutomatic Safety Door Lock System for Car
Automatic Safety Door Lock System for Car
irjes
 
Squared Multi-hole Extrusion Process: Experimentation & Optimization
Squared Multi-hole Extrusion Process: Experimentation & OptimizationSquared Multi-hole Extrusion Process: Experimentation & Optimization
Squared Multi-hole Extrusion Process: Experimentation & Optimization
irjes
 
Analysis of Agile and Multi-Agent Based Process Scheduling Model
Analysis of Agile and Multi-Agent Based Process Scheduling ModelAnalysis of Agile and Multi-Agent Based Process Scheduling Model
Analysis of Agile and Multi-Agent Based Process Scheduling Model
irjes
 
Effects of Cutting Tool Parameters on Surface Roughness
Effects of Cutting Tool Parameters on Surface RoughnessEffects of Cutting Tool Parameters on Surface Roughness
Effects of Cutting Tool Parameters on Surface Roughness
irjes
 
Possible limits of accuracy in measurement of fundamental physical constants
Possible limits of accuracy in measurement of fundamental physical constantsPossible limits of accuracy in measurement of fundamental physical constants
Possible limits of accuracy in measurement of fundamental physical constants
irjes
 
Performance Comparison of Energy Detection Based Spectrum Sensing for Cogniti...
Performance Comparison of Energy Detection Based Spectrum Sensing for Cogniti...Performance Comparison of Energy Detection Based Spectrum Sensing for Cogniti...
Performance Comparison of Energy Detection Based Spectrum Sensing for Cogniti...
irjes
 
Comparative Study of Pre-Engineered and Conventional Steel Frames for Differe...
Comparative Study of Pre-Engineered and Conventional Steel Frames for Differe...Comparative Study of Pre-Engineered and Conventional Steel Frames for Differe...
Comparative Study of Pre-Engineered and Conventional Steel Frames for Differe...
irjes
 
Flip bifurcation and chaos control in discrete-time Prey-predator model
Flip bifurcation and chaos control in discrete-time Prey-predator model Flip bifurcation and chaos control in discrete-time Prey-predator model
Flip bifurcation and chaos control in discrete-time Prey-predator model
irjes
 
Energy Awareness and the Role of “Critical Mass” In Smart Cities
Energy Awareness and the Role of “Critical Mass” In Smart CitiesEnergy Awareness and the Role of “Critical Mass” In Smart Cities
Energy Awareness and the Role of “Critical Mass” In Smart Cities
irjes
 
A Firefly Algorithm for Optimizing Spur Gear Parameters Under Non-Lubricated ...
A Firefly Algorithm for Optimizing Spur Gear Parameters Under Non-Lubricated ...A Firefly Algorithm for Optimizing Spur Gear Parameters Under Non-Lubricated ...
A Firefly Algorithm for Optimizing Spur Gear Parameters Under Non-Lubricated ...
irjes
 
The Effect of Orientation of Vortex Generators on Aerodynamic Drag Reduction ...
The Effect of Orientation of Vortex Generators on Aerodynamic Drag Reduction ...The Effect of Orientation of Vortex Generators on Aerodynamic Drag Reduction ...
The Effect of Orientation of Vortex Generators on Aerodynamic Drag Reduction ...
irjes
 
An Assessment of The Relationship Between The Availability of Financial Resou...
An Assessment of The Relationship Between The Availability of Financial Resou...An Assessment of The Relationship Between The Availability of Financial Resou...
An Assessment of The Relationship Between The Availability of Financial Resou...
irjes
 
The Choice of Antenatal Care and Delivery Place in Surabaya (Based on Prefere...
The Choice of Antenatal Care and Delivery Place in Surabaya (Based on Prefere...The Choice of Antenatal Care and Delivery Place in Surabaya (Based on Prefere...
The Choice of Antenatal Care and Delivery Place in Surabaya (Based on Prefere...
irjes
 
Prediction of the daily global solar irradiance received on a horizontal surf...
Prediction of the daily global solar irradiance received on a horizontal surf...Prediction of the daily global solar irradiance received on a horizontal surf...
Prediction of the daily global solar irradiance received on a horizontal surf...
irjes
 
HARMONIC ANALYSIS ASSOCIATED WITH A GENERALIZED BESSEL-STRUVE OPERATOR ON THE...
HARMONIC ANALYSIS ASSOCIATED WITH A GENERALIZED BESSEL-STRUVE OPERATOR ON THE...HARMONIC ANALYSIS ASSOCIATED WITH A GENERALIZED BESSEL-STRUVE OPERATOR ON THE...
HARMONIC ANALYSIS ASSOCIATED WITH A GENERALIZED BESSEL-STRUVE OPERATOR ON THE...
irjes
 
The Role of Community Participation in Planning Processes of Emerging Urban C...
The Role of Community Participation in Planning Processes of Emerging Urban C...The Role of Community Participation in Planning Processes of Emerging Urban C...
The Role of Community Participation in Planning Processes of Emerging Urban C...
irjes
 
Understanding the Concept of Strategic Intent
Understanding the Concept of Strategic IntentUnderstanding the Concept of Strategic Intent
Understanding the Concept of Strategic Intent
irjes
 
The (R, Q) Control of A Mixture Inventory Model with Backorders and Lost Sale...
The (R, Q) Control of A Mixture Inventory Model with Backorders and Lost Sale...The (R, Q) Control of A Mixture Inventory Model with Backorders and Lost Sale...
The (R, Q) Control of A Mixture Inventory Model with Backorders and Lost Sale...
irjes
 
Relation Between Stress And Menstrual Cycle At 18-21 Years Of Age
Relation Between Stress And Menstrual Cycle At 18-21 Years Of AgeRelation Between Stress And Menstrual Cycle At 18-21 Years Of Age
Relation Between Stress And Menstrual Cycle At 18-21 Years Of Age
irjes
 
Wave Transmission on Submerged Breakwater with Interlocking D-Block Armor
Wave Transmission on Submerged Breakwater with Interlocking D-Block ArmorWave Transmission on Submerged Breakwater with Interlocking D-Block Armor
Wave Transmission on Submerged Breakwater with Interlocking D-Block Armor
irjes
 

More from irjes (20)

Automatic Safety Door Lock System for Car
Automatic Safety Door Lock System for CarAutomatic Safety Door Lock System for Car
Automatic Safety Door Lock System for Car
 
Squared Multi-hole Extrusion Process: Experimentation & Optimization
Squared Multi-hole Extrusion Process: Experimentation & OptimizationSquared Multi-hole Extrusion Process: Experimentation & Optimization
Squared Multi-hole Extrusion Process: Experimentation & Optimization
 
Analysis of Agile and Multi-Agent Based Process Scheduling Model
Analysis of Agile and Multi-Agent Based Process Scheduling ModelAnalysis of Agile and Multi-Agent Based Process Scheduling Model
Analysis of Agile and Multi-Agent Based Process Scheduling Model
 
Effects of Cutting Tool Parameters on Surface Roughness
Effects of Cutting Tool Parameters on Surface RoughnessEffects of Cutting Tool Parameters on Surface Roughness
Effects of Cutting Tool Parameters on Surface Roughness
 
Possible limits of accuracy in measurement of fundamental physical constants
Possible limits of accuracy in measurement of fundamental physical constantsPossible limits of accuracy in measurement of fundamental physical constants
Possible limits of accuracy in measurement of fundamental physical constants
 
Performance Comparison of Energy Detection Based Spectrum Sensing for Cogniti...
Performance Comparison of Energy Detection Based Spectrum Sensing for Cogniti...Performance Comparison of Energy Detection Based Spectrum Sensing for Cogniti...
Performance Comparison of Energy Detection Based Spectrum Sensing for Cogniti...
 
Comparative Study of Pre-Engineered and Conventional Steel Frames for Differe...
Comparative Study of Pre-Engineered and Conventional Steel Frames for Differe...Comparative Study of Pre-Engineered and Conventional Steel Frames for Differe...
Comparative Study of Pre-Engineered and Conventional Steel Frames for Differe...
 
Flip bifurcation and chaos control in discrete-time Prey-predator model
Flip bifurcation and chaos control in discrete-time Prey-predator model Flip bifurcation and chaos control in discrete-time Prey-predator model
Flip bifurcation and chaos control in discrete-time Prey-predator model
 
Energy Awareness and the Role of “Critical Mass” In Smart Cities
Energy Awareness and the Role of “Critical Mass” In Smart CitiesEnergy Awareness and the Role of “Critical Mass” In Smart Cities
Energy Awareness and the Role of “Critical Mass” In Smart Cities
 
A Firefly Algorithm for Optimizing Spur Gear Parameters Under Non-Lubricated ...
A Firefly Algorithm for Optimizing Spur Gear Parameters Under Non-Lubricated ...A Firefly Algorithm for Optimizing Spur Gear Parameters Under Non-Lubricated ...
A Firefly Algorithm for Optimizing Spur Gear Parameters Under Non-Lubricated ...
 
The Effect of Orientation of Vortex Generators on Aerodynamic Drag Reduction ...
The Effect of Orientation of Vortex Generators on Aerodynamic Drag Reduction ...The Effect of Orientation of Vortex Generators on Aerodynamic Drag Reduction ...
The Effect of Orientation of Vortex Generators on Aerodynamic Drag Reduction ...
 
An Assessment of The Relationship Between The Availability of Financial Resou...
An Assessment of The Relationship Between The Availability of Financial Resou...An Assessment of The Relationship Between The Availability of Financial Resou...
An Assessment of The Relationship Between The Availability of Financial Resou...
 
The Choice of Antenatal Care and Delivery Place in Surabaya (Based on Prefere...
The Choice of Antenatal Care and Delivery Place in Surabaya (Based on Prefere...The Choice of Antenatal Care and Delivery Place in Surabaya (Based on Prefere...
The Choice of Antenatal Care and Delivery Place in Surabaya (Based on Prefere...
 
Prediction of the daily global solar irradiance received on a horizontal surf...
Prediction of the daily global solar irradiance received on a horizontal surf...Prediction of the daily global solar irradiance received on a horizontal surf...
Prediction of the daily global solar irradiance received on a horizontal surf...
 
HARMONIC ANALYSIS ASSOCIATED WITH A GENERALIZED BESSEL-STRUVE OPERATOR ON THE...
HARMONIC ANALYSIS ASSOCIATED WITH A GENERALIZED BESSEL-STRUVE OPERATOR ON THE...HARMONIC ANALYSIS ASSOCIATED WITH A GENERALIZED BESSEL-STRUVE OPERATOR ON THE...
HARMONIC ANALYSIS ASSOCIATED WITH A GENERALIZED BESSEL-STRUVE OPERATOR ON THE...
 
The Role of Community Participation in Planning Processes of Emerging Urban C...
The Role of Community Participation in Planning Processes of Emerging Urban C...The Role of Community Participation in Planning Processes of Emerging Urban C...
The Role of Community Participation in Planning Processes of Emerging Urban C...
 
Understanding the Concept of Strategic Intent
Understanding the Concept of Strategic IntentUnderstanding the Concept of Strategic Intent
Understanding the Concept of Strategic Intent
 
The (R, Q) Control of A Mixture Inventory Model with Backorders and Lost Sale...
The (R, Q) Control of A Mixture Inventory Model with Backorders and Lost Sale...The (R, Q) Control of A Mixture Inventory Model with Backorders and Lost Sale...
The (R, Q) Control of A Mixture Inventory Model with Backorders and Lost Sale...
 
Relation Between Stress And Menstrual Cycle At 18-21 Years Of Age
Relation Between Stress And Menstrual Cycle At 18-21 Years Of AgeRelation Between Stress And Menstrual Cycle At 18-21 Years Of Age
Relation Between Stress And Menstrual Cycle At 18-21 Years Of Age
 
Wave Transmission on Submerged Breakwater with Interlocking D-Block Armor
Wave Transmission on Submerged Breakwater with Interlocking D-Block ArmorWave Transmission on Submerged Breakwater with Interlocking D-Block Armor
Wave Transmission on Submerged Breakwater with Interlocking D-Block Armor
 

E223539

  • 1. International Refereed Journal of Engineering and Science (IRJES) ISSN (Online) 2319-183X, (Print) 2319-1821 Volume 2, Issue 2(February 2013), PP.35-39 www.irjes.com Current Trends in Reality Mining Jyoti More1, Chelpa Lingam2 1 Lokmanya Tilak College of Engg., Koparkhairane (affiliated to Mumbai University), INDIA 2 Pillai's HOC College of Engineering & Technology, Rasayani (affiliated to Mumbai University), INDIA Abstract: We live in a technology driven society where, each one of us continuously leaves digital traces behind. Our mobile phones, for example, continuously sense our movements and interactions. This socio- geographic data could be continuously captured by millions of people around the world and promises to reveal important behavioral clues about humans. Mining patterns of human behavior from large-scale mobile phone data has deep potential impact on society. Reality Mining, pioneered by Nathan Eagle and Alex Pentland, (Massachusetts Institute of Technology (MIT)) is defined as the study of human social behavior based on wireless mobile phone sensed data. Reality mining is based on data collected by sensors in mobile phones, cars, security cameras, RFID ('smart card') readers, and others, all allow for the measurement of human physical and social activity. Applications of reality mining are in diverse fields like epidemiology, psychology, urban planning, security, marketing and even analysis of poverty. This paper attempts to overview and analyzes the current trends in reality mining. It also presents the current challenges in this field. Keywords: Reality Mining, Social Network Mining, Context aware computing I. INTRODUCTION Reality Mining is defined as the study of human social behavior based on wireless mobile phone sensed data by Nathan Eagle and Alex Pentland, (Massachusetts Institute of Technology (MIT). It is the collection and analysis of machine-sensed environmental data pertaining to human social behavior, with the goal of identifying predictable patterns of behavior. Mobile phones are promising electronic devices as sensors due to their vast usage over the world on a daily continuous basis, and also due to the numerous types of sensors embedded in the device. The mobile phone has developed, due to its paramount nature, from a simple communication device to include many other tools such as a cameras, browsers, games, calendars, alarm clocks, and will surely continue to develop in the future. All of these forms of data can be analyzed to reveal details about human behavior. Sensors are everywhere, continuously gathering information as we live our daily lives. Whether using email, the telephone, a bank machine, or even simpler activities such as driving, using a photocopy machine, and a camera, all of these activities leave traces of our behavior. Recently, the communication devices have been viewed from an engineering perspective as sensors, capturing data which scientists in many disciplines are very excited about. This data potentially impacts every one of us as researchers begin to study the possibilities of their use. Research using mobile phone data has mostly focused on location-driven data analysis, more specifically, using Global Positioning System (GPS) data to predict transportation modes to predict user destinations or paths, and to predict daily step count. Other location-driven tasks have made use of Global System for Mobile Communications (GSM) data for indoor localization or WiFi for large-scale localization . There are several works related to activity modeling from location-driven phone sensor data. CitySense is a mobile application which uses GPS and WiFi data to summarize “hotspots” of activity a city, which can then be used to make recommendations to people regarding, for example, preferred restaurants. Applications to society as a whole are being investigated in terms of epidemiology and psychology, urban planning, security, and even in the analysis of poverty. This paper focuses on the possibilities, scope and challenges related to reality mining. A brief review has been carried out for this purpose. II. SOCIAL NETWORKS A Social network is defined as a set of actors (individuals) and the ties (relationships) among them. Important research problems include the study of social networks’ structural properties (such as community detection and evolution), user properties (such as reputation and trustworthiness), and user social relations (including influence and trust). Social networks are either explicitly specified, such as a Facebook friends list, or www.irjes.com 35 | Page
  • 2. Current Trends in Reality Mining implicitly inferred from social interactions such as email or mobile phone communications. Important research problems include the study of social networks’ structural properties (such as community detection and evolution), user properties (such as reputation and trustworthiness), and user social relations (including influence and trust). 2.1 Social Networks as Graphs Social networks are naturally modeled as undirected graphs(fig 1). The entities are the nodes, and an edge connects two nodes if the nodes are related by the relationship that characterizes the network. If there is a degree associated with the relationship, this degree is represented by labeling the edges. Fig 1.: Example of a small social network represented as graph Many Interations similar opinion Few interactions, different opinion Fig 2.: Using Social Network Mining to estimate strengths of social relations 2.2 Social network mining In social network mining, we apply data mining algorithms to study large-scale social networks. Social network mining has attracted a lot of attention for many reasons. For example, studying large social networks allows us to understand social behaviors in different contexts. In addition, by analyzing the roles of the people involved in the network, we can understand how information and opinions spread within the network, and who are the most influential people . In addition, since social network users may receive too much information from time to time, social network mining can be used to support them by providing recommendations and filtering information on their behalf. III. CONTEXT AWARE COMPUTING Context is a combination of any information that can be sensed or received by an entity which is useful to catch events and situations.Context-aware computing uses information about an end user’s or object’s environment, activities, connections and preferences to improve the quality of interaction with that end user or object. A contextually aware system anticipates the user’s needs and proactively serves up the most appropriate and customized content, product or service. Applications that use context, whether on a desktop or in a mobile or ubiquitous computing environment, are called context-aware. There are four catagories of context aware applications:  Proximate Selection: Presents information, which is selected considering some context to ease a choice. www.irjes.com 36 | Page
  • 3. Current Trends in Reality Mining  Automatic Contextual Reconfiguration: Current context automatically leads to new information.The entity creates new bindings to context resources.  Contextual Information and Commands: Information and commands are shown / executed manually and adapted to the current situation.  Context-Triggered Actions: The current context leads an application to start a process automatically [2] IV. CURRENT TRENDS The Pioneers of reality Mining, the researchers of MIT, Nathan Eagle & Alex (Sandy) Pentland et.al [4] introduced a system for sensing complex social systems with data collected from 100 mobile phones over the course of 9 months. They demonstrated the ability to use standard Bluetooth-enabled mobile telephones to measure information access and use in different contexts, recognize social patterns in daily user activity, infer relationships, identify socially significant locations, and model organizational rhythms. The major findings included Behavior Prediction, Relationship Inference and Computational Social Science. Further, N. Eagle, A. Pentland, and D. Lazer et. al[5] analyzed 330,000 hours of continuous behavioral data logged by the mobile phones of 94 subjects, and compared these observations with self report relational data. The information from these two data sources is overlapping but distinct, and the accuracy of self report data is considerably affected by such factors as the recency and salience of particular interactions. A new method is proposed for precise measurements of large-scale human behavior based on contextualized proximity and communication data alone, and identify characteristic behavioral signatures of relationships that allowed to accurately predict 95% of the reciprocated friendships in the study. Using these behavioral signatures it could be possible to predict, individual-level outcomes such as job satisfaction. The dataset built during these experiments is still being used by many researchers for their experimentation. Further the field was explored by many researchers for various applications. Huiqi Zhang; Dantu, R.; Cangussu, J.W. et.al [6] proposed in their paper, a socioscope model for social-network and human-behavior analysis based on mobile-phone call-detail records. Because of the diversity and complexity of human social behavior, no one technique will detect every attribute that arises when humans engage in social behaviors. They used multiple probability and statistical methods for quantifying social groups, relationships, and communication patterns and for detecting human-behavior changes. They proposed a new index to measure the level of reciprocity between users and their communication partners. This reciprocity index has application in homeland security, detection of unwanted calls (e.g., spam), telecommunication presence, and product marketing. Zhang, Huiqi; Dantu, Ram et. al [7] proposed that the social-tie strengths of person-to-person are different one another even though they are in the same group. In this paper the researchers investigated the evolution of person-to-person social relationships, quantify and predict social tie strengths based on call-detail records of mobile phones. They proposed an affinity model for quantifying social-tie strengths in which a reciprocity index is integrated to measure the level of reciprocity between users and their communication partners. Since human social relationships change over time, they map the call-log data to time series of the social-tie strengths by the affinity model. Then they used ARIMA model to predict social-tie strengths. Farrahi, K.; Gatica-Perez, D. et. al.[8] suggested that human interaction data, or human proximity, obtained by mobile phone Bluetooth sensor data, can be integrated with human location data, obtained by mobile cell tower connections, to mine meaningful details about human activities from large and noisy datasets. They propose a model, called bag of multimodal behavior, that integrates the modeling of variations of location over multiple time-scales, and the modeling of interaction types from proximity. They further demonstrate the feasibility of the topic modeling framework for human routine discovery by predicting missing multimodal phone data at specific times of the day. Simoes J., Magedanz, T. et. al. [9] proposed a work by combining social network analysis, reality mining techniques and context-aware systems. This work provides an architecture and ground steps for understanding and predicting human behavior and preferences within one of the most promising business models of the future: “Advertising”. Furthermore, it shows how user related data (context) can be securely managed and exposed to 3rd party providers, taking into account user context-aware privacy settings. The presented concepts are then realized in a prototype, which evaluates the basic functionalities previously described. Xu Yang, Yapeng Wang, et. al.[10] studied data mining for social network analysis purpose, which aims at finding people's social network patterns by analyzing the information about their mobile phone usage. In this research, the real database of MIT's Reality Mining project is employed. The classification model presented in this project provides a new approach to find the proximity between users - based on their registration frequencies to specific cellular towers associated their working places. K-means Algorithm is applied for clustering. www.irjes.com 37 | Page
  • 4. Current Trends in Reality Mining Huiqi Zhang; Dantu, R. et. al.[11] proposed the Bayesian inference model to calculate the willingness level of the callee to accept calls. Before making a call, the caller may use the willingness calculator to find out whether the callee is available. Based on this level the user can make a decision whether to make a call. They used time of the day, day of the week, talk-time and location for calculating the willingness level. Michal Ficek, Lukas Kencl [12] proposed that the data captured from a live cellular network with the real users during their common daily routine help to understand how the users move within the network. Unlike the simulations with limited potential or expensive experimental studies, the research in user-mobility or spatio- temporal user behavior can be conducted on publicly available datasets such as the Reality Mining Dataset. These data have been for many years a source of valuable information about social interconnection between users and user-network associations. However, an important, spatial dimension is missing in this dataset. In this paper, the researchers present a methodology for retrieving geographical locations matching the GSM cell identifiers in the Reality Mining Dataset, an approach based on querying the Google Location API. A statistical analysis of the measure of success of locations retrieval is provided. Further, they presented the LAC-clustering method for detecting and removing outliers, a heuristic extension of general agglomerative hierarchical clustering. This methodology enables further, previously impossible analysis of the Reality Mining Dataset, such as studying user mobility patterns, describing spatial trajectories and mining the spatio-temporal data. Zhenhui Li, Cindy Xide Lin et. al.[13] emphasized that Spatio-temporal data collected from GPS have become an important resource to study the relationships of moving objects. While previous studies focus on mining objects being together for a long time, discovering real-world relationships, such as friends or colleagues in human trajectory data, is a fundamentally different challenge. For example, it is possible that two individuals are friends but do not spend a lot of time being together every day. However, spending just one or two hours together at a location away from work on a Saturday night could be a strong indicator of friend relationship. Based on the above observations, in this paper the researchers aim to analyze and detect semantically meaningful relationships in a supervised way. That is, with an interested relationship in mind, a user can label some object pairs with and without such relationship. From labeled pairs, it is learnt that time intervals are the most important ones in order to characterize this relationship. These significant time intervals, namely T-Motifs, are then used to discover relationships hidden in the unlabeled moving object pairs. Xiaowen Dong, Pascal Frossard et. al.[14] proposed that mobile phone data provides rich dynamic information on human activities in social network analysis. In this paper, the researchers represent data from two different modalities as a graph and functions defined on the vertex set of the graph. They propose a regularization framework for the joint utilization of these two modalities of data, which enables them to model evolution of social network information and efficiently classify relationships among mobile phone users. From the above survey it is observed that the reality mining still has a large potential of getting explored and contribute to ubiquitous computing field. It is one aspect of digital footprint analysis. Much more experimentations could be carried out to analyze the social ties and predict human behavior that could be helpful in exploring parallel universes of opinion mining, emotional mining, social network mining, etc. V. SIGNIFICANCE OF THE STUDY  Security: Reality mining can be a great tool to track terrorists as mobile phone networks can identify unusual patterns of movement and communication. GPS-enabled mobile phones and tracking devices are installed on commercial vehicles to monitor traffic conditions. It facilitates in tracking of real-time traffic congestion data.  Business: It can help companies to boost inter-office cooperation. Mining Task-Based Social Networks can be used to explore Collaboration in Software Teams. Event planners who manage multi-million dollar conventions and conferences can avail the data and make the best out of it. Telecom companies can analyze the service usage and can enhance customer service.  Healthcare: Reality mining has the ability to contribute immensely towards healthcare. By gathering health related information through mobiles, they can predict disease outbreaks. With the aid of audio or motion sensors, changes in the nervous system can be deducted and this information could be used to screen depression.  Viral marketing, viral advertising: these are the buzzwords referring to marketing techniques that use pre-existing social networks and other technologies to produce increases in brand awareness or to achieve other marketing objectives (such as product sales) through self-replicating viral processes, analogous to the spread of viruses or computer viruses. It can be delivered by word of mouth or enhanced by the network effects of the Internet and mobile networks. Viral marketing may take the form of video clips, interactive Flash games, advergames, ebooks, images, text messages,email messages, or web pages.  Digital Footprinting: Uncovering or tracing the tourists with User-Generated Content[3] www.irjes.com 38 | Page
  • 5. Current Trends in Reality Mining VI. CURRENT CHALLENGES The need for effective methods and mathematical models for analysis becomes crucial in order to make good use of the sources. In machine learning, algorithms have been developed to recognize complex patterns and make intelligent decisions based on data. Traditional machine learning models are recognized as useful tools for large- scale data analysis. They have been used in the domain of human behavior analysis, though their limitations with new types of data and human-centric questions become apparent. For example, many of the traditional machine learning models is supervised, requiring training data which is often impossible or illegal to collect on human subjects. Other specifications related to human-centric data include the multimodal aspect, the noise, the massive quantity, and the complex questions of interest. More specifically, data collected by mobile phone sensors include many types, ranging from GPS, Bluetooth, accelerometer, to voice features. Each of these sensors may be sampled with varying frequencies, each has varying timescales and differing characteristics, and each has its own sources of noise. Although many basic conceptual questions remain unresolved, the major roadblock in defining the fundamental predictability limits for technosocial systems is their sensitivity and dependence on social adaptive behavior. Addressing these problems involves tackling three major scientific challenges. The first is the gathering of large-scale data on information spread and social reactions that occur during periods of crisis. This is not presently out of reach, via largescale mobile communication databases (such as mobile telephones, Twitter logs, and social Web tools) operating at the moment of specific disaster or crisis events. The second challenge is the formulation of formal models that make it possible to quantify the effect of risk perception and awareness phenomena of individuals on the technosocial network structure and dynamics. The third challenge is that of maintaining privacy i.e. to do privacy –preserving-mining. REFERENCES Books: [1] Earl Cox , “Fuzzy Modeling and Genetic Algorithms for Data mining and Exploration”, Morgan Kaufmann Publishers/ Elsevier [2] B. Schilit, N. Adams, R. Want, “Context-Aware Computing Applications” Proceedings of Workshop on Mobile Computing Systems and Applications, 1994 Theses: [3] Katayoun Farrahi, “A Probabilistic Approach to Socio-Geographic Reality Mining” THESIS No5018 (2011) submitted to the Faculty of Science and Technology Engineer École Polytechnique Fédérale de Lausanne to obtain the degree of Doctor of Science Journal Papers: [4] Nathan Eagle & Alex (Sandy) Pentland, “Reality mining: sensing complex social systems” Pers Ubiquit Comput (2006) 10: 255– 268, Springer-Verlag London Limited 2005 Proceedings Papers: [5] N. Eagle, A. Pentland, and D. Lazer, “Inferring Social Network Structure using Mobile Phone Data,” Proceedings of theNational Academy of Sciences (PNAS), vol. 106, no. 36, pp.15274–15278, September 2007 [6] Huiqi Zhang; Dantu, R.; Cangussu, J.W. , “ Socioscope: Human Relationship and Behavior Analysis in Social Networks”, IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans, Volume: 41, Issue: 6, Publication Year: 2011 , Page(s): 1122 – 1143 [7] Zhang, Huiqi; Dantu, Ram, “Predicting social ties in mobile phone networks”, IEEEInternational Conference on Intelligence and Security Informatics(ISI)2010, pages: 25-30 [8] Farrahi, K.; Gatica-Perez, D. , “Probabilistic Mining of Socio-Geographic Routines From Mobile Phone Data”, IEEE Journal of Selected Topics in Signal Processing, Volume: 4, Issue: 4 Publication Year: 2010 , Page(s): 746 – 755 [9] Simoes, J. Magedanz, T., “Can you predict human behavior?”, 14 th International Conference on Intelligence in Next Generation Networks (ICIN), 2010, Page(s): 1 – 6 [10] Xu Yang; Yapeng Wang; Dan Wu; Ma, A., “K-means based clustering on mobile usage for social network analysis purpose”, IEEE, 6 th International Conference on Advanced Information Management and Service(IMS), 2010, Page(s)-223-228 [11] Huiqi Zhang; Dantu R., “Quantifying the presence of Phone Users”, 5 th IEEE Conference on Consumer Communication and Networking Conference, 2008, Page(s): 883 - 887 [12] Michal Ficek, Lukas Kencl, “Spatial Extension of the Reality Mining Dataset”, Proceedings of IEEE 7 th International Conference on Mobild Adhoc and Sensor Systems(MASS), 2010 [13] Zhenhui Li, Cindy Xide Lin, Bolin Ding, Jiawei Han, “Mining Significant time intervals for relationship detection” Proceedings of the 12 th international conference on Advances in spatial and temporal databases, 2011 [14] Xiaowen Dong, Pascal Frossard, Pierre Vandergheynst, Nikolai Nefedov, “A regularization framework for mobile social network analysis” IEEE International Conference on Acoustics, Speech and Signal Processing, 2011 www.irjes.com 39 | Page