International Refereed Journal of Engineering and Science (IRJES) is a peer reviewed online journal for professionals and researchers in the field of computer science. The main aim is to resolve emerging and outstanding problems revealed by recent social and technological change. IJRES provides the platform for the researchers to present and evaluate their work from both theoretical and technical aspects and to share their views.
1. Mobile social computing leverages smartphones and social networks to more closely integrate the web with the real world through sensor-based applications.
2. As the web becomes more real-time and data-driven, opportunities exist to build on trends like location-based social networking and games, mobile versions of social networks like Facebook, and new mobile ecosystems centered around services like Twitter.
3. These developments could empower individuals by putting more computing power and access to information and people directly in their hands through always-connected mobile devices.
Reality mining aims to map an organization's cognitive infrastructure by capturing detailed data on human networks using sensors. It analyzes conversations, topics, locations and relationships between individuals to infer expertise, social networks and how communication may change. This could help with applications like knowledge management, team formation and understanding global influences in an organization. However, it also raises privacy concerns that would need to be addressed.
Uma visão geral sobre Reality Mining e pesquisas que foram e estão sendo desenvolvidas neste contexto. O conteúdo dos slides foram extraídos dos estudos e experimentos do MIT Media Lab (http://hd.media.mit.edu/) dirigido pelo Prof. Alex Pentland
PROVIDING PRIVACY-AWARE INCENTIVES IN MOBILE SENSING SYSTEMSNexgen Technology
The document proposes two credit-based privacy-aware incentive schemes for mobile sensing systems to address both incentive and privacy issues in user participation. The first scheme relies on a trusted third party to protect user privacy and prevent abuse while earning credits. The second scheme applies blind signature, partially blind signature, and an extended Merkle tree technique in the absence of a trusted third party to achieve the same goals efficiently. Both schemes were implemented and shown to have short running times and lower power consumption.
Multimode network based efficient and scalable learning of collective behaviorIAEME Publication
This document discusses multimode network-based approaches for efficiently learning collective behavior in large social networks. It provides an overview of existing approaches for predicting collective behavior based on the behaviors of connected individuals. Specifically, it describes methods that extract social dimensions from networks to represent affiliations between actors and then apply supervised learning to determine which dimensions are informative for behavior prediction. However, existing approaches do not scale well to networks with millions of actors. The document proposes a new edge-centric clustering approach to extract sparse social dimensions, enabling the efficient handling of very large networks while maintaining predictive performance.
Designing Cybersecurity Policies with Field ExperimentsGene Moo Lee
This document summarizes Gene Moo Lee's research on using randomized field experiments to evaluate the effectiveness of cybersecurity policies at the organizational level. The research aims to set up an independent institution to monitor organizations' cybersecurity levels and evaluate how information disclosure impacts behavior. The experiment involved randomly assigning over 7,900 US organizations to control, private disclosure, or public disclosure treatment groups. Preliminary results found that private disclosure did not change behavior but public disclosure via a website reduced spam volumes, especially for organizations that initially had large spam volumes or less competition. Further analysis of the effects is ongoing.
Strategic Network Formation in a Location-Based Social NetworkGene Moo Lee
This document summarizes Gene Moo Lee's presentation on strategic network formation in location-based social networks. It introduces three research questions about how mobile users form friendships and measures user similarity. It then provides an overview of Lee's structural model of network formation, approach to measuring user similarity using topic models, and empirical analysis using a large LBSN dataset to examine how different factors influence friendship links.
The internet of things is an emerging technology that is currently present in most processes and devices, allowing to improve the quality of life of people and facilitating the access to specific information and services. The main purpose of the present article is to offer a general overview of internet of things, based on the analysis of recently published work. The added value of this article lies in the analysis of the main recent publications and the diversity of applications of internet of things technology. As a result of the analysis of the current literature, internet of things technology stands out as a facilitator in business and industrial performance but above all in improving the quality of life. As a conclusion to this document, the internet of things is a technology that can overcome the challenges in terms of security, processing capacity and data mobility, as long as the development related to other technologies follows its expected course.
1. Mobile social computing leverages smartphones and social networks to more closely integrate the web with the real world through sensor-based applications.
2. As the web becomes more real-time and data-driven, opportunities exist to build on trends like location-based social networking and games, mobile versions of social networks like Facebook, and new mobile ecosystems centered around services like Twitter.
3. These developments could empower individuals by putting more computing power and access to information and people directly in their hands through always-connected mobile devices.
Reality mining aims to map an organization's cognitive infrastructure by capturing detailed data on human networks using sensors. It analyzes conversations, topics, locations and relationships between individuals to infer expertise, social networks and how communication may change. This could help with applications like knowledge management, team formation and understanding global influences in an organization. However, it also raises privacy concerns that would need to be addressed.
Uma visão geral sobre Reality Mining e pesquisas que foram e estão sendo desenvolvidas neste contexto. O conteúdo dos slides foram extraídos dos estudos e experimentos do MIT Media Lab (http://hd.media.mit.edu/) dirigido pelo Prof. Alex Pentland
PROVIDING PRIVACY-AWARE INCENTIVES IN MOBILE SENSING SYSTEMSNexgen Technology
The document proposes two credit-based privacy-aware incentive schemes for mobile sensing systems to address both incentive and privacy issues in user participation. The first scheme relies on a trusted third party to protect user privacy and prevent abuse while earning credits. The second scheme applies blind signature, partially blind signature, and an extended Merkle tree technique in the absence of a trusted third party to achieve the same goals efficiently. Both schemes were implemented and shown to have short running times and lower power consumption.
Multimode network based efficient and scalable learning of collective behaviorIAEME Publication
This document discusses multimode network-based approaches for efficiently learning collective behavior in large social networks. It provides an overview of existing approaches for predicting collective behavior based on the behaviors of connected individuals. Specifically, it describes methods that extract social dimensions from networks to represent affiliations between actors and then apply supervised learning to determine which dimensions are informative for behavior prediction. However, existing approaches do not scale well to networks with millions of actors. The document proposes a new edge-centric clustering approach to extract sparse social dimensions, enabling the efficient handling of very large networks while maintaining predictive performance.
Designing Cybersecurity Policies with Field ExperimentsGene Moo Lee
This document summarizes Gene Moo Lee's research on using randomized field experiments to evaluate the effectiveness of cybersecurity policies at the organizational level. The research aims to set up an independent institution to monitor organizations' cybersecurity levels and evaluate how information disclosure impacts behavior. The experiment involved randomly assigning over 7,900 US organizations to control, private disclosure, or public disclosure treatment groups. Preliminary results found that private disclosure did not change behavior but public disclosure via a website reduced spam volumes, especially for organizations that initially had large spam volumes or less competition. Further analysis of the effects is ongoing.
Strategic Network Formation in a Location-Based Social NetworkGene Moo Lee
This document summarizes Gene Moo Lee's presentation on strategic network formation in location-based social networks. It introduces three research questions about how mobile users form friendships and measures user similarity. It then provides an overview of Lee's structural model of network formation, approach to measuring user similarity using topic models, and empirical analysis using a large LBSN dataset to examine how different factors influence friendship links.
The internet of things is an emerging technology that is currently present in most processes and devices, allowing to improve the quality of life of people and facilitating the access to specific information and services. The main purpose of the present article is to offer a general overview of internet of things, based on the analysis of recently published work. The added value of this article lies in the analysis of the main recent publications and the diversity of applications of internet of things technology. As a result of the analysis of the current literature, internet of things technology stands out as a facilitator in business and industrial performance but above all in improving the quality of life. As a conclusion to this document, the internet of things is a technology that can overcome the challenges in terms of security, processing capacity and data mobility, as long as the development related to other technologies follows its expected course.
Internet of Things: Surveys for Measuring Human Activities from Everywhere IJECEIAES
The internet of things (IoT), also called internet of all, is a new paradigm that combines several technologies such as computers, the internet, sensors network, radio frequency identification (RFID), communication technology and embedded systems to form a system that links the real worlds with digital worlds. With an increase in the deployment of smart objects, the internet of things should have a significant impact on human life in the near future. To understand the development of the IoT, this paper reviews the current research of the IoT, key technologies, the main applications of the IoT in various fields, and identifies research challenges. A main contribution of this review article is that it summarizes the current state of the IoT technology in several areas, and also the applications of IoT that cause side effects on our environment for monitoring and evaluation of the impact of human activity on the environment around us, and also provided an overview of some of the main challenges and application of IoT. This article presents not only the problems and challenges of IoT, but also solutions that help overcome some of the problems and challenges.
Multi-objective NSGA-II based community detection using dynamical evolution s...IJECEIAES
Community detection is becoming a highly demanded topic in social networking-based applications. It involves finding the maximum intraconnected and minimum inter-connected sub-graphs in given social networks. Many approaches have been developed for community’s detection and less of them have focused on the dynamical aspect of the social network. The decision of the community has to consider the pattern of changes in the social network and to be smooth enough. This is to enable smooth operation for other community detection dependent application. Unlike dynamical community detection Algorithms, this article presents a non-dominated aware searching Algorithm designated as non-dominated sorting based community detection with dynamical awareness (NDS-CD-DA). The Algorithm uses a non-dominated sorting genetic algorithm NSGA-II with two objectives: modularity and normalized mutual information (NMI). Experimental results on synthetic networks and real-world social network datasets have been compared with classical genetic with a single objective and has been shown to provide superiority in terms of the domination as well as the convergence. NDS-CD-DA has accomplished a domination percentage of 100% over dynamic evolutionary community searching DECS for almost all iterations.
2012.03 social neuroscience for investigating social interaction in entrepris...Thierry Nabeth
Paper associated to the presentation at the:
The 5th International Doctoral Consortium on Intellectual Capital Management
May 30, 2012
Organised by
The European Chair On Intellectual Capital Management
Faculté Jean Monnet, University Paris-Sud,
54 Bd Desgranges , 92330 Sceaux
Note:
As of now, the proposed experimentations are just suggested ideas.
Physical-Cyber-Social Computing involves the integration of observations from physical sensors, knowledge and experiences from cyber systems, and social interactions from people. This will allow machines to understand contexts, correlate multi-domain data, and provide personalized solutions by leveraging background knowledge spanning physical, cyber, and social domains. Semantic computing plays a key role in bridging differences between domains to derive insights. The vision is for systems that can proactively initiate information needs with minimal human involvement.
Social Group Recommendation based on Big Dataijtsrd
Current life involves physical enjoyment, social activities and content, profile and cyber resources. Now it is easy to merge computing, networking and society with physical systems to create new revolutionary science, technical capabilities and better quality of life. That all possible through Cyber Physical Social Content and Profile Based System (CPSCPs).In this propose system, a group-centric intelligent recommender system named as GroRec, which integrates social, mobile and big data technologies to provide effective, objective and accurate recommendation services. This provides group recommendation in CPSCPs domain. In which activity oriented cluster discovery, the revision of rating information for improved accuracy and cluster preferences modelling that supports descent context mining from multiple sources. Group recommendation is based on profile and content based approach. Our main goal is make several interactions with group members by using specific technique and methods. The recommender system is economical, objective and correct. Ms. Nikita S. Mohite | Mr. H. P. Khandagale"Social Group Recommendation based on Big Data" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018, URL: http://www.ijtsrd.com/papers/ijtsrd7097.pdf http://www.ijtsrd.com/computer-science/data-miining/7097/social-group-recommendation-based-on-big-data/ms-nikita-s-mohite
Https://javacoffeeiq.com
Alex Pentland puts it in his productivity study, “fewer memos, more coffee breaks” increases productivity via socialisation and collaboration among staff members.
Online social network mining current trends and research issueseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
2000-ACM-SigMobile-Mobile computing and communications review - Marc Smith - ...Marc Smith
Wireless devices are becoming ubiquitous and will allow new forms of social interaction and organization. These devices will gather intimate data about users but also help groups overcome obstacles to cooperation. While enabling panoptic power over populations, wireless technologies could also increase successful resolution of collective action problems through online reputation systems during face-to-face interactions. Key technologies include wireless networks, portable devices, location awareness, and machine-readable tags.
Physical Cyber Social Computing: An early 21st century approach to Computing ...Amit Sheth
Keynote given at WiMS 2013 Conference, June 12-14 2013, Madrid, Spain. http://aida.ii.uam.es/wims13/keynotes.php
Video of this talk at: http://videolectures.net/wims2013_sheth_physical_cyber_social_computing/
More information at: More at: http://wiki.knoesis.org/index.php/PCS
and http://knoesis.org/projects/ssw/
Replacing earlier versions: http://www.slideshare.net/apsheth/physical-cyber-social-computing & http://www.slideshare.net/apsheth/semantics-empowered-physicalcybersocial-systems-for-earthcube
Abstract: The proper role of technology to improve human experience has been discussed by visionaries and scientists from the early days of computing and electronic communication. Technology now plays an increasingly important role in facilitating and improving personal and social activities and engagements, decision making, interaction with physical and social worlds, generating insights, and just about anything that an intelligent human seeks to do. I have used the term Computing for Human Experience (CHE) [1] to capture this essential role of technology in a human centric vision. CHE emphasizes the unobtrusive, supportive and assistive role of technology in improving human experience, so that technology “takes into account the human world and allows computers themselves to disappear in the background” (Mark Weiser [2]).
In this talk, I will portray physical-cyber-social (PCS) computing that takes ideas from, and goes significantly beyond, the current progress in cyber-physical systems, socio-technical systems and cyber-social systems to support CHE [3]. I will exemplify future PCS application scenarios in healthcare and traffic management that are supported by (a) a deeper and richer semantic interdependence and interplay between sensors and devices at physical layers, (b) rich technology mediated social interactions, and (c) the gathering and application of collective intelligence characterized by massive and contextually relevant background knowledge and advanced reasoning in order to bridge machine and human perceptions. I will share an example of PCS computing using semantic perception [4], which converts low-level, heterogeneous, multimodal and contextually relevant data into high-level abstractions that can provide insights and assist humans in making complex decisions. The key proposition is to explain that PCS computing will need to move away from traditional data processing to multi-tier computation along data-information-knowledge-wisdom dimension that supports reasoning to convert data into abstractions that humans are adept at using.
[1] A. Sheth, Computing for Human Experience
[2] M. Weiser, The Computer for 21st Century
[3] A. Sheth, Semantics empowered Cyber-Physical-Social Systems
[4] C. Henson, A. Sheth, K. Thirunarayan, Semantic Perception: Converting Sensory Observations to Abstractions
RoutineMaker: Towards End-User Automation of Daily Routines Using SmartphonesVille Antila
People use smartphones in daily activities for accessing and storing information in various situations. In this paper, we present a work in progress for detecting and automating some of these activities. To explore the possible patterns we developed an experimental application to detect daily tasks used by smartphones and analyzed it to provide suggestions for “routines”. We conducted a two-week user study with 10 users to evaluate the approach. During the study the application logged the usage patterns, sent information to the server where it was analysed and clustered. The participants could also automate their smartphone tasks using the analysed data. The findings suggest that people would be willing to automatize tasks given that the approach gives flexibility and expressiveness without too much information overload. Future work includes refining the algorithms based on the gathered real-life data and modifying the interaction design to approach the challenges found with the initial study.
Understanding the Privacy Implications of Using Context-based Awareness Cues ...Ville Antila
Information from the physical world is increasingly being digitalized and shared in social networks. We share our locations, tag photos and add different kinds of informal awareness cues about the physical world to our online communities. In this paper, we investigate the privacy implications of shared context cues in social networking services. We present an experimental mobile application, which allows users to add different descriptions of context information to their Facebook and Twitter status updates. The application was used by 12 persons during a two-week user trial using their own devices and Facebook accounts. The results indicate that user-defined abstractions of context items were often preferred over more accurate indicators due to privacy concerns or discomfort in sharing. We also found out that using shared context from friends in vicinity needs careful design to overcome the extended privacy implications.
Patterns based information systems organization (@ InFuture 2015) Sergej Lugovic
Patterns-based Information Systems Organization
Sergej Lugović, Ivan Dunđer, Marko Horvat
Summary
The socio-technical systems research paradigm is about the complexity of real situations. It confronts us with the quest for variables that could provide us with insight into the behavior of such systems. Their behavior emerges according to internal system properties and adaptation of the system to external conditions.
In our view, behavioral patterns are one of those particular variables since machines can recognize them and their dynamics. Based on the synthesis of three different theoretical frameworks, this paper proposes a concept of patterns-based information system organization. The authors built the concept on the Deacon discussion of theory of information, Hofkirchner’s unified information theory and related system behavior, and Kelso’s explanation of pattern creation processes in self-organizing systems. All three researchers have included patterns in their theoretical proposal. According to this analysis of the existing theories and their synthesis, we conclude that in order to design machines that can automatically support new behavior, we have to analyze humans and machines as a complex whole with dynamic relationships and emerging patterns as a dependent variable of behavior. By developing this theoretical concept, we establish a departure point for future research and search for different variables that correlate with pattern formation.
This poster introduces an experimental application to demonstrate the usage of context-based awareness cues in status updates, especially in SNS’s (Social Networking Services). The presented application allows users to add different descriptions of context information to their Twitter messages and Facebook status updates in a narrative format.
Event detection in twitter using text and image fusioncsandit
In this paper, we describe an accurate and effective event detection method to detect events from
Twitter stream. It detects events using visual information as well as textual information to improve
the performance of the mining. It monitors Twitter stream to pick up tweets having texts and photos
and stores them into database. Then it applies mining algorithm to detect the event. Firstly, it detects
event based on text only by using the feature of the bag-of-words which is calculated using the term
frequency-inverse document frequency (TF-IDF) method. Secondly, it detects the event based on
image only by using visual features including histogram of oriented gradients (HOG) descriptors,
grey-level co-occurrence matrix (GLCM), and color histogram. K nearest neighbours (Knn)
classification is used in the detection. Finally, the final decision of the event detection is made based
on the reliabilities of text only detection and image only detection. The experiment result showed that
the proposed method achieved high accuracy of 0.93, comparing with 0.89 with texts only, and 0.86
with images only.
2009 - Connected Action - Marc Smith - Social Media Network AnalysisMarc Smith
Review of social media network analysis of Internet social spaces like twitter, flickr, email, message boards, etc. Network analysis and visualization of social media collections of connections.
Social media platform and Our right to privacyvivatechijri
The advancement of Information Technology has hastened the ability to disseminate information across the globe. In particular, the recent trends in ‘Social Networking’ have led to a spark in personally sensitive information being published on the World Wide Web. While such socially active websites are creative tools for expressing one’s personality it also entails serious privacy concerns. Thus, Social Networking websites could be termed a double edged sword. It is important for the law to keep abreast of these developments in technology. The purpose of this paper is to demonstrate the limits of extending existing laws to battle privacy intrusions in the Internet especially in the context of social networking. It is suggested that privacy specific legislation is the most appropriate means of protecting online privacy. In doing so it is important to maintain a balance between the competing right of expression, the failure of which may hinder the reaping of benefits offered by Internet technology
APPLYING THE TECHNOLOGY ACCEPTANCE MODEL TO UNDERSTAND SOCIAL NETWORKING ijcsit
This study examines the individuals’ participation intentions and behaviour on Social Networking Sites (SNSs). For this purpose, the Technology Acceptance Model (TAM) is utilized and extended in this study through the addition of “perceived social capital” construct aiming to increase its explanatory power and predictive ability in this context. Data collected from a survey of 1100 participants and distilled to 657 usable sets has been analysed to assess the predictive power of proposed model via structural equation modelling. The model proposed in this study explains 56% of the variance in “Participation Intentions” and 55% of the variance in “Participation Behaviour”. Participation of behavioural intention in the model’
explanatory power was the highest amongst the constructs (able to explain 28% of usage behaviour).While, “Attitude” explain around 11% of SNSs usage behaviour. The study findings also show that “Perceived Social Capital” construct has a notable impact on usage behaviour, this impact came indirectly through its direct effect on “Attitude” and “Perceived Usefulness”. Participation of “Perceived Social Capital” in the models' explanatory power was the third highest amongst the constructs. “Perceived Social Capital”, alone explain around 9% of SNSs usage behaviour.
Gordana Dodig-Crnkovic: Participating and Anticipating. Actors and Agents Net...José Nafría
Computing has profoundly changed modern society by changing how people communicate, work, and spend leisure time. Social computing focuses on both the social influence of computers and new types of computation performed by large groups of agents exchanging information in networks. This lecture emphasizes the technological aspects of social computing and its relationship to general models of computing as information processing. Keywords include actors and agent networks, social computing, and info-computationalism.
1) The document discusses a semantics-based approach to machine perception that uses semantic web technologies to derive abstractions from sensor data using background knowledge on the web.
2) It addresses three primary issues: annotation of sensor data, developing a semantic sensor web, and enabling semantic perception intelligence at the edge on resource-constrained devices.
3) The approach represents background knowledge and sensor observations using ontologies, and uses deductive and abductive reasoning over these representations to interpret sensor data at multiple levels of abstraction.
Blogging4Good @ BlogCamp Mumbai 2010 - Ads4Good.org★ Akshay Surve
The document discusses Ads4Good, an organization that allows bloggers to generate donations for charitable causes by embedding an ad widget on their blog. Bloggers are not required to donate money or time; the ads displayed through partnerships with ad networks generate revenue, of which most is donated to the blogger's chosen cause. The organization has piloted its program with over 100 users and donors, and it aims to expand by recruiting more bloggers and nonprofit partners.
Este documento presenta varios ensayos y libros sobre temas de seguridad nacional, defensa, inteligencia estatal, violencia e impunidad. Incluye reflexiones sobre seguridad regional, política contrainsurgente, terrorismo, y el rol de la inteligencia. También cubre temas como la violencia en Guatemala, granjas forenses, servicios de inteligencia del estado, y casos de asesinos en serie.
Internet of Things: Surveys for Measuring Human Activities from Everywhere IJECEIAES
The internet of things (IoT), also called internet of all, is a new paradigm that combines several technologies such as computers, the internet, sensors network, radio frequency identification (RFID), communication technology and embedded systems to form a system that links the real worlds with digital worlds. With an increase in the deployment of smart objects, the internet of things should have a significant impact on human life in the near future. To understand the development of the IoT, this paper reviews the current research of the IoT, key technologies, the main applications of the IoT in various fields, and identifies research challenges. A main contribution of this review article is that it summarizes the current state of the IoT technology in several areas, and also the applications of IoT that cause side effects on our environment for monitoring and evaluation of the impact of human activity on the environment around us, and also provided an overview of some of the main challenges and application of IoT. This article presents not only the problems and challenges of IoT, but also solutions that help overcome some of the problems and challenges.
Multi-objective NSGA-II based community detection using dynamical evolution s...IJECEIAES
Community detection is becoming a highly demanded topic in social networking-based applications. It involves finding the maximum intraconnected and minimum inter-connected sub-graphs in given social networks. Many approaches have been developed for community’s detection and less of them have focused on the dynamical aspect of the social network. The decision of the community has to consider the pattern of changes in the social network and to be smooth enough. This is to enable smooth operation for other community detection dependent application. Unlike dynamical community detection Algorithms, this article presents a non-dominated aware searching Algorithm designated as non-dominated sorting based community detection with dynamical awareness (NDS-CD-DA). The Algorithm uses a non-dominated sorting genetic algorithm NSGA-II with two objectives: modularity and normalized mutual information (NMI). Experimental results on synthetic networks and real-world social network datasets have been compared with classical genetic with a single objective and has been shown to provide superiority in terms of the domination as well as the convergence. NDS-CD-DA has accomplished a domination percentage of 100% over dynamic evolutionary community searching DECS for almost all iterations.
2012.03 social neuroscience for investigating social interaction in entrepris...Thierry Nabeth
Paper associated to the presentation at the:
The 5th International Doctoral Consortium on Intellectual Capital Management
May 30, 2012
Organised by
The European Chair On Intellectual Capital Management
Faculté Jean Monnet, University Paris-Sud,
54 Bd Desgranges , 92330 Sceaux
Note:
As of now, the proposed experimentations are just suggested ideas.
Physical-Cyber-Social Computing involves the integration of observations from physical sensors, knowledge and experiences from cyber systems, and social interactions from people. This will allow machines to understand contexts, correlate multi-domain data, and provide personalized solutions by leveraging background knowledge spanning physical, cyber, and social domains. Semantic computing plays a key role in bridging differences between domains to derive insights. The vision is for systems that can proactively initiate information needs with minimal human involvement.
Social Group Recommendation based on Big Dataijtsrd
Current life involves physical enjoyment, social activities and content, profile and cyber resources. Now it is easy to merge computing, networking and society with physical systems to create new revolutionary science, technical capabilities and better quality of life. That all possible through Cyber Physical Social Content and Profile Based System (CPSCPs).In this propose system, a group-centric intelligent recommender system named as GroRec, which integrates social, mobile and big data technologies to provide effective, objective and accurate recommendation services. This provides group recommendation in CPSCPs domain. In which activity oriented cluster discovery, the revision of rating information for improved accuracy and cluster preferences modelling that supports descent context mining from multiple sources. Group recommendation is based on profile and content based approach. Our main goal is make several interactions with group members by using specific technique and methods. The recommender system is economical, objective and correct. Ms. Nikita S. Mohite | Mr. H. P. Khandagale"Social Group Recommendation based on Big Data" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018, URL: http://www.ijtsrd.com/papers/ijtsrd7097.pdf http://www.ijtsrd.com/computer-science/data-miining/7097/social-group-recommendation-based-on-big-data/ms-nikita-s-mohite
Https://javacoffeeiq.com
Alex Pentland puts it in his productivity study, “fewer memos, more coffee breaks” increases productivity via socialisation and collaboration among staff members.
Online social network mining current trends and research issueseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
2000-ACM-SigMobile-Mobile computing and communications review - Marc Smith - ...Marc Smith
Wireless devices are becoming ubiquitous and will allow new forms of social interaction and organization. These devices will gather intimate data about users but also help groups overcome obstacles to cooperation. While enabling panoptic power over populations, wireless technologies could also increase successful resolution of collective action problems through online reputation systems during face-to-face interactions. Key technologies include wireless networks, portable devices, location awareness, and machine-readable tags.
Physical Cyber Social Computing: An early 21st century approach to Computing ...Amit Sheth
Keynote given at WiMS 2013 Conference, June 12-14 2013, Madrid, Spain. http://aida.ii.uam.es/wims13/keynotes.php
Video of this talk at: http://videolectures.net/wims2013_sheth_physical_cyber_social_computing/
More information at: More at: http://wiki.knoesis.org/index.php/PCS
and http://knoesis.org/projects/ssw/
Replacing earlier versions: http://www.slideshare.net/apsheth/physical-cyber-social-computing & http://www.slideshare.net/apsheth/semantics-empowered-physicalcybersocial-systems-for-earthcube
Abstract: The proper role of technology to improve human experience has been discussed by visionaries and scientists from the early days of computing and electronic communication. Technology now plays an increasingly important role in facilitating and improving personal and social activities and engagements, decision making, interaction with physical and social worlds, generating insights, and just about anything that an intelligent human seeks to do. I have used the term Computing for Human Experience (CHE) [1] to capture this essential role of technology in a human centric vision. CHE emphasizes the unobtrusive, supportive and assistive role of technology in improving human experience, so that technology “takes into account the human world and allows computers themselves to disappear in the background” (Mark Weiser [2]).
In this talk, I will portray physical-cyber-social (PCS) computing that takes ideas from, and goes significantly beyond, the current progress in cyber-physical systems, socio-technical systems and cyber-social systems to support CHE [3]. I will exemplify future PCS application scenarios in healthcare and traffic management that are supported by (a) a deeper and richer semantic interdependence and interplay between sensors and devices at physical layers, (b) rich technology mediated social interactions, and (c) the gathering and application of collective intelligence characterized by massive and contextually relevant background knowledge and advanced reasoning in order to bridge machine and human perceptions. I will share an example of PCS computing using semantic perception [4], which converts low-level, heterogeneous, multimodal and contextually relevant data into high-level abstractions that can provide insights and assist humans in making complex decisions. The key proposition is to explain that PCS computing will need to move away from traditional data processing to multi-tier computation along data-information-knowledge-wisdom dimension that supports reasoning to convert data into abstractions that humans are adept at using.
[1] A. Sheth, Computing for Human Experience
[2] M. Weiser, The Computer for 21st Century
[3] A. Sheth, Semantics empowered Cyber-Physical-Social Systems
[4] C. Henson, A. Sheth, K. Thirunarayan, Semantic Perception: Converting Sensory Observations to Abstractions
RoutineMaker: Towards End-User Automation of Daily Routines Using SmartphonesVille Antila
People use smartphones in daily activities for accessing and storing information in various situations. In this paper, we present a work in progress for detecting and automating some of these activities. To explore the possible patterns we developed an experimental application to detect daily tasks used by smartphones and analyzed it to provide suggestions for “routines”. We conducted a two-week user study with 10 users to evaluate the approach. During the study the application logged the usage patterns, sent information to the server where it was analysed and clustered. The participants could also automate their smartphone tasks using the analysed data. The findings suggest that people would be willing to automatize tasks given that the approach gives flexibility and expressiveness without too much information overload. Future work includes refining the algorithms based on the gathered real-life data and modifying the interaction design to approach the challenges found with the initial study.
Understanding the Privacy Implications of Using Context-based Awareness Cues ...Ville Antila
Information from the physical world is increasingly being digitalized and shared in social networks. We share our locations, tag photos and add different kinds of informal awareness cues about the physical world to our online communities. In this paper, we investigate the privacy implications of shared context cues in social networking services. We present an experimental mobile application, which allows users to add different descriptions of context information to their Facebook and Twitter status updates. The application was used by 12 persons during a two-week user trial using their own devices and Facebook accounts. The results indicate that user-defined abstractions of context items were often preferred over more accurate indicators due to privacy concerns or discomfort in sharing. We also found out that using shared context from friends in vicinity needs careful design to overcome the extended privacy implications.
Patterns based information systems organization (@ InFuture 2015) Sergej Lugovic
Patterns-based Information Systems Organization
Sergej Lugović, Ivan Dunđer, Marko Horvat
Summary
The socio-technical systems research paradigm is about the complexity of real situations. It confronts us with the quest for variables that could provide us with insight into the behavior of such systems. Their behavior emerges according to internal system properties and adaptation of the system to external conditions.
In our view, behavioral patterns are one of those particular variables since machines can recognize them and their dynamics. Based on the synthesis of three different theoretical frameworks, this paper proposes a concept of patterns-based information system organization. The authors built the concept on the Deacon discussion of theory of information, Hofkirchner’s unified information theory and related system behavior, and Kelso’s explanation of pattern creation processes in self-organizing systems. All three researchers have included patterns in their theoretical proposal. According to this analysis of the existing theories and their synthesis, we conclude that in order to design machines that can automatically support new behavior, we have to analyze humans and machines as a complex whole with dynamic relationships and emerging patterns as a dependent variable of behavior. By developing this theoretical concept, we establish a departure point for future research and search for different variables that correlate with pattern formation.
This poster introduces an experimental application to demonstrate the usage of context-based awareness cues in status updates, especially in SNS’s (Social Networking Services). The presented application allows users to add different descriptions of context information to their Twitter messages and Facebook status updates in a narrative format.
Event detection in twitter using text and image fusioncsandit
In this paper, we describe an accurate and effective event detection method to detect events from
Twitter stream. It detects events using visual information as well as textual information to improve
the performance of the mining. It monitors Twitter stream to pick up tweets having texts and photos
and stores them into database. Then it applies mining algorithm to detect the event. Firstly, it detects
event based on text only by using the feature of the bag-of-words which is calculated using the term
frequency-inverse document frequency (TF-IDF) method. Secondly, it detects the event based on
image only by using visual features including histogram of oriented gradients (HOG) descriptors,
grey-level co-occurrence matrix (GLCM), and color histogram. K nearest neighbours (Knn)
classification is used in the detection. Finally, the final decision of the event detection is made based
on the reliabilities of text only detection and image only detection. The experiment result showed that
the proposed method achieved high accuracy of 0.93, comparing with 0.89 with texts only, and 0.86
with images only.
2009 - Connected Action - Marc Smith - Social Media Network AnalysisMarc Smith
Review of social media network analysis of Internet social spaces like twitter, flickr, email, message boards, etc. Network analysis and visualization of social media collections of connections.
Social media platform and Our right to privacyvivatechijri
The advancement of Information Technology has hastened the ability to disseminate information across the globe. In particular, the recent trends in ‘Social Networking’ have led to a spark in personally sensitive information being published on the World Wide Web. While such socially active websites are creative tools for expressing one’s personality it also entails serious privacy concerns. Thus, Social Networking websites could be termed a double edged sword. It is important for the law to keep abreast of these developments in technology. The purpose of this paper is to demonstrate the limits of extending existing laws to battle privacy intrusions in the Internet especially in the context of social networking. It is suggested that privacy specific legislation is the most appropriate means of protecting online privacy. In doing so it is important to maintain a balance between the competing right of expression, the failure of which may hinder the reaping of benefits offered by Internet technology
APPLYING THE TECHNOLOGY ACCEPTANCE MODEL TO UNDERSTAND SOCIAL NETWORKING ijcsit
This study examines the individuals’ participation intentions and behaviour on Social Networking Sites (SNSs). For this purpose, the Technology Acceptance Model (TAM) is utilized and extended in this study through the addition of “perceived social capital” construct aiming to increase its explanatory power and predictive ability in this context. Data collected from a survey of 1100 participants and distilled to 657 usable sets has been analysed to assess the predictive power of proposed model via structural equation modelling. The model proposed in this study explains 56% of the variance in “Participation Intentions” and 55% of the variance in “Participation Behaviour”. Participation of behavioural intention in the model’
explanatory power was the highest amongst the constructs (able to explain 28% of usage behaviour).While, “Attitude” explain around 11% of SNSs usage behaviour. The study findings also show that “Perceived Social Capital” construct has a notable impact on usage behaviour, this impact came indirectly through its direct effect on “Attitude” and “Perceived Usefulness”. Participation of “Perceived Social Capital” in the models' explanatory power was the third highest amongst the constructs. “Perceived Social Capital”, alone explain around 9% of SNSs usage behaviour.
Gordana Dodig-Crnkovic: Participating and Anticipating. Actors and Agents Net...José Nafría
Computing has profoundly changed modern society by changing how people communicate, work, and spend leisure time. Social computing focuses on both the social influence of computers and new types of computation performed by large groups of agents exchanging information in networks. This lecture emphasizes the technological aspects of social computing and its relationship to general models of computing as information processing. Keywords include actors and agent networks, social computing, and info-computationalism.
1) The document discusses a semantics-based approach to machine perception that uses semantic web technologies to derive abstractions from sensor data using background knowledge on the web.
2) It addresses three primary issues: annotation of sensor data, developing a semantic sensor web, and enabling semantic perception intelligence at the edge on resource-constrained devices.
3) The approach represents background knowledge and sensor observations using ontologies, and uses deductive and abductive reasoning over these representations to interpret sensor data at multiple levels of abstraction.
Blogging4Good @ BlogCamp Mumbai 2010 - Ads4Good.org★ Akshay Surve
The document discusses Ads4Good, an organization that allows bloggers to generate donations for charitable causes by embedding an ad widget on their blog. Bloggers are not required to donate money or time; the ads displayed through partnerships with ad networks generate revenue, of which most is donated to the blogger's chosen cause. The organization has piloted its program with over 100 users and donors, and it aims to expand by recruiting more bloggers and nonprofit partners.
Este documento presenta varios ensayos y libros sobre temas de seguridad nacional, defensa, inteligencia estatal, violencia e impunidad. Incluye reflexiones sobre seguridad regional, política contrainsurgente, terrorismo, y el rol de la inteligencia. También cubre temas como la violencia en Guatemala, granjas forenses, servicios de inteligencia del estado, y casos de asesinos en serie.
Putting Medical Officer of Health Reports on the map - Natalie Pollecutt, Wel...JISC GECO
Presentation given at the Geospatial in the Cultural Heritage Domain - Past, Present & Future event in London on 7th March 2012. The event was organised as part of the JISC GECO project.
De normalised london aggregation framework overview Chris Harris
This document provides an overview of MongoDB's new aggregation framework. It begins with terminology that maps concepts from relational databases to MongoDB. Examples are given that show how to aggregate data from a collection of tweets to count friends and followers by location. The pipeline concept is introduced along with common aggregation operations like match, project, group, sort, and expressions. Finally, information is provided on downloading MongoDB and contacting the author.
Este documento describe una capacitación sobre el uso de tabletas para la enseñanza en una institución educativa. La capacitación cubrió cuatro fases: ambientación con profesores y padres, manejo básico de la tableta, aplicaciones educativas y metodología de clase usando la tableta. Los estudiantes aprendieron a usar la tableta de forma responsable y motivada. Sin embargo, la institución carece de infraestructura tecnológica como conectividad e insuficientes dispositivos, dificultando la aplicación completa del
This document discusses various Ruby on Rails concepts including metaprogramming, blocks, reflection, ActiveRecord associations and observers. It provides code examples of how these concepts are implemented in Rails, such as how has_many associations generate collection methods, how method_missing enables dynamic finders, and how observers are called via callbacks.
La Fundación Banco Credicoop invita a participar en una Misión Comercial a México del 12 al 16 de noviembre. La misión incluirá un encuentro empresarial en la Cámara Nacional de Comercio de la Ciudad de México y presentaciones sobre oportunidades comerciales en México. Sectores con mayores posibilidades de negocios incluyen equipamiento médico, gastronómico, TIC y hotelero.
Oulasvirta 2011 puc habits make smart phone use more pervasiveConstantin Cocioaba
This study examined smartphone usage habits using data from 136 smartphone users over 6 weeks on average. The researchers defined checking habits as brief, repetitive interactions with the device to access dynamic content. They found evidence that checking habits emerged from rewarding content like social media and news that was quickly accessible. Checking habits occurred frequently but were experienced more as minor annoyances than addictions. The data also suggested that increased checking habits may lead to higher overall smartphone usage.
Visually Exploring Social Participation in Encyclopedia of LifeHarish Vaidyanathan
This document discusses visually exploring social participation on the Encyclopedia of Life (EOL) citizen science platform. It analyzes the conversation network of EOL users over time using dynamic network visualization methods. The analysis found that new website features increased interactive and individual member activities, and that curator activities encouraged other members to be more active. Dynamic network visualization is useful for understanding how online social networks and participation evolve over time.
Emerged computer interaction with humanity social computingijcsa
In the 21st century, everywhere people analyze & measure societal. The new trend to compute the societal is
known as social computing. The emerging trend of research focuses interaction of technologies with
humanity. This interaction can be either man machine interaction or human computer interaction. This
article conveys the brief description of social computing and social impact of computing into variant
environment. It optimises the interaction technology, ubiquitous computing and pervasive computing.
Subsequently affective computing is discussed with artificial intelligence to motivate the automation of
technology in social computing.
Towards the Integration of Spatiotemporal User-Generated Content and Sensor DataCornelius Rabsch
The document discusses research on integrating spatiotemporal sensor data and user-generated content. It provides an overview of pervasive sensor networks that generate continuous data streams about the environment and how people-centric sensing through mobile devices is creating a new layer of contextual location-based data. The integration of these different data sources could provide increased situational awareness for applications like emergency response management and urban planning. It also presents some challenges around data heterogeneity that semantic technologies may be able to address.
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...IRJET Journal
This document presents a system for real-time analysis of cyberbullying on social media using machine learning and text mining. The system aims to detect abusive conversations and censor harmful words to protect victims. It uses an artificial neural network machine learning algorithm to analyze words that could psychologically affect individuals. The system identifies abusive words in posts and comments and replaces them with censored content. This aims to prevent innocent users from being exposed to depressing or criminal activities online. The document discusses the system architecture, including tools for sentiment analysis, monitoring discussions, identifying abusive words, and updating a word database. Diagrams show the data flow, use cases, and interactions between system components.
Expelling Information of Events from Critical Public Space using Social Senso...ijtsrd
Open foundation frameworks give a significant number of the administrations that are basic to the wellbeing, working, and security of society. A considerable lot of these frameworks, in any case, need persistent physical sensor checking to have the option to recognize disappointment occasions or harm that has struck these frameworks. We propose the utilization of social sensor enormous information to recognize these occasions. We center around two primary framework frameworks, transportation and vitality, and use information from Twitter streams to identify harm to spans, expressways, gas lines, and power foundation. Through a three step filtering approach and assignment to geographical cells, we are able to filter out noise in this data to produce relevant geo located tweets identifying failure events. Applying the strategy to real world data, we demonstrate the ability of our approach to utilize social sensor big data to detect damage and failure events in these critical public infrastructures. Samatha P. K | Dr. Mohamed Rafi "Expelling Information of Events from Critical Public Space using Social Sensor Big Data" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd25350.pdfPaper URL: https://www.ijtsrd.com/engineering/computer-engineering/25350/expelling-information-of-events-from-critical-public-space-using-social-sensor-big-data/samatha-p-k
This document provides an overview of the strategic research roadmap for the Internet of Things (IoT). It defines the IoT conceptual framework as a dynamic global network of physical and virtual "things" that are connected via standard communication protocols. The vision is for the IoT to merge with other internet developments to create a common global IT platform connecting people, things, energy networks, media, and services. Realizing this vision will require addressing challenges related to system architecture, management, business models, and ensuring security, privacy and interoperability as "things" become more connected and intelligent.
Big Data for Development: Opportunities and Challenges, Summary SlidedeckUN Global Pulse
Summary points from UN Global Pulse White Paper "Big Data for Development: Opportunities & Challenges." See: http://www.unglobalpulse.org/BigDataforDevelopment
Digital Trails Dave King 1 5 10 Part 1 D3Dave King
This document provides an overview and agenda for a tutorial on extracting intelligence from digital traces and trails left by web and mobile users. It discusses the proliferation of digital devices that create extensive data about people's online and mobile activities. Examples are given of different types of digital traces, including cookies, web bugs, location data, and social media interactions. Concerns about privacy are also mentioned as vast amounts of personal data are now collected and analyzed.
This document summarizes recent research areas in computer science. It discusses how computer science has impacted fields like science, medicine, business and mobile communication through research in areas such as algorithms, data management, distributed systems, e-commerce, education, hardware/architecture, human-computer interaction, machine intelligence, networking, security, software engineering and speech processing. It provides examples of current research topics including data mining, machine learning, artificial intelligence, bioinformatics, and education technology. The document concludes that computer science is a vast field with many problems left to solve across these research areas.
An updated look at social network extraction system a personal data analysis ...eSAT Publishing House
This document summarizes a study on analyzing personal social network data over time. The study extracted data from Facebook, calculated social network analysis metrics like degree distribution and betweenness centrality, and analyzed how the network changed dynamically over time. Key findings included identifying influential and non-influential users, detecting communities that formed within the network, and identifying the celebrity or most influential user within one person's local network. Analyzing how social networks and interactions change dynamically provides insights useful for applications like marketing and recommendations.
Dear Students
Ingenious techno Solution offers an expertise guidance on you Final Year IEEE & Non- IEEE Projects on the following domain
JAVA
.NET
EMBEDDED SYSTEMS
ROBOTICS
MECHANICAL
MATLAB etc
For further details contact us:
enquiry@ingenioustech.in
044-42046028 or 8428302179.
Ingenious Techno Solution
#241/85, 4th floor
Rangarajapuram main road,
Kodambakkam (Power House)
http://www.ingenioustech.in/
Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...BAINIDA
Subscriber Churn Prediction Model using Social Network Analysis In Telecommunication Industry โดย เชษฐพงศ์ ปัญญาชนกุล อาจารย์ ดร. อานนท์ ศักดิ์วรวิชญ์
ในงาน THE FIRST NIDA BUSINESS ANALYTICS AND DATA SCIENCES CONTEST/CONFERENCE จัดโดย คณะสถิติประยุกต์และ DATA SCIENCES THAILAND
1999 ACM SIGCHI - Counting on Community in CyberspaceMarc Smith
This panel discusses research projects studying the formation of online communities. Each panelist presents empirical research on a different social cyber space:
1) Marc Smith studied Usenet and found islands of cooperative behavior exist, contradicting the idea it has succumbed to a "tragedy of the commons".
2) Steven Drucker analyzed graphical chat system V-Chat and found the graphical features were used extensively without direct prompts, showing why people communicate this way.
3) Barry Wellman studied residents in a wired Canadian suburb, finding how existing online services are used and what future services people want, providing insight into future connected communities.
4) Robert Kraut found that greater internet use was associated with declines in
Current trends of opinion mining and sentiment analysis in social networkseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
ABSTRACT : Computational social science (CSS) is an academic discipline that combines the traditional social sciences with computer science. While social scientists provide research questions, data sources, and acquisition methods, computer scientists contribute mathematical models and computational tools. CSS uses computationally methods and statistical tools to analyze and model social phenomena, social structures, and human social behavior. The purpose of this paper is to provide a brief introduction to computational social science.
Key Words: computational social science, social-computational systems, social simulation models, agent-based models
1) The document discusses the evolution of artificial intelligence in workplaces and Konica Minolta's vision for cognitive hubs.
2) Konica Minolta sees the future workplace as a digital cortex created by connecting people, sensors and devices. They are developing AI and cognitive hubs to provide context-aware decision support in digital workplaces.
3) Konica Minolta's vision is to create an entirely new cyber-physical platform as a cognitive hub that aggregates physical and digital data to provide intelligence-based services.
Framework for A Personalized Intelligent Assistant to Elderly People for Acti...CSCJournals
The increasing population of elderly people is associated with the need to meet their increasing requirements and to provide solutions that can improve their quality of life in a smart home. In addition to fear and anxiety towards interfacing with systems; cognitive disabilities, weakened memory, disorganized behavior and even physical limitations are some of the problems that elderly people tend to face with increasing age. The essence of providing technology-based solutions to address these needs of elderly people and to create smart and assisted living spaces for the elderly; lies in developing systems that can adapt by addressing their diversity and can augment their performances in the context of their day to day goals. Therefore, this work proposes a framework for development of a Personalized Intelligent Assistant to help elderly people perform Activities of Daily Living (ADLs) in a smart and connected Internet of Things (IoT) based environment. This Personalized Intelligent Assistant can analyze different tasks performed by the user and recommend activities by considering their daily routine, current affective state and the underlining user experience. To uphold the efficacy of this proposed framework, it has been tested on a couple of datasets for modelling an "average user" and a "specific user" respectively. The results presented show that the model achieves a performance accuracy of 73.12% when modelling a "specific user", which is considerably higher than its performance while modelling an "average user", this upholds the relevance for development and implementation of this proposed framework.
Social networking sites are a significant source of information to know the behavior of users and to know
what is occupying society of all ages and accordingly helpful information can be provided to specialists
and decision-makers. According to official sources, 98.43% of Saudi youth use social networking sites. The
study and analysis of social media data are done to provide the necessary information to increase
investment opportunities within the Kingdom of Saudi Arabia, by studying and analyzing what people
occupy on the communication sites through their tweets about the labor market and investment. Given the
huge volume of data and also its randomness, a survey of the data will be done and collected from through
keywords, the priority of arranging the data, and recording it as (positive - negative - mixed). The study
analysis and conclusion will be based on data-mining and its techniques of analysis and deduction
.
INCREASING THE INVESTMENT’S OPPORTUNITIES IN KINGDOM OF SAUDI ARABIA BY STUDY...ijcsit
Social networking sites are a significant source of information to know the behavior of users and to know
what is occupying society of all ages and accordingly helpful information can be provided to specialists
and decision-makers. According to official sources, 98.43% of Saudi youth use social networking sites. The
study and analysis of social media data are done to provide the necessary information to increase
investment opportunities within the Kingdom of Saudi Arabia, by studying and analyzing what people
occupy on the communication sites through their tweets about the labor market and investment. Given the
huge volume of data and also its randomness, a survey of the data will be done and collected from through
keywords, the priority of arranging the data, and recording it as (positive - negative - mixed). The study
analysis and conclusion will be based on data-mining and its techniques of analysis and deduction.
This document describes an automatic safety door lock system for cars that uses infrared sensors and a hydraulic piston to prevent injuries caused by closing car doors. The system uses IR sensors placed along the door and outer panel connected to a microcontroller. When an object is detected between the closing door and outer panel, the sensors transmit a signal to the microcontroller which activates a relay driver to extend the hydraulic piston to stop the door from closing. The system aims to prevent the over 120,000 injuries that occur annually from unexpected car door closings.
Extrusion can be defined as the process of subjecting a material to compression so that it is forced to
flow through an opening of a die and takes the shape of the hole. Multi-hole extrusion is the process of
extruding the products through a die having more than one hole. Multi-hole extrusion increases the production
rate and reduces the cost of production. In this study the ram force has calculated experimentally for single hole
and multi-hole extrusion. The comparison of ram forces between the single hole and multi-hole extrusion
provides the inverse relation between the numbers of holes in a die and ram force. The experimental lengths of
the extruded products through the various holes of multi-hole die are different. It indicates that the flow pattern
is dependent on the material behavior. The micro-hardness test has done for the extruded products of lead
through multi-hole die. It is observed that the hardness of the extruded lead products from the central hole is
found to be more than that of the products extruded from other holes. The study suggests that multi-hole
extrusion can be used for obtaining the extruded products of lead with varying hardness. The micro-structure
study has done for the lead material before and after extrusion. It is observed that the size of grains of lead
material after extrusion is smaller than the original lead.
Analysis of Agile and Multi-Agent Based Process Scheduling Modelirjes
As an answer of long growing frustration of waterfall Software development life cycle concepts,
agile software development concept was evolved in 90’s. The most popular agile methodologies is the Extreme
Programming (XP). Most software companies nowadays aim to produce efficient, flexible and valuable
Software in short time period with minimal costs, and within unstable, changing environments. This complex
problem can be modeled as a multi-agent based system, where agents negotiate resources. Agents can be used to
represent projects and resources. Crucial for the multi-agent based system in project scheduling model, is the
availability of an effective algorithm for prioritizing and scheduling of task. To evaluate the models, simulations
were carried out with real life and several generated data sets. The developed model (Multi-agent based System)
provides an optimized and flexible agile process scheduling and reduces overheads in the software process as it
responds quickly to changing requirements without excessive work in project scheduling.
Effects of Cutting Tool Parameters on Surface Roughnessirjes
This paper presents of the influence on surface roughness of Co28Cr6Mo medical alloy machined
on a CNC lathe based on cutting parameters (rotational speed, feed rate, depth of cut and nose radius).The
influences of cutting parameters have been presented in graphical form for understanding. To achieve the
minimum surface roughness, the optimum values obtained for rpm, feed rate, depth of cut and nose radius were
respectively, 318 rpm, 0,1 mm/rev, 0,7 mm and 0,8 mm. Maximum surface roughness has been revealed the
values obtained for rpm, feed rate, depth of cut and nose radius were respectively, 318 rpm, 0,25 mm/rev, 0,9
mm and 0,4 mm.
Possible limits of accuracy in measurement of fundamental physical constantsirjes
The measurement uncertainties of Fundamental Physical Constants should take into account all
possible and most influencing factors. One from them is the finiteness of the model that causes the existence of
a-priori error. The proposed formula for calculation of this error provides a comparison of its value with the
actual experimental measurement error that cannot be done an arbitrarily small. According to the suggested
approach, the error of the researched Fundamental Physical Constant, measured in conventional field studies,
will always be higher than the error caused by the finite number of dimensional recorded variables of physicalmathematical
models. Examples of practical application of the considered concept for measurement of fine
structure constant, speed of light and Newtonian constant of gravitation are discussed.
Performance Comparison of Energy Detection Based Spectrum Sensing for Cogniti...irjes
With the rapid deployment of new wireless devices and applications, the last decade has witnessed a growing
demand for wireless radio spectrum. However, the policy of fixed spectrum assignment produces a bottleneck for more
efficient spectrum utilization, such that a great portion of the licensed spectrum is severely under-utilized. So the concept of
cognitive radio was introduced to address this issue.The inefficient usage of the limited spectrum necessitates the
development of dynamic spectrum access techniques, where users who have no spectrum licenses, also known as secondary
users, are allowed to use the temporarily unused licensed spectrum. For this purpose we have to know the presence or
absence of primary users for spectrum usage. So spectrums sensing is one of the major requirements of cognitive radio.Many
spectrum sensing techniques have been developed to sense the presence or absence of a licensed user. This paper evaluates
the performance of the energy detection based spectrum sensing technique in noisy and fading environments.The
performance of the energy detection technique will be evaluated by use of Receiver Operating Characteristics (ROC) curves
over additive white Gaussian noise (AWGN) and fading channels.
Comparative Study of Pre-Engineered and Conventional Steel Frames for Differe...irjes
In this paper, the conventional steel frames having triangular Pratt truss as a roofing system of 60 m
length, span 30m and varying bay spacing 4m, 5m and 6m respectively having eaves level for all the portals is at
10m and the EOT crane is supported at the height of 8m from ground level and pre-engineered steel frames of
same dimensions are analyzed and designed for wind zones (wind zone 2, wind zone 3, wind zone 4 and wind
zone 5) by using STAAD Pro V8i. The study deals with the comparative study of both conventional and preengineered
with respect to the amount of structural steel required, reduction in dead load of the structure.
Flip bifurcation and chaos control in discrete-time Prey-predator model irjes
The dynamics of discrete-time prey-predator model are investigated. The result indicates that the
model undergo a flip bifurcation which found by using center manifold theorem and bifurcation theory.
Numerical simulation not only illustrate our results, but also exhibit the complex dynamic behavior, such as the
periodic doubling in period-2, -4 -8, quasi- periodic orbits and chaotic set. Finally, the feedback control method
is used to stabilize chaotic orbits at an unstable interior point.
Energy Awareness and the Role of “Critical Mass” In Smart Citiesirjes
This document proposes a novel analytical model to define a new concept of critical mass in the context of spreading energy awareness in smart cities. The model incorporates centrality measures in both single-layer and multilayer social networks. Simulation results show that including centrality measures and a multilayer approach lowers the critical mass needed to trigger and spread good consumer habits. Specifically, the model calculates critical mass values using eigenvector centrality in single layers and a heterogeneous eigenvector-like centrality in multilayers. Considering network structure and central nodes' influence allows a smaller critical mass to foster diffusion compared to models that do not account for centrality. Extending the analysis to multilayers further reduces critical mass by increasing tie strength between nodes.
A Firefly Algorithm for Optimizing Spur Gear Parameters Under Non-Lubricated ...irjes
Firefly algorithm is one of the emerging evolutionary approaches for complex and non-linear
optimization problems. It is inspired by natural firefly‟s behavior such as movement of fireflies based on
brightness and by overcoming the constraints such as light absorption, obstacles, distance, etc. In this research,
firefly‟s movement had been simulated computationally to identify the best parameters for spur gear pair by
considering the design and manufacturing constraints. The proposed algorithm was tested with the traditional
design parameters and found the results are at par in less computational time by satisfying the constraints.
The Effect of Orientation of Vortex Generators on Aerodynamic Drag Reduction ...irjes
One of the main reasons for the aerodynamic drag in automotive vehicles is the flow separation
near the vehicle’s rear end. To delay this flow separation, vortex generators are used in recent vehicles. The
vortex generators are commonly used in aircrafts to prevent flow separation. Even though vortex generators
themselves create drag, but they also reduce drag by delaying flow separation at downstream. The overall effect
of vortex generators is more beneficial and proved by experimentation. The effect depends on the shape,size and
orientation of vortex generators. Hence optimized shape with proper orientation is essential for getting better
results.This paper presents the effect of vortex generators at different orientation to the flow field and the
mechanism by which these effects takes place.
An Assessment of The Relationship Between The Availability of Financial Resou...irjes
The availability of financial resources is an important element in impacting the success of a planning
process for an effective physical planning. The extent to which however, they are articulated in the process
remained elusive both in scholarly and public discourse. The objective of this study wastherefore, to examine
the extent to which financial resources affect physical planning. In doing so, the study examinedwhether
financial resources were adequate or not to facilitate planning processes in Paidha. According to the study
findings,budget prioritization and ceilings are still a challenge in Paidha Town Council. This is partly due
limited level of knowledge of physical planning among the officials of Paidha Town Council. As a result, there
were no dedicated budget line for routine inspection of physical development plan compliance and enforcement
tools in Paidha. In conclusion, in addressing uncoordinated patterns of physical development that characterize
Uganda‟s urban centres, a critical starting point ought to be the analysis of physical planning process. The
research of this kind is not only significant to other emerging urban centres facing poor a road network,
mushrooming informal settlements and poor social services including poor pattern of residential and commercial
developments but also to all institutions that are involved in planning these towns. Knowing the extent of need
for financial influences in planning may assist local authorities to take the processes of planning seriously which
will help enhance the sustainable development of emerging urban centres including Paidha.
The Choice of Antenatal Care and Delivery Place in Surabaya (Based on Prefere...irjes
This study analyzed factors affecting the utilization of antenatal care and delivery places in Surabaya, Indonesia based on preferences and choice theory. The study found that:
1) Nearly half of women chose healthcare for delivery based on information from others
2) Most women's main criteria for choosing a delivery place was that it was safe, comfortable and cheap
3) The majority of women's primary choice for a delivery place was one that was close, comfortable and cheap
Prediction of the daily global solar irradiance received on a horizontal surf...irjes
This document presents a new approach for predicting the daily global solar irradiance received on a horizontal surface as a function of local daytime and the maximum daily value. An exponential distribution function is suggested and compared to experimental data from several locations. The maximum daily value (qmax) is estimated theoretically in terms of the solar constant adjusted for earth-sun distance variation. Computed values using the new approach show good agreement with experimental data, within 16% error except for some extreme points.
HARMONIC ANALYSIS ASSOCIATED WITH A GENERALIZED BESSEL-STRUVE OPERATOR ON THE...irjes
This document summarizes a research paper that considers a generalized Bessel-Struve operator on the real line. It defines generalized Bessel-Struve and Weyl integral transforms, which are shown to be transmutation operators relating the generalized Bessel-Struve operator to derivatives. These tools are then used to develop a new harmonic analysis associated with the generalized Bessel-Struve operator, including generalized Sonine integral transforms. Key results proven include Paley-Wiener theorems and properties of the various integral transforms.
The Role of Community Participation in Planning Processes of Emerging Urban C...irjes
This document summarizes a research study examining the level of community participation in the physical planning process in Paidha Town, Uganda. The study found that community participation in planning is very low, limited mostly to a few mass meetings. Few community members are actually involved in planning. Even those involved do not understand their rights and roles. Physical planning has not been adequately prioritized or funded. To improve participation, the study recommends involving communities at different administrative levels from villages to the town council, and using a wider range of participatory methods beyond just meetings. Overall, the study finds that community participation in planning is still limited and needs to be strengthened for more sustainable urban development.
Understanding the Concept of Strategic Intentirjes
This document summarizes the concept of strategic intent in strategic management. It begins by discussing the origins and evolution of strategic management from Greek history to modern theories. It then defines strategic intent, comparing various authors' definitions. A key model by Hamel and Prahalad links strategic intent to other strategic components like foresight and core competencies. Strategic intent inspires long-term thinking beyond strategic planning alone. It provides direction and commitment to help organizations shape competitive priorities and capabilities for the future. Chief executives play a critical role in developing strategic intent to guide organizational progress over 10-20 years.
The (R, Q) Control of A Mixture Inventory Model with Backorders and Lost Sale...irjes
This document summarizes an inventory model that considers a mixture of backorders and lost sales when stockouts occur. The model has the following key features:
1) The set-up cost and lead time are controllable variables that can be optimized.
2) Instead of minimizing stockout costs, the model employs a service level constraint to bound the stockout level per cycle.
3) The model is solved using a genetic algorithm approach to find optimal values for ordering quantity, set-up cost, and lead time that minimize total costs while satisfying the service level constraint.
Relation Between Stress And Menstrual Cycle At 18-21 Years Of Ageirjes
The document summarizes a study that examined the relationship between stress and menstrual cycles in Indonesian nursing students ages 18-21. It found:
1) Nearly half (45.5%) of the 132 students studied experienced irregular menstrual cycles.
2) Slightly over half (50.8%) of students reported experiencing stress.
3) There was a significant relationship between stress and irregular menstrual cycles, with stressed students over 4 times more likely to have irregular cycles.
The study concluded that most of the nursing students experienced irregular menstrual cycles and stress, and that stress was strongly correlated with irregular menstrual periods.
Wave Transmission on Submerged Breakwater with Interlocking D-Block Armorirjes
1. The document summarizes a study on wave transmission through a submerged breakwater with interlocking D-block armor. Laboratory experiments were conducted to determine how water depth, wave period, structure height, and wave steepness influence the transmission coefficient.
2. Regression analysis showed that transmission coefficient (Kt) is most influenced by the ratio of wave length to top width, ratio of structure height to water depth, and ratio of wave height to wave period squared. A formula for Kt in terms of these parameters was developed.
3. Comparisons with previous studies show the same trend that higher wave steepness results in lower transmission coefficient, validating the results. The study provides useful insights into breakwater design using inter
Wave Transmission on Submerged Breakwater with Interlocking D-Block Armor
E223539
1. International Refereed Journal of Engineering and Science (IRJES)
ISSN (Online) 2319-183X, (Print) 2319-1821
Volume 2, Issue 2(February 2013), PP.35-39
www.irjes.com
Current Trends in Reality Mining
Jyoti More1, Chelpa Lingam2
1
Lokmanya Tilak College of Engg., Koparkhairane
(affiliated to Mumbai University), INDIA
2
Pillai's HOC College of Engineering & Technology, Rasayani
(affiliated to Mumbai University), INDIA
Abstract: We live in a technology driven society where, each one of us continuously leaves digital traces
behind. Our mobile phones, for example, continuously sense our movements and interactions. This socio-
geographic data could be continuously captured by millions of people around the world and promises to reveal
important behavioral clues about humans. Mining patterns of human behavior from large-scale mobile phone
data has deep potential impact on society. Reality Mining, pioneered by Nathan Eagle and Alex Pentland,
(Massachusetts Institute of Technology (MIT)) is defined as the study of human social behavior based on
wireless mobile phone sensed data. Reality mining is based on data collected by sensors in mobile phones, cars,
security cameras, RFID ('smart card') readers, and others, all allow for the measurement of human physical
and social activity. Applications of reality mining are in diverse fields like epidemiology, psychology, urban
planning, security, marketing and even analysis of poverty. This paper attempts to overview and analyzes the
current trends in reality mining. It also presents the current challenges in this field.
Keywords: Reality Mining, Social Network Mining, Context aware computing
I. INTRODUCTION
Reality Mining is defined as the study of human social behavior based on wireless mobile phone
sensed data by Nathan Eagle and Alex Pentland, (Massachusetts Institute of Technology (MIT). It is the
collection and analysis of machine-sensed environmental data pertaining to human social behavior, with the goal
of identifying predictable patterns of behavior.
Mobile phones are promising electronic devices as sensors due to their vast usage over the world on a
daily continuous basis, and also due to the numerous types of sensors embedded in the device. The mobile
phone has developed, due to its paramount nature, from a simple communication device to include many other
tools such as a cameras, browsers, games, calendars, alarm clocks, and will surely continue to develop in the
future. All of these forms of data can be analyzed to reveal details about human behavior.
Sensors are everywhere, continuously gathering information as we live our daily lives. Whether using
email, the telephone, a bank machine, or even simpler activities such as driving, using a photocopy machine,
and a camera, all of these activities leave traces of our behavior. Recently, the communication devices have
been viewed from an engineering perspective as sensors, capturing data which scientists in many disciplines are
very excited about. This data potentially impacts every one of us as researchers begin to study the possibilities
of their use. Research using mobile phone data has mostly focused on location-driven data analysis, more
specifically, using Global Positioning System (GPS) data to predict transportation modes to predict user
destinations or paths, and to predict daily step count. Other location-driven tasks have made use of Global
System for Mobile Communications (GSM) data for indoor localization or WiFi for large-scale localization .
There are several works related to activity modeling from location-driven phone sensor data. CitySense is a
mobile application which uses GPS and WiFi data to summarize “hotspots” of activity a city, which can then be
used to make recommendations to people regarding, for example, preferred restaurants. Applications to society
as a whole are being investigated in terms of epidemiology and psychology, urban planning, security, and even
in the analysis of poverty.
This paper focuses on the possibilities, scope and challenges related to reality mining. A brief review
has been carried out for this purpose.
II. SOCIAL NETWORKS
A Social network is defined as a set of actors (individuals) and the ties (relationships) among them.
Important research problems include the study of social networks’ structural properties (such as community
detection and evolution), user properties (such as reputation and trustworthiness), and user social relations
(including influence and trust). Social networks are either explicitly specified, such as a Facebook friends list, or
www.irjes.com 35 | Page
2. Current Trends in Reality Mining
implicitly inferred from social interactions such as email or mobile phone communications. Important research
problems include the study of social networks’ structural properties (such as community detection and
evolution), user properties (such as reputation and trustworthiness), and user social relations (including
influence and trust).
2.1 Social Networks as Graphs
Social networks are naturally modeled as undirected graphs(fig 1). The entities are the nodes, and an
edge connects two nodes if the nodes are related by the relationship that characterizes the network. If there is a
degree associated with the relationship, this degree is represented by labeling the edges.
Fig 1.: Example of a small social network represented as graph
Many Interations similar opinion
Few interactions, different opinion
Fig 2.: Using Social Network Mining to estimate strengths of social relations
2.2 Social network mining
In social network mining, we apply data mining algorithms to study large-scale social networks. Social
network mining has attracted a lot of attention for many reasons. For example, studying large social networks
allows us to understand social behaviors in different contexts. In addition, by analyzing the roles of the people
involved in the network, we can understand how information and opinions spread within the network, and who
are the most influential people . In addition, since social network users may receive too much information from
time to time, social network mining can be used to support them by providing recommendations and filtering
information on their behalf.
III. CONTEXT AWARE COMPUTING
Context is a combination of any information that can be sensed or received by an entity which is useful to catch
events and situations.Context-aware computing uses information about an end user’s or object’s environment,
activities, connections and preferences to improve the quality of interaction with that end user or object. A
contextually aware system anticipates the user’s needs and proactively serves up the most appropriate and
customized content, product or service. Applications that use context, whether on a desktop or in a mobile or
ubiquitous computing environment, are called context-aware.
There are four catagories of context aware applications:
Proximate Selection: Presents information, which is selected considering some context to ease a
choice.
www.irjes.com 36 | Page
3. Current Trends in Reality Mining
Automatic Contextual Reconfiguration: Current context automatically leads to new information.The
entity creates new bindings to context resources.
Contextual Information and Commands: Information and commands are shown / executed manually
and adapted to the current situation.
Context-Triggered Actions: The current context leads an application to start a process automatically
[2]
IV. CURRENT TRENDS
The Pioneers of reality Mining, the researchers of MIT, Nathan Eagle & Alex (Sandy) Pentland et.al [4]
introduced a system for sensing complex social systems with data collected from 100 mobile phones over the
course of 9 months. They demonstrated the ability to use standard Bluetooth-enabled mobile telephones to
measure information access and use in different contexts, recognize social patterns in daily user activity, infer
relationships, identify socially significant locations, and model organizational rhythms. The major findings
included Behavior Prediction, Relationship Inference and Computational Social Science. Further, N. Eagle, A.
Pentland, and D. Lazer et. al[5] analyzed 330,000 hours of continuous behavioral data logged by the mobile
phones of 94 subjects, and compared these observations with self report relational data. The information from
these two data sources is overlapping but distinct, and the accuracy of self report data is considerably affected
by such factors as the recency and salience of particular interactions. A new method is proposed for precise
measurements of large-scale human behavior based on contextualized proximity and communication data alone,
and identify characteristic behavioral signatures of relationships that allowed to accurately predict 95% of the
reciprocated friendships in the study. Using these behavioral signatures it could be possible to predict,
individual-level outcomes such as job satisfaction. The dataset built during these experiments is still being used
by many researchers for their experimentation.
Further the field was explored by many researchers for various applications. Huiqi Zhang; Dantu, R.;
Cangussu, J.W. et.al [6] proposed in their paper, a socioscope model for social-network and human-behavior
analysis based on mobile-phone call-detail records. Because of the diversity and complexity of human social
behavior, no one technique will detect every attribute that arises when humans engage in social behaviors. They
used multiple probability and statistical methods for quantifying social groups, relationships, and
communication patterns and for detecting human-behavior changes. They proposed a new index to measure the
level of reciprocity between users and their communication partners. This reciprocity index has application in
homeland security, detection of unwanted calls (e.g., spam), telecommunication presence, and product
marketing.
Zhang, Huiqi; Dantu, Ram et. al [7] proposed that the social-tie strengths of person-to-person are
different one another even though they are in the same group. In this paper the researchers investigated the
evolution of person-to-person social relationships, quantify and predict social tie strengths based on call-detail
records of mobile phones. They proposed an affinity model for quantifying social-tie strengths in which a
reciprocity index is integrated to measure the level of reciprocity between users and their communication
partners. Since human social relationships change over time, they map the call-log data to time series of the
social-tie strengths by the affinity model. Then they used ARIMA model to predict social-tie strengths. Farrahi,
K.; Gatica-Perez, D. et. al.[8] suggested that human interaction data, or human proximity, obtained by mobile
phone Bluetooth sensor data, can be integrated with human location data, obtained by mobile cell tower
connections, to mine meaningful details about human activities from large and noisy datasets. They propose a
model, called bag of multimodal behavior, that integrates the modeling of variations of location over multiple
time-scales, and the modeling of interaction types from proximity. They further demonstrate the feasibility of
the topic modeling framework for human routine discovery by predicting missing multimodal phone data at
specific times of the day.
Simoes J., Magedanz, T. et. al. [9] proposed a work by combining social network
analysis, reality mining techniques and context-aware systems. This work provides an architecture and ground
steps for understanding and predicting human behavior and preferences within one of the most promising
business models of the future: “Advertising”. Furthermore, it shows how user related data (context) can be
securely managed and exposed to 3rd party providers, taking into account user context-aware privacy settings.
The presented concepts are then realized in a prototype, which evaluates the basic functionalities previously
described. Xu Yang, Yapeng Wang, et. al.[10] studied data mining for social network analysis purpose, which
aims at finding people's social network patterns by analyzing the information about their mobile phone usage. In
this research, the real database of MIT's Reality Mining project is employed. The classification model presented
in this project provides a new approach to find the proximity between users - based on their registration
frequencies to specific cellular towers associated their working places. K-means Algorithm is applied for
clustering.
www.irjes.com 37 | Page
4. Current Trends in Reality Mining
Huiqi Zhang; Dantu, R. et. al.[11] proposed the Bayesian inference model to calculate the willingness
level of the callee to accept calls. Before making a call, the caller may use the willingness calculator to find out
whether the callee is available. Based on this level the user can make a decision whether to make a call. They
used time of the day, day of the week, talk-time and location for calculating the willingness level.
Michal Ficek, Lukas Kencl [12] proposed that the data captured from a live cellular network with the
real users during their common daily routine help to understand how the users move within the network. Unlike
the simulations with limited potential or expensive experimental studies, the research in user-mobility or spatio-
temporal user behavior can be conducted on publicly available datasets such as the Reality Mining Dataset.
These data have been for many years a source of valuable information about social interconnection between
users and user-network associations. However, an important, spatial dimension is missing in this dataset. In this
paper, the researchers present a methodology for retrieving geographical locations matching the GSM cell
identifiers in the Reality Mining Dataset, an approach based on querying the Google Location API. A statistical
analysis of the measure of success of locations retrieval is provided. Further, they presented the LAC-clustering
method for detecting and removing outliers, a heuristic extension of general agglomerative hierarchical
clustering. This methodology enables further, previously impossible analysis of the Reality Mining Dataset,
such as studying user mobility patterns, describing spatial trajectories and mining the spatio-temporal data.
Zhenhui Li, Cindy Xide Lin et. al.[13] emphasized that Spatio-temporal data collected from GPS have
become an important resource to study the relationships of moving objects. While previous studies focus on
mining objects being together for a long time, discovering real-world relationships, such as friends or colleagues
in human trajectory data, is a fundamentally different challenge. For example, it is possible that two individuals
are friends but do not spend a lot of time being together every day. However, spending just one or two hours
together at a location away from work on a Saturday night could be a strong indicator of friend relationship.
Based on the above observations, in this paper the researchers aim to analyze and detect semantically
meaningful relationships in a supervised way. That is, with an interested relationship in mind, a user can label
some object pairs with and without such relationship. From labeled pairs, it is learnt that time intervals are the
most important ones in order to characterize this relationship. These significant time intervals, namely T-Motifs,
are then used to discover relationships hidden in the unlabeled moving object pairs.
Xiaowen Dong, Pascal Frossard et. al.[14] proposed that mobile phone data provides rich dynamic
information on human activities in social network analysis. In this paper, the researchers represent data from
two different modalities as a graph and functions defined on the vertex set of the graph. They propose a
regularization framework for the joint utilization of these two modalities of data, which enables them to model
evolution of social network information and efficiently classify relationships among mobile phone users.
From the above survey it is observed that the reality mining still has a large potential of getting
explored and contribute to ubiquitous computing field. It is one aspect of digital footprint analysis. Much more
experimentations could be carried out to analyze the social ties and predict human behavior that could be helpful
in exploring parallel universes of opinion mining, emotional mining, social network mining, etc.
V. SIGNIFICANCE OF THE STUDY
Security: Reality mining can be a great tool to track terrorists as mobile phone networks can identify
unusual patterns of movement and communication. GPS-enabled mobile phones and tracking devices
are installed on commercial vehicles to monitor traffic conditions. It facilitates in tracking of real-time
traffic congestion data.
Business: It can help companies to boost inter-office cooperation. Mining Task-Based Social Networks
can be used to explore Collaboration in Software Teams. Event planners who manage multi-million
dollar conventions and conferences can avail the data and make the best out of it. Telecom companies
can analyze the service usage and can enhance customer service.
Healthcare: Reality mining has the ability to contribute immensely towards healthcare. By gathering
health related information through mobiles, they can predict disease outbreaks. With the aid of audio or
motion sensors, changes in the nervous system can be deducted and this information could be used to
screen depression.
Viral marketing, viral advertising: these are the buzzwords referring to marketing techniques that
use pre-existing social networks and other technologies to produce increases in brand awareness or to
achieve other marketing objectives (such as product sales) through self-replicating viral processes,
analogous to the spread of viruses or computer viruses. It can be delivered by word of mouth or
enhanced by the network effects of the Internet and mobile networks. Viral marketing may take the
form of video clips, interactive Flash games, advergames, ebooks, images, text
messages,email messages, or web pages.
Digital Footprinting: Uncovering or tracing the tourists with User-Generated Content[3]
www.irjes.com 38 | Page
5. Current Trends in Reality Mining
VI. CURRENT CHALLENGES
The need for effective methods and mathematical models for analysis becomes crucial in order to make
good use of the sources. In machine learning, algorithms have been developed to recognize complex patterns
and make intelligent decisions based on data. Traditional machine learning models are recognized as useful
tools for large- scale data analysis. They have been used in the domain of human behavior analysis, though their
limitations with new types of data and human-centric questions become apparent. For example, many of the
traditional machine learning models is supervised, requiring training data which is often impossible or illegal to
collect on human subjects. Other specifications related to human-centric data include the multimodal aspect, the
noise, the massive quantity, and the complex questions of interest.
More specifically, data collected by mobile phone sensors include many types, ranging from GPS,
Bluetooth, accelerometer, to voice features. Each of these sensors may be sampled with varying frequencies,
each has varying timescales and differing characteristics, and each has its own sources of noise.
Although many basic conceptual questions remain unresolved, the major roadblock in defining the
fundamental predictability limits for technosocial systems is their sensitivity and dependence on social adaptive
behavior.
Addressing these problems involves tackling three major scientific challenges. The first is the gathering
of large-scale data on information spread and social reactions that occur during periods of crisis. This is not
presently out of reach, via largescale mobile communication databases (such as mobile telephones, Twitter logs,
and social Web tools) operating at the moment of specific disaster or crisis events. The second challenge
is the formulation of formal models that make it possible to quantify the effect of risk perception and awareness
phenomena of individuals on the technosocial network structure and dynamics. The third challenge is that of
maintaining privacy i.e. to do privacy –preserving-mining.
REFERENCES
Books:
[1] Earl Cox , “Fuzzy Modeling and Genetic Algorithms for Data mining and Exploration”, Morgan Kaufmann Publishers/ Elsevier
[2] B. Schilit, N. Adams, R. Want, “Context-Aware Computing Applications” Proceedings of Workshop on Mobile Computing
Systems and Applications, 1994
Theses:
[3] Katayoun Farrahi, “A Probabilistic Approach to Socio-Geographic Reality Mining” THESIS No5018 (2011) submitted to the
Faculty of Science and Technology Engineer École Polytechnique Fédérale de Lausanne to obtain the degree of Doctor of Science
Journal Papers:
[4] Nathan Eagle & Alex (Sandy) Pentland, “Reality mining: sensing complex social systems” Pers Ubiquit Comput (2006) 10: 255–
268, Springer-Verlag London Limited 2005
Proceedings Papers:
[5] N. Eagle, A. Pentland, and D. Lazer, “Inferring Social Network Structure using Mobile Phone Data,” Proceedings of theNational
Academy of Sciences (PNAS), vol. 106, no. 36, pp.15274–15278, September 2007
[6] Huiqi Zhang; Dantu, R.; Cangussu, J.W. , “ Socioscope: Human Relationship and Behavior Analysis in Social Networks”, IEEE
Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans, Volume: 41, Issue: 6, Publication Year: 2011 ,
Page(s): 1122 – 1143
[7] Zhang, Huiqi; Dantu, Ram, “Predicting social ties in mobile phone networks”,
IEEEInternational Conference on Intelligence and Security Informatics(ISI)2010, pages: 25-30
[8] Farrahi, K.; Gatica-Perez, D. , “Probabilistic Mining of Socio-Geographic Routines From Mobile Phone Data”, IEEE Journal of
Selected Topics in Signal Processing, Volume: 4, Issue: 4 Publication Year: 2010 , Page(s): 746 – 755
[9] Simoes, J. Magedanz, T., “Can you predict human behavior?”, 14 th International Conference on Intelligence in Next Generation
Networks (ICIN), 2010, Page(s): 1 – 6
[10] Xu Yang; Yapeng Wang; Dan Wu; Ma, A., “K-means based clustering on mobile usage for social network analysis purpose”, IEEE,
6 th International Conference on Advanced Information Management and Service(IMS), 2010, Page(s)-223-228
[11] Huiqi Zhang; Dantu R., “Quantifying the presence of Phone Users”, 5 th IEEE Conference on Consumer Communication and
Networking Conference, 2008, Page(s): 883 - 887
[12] Michal Ficek, Lukas Kencl, “Spatial Extension of the Reality Mining Dataset”, Proceedings of IEEE 7 th International Conference
on Mobild Adhoc and Sensor Systems(MASS), 2010
[13] Zhenhui Li, Cindy Xide Lin, Bolin Ding, Jiawei Han, “Mining Significant time intervals for relationship detection” Proceedings of
the 12 th international conference on Advances in spatial and temporal databases, 2011
[14] Xiaowen Dong, Pascal Frossard, Pierre Vandergheynst, Nikolai Nefedov, “A regularization framework for mobile social network
analysis” IEEE International Conference on Acoustics, Speech and Signal Processing, 2011
www.irjes.com 39 | Page