“…Our proposed research may also be applied to various domain applications, such as mobile systems 28,29,30,31,32,33,34 , RFID 35,36 , real-time systems 37 , business process 38 , web systems 39,40,41 , and fuzzy data 42 .…”
The negative association between items in databases is as important and interesting as the positive one. But, it has not been studied as much. We consider negative association in a hierarchical setting, in which we are able to generate negative association rules at different hierarchy levels. It allows to impose restrictions when we proceed to the next level and discover only most interesting negative association rules among the vast number of possible negative association rules. In this paper, we propose two algorithms for mining negative association rules by considering that items are organized in a hierarchy, and this hierarchy is reflected on the association rules we produce. In this way, we can mine for both general and specialized rules of negative association between items.
“…Our proposed research may also be applied to various domain applications, such as mobile systems 28,29,30,31,32,33,34 , RFID 35,36 , real-time systems 37 , business process 38 , web systems 39,40,41 , and fuzzy data 42 .…”
The negative association between items in databases is as important and interesting as the positive one. But, it has not been studied as much. We consider negative association in a hierarchical setting, in which we are able to generate negative association rules at different hierarchy levels. It allows to impose restrictions when we proceed to the next level and discover only most interesting negative association rules among the vast number of possible negative association rules. In this paper, we propose two algorithms for mining negative association rules by considering that items are organized in a hierarchy, and this hierarchy is reflected on the association rules we produce. In this way, we can mine for both general and specialized rules of negative association between items.
“…Social networks are further subject to the analysis of researchers by studying the flow of communication and information exchange within the social network [5,6] and their evolution from different perspectives and applications [7]. Such analysis is required in order to measure the social network vulnerability to the spreading of rumors, diseases, news, viruses etc.…”
Section: Co-published By Atlantis Press and Taylor And Francismentioning
In social networks, counting the number of different cycle sizes can be used to measure the entropy of the network that represents its robustness. The exact algorithms to compute cycles in a graph can generate exact results but they are not guaranteed to run in a polynomial time. We present an approximation algorithm for counting the number of cycles in an undirected graph. The algorithm is regression-based and guaranteed to run in a polynomial time. A set of experiments are conducted to compare the results of our approximate algorithm with the results of an exact algorithm based on the Donald-Johnson backtracking algorithm.
“…Moreover, besides general browsing logs, other browsing logs such as cursor movements [15], mouse scrolling [20] and navigation action [35] are also used to analyze user interest and browsing habit. However, These researches assume that each browsed webpage has the same degree of interest to the user [31], and ignore the aimless browsing and evaluating credibility of tweet [16,8].…”
Twitter, the most popular micro-blog, attracts more and more Web users to share their accessed webpages and stimulates diverse recommendation mechanisms on social Web. However, the difference between webpage access and sharing on Twitter is often ignored, and many recommendation mechanisms are proposed based on an unproven common sense: "share" well reflects "interest" (users share their favorite webpages containing interested contents after accessing them). In this paper, we explain the difference between webpages access and sharing by giving possible reasons, and confirm them with actual users' activity data. We study the browsing behavior and develop a novel context-oriented approach to deeply analyze interest reflection of tweeted webpages by integrated using net view data, twitter data, and webpages. The experimental result shows our approach can effectively evaluate credibility of interest reflection on Twitter.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.