12,724 research outputs found
Leveraging Citation Networks to Visualize Scholarly Influence Over Time
Assessing the influence of a scholar's work is an important task for funding
organizations, academic departments, and researchers. Common methods, such as
measures of citation counts, can ignore much of the nuance and
multidimensionality of scholarly influence. We present an approach for
generating dynamic visualizations of scholars' careers. This approach uses an
animated node-link diagram showing the citation network accumulated around the
researcher over the course of the career in concert with key indicators,
highlighting influence both within and across fields. We developed our design
in collaboration with one funding organization---the Pew Biomedical Scholars
program---but the methods are generalizable to visualizations of scholarly
influence. We applied the design method to the Microsoft Academic Graph, which
includes more than 120 million publications. We validate our abstractions
throughout the process through collaboration with the Pew Biomedical Scholars
program officers and summative evaluations with their scholars
Event detection, tracking, and visualization in Twitter: a mention-anomaly-based approach
The ever-growing number of people using Twitter makes it a valuable source of
timely information. However, detecting events in Twitter is a difficult task,
because tweets that report interesting events are overwhelmed by a large volume
of tweets on unrelated topics. Existing methods focus on the textual content of
tweets and ignore the social aspect of Twitter. In this paper we propose MABED
(i.e. mention-anomaly-based event detection), a novel statistical method that
relies solely on tweets and leverages the creation frequency of dynamic links
(i.e. mentions) that users insert in tweets to detect significant events and
estimate the magnitude of their impact over the crowd. MABED also differs from
the literature in that it dynamically estimates the period of time during which
each event is discussed, rather than assuming a predefined fixed duration for
all events. The experiments we conducted on both English and French Twitter
data show that the mention-anomaly-based approach leads to more accurate event
detection and improved robustness in presence of noisy Twitter content.
Qualitatively speaking, we find that MABED helps with the interpretation of
detected events by providing clear textual descriptions and precise temporal
descriptions. We also show how MABED can help understanding users' interest.
Furthermore, we describe three visualizations designed to favor an efficient
exploration of the detected events.Comment: 17 page
Community tracking in a cMOOC and nomadic learner behavior identification on a connectivist rhizomatic learning network
This article contributes to the literature on connectivism, connectivist MOOCs (cMOOCs) and rhizomatic learning by examining participant interactions, community formation and nomadic learner behavior in a particular cMOOC, #rhizo15, facilitated for 6 weeks by Dave Cormier. It further focuses on what we can learn by observing Twitter interactions particularly. As an explanatory mixed research design, Social Network Analysis and content analysis were employed for the purposes of the research. SNA is used at the macro, meso and micro levels, and content analysis of one week of the MOOC was conducted using the Community of Inquiry framework. The macro level analysis demonstrates that communities in a rhizomatic connectivist networks have chaotic relationships with other communities in different dimensions (clarified by use of hashtags of concurrent, past and future events). A key finding at the meso level was that as #rhizo15 progressed and number of active participants decreased, interaction increased in overall network. The micro level analysis further reveals that, though completely online, the nature of open online ecosystems are very convenient to facilitate the formation of community. The content analysis of week 3 tweets demonstrated that cognitive presence was the most frequently observed, while teaching presence (teaching behaviors of both facilitator and participants) was the lowest. This research recognizes the limitations of looking only at Twitter when #rhizo15 conversations occurred over multiple platforms frequented by overlapping but not identical groups of people. However, it provides a valuable partial perspective at the macro meso and micro levels that contribute to our understanding of community-building in cMOOCs
Analyzing covert social network foundation behind terrorism disaster
This paper addresses a method to analyze the covert social network foundation
hidden behind the terrorism disaster. It is to solve a node discovery problem,
which means to discover a node, which functions relevantly in a social network,
but escaped from monitoring on the presence and mutual relationship of nodes.
The method aims at integrating the expert investigator's prior understanding,
insight on the terrorists' social network nature derived from the complex graph
theory, and computational data processing. The social network responsible for
the 9/11 attack in 2001 is used to execute simulation experiment to evaluate
the performance of the method.Comment: 17pages, 10 figures, submitted to Int. J. Services Science
- …