• Title/Summary/Keyword: social graphs

Search Result 50, Processing Time 0.028 seconds

A Comparative Analysis of Economic Terms & Function Notations and Function Graphs in High School <Mathematics for Economics>, <Economics> Textbooks (고등학교 수학과 <경제 수학>, 사회과 <경제> 교과서에 나타난 경제 용어, 함수 기호 및 함수 그래프의 비교 분석)

  • Lee, Kyungwon;Kwon, Oh Nam
    • Communications of Mathematical Education
    • /
    • v.36 no.4
    • /
    • pp.559-587
    • /
    • 2022
  • The purpose of this study is to derive implications for the development of the next curriculum and textbooks by comparing and analyzing the textbooks of the 2015 revised high school mathematics curriculum <Mathematics for Economics> and social studies curriculum <Economics>. In the <Mathematics for Economics> textbooks, economic terms and function notations should be introduced. Additionally, the use of graphs for economic-related functions is different from the use of graphs in mathematics in the <Mathematics for Economics> textbooks. For these reasons, the usage of economic terms, function notations, and function graphs covered in the <Mathematics for Economics> textbooks were compared and analyzed with the usage in the <Economics> textbooks. In the <Mathematics for Economics> textbooks, economic terms that are highly related to mathematics are defined and presented. Contrary to the conventions of mathematics and economics, the function notations in the <Mathematics for Economics> textbooks were used inconsistently because uppercase and lowercase letters were mixed in the function notations. Function graphs in the <Mathematics for Economics> textbooks had differences in the range of values represented by the variables regarding axes and scaling. The <Mathematics for Economics> textbooks did not provide a mathematical interpretation of the translation or slope. In the course of <Mathematics for Economics>, it is necessary to specify considerations for teaching and learning, and assessment in the curriculum to promote students' understanding of mathematics and economics. The descriptions in the curriculum document and textbooks of <Mathematics for Economics> should be supplemented to provide learning opportunities for mathematical interpretation of economics-related contents.

Characterizing Collaboration in Social Network-enabled Routing

  • Mohaisen, Manar;Mohaisen, Aziz
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.4
    • /
    • pp.1643-1660
    • /
    • 2016
  • Connectivity and trust in social networks have been exploited to propose applications on top of these networks, including routing, Sybil defenses, and anonymous communication systems. In these networks, and for such applications, connectivity ensures good performance of applications while trust is assumed to always hold, so as collaboration and good behavior are always guaranteed. In this paper, we study the impact of differential behavior of users on performance in typical social network-enabled routing applications. We classify users into either collaborative or rational (probabilistically collaborative) and study the impact of this classification and the associated behavior of users on the performance of such applications, including random walk-based routing, shortest path based routing, breadth-first-search based routing, and Dijkstra routing. By experimenting with real-world social network traces, we make several interesting observations. First, we show that some of the existing social graphs have high routing costs, demonstrating poor structure that prevents their use in such applications. Second, we study the factors that make probabilistically collaborative nodes important for the performance of the routing protocol within the entire network and demonstrate that the importance of these nodes stems from their topological features rather than their percentage of all the nodes within the network.

Analysis of interest in non-face-to-face medical counseling of modern people in the medical industry (의료 산업에 있어 현대인의 비대면 의학 상담에 대한 관심도 분석 기법)

  • Kang, Yooseong;Park, Jong Hoon;Oh, Hayoung;Lee, Se Uk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.11
    • /
    • pp.1571-1576
    • /
    • 2022
  • This study aims to analyze the interest of modern people in non-face-to-face medical counseling in the medical industrys. Big data was collected on two social platforms, 지식인, a platform that allows experts to receive medical counseling, and YouTube. In addition to the top five keywords of telephone counseling, "internal medicine", "general medicine", "department of neurology", "department of mental health", and "pediatrics", a data set was built from each platform with a total of eight search terms: "specialist", "medical counseling", and "health information". Afterwards, pre-processing processes such as morpheme classification, disease extraction, and normalization were performed based on the crawled data. Data was visualized with word clouds, broken line graphs, quarterly graphs, and bar graphs by disease frequency based on word frequency. An emotional classification model was constructed only for YouTube data, and the performance of GRU and BERT-based models was compared.

Efficient Storage Management Scheme for Graph Historical Retrieval (그래프 이력 데이터 접근을 위한 효과적인 저장 관리 기법)

  • Kim, Gihoon;Kim, Ina;Choi, Dojin;Kim, Minsoo;Bok, Kyoungsoo;Yoo, Jaesoo
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.2
    • /
    • pp.438-449
    • /
    • 2018
  • Recently, various graph data have been utilized in various fields such as social networks and citation networks. As the graph changes dynamically over time, it is necessary to manage the graph historical data for tracking changes and retrieving point-in-time graphs. Most historical data changes partially according to time, so unchanged data is stored redundantly when data is stored in units of time. In this paper, we propose a graph history storage management method to minimize the redundant storage of time graphs. The proposed method continuously detects the change of the graph and stores the overlapping subgraph in intersection snapshot. Intersection snapshots are connected by a number of delta snapshots to maintain change data over time. It improves space efficiency by collectively managing overlapping data stored in intersection snapshots. We also linked intersection snapshots and delta snapshots to retrieval the graph at that point in time. Various performance evaluations are performed to show the superiority of the proposed scheme.

A Heuristic-Based Algorithm for Maximum k-Club Problem (MkCP (Maximum k-Club Problem)를 위한 휴리스틱 기반 알고리즘)

  • Kim, SoJeong;Kim, ChanSoo;Han, KeunHee
    • Journal of Digital Convergence
    • /
    • v.19 no.10
    • /
    • pp.403-410
    • /
    • 2021
  • Given an undirected simple graph, k-club is one of the proposed structures to model social groups that exist in various types in Social Network Analysis (SNA). Maximum k-Club Problem (MkCP) is to find a k-club of maximum cardinality in a graph. This paper introduces a Genetic Algorithm called HGA+DROP which can be used to approximate maximum k-club in graphs. Our algorithm modifies the existing k-CLIQUE & DROP algorithm and utilizes Heuristic Genetic Algorithms (HGA) to obtain multiple k-clubs. We experiment on DIMACS graphs for k = 2, 3, 4 and 5 to compare the performance of the proposed algorithm with existing algorithms.

Extraction of System-Wide Sybil-Resistant Trust Value embedded in Online Social Network Graph (온라인 소셜 네트워크 그래프에 내포된 시스템-차원 시빌-저항 신뢰도 추출)

  • Kim, Kyungbaek
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.12
    • /
    • pp.533-540
    • /
    • 2013
  • Anonymity is the one of main reasons for substantial improvement of Internet. It encourages various users to express their opinion freely and helps Internet based distributed systems vitalize. But, anonymity can cause unexpected threats because personal information of an online user is hidden. Especially, distributed systems are threatened by Sybil attack, where one malicious user creates and manages multiple fake online identities. To prevent Sybil attack, the traditional solutions include increasing the complexity of identity generation and mapping online identities to real-world identities. But, even though the high complexity of identity generation increases the generation cost of Sybil identities, eventually they are generated and there is no further way to suppress their activity. Also, the mapping between online identities and real identities may cause high possibility of losing anonymity. Recently, some methods using online social network to prevent Sybil attack are researched. In this paper, a new method is proposed for extracting a user's system-wide Sybil-resistant trust value by using the properties embedded in online social network graphs. The proposed method can be categorized into 3 types based on sampling and decision strategies. By using graphs sampled from Facebook, the performance of the 3 types of the proposed method is evaluated. Moreover, the impact of Sybil attack on nodes with different characteristics is evaluated in order to understand the behavior of Sybil attack.

Predicting the Lifespan and Retweet Times of Tweets Based on Multiple Feature Analysis

  • Bae, Yongjin;Ryu, Pum-Mo;Kim, Hyunki
    • ETRI Journal
    • /
    • v.36 no.3
    • /
    • pp.418-428
    • /
    • 2014
  • In social network services, such as Facebook, Google+, Twitter, and certain postings attract more people than others. In this paper, we propose a novel method for predicting the lifespan and retweet times of tweets, the latter being a proxy for measuring the popularity of a tweet. We extract information from retweet graphs, such as posting times; and social, local, and content features, so as to construct prediction knowledge bases. Tweets with a similar topic, retweet pattern, and properties are sequentially extracted from the knowledge base and then used to make a prediction. To evaluate the performance of our model, we collected tweets on Twitter from June 2012 to October 2012. We compared our model with conventional models according to the prediction goal. For the lifespan prediction of a tweet, our model can reduce the time tolerance of a tweet lifespan by about four hours, compared with conventional models. In terms of prediction of the retweet times, our model achieved a significantly outstanding precision of about 50%, which is much higher than two of the conventional models showing a precision of around 30% and 20%, respectively.

An Anomalous Host Detection Technique using Traffic Dispersion Graphs (트래픽 분산 그래프를 이용한 이상 호스트 탐지 기법)

  • Kim, Jung-Hyun;Won, You-Jip;Ahn, Soo-Han
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.2
    • /
    • pp.69-79
    • /
    • 2009
  • Today's Internet is one of the necessaries of our life. Anomalies of the Internet provoke social problems. For that reason, Internet Measurement which studies characteristics on Internet traffic attracts pubic attention. Recently, Traffic Dispersion Graph (TDG), a novel traffic analysis method, was proposed. The TDG is not a statistical analysis method but a graphical visualization method on interactions among network components. In this paper, we propose a new anomaly detection paradigm and its technique using TDG. The existing studies have focused on detecting anomalous packets of flows. On the other hand, we focus on detecting the sources of anomalous traffic. To realize our paradigm, we designed the TDG Clustering method. Through this method, we could classify anomalous hosts infected by various worm viruses. We obtained normal traffic through dropping traffic of the anomalous hosts. Especially, we expect that the TDG clustering method can be applied to real-time anomaly detection because calculations of the method are fast.

Characterization of Groundwater Chemistry and Fluoride in Groundwater Quality Monitoring Network of Korea

  • Han, Jiwon
    • Journal of the Korean earth science society
    • /
    • v.42 no.5
    • /
    • pp.556-570
    • /
    • 2021
  • This study presents the data analysis results of groundwater chemistry and the occurrence of fluoride in groundwater obtained from the groundwater quality monitoring network of Korea. The groundwater data were collected from the National Groundwater Information Center and censored for erratic values and charge balance (±10%). From the geochemical graphs and various ionic ratios, it was observed that the Ca-HCO3 type was predominant in Korean groundwater. In addition, water-rock interaction was identified as a key chemical process controlling groundwater chemistry, while precipitation and evaporation were found to be less important. According to a non-parametric trend test, at p=0.05, the concentration of fluoride in groundwater did not increase significantly and only 4.3% of the total groundwater exceeded the Korean drinking water standard of 1.5 mg/L. However, student t-tests revealed that the fluoride concentrations were closely associated with the lithologies of tuff, granite porphyry, and metamorphic rocks showing distinctively high levels. This study enhances our understanding of groundwater chemical composition and major controlling factors of fluoride occurrence and distribution in Korean groundwater.

Enhancement OLSR Routing Protocol using Particle Swarm Optimization (PSO) and Genrtic Algorithm (GA) in MANETS

  • Addanki, Udaya Kumar;Kumar, B. Hemantha
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.131-138
    • /
    • 2022
  • A Mobile Ad-hoc Network (MANET) is a collection of moving nodes that communicate and collaborate without relying on a pre-existing infrastructure. In this type of network, nodes can freely move in any direction. Routing in this sort of network has always been problematic because of the mobility of nodes. Most existing protocols use simple routing algorithms and criteria, while another important criterion is path selection. The existing protocols should be optimized to resolve these deficiencies. 'Particle Swarm Optimization (PSO)' is an influenced method as it resembles the social behavior of a flock of birds. Genetic algorithms (GA) are search algorithms that use natural selection and genetic principles. This paper applies these optimization models to the OLSR routing protocol and compares their performances across different metrics and varying node sizes. The experimental analysis shows that the Genetic Algorithm is better compared to PSO. The comparison was carried out with the help of the simulation tool NS2, NAM (Network Animator), and xgraph, which was used to create the graphs from the trace files.