首页 > 最新文献

2022 Ninth International Conference on Social Networks Analysis, Management and Security (SNAMS)最新文献

英文 中文
Anomalous/Relevant Event Detection (A/RED): Active Machine Learning for Finding Rare Events 异常/相关事件检测(A/RED):主动机器学习查找罕见事件
R. Loveland, Noah Kaplan
In many industrial applications, data comes in the form of an unlabeled stream, likely containing classes that a user has not seen before. In these cases, a user generally cares about four things: classification, class discovery, notification of events in certain classes, and the amount of data they need to label. In this work we present Anomalous/ Relevant Event Detection (A/RED), an active learning system that operates upon imbalanced data streams to find new classes and classify incoming events. A/RED is unique in that it takes into account user preference for the relevance of classes. An A/RED query involves asking for a label and a binary relevance label. A relevant class is queried more often, and as a result, the classifier performs better for these instances.
在许多工业应用程序中,数据以未标记流的形式出现,其中可能包含用户以前未见过的类。在这些情况下,用户通常关心四件事:分类、类发现、特定类中的事件通知以及需要标记的数据量。在这项工作中,我们提出了异常/相关事件检测(A/RED),这是一个主动学习系统,它在不平衡的数据流上运行,以找到新的类并对传入的事件进行分类。A/RED的独特之处在于它考虑了用户对类相关性的偏好。A/RED查询涉及请求标签和二进制相关标签。更频繁地查询相关类,因此,分类器对这些实例执行得更好。
{"title":"Anomalous/Relevant Event Detection (A/RED): Active Machine Learning for Finding Rare Events","authors":"R. Loveland, Noah Kaplan","doi":"10.1109/SNAMS58071.2022.10062609","DOIUrl":"https://doi.org/10.1109/SNAMS58071.2022.10062609","url":null,"abstract":"In many industrial applications, data comes in the form of an unlabeled stream, likely containing classes that a user has not seen before. In these cases, a user generally cares about four things: classification, class discovery, notification of events in certain classes, and the amount of data they need to label. In this work we present Anomalous/ Relevant Event Detection (A/RED), an active learning system that operates upon imbalanced data streams to find new classes and classify incoming events. A/RED is unique in that it takes into account user preference for the relevance of classes. An A/RED query involves asking for a label and a binary relevance label. A relevant class is queried more often, and as a result, the classifier performs better for these instances.","PeriodicalId":371668,"journal":{"name":"2022 Ninth International Conference on Social Networks Analysis, Management and Security (SNAMS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115672654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy Preserving Recommendations for Social Networks 社交网络的隐私保护建议
Kamalkumar R. Macwan, Abdessamad Imine, M. Rusinowitch
Social recommendation is an advanced service of social networking platforms that is provided to their users. Social recommendation uses profiles and connections to generate personalized suggestions of contents, advertisements, people, pages, or interest groups. Since individual sensitive information is possibly involved in elaborating a recommendation, it may be inferred by an adversary in some situations. In this work, we design a differentially private setting to prevent social recommendations from disclosing sensitive information. Our recommendation system targets users of online social networks by leveraging their attributes and relationships. Unlike other approaches, we rely on both profile similarity and homophily properties. Therefore, our system estimates the frequency of friends who share some attribute values and applies non-negative matrix factorization to derive recommendations such as hobbies, movies, etc. We demonstrate the effectiveness of the proposed approach through experiments on real-world datasets and evaluation according to utility measures.
社交推荐是社交网络平台提供给用户的一项高级服务。社交推荐使用配置文件和连接来生成内容、广告、人员、页面或兴趣组的个性化建议。由于在制定建议时可能涉及到个人敏感信息,因此在某些情况下可能会被对手推断出来。在这项工作中,我们设计了一个不同的隐私设置,以防止社交推荐泄露敏感信息。我们的推荐系统通过利用他们的属性和关系来瞄准在线社交网络的用户。与其他方法不同的是,我们同时依赖于轮廓的相似性和同质性。因此,我们的系统估计共享某些属性值的朋友的频率,并应用非负矩阵分解来导出诸如爱好,电影等推荐。我们通过在真实世界数据集上的实验和根据效用度量的评估来证明所提出方法的有效性。
{"title":"Privacy Preserving Recommendations for Social Networks","authors":"Kamalkumar R. Macwan, Abdessamad Imine, M. Rusinowitch","doi":"10.1109/SNAMS58071.2022.10062760","DOIUrl":"https://doi.org/10.1109/SNAMS58071.2022.10062760","url":null,"abstract":"Social recommendation is an advanced service of social networking platforms that is provided to their users. Social recommendation uses profiles and connections to generate personalized suggestions of contents, advertisements, people, pages, or interest groups. Since individual sensitive information is possibly involved in elaborating a recommendation, it may be inferred by an adversary in some situations. In this work, we design a differentially private setting to prevent social recommendations from disclosing sensitive information. Our recommendation system targets users of online social networks by leveraging their attributes and relationships. Unlike other approaches, we rely on both profile similarity and homophily properties. Therefore, our system estimates the frequency of friends who share some attribute values and applies non-negative matrix factorization to derive recommendations such as hobbies, movies, etc. We demonstrate the effectiveness of the proposed approach through experiments on real-world datasets and evaluation according to utility measures.","PeriodicalId":371668,"journal":{"name":"2022 Ninth International Conference on Social Networks Analysis, Management and Security (SNAMS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125076485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Secure and Improved Safety Message Collection with Increased Privacy-Preserving Algorithm for VANETs 一种基于增强隐私保护算法的安全消息收集方法
Hassan Mistareehi, D. Manivannan, H. Salameh
Vehicular Ad hoc NETworks (VANETs) are going to help in deploying Intelligent Transportation Systems (ITS). Various schemes proposed in the literature use vehicles equipped with On Board Units (OBUs) to collect events such as weather conditions, collision prevention, and many others to notify drivers about these events. However, several existing schemes don't consider safety message collection in areas with a low density of vehicles. These areas also could have bad road conditions (e.g., icy roads) and may have poor connectivity. Therefore, in this paper, we improve safety message collection and notify the drivers about these incidents in advance, so they can take proper actions. In addition, the security and privacy of vehicles are achieved. We also improve the privacy-preserving of vehicles.
车辆自组织网络(VANETs)将有助于部署智能交通系统(ITS)。文献中提出的各种方案使用配备车载单元(OBUs)的车辆来收集天气状况、碰撞预防等事件,并将这些事件通知驾驶员。然而,一些现有的方案没有考虑在车辆密度低的地区收集安全信息。这些地区的道路状况也可能很差(如结冰的道路),连通性也可能很差。因此,在本文中,我们改进安全信息收集,并提前通知驾驶员这些事件,以便他们采取适当的行动。此外,还实现了车辆的安全性和私密性。我们还改进了车辆的隐私保护。
{"title":"A Secure and Improved Safety Message Collection with Increased Privacy-Preserving Algorithm for VANETs","authors":"Hassan Mistareehi, D. Manivannan, H. Salameh","doi":"10.1109/SNAMS58071.2022.10062505","DOIUrl":"https://doi.org/10.1109/SNAMS58071.2022.10062505","url":null,"abstract":"Vehicular Ad hoc NETworks (VANETs) are going to help in deploying Intelligent Transportation Systems (ITS). Various schemes proposed in the literature use vehicles equipped with On Board Units (OBUs) to collect events such as weather conditions, collision prevention, and many others to notify drivers about these events. However, several existing schemes don't consider safety message collection in areas with a low density of vehicles. These areas also could have bad road conditions (e.g., icy roads) and may have poor connectivity. Therefore, in this paper, we improve safety message collection and notify the drivers about these incidents in advance, so they can take proper actions. In addition, the security and privacy of vehicles are achieved. We also improve the privacy-preserving of vehicles.","PeriodicalId":371668,"journal":{"name":"2022 Ninth International Conference on Social Networks Analysis, Management and Security (SNAMS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130063433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Fast Local Community Detection Algorithm in Signed Social Networks 签名社交网络中一种快速本地社区检测算法
Sahar Bakhtar, Hovhannes A. Harutyunyan
Recent years have witnessed the rapid growth of social network services and consequently, research problems investigated in this area. Community detection is one of the most important problems in social networks. A good community can be defined as a group of vertices that are highly connected and loosely connected to the vertices outside the group. Community detection includes exploring the community partitioning in social networks. Regarding the fact that social networks are huge, having complete information about the whole network is almost impossible. As a result, the problem of local community detection has become more popular in recent years. This problem can be defined as the detection of a community for a given node by using local information. Many networks contain both positive and negative relations. A community in signed networks is defined as a group of nodes that are densely connected by positive links within the community and negative links between communities. In this paper, considering the problem of local community detection in signed networks, a new fast algorithm, noted as $Alg_{SP}$, is developed to identify a dense community for a given node in signed networks. Experimental results show that the proposed algorithm can detect the ground-truth communities independently from the starting nodes.
近年来,随着社交网络服务的快速发展,这一领域的研究问题也越来越多。社区检测是社交网络中的一个重要问题。一个好的社区可以被定义为一组高度连接和松散连接到组外顶点的顶点。社区检测包括探索社交网络中的社区划分。考虑到社交网络是巨大的,拥有关于整个网络的完整信息几乎是不可能的。因此,近年来,当地社区检测问题变得更加普遍。这个问题可以定义为使用本地信息检测给定节点的社区。许多网络既有积极的关系,也有消极的关系。在签名网络中,社区被定义为由社区内的正链接和社区间的负链接紧密相连的一组节点。本文针对签名网络中的局部社区检测问题,提出了一种新的快速算法,命名为$Alg_{SP}$,用于识别签名网络中给定节点的密集社区。实验结果表明,该算法可以独立于起始节点检测出真实群落。
{"title":"A Fast Local Community Detection Algorithm in Signed Social Networks","authors":"Sahar Bakhtar, Hovhannes A. Harutyunyan","doi":"10.1109/SNAMS58071.2022.10062846","DOIUrl":"https://doi.org/10.1109/SNAMS58071.2022.10062846","url":null,"abstract":"Recent years have witnessed the rapid growth of social network services and consequently, research problems investigated in this area. Community detection is one of the most important problems in social networks. A good community can be defined as a group of vertices that are highly connected and loosely connected to the vertices outside the group. Community detection includes exploring the community partitioning in social networks. Regarding the fact that social networks are huge, having complete information about the whole network is almost impossible. As a result, the problem of local community detection has become more popular in recent years. This problem can be defined as the detection of a community for a given node by using local information. Many networks contain both positive and negative relations. A community in signed networks is defined as a group of nodes that are densely connected by positive links within the community and negative links between communities. In this paper, considering the problem of local community detection in signed networks, a new fast algorithm, noted as $Alg_{SP}$, is developed to identify a dense community for a given node in signed networks. Experimental results show that the proposed algorithm can detect the ground-truth communities independently from the starting nodes.","PeriodicalId":371668,"journal":{"name":"2022 Ninth International Conference on Social Networks Analysis, Management and Security (SNAMS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125978335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Roadmap of Social Networking Drivers and Challenges in the Era of Digital Banking 数字银行时代的社交网络驱动因素和挑战路线图
Jamil Razmak, W. Farhan, Ghaleb A. El Refae
We conducted a literature review to draw a short roadmap of both the drivers and challenges related to social networking in the banking industry. We extracted from the literature simple models based on drivers and challenges, on which banking policy makers, technologists, and researchers can build in the future. Our findings show that various trends in social networking drivers and challenges can have either a negative or a positive impact on the banking industry. Banks must use different tools, such as force-field analysis, to compare between these drivers and challenges. The use of modern technologies, such as cloud computing and AI aligning, along with managerial actions such as hiring specialized technologists and adopting marketing strategies through social networking, will help the banking industry maximize its opportunities and minimize its challenges.
我们进行了一项文献综述,绘制了银行业中与社交网络相关的驱动因素和挑战的简短路线图。我们从文献中提取了基于驱动因素和挑战的简单模型,银行政策制定者、技术专家和研究人员可以在未来建立这些模型。我们的研究结果表明,社交网络驱动因素和挑战的各种趋势可能对银行业产生消极或积极的影响。银行必须使用不同的工具,如力场分析,来比较这些驱动因素和挑战。使用现代技术,如云计算和人工智能对齐,以及雇佣专业技术人员和通过社交网络采用营销策略等管理行动,将有助于银行业最大限度地利用机遇,最大限度地减少挑战。
{"title":"A Roadmap of Social Networking Drivers and Challenges in the Era of Digital Banking","authors":"Jamil Razmak, W. Farhan, Ghaleb A. El Refae","doi":"10.1109/SNAMS58071.2022.10062757","DOIUrl":"https://doi.org/10.1109/SNAMS58071.2022.10062757","url":null,"abstract":"We conducted a literature review to draw a short roadmap of both the drivers and challenges related to social networking in the banking industry. We extracted from the literature simple models based on drivers and challenges, on which banking policy makers, technologists, and researchers can build in the future. Our findings show that various trends in social networking drivers and challenges can have either a negative or a positive impact on the banking industry. Banks must use different tools, such as force-field analysis, to compare between these drivers and challenges. The use of modern technologies, such as cloud computing and AI aligning, along with managerial actions such as hiring specialized technologists and adopting marketing strategies through social networking, will help the banking industry maximize its opportunities and minimize its challenges.","PeriodicalId":371668,"journal":{"name":"2022 Ninth International Conference on Social Networks Analysis, Management and Security (SNAMS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129245571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quantifying Matthew Effect of Twitter 量化Twitter的马太效应
S. Shioda, Takahito Konishi
It is well known that most of tweets are retweeted only a few times at most, while very few tweets get a very large number of retweets. This concentration of retweet is caused by a so-called Matthew effect of Twitter; original tweets that have been retweeted more often are more likely to be retweeted further. In this paper, we quantify the Matthew effect of Twitter by using the model, under which the probability that an original tweet (say, tweet A) is retweeted is proportional to a given function $f(i)$, where $i$ denotes the number of retweets that tweet A has received so far. We assume that $f(i)$ is a non-decreasing function of $i$. The proposed model, a simple extension of the Yule process, is analytically tractable and the expression of the distribution of the number of retweets that an original tweet receives can be explicitly obtained. We show that by assuming $f(i)=a+i^{delta}$ and $delta$ is around 0.8, the distribution of the number of retweets based on the proposed model is well consistent with the actual distribution.
众所周知,大多数推文最多只被转发几次,很少有推文获得非常多的转发。这种转发的集中是由所谓的推特马太效应造成的;被转发次数越多的原创推文更有可能被进一步转发。在本文中,我们通过使用模型来量化Twitter的马太效应,在该模型下,一条原始推文(例如推文A)被转发的概率与给定函数f(i)$成正比,其中$i$表示推文A迄今为止收到的转发数。我们假设f(i)$是$i$的非递减函数。所提出的模型是Yule过程的简单扩展,在分析上易于处理,并且可以显式地获得原始tweet收到的转发数分布的表达式。我们表明,通过假设$f(i)=a+i^{delta}$和$delta$约为0.8,基于所提出模型的转发数分布与实际分布很好地一致。
{"title":"Quantifying Matthew Effect of Twitter","authors":"S. Shioda, Takahito Konishi","doi":"10.1109/SNAMS58071.2022.10062637","DOIUrl":"https://doi.org/10.1109/SNAMS58071.2022.10062637","url":null,"abstract":"It is well known that most of tweets are retweeted only a few times at most, while very few tweets get a very large number of retweets. This concentration of retweet is caused by a so-called Matthew effect of Twitter; original tweets that have been retweeted more often are more likely to be retweeted further. In this paper, we quantify the Matthew effect of Twitter by using the model, under which the probability that an original tweet (say, tweet A) is retweeted is proportional to a given function $f(i)$, where $i$ denotes the number of retweets that tweet A has received so far. We assume that $f(i)$ is a non-decreasing function of $i$. The proposed model, a simple extension of the Yule process, is analytically tractable and the expression of the distribution of the number of retweets that an original tweet receives can be explicitly obtained. We show that by assuming $f(i)=a+i^{delta}$ and $delta$ is around 0.8, the distribution of the number of retweets based on the proposed model is well consistent with the actual distribution.","PeriodicalId":371668,"journal":{"name":"2022 Ninth International Conference on Social Networks Analysis, Management and Security (SNAMS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134180393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implicit User Network Analysis of Communication Platform Open Data for Channel Recommendation 面向频道推荐的通信平台开放数据隐式用户网络分析
A. Bobic, Igor Jakovljevic, C. Gütl, Jean-Marie Le Goff, Andreas Wagner
Recommender systems play a pivotal role in various human-centered online systems by filtering out relevant information from large databases. However, most recommender systems consume explicit private user information such as exchanged messages and information between users and items such as likes and shares without exploring other latent factors. Past events have shown that this can have decremental consequences on users' privacy. One type of application where alternative solutions have not yet been investigated are messaging platforms in larger corporate environments. These applications would benefit from recommender systems that consume only anonymized implicit data to enable employees to discover new communities and people. As a first step in developing such a recommender system, this paper describes the construction and analysis of implicit social network data from the messaging platform Mattermost at CERN and the extraction of measures for indicating similarity between users and channels. Additionally, it describes the use of these measures to evaluate multiple existing collaborative filter-based recommender systems, where their performances are compared and evaluated against simple measures. The evaluation results indicate that combining clustering approaches and custom features extracted through our data analysis outperforms standard collaborative filtering techniques. These results will be used in the future to create a new custom recommender system for messaging at CERN that only uses anonymized and implicit data.
推荐系统通过从大型数据库中过滤出相关信息,在各种以人为中心的在线系统中发挥着关键作用。然而,大多数推荐系统使用明确的私人用户信息,如用户与物品之间的交换消息和信息,如喜欢和分享,而没有探索其他潜在因素。过去的事件表明,这可能会对用户的隐私产生负面影响。有一种类型的应用程序的替代解决方案还没有被研究过,那就是大型企业环境中的消息传递平台。这些应用程序将受益于仅使用匿名隐式数据的推荐系统,从而使员工能够发现新的社区和人员。作为开发这种推荐系统的第一步,本文描述了来自CERN消息传递平台Mattermost的隐式社交网络数据的构建和分析,以及用户和频道之间表示相似性的度量的提取。此外,它还描述了使用这些度量来评估多个现有的基于过滤器的协作推荐系统,其中它们的性能与简单的度量进行比较和评估。评估结果表明,结合聚类方法和通过我们的数据分析提取的自定义特征优于标准的协同过滤技术。这些结果将在未来用于在CERN创建一个新的定制推荐系统,该系统只使用匿名和隐式数据。
{"title":"Implicit User Network Analysis of Communication Platform Open Data for Channel Recommendation","authors":"A. Bobic, Igor Jakovljevic, C. Gütl, Jean-Marie Le Goff, Andreas Wagner","doi":"10.1109/SNAMS58071.2022.10062597","DOIUrl":"https://doi.org/10.1109/SNAMS58071.2022.10062597","url":null,"abstract":"Recommender systems play a pivotal role in various human-centered online systems by filtering out relevant information from large databases. However, most recommender systems consume explicit private user information such as exchanged messages and information between users and items such as likes and shares without exploring other latent factors. Past events have shown that this can have decremental consequences on users' privacy. One type of application where alternative solutions have not yet been investigated are messaging platforms in larger corporate environments. These applications would benefit from recommender systems that consume only anonymized implicit data to enable employees to discover new communities and people. As a first step in developing such a recommender system, this paper describes the construction and analysis of implicit social network data from the messaging platform Mattermost at CERN and the extraction of measures for indicating similarity between users and channels. Additionally, it describes the use of these measures to evaluate multiple existing collaborative filter-based recommender systems, where their performances are compared and evaluated against simple measures. The evaluation results indicate that combining clustering approaches and custom features extracted through our data analysis outperforms standard collaborative filtering techniques. These results will be used in the future to create a new custom recommender system for messaging at CERN that only uses anonymized and implicit data.","PeriodicalId":371668,"journal":{"name":"2022 Ninth International Conference on Social Networks Analysis, Management and Security (SNAMS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115107673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Predicting Student Performance Using Educational Data Mining 利用教育数据挖掘预测学生表现
Nehal Eleyan, Mariam Al Akasheh, Esraa Faisal Malik, O. Hujran
Data mining methods have been employed successfully in several industries, including education, where they are known as educational data mining methods. Educational data mining aims to extract in-depth knowledge from raw data to build automated systems that could be used in the educational sector. With the advancement of data mining technologies, it is now possible to mine educational data to enhance educational practices. This study, therefore, uses educational data mining techniques to predict the final grades of secondary school students. This study has employed several Machine Learning (ML) algorithms, such as classification trees, regression trees, logistic Regression, and Multiple Regression. In addition, the R programming language was used to develop the prediction models. The dataset used in this study was obtained from two secondary schools in Portugal. According to the findings, classification trees and logistic Regression fared better than regression trees and multiple Regression.
数据挖掘方法已经成功地应用于多个行业,包括教育行业,它们被称为教育数据挖掘方法。教育数据挖掘旨在从原始数据中提取深入的知识,以构建可用于教育部门的自动化系统。随着数据挖掘技术的进步,挖掘教育数据以加强教育实践已成为可能。因此,本研究使用教育数据挖掘技术来预测中学生的最终成绩。本研究采用了几种机器学习(ML)算法,如分类树、回归树、逻辑回归和多元回归。此外,使用R编程语言开发预测模型。本研究中使用的数据集来自葡萄牙的两所中学。结果表明,分类树和逻辑回归优于回归树和多元回归。
{"title":"Predicting Student Performance Using Educational Data Mining","authors":"Nehal Eleyan, Mariam Al Akasheh, Esraa Faisal Malik, O. Hujran","doi":"10.1109/SNAMS58071.2022.10062500","DOIUrl":"https://doi.org/10.1109/SNAMS58071.2022.10062500","url":null,"abstract":"Data mining methods have been employed successfully in several industries, including education, where they are known as educational data mining methods. Educational data mining aims to extract in-depth knowledge from raw data to build automated systems that could be used in the educational sector. With the advancement of data mining technologies, it is now possible to mine educational data to enhance educational practices. This study, therefore, uses educational data mining techniques to predict the final grades of secondary school students. This study has employed several Machine Learning (ML) algorithms, such as classification trees, regression trees, logistic Regression, and Multiple Regression. In addition, the R programming language was used to develop the prediction models. The dataset used in this study was obtained from two secondary schools in Portugal. According to the findings, classification trees and logistic Regression fared better than regression trees and multiple Regression.","PeriodicalId":371668,"journal":{"name":"2022 Ninth International Conference on Social Networks Analysis, Management and Security (SNAMS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124374799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Code Visualization for Plagiarism Detection 代码可视化的抄袭检测
D. Bernhauer
The use of deep convolutional neural networks is very common in computer graphics. With this, methods for exploiting knowledge in other fields are also developing. Finding plagiarism among student source codes is challenging, especially when students have the same assignment. In this case, we try to find differences between two semantically identical codes at the level of syntax, approach, or just style. This paper aims to visualize binary codes and verify if it is possible to detect plagiarism using deep convolution neural networks. Using the siamese network, we trained a neural network to evaluate the similarity between the two programs. The training data for our network are the ICPC competition submissions for which we can be confident of their authorship. The overall success rate of our model consistently reaches 75 to 80 % accuracy, which mainly shows that the visualization of inherently non-graphical entities (like source code) can be useful in the application of neural networks designed primarily for graphical purposes.
深度卷积神经网络的使用在计算机图形学中非常普遍。与此同时,其他领域的知识开发方法也在不断发展。在学生的源代码中发现抄袭是很有挑战性的,尤其是当学生有相同的作业时。在这种情况下,我们试图在语法、方法或风格级别上找到两个语义相同的代码之间的差异。本文旨在可视化二进制代码,并验证是否有可能使用深度卷积神经网络检测剽窃。使用暹罗网络,我们训练了一个神经网络来评估两个程序之间的相似性。我们网络的训练数据是ICPC竞赛提交的,我们可以确信它们是作者。我们的模型的总体成功率始终达到75%到80%的准确率,这主要表明固有的非图形实体(如源代码)的可视化在主要为图形目的设计的神经网络的应用中是有用的。
{"title":"Code Visualization for Plagiarism Detection","authors":"D. Bernhauer","doi":"10.1109/SNAMS58071.2022.10062664","DOIUrl":"https://doi.org/10.1109/SNAMS58071.2022.10062664","url":null,"abstract":"The use of deep convolutional neural networks is very common in computer graphics. With this, methods for exploiting knowledge in other fields are also developing. Finding plagiarism among student source codes is challenging, especially when students have the same assignment. In this case, we try to find differences between two semantically identical codes at the level of syntax, approach, or just style. This paper aims to visualize binary codes and verify if it is possible to detect plagiarism using deep convolution neural networks. Using the siamese network, we trained a neural network to evaluate the similarity between the two programs. The training data for our network are the ICPC competition submissions for which we can be confident of their authorship. The overall success rate of our model consistently reaches 75 to 80 % accuracy, which mainly shows that the visualization of inherently non-graphical entities (like source code) can be useful in the application of neural networks designed primarily for graphical purposes.","PeriodicalId":371668,"journal":{"name":"2022 Ninth International Conference on Social Networks Analysis, Management and Security (SNAMS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132503810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Process Mining Approach In Discovering Processes And Social Networks In My.Eskwela 一种发现过程和社会网络的过程挖掘方法。Eskwela
Orven E. Llantos, Sherwyn P. Florin, Van Michael S. Ranque
Pieces of literature discussing the process model in the learning management system are limited to student and teacher learning interactions. Including the learning interactions of principals and parents contributes to more detail of processes taking place during learning interactions on the platform. The study used process mining techniques and algorithms to extract the underlying processes that drive learning interactions in social learning management systems. The discovered processes for principals, teachers, students, and parents consequently show a precision value of 1, 0.542, 0.639, and 1, respectively. The preciseness of processes for each user group indicates an acceptable behavior (> 0.50) extracted from the event logs. On the other hand, social networks form from the processes that show the information flow of learning interactions from the principal to the students and parents, depicting everyone's effort for learning gain in favor of the student. This study's contribution expands beyond teacher-student interaction processes to include principals and parents, thereby generating a more concrete view of learning interaction in the social learning management system.
讨论学习管理系统中过程模型的文献仅限于学生和教师的学习互动。包括校长和家长的学习互动有助于更详细地了解在平台上学习互动过程中发生的过程。该研究使用过程挖掘技术和算法来提取驱动社会学习管理系统中学习交互的潜在过程。因此,校长、教师、学生和家长的发现过程的精度值分别为1、0.542、0.639和1。每个用户组的进程的精确性表示从事件日志中提取的可接受的行为(> 0.50)。另一方面,社会网络的形成过程显示了从校长到学生和家长的学习互动的信息流,描绘了每个人为学生的学习收益所做的努力。本研究的贡献从师生互动过程扩展到校长和家长,从而产生了社会学习管理系统中学习互动的更具体的观点。
{"title":"A Process Mining Approach In Discovering Processes And Social Networks In My.Eskwela","authors":"Orven E. Llantos, Sherwyn P. Florin, Van Michael S. Ranque","doi":"10.1109/SNAMS58071.2022.10062684","DOIUrl":"https://doi.org/10.1109/SNAMS58071.2022.10062684","url":null,"abstract":"Pieces of literature discussing the process model in the learning management system are limited to student and teacher learning interactions. Including the learning interactions of principals and parents contributes to more detail of processes taking place during learning interactions on the platform. The study used process mining techniques and algorithms to extract the underlying processes that drive learning interactions in social learning management systems. The discovered processes for principals, teachers, students, and parents consequently show a precision value of 1, 0.542, 0.639, and 1, respectively. The preciseness of processes for each user group indicates an acceptable behavior (> 0.50) extracted from the event logs. On the other hand, social networks form from the processes that show the information flow of learning interactions from the principal to the students and parents, depicting everyone's effort for learning gain in favor of the student. This study's contribution expands beyond teacher-student interaction processes to include principals and parents, thereby generating a more concrete view of learning interaction in the social learning management system.","PeriodicalId":371668,"journal":{"name":"2022 Ninth International Conference on Social Networks Analysis, Management and Security (SNAMS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134063948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 Ninth International Conference on Social Networks Analysis, Management and Security (SNAMS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1