1,853 research outputs found

    A Cultural Market Model

    Full text link
    Social interactions and personal tastes shape our consumption behavior of cultural products. In this study, we present a computational model of a cultural market and we aim to analyze the behavior of the consumer population as an emergent phenomena. Our results suggest that the final market shares of cultural products dramatically depend on consumer heterogeneity and social interaction pressure. Furthermore, the relation between the resulting market shares and social interaction is robust with respect to a wide range of variation in the parameter values and the type of topology

    Use of Rapid Probabilistic Argumentation for Ranking on Large Complex Networks

    Full text link
    We introduce a family of novel ranking algorithms called ERank which run in linear/near linear time and build on explicitly modeling a network as uncertain evidence. The model uses Probabilistic Argumentation Systems (PAS) which are a combination of probability theory and propositional logic, and also a special case of Dempster-Shafer Theory of Evidence. ERank rapidly generates approximate results for the NP-complete problem involved enabling the use of the technique in large networks. We use a previously introduced PAS model for citation networks generalizing it for all networks. We propose a statistical test to be used for comparing the performances of different ranking algorithms based on a clustering validity test. Our experimentation using this test on a real-world network shows ERank to have the best performance in comparison to well-known algorithms including PageRank, closeness, and betweenness.Comment: 11 pages, 10 figure

    Context Sensitive Article Ranking with Citation Context Analysis

    Full text link
    It is hard to detect important articles in a specific context. Information retrieval techniques based on full text search can be inaccurate to identify main topics and they are not able to provide an indication about the importance of the article. Generating a citation network is a good way to find most popular articles but this approach is not context aware. The text around a citation mark is generally a good summary of the referred article. So citation context analysis presents an opportunity to use the wisdom of crowd for detecting important articles in a context sensitive way. In this work, we analyze citation contexts to rank articles properly for a given topic. The model proposed uses citation contexts in order to create a directed and weighted citation network based on the target topic. We create a directed and weighted edge between two articles if citation context contains terms related with the target topic. Then we apply common ranking algorithms in order to find important articles in this newly created network. We showed that this method successfully detects a good subset of most prominent articles in a given topic. The biggest contribution of this approach is that we are able to identify important articles for a given search term even though these articles do not contain this search term. This technique can be used in other linked documents including web pages, legal documents, and patents

    Compatibility of Mating Preferences

    Full text link
    Human mating is a complex phenomenon. Although men and women have different preferences in mate selection, there should be compatibility in these preferences since human mating requires agreement of both parties. We investigate how compatible the mating preferences of men and women are in a given property such as age, height, education and income. We use dataset of a large online dating site (N = 44, 255 users). (i) Our findings are based on the "actual behavior" of users trying to find a date online, rather than questions about a "hypothetical" partner as in surveys. (ii) We confirm that women and men have different mating preferences. Women prefer taller and older men with better education and higher income then themselves. Men prefer just the opposite. (iii) Our findings indicate that these differences complement each other. (iv) Highest compatibility is observed in income with 95 %. This might be an indication that income is in the process of becoming more important than other properties, including age, in our modern society. (v) An evolutionary model is developed which produces similar results.Comment: 8 pages, 3 figure

    Asymmetries of Men and Women in Selecting Partner

    Full text link
    This paper investigates human dynamics in a large online dating site with 3,000 new users daily who stay in the system for 3 months on the average. The daily activity is also quite large such as 500,000 massage transactions, 5,000 photo uploads, and 20,000 votes. The data investigated has 276, 210 male and 483, 963 female users. Based on the activity that they made, there are clear distinctions between men and women in their pattern of behavior. Men prefer lower, women prefer higher qualifications in their partner

    Computational Models for Commercial Advertisements in Social Networks

    Full text link
    Identifying noteworthy spreaders in a network is essential for understanding the spreading process and controlling the reach of the spread in the network. The nodes that are holding more intrinsic power to extend the reach of the spread are important due to demand for various applications such as viral marketing, controlling rumor spreading or get a better understanding of spreading of the diseases. As an application of the viral marketing, maximization of the reach with a fixed budget is a fundamental requirement in the advertising business. Distributing a fixed number of promotional items for maximizing the viral reach can leverage influencer detection methods. For detecting such "influencer" nodes, there are local metrics such as degree centrality (mostly used as in-degree centrality) or global metrics such as k-shell decomposition or eigenvector centrality. All the methods can rank graphs but they all have limitations and there is still no de-facto method for influencer detection in the domain. In this paper, we propose an extended k-shell algorithm which better utilizes the k-shell decomposition for identifying viral spreader nodes using the topological features of the network. We use Susceptible-Infected-Recovered model for the simulations of the spreading process in real-life networks and the simulations demonstrates that our approach can reach to up to 36% larger crowds within the same network, with the same number of initial spreaders

    An Accelerometer Based Calculator for Visually Impaired People Using Mobile Devices

    Full text link
    Recent trend of touch-screen devices produces an accessibility barrier for visually impaired people. On the other hand, these devices come with sensors such as accelerometer. This calls for new approaches to human computer interface (HCI). In this study, our aim is to find an alternative approach to classify 20 different hand gestures captured by iPhone 3GS's built-in accelerometer and make high accuracy on user-independent classifications using Dynamic Time Warping (DTW) with dynamic warping window sizes. 20 gestures with 1,100 gesture data are collected from 15 normal-visioned people. This data set is used for training. Experiment-1 based on this data set produced an accuracy rate of 96.7~\%. In order for visually impaired people to use the system, a gesture recognition based "talking" calculator is implemented. In Experiment-2, 4 visually impaired end-users used the calculator and obtained 95.5~\% accuracy rate among 17 gestures with 720 gesture data totally. Contributions of the techniques to the end result is also investigated. Dynamic warping window size is found to be the most effective one. The data and the code is available

    The Dose of the Threat Makes the Resistance for Cooperation

    Full text link
    We propose to reformulate the payoff matrix structure of Prisoner's Dilemma Game, by introducing threat and greed factors, and show their effect on the co-evolution of memory and cooperation. Our findings are as follows. (i) Memory protects cooperation. (ii) To our surprise, greater memory size is unfavorable to evolutionary success when there is no threat. In the absence of threat, subsequent generations lose their memory and are consequently invaded by defectors. (iii) In contrast, the presence of an appropriate level of threat triggers the emergence of a self-protection mechanism for cooperation, which manifests itself as an increase in memory size within subsequent generations. On the evolutionary level, memory size acts like an immune response of the generations against aggressive defection. (iv) Even more extreme threat results again in defection. Our findings boil down to the following: The dose of the threat makes the resistance for cooperation

    Community detection using preference networks

    Full text link
    Community detection is the task of identifying clusters or groups of nodes in a network where nodes within the same group are more connected with each other than with nodes in different groups. It has practical uses in identifying similar functions or roles of nodes in many biological, social and computer networks. With the availability of very large networks in recent years, performance and scalability of community detection algorithms become crucial, i.e. if time complexity of an algorithm is high, it can not run on large networks. In this paper, we propose a new community detection algorithm, which has a local approach and is able to run on large networks. It has a simple and effective method; given a network, algorithm constructs a preference network of nodes where each node has a single outgoing edge showing its preferred node to be in the same community with. In such a preference network, each connected component is a community. Selection of the preferred node is performed using similarity based metrics of nodes. We use two alternatives for this purpose which can be calculated in 1-neighborhood of nodes, i.e. number of common neighbors of selector node and its neighbors and, the spread capability of neighbors around the selector node which is calculated by the gossip algorithm of Lind et.al. Our algorithm is tested on both computer generated LFR networks and real-life networks with ground-truth community structure. It can identify communities accurately in a fast way. It is local, scalable and suitable for distributed execution on large networks.Comment: 11 pages, 11 figures, 2 tables and supplementary informatio

    Getting recommendation is not always better

    Full text link
    We present an extended version of the Iterated Prisoner's Dilemma game in which agents with limited memory receive recommendations about the unknown opponent to decide whether to play with. Since agents can receive more than one recommendations about the same opponent, they have to evaluate the recommendations according to their disposition such as optimist, pessimist, or realist. They keep their firsthand experience in their memory. Since agents have limited memory, they have to use different forgetting strategies. Our results show that getting recommendations not always perform better. We observe that realist performs the best and optimist the worse.Comment: 9 pages, 5 figure
    • …
    corecore