598 research outputs found

    An overview on user profiling in online social networks

    Get PDF
    Advances in Online Social Networks is creating huge data day in and out providing lot of opportunities to its users to express their interest and opinion. Due to the popularity and exposure of social networks, many intruders are using this platform for illegal purposes. Identifying such users is challenging and requires digging huge knowledge out of the data being flown in the social media. This work gives an insight to profile users in online social networks. User Profiles are established based on the behavioral patterns, correlations and activities of the user analyzed from the aggregated data using techniques like clustering, behavioral analysis, content analysis and face detection. Depending on application and purpose, the mechanism used in profiling users varies. Further study on other mechanisms used in profiling users is under the scope of future endeavors

    P Deepa Shenoy and Venugopal KR,“PTMIB: Profiling Top Most Influential Blogger using Content Based Data Mining Approach,”

    Get PDF
    Users of Online Social Network (OSN) communicate with each other, exchange information and spread rapidly influencing others in the network for taking various decisions. Blog sites allow their users to create and publish thoughts on various topics of their interest in the form of blogs/blog documents, catching the attention and letting readers to perform various activities on them. Based on the content of the blog documents posted by the user, they become popular. In this work, a novel method to profile Top Most Influential Blogger (TMIB) is proposed based on content analysis. Content of blog documents of bloggers under consideration in the blog network are compared and analyzed. Term Frequency and Inverse Document Frequency (TF-IDF) of blog documents under consideration are obtained and their Cosine Similarity score is computed. Synonyms are substituted against those unmatched keywords if the Cosine Similarity score so computed is below the threshold and an improved Cosine Similarity score of those documents under consideration is obtained. Computing the Influence Score after Synonym substitution (ISaS) of those bloggers under conflict, the top most influential blogger is profiled. The simulation results demonstrate that the proposed Profiling Top Most Influential Blogger using Synonym Substitution (PTMIBSS) algorithm is adequately accurate in determining the top most influential blogger at any instant of time considered

    Supporting exploratory browsing with visualization of social interaction history

    Get PDF
    This thesis is concerned with the design, development, and evaluation of information visualization tools for supporting exploratory browsing. Information retrieval (IR) systems currently do not support browsing well. Responding to user queries, IR systems typically compute relevance scores of documents and then present the document surrogates to users in order of relevance. Other systems such as email clients and discussion forums simply arrange messages in reverse chronological order. Using these systems, people cannot gain an overview of a collection easily, nor do they receive adequate support for finding potentially useful items in the collection. This thesis explores the feasibility of using social interaction history to improve exploratory browsing. Social interaction history refers to traces of interaction among users in an information space, such as discussions that happen in the blogosphere or online newspapers through the commenting facility. The basic hypothesis of this work is that social interaction history can serve as a good indicator of the potential value of information items. Therefore, visualization of social interaction history would offer navigational cues for finding potentially valuable information items in a collection. To test this basic hypothesis, I conducted three studies. First, I ran statistical analysis of a social media data set. The results showed that there were positive relationships between traces of social interaction and the degree of interestingness of web articles. Second, I conducted a feasibility study to collect initial feedback about the potential of social interaction history to support information exploration. Comments from the participants were in line with the research hypothesis. Finally, I conducted a summative evaluation to measure how well visualization of social interaction history can improve exploratory browsing. The results showed that visualization of social interaction history was able to help users find interesting articles, to reduce wasted effort, and to increase user satisfaction with the visualization tool

    Social influence analysis in microblogging platforms - a topic-sensitive based approach

    Get PDF
    The use of Social Media, particularly microblogging platforms such as Twitter, has proven to be an effective channel for promoting ideas to online audiences. In a world where information can bias public opinion it is essential to analyse the propagation and influence of information in large-scale networks. Recent research studying social media data to rank users by topical relevance have largely focused on the “retweet", “following" and “mention" relations. In this paper we propose the use of semantic profiles for deriving influential users based on the retweet subgraph of the Twitter graph. We introduce a variation of the PageRank algorithm for analysing users’ topical and entity influence based on the topical/entity relevance of a retweet relation. Experimental results show that our approach outperforms related algorithms including HITS, InDegree and Topic-Sensitive PageRank. We also introduce VisInfluence, a visualisation platform for presenting top influential users based on a topical query need

    CHORUS Deliverable 2.2: Second report - identification of multi-disciplinary key issues for gap analysis toward EU multimedia search engines roadmap

    Get PDF
    After addressing the state-of-the-art during the first year of Chorus and establishing the existing landscape in multimedia search engines, we have identified and analyzed gaps within European research effort during our second year. In this period we focused on three directions, notably technological issues, user-centred issues and use-cases and socio- economic and legal aspects. These were assessed by two central studies: firstly, a concerted vision of functional breakdown of generic multimedia search engine, and secondly, a representative use-cases descriptions with the related discussion on requirement for technological challenges. Both studies have been carried out in cooperation and consultation with the community at large through EC concertation meetings (multimedia search engines cluster), several meetings with our Think-Tank, presentations in international conferences, and surveys addressed to EU projects coordinators as well as National initiatives coordinators. Based on the obtained feedback we identified two types of gaps, namely core technological gaps that involve research challenges, and “enablers”, which are not necessarily technical research challenges, but have impact on innovation progress. New socio-economic trends are presented as well as emerging legal challenges

    Commercial Satellite Imagery as an Evolving Open-Source Verification Technology: Emerging Trends and Their Impact for Nuclear Nonproliferation Analysis

    Get PDF
    One evolving and increasingly important means of verification of a State’s compliance with its international security obligations involves the application of publicly available commercial satellite imagery. The International Atomic Energy Agency (IAEA) views commercial satellite imagery as “a particularly valuable open source of information.” In 2001, the IAEA established an in-house Satellite Imagery Analysis Unit (SIAU) to provide an independent capability for "the exploitation of satellite imagery which involves imagery analysis, including correlation/fusion with other sources (open source, geospatial, and third party). Commercial satellite imagery not only supports onsite inspection planning and verification of declared activities,” but perhaps its most important role is that it also “increases the possibility of detecting proscribed nuclear activities.” Analysis of imagery derived from low-earth-orbiting observation satellites has a long history dating to the early 1906s in the midst of the Cold War era. That experience provides a sound basis for effectively exploiting the flood of now publicly available commercial satellite imagery data that is now within reach of anyone with Internet access. This paper provides insights on the process of imagery analysis, together with the use of modern geospatial tools like Google Earth, and highlights a few of the potential pitfalls that can lead to erroneous analytical conclusions. A number of illustrative exemplar cases are reviewed to illustrate how academic researchers (including those within the European Union’s Joint Research Centre) and others in Non-Governmental Organizations are now applying commercial satellite imagery in combination with other open source information in innovative and effective ways for various verification purposes. The international constellation of civil imaging satellites is rapidly growing larger, thereby improving the temporal resolution (reducing the time between image acquisitions), but the satellites are also significantly improving in capabilities with regard to both spatial and spectral resolutions. The significant increase, in both the volume and type of raw imagery data that these satellites can provide, and the ease of access to it, will likely lead to a concomitant increase in new non-proliferation relevant knowledge as well. Many of these new developments were previously unanticipated, and they have already had profound effects beyond what anyone would have thought possible just a few years ago. Among those include multi-satellite, multi-sensor synergies deriving from the diversity of sensors and satellites now available, which are exemplified in a few case studies. This paper also updates earlier work on the subject by this author and explains how the many recent significant developments in the commercial satellite imaging domain will play an ever increasingly valuable role for open source nuclear nonproliferation monitoring and verification in the future.JRC.E.8-Nuclear securit

    Detecting cyber threats through social network analysis: short survey

    Get PDF
    This article considers a short survey of basic methods of social networks analysis, which are used for detecting cyber threats. The main types of social network threats are presented. Basic methods of graph theory and data mining, that deals with social networks analysis are described. Typical security tasks of social network analysis, such as community detection in network, detection of leaders in communities, detection experts in networks, clustering text information and others are considered

    Management by boundaries : Insights into the role of boundary objects in a community-based tourism development project

    Get PDF
    Community-based tourism development typically assumes co-operation between different stakeholder groups at the local level, and thus combines different types of knowledge. However, this does not imply that a consensus exists between the stakeholders in the first place. In this article, we present a potential conceptual tool, namely boundary objects that could support stakeholders from different knowledge communities in working jointly towards a common goal and generate commitment towards it. The literature concerning knowledge communities and boundary objects is used as a theoretical framework. A three-year community-based tourism development project comprises the data of the article, and is used as a case study to illustrate the role of different knowledge communities, and to analyse the selected boundary objects. The results illustrate the importance of proper design of boundary objects in community-based tourism development processes, and highlight the features of a successful boundary object in generating ownership feelings towards development activities. (C) 2018 Elsevier Ltd. All rights reserved.Peer reviewe
    corecore