{"title":"The Concept of Recommender System Supporting Command and Control System in Hierarchical Organization","authors":"Maj Grzegorz Pilarski","doi":"10.1109/ENIC.2014.9","DOIUrl":"https://doi.org/10.1109/ENIC.2014.9","url":null,"abstract":"The most important aspect of operations in a hierarchical organization of military character is the fastness and aptness of the made decisions in the circumstances riddled with uncertainty and big risk. Thus, it is very important to equip a command body responsible for gathering, processing, sending and storing of information with proper IT tools which support the process of decision making. The conduct of research which aims at elaborating a concept of recommender system supporting the military decision making process (MDMP) is the most important activity in the transition period leading to the achievement of network centric capabilities in NATO. The author presents in this article distinctive features which describe the functioning of a hierarchical organization of military character as well as the most important results of research connected with the usage of the present applications supporting a command body in the military decision making process. The results and conclusions of the research allowed to create and present a concept of recommender system which, if implemented, could increase the effectiveness of a command body in a hierarchical organization of military character.","PeriodicalId":185148,"journal":{"name":"2014 European Network Intelligence Conference","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128830281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Profile Cloning Detection in Social Networks","authors":"Piotr Bródka, Mateusz Sobas, H. Johnson","doi":"10.1109/ENIC.2014.21","DOIUrl":"https://doi.org/10.1109/ENIC.2014.21","url":null,"abstract":"Profile cloning is a severe security issue in social networks since it is used to make a profile identical to existing ones. Profile cloning detection creates a possibility to detect frauds that would use people's trust to gather social information. This paper proposes two novel methods of profile cloning detection and also presents state-of-the-art research. The first method is based on the similarity of attributes from both profiles and the second method is based on the similarity of relationship networks. The methods are further evaluated with experiments and the results clearly describes that the proposed methods are useful and efficient compared to existing methods. The paper also stress that profile cloning in Facebook is not only possible but also fairly easy to perform.","PeriodicalId":185148,"journal":{"name":"2014 European Network Intelligence Conference","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121411763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Norm Emergence via Influential Weight Propagation in Complex Networks","authors":"Ryosuke Shibusawa, T. Sugawara","doi":"10.1109/ENIC.2014.28","DOIUrl":"https://doi.org/10.1109/ENIC.2014.28","url":null,"abstract":"We propose an influence-based aggregative learning framework that facilitates the emergence of social norms in complex networks and investigate how a norm converges by learning through iterated local interactions in a coordination game. In society, humans decide to coordinate their behavior not only by exchanging information but also on the basis of norms that are often individually derived from interactions without a centralized authority. Coordination using norms has received much attention in studies of multi-agent systems. In addition, because agents often work as delegates of humans, they should have \"mental\" models about how to interact with others and incorporate differences of opinion. Because norms make sense only when all or most agents have the same one and they can expect that others will follow, it is important to investigate the mechanism of norm emergence through learning with local and individual interactions in agent society. Our method of norm learning borrows from the opinion aggregation process while taking into account the influence of local opinions in tightly coordinated human communities. We conducted experiments showing how our learning framework facilitates propagation of norms in a number of complex agent networks.","PeriodicalId":185148,"journal":{"name":"2014 European Network Intelligence Conference","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116713851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Assessing Professional Skills in a Multi-scale Environment by Means of Graph-Based Algorithms","authors":"J. Álvarez-Rodríguez, R. Colomo-Palacios","doi":"10.1109/ENIC.2014.12","DOIUrl":"https://doi.org/10.1109/ENIC.2014.12","url":null,"abstract":"The present paper introduces a study of different techniques to assess professional skills in social networks and to align those user skills with existing multi-scale knowledge classifications. Currently both job seekers and talent hunters are looking for new and innovative techniques to filter jobs and candidates as well as candidates are also trying to improve and make more attractive their profiles. In this environment it is necessary to provide new techniques to assess the quality of professional skills depending on user's activity and to compare with existing scales. To do so some relevant graph-based techniques such as the HITS and the SPEAR algorithms have been used for calculating the confidence of a certain user in a particular skill. Moreover a new re-interpretation of the SPEAR algorithm, called Skill rank, is introduced to take advantage of user's behavior and history. A major outcome of this approach is that expertise and experts can be detected, verified and ranked using a suited trust metric. The paper also presents a validation of the Skill rank accuracy by means of a sound qualitative and quantitative comparison with existing approaches based on the opinions of a panel of experts (3) on a real dataset (created using the Linked in API) and two different scales. Although results show in general low values of accuracy (close to 50% of correct classified skills), the Skill rank technique is more accurate than other techniques to align a user skill in a certain scale of knowledge. Finally some discussion, conclusions and future work are also outlined.","PeriodicalId":185148,"journal":{"name":"2014 European Network Intelligence Conference","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133935837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Effect of High Order Reputation Information on Trust Prediction in Wikipedia's Vote Network","authors":"J. Nuñez-Gonzalez, M. Graña","doi":"10.1109/ENIC.2014.13","DOIUrl":"https://doi.org/10.1109/ENIC.2014.13","url":null,"abstract":"When a user (the truster) in a social network is trying to solve the problem of guessing whether he/she will trust or not another user (the trustee) when he/she has not direct experience of the trustee behavior, then the truster is facing a Trust prediction problem. In this paper we deal with this problem as a classification problem based on reputation features of the target trustee. Reputation refers to the opinion that a third person (a witness) may have about the target trustee. Second and higher order reputation information comes from witnesses which have no direct contact with the trustee. The differences in the spread of relationships among users produce variable size reputation feature vectors, according to the relationships of each user. We propose probabilistic descriptors of the reputation information in order to reduce the feature vectors to the same size. In this paper we explore the prediction of Trust training some classifiers with reputation features extracted from first and second order relationships. We conclude that second order reputation features do not improve classification significatively.","PeriodicalId":185148,"journal":{"name":"2014 European Network Intelligence Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130261541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Social Network Analysis to Unveil Cartels in Public Bids","authors":"A. C. Gabardo, H. S. Lopes","doi":"10.1109/ENIC.2014.11","DOIUrl":"https://doi.org/10.1109/ENIC.2014.11","url":null,"abstract":"In recent years, the study of complex networks has attracted great attention. Several fields of science have used techniques of social network analysis and complex networks to represent a wide range of structures such as, social networks, political influence, communication, epidemics and several other aspects of human behavior. Most of the complex networks show community structures. Revealing these communities is highly relevant to understanding several social phenomena such as the organizing of groups, the flow of information and the strength of the influence of some members over the group. In this article, we use techiques of social network analysis and complex networks to represent the relationship between companies that are participating in public bids to unveil community structures analog to cartels. Several nations are facing injuries trough the misuse of public money caused by the formation of cartels, which are groupings of companies aiming to defraud the free competition. Our main goal in this work is to present a methodology for identifying these communities. Furthermore, we aim to address whether companies that have high success rates in public bids are grouped and identify whether they are taking advantage of their influence in the network.","PeriodicalId":185148,"journal":{"name":"2014 European Network Intelligence Conference","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124096096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic Network Approach to Marriage/Divorces Problem","authors":"A. Jarynowski, P. Nyczka","doi":"10.1109/ENIC.2014.24","DOIUrl":"https://doi.org/10.1109/ENIC.2014.24","url":null,"abstract":"We extend \"stable marriage problem\" studied via computer simulation (agent-based) from network perspective by dynamical generalization. We investigate how preferential or random attachment of individuals can affect simulation results such as: proportion of singles in society, number of divorces etc. We took into account attractiveness of individuals and its different types as well as personal taste. Current value of socio-economic pressure p (main model parameter) drives the dynamic of first marriage, remarriage or spontaneously marriage breaks up. Model reflects the behavior of the simplified heterosexual population (frequency of changing partners, the ratio of singles in society). Theoretical agent-based simulation (with populational approaches, e.g. Births and deaths) should be later supplemented by historical values of divorces/marriages in different countries of the world. Stable (constant) society was also implemented to show difference with \"living\" society. In this model, agents have attribute of attraction. Preferential attachment, known from network theory, was introduced, to mimic selection process. Additionally, totally random attachment (not attraction-depended) was also implemented for contrast.","PeriodicalId":185148,"journal":{"name":"2014 European Network Intelligence Conference","volume":"243 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124674720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Privacy-Preserving Framework for Mining Continuous Sequences in Trajectory Systems","authors":"Pawel Jureczek, Adrianna Kozierkiewicz-Hetmanska","doi":"10.1109/ENIC.2014.16","DOIUrl":"https://doi.org/10.1109/ENIC.2014.16","url":null,"abstract":"The popularization of mobile devices and satellite navigation systems has brought new opportunities and challenges to many location-based services (LBSs), intelligent transport systems (ITSs) and fleet management systems. Those systems store trajectory data in moving object databases and trajectory data warehouses. Trajectory datasets can be used in many data mining tasks, e.g., for mining traffic patterns, frequently visited places, and so on. However, such data mining tasks introduce security and location privacy threats to companies (data owners) and mobile objects that generate trajectories. In this paper, in order to overcome the location privacy threats, we present a technique that blurs trajectories according to user-defined privacy profiles and a data mining algorithm called MCSPP that is capable of mining continuous sequences from blurred trajectories. To test that our approach works correctly, we have implemented an experimental environment. Moreover, the conducted experiments have shown a good performance and scalability of the MCSPP algorithm.","PeriodicalId":185148,"journal":{"name":"2014 European Network Intelligence Conference","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125187883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alfredo Ramos Lezama, Tilman Göhnert, Sam Zeini, H. Hoppe
{"title":"Foresighted Heat Ring: Tracking the Productivity and Collaborativeness of Researchers in Dynamic Networks","authors":"Alfredo Ramos Lezama, Tilman Göhnert, Sam Zeini, H. Hoppe","doi":"10.1109/ENIC.2014.23","DOIUrl":"https://doi.org/10.1109/ENIC.2014.23","url":null,"abstract":"In this paper, we present the design, implementation and an evaluation of the \"Foresighted Heat Ring\", a technique for visualizing the productivity and collaborative ness of researchers in dynamic networks. Our approach combines a heat map and a foresighted radial layout with physiological theories of visual perception to achieve visual stability on the drawing. The technique has been embedded into a network analysis workbench and applied to a time-sliced nanotechnology publication network from Web of Science. Based on this scenario, an evaluation with twenty participants was conducted. The results suggest that there are three factors that allow a visualization technique to be perceived as stable.","PeriodicalId":185148,"journal":{"name":"2014 European Network Intelligence Conference","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122611970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Characteristics of Terrorists Networks Based on Ideology and Practices","authors":"Fatih Özgül, C. Bowerman","doi":"10.1109/ENIC.2014.34","DOIUrl":"https://doi.org/10.1109/ENIC.2014.34","url":null,"abstract":"Due to the interest by public audience and academic research, there has been a great interest in Terrorist Networks by the academicians, analysts and criminologists. Either to learn how to disrupt or to prevent their activities, structure of these networks are investigated. The final conclusion about their structure and topology came to the fact that they do not resemble each other, but there are categories of them. In this paper, we categorized these networks into six because of their ideologies and common practices. Example terrorist groups are also discussed.","PeriodicalId":185148,"journal":{"name":"2014 European Network Intelligence Conference","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133551273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}