942 resultados para networks text analysis text network graph Gephi network measures shuffed text Zipf Heap Python


Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper, we describe how the pathfinder algorithm converts relatedness ratings of concept pairs to concept maps; we also present how this algorithm has been used to develop the Concept Maps for Learning website (www.conceptmapsforlearning.com) based on the principles of effective formative assessment. The pathfinder networks, one of the network representation tools, claim to help more students memorize and recall the relations between concepts than spatial representation tools (such as Multi- Dimensional Scaling). Therefore, the pathfinder networks have been used in various studies on knowledge structures, including identifying students’ misconceptions. To accomplish this, each student’s knowledge map and the expert knowledge map are compared via the pathfinder software, and the differences between these maps are highlighted. After misconceptions are identified, the pathfinder software fails to provide any feedback on these misconceptions. To overcome this weakness, we have been developing a mobile-based concept mapping tool providing visual, textual and remedial feedback (ex. videos, website links and applets) on the concept relations. This information is then placed on the expert concept map, but not on the student’s concept map. Additionally, students are asked to note what they understand from given feedback, and given the opportunity to revise their knowledge maps after receiving various types of feedback.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Abstract: In the mid-1990s when I worked for a telecommunications giant I struggled to gain access to basic geodemographic data. It cost hundreds of thousands of dollars at the time to simply purchase a tile of satellite imagery from Marconi, and it was often cheaper to create my own maps using a digitizer and A0 paper maps. Everything from granular administrative boundaries to right-of-ways to points of interest and geocoding capabilities were either unavailable for the places I was working in throughout Asia or very limited. The control of this data was either in a government’s census and statistical bureau or was created by a handful of forward thinking corporations. Twenty years on we find ourselves inundated with data (location and other) that we are challenged to amalgamate, and much of it still “dirty” in nature. Open data initiatives such as ODI give us great hope for how we might be able to share information together and capitalize not only in the crowdsourcing behavior but in the implications for positive usage for the environment and for the advancement of humanity. We are already gathering and amassing a great deal of data and insight through excellent citizen science participatory projects across the globe. In early 2015, I delivered a keynote at the Data Made Me Do It conference at UC Berkeley, and in the preceding year an invited talk at the inaugural QSymposium. In gathering research for these presentations, I began to ponder on the effect that social machines (in effect, autonomous data collection subjects and objects) might have on social behaviors. I focused on studying the problem of data from various veillance perspectives, with an emphasis on the shortcomings of uberveillance which included the potential for misinformation, misinterpretation, and information manipulation when context was entirely missing. As we build advanced systems that rely almost entirely on social machines, we need to ponder on the risks associated with following a purely technocratic approach where machines devoid of intelligence may one day dictate what humans do at the fundamental praxis level. What might be the fallout of uberveillance? Bio: Dr Katina Michael is a professor in the School of Computing and Information Technology at the University of Wollongong. She presently holds the position of Associate Dean – International in the Faculty of Engineering and Information Sciences. Katina is the IEEE Technology and Society Magazine editor-in-chief, and IEEE Consumer Electronics Magazine senior editor. Since 2008 she has been a board member of the Australian Privacy Foundation, and until recently was the Vice-Chair. Michael researches on the socio-ethical implications of emerging technologies with an emphasis on an all-hazards approach to national security. She has written and edited six books, guest edited numerous special issue journals on themes related to radio-frequency identification (RFID) tags, supply chain management, location-based services, innovation and surveillance/ uberveillance for Proceedings of the IEEE, Computer and IEEE Potentials. Prior to academia, Katina worked for Nortel Networks as a senior network engineer in Asia, and also in information systems for OTIS and Andersen Consulting. She holds cross-disciplinary qualifications in technology and law.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Security Onion is a Network Security Manager (NSM) platform that provides multiple Intrusion Detection Systems (IDS) including Host IDS (HIDS) and Network IDS (NIDS). Many types of data can be acquired using Security Onion for analysis. This includes data related to: Host, Network, Session, Asset, Alert and Protocols. Security Onion can be implemented as a standalone deployment with server and sensor included or with a master server and multiple sensors allowing for the system to be scaled as required. Many interfaces and tools are available for management of the system and analysis of data such as Sguil, Snorby, Squert and Enterprise Log Search and Archive (ELSA). These interfaces can be used for analysis of alerts and captured events and then can be further exported for analysis in Network Forensic Analysis Tools (NFAT) such as NetworkMiner, CapME or Xplico. The Security Onion platform also provides various methods of management such as Secure SHell (SSH) for management of server and sensors and Web client remote access. All of this with the ability to replay and analyse example malicious traffic makes the Security Onion a suitable low cost alternative for Network Security Management. In this paper, we have a feature and functionality review for the Security Onion in terms of: types of data, configuration, interface, tools and system management.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Authentication plays an important role in how we interact with computers, mobile devices, the web, etc. The idea of authentication is to uniquely identify a user before granting access to system privileges. For example, in recent years more corporate information and applications have been accessible via the Internet and Intranet. Many employees are working from remote locations and need access to secure corporate files. During this time, it is possible for malicious or unauthorized users to gain access to the system. For this reason, it is logical to have some mechanism in place to detect whether the logged-in user is the same user in control of the user's session. Therefore, highly secure authentication methods must be used. We posit that each of us is unique in our use of computer systems. It is this uniqueness that is leveraged to "continuously authenticate users" while they use web software. To monitor user behavior, n-gram models are used to capture user interactions with web-based software. This statistical language model essentially captures sequences and sub-sequences of user actions, their orderings, and temporal relationships that make them unique by providing a model of how each user typically behaves. Users are then continuously monitored during software operations. Large deviations from "normal behavior" can possibly indicate malicious or unintended behavior. This approach is implemented in a system called Intruder Detector (ID) that models user actions as embodied in web logs generated in response to a user's actions. User identification through web logs is cost-effective and non-intrusive. We perform experiments on a large fielded system with web logs of approximately 4000 users. For these experiments, we use two classification techniques; binary and multi-class classification. We evaluate model-specific differences of user behavior based on coarse-grain (i.e., role) and fine-grain (i.e., individual) analysis. A specific set of metrics are used to provide valuable insight into how each model performs. Intruder Detector achieves accurate results when identifying legitimate users and user types. This tool is also able to detect outliers in role-based user behavior with optimal performance. In addition to web applications, this continuous monitoring technique can be used with other user-based systems such as mobile devices and the analysis of network traffic.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The graph Laplacian operator is widely studied in spectral graph theory largely due to its importance in modern data analysis. Recently, the Fourier transform and other time-frequency operators have been defined on graphs using Laplacian eigenvalues and eigenvectors. We extend these results and prove that the translation operator to the i’th node is invertible if and only if all eigenvectors are nonzero on the i’th node. Because of this dependency on the support of eigenvectors we study the characteristic set of Laplacian eigenvectors. We prove that the Fiedler vector of a planar graph cannot vanish on large neighborhoods and then explicitly construct a family of non-planar graphs that do exhibit this property. We then prove original results in modern analysis on graphs. We extend results on spectral graph wavelets to create vertex-dyanamic spectral graph wavelets whose support depends on both scale and translation parameters. We prove that Spielman’s Twice-Ramanujan graph sparsifying algorithm cannot outperform his conjectured optimal sparsification constant. Finally, we present numerical results on graph conditioning, in which edges of a graph are rescaled to best approximate the complete graph and reduce average commute time.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Tämän tutkimuksen tavoitteena oli selvittää kuinka yrittäjän verkostot muodostuvat ja minkälainen niiden rakenne on. Tavoitteena oli myös saada tietoa yrittäjän sosiaalisten verkostojen merkityksestä yrittäjälle. Tutkimus toteutettiin laadullisena tutkimuksena. Tutkimusaineisto kerättiin strukturoidulla haastattelulla ja tutkimusaineiston rinnalla käytettiin yrittäjien havainnollistamia piirroksia sekä tieteellisiä julkaisuja ja kirjallisuutta. Haastateltavina oli sekä nais- että miesyrittäjiä eri paikkakunnilta Etelä-Suomen alueelta. Tutkimustulosten mukaan yrittäjien verkostoissa voidaan havaita eri tasoja, jotka rakentuvat eri tavoilla ja ovat yrittäjälle merkitykseltään erilaisia. Verkoston eri tasoille sijoittuu yrittäjälle tärkeitä ihmisiä sen mukaan mitä hyötyä ja arvoa heillä yrittäjälle on. Tulokset osoittavat, että verkostojen rakentamiseen vaikuttavat sekä liiketoiminnan laatu, motiivit sekä yrittäjän persoona. Tulokset ovat linjassa tämän tutkimuksen perustana olevien teorioiden kanssa. Viitteitä löytyy myös siitä, että yrittäjän sukupuolella on myös merkitystä siihen, millaiseksi sosiaaliset verkostot rakentuvat sekä henkilökohtaisessa elämässä että liike-elämän puolella. Sosiaalisista verkostoista saatavat hyödyt ovat moninaisia. Lisätutkimuksia tulisi tehdä tehokkaiden työkalujen kehittämiseksi henkilöstön ja yrittäjän omien resurssien tunnistamiseksi. Tätä kautta myös yrittäjyyskasvatusta ja yrittäjäneuvontaa voitaisiin tehostaa.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

From birth to early adulthood the brain undergoes dramatic modifications resulting in network development and optimization. In the present study we investigate the development of the human connectome but measuring myelination trajectories of individual connections over the entire brain structural network using high b-value diffusion imaging and tractography. We found significant changes in several network measures that support increased integration and efficiency. We also observe that the network doesn't myelinate at a uniform rate but with different myelination speeds dependant on the type of cortex.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Temporary streams are those water courses that undergo the recurrent cessation of flow or the complete drying of their channel. The structure and composition of biological communities in temporary stream reaches are strongly dependent on the temporal changes of the aquatic habitats determined by the hydrological conditions. Therefore, the structural and functional characteristics of aquatic fauna to assess the ecological quality of a temporary stream reach cannot be used without taking into account the controls imposed by the hydrological regime. This paper develops methods for analysing temporary streams' aquatic regimes, based on the definition of six aquatic states that summarize the transient sets of mesohabitats occurring on a given reach at a particular moment, depending on the hydrological conditions: Hyperrheic, Eurheic, Oligorheic, Arheic, Hyporheic and Edaphic. When the hydrological conditions lead to a change in the aquatic state, the structure and composition of the aquatic community changes according to the new set of available habitats. We used the water discharge records from gauging stations or simulations with rainfall-runoff models to infer the temporal patterns of occurrence of these states in the Aquatic States Frequency Graph we developed. The visual analysis of this graph is complemented by the development of two metrics which describe the permanence of flow and the seasonal predictability of zero flow periods. Finally, a classification of temporary streams in four aquatic regimes in terms of their influence over the development of aquatic life is updated from the existing classifications, with stream aquatic regimes defined as Permanent, Temporary-pools, Temporary-dry and Episodic. While aquatic regimes describe the long-term overall variability of the hydrological conditions of the river section and have been used for many years by hydrologists and ecologists, aquatic states describe the availability of mesohabitats in given periods that determine the presence of different biotic assemblages. This novel concept links hydrological and ecological conditions in a unique way. All these methods were implemented with data from eight temporary streams around the Mediterranean within the MIRAGE project. Their application was a precondition to assessing the ecological quality of these streams.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

An exchange traded fund (ETF) is a financial instrument that tracks some predetermined index. Since their initial establishment in 1993, ETFs have grown in importance in the field of passive investing. The main reason for the growth of the ETF industry is that ETFs combine benefits of stock investing and mutual fund investing. Although ETFs resemble mutual funds in many ways, also many differences occur. In addition, ETFs not only differ from mutual funds but also differ among each other. ETFs can be divided into two categories, i.e. market capitalisation ETFs and fundamental (or strategic) ETFs, and further into subcategories depending on their fundament basis. ETFs are a useful tool for diversification especially for a long-term investor. Although the economic importance of ETFs has risen drastically during the past 25 years, the differences and risk-return characteristics of fundamental ETFs have yet been rather unstudied area. In effect, no previous research on market capitalisation and fundamental ETFs was found during the research process. For its part, this thesis seeks to fill this research gap. The studied data consist of 50 market capitalisation ETFs and 50 fundamental ETFs. The fundaments, on which the indices that the fundamental ETFs track, were not limited nor segregated into subsections. The two types of ETFs were studied at an aggregate level as two different research groups. The dataset ranges from June 2006 to December 2014 with 103 monthly observations. The data was gathered using Bloomberg Terminal. The analysis was conducted as an econometric performance analysis. In addition to other econometric measures, the methods that were used in the performance analysis included modified Value-at-Risk, modified Sharpe ratio and Treynor ratio. The results supported the hypothesis that passive market capitalisation ETFs outperform active fundamental ETFs in terms of risk-adjusted returns, though the difference is rather small. Nevertheless, when taking into account the higher overall trading costs of the fundamental ETFs, the underperformance gap widens. According to the research results, market capitalisation ETFs are a recommendable diversification instrument for a long-term investor. In addition to better risk-adjusted returns, passive ETFs are more transparent and the bases of their underlying indices are simpler than those of fundamental ETFs. ETFs are still a young financial innovation and hence data is scarcely available. On future research, it would be valuable to research the differences in risk-adjusted returns also between the subsections of fundamental ETFs.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Le vieillissement de la population entraîne une hausse des maladies chroniques telle que la maladie d’Alzheimer dans nos sociétés occidentales. L’enjeu du vieillissement se répercute aussi dans les réformes de nos politiques sociales, et plus généralement dans la gestion des services publics. Dans ce contexte, le régime de santé publique québécois connaît diverses modifications concernant la prestation de soins de première ligne. De nouveaux acteurs acquièrent des rôles et des responsabilités définissant des enjeux particuliers. Nous étudierons l’un de ces enjeux. Ce mémoire vise à spécifier les processus sociaux à la base de l’isolement des aidants familiaux de personnes atteintes par la maladie d’Alzheimer. La stigmatisation des aidants et les microprocessus afférents sont les principaux mécanismes analysés. Les données sont extraites d’entrevues semi-structurées réalisées avec une cohorte d’aidants familiaux (N=60) suivie longitudinalement depuis le début de leur trajectoire de soins. Une démarche qualitative soutient ce projet. Nous avons analysé un échantillon de douze participants au moyen d’une approche séquentielle. Trois processus typiques ont été identifiés : le stigma de forme en ruptures (séparation sociale), le stigma de forme transitoire (stigma transitoire) et le stigma de forme anomique (anomie sociale). Les résultats suggèrent que les réseaux sociaux des aidants sont soumis à un ensemble de conditions favorisant la structuration du stigma social, la principale condition étant un enjeu de pouvoir concernant le contrôle de la personne malade. Les aidants conjoints de personnes atteintes sont plus enclins à la stigmatisation en début de trajectoire.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Reliability analysis is a well established branch of statistics that deals with the statistical study of different aspects of lifetimes of a system of components. As we pointed out earlier that major part of the theory and applications in connection with reliability analysis were discussed based on the measures in terms of distribution function. In the beginning chapters of the thesis, we have described some attractive features of quantile functions and the relevance of its use in reliability analysis. Motivated by the works of Parzen (1979), Freimer et al. (1988) and Gilchrist (2000), who indicated the scope of quantile functions in reliability analysis and as a follow up of the systematic study in this connection by Nair and Sankaran (2009), in the present work we tried to extend their ideas to develop necessary theoretical framework for lifetime data analysis. In Chapter 1, we have given the relevance and scope of the study and a brief outline of the work we have carried out. Chapter 2 of this thesis is devoted to the presentation of various concepts and their brief reviews, which were useful for the discussions in the subsequent chapters .In the introduction of Chapter 4, we have pointed out the role of ageing concepts in reliability analysis and in identifying life distributions .In Chapter 6, we have studied the first two L-moments of residual life and their relevance in various applications of reliability analysis. We have shown that the first L-moment of residual function is equivalent to the vitality function, which have been widely discussed in the literature .In Chapter 7, we have defined percentile residual life in reversed time (RPRL) and derived its relationship with reversed hazard rate (RHR). We have discussed the characterization problem of RPRL and demonstrated with an example that the RPRL for given does not determine the distribution uniquely

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Demand response is believed by some to become a major contributor towards system balancing in future electricity networks. Shifting or reducing demand at critical moments can reduce the need for generation capacity, help with the integration of renewables, support more efficient system operation and thereby potentially lead to cost and carbon reductions for the entire energy system. In this paper we review the nature of the response resource of consumers from different non-domestic sectors in the UK, based on extensive half hourly demand profiles and observed demand responses. We further explore the potential to increase the demand response capacity through changes in the regulatory and market environment. The analysis suggests that present demand response measures tend to stimulate stand-by generation capacity in preference to load shifting and we propose that extended response times may favour load based demand response, especially in sectors with significant thermal loads.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The present study is focused on the analysis of the three main governmental measures occurred in 2000-2006 in Russian defense industry: the creation of the holding structures, the establishing of the state monopoly in arms export, and creation of the United Aviation Construction Corporation (Ob¿edinennaya Aviastroitel¿naya Corporatziya), which was initiated by the President and Government of Russian Federation in 2006. The last project assumes the consolidation and joining of all producers of civil and military aviation into one united corporation in order to save the technological and productive potential of the sector after serious crisis in 1990-s. On the other hand, this project can be considered as one of the measures to establish state control and hierarchy in the defense industry. The current project tries to analyze the necessity and the possible impacts of restructuring processes. In order to perform such analysis, I need to observe the evolution of the sector, which involves the description of the restructuring and reforming of the industry since the disintegration of the Soviet Union. The current situation in aviation sector was shaped by number of reforms performed by Government of Russian Federation, which I describe in phases: conversion, privatization, decentralization, followed by evident desire of the state to establish control over some companies. Later on, I am trying to understand the reasons lying behind all reforms of 2000-2006 and the integration of the industry. I also try to predict which impacts on the companies it will have. The last part presents the main conclusions of the paper.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)