共查询到20条相似文献,搜索用时 15 毫秒
1.
Clustered structure of social networks provides the chances of repeated exposures to carriers with similar information. It is commonly believed that the impact of repeated exposures on the spreading of information is nontrivial. Does this effect increase the probability that an individual forwards a message in social networks? If so, to what extent does this effect influence people’s decisions on whether or not to spread information? Based on a large-scale microblogging data set, which logs the message spreading processes and users’ forwarding activities, we conduct a data-driven analysis to explore the answer to the above questions. The results show that an overwhelming majority of message samples are more probable to be forwarded under repeated exposures, compared to those under only a single exposure. For those message samples that cover various topics, we observe a relatively fixed, topic-independent multiplier of the willingness of spreading when repeated exposures occur, regardless of the differences in network structure. We believe that this finding reflects average people’s intrinsic psychological gain under repeated stimuli. Hence, it makes sense that the gain is associated with personal response behavior, rather than network structure. Moreover, we find that the gain is robust against the change of message popularity. This finding supports that there exists a relatively fixed gain brought by repeated exposures. Based on the above findings, we propose a parsimonious model to predict the saturated numbers of forwarding activities of messages. Our work could contribute to better understandings of behavioral psychology and social media analytics. 相似文献
2.
The dynamical process of epidemic spreading has drawn much attention of the complex network community. In the network paradigm, diseases spread from one person to another through the social ties amongst the population. There are a variety of factors that govern the processes of disease spreading on the networks. A common but not negligible factor is people’s reaction to the outbreak of epidemics. Such reaction can be related information dissemination or self-protection. In this work, we explore the interactions between disease spreading and population response in terms of information diffusion and individuals’ alertness. We model the system by mapping multiplex networks into two-layer networks and incorporating individuals’ risk awareness, on the assumption that their response to the disease spreading depends on the size of the community they belong to. By comparing the final incidence of diseases in multiplex networks, we find that there is considerable mitigation of diseases spreading for full phase of spreading speed when individuals’ protection responses are introduced. Interestingly, the degree of community overlap between the two layers is found to be critical factor that affects the final incidence. We also analyze the consequences of the epidemic incidence in communities with different sizes and the impacts of community overlap between two layers. Specifically, as the diseases information makes individuals alert and take measures to prevent the diseases, the effective protection is more striking in small community. These phenomena can be explained by the multiplexity of the networked system and the competition between two spreading processes. 相似文献
3.
Seth H. Weinberg 《PloS one》2013,8(11)
High-frequency (HF) stimulation has been shown to block conduction in excitable cells including neurons and cardiac myocytes. However, the precise mechanisms underlying conduction block are unclear. Using a multi-scale method, the influence of HF stimulation is investigated in the simplified FitzhHugh-Nagumo and biophysically-detailed Hodgkin-Huxley models. In both models, HF stimulation alters the amplitude and frequency of repetitive firing in response to a constant applied current and increases the threshold to evoke a single action potential in response to a brief applied current pulse. Further, the excitable cells cannot evoke a single action potential or fire repetitively above critical values for the HF stimulation amplitude. Analytical expressions for the critical values and thresholds are determined in the FitzHugh-Nagumo model. In the Hodgkin-Huxley model, it is shown that HF stimulation alters the dynamics of ionic current gating, shifting the steady-state activation, inactivation, and time constant curves, suggesting several possible mechanisms for conduction block. Finally, we demonstrate that HF stimulation of a network of neurons reduces the electrical activity firing rate, increases network synchronization, and for a sufficiently large HF stimulation, leads to complete electrical quiescence. In this study, we demonstrate a novel approach to investigate HF stimulation in biophysically-detailed ionic models of excitable cells, demonstrate possible mechanisms for HF stimulation conduction block in neurons, and provide insight into the influence of HF stimulation on neural networks. 相似文献
4.
How does reciprocal links affect the function of real social network? Does reciprocal link and non-reciprocal link play the same role? Previous researches haven''t displayed a clear picture to us until now according to the best of our knowledge. Motivated by this, in this paper, we empirically study the influence of reciprocal links in two representative real datasets, Sina Weibo and Douban. Our results demonstrate that the reciprocal links play a more important role than non-reciprocal ones in information diffusion process. In particular, not only coverage but also the speed of the information diffusion can be significantly enhanced by considering the reciprocal effect. We give some possible explanations from the perspectives of network connectivity and efficiency. This work may shed some light on the in-depth understanding and application of the reciprocal effect in directed online social networks. 相似文献
5.
Influence maximization in social networks has been widely studied motivated by applications like spread of ideas or innovations in a network and viral marketing of products. Current studies focus almost exclusively on unsigned social networks containing only positive relationships (e.g. friend or trust) between users. Influence maximization in signed social networks containing both positive relationships and negative relationships (e.g. foe or distrust) between users is still a challenging problem that has not been studied. Thus, in this paper, we propose the polarity-related influence maximization (PRIM) problem which aims to find the seed node set with maximum positive influence or maximum negative influence in signed social networks. To address the PRIM problem, we first extend the standard Independent Cascade (IC) model to the signed social networks and propose a Polarity-related Independent Cascade (named IC-P) diffusion model. We prove that the influence function of the PRIM problem under the IC-P model is monotonic and submodular Thus, a greedy algorithm can be used to achieve an approximation ratio of 1-1/e for solving the PRIM problem in signed social networks. Experimental results on two signed social network datasets, Epinions and Slashdot, validate that our approximation algorithm for solving the PRIM problem outperforms state-of-the-art methods. 相似文献
6.
7.
Whilst the most obvious mechanism for a biological invasion is the occupation of a new territory as a result of direct ingress by individuals of the invading population, a more subtle “invasion” may occur without significant motion of invading individuals if the population dynamics in a predator prey scenario has an “excitable” character. Here, “excitable” means that a local equilibrium state, either of coexistence of predator and prey, or of prey only, may, when disturbed by a small perturbation, switch to a new, essentially invaded state. In an invasion of this type little spatial movement of individuals occurs, but a wave of rapid change of population level nevertheless travels through the invaded territory. In this article we summarise and review recent modelling research which shows that the macroscopic features of these invasion waves depend strongly on the detailed spatial dynamics of the predator–prey relationship; the models assume simple (linear) diffusion and pursuit-evasion, represented by (non-linear) cross-diffusion, as examples. In the context of plankton population dynamics, such waves may be produced by sudden injections of nutrient and consequent rapid increase in plankton populations, brought about, for example, by the upwelling caused by a passing atmospheric low pressure system. 相似文献
8.
The deployment of wireless sensor networks for healthcare applications have been motivated and driven by the increasing demand for real-time monitoring of patients in hospital and large disaster response environments. A major challenge in developing such sensor networks is the need for coordinating a large number of randomly deployed sensor nodes. In this study, we propose a multi-parametric clustering scheme designed to aid in the coordination of sensor nodes within cognitive wireless sensor networks. In the proposed scheme, sensor nodes are clustered together based on similar network behaviour across multiple network parameters, such as channel availability, interference characteristics, and topological characteristics, followed by mechanisms for forming, joining and switching clusters. Extensive performance evaluation is conducted to study the impact on important factors such as clustering overhead, cluster joining estimation error, interference probability, as well as probability of reclustering. Results show that the proposed clustering scheme can be an excellent candidate for use in large scale cognitive wireless sensor network deployments with high dynamics. 相似文献
9.
Mehdi Sookhak Adnan Akhundzada Alireza Sookhak Mohammadreza Eslaminejad Abdullah Gani Muhammad Khurram Khan Xiong Li Xiaomin Wang 《PloS one》2015,10(1)
Wireless sensor networks (WSNs) are ubiquitous and pervasive, and therefore; highly susceptible to a number of security attacks. Denial of Service (DoS) attack is considered the most dominant and a major threat to WSNs. Moreover, the wormhole attack represents one of the potential forms of the Denial of Service (DoS) attack. Besides, crafting the wormhole attack is comparatively simple; though, its detection is nontrivial. On the contrary, the extant wormhole defense methods need both specialized hardware and strong assumptions to defend against static and dynamic wormhole attack. The ensuing paper introduces a novel scheme to detect wormhole attacks in a geographic routing protocol (DWGRP). The main contribution of this paper is to detect malicious nodes and select the best and the most reliable neighbors based on pairwise key pre-distribution technique and the beacon packet. Moreover, this novel technique is not subject to any specific assumption, requirement, or specialized hardware, such as a precise synchronized clock. The proposed detection method is validated by comparisons with several related techniques in the literature, such as Received Signal Strength (RSS), Authentication of Nodes Scheme (ANS), Wormhole Detection uses Hound Packet (WHOP), and Wormhole Detection with Neighborhood Information (WDI) using the NS-2 simulator. The analysis of the simulations shows promising results with low False Detection Rate (FDR) in the geographic routing protocols. 相似文献
10.
Arkadiusz Stopczynski Vedran Sekara Piotr Sapiezynski Andrea Cuttone Mette My Madsen Jakob Eg Larsen Sune Lehmann 《PloS one》2014,9(4)
This paper describes the deployment of a large-scale study designed to measure human interactions across a variety of communication channels, with high temporal resolution and spanning multiple years—the Copenhagen Networks Study. Specifically, we collect data on face-to-face interactions, telecommunication, social networks, location, and background information (personality, demographics, health, politics) for a densely connected population of 1 000 individuals, using state-of-the-art smartphones as social sensors. Here we provide an overview of the related work and describe the motivation and research agenda driving the study. Additionally, the paper details the data-types measured, and the technical infrastructure in terms of both backend and phone software, as well as an outline of the deployment procedures. We document the participant privacy procedures and their underlying principles. The paper is concluded with early results from data analysis, illustrating the importance of multi-channel high-resolution approach to data collection. 相似文献
11.
Jacob M. Vigil Lauren N. Rowell Simone Chouteau Alexandre Chavez Elisa Jaramillo Michael Neal David Waid 《PloS one》2013,8(11)
This is the first study to examine how both structural and functional components of individuals’ social networks may moderate the association between biological sex and experimental pain sensitivity. One hundred and fifty-two healthy adults (mean age = 22yrs., 53% males) were measured for cold pressor task (CPT) pain sensitivity (i.e., intensity ratings) and core aspects of social networks (e.g., proportion of friends vs. family, affection, affirmation, and aid). Results showed consistent sex differences in how social network structures and intimate relationship functioning modulated pain sensitivity. Females showed higher pain sensitivity when their social networks consisted of a higher proportion of intimate types of relationship partners (e.g., kin vs. non kin), when they had known their network partners for a longer period of time, and when they reported higher levels of logistical support from their significant other (e.g., romantic partner). Conversely, males showed distinct patterns in the opposite direction, including an association between higher levels of logistical support from one’s significant other and lower CPT pain intensity. These findings show for the first time that the direction of sex differences in exogenous pain sensitivity is likely dependent on fundamental components of the individual’s social environment. The utility of a social-signaling perspective of pain behaviors for examining, comparing, and interpreting individual and group differences in experimental and clinical pain reports is discussed. 相似文献
12.
13.
14.
Individual’s decisions, from what product to buy to whether to engage in risky behavior, often depend on the choices, behaviors, or states of other people. People, however, rarely have global knowledge of the states of others, but must estimate them from the local observations of their social contacts. Network structure can significantly distort individual’s local observations. Under some conditions, a state that is globally rare in a network may be dramatically over-represented in the local neighborhoods of many individuals. This effect, which we call the “majority illusion,” leads individuals to systematically overestimate the prevalence of that state, which may accelerate the spread of social contagions. We develop a statistical model that quantifies this effect and validate it with measurements in synthetic and real-world networks. We show that the illusion is exacerbated in networks with a heterogeneous degree distribution and disassortative structure. 相似文献
15.
Energy and QoS Aware Routing in Wireless Sensor Networks 总被引:7,自引:0,他引:7
Many new routing protocols have been proposed for wireless sensor networks in recent years. Almost all of the routing protocols considered energy efficiency as the ultimate objective since energy is a very scarce resource for sensor nodes. However, the introduction imaging sensors has posed additional challenges. Transmission of imaging data requires both energy and QoS aware routing in order to ensure efficient usage of the sensors and effective access to the gathered measurements. In this paper, we propose an energy-aware QoS routing protocol for sensor networks which can also run efficiently with best-effort traffic. The protocol finds a least-cost, delay-constrained path for real-time data in terms of link cost that captures nodes energy reserve, transmission energy, error rate and other communication parameters. Moreover, the throughput for non-real-time data is maximized by adjusting the service rate for both real-time and non-real-time data at the sensor nodes. Such adjustment of service rate is done by using two different mechanisms. Simulation results have demonstrated the effectiveness of our approach for different metrics with respect to the baseline approach where same link cost function is used without any service differentiation mechanism.Kemal Akkaya received his B.S. degree in Computer Science from Bilkent University, Ankara, Turkey in 1997 and MS degree in Computer Science from Ortadogu Technical University (ODTU), Ankara, Turkey in 1999. He worked as a software developer at an automation project of Siemens and World Bank in Ankara, Turkey in 2000. He is currently a Ph.D. candidate at University of Maryland, Baltimore County (UMBC), Baltimore, MD. His research interests include energy aware routing, security and quality of service issues in ad hoc wireless networks.Mohamed F. Younis received B.S. degree in computer science and M.S. in engineering mathematics from Alexandria University in Egypt in 1987 and 1992, respectively. In 1996, he received his Ph.D. in computer science from New Jersey Institute of Technology. He is currently an assistant professor in the department of computer science and electrical engineering at the university of Maryland Baltimore County (UMBC). Before joining UMBC, he was with the Advanced Systems Technology Group, an Aerospace Electronic Systems R&D organization of Honeywell International Inc. While at Honeywell he led multiple projects for building integrated fault tolerant avionics, in which a novel architecture and an operating system were developed. This new technology has been incorporated by Honeywell in multiple products and has received worldwide recognition by both the research and the engineering communities. He also participated in the development the Redundancy Management System, which is a key component of the Vehicle and Mission Computer for NASAs X-33 space launch vehicle. Dr. Younis technical interest includes network architectures and protocols, embedded systems, fault tolerant computing and distributed real-time systems. Dr. Younis has four granted and three pending patents. He served on multiple technical committees and published over 40 technical papers in refereed conferences and journals. 相似文献
16.
There are many studies in the marketing and diffusion literature of the conditions in which social contagion affects adoption processes. Yet most of these studies assume that social interactions do not change over time, even though actors in social networks exhibit different likelihoods of being influenced across the diffusion period. Rooted in physics and epidemiology theories, this study proposes a Susceptible Infectious Susceptible (SIS) model to assess the role of social contagion in adoption processes, which takes changes in social dynamics over time into account. To study the adoption over a span of ten years, the authors used detailed data sets from a community of consumers and determined the importance of social contagion, as well as how the interplay of social and non-social influences from outside the community drives adoption processes. Although social contagion matters for diffusion, it is less relevant in shaping adoption when the study also includes social dynamics among members of the community. This finding is relevant for managers and entrepreneurs who trust in word-of-mouth marketing campaigns whose effect may be overestimated if marketers fail to acknowledge variations in social interactions. 相似文献
17.
We analyze two large datasets from technological networks with location and social data: user location records from an online location-based social networking service, and anonymized telecommunications data from a European cellphone operator, in order to investigate the differences between individual and group behavior with respect to physical location. We discover agreements between the two datasets: firstly, that individuals are more likely to meet with one friend at a place they have not visited before, but tend to meet at familiar locations when with a larger group. We also find that groups of individuals are more likely to meet at places that their other friends have visited, and that the type of a place strongly affects the propensity for groups to meet there. These differences between group and solo mobility has potential technological applications, for example, in venue recommendation in location-based social networks. 相似文献
18.
Wireless Sensor Networks (WSNs) are vulnerable to clone attacks or node replication attacks as they are deployed in hostile and unattended environments where they are deprived of physical protection, lacking physical tamper-resistance of sensor nodes. As a result, an adversary can easily capture and compromise sensor nodes and after replicating them, he inserts arbitrary number of clones/replicas into the network. If these clones are not efficiently detected, an adversary can be further capable to mount a wide variety of internal attacks which can emasculate the various protocols and sensor applications. Several solutions have been proposed in the literature to address the crucial problem of clone detection, which are not satisfactory as they suffer from some serious drawbacks. In this paper we propose a novel distributed solution called Random Walk with Network Division (RWND) for the detection of node replication attack in static WSNs which is based on claimer-reporter-witness framework and combines a simple random walk with network division. RWND detects clone(s) by following a claimer-reporter-witness framework and a random walk is employed within each area for the selection of witness nodes. Splitting the network into levels and areas makes clone detection more efficient and the high security of witness nodes is ensured with moderate communication and memory overheads. Our simulation results show that RWND outperforms the existing witness node based strategies with moderate communication and memory overheads. 相似文献
19.
Suicide explains the largest number of death tolls among Japanese adolescents in their twenties and thirties. Suicide is also a major cause of death for adolescents in many other countries. Although social isolation has been implicated to influence the tendency to suicidal behavior, the impact of social isolation on suicide in the context of explicit social networks of individuals is scarcely explored. To address this question, we examined a large data set obtained from a social networking service dominant in Japan. The social network is composed of a set of friendship ties between pairs of users created by mutual endorsement. We carried out the logistic regression to identify users’ characteristics, both related and unrelated to social networks, which contribute to suicide ideation. We defined suicide ideation of a user as the membership to at least one active user-defined community related to suicide. We found that the number of communities to which a user belongs to, the intransitivity (i.e., paucity of triangles including the user), and the fraction of suicidal neighbors in the social network, contributed the most to suicide ideation in this order. Other characteristics including the age and gender contributed little to suicide ideation. We also found qualitatively the same results for depressive symptoms. 相似文献
20.
Ciro Cattuto Wouter Van den Broeck Alain Barrat Vittoria Colizza Jean-Fran?ois Pinton Alessandro Vespignani 《PloS one》2010,5(7)