Konstantinos F. Xylogiannopoulos, P. Karampelas, R. Alhajj
Mobile phones have become nowadays a commodity to the majority of people. Using them, people are able to access the world of Internet and connect with their friends, their colleagues at work or even unknown people with common interests. This proliferation of the mobile devices has also been seen as an opportunity for the cyber criminals to deceive smartphone users and steel their money directly or indirectly, respectively, by accessing their bank accounts through the smartphones or by blackmailing them or selling their private data such as photos, credit card data, etc. to third parties. This is usually achieved by installing malware to smartphones masking their malevolent payload as a legitimate application and advertise it to the users with the hope that mobile users will install it in their devices. Thus, any existing application can easily be modified by integrating a malware and then presented it as a legitimate one. In response to this, scientists have proposed a number of malware detection and classification methods using a variety of techniques. Even though, several of them achieve relatively high precision in malware classification, there is still space for improvement. In this paper, we propose a text mining all repeated pattern detection method which uses the decompiled files of an application in order to classify a suspicious application into one of the known malware families. Based on the experimental results using a real malware dataset, the methodology tries to correctly classify (without any misclassification) all randomly selected malware applications of 3 categories with 3 different families each.
{"title":"Text Mining for Malware Classification Using Multivariate All Repeated Patterns Detection","authors":"Konstantinos F. Xylogiannopoulos, P. Karampelas, R. Alhajj","doi":"10.1145/3341161.3350841","DOIUrl":"https://doi.org/10.1145/3341161.3350841","url":null,"abstract":"Mobile phones have become nowadays a commodity to the majority of people. Using them, people are able to access the world of Internet and connect with their friends, their colleagues at work or even unknown people with common interests. This proliferation of the mobile devices has also been seen as an opportunity for the cyber criminals to deceive smartphone users and steel their money directly or indirectly, respectively, by accessing their bank accounts through the smartphones or by blackmailing them or selling their private data such as photos, credit card data, etc. to third parties. This is usually achieved by installing malware to smartphones masking their malevolent payload as a legitimate application and advertise it to the users with the hope that mobile users will install it in their devices. Thus, any existing application can easily be modified by integrating a malware and then presented it as a legitimate one. In response to this, scientists have proposed a number of malware detection and classification methods using a variety of techniques. Even though, several of them achieve relatively high precision in malware classification, there is still space for improvement. In this paper, we propose a text mining all repeated pattern detection method which uses the decompiled files of an application in order to classify a suspicious application into one of the known malware families. Based on the experimental results using a real malware dataset, the methodology tries to correctly classify (without any misclassification) all randomly selected malware applications of 3 categories with 3 different families each.","PeriodicalId":403360,"journal":{"name":"2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"195 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114966258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Today, with the emergence of various business review sites such as Yelp, Trip Advisor, and Zomato, people can write reviews and provide an assessment (often as 1–5 score rating). The success of a business on the crowd-sourced review platform has taken the form of positive reviews and high star ratings (failure are associated with negative reviews and low star ratings). We often claim that location plays a major role in determining the success or the failure of a given business. This paper attempts to verify this claim and quantifies the impact of location, solely, on business success, using two data sets; a Yelp dataset for business information and reviews, and another Location dataset that gathers location-based information in a city or an area. We perform an empirical study to quantify the impact of (i) relative location to well known landmarks and (ii) parameterized location (such as cost of living in a given zip code), on the success of restaurants. In our study, we found that parameterized location using location characteristic parameters such as housing affordability correlate highly with restaurant success with more than 0.81 correlation ratio. We also observe that the closer the restaurant to a landmark (relative location) the more likelihood it succeeds.
{"title":"Location, Location, Location! Quantifying the True Impact of Location on Business Reviews Using a Yelp Dataset","authors":"Abu Saleh Md Tayeen, Abderrahmen Mtibaa, S. Misra","doi":"10.1145/3341161.3345334","DOIUrl":"https://doi.org/10.1145/3341161.3345334","url":null,"abstract":"Today, with the emergence of various business review sites such as Yelp, Trip Advisor, and Zomato, people can write reviews and provide an assessment (often as 1–5 score rating). The success of a business on the crowd-sourced review platform has taken the form of positive reviews and high star ratings (failure are associated with negative reviews and low star ratings). We often claim that location plays a major role in determining the success or the failure of a given business. This paper attempts to verify this claim and quantifies the impact of location, solely, on business success, using two data sets; a Yelp dataset for business information and reviews, and another Location dataset that gathers location-based information in a city or an area. We perform an empirical study to quantify the impact of (i) relative location to well known landmarks and (ii) parameterized location (such as cost of living in a given zip code), on the success of restaurants. In our study, we found that parameterized location using location characteristic parameters such as housing affordability correlate highly with restaurant success with more than 0.81 correlation ratio. We also observe that the closer the restaurant to a landmark (relative location) the more likelihood it succeeds.","PeriodicalId":403360,"journal":{"name":"2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129818108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In asset allocation and time-series forecasting studies, few have shed light on using the different machine learning and deep learning models to verify the difference in the result of investment returns and optimal asset allocation. To fill this research gap, we develop a robo-advisor with different machine learning and deep learning forecasting methodologies and utilize the forecasting result of the portfolio optimization model to support our investors in making decisions. This research integrated several dimensions of technologies, which contain machine learning, data analytics, and portfolio optimization. We focused on developing robo-advisor framework and utilized algorithms by integrating machine learning and deep learning approaches with the portfolio optimization algorithm by using our predicted trends and results to replace the historical data and investor views. We eliminate the extreme fluctuation to maintain our trading within the acceptable risk coefficient. Accordingly, we can minimize the investment risk and reach a relatively stable return. We compared different algorithms and found that the F1 score of the model prediction significantly affects the result of the optimized portfolio. We used our deep learning model with the highest winning rate and leveraged the prediction result with the portfolio optimization algorithm to reach 12% of annual return, which outperform our benchmark index 0050. TW and the optimized portfolio with the integration of historical data.
{"title":"Artificial Intelligence for ETF Market Prediction and Portfolio Optimization","authors":"Min-Yuh Day, Jian-Ting Lin","doi":"10.1145/3341161.3344822","DOIUrl":"https://doi.org/10.1145/3341161.3344822","url":null,"abstract":"In asset allocation and time-series forecasting studies, few have shed light on using the different machine learning and deep learning models to verify the difference in the result of investment returns and optimal asset allocation. To fill this research gap, we develop a robo-advisor with different machine learning and deep learning forecasting methodologies and utilize the forecasting result of the portfolio optimization model to support our investors in making decisions. This research integrated several dimensions of technologies, which contain machine learning, data analytics, and portfolio optimization. We focused on developing robo-advisor framework and utilized algorithms by integrating machine learning and deep learning approaches with the portfolio optimization algorithm by using our predicted trends and results to replace the historical data and investor views. We eliminate the extreme fluctuation to maintain our trading within the acceptable risk coefficient. Accordingly, we can minimize the investment risk and reach a relatively stable return. We compared different algorithms and found that the F1 score of the model prediction significantly affects the result of the optimized portfolio. We used our deep learning model with the highest winning rate and leveraged the prediction result with the portfolio optimization algorithm to reach 12% of annual return, which outperform our benchmark index 0050. TW and the optimized portfolio with the integration of historical data.","PeriodicalId":403360,"journal":{"name":"2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130034595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Geotagging on social media has become an important proxy for understanding people's mobility and social events. Research that uses geotags to infer public opinions relies on several key assumptions about the behavior of geotagged and non-geotagged users. However, these assumptions have not been fully validated. Lack of understanding the geotagging behavior prohibits people further utilizing it. In this paper, we present an empirical study of geotagging behavior on Twitter based on more than 40 billion tweets collected from 20 million users. There are three main findings that may challenge these common assumptions. Firstly, different groups of users have different geotagging preferences. For example, less than 3% of users speaking in Korean are geotagged, while more than 40% of users speaking in Indonesian use geotags. Secondly, users who report their locations in profiles are more likely to use geotags, which may affects the generability of those location prediction systems on non-geotagged users. Thirdly, strong homophily effect exists in users' geotagging behavior, that users tend to connect to friends with similar geotagging preferences.
{"title":"A Large-Scale Empirical Study of Geotagging Behavior on Twitter","authors":"Binxuan Huang, Kathleen M. Carley","doi":"10.1145/3341161.3342870","DOIUrl":"https://doi.org/10.1145/3341161.3342870","url":null,"abstract":"Geotagging on social media has become an important proxy for understanding people's mobility and social events. Research that uses geotags to infer public opinions relies on several key assumptions about the behavior of geotagged and non-geotagged users. However, these assumptions have not been fully validated. Lack of understanding the geotagging behavior prohibits people further utilizing it. In this paper, we present an empirical study of geotagging behavior on Twitter based on more than 40 billion tweets collected from 20 million users. There are three main findings that may challenge these common assumptions. Firstly, different groups of users have different geotagging preferences. For example, less than 3% of users speaking in Korean are geotagged, while more than 40% of users speaking in Indonesian use geotags. Secondly, users who report their locations in profiles are more likely to use geotags, which may affects the generability of those location prediction systems on non-geotagged users. Thirdly, strong homophily effect exists in users' geotagging behavior, that users tend to connect to friends with similar geotagging preferences.","PeriodicalId":403360,"journal":{"name":"2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129352745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Heterogeneous Information Networks (HINs) comprise nodes of different types inter-connected through diverse semantic relationships. In many real-world applications, nodes in information networks are often associated with additional attributes, resulting in Attributed HINs (or AHINs). In this paper, we study semi-supervised learning (SSL) on AHINs to classify nodes based on their structure, node types and attributes, given limited supervision. Recently, Graph Convolutional Networks (GCNs) have achieved impressive results in several graph-based SSL tasks. However, they operate on homogeneous networks, while being completely agnostic to the semantics of typed nodes and relationships in real-world HINs. In this paper, we seek to bridge the gap between semantic-rich HINs and the neighborhood aggregation paradigm of graph neural networks, to generalize GCNs through metagraph semantics. We propose a novel metagraph convolution operation to extract features from local metagraph-structured neighborhoods, thus capturing semantic higher-order relationships in AHINs. Our proposed neural architecture Meta-GNN extracts features of diverse semantics by utilizing multiple metagraphs, and employs a novel metagraph-attention module to learn personalized metagraph preferences for each node. Our semi-supervised node classification experiments on multiple real-world AHIN datasets indicate significant performance gains of 6% Micro-F1 on average over state-of-the-art AHIN baselines. Visualizations on metagraph attention weights yield interpretable insights into their relative task-specific importance.
{"title":"Meta-GNN: Metagraph Neural Network for Semi-supervised learning in Attributed Heterogeneous Information Networks","authors":"Aravind Sankar, Xinyang Zhang, K. Chang","doi":"10.1145/3341161.3342859","DOIUrl":"https://doi.org/10.1145/3341161.3342859","url":null,"abstract":"Heterogeneous Information Networks (HINs) comprise nodes of different types inter-connected through diverse semantic relationships. In many real-world applications, nodes in information networks are often associated with additional attributes, resulting in Attributed HINs (or AHINs). In this paper, we study semi-supervised learning (SSL) on AHINs to classify nodes based on their structure, node types and attributes, given limited supervision. Recently, Graph Convolutional Networks (GCNs) have achieved impressive results in several graph-based SSL tasks. However, they operate on homogeneous networks, while being completely agnostic to the semantics of typed nodes and relationships in real-world HINs. In this paper, we seek to bridge the gap between semantic-rich HINs and the neighborhood aggregation paradigm of graph neural networks, to generalize GCNs through metagraph semantics. We propose a novel metagraph convolution operation to extract features from local metagraph-structured neighborhoods, thus capturing semantic higher-order relationships in AHINs. Our proposed neural architecture Meta-GNN extracts features of diverse semantics by utilizing multiple metagraphs, and employs a novel metagraph-attention module to learn personalized metagraph preferences for each node. Our semi-supervised node classification experiments on multiple real-world AHIN datasets indicate significant performance gains of 6% Micro-F1 on average over state-of-the-art AHIN baselines. Visualizations on metagraph attention weights yield interpretable insights into their relative task-specific importance.","PeriodicalId":403360,"journal":{"name":"2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129234741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this work, we propose an optimal solution for face detection when operating in the thermal and visible bands. Our aim is to train, fine tune, optimize and validate preexisting object detection models using thermal and visible data separately. Thus, we perform an empirical study to determine the most efficient band specific DeepFace detection model in terms of detection performance. The original object detection models that were selected for our study are the Faster R-CNN (Region based Convolutional Neural Network), SSD (Single-shot Multi-Box Detector) and R-FCN (Region-based Fully Convolutional Network). Also, the dual-band dataset used for this work is composed of two challenging MWIR and visible band face datasets, where the faces were captured under variable conditions, i.e. indoors, outdoors, different standoff distances (5 and 10 meters) and poses. Experimental results show that the proposed detection model yields the highest accuracy independent of the band and scenario used. Specifically, we show that a modified and tuned Faster R-CNN architecture with ResNet 101 is the most promising model when compared to all the other models tested. The proposed model yields accuracy of 99.2% and 98.4% when tested on thermal and visible face data respectively. Finally, while the proposed model is relatively slower than its competitors, our further experiments show that the speed of this network can be increased by reducing the number of proposals in RPN (Region Proposal Network), and thus, the computational complexity challenge is significantly minimized.
{"title":"On Designing MWIR and Visible Band based DeepFace Detection Models","authors":"Suha Reddy Mokalla, T. Bourlai","doi":"10.1145/3341161.3343528","DOIUrl":"https://doi.org/10.1145/3341161.3343528","url":null,"abstract":"In this work, we propose an optimal solution for face detection when operating in the thermal and visible bands. Our aim is to train, fine tune, optimize and validate preexisting object detection models using thermal and visible data separately. Thus, we perform an empirical study to determine the most efficient band specific DeepFace detection model in terms of detection performance. The original object detection models that were selected for our study are the Faster R-CNN (Region based Convolutional Neural Network), SSD (Single-shot Multi-Box Detector) and R-FCN (Region-based Fully Convolutional Network). Also, the dual-band dataset used for this work is composed of two challenging MWIR and visible band face datasets, where the faces were captured under variable conditions, i.e. indoors, outdoors, different standoff distances (5 and 10 meters) and poses. Experimental results show that the proposed detection model yields the highest accuracy independent of the band and scenario used. Specifically, we show that a modified and tuned Faster R-CNN architecture with ResNet 101 is the most promising model when compared to all the other models tested. The proposed model yields accuracy of 99.2% and 98.4% when tested on thermal and visible face data respectively. Finally, while the proposed model is relatively slower than its competitors, our further experiments show that the speed of this network can be increased by reducing the number of proposals in RPN (Region Proposal Network), and thus, the computational complexity challenge is significantly minimized.","PeriodicalId":403360,"journal":{"name":"2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131119328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Software for electronic prescriptions offers healthcare providers numerous benefits including increased patient safety, prescribing effectiveness, workflow efficiencies, and financial savings. Particularly due to recent legislation, an increasing number of organizations are adopting this software. Yet, there are many concerns and risks associated with e-prescription technologies. Despite increased prescribing effectiveness, there is still the potential for human error. Many software concerns including integration and the implementation of specific transactions like CancelRx still need to be addressed. Additionally, some patients have negative perceptions of e-Rx that must be overcome. To this effect, this research conducts risk assessment of two real world cases (the CVS Pharmacy (retail setting) and the Ascension Seton (inpatient setting)) using the NIST risk model. The study concludes that the top three challenges in the pharmacy domain are comprised of a lack in the implementation of essential software functionalities, the loss and theft of portable devices, and errors due to email phishing attacks.
{"title":"Risk Assessment of Pharmacies & Electronic Prescriptions","authors":"Michelle Bowman, Subrata Acharya","doi":"10.1145/3341161.3343697","DOIUrl":"https://doi.org/10.1145/3341161.3343697","url":null,"abstract":"Software for electronic prescriptions offers healthcare providers numerous benefits including increased patient safety, prescribing effectiveness, workflow efficiencies, and financial savings. Particularly due to recent legislation, an increasing number of organizations are adopting this software. Yet, there are many concerns and risks associated with e-prescription technologies. Despite increased prescribing effectiveness, there is still the potential for human error. Many software concerns including integration and the implementation of specific transactions like CancelRx still need to be addressed. Additionally, some patients have negative perceptions of e-Rx that must be overcome. To this effect, this research conducts risk assessment of two real world cases (the CVS Pharmacy (retail setting) and the Ascension Seton (inpatient setting)) using the NIST risk model. The study concludes that the top three challenges in the pharmacy domain are comprised of a lack in the implementation of essential software functionalities, the loss and theft of portable devices, and errors due to email phishing attacks.","PeriodicalId":403360,"journal":{"name":"2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122398636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Finding clusters in a network has been practically important in many applications and was studied by many researchers. Most commonly used methods are spectral clustering and Newman's modularity maximization. However, there has been no unified view of them. In this study, we introduced a new guiding principle based on correspondence analysis to obtain nodes' coordinates and discussed its equivalence to spectral clustering and its relationship to Newman's modularity.
{"title":"CAB-NC: The Correspondence Analysis Based Network Clustering Method","authors":"M. Kimura","doi":"10.1145/3341161.3342944","DOIUrl":"https://doi.org/10.1145/3341161.3342944","url":null,"abstract":"Finding clusters in a network has been practically important in many applications and was studied by many researchers. Most commonly used methods are spectral clustering and Newman's modularity maximization. However, there has been no unified view of them. In this study, we introduced a new guiding principle based on correspondence analysis to obtain nodes' coordinates and discussed its equivalence to spectral clustering and its relationship to Newman's modularity.","PeriodicalId":403360,"journal":{"name":"2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121166020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Konstantinos F. Xylogiannopoulos, P. Karampelas, R. Alhajj
In recent years, there are very frequent reports of disasters attributed to the climate change and there are several reports that these extreme phenomena will further affect people not only as weather disasters but also indirectly with the shortage of natural resources such as water or food due to the climate change. Towards this direction, there is an on-going research that studies weather phenomena by collecting data not only in the surface of the globe but also at the different levels of the atmosphere. Having such a large volume of data, traditional numerical weather prediction models may not be able to assimilate those data and extract knowledge useful for the prediction of extreme phenomena. Thus, analysis of weather data has been transformed into a big data analytics problem which may enable weather scientists to better understand the interrelations of the weather variables and use the knowledge discovered to improve their prediction models. In this context, the current paper proposes a big data analytics methodology that is able to detect all common patterns between different weather variables in neighboring or distant points in a specific time window revealing useful associations between weather variables which is not possible to detect otherwise with the traditional numerical methods. The proposed methodology is based on a data structure that is able to store the magnitude of the weather data in different dimensions and a pattern detection algorithm which is able to detect all common patterns. The experimental results using weather data from the National Oceanic and Atmospheric Administration (NOAA) revealed interesting otherwise unknown patterns in two weather variables for two specific locations that were studied.
{"title":"Multivariate Motif Detection in Local Weather Big Data","authors":"Konstantinos F. Xylogiannopoulos, P. Karampelas, R. Alhajj","doi":"10.1145/3341161.3343518","DOIUrl":"https://doi.org/10.1145/3341161.3343518","url":null,"abstract":"In recent years, there are very frequent reports of disasters attributed to the climate change and there are several reports that these extreme phenomena will further affect people not only as weather disasters but also indirectly with the shortage of natural resources such as water or food due to the climate change. Towards this direction, there is an on-going research that studies weather phenomena by collecting data not only in the surface of the globe but also at the different levels of the atmosphere. Having such a large volume of data, traditional numerical weather prediction models may not be able to assimilate those data and extract knowledge useful for the prediction of extreme phenomena. Thus, analysis of weather data has been transformed into a big data analytics problem which may enable weather scientists to better understand the interrelations of the weather variables and use the knowledge discovered to improve their prediction models. In this context, the current paper proposes a big data analytics methodology that is able to detect all common patterns between different weather variables in neighboring or distant points in a specific time window revealing useful associations between weather variables which is not possible to detect otherwise with the traditional numerical methods. The proposed methodology is based on a data structure that is able to store the magnitude of the weather data in different dimensions and a pattern detection algorithm which is able to detect all common patterns. The experimental results using weather data from the National Oceanic and Atmospheric Administration (NOAA) revealed interesting otherwise unknown patterns in two weather variables for two specific locations that were studied.","PeriodicalId":403360,"journal":{"name":"2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"186 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125434279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Understanding the evolution of large-scale cooperation is important for the social welfare and stability of economic and social networks. Therefore, there is a need to model real-world scenarios that involve a trade-off between self-interest and social welfare with minimal artificial assumptions or constraints in a versatile framework. In this paper, we build an agent-based model to simulate the dynamics of a multi-agent, bilateral, resource-exchange network. We analyze how various strategies employed by communities can improve or hurt community payoffs as well as the overall social welfare of the network. We also analyze the role of common knowledge in inducing cooperation in the network. Our experimental evidence from simulations confirms that carefully-designed trading mechanisms can indeed encourage cooperation among communities with various motivations.
{"title":"Modeling the Dynamics of Resource Exchange Networks","authors":"Haripriya Chakraborty, Liang Zhao","doi":"10.1145/3341161.3342904","DOIUrl":"https://doi.org/10.1145/3341161.3342904","url":null,"abstract":"Understanding the evolution of large-scale cooperation is important for the social welfare and stability of economic and social networks. Therefore, there is a need to model real-world scenarios that involve a trade-off between self-interest and social welfare with minimal artificial assumptions or constraints in a versatile framework. In this paper, we build an agent-based model to simulate the dynamics of a multi-agent, bilateral, resource-exchange network. We analyze how various strategies employed by communities can improve or hurt community payoffs as well as the overall social welfare of the network. We also analyze the role of common knowledge in inducing cooperation in the network. Our experimental evidence from simulations confirms that carefully-designed trading mechanisms can indeed encourage cooperation among communities with various motivations.","PeriodicalId":403360,"journal":{"name":"2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126972322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}