Article
Метод автоматического определения возраста пользователей с помощью социальных связей
The work is devoted to methods of social network users’ age detection. Social networks allow users to fill their profiles that may contain an age. Profiles are not fully filled, so the task of unknown attributes detection arises. Explicit and predicted values are used in recommender and marketing systems. Moreover, the predicted values can be used for determining online communities’ demographic profiles and for inferring the target audience of marketing campaigns in the Internet. In this paper a method for predicting unfilled age values is proposed. The method uses the following information available from the social network: explicit users’ ages and social graph. The graph contains nodes representing users and communities. Community is the special page in the Internet that unites users on interests. Friendship relations between users and subscriptions of users on communities represented as edges of the social graph. The method is based on the label propagation in the friendship and subscription graphs. Ages of the users are representd by labels that are propagated in the graph. The scheme of the algorithm is following: initialize user labels according to explicit profiles; build vector model that contains distributions of the neighbours’ ages grouped by user age; compute weights of users and communities, propagate labels to communities; build vector model considering calculated weights; propagate labels to users that have not filled their age in the profile. The paper describes the algorithm and contains experimantal results showing that friendship relations are more useful for age prediction in the social network than communities.
The rapid penetration of web-based technologies into our social life creates challenges both for teachers and students to face. The purpose of the paper to dwell upon the implementation of social media as web-based technologies into the educational environment in the university. Social media application is considered at macro and micro levels within the university structure. Particular attention is paid to the description of LMS system at a macro level and LMS products to support a particular discipline at a micro level The authors propose the idea that particular pedagogical conditions must be created for successful deployment of the technologies. The participative approach is suggested as a basis of teacher-student collaboration.
The availability of large urban social media data creates new opportunities for studying cities. In our paper we propose a new direction for this research: a joint analysis of geolocations of shared images and their content as determined by computer vision. To test our ideas, we use a dataset of 47,410 Instagram images shared in the city of St.Petersburg over one year. We show how a combination of semantic clustering, image recognition and geospatial analysis can detect important patterns related to both how people use a city and how they represent in social media.
This paper studies different aspects of a linguo-political conflict concerned with choosing between two Russian toponymic variants – Belorussia and Belarus’ as well as adjectives belorusskij (Belorussian) and belarus(s)kij (Belarusian) and ethnonyms belorus and belarus. The core of the problem is that in the Russian language of Russia the variant Belorussia is used, which is considered to be insulting by many Belarusians, who prefer to use the variant Belarus while speaking Russian. In an attempt to understand the structure of this conflict, we analyze how and why the toponym Belarus appeared and spread through the newspapers of 1990-s, study the data from two online polls and the distribution of some words derived from the two toponymic variants, and finally discuss the scenarios of conflict communication in discussions in various social media. One of the polls shows the social distribution of the two toponymic variants and the other examines the attitude of the Belarusians towards the toponym Belorussia and its derivates. We show that each side of the conflict has its own limited set of ideas that reappear in conflict communication in comments under different articles on the Internet.
Internet Studies is an interdisciplinary and multidisciplinary field of fundamental and applied research that integrate different research disciplines with a common object, that is the Internet. This review article gives a definition and a brief description of the structure of Internet Studies as part of the social sciences and introduces research agenda of this field, including most cutting edge research issues. The agenda of Internet Studies related to classical sociological issues are analyzed in more detail: inequality, online communities and social capital as well as topics related to the study of transformations in different spheres of society - politics, public health and medicine, education. Two main theoretical approaches are briefly described, within which the influence of the Internet on society is interpreted: the network society theory and critical theory of the Internet and society. We conclude that the present directions of Internet research have many intersections with each other, and the perspective of a more complete study of the mechanisms, that mediate social changes related to the Internet and connect online and offline sociality into a single space, opens at these intersections.
The social and community driven aspects of our digital lives continue to rapidly increase, resulting in transformative behaviors and, significantly, publishing and distributing huge amounts of fascinating data. The seventh meeting of the International AAAI Conference on Weblogs and Social Media (ICWSM-13) held in Cambridge, Massachusetts, promised to be a benchmark year for ICWSM. Thanks to the enthusiastic participation of our community, we received a record number of submissions, with a growth of 50 percent over the previous year. More than the quantity, however, the high quality of the submitted papers is the truest evidence that ICWSM is maturing in its role as a premier venue for social media research.
Graph partitioning is required for solving tasks on graphs that need to be distributed over disks or computers. This problem is well studied, but the majority of the results on this subject are not suitable for processing graphs with billions of nodes on commodity clusters, since they require shared memory or lowlatency messaging. One of the approaches suitable for cluster computing is the balanced label propagation, which is based on the label propagation algorithm. In this work, we show how multi-level optimization can be used to improve quality of the partitioning obtained by means of the balanced label propagation algorithm.
The northern island of Japanese Archipelago - Hokkaido - has 34 cities on it and the most of them experiences depopulation and economic stagnation. The paper gives a brief survey of activies in social media the municipal authorities and local citizens'communities take to rebrand and promote their cities.
This book is the essential guide for understanding how state power and politics are contested and exercised on social media. It brings together contributions by social media scholars who explore the connection of social media with revolutions, uprising, protests, power and counter-power, hacktivism, the state, policing and surveillance. It shows how collective action and state power are related and conflict as two dialectical sides of social media power, and how power and counter-power are distributed in this dialectic. Theoretically focused and empirically rigorous research considers the two-sided contradictory nature of power in relation to social media and politics. Chapters cover social media in the context of phenomena such as contemporary revolutions in Egypt and other countries, populism 2.0, anti-austerity protests, the fascist movement in Greece's crisis, Anonymous and police surveillance.
In this book, the impact of modern social media on the development of management system in the hospitality and tourism industry is examined. The present research project was elaborated in two subsequent phases. During the first research phase the localization of the apparatus, methodology, study design, questionnaire and methodology for the Russian version of the research project were carried out. That was done based on the courtesy materials recently completed project by a Center for Hospitality Research Cornel the United States. The second project phase was aimed at identification of the specifics of the Russian consumers perception towards the use of social media for planning their trips.
A model for organizing cargo transportation between two node stations connected by a railway line which contains a certain number of intermediate stations is considered. The movement of cargo is in one direction. Such a situation may occur, for example, if one of the node stations is located in a region which produce raw material for manufacturing industry located in another region, and there is another node station. The organization of freight traffic is performed by means of a number of technologies. These technologies determine the rules for taking on cargo at the initial node station, the rules of interaction between neighboring stations, as well as the rule of distribution of cargo to the final node stations. The process of cargo transportation is followed by the set rule of control. For such a model, one must determine possible modes of cargo transportation and describe their properties. This model is described by a finite-dimensional system of differential equations with nonlocal linear restrictions. The class of the solution satisfying nonlocal linear restrictions is extremely narrow. It results in the need for the “correct” extension of solutions of a system of differential equations to a class of quasi-solutions having the distinctive feature of gaps in a countable number of points. It was possible numerically using the Runge–Kutta method of the fourth order to build these quasi-solutions and determine their rate of growth. Let us note that in the technical plan the main complexity consisted in obtaining quasi-solutions satisfying the nonlocal linear restrictions. Furthermore, we investigated the dependence of quasi-solutions and, in particular, sizes of gaps (jumps) of solutions on a number of parameters of the model characterizing a rule of control, technologies for transportation of cargo and intensity of giving of cargo on a node station.
Event logs collected by modern information and technical systems usually contain enough data for automated process models discovery. A variety of algorithms was developed for process models discovery, conformance checking, log to model alignment, comparison of process models, etc., nevertheless a quick analysis of ad-hoc selected parts of a journal still have not get a full-fledged implementation. This paper describes an ROLAP-based method of multidimensional event logs storage for process mining. The result of the analysis of the journal is visualized as directed graph representing the union of all possible event sequences, ranked by their occurrence probability. Our implementation allows the analyst to discover process models for sublogs defined by ad-hoc selection of criteria and value of occurrence probability
Existing approaches suggest that IT strategy should be a reflection of business strategy. However, actually organisations do not often follow business strategy even if it is formally declared. In these conditions, IT strategy can be viewed not as a plan, but as an organisational shared view on the role of information systems. This approach generally reflects only a top-down perspective of IT strategy. So, it can be supplemented by a strategic behaviour pattern (i.e., more or less standard response to a changes that is formed as result of previous experience) to implement bottom-up approach. Two components that can help to establish effective reaction regarding new initiatives in IT are proposed here: model of IT-related decision making, and efficiency measurement metric to estimate maturity of business processes and appropriate IT. Usage of proposed tools is demonstrated in practical cases.