885 resultados para social-proximity urban vehicular networks


Relevância:

40.00% 40.00%

Publicador:

Resumo:

The key nodes in network play the critical role in system recovery and survival. Many traditional key nodes selection algorithms utilize the characters of the physical topology to find the key nodes. But they can hardly succeed in the mobile ad hoc network due to the mobility nature of the network. In this paper we propose a social-aware Kcore selection algorithm to work in the Pocket Switched Network. The social view of the network suggests the social position of the mobile nodes can help to find the key nodes in the Pocket Switched Network. The S-Kcore selection algorithm is designed to exploit the nodes' social features to improve the performance in data communication. Experiments use the NS2 shows S-Kcore selection algorithm workable in the Pocket Switched Network. Furthermore, with the social behavior information, those key nodes are more suitable to represent and improve the whole network's performance.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

This paper deploys notions of emergence, connections, and designs for learning to conceptualize high school students’ interactions when using online social media as a learning environment. It makes links to chaos and complexity theories and to fractal patterns as it reports on a part of the first author’s action research study, conducted while she was a teacher working in an Australian public high school and completing her PhD. The study investigates the use of a Ning online social network as a learning environment shared by seven classes, and it examines students’ reactions and online activity while using a range of social media and Web 2.0 tools.

The authors use Graham Nuthall’s (2007) “lens on learning” to explore the social processes and culture of this shared online classroom. The paper uses his extensive body of research and analyses of classroom learning processes to conceptualize and analyze data throughout the action research cycle. It discusses the pedagogical implications that arise from the use of social media and, in so doing, challenges traditional models of teaching and learning.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

This paper examines the experiences of selected academics pioneering e-learning in Malaysian tertiary institutions. It begins with an overview of the broad factors shaping the Malaysian educational environment and then proceeds to examine the experience of individual teachers and e-learning programs. It takes an in-depth qualitative approach to engaging with this case study material drawing heavily on semi-structured interviews with key actors.
Conversations with several respondents suggested that the social networks of mentor relations found in the Malaysian case studies might be aptly described as ‘bamboo networks’. Bamboo, which happens to be plentiful in the Malaysian peninsula where these case studies are based, spreads from clump to clump through a series of underground connections involving a mature clump of bamboo sending out a subterranean runner, often over very long distances that then emerge into the open as a new bamboo clump.
All of those interviewed reported that they have found it difficult to find a support base in their first years of pioneering online developments. Consequently, they tended to fall back on their peer networks linked to the institutions at which they had studied. Prominent individuals championing e-learning in the institutions where they teach tend to form small groups for information sharing and networking. They do look to their management for tacit ‘permission’ rather than direct encouragement. Consequently, the active promotion of e-learning in Malaysia can be described as being ‘middle-down’ rather than ‘top-down’ in nature. That is to say, it is mid-level teachers that inspire those below them to join in the development of e-learning programs. They are internally driven and strongly motivated. In time, their activity should produce new generations of locally developed e-learning experts but this has yet to take place in a substantial fashion. This study shows that both men and women ‘academic guanxi’, or peer networks, play a key role in the adoption of online technologies. Key early adopters become change-agents by inspiring a small network of their peers and via their guanxi networks. It was also discovered that motivation is not simply an individual matter but is also about groups and peer networks or communities of exchange and encouragement. In the development of e-learning in Malaysia, there is very little activity that is not linked to small clusters of developers who are tied into wider networks through personal contacts.
Like clumping bamboo, whilst the local clusters tend to be easily seen, the longer-range ‘subterranean’ personal connections are generally not nearly so immediately obvious. These connections are often the product of previous mentoring relationships, including the relationships between influential teachers and their former postgraduate students. These relationships tend to work like bamboo runners: they run off in multiple directions, subterranean and unseen and then throw up new clumps that then send out fresh runners of their own.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The increasing research interest on stakeholder analysis in urban planning reflects a growing recognition that stakeholders can and should influence the decision-making. This paper concentrates on exploring the techniques for analysing stakeholders, especially the application of the Stakeholder Circle tool and Social Network Analysis. An urban renewal project and an infrastructure project in Australia are presented as case studies to verify the use of these two techniques. The stakeholders are identified and prioritized from two different points of view, namely, the attribute evaluations in the Stakeholder Circle tool, and the relationship network analysis. The paper ends with a discussion on the strengths and limitations of the techniques for stakeholder analysis. No method for stakeholder identification and prioritization is perfect. The selection of the approaches is an art with extensive considerations of ‘when, what, and how’ to choose methods to achieve the project objectives. Each method has its own strengths and limitations. Combining several methods when necessary is the best way to analyse stakeholders.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The social interactions manifest in blogs by the network of comments left by owners and readers are an under-used resource, both for blog pundits and industry. We present a web-based feed reader that renders these relationships with a graph representation, and enables exploration by displaying people and blogs who are proximate to a user's network. Social Reader is an example of Casual Information Visualization, and aims to help the user understand and explore blog-based social networks in a daily, real-life setting. A six week study of the software involving 20 users confirmed the usefulness of the novel visual display, via a quantitative analysis of use logs, and an exit survey.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Social networking has recently flourished in popularity through the use of social websites. Pervasive computing resources have allowed people stay well-connected to each other through access to social networking resources. We take the position that utilizing information produced by relationships within social networks can assist in the establishment of trust for other pervasive computing applications. Furthermore, we describe how such a system can augment a sensor infrastructure used for event observation with information from mobile sensors (ie, mobile phones with cameras) controlled by potentially untrusted third parties.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

A convergence of emotions among people in social networks is potentially resulted by the occurrence of an unprecedented event in real world. E.g., a majority of bloggers would react angrily at the September 11 terrorist attacks. Based on this observation, we introduce a sentiment index, computed from the current mood tags in a collection of blog posts utilizing an affective lexicon, potentially revealing subtle events discussed in the blogosphere. We then develop a method for extracting events based on this index and its distribution. Our second contribution is establishment of a new bursty structure in text streams termed a sentiment burst. We employ a stochastic model to detect bursty periods of moods and the events associated. Our results on a dataset of more than 12 million mood-tagged blog posts over a 4-year period have shown that our sentiment-based bursty events are indeed meaningful, in several ways.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

In this article, associations between individual, social, and environmental factors and physical activity among 3,669 women (18-45 years) living in socioeconomically disadvantaged urban and rural areas were compared. In 2007-2008, participants reported levels of leisure-time physical activity (LTPA) and transport-related physical activity (TRPA) as well as five individual, four social, and three environmental factors. Physical activity self- efficacy demonstrated stronger associations with LTPA among urban relative to rural women; child care was associated with LTPA and intentions with TRPA among urban women only, and enjoyment was associated with TRPA among rural women only. Correlates of physical activity among urban and rural women were generally similar, although some tailoring of physical activity promotion strategies may be warranted.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Now days, the online social networks (OSN) have gained considerable popularity. More and more people use OSN to share their interests and make friends, also the OSN helps users overcome the geographical barriers. With the development of OSN, there is an important problem users have to face that is trust evaluation. Before user makes friends with a stranger, the user need to consider the following issues: Can a stranger be trusted? How much the stranger can be trusted? How to measure the trust of a stranger? In this paper, we take two factors, Degree and Contact Interval into consideration, which produce a new trust evaluation model (T-OSN). T-OSN is aimed to solve how to evaluate the trust value of an OSN user, also which is more efficient, more reliable and easy to implement. Base on our research, this model can be used in wide range, such as online social network (OSN) trust evaluation, mobile network message forwarding, ad hoc wireless networking, routing message on Internet and peer-to-peer file sharing network. The T-OSN model has following obvious advantages compare to other trust evaluate methods. First of all, it is not base on features of traditional social network, such as, distance and shortest path. We choose the special features of OSN to build up the model, that is including numbers of friends(Degree) and contact frequency(Contact Interval). These species features makes our model more suitable to evaluate OSN users trust value. Second, the formulations of our model are quite simple but effective. That means, to calculate the result by using our formulations will not cost too much resources. Last but not least, our model is easy to implement for an OSN website, because of the features that we used in our model, such as numbers of friends and contact frequency are easy to obtain. To sum up, our model is using a few resources to obtain a valuable trust value that can help OSN users to solve an important security problem, we believe that will be big step - or development of OSN.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Integrating online social networks (OSN) with e-commerce is a part of Enterprise 2.0 and social media and is of significance for development of e-commerce and online social networking services. However, how to integrate online social networks including Facebook with e-commerce is still a big issue for companies. Case based reasoning (CBR) has a number of successful applications in e-commerce and web services. This article examines how to integrate OSN with e-commerce, how to integrate CBR with e-commerce and how to integrate CBR with OSN. This article also proposes a CBR architecture for integrating online social networks with e-commerce using CBR as an intelligent intermediary. One of the research findings indicates that the principle of CBR is a useful marketing strategy for integrating e-commerce and OSN. The approach proposed in this research will facilitate the development of e-commerce, Enterprise 3.0 and online social networking services.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Online social networks have not only become a point of aggregation and exchange of information, they have so radically rooted into our everyday behaviors that they have become the target of important network attacks. We have seen an increasing trend in Sybil based activity, such as in personification, fake profiling and attempts to maliciously subvert the community stability in order to illegally create benefits for some individuals, such as online voting, and also from more classic informatics assaults using specifically mutated worms. Not only these attacks, in the latest months, we have seen an increase in spam activities on social networks such as Facebook and RenRen, and most importantly, the first attempts at propagating worms within these communities. What differentiates these attacks from normal network attacks, is that compared to anonymous and stealthy activities, or by commonly untrusted emails, social networks regain the ability to propagate within consentient users, who willingly accept to partake. In this paper, we will demonstrate the effects of influential nodes against non-influential nodes through in simulated scenarios and provide an overview and analysis of the outcomes.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Background. Patients engage in health information-seeking behaviour to maintain their wellbeing and to manage chronic diseases such as arthritis. Health literacy allows patients to understand available treatments and to critically appraise information they obtain from a wide range of sources.

Aims. To explore how arthritis patients' health literacy affects engagement in arthritis-focused health information-seeking behaviour and the selection of sources of health information available through their informal social network.

Methods. An exploratory, qualitative study consisting of one-on-one semi-structured interviews. Twenty participants with arthritis were recruited from community organizations. The interviews were designed to elicit participants' understanding about their arthritis and arthritis medication and to determine how the participants' health literacy informed selection of where they found information about their arthritis and pain medication.

Results. Participants with low health literacy were less likely to be engaged with health information-seeking behaviour. Participants with intermediate health literacy were more likely to source arthritis-focused health information from newspapers, television, and within their informal social network. Those with high health literacy sourced information from the internet and specialist health sources and were providers of information within their informal social network.

Conclusion. Health professionals need to be aware that levels of engagement in health information-seeking behaviour and sources of arthritis-focused health information may be related to their patients' health literacy.