Community-based question answering (CQA) platforms are crowd-sourced services for sharing user expertise on various topics, from mechanical repairs to parenting. While they naturally build-in an online social network infrastructure, they carry a very different purpose from Facebook-like social networks, where users “hang-out” with their friends and tend to share more personal information. It is unclear, thus, how the privacy concerns and their correlation with user behavior in an online social network translate into a CQA platform. This study analyzes one year of recorded traces from a mature CQA platform to understand the association between users’ privacy concerns as manifested by their account settings and their activity in the platform. The results show that privacy preference is correlated with behavior in the community in terms of engagement, retention, accomplishments and deviance from the norm. We find privacy-concerned users have higher qualitative and quantitative contributions, show higher retention, report more abuses, have higher perception on answer quality and have larger social circles. However, at the same time, these users also exhibit more deviant behavior than the users with public profiles.
I. Kayes, N. Kourtellis, D. Quercia, A. Iamnitchi and F. Bonchi. Privacy Concerns vs. User Behavior in Community Question Answering. In IEEE/ACM ASONAM, Aug. 2015.
Mobile resource problems: Authentication and usabilityjiscebooksproject
Publishers have responded to the demand for access to content via mobile devices, but done so in an inconsistant manner, with a range of apps and sites with different content, a variety of authentication issues and usability problems. This session will highlight Jisc work to surface these issues to publishers.
Creation of visualizations based on Linked DataAlvaro Graves
A common task with any relatively large amount of data is to create visual representations that help users to make sense of such data and observe trends that otherwise would be hard for them to appreciate. The creation of these visual- izations usually requires some knowledge in a programming language, making it difficult for non-technical savvy users to create visualizations. In this paper we present Visualbox, a system that makes it easier for non-programmers to create web visualizations based on Linked Data. These visualiza- tions can be accessed by any modern web browser and can be easily embedded in web pages and blogs. We describe how people can create visualizations using Visualbox and we show examples of work done by real users. Finally we present a study that shows that Visualbox makes it easier for users to create Linked Data-based visualizations.
Addressing Privacy and Security Concerns to Unlock Insights in Big Data in He...Health Data Consortium
Watch the webinar here: http://www.screencast.com/t/6E1ZgTOb
Deven McGraw, Partner at Manatt, Phelps & Phillips, discussed privacy and security concerns in regards to the liberation and usage of health data. There is enormous potential to glean valuable insights from large data sets of health (and health-related) information - but the collection and use of health information for analytics purposes raises privacy and security concerns. Solution of these issues is key to realizing the benefits of health big data. This presentation will focus primarily on some of the regulatory challenges to learning uses of clinical and administrative claims data but also touch on challenges to big data analytics in other contexts (for example, government data and data collected by consumer-facing commercial entities like mobile health apps, social networking sites, search engines, and other personal health tools).
Discover more health data resources on our website at http://www.healthdataconsortium.org/
Mobile resource problems: Authentication and usabilityjiscebooksproject
Publishers have responded to the demand for access to content via mobile devices, but done so in an inconsistant manner, with a range of apps and sites with different content, a variety of authentication issues and usability problems. This session will highlight Jisc work to surface these issues to publishers.
Creation of visualizations based on Linked DataAlvaro Graves
A common task with any relatively large amount of data is to create visual representations that help users to make sense of such data and observe trends that otherwise would be hard for them to appreciate. The creation of these visual- izations usually requires some knowledge in a programming language, making it difficult for non-technical savvy users to create visualizations. In this paper we present Visualbox, a system that makes it easier for non-programmers to create web visualizations based on Linked Data. These visualiza- tions can be accessed by any modern web browser and can be easily embedded in web pages and blogs. We describe how people can create visualizations using Visualbox and we show examples of work done by real users. Finally we present a study that shows that Visualbox makes it easier for users to create Linked Data-based visualizations.
Addressing Privacy and Security Concerns to Unlock Insights in Big Data in He...Health Data Consortium
Watch the webinar here: http://www.screencast.com/t/6E1ZgTOb
Deven McGraw, Partner at Manatt, Phelps & Phillips, discussed privacy and security concerns in regards to the liberation and usage of health data. There is enormous potential to glean valuable insights from large data sets of health (and health-related) information - but the collection and use of health information for analytics purposes raises privacy and security concerns. Solution of these issues is key to realizing the benefits of health big data. This presentation will focus primarily on some of the regulatory challenges to learning uses of clinical and administrative claims data but also touch on challenges to big data analytics in other contexts (for example, government data and data collected by consumer-facing commercial entities like mobile health apps, social networking sites, search engines, and other personal health tools).
Discover more health data resources on our website at http://www.healthdataconsortium.org/
Reliving on demand a total viewer experienceVivek Singh
Enabling
media reliving experiences that are aesthetically pleasing,
interactive, and semantically drivable as they center on people,
locations, time, and events discovered in a media collection.
Tools for SNA
Page Rank Algorithm
Hierarchical Clustering
Recommendation System based on SNA (Collaborative Filtering)
How Facebook/Amazon uses SNA for recommendations?
Two Hop degree
Dynamism in Friendship Network of CSE-B
Online Social Networks and Clusters
Influential Nodes and Their Importance
Bibliography
Question - Answer Session
Social media mining and multimedia analysis research and applicationsYiannis Kompatsiaris
In this talk, research and applications in social media mining and multimedia analysis are going to be presented. Social media sharing websites host billions of images and videos, which have been annotated and shared among friends, or published in groups that cover a specific topic of interest. The fact that users annotate and comment on the content in the form of tags, ratings, preferences and so on, and that these activities are performed on a daily basis, gives such social media data source an extremely dynamic nature that reflects topics of interests, events and the evolution of community opinion and focus.
The talk will present research challenges and activities and will focus on multi-modal graph-based community detection methods for social media mining, concept and event detection. Clusttour, a mobile and web application integrating research results with appropriate interface design will be demonstrated as a relevant use case. The talk will also include approaches for object/region classifiers learned using the self-training paradigm with loosely annotated training samples automatically selected from social media.
This material is for PGPSE / CSE students of AFTERSCHOOOL. PGPSE / CSE are free online programme - open for all - free for all - to promote entrepreneurship and social entrepreneurship PGPSE is for those who want to transform the world. It is different from MBA, BBA, CFA, CA,CS,ICWA and other traditional programmes. It is based on self certification and based on self learning and guidance by mentors. It is for those who want to be entrepreneurs and social changers. Let us work together. Our basic idea is that KNOWLEDGE IS FREE & AND SHARE IT WITH THE WORLD
From User Needs to Community Health: Mining User Behaviour to Analyse Online ...Matthew Rowe
Invited keynote talk at the 1st Workshop of Quality, Motivation and Coordination of Open Collaboration @ the International Conference on Social Informatics 2013
This presentation discusses Ethics considerations for Corpus Linguistics studies using internet resources. The talk was given at the Corpus Linguistics 2015 conference at Lancaster, UK (July 21-24, 2015).
Importance of Accessibility for a Successful and Future-Proof Business - CSUN...Artur Ortega
Importance of Accessibility for a Successful and Future-Proof Business - An analysis based on recent studies about the benefits of accessibility for a robust internet business, with a focus on future-proof revenue. Artur Ortega; Saturday, March 27, 10:40-11:40 AM PST; Annie AB. CSUN International Accessibility Conference
#mytweet via Instagram: Exploring User Behaviour Across Multiple Social NetworksBang Hui Lim
We study how users of multiple online social net- works (OSNs) employ and share information by studying a common user pool that use six OSNs – Flickr, Google+, Instagram, Tumblr, Twitter, and YouTube. We analyze the temporal and topical signature of users’ sharing behaviour, showing how they exhibit distinct behaviorial patterns on different networks. We also examine cross-sharing (i.e., the act of user broadcasting their activity to multiple OSNs near-simultaneously), a previously unstudied behaviour and demonstrate how certain OSNs play the roles of originating source and destination sinks.
Working with Social Media Data: Ethics & good practice around collecting, usi...Nicola Osborne
Slides from a workshop delivered for the University of Edinburgh Digital Scholarship programme, on 18th October 2017. For further information on the programme see: http://www.digital.cahss.ed.ac.uk/ or #DigScholEd. If you are interested in hosting a similar workshop, or adapting these slides please contact me: nicola.osborne@ed.ac.uk.
Reliving on demand a total viewer experienceVivek Singh
Enabling
media reliving experiences that are aesthetically pleasing,
interactive, and semantically drivable as they center on people,
locations, time, and events discovered in a media collection.
Tools for SNA
Page Rank Algorithm
Hierarchical Clustering
Recommendation System based on SNA (Collaborative Filtering)
How Facebook/Amazon uses SNA for recommendations?
Two Hop degree
Dynamism in Friendship Network of CSE-B
Online Social Networks and Clusters
Influential Nodes and Their Importance
Bibliography
Question - Answer Session
Social media mining and multimedia analysis research and applicationsYiannis Kompatsiaris
In this talk, research and applications in social media mining and multimedia analysis are going to be presented. Social media sharing websites host billions of images and videos, which have been annotated and shared among friends, or published in groups that cover a specific topic of interest. The fact that users annotate and comment on the content in the form of tags, ratings, preferences and so on, and that these activities are performed on a daily basis, gives such social media data source an extremely dynamic nature that reflects topics of interests, events and the evolution of community opinion and focus.
The talk will present research challenges and activities and will focus on multi-modal graph-based community detection methods for social media mining, concept and event detection. Clusttour, a mobile and web application integrating research results with appropriate interface design will be demonstrated as a relevant use case. The talk will also include approaches for object/region classifiers learned using the self-training paradigm with loosely annotated training samples automatically selected from social media.
This material is for PGPSE / CSE students of AFTERSCHOOOL. PGPSE / CSE are free online programme - open for all - free for all - to promote entrepreneurship and social entrepreneurship PGPSE is for those who want to transform the world. It is different from MBA, BBA, CFA, CA,CS,ICWA and other traditional programmes. It is based on self certification and based on self learning and guidance by mentors. It is for those who want to be entrepreneurs and social changers. Let us work together. Our basic idea is that KNOWLEDGE IS FREE & AND SHARE IT WITH THE WORLD
From User Needs to Community Health: Mining User Behaviour to Analyse Online ...Matthew Rowe
Invited keynote talk at the 1st Workshop of Quality, Motivation and Coordination of Open Collaboration @ the International Conference on Social Informatics 2013
This presentation discusses Ethics considerations for Corpus Linguistics studies using internet resources. The talk was given at the Corpus Linguistics 2015 conference at Lancaster, UK (July 21-24, 2015).
Importance of Accessibility for a Successful and Future-Proof Business - CSUN...Artur Ortega
Importance of Accessibility for a Successful and Future-Proof Business - An analysis based on recent studies about the benefits of accessibility for a robust internet business, with a focus on future-proof revenue. Artur Ortega; Saturday, March 27, 10:40-11:40 AM PST; Annie AB. CSUN International Accessibility Conference
#mytweet via Instagram: Exploring User Behaviour Across Multiple Social NetworksBang Hui Lim
We study how users of multiple online social net- works (OSNs) employ and share information by studying a common user pool that use six OSNs – Flickr, Google+, Instagram, Tumblr, Twitter, and YouTube. We analyze the temporal and topical signature of users’ sharing behaviour, showing how they exhibit distinct behaviorial patterns on different networks. We also examine cross-sharing (i.e., the act of user broadcasting their activity to multiple OSNs near-simultaneously), a previously unstudied behaviour and demonstrate how certain OSNs play the roles of originating source and destination sinks.
Working with Social Media Data: Ethics & good practice around collecting, usi...Nicola Osborne
Slides from a workshop delivered for the University of Edinburgh Digital Scholarship programme, on 18th October 2017. For further information on the programme see: http://www.digital.cahss.ed.ac.uk/ or #DigScholEd. If you are interested in hosting a similar workshop, or adapting these slides please contact me: nicola.osborne@ed.ac.uk.
This presentation was provided during the NISO Working Group Connection Live event held on April 30, 2019. Speakers include Todd Carpenter, Ralph Youngen, and Chris Shillum.
DevOps Support for an Ethical Software Development Life Cycle (SDLC)Mark Underwood
As part of the IEEE SA P7000 and P2675 working groups, it has been determined that DevOps engineering practices can support (or hinder) the environment for an ethical software development life cycle (SDLC). This deck scratches the surface.
Inferring Peer Centrality in Socially-Informed Peer-to-Peer SystemsNicolas Kourtellis
Social applications implemented on a peer-to-peer (P2P) architecture mine the social graph of their users for improved performance in search, recommendations, resource
sharing and others. In such applications, the social graph that connects their users is distributed on the peer-to-peer system: the traversal of the social graph translates to a socially-informed routing in the peer-to-peer layer.
In this work we introduce the model of a projection graph that is the result of mapping a social graph onto a peer-to-peer network. We analytically formulate the relation between metrics in the social graph and in the projection graph. We focus on three such graph metrics: degree centrality, node betweenness centrality, and edge betweenness centrality. We evaluate experimentally the feasibility of estimating these metrics in the projection graph from the metrics of the social graph. Our experiments on real networks show that when mapping communities of 50-150 users on a peer, there is an optimal organization of the projection graph with respect to degree and node betweenness centrality. In this range, the association between the properties of the social graph and the projection graph is the highest, and thus the properties of the (dynamic) projection graph can be inferred from
the properties of the (slower changing) social graph. We discuss the applicability of our findings to aspects of peer-to-peer systems such as data dissemination, social search, peer vulnerability, and data placement and caching.
Inferring Peer Centrality in Socially-Informed Peer-to-Peer Systems. Nicolas Kourtellis and Adriana Iamnitchi. In Proceedings of 11th IEEE International Conference on Peer-to-Peer Computing (P2P'11), Kyoto, Japan, Aug 2011
On managing social data for enabling socially-aware applications and servicesNicolas Kourtellis
Applications and services that take advantage of social data usually infer social relationships using information produced only within their own context. We propose to combine social information from multiple sources into a directed and weighted social multigraph in order to enable novel socially- aware applications and services. We present GeoS, our early prototype of a geo-social data management service which implements a representative set of social inferences. We demonstrate GeoS’ potential for social applications on a collection of social data that combines collocation information and Facebook friendship declarations from 100 students.
On managing social data for enabling socially-aware applications and services. Paul Anderson, Nicolas Kourtellis, Joshua Finnis, and Adriana Iamnitchi. In Proceedings of the 3rd Workshop on Social Network Systems (SNS'10), Paris, France, Apr 2010
Scalable Online Betweenness Centrality in Evolving GraphsNicolas Kourtellis
Scalable Online Betweenness Centrality in Evolving Graphs.
This framework maintains both vertex & edge betweenness up-to-date for same computational cost handles both additions and removals of vertices and edges in a unified approach has reduced space overhead and is truly scalable and amenable to real-world deployment can be parallelized and deployed on top of modern DSPEs.
Available at: http://github.com/nicolas-kourtellis/StreamingBetweenness
N. Kourtellis, G. De Francisci Morales and F. Bonchi. Scalable Online Betweenness Centrality in Evolving Graphs. IEEE International Conference on Data Engineering, May 2016.
Prometheus: Distributed Management of Geo-Social Data. Nicolas Kourtellis, Joshua Finnis, Paul Anderson, Jeremy Blackburn, Adriana Iamnitchi. In USENIX Symposium of Network Systems Design and Implementation (NSDI'10), San Jose, CA, US, Apr 2010.
Prometheus: User-Controlled P2P Social Data Management for Socially-aware App...Nicolas Kourtellis
Recent Internet applications, such as online social networks and user-generated content sharing, produce an unprecedented amount of social information, which is further augmented by location or collocation data collected from mobile phones. Unfortunately, this wealth of social information is fragmented across many different proprietary applications. Combined, it could provide a more accurate representation of the social world, and it could enable a whole new set of socially-aware applications. We introduce Prometheus, a peer-to-peer service that collects and man- ages social information from multiple sources and implements a set of social inference functions while enforcing user-defined access control poli- cies. Prometheus is socially-aware: it allows users to select peers that manage their social information based on social trust and exploits naturally- formed social groups for improved performance. We tested our Prometheus prototype on PlanetLab and built a mobile social application to test the performance of its social inference functions under real-time constraints. We showed that the social-based mapping of users onto peers improves the service response time and high service availability is achieved with low overhead.
Prometheus: User-Controlled P2P Social Data Management for Socially-aware Applications. Nicolas Kourtellis, Joshua Finnis, Paul Anderson, Jeremy Blackburn, Cristian Borcea, Adriana Iamnitchi. ACM/IFIP/USENIX 11th International Middleware Conference, 2010
CQA services are collaborative platforms where users ask and answer questions. We investigate the influence of national culture on people’s online questioning and answering behavior. For this, we analyzed a sample of 200 thousand users in Yahoo Answers from 67 countries. We use a number of cultural factors extracted from Geert Hofstede’s cultural dimensions and Robert Levine’s Pace of Life and show that behavioral cultural differences exist in community question answering platforms. We find that national cultures differ in Yahoo Answers along a number of dimensions such as temporal predictability of activities, contribution related behavioral patterns, privacy concerns, and power inequality.
Cultures in Community Question Answering. Imrul Kayes, Nicolas Kourtellis, Daniele Quercia, Adriana Iamnitchi, and Francesco Bonchi. ACM 26th Conference on Hypertext and Social Media (HT'15), 2015
IoT big data requires new machine learning methods able to scale to large size of data arriving at high speed. Decision trees are popular machine learning models since they are very effective, yet easy to interpret and visualize. In the literature, we can find distributed algorithms for learning decision trees, and also streaming algorithms, but not algorithms that combine both features. In this paper we present the Vertical Hoeffding Tree (VHT), the first distributed streaming algorithm for learning decision trees. It features a novel way of distributing decision trees via vertical parallelism. The algorithm is implemented on top of Apache SAMOA, a platform for mining big data streams, and thus able to run on real-world clusters. Our experiments to study the accuracy and throughput of VHT prove its ability to scale while attaining superior performance compared to sequential decision trees.
VHT: Vertical Hoeffding Tree. N. Kourtellis, G. De Francisci Morales, A. Bifet, A. Mordupo. IEEE BigData 2016.
SAMOA: A Platform for Mining Big Data Streams (Apache BigData North America 2...Nicolas Kourtellis
A general overview of the APACHE SAMOA platform for mining big data streams using machine learning algorithms running on distributed stream processing platforms such as Apache STORM, Apache Flink, Apache Samza and Apache Apex.
Results are shown from experimentation with VHT, the Vertical Hoeffding Tree proposed in "VHT: Vertical Hoeffding Tree." N. Kourtellis, G. De Francisci Morales, A. Bifet, A. Mordupo. IEEE BigData 2016.
Presentation in APACHE BIG DATA North America 2016
SAMOA: A Platform for Mining Big Data Streams (Apache BigData Europe 2015)Nicolas Kourtellis
A general overview of the APACHE SAMOA platform for mining big data streams using machine learning algorithms running on distributed stream processing platforms such as Apache STORM, Apache Flink, Apache Samza and Apache Apex.
Results are shown from experimentation with VHT, the Vertical Hoeffding Tree proposed in "VHT: Vertical Hoeffding Tree." N. Kourtellis, G. De Francisci Morales, A. Bifet, A. Mordupo. IEEE BigData 2016.
Presentation in APACHE BIG DATA Europe 2015
Remote Sensing and Computational, Evolutionary, Supercomputing, and Intellige...University of Maribor
Slides from talk:
Aleš Zamuda: Remote Sensing and Computational, Evolutionary, Supercomputing, and Intelligent Systems.
11th International Conference on Electrical, Electronics and Computer Engineering (IcETRAN), Niš, 3-6 June 2024
Inter-Society Networking Panel GRSS/MTT-S/CIS Panel Session: Promoting Connection and Cooperation
https://www.etran.rs/2024/en/home-english/
Richard's aventures in two entangled wonderlandsRichard Gill
Since the loophole-free Bell experiments of 2020 and the Nobel prizes in physics of 2022, critics of Bell's work have retreated to the fortress of super-determinism. Now, super-determinism is a derogatory word - it just means "determinism". Palmer, Hance and Hossenfelder argue that quantum mechanics and determinism are not incompatible, using a sophisticated mathematical construction based on a subtle thinning of allowed states and measurements in quantum mechanics, such that what is left appears to make Bell's argument fail, without altering the empirical predictions of quantum mechanics. I think however that it is a smoke screen, and the slogan "lost in math" comes to my mind. I will discuss some other recent disproofs of Bell's theorem using the language of causality based on causal graphs. Causal thinking is also central to law and justice. I will mention surprising connections to my work on serial killer nurse cases, in particular the Dutch case of Lucia de Berk and the current UK case of Lucy Letby.
Toxic effects of heavy metals : Lead and Arsenicsanjana502982
Heavy metals are naturally occuring metallic chemical elements that have relatively high density, and are toxic at even low concentrations. All toxic metals are termed as heavy metals irrespective of their atomic mass and density, eg. arsenic, lead, mercury, cadmium, thallium, chromium, etc.
DERIVATION OF MODIFIED BERNOULLI EQUATION WITH VISCOUS EFFECTS AND TERMINAL V...Wasswaderrick3
In this book, we use conservation of energy techniques on a fluid element to derive the Modified Bernoulli equation of flow with viscous or friction effects. We derive the general equation of flow/ velocity and then from this we derive the Pouiselle flow equation, the transition flow equation and the turbulent flow equation. In the situations where there are no viscous effects , the equation reduces to the Bernoulli equation. From experimental results, we are able to include other terms in the Bernoulli equation. We also look at cases where pressure gradients exist. We use the Modified Bernoulli equation to derive equations of flow rate for pipes of different cross sectional areas connected together. We also extend our techniques of energy conservation to a sphere falling in a viscous medium under the effect of gravity. We demonstrate Stokes equation of terminal velocity and turbulent flow equation. We look at a way of calculating the time taken for a body to fall in a viscous medium. We also look at the general equation of terminal velocity.
Deep Behavioral Phenotyping in Systems Neuroscience for Functional Atlasing a...Ana Luísa Pinho
Functional Magnetic Resonance Imaging (fMRI) provides means to characterize brain activations in response to behavior. However, cognitive neuroscience has been limited to group-level effects referring to the performance of specific tasks. To obtain the functional profile of elementary cognitive mechanisms, the combination of brain responses to many tasks is required. Yet, to date, both structural atlases and parcellation-based activations do not fully account for cognitive function and still present several limitations. Further, they do not adapt overall to individual characteristics. In this talk, I will give an account of deep-behavioral phenotyping strategies, namely data-driven methods in large task-fMRI datasets, to optimize functional brain-data collection and improve inference of effects-of-interest related to mental processes. Key to this approach is the employment of fast multi-functional paradigms rich on features that can be well parametrized and, consequently, facilitate the creation of psycho-physiological constructs to be modelled with imaging data. Particular emphasis will be given to music stimuli when studying high-order cognitive mechanisms, due to their ecological nature and quality to enable complex behavior compounded by discrete entities. I will also discuss how deep-behavioral phenotyping and individualized models applied to neuroimaging data can better account for the subject-specific organization of domain-general cognitive systems in the human brain. Finally, the accumulation of functional brain signatures brings the possibility to clarify relationships among tasks and create a univocal link between brain systems and mental functions through: (1) the development of ontologies proposing an organization of cognitive processes; and (2) brain-network taxonomies describing functional specialization. To this end, tools to improve commensurability in cognitive science are necessary, such as public repositories, ontology-based platforms and automated meta-analysis tools. I will thus discuss some brain-atlasing resources currently under development, and their applicability in cognitive as well as clinical neuroscience.
Seminar of U.V. Spectroscopy by SAMIR PANDASAMIR PANDA
Spectroscopy is a branch of science dealing the study of interaction of electromagnetic radiation with matter.
Ultraviolet-visible spectroscopy refers to absorption spectroscopy or reflect spectroscopy in the UV-VIS spectral region.
Ultraviolet-visible spectroscopy is an analytical method that can measure the amount of light received by the analyte.
Phenomics assisted breeding in crop improvementIshaGoswami9
As the population is increasing and will reach about 9 billion upto 2050. Also due to climate change, it is difficult to meet the food requirement of such a large population. Facing the challenges presented by resource shortages, climate
change, and increasing global population, crop yield and quality need to be improved in a sustainable way over the coming decades. Genetic improvement by breeding is the best way to increase crop productivity. With the rapid progression of functional
genomics, an increasing number of crop genomes have been sequenced and dozens of genes influencing key agronomic traits have been identified. However, current genome sequence information has not been adequately exploited for understanding
the complex characteristics of multiple gene, owing to a lack of crop phenotypic data. Efficient, automatic, and accurate technologies and platforms that can capture phenotypic data that can
be linked to genomics information for crop improvement at all growth stages have become as important as genotyping. Thus,
high-throughput phenotyping has become the major bottleneck restricting crop breeding. Plant phenomics has been defined as the high-throughput, accurate acquisition and analysis of multi-dimensional phenotypes
during crop growing stages at the organism level, including the cell, tissue, organ, individual plant, plot, and field levels. With the rapid development of novel sensors, imaging technology,
and analysis methods, numerous infrastructure platforms have been developed for phenotyping.
Nucleophilic Addition of carbonyl compounds.pptxSSR02
Nucleophilic addition is the most important reaction of carbonyls. Not just aldehydes and ketones, but also carboxylic acid derivatives in general.
Carbonyls undergo addition reactions with a large range of nucleophiles.
Comparing the relative basicity of the nucleophile and the product is extremely helpful in determining how reversible the addition reaction is. Reactions with Grignards and hydrides are irreversible. Reactions with weak bases like halides and carboxylates generally don’t happen.
Electronic effects (inductive effects, electron donation) have a large impact on reactivity.
Large groups adjacent to the carbonyl will slow the rate of reaction.
Neutral nucleophiles can also add to carbonyls, although their additions are generally slower and more reversible. Acid catalysis is sometimes employed to increase the rate of addition.
3D Hybrid PIC simulation of the plasma expansion (ISSS-14)
Privacy Concerns vs. User Behavior in Community Question Answering
1. 7th IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
Privacy Concerns vs. User Behavior
in Community Question Answering
Imrul Kayes
USF
Nicolas Kourtellis
Telefonica Research
Francesco Bonchi
Yahoo Labs
Adriana Iamnitchi
USF
2. 7th IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
Community Question Answering Sites
• CQA sites: Popular platforms
– Yahoo Answers: 200M users, 5M users/day
– Quora: 1M/month
– Stack Exchange: 4M users (e.g., Stack Overflow)
• Functionalities:
– Q/A posts & comments, social networking,
leaderboards, and more.
• Why do we need them?
– Not all web-searches are successful!
– Complicated / intricate questions!
1
3. 7th IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
Motivation
• Privacy of user data: important but unresolved issue
• Privacy vs. platform usability:
– Public content is helpful but users would prefer privacy
• Privacy-aware users are more engaged (e.g., on FB)
– Is there a sweet-spot?
2
Privacy
Platform usability
4. 7th IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
Main Idea
• Utilize users’ modifications on privacy settings
as a proxy of privacy concerns
• Group users into privacy categories:
1. Public
2. Semi-private
• QA-private, Network-private
3. Private
• Study users’ engagement vs. privacy concerns
– Use activity logs & privacy settings instead of
surveys
3
5. 7th IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
Outline
• CQA platforms
• Motivation
• Main idea
• Research Questions
• Yahoo Answers Dataset
• Results
• Proposals for CQA platforms improvements
4
6. 7th IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
Motivating Research Questions
1. Are privacy-concerned users more engaged than
public users?
– Retention, social circles
2. Do privacy-concerned users contribute
differently to the community than public users
– Points, best answers
3. Do privacy-concerned users have different
perception on answer quality than public users?
– Thumbs up/down of best answers
5
7. 7th IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
Motivating Research Questions
4. Are privacy-concerned users also more abuse-
conscious?
– Abuse reporting
5. Are privacy-concerned users more likely to
violate community rules?
– Deviance score
6
8. 7th IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
Yahoo Answers Dataset
• 1.5M users (2012-2013)
– 2.6M follower-followee ties (SN properties*)
– LCC: 1.1M nodes (74%), 2.4M edges (92%)
• Keep active users with more than 10 Q/A (68%)
• 4 privacy settings:
– All public (84.4%), PU
– Hide content (Questions/Answers) (2.5%), QA
– Hide network (Followers/Followees) (0.9%), N
– Hide content & network (12.2%), PR
7
Public
Semi-
Private
Private
*Kayes et al. “The social world of content abusers in Community Question
Answering“, WWW’2015
9. 7th IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
Privacy & Retention
• Semi-private users have higher inter-event time
• Private users have lower inter-event time
T =
8
T j = (tk+1 -tk )
kÎFj
Fj
Õ
é
ë
ê
ê
ù
û
ú
ú
1/ Fj
, where Fj = {fair events of user j}
Compute T j,"jÎ P, " P Î {PU, QA, N, PR} Retentionj = 1
T j
10. 7th IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
Privacy & Social Circles
Indegree = #followers, Outdegree = #followees
• Privacy-concerned users have larger social circles
• Followers or followees
9
11. 7th IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
Privacy & Accomplishments
• Private & semi-private users have more points
• Privacy-concerned users contribute more in YA
quantitatively
10
12. 7th IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
Privacy & Accomplishments
best answer percentage (BAP
• Privacy-concerned users contribute more in YA
qualitatively
11
13. 7th IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
Privacy & Best Answers
• Privacy-concerned users select more Best Answers
12
14. 7th IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
• Community feedback via thumbs up and down:
• Privacy-concerned users have more average thumbs on
Best Answers
Privacy & Best Answer Quality
13
15. 7th IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
Privacy & Abuse Reporting
• 90% of reports submitted by 8% of users
• Privacy-concerned users post more valid reports
14
16. 7th IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
Privacy & Deviance
• Deviance can indicate user engagement*
• Private > semi-private > public users’ deviance scores
15
* Kayes et al. “The social world of content abusers in community
question answering“, WWW’2015
17. 7th IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
Summary
1. 87.20% public profiles (default)
2. Privacy-concerned users are more engaged:
– higher retention
– more social network contacts
– contribute more & better content
– higher perception on answer quality
– better citizens in terms of reporting abuses
– higher platform engagement (via deviance)
16
18. 7th IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
Suggestions for better CQA platforms
• If privacy settings modified:
– Likely commitment to the platform
– Question recommendation and routing
– Community moderation
• If privacy settings unmodified:
– Incentivize for increased participation & retention
• Privacy settings in CQA sites
– Prediction & recommendation via ML techniques
17
19. 7th IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
Privacy Concerns vs. User Behavior
in Community Question Answering
Imrul Kayes
USF
Nicolas Kourtellis
Telefonica Research
Francesco Bonchi
Yahoo Labs
Adriana Iamnitchi
USF
Paper: http://arxiv.org/abs/1508.06184
nicolas.kourtellis@telefonica.com
Twitter: @kourtellis
Editor's Notes
68 % of google searches were successful (2011)
80% for Bing and Yahoo (2011)
2% on Yahoo lead to posts on YA.
if a user has a high average time difference between two fair actions, her retention is low
Non-different:
QA-private & network-private (for Qs)
Network-private & private (for As)
20.56% of private users have more than 5 followers, only 4.42% of public users do.
15.33% of network-private and 14.48% of QA-private users have more than 5 followers.
14.79% of private users follow more than 5 users, only 5.85% of public users do.
For network-private and QA-private users, these numbers are 12.92% and 9.79%, respectively.
53.28% of private, 52.35% of QA-private and 45.51% of network-private users have more than 1000 points, only 14.14% of public users have more than 1000 points.
Private & QA-private groups non-different
27.10% of public, 33.56% of private, 34.03% of network-private and 36.01% of QA-private users have award rating percentage more than 20
private and network-private groups are non-different
61.35% of private, 57.85% of network- private, 51.61% of QA-private users selected more than 20% of their best answers by themselves, only 38.35% of public users have done the selection by themselves.
Network-private and private groups non-different
21.40% of private, 24.62% of network- private, 16.51% of QA-private users have got 5 average thumbs on their best answers, only 11.45% of public users have got 5 average thumbs on the best answers they selected.
46% of the users reported only one abuse and 90% of abuse reports are contributed by only 7.96% of users.
5.93% of private, 3.15% of network-private, 2.73% of QA- private and only 0.20% of public users have posted more than 10 valid abuse reports.
QA-private and network-private groups are non-different
Network-private & QA-private groups are non-differen
1. Similar to FB (90%)
2. Similar to FB (higher privacy settings -> higher engagement with platform)
Besides followers, interests, question category, diversity and freshness, add privacy