This article takes the female community platform“Little Red Book”as an example to explore the optimization and innovation of mobile community e-commerce operation mode under Artificial Intelligence(AI)empowerment.Fi...This article takes the female community platform“Little Red Book”as an example to explore the optimization and innovation of mobile community e-commerce operation mode under Artificial Intelligence(AI)empowerment.Firstly,the relevant concepts were defined,and then the unique attributes of mobile community e-commerce were analyzed.As a typical representative of mobile community e-commerce,Little Red Book introduces the background and characteristics of its platform,analyzes its mobile community operation mode,and focuses on exploring how to establish a mobile community e-commerce platform and effective operation mode under the empowerment of AI technology,to provide some reference and inspiration for the development and operation of Little Red Book and other e-commerce platform enterprises.展开更多
Differently from the general online social network(OSN),locationbased mobile social network(LMSN),which seamlessly integrates mobile computing and social computing technologies,has unique characteristics of temporal,s...Differently from the general online social network(OSN),locationbased mobile social network(LMSN),which seamlessly integrates mobile computing and social computing technologies,has unique characteristics of temporal,spatial and social correlation.Recommending friends instantly based on current location of users in the real world has become increasingly popular in LMSN.However,the existing friend recommendation methods based on topological structures of a social network or non-topological information such as similar user profiles cannot well address the instant making friends in the real world.In this article,we analyze users' check-in behavior in a real LMSN site named Gowalla.According to this analysis,we present an approach of recommending friends instantly for LMSN users by considering the real-time physical location proximity,offline behavior similarity and friendship network information in the virtual community simultaneously.This approach effectively bridges the gap between the offline behavior of users in the real world and online friendship network information in the virtual community.Finally,we use the real user check-in dataset of Gowalla to verify the effectiveness of our approach.展开更多
With the fast-growth of mobile social network, people' s interactions are frequently marked with location information, such as longitude and latitude of visited base station. This boom of data has led to considerable...With the fast-growth of mobile social network, people' s interactions are frequently marked with location information, such as longitude and latitude of visited base station. This boom of data has led to considerable interest in research fields such as user behavior mining, trajectory discovery and social demographics. However, there is little research on community discovery in mobile social networks, and this is the problem this work tackles with. In this work, we take advantage of one simple property that people in different locations often belong to different social circles in order to discover communities in these networks. Based on this property, which we referred to as Location-lnteraction Disparity (LID), we proposed a state network and then define a quality function evaluating community detection results. We also propose a hybrid community- detection algorithm using LID tor discovering location-based communities effectively and efficiently. Experiments on synthesis networks show that this algorithm can run effectively in time and discover communities with high precision. In realworld networks, the method reveals people's different social circles in different places with high efficiency.展开更多
The issue of privacy protection for mobile social networks is a frontier topic in the field of social network applications.The existing researches on user privacy protection in mobile social network mainly focus on pr...The issue of privacy protection for mobile social networks is a frontier topic in the field of social network applications.The existing researches on user privacy protection in mobile social network mainly focus on privacy preserving data publishing and access control.There is little research on the association of user privacy information,so it is not easy to design personalized privacy protection strategy,but also increase the complexity of user privacy settings.Therefore,this paper concentrates on the association of user privacy information taking big data analysis tools,so as to provide data support for personalized privacy protection strategy design.展开更多
Fractal and self similarity of complex networks have attracted much attention in recent years. The fractal dimension is a useful method to describe the fractal property of networks. However, the fractal features of mo...Fractal and self similarity of complex networks have attracted much attention in recent years. The fractal dimension is a useful method to describe the fractal property of networks. However, the fractal features of mobile social networks (MSNs) are inadequately investigated. In this work, a box-covering method based on the ratio of excluded mass to closeness centrality is presented to investigate the fractal feature of MSNs. Using this method, we find that some MSNs are fractal at different time intervals. Our simulation results indicate that the proposed method is available for analyzing the fractal property of MSNs.展开更多
With the rapid development of the new generation of information technology,the analysis of mobile social network big data is getting deeper and deeper.At the same time,the risk of privacy disclosure in social network ...With the rapid development of the new generation of information technology,the analysis of mobile social network big data is getting deeper and deeper.At the same time,the risk of privacy disclosure in social network is also very obvious.In this paper,we summarize the main access control model in mobile social network,analyze their contribution and point out their disadvantages.On this basis,a practical privacy policy is defined through authorization model supporting personalized privacy preferences.Experiments have been conducted on synthetic data sets.The result shows that the proposed privacy protecting model could improve the security of the mobile social network while keeping high execution efficiency.展开更多
This paper researched and analyzedweb2.0 technology and mobile social network.Then researched and implemented the mobile twitter system.This paper introduces the function and modules of mobile client and PC server res...This paper researched and analyzedweb2.0 technology and mobile social network.Then researched and implemented the mobile twitter system.This paper introduces the function and modules of mobile client and PC server respectively.We also had the user experience and system test which are wrote in this paper.展开更多
The service recommendation mechanism as a key enabling technology that provides users with more proactive and personalized service is one of the important research topics in mobile social network (MSN). Meanwhile, M...The service recommendation mechanism as a key enabling technology that provides users with more proactive and personalized service is one of the important research topics in mobile social network (MSN). Meanwhile, MSN is susceptible to various types of anonymous information or hacker actions. Trust can reduce the risk of interaction with unknown entities and prevent malicious attacks. In our paper, we present a trust-based service recommendation algorithm in MSN that considers users' similarity and friends' familiarity when computing trustworthy neighbors of target users. Firstly, we use the context information and the number of co-rated items to define users' similarity. Then, motivated by the theory of six degrees of space, the friend familiarity is derived by graph-based method. Thus the proposed methods are further enhanced by considering users' context in the recommendation phase. Finally, a set of simulations are conducted to evaluate the accuracy of the algorithm. The results show that the friend familiarity and user similarity can effectively improve the recommendation performance, and the friend familiarity contributes more than the user similarity.展开更多
Large-scale mobile social networks(MSNs)facilitate communications through mobile devices.The users of these networks can use mobile devices to access,share and distribute information.With the increasing number of user...Large-scale mobile social networks(MSNs)facilitate communications through mobile devices.The users of these networks can use mobile devices to access,share and distribute information.With the increasing number of users on social networks,the large volume of shared information and its propagation has created challenges for users.One of these challenges is whether users can trust one another.Trust can play an important role in users'decision making in social networks,so that,most people share their information based on their trust on others,or make decisions by relying on information provided by other users.However,considering the subjective and perceptive nature of the concept of trust,the mapping of trust in a computational model is one of the important issues in computing systeins of social networks.Moreover,in social networks,various communities may exist regarding the relationships between users.These connections and communities can affect trust among users and its complexity.In this paper,using user characteristics on social networks,a fuzzy clustering method is proposed and the trust between users in a cluster is computed using a computational model.Moreover,through the processes of combination,transition and aggregation of trust,the trust value is calculated between users who are not directly connected.Results show the high performance of the proposed trust inference method.展开更多
Mobile social networks, which consist of mobile users who communicate with each other using cell phones are reflections of people's interactions in social lives. Discovering typed communities (e.g., family communiti...Mobile social networks, which consist of mobile users who communicate with each other using cell phones are reflections of people's interactions in social lives. Discovering typed communities (e.g., family communities or corporate communities) in mobile social networks is a very promising problem. For example, it can help mobile operators to determine the target users for precision marketing. In this paper we propose discovering typed communities in mobile social networks by utilizing the labels of relationships between users. We use the user logs stored by mobile operators, including communication and user movement records, to collectively label all the relationships in a network, by employing an undirected probabilistic graphical model, i.e., conditional random fields. Then we use two methods to discover typed communities based on the results of relationship labeling: one is simply retaining or cutting relationships according to their labels, and the other is using sophisticated weighted community detection algorithms. The experimental results show that our proposed framework performs well in terms of the accuracy of typed community detection in mobile social networks.展开更多
Mobile social sensing network is one kind of emerging networks in which sensing tasks are performed by mobile users and sensing data are shared and collected by leveraging the intermittent inter-contacts among mobile ...Mobile social sensing network is one kind of emerging networks in which sensing tasks are performed by mobile users and sensing data are shared and collected by leveraging the intermittent inter-contacts among mobile users. Traditional ad hoc routing protocols are inapplicable or perform poorly for data collection or data sharing in such mobile social networks because nodes are seldom fully connected. In recent years, many routing protocols (especially social-based routing) are proposed to improve the delivery ratio in mobile social networks, but most of them do not consider the load of nodes thus may lead to unbalanced energy consumption among nodes. In this paper, we propose a simple Energy Efficient framework for Social-based Routing (EE-SR) in mobile social sensing networks to balance the load of nodes while maintaining the delivery ratio within an acceptable range by limiting the chances of forwarding in traditional social-based routing. Furthermore, we also propose an improved version of EE-SR to dynamically adjust the controlling parameter. Simulation results on real-life mobile traces demonstrate the efficiency of our proposed framework.展开更多
To cope with the explosive data demands, offloading cellular traffic through mobile social networks(MSNs) has become a promising approach to alleviate traffic load. Indeed, the repeated data transmission results in ...To cope with the explosive data demands, offloading cellular traffic through mobile social networks(MSNs) has become a promising approach to alleviate traffic load. Indeed, the repeated data transmission results in a great deal of unnecessary traffic. Existing solutions generally adopt proactive caching and achieve traffic shifting by exploiting opportunistic contacts. The key challenge to maximize the offloading utility needs leveraging the trade-off between the offloaded traffic and the users' delay requirement. Since current caching scheme rarely address this challenge, in this paper, we first quantitatively interpret the offloading revenues on the cellular operator side associated with the scale of caching users, then develop a centralized caching protocol to maximize the offloading revenues, which includes the selective algorithm of caching location based on set-cover, the cached-data dissemination strategy based on multi-path routing and the cache replacement policy based on data popularity. The experimental results on real-world mobility traces show that the proposed caching protocol outperforms existing schemes in offloading scenario.展开更多
The explosive growth of mobile data demand is becoming an increasing burden on current cellular network.To address this issue,we propose a solution of opportunistic data offloading for alleviating overloaded cellular ...The explosive growth of mobile data demand is becoming an increasing burden on current cellular network.To address this issue,we propose a solution of opportunistic data offloading for alleviating overloaded cellular traffic.The principle behind it is to select a few important users as seeds for data sharing.The three critical steps are detailed as follows.We first explore individual interests of users by the construction of user profiles,on which an interest graph is built by Gaussian graphical modeling.We then apply the extreme value theory to threshold the encounter duration of user pairs.So,a contact graph is generated to indicate the social relationships of users.Moreover,a contact-interest graph is developed on the basis of the social ties and individual interests of users.Corresponding on different graphs,three strategies are finally proposed for seed selection in an aim to maximize overloaded cellular data.We evaluate the performance of our algorithms by the trace data of real-word mobility.It demonstrates the effectiveness of the strategy of taking social relationships and individual interests into account.展开更多
This research focuses on the impact of family's human capital on social mobility in China's rural community.Empirical research is conducted based on data from surveying a typical rural community in the past 20 yr.Th...This research focuses on the impact of family's human capital on social mobility in China's rural community.Empirical research is conducted based on data from surveying a typical rural community in the past 20 yr.The study indicates that social mobility in rural area is active in the past 20 yr,and the human capital of family,represented by primary labor's education level,has played an essential role in mobility of low social class.Meanwhile,socio-economic development and the change of supply and demand in labor market dims the signaling role of degree education,but the impact of occupational training is increasingly remarkable.Therefore,the change from sole degree education to multi-leveled education including occupational education and training is a main way for China's rural families in low class to realize social mobility.展开更多
This study critically evaluates the communication strategies used in the campaign for social mobilization for the National Programme on Immunization in Nigeria. Its objective is to determine the communication factors ...This study critically evaluates the communication strategies used in the campaign for social mobilization for the National Programme on Immunization in Nigeria. Its objective is to determine the communication factors that contributed to the participation of individuals and groups in the programme at the federal, state, and local government levels. Fifty four subjects, consisting of five policy and decision makers in health, information, and education sectors, five community leaders, 15 media personnel, 15 state health officials, 20 LGA officials, 12 representatives of non-governmental organizations, five opinion leaders, seven clinic staff, six state health officials, and eight mothers were purposively selected from the federal level and two states; Imo and Kano states of Nigeria. Methodology used for data collection includes individual and group interviews and critical evaluation instruments. Findings show that the mass campaign strategy proved to be the most effective strategy for reaching both rural and urban dwellers and specific groups with immunization messages. The alliance between the health workers and community leaders, social groups, NGOs and the information education sectors, had a multiplier effect on the campaign and helped to create feelings of solidarity. The ubiquitous channels of traditional and religious leaders and youth groups helped to spread immunization messages and gain support for the programme. Women and women groups were adequately involved at the federal level and in Imo State, a Christian state in the South-East. This was not the case in Kano State, a Muslim state in the north due to sociocuitural factors. The sustainability of the programme lies in more integration, more intersectoral collaboration, more institutionalization, more quality verification, more decentralization, greater local political commitment, and a multistrategic approach to campaign planning and implementation.展开更多
With higher education entering the public’s vision,the expansion of higher education opportunities has gradually become a hot topic.The lower class is eager to achieve class mobility through this opportunity,while th...With higher education entering the public’s vision,the expansion of higher education opportunities has gradually become a hot topic.The lower class is eager to achieve class mobility through this opportunity,while the upper class firmly grasps the few high-quality places in higher education.What role will the expansion of higher education opportunities plays in the overall social stratification?This paper discusses the impact of the expansion of higher education opportunities on social stratification from the upper class and the lower class.展开更多
Vanity Fair reveals a degenerating era when different social groups are only interested in wealth, prestige and power. Giv-en this background, social mobility increases among the aristocracy, the rising bourgeoisie an...Vanity Fair reveals a degenerating era when different social groups are only interested in wealth, prestige and power. Giv-en this background, social mobility increases among the aristocracy, the rising bourgeoisie and the proletariat. In this novel, it is ob-vious that the most impressive character Becky Sharp is from the lower class and experiences the social mobility in her life. This pa-per explores the motivations of Becky Sharp's social mobility corresponding with Max Weber's three-component theory of stratifi-cation. The research methods are based on analyzing congenital factors, acquired factors and psychological factors.展开更多
Cellular networks are overloaded due to the mobile traffic surge,and mobile social networks(MSNets) can be leveraged for traffic offloading.In this paper,we study the issue of choosing seed users for maximizing the mo...Cellular networks are overloaded due to the mobile traffic surge,and mobile social networks(MSNets) can be leveraged for traffic offloading.In this paper,we study the issue of choosing seed users for maximizing the mobile traffic offloaded from cellular networks.We introduce a gossip-style social cascade(GSC) model to model the epidemic-like information diffusion process in MSNets.For static-case and mobile-case networks,we establish an equivalent view and a temporal mapping of the information diffusion process,respectively.We further prove the submodularity in the information diffusion and propose a greedy algorithm to choose the seed users for traffic offloading,yielding a sub-optimal solution to the NP-hard traffic offloading maximization(TOM) problem.Experiments are carried out to study the offloading performance,illustrating that the greedy algorithm significantly outperforms the heuristic and random algorithms,and user mobility can help further reduce cellular load.展开更多
The assay argues that the Equality-Inequality dialectics is a very complex issue,which reflects many social dilemmas.On one side are the state official commitments to secure,maintain and protect all kinds of formal eq...The assay argues that the Equality-Inequality dialectics is a very complex issue,which reflects many social dilemmas.On one side are the state official commitments to secure,maintain and protect all kinds of formal equalities.On the other side are the natural and genetic distinctions that differ between human-beings while creating and maintaining inequality.In fact,this is kind of a contradiction exists in many fields of social sciences.The essay’s author reviews some of the relevant historical events,such as social mobility,individualism and education and points out on future solutions.Among the proposed suggestions are:1)Embracing Frankl’s giving“Meaning to Life”as a leverage for increasing pleasure of life;2)Recognizing and promoting Creative Individualism as the legitimized ground for inequality;3)Increasing Social Cohesion,required for social empowerment and attaining security and happiness.展开更多
Many people believe that democracy is something that can lead everyone toward a better nation and a free and fair society. In 1954, Brown v. Board of Education fundamentally changed the education system in the United ...Many people believe that democracy is something that can lead everyone toward a better nation and a free and fair society. In 1954, Brown v. Board of Education fundamentally changed the education system in the United States and was a turning point in the evolution of U,S. democracy that made the beautiful American dream available for each individual. However, six decades later, the debate over educational inequality continues. People are still fighting for their equality and well-being. Along with dramatically influential political, economic, and social factors in the United States, educational inequality destroys the commitment of this democratic nation to offer equal opportunity, care, and social justice to younger members of the community. This paper discusses the current problem of educational inequality as it relates to racial and socioeconomic discrimination in urban schools. The aim of this study is to explore knowledge of inequality in the U.S. school system and to raise social and educational awareness to help American children to have equal chances in education and to achieve future success.展开更多
基金Phased Research Key Project of Shanghai China Vocational Education Association“Research on Digital Transformation Path of Vocational Education Driven by AIGC from the Perspective of New Quality Productivity”,Phased Research Project of Shanghai Computer Industry Association“The Reform and Exploration of Cross-border E-commerce Talent Cultivation in Vocational Colleges from the Perspective of Industry Education Integration”(Project No.sctakt202404)。
文摘This article takes the female community platform“Little Red Book”as an example to explore the optimization and innovation of mobile community e-commerce operation mode under Artificial Intelligence(AI)empowerment.Firstly,the relevant concepts were defined,and then the unique attributes of mobile community e-commerce were analyzed.As a typical representative of mobile community e-commerce,Little Red Book introduces the background and characteristics of its platform,analyzes its mobile community operation mode,and focuses on exploring how to establish a mobile community e-commerce platform and effective operation mode under the empowerment of AI technology,to provide some reference and inspiration for the development and operation of Little Red Book and other e-commerce platform enterprises.
基金National Key Basic Research Program of China (973 Program) under Grant No.2012CB315802 and No.2013CB329102.National Natural Science Foundation of China under Grant No.61171102 and No.61132001.New generation broadband wireless mobile communication network Key Projects for Science and Technology Development under Grant No.2011ZX03002-002-01,Beijing Nova Program under Grant No.2008B50 and Beijing Higher Education Young Elite Teacher Project under Grant No.YETP0478
文摘Differently from the general online social network(OSN),locationbased mobile social network(LMSN),which seamlessly integrates mobile computing and social computing technologies,has unique characteristics of temporal,spatial and social correlation.Recommending friends instantly based on current location of users in the real world has become increasingly popular in LMSN.However,the existing friend recommendation methods based on topological structures of a social network or non-topological information such as similar user profiles cannot well address the instant making friends in the real world.In this article,we analyze users' check-in behavior in a real LMSN site named Gowalla.According to this analysis,we present an approach of recommending friends instantly for LMSN users by considering the real-time physical location proximity,offline behavior similarity and friendship network information in the virtual community simultaneously.This approach effectively bridges the gap between the offline behavior of users in the real world and online friendship network information in the virtual community.Finally,we use the real user check-in dataset of Gowalla to verify the effectiveness of our approach.
基金supported by the National High Technology Research and Development Program of China under Grant No.2014AA015103Beijing Natural Science Foundation under Grant No.4152023+1 种基金the National Natural Science Foundation of China under Grant No.61473006the National Science and Technology Support Plan under Grant No.2014BAG01B02
文摘With the fast-growth of mobile social network, people' s interactions are frequently marked with location information, such as longitude and latitude of visited base station. This boom of data has led to considerable interest in research fields such as user behavior mining, trajectory discovery and social demographics. However, there is little research on community discovery in mobile social networks, and this is the problem this work tackles with. In this work, we take advantage of one simple property that people in different locations often belong to different social circles in order to discover communities in these networks. Based on this property, which we referred to as Location-lnteraction Disparity (LID), we proposed a state network and then define a quality function evaluating community detection results. We also propose a hybrid community- detection algorithm using LID tor discovering location-based communities effectively and efficiently. Experiments on synthesis networks show that this algorithm can run effectively in time and discover communities with high precision. In realworld networks, the method reveals people's different social circles in different places with high efficiency.
基金We thank the anonymous reviewers and editors for their very constructive comments.the National Social Science Foundation Project of China under Grant 16BTQ085.
文摘The issue of privacy protection for mobile social networks is a frontier topic in the field of social network applications.The existing researches on user privacy protection in mobile social network mainly focus on privacy preserving data publishing and access control.There is little research on the association of user privacy information,so it is not easy to design personalized privacy protection strategy,but also increase the complexity of user privacy settings.Therefore,this paper concentrates on the association of user privacy information taking big data analysis tools,so as to provide data support for personalized privacy protection strategy design.
基金Supported by the National Natural Science Foundation of China under Grant Nos 61501217,61363015,61501218 and 61262020the Natural Science Foundation of Jiangxi Province under Grant No 20142BAB206026
文摘Fractal and self similarity of complex networks have attracted much attention in recent years. The fractal dimension is a useful method to describe the fractal property of networks. However, the fractal features of mobile social networks (MSNs) are inadequately investigated. In this work, a box-covering method based on the ratio of excluded mass to closeness centrality is presented to investigate the fractal feature of MSNs. Using this method, we find that some MSNs are fractal at different time intervals. Our simulation results indicate that the proposed method is available for analyzing the fractal property of MSNs.
基金We thank the anonymous reviewers and editors for their very constructive comments.This work was supported by the National Social Science Foundation Project of China under Grant 16BTQ085.
文摘With the rapid development of the new generation of information technology,the analysis of mobile social network big data is getting deeper and deeper.At the same time,the risk of privacy disclosure in social network is also very obvious.In this paper,we summarize the main access control model in mobile social network,analyze their contribution and point out their disadvantages.On this basis,a practical privacy policy is defined through authorization model supporting personalized privacy preferences.Experiments have been conducted on synthetic data sets.The result shows that the proposed privacy protecting model could improve the security of the mobile social network while keeping high execution efficiency.
文摘This paper researched and analyzedweb2.0 technology and mobile social network.Then researched and implemented the mobile twitter system.This paper introduces the function and modules of mobile client and PC server respectively.We also had the user experience and system test which are wrote in this paper.
基金Supported by the National Natural Science Foundation of China(71662014 and 61602219)the Natural Science Foundation of Jiangxi Province of China(20132BAB201050)the Science and Technology Project of Jiangxi Province Educational Department(GJJ151601)
文摘The service recommendation mechanism as a key enabling technology that provides users with more proactive and personalized service is one of the important research topics in mobile social network (MSN). Meanwhile, MSN is susceptible to various types of anonymous information or hacker actions. Trust can reduce the risk of interaction with unknown entities and prevent malicious attacks. In our paper, we present a trust-based service recommendation algorithm in MSN that considers users' similarity and friends' familiarity when computing trustworthy neighbors of target users. Firstly, we use the context information and the number of co-rated items to define users' similarity. Then, motivated by the theory of six degrees of space, the friend familiarity is derived by graph-based method. Thus the proposed methods are further enhanced by considering users' context in the recommendation phase. Finally, a set of simulations are conducted to evaluate the accuracy of the algorithm. The results show that the friend familiarity and user similarity can effectively improve the recommendation performance, and the friend familiarity contributes more than the user similarity.
文摘Large-scale mobile social networks(MSNs)facilitate communications through mobile devices.The users of these networks can use mobile devices to access,share and distribute information.With the increasing number of users on social networks,the large volume of shared information and its propagation has created challenges for users.One of these challenges is whether users can trust one another.Trust can play an important role in users'decision making in social networks,so that,most people share their information based on their trust on others,or make decisions by relying on information provided by other users.However,considering the subjective and perceptive nature of the concept of trust,the mapping of trust in a computational model is one of the important issues in computing systeins of social networks.Moreover,in social networks,various communities may exist regarding the relationships between users.These connections and communities can affect trust among users and its complexity.In this paper,using user characteristics on social networks,a fuzzy clustering method is proposed and the trust between users in a cluster is computed using a computational model.Moreover,through the processes of combination,transition and aggregation of trust,the trust value is calculated between users who are not directly connected.Results show the high performance of the proposed trust inference method.
基金supported by the Fundamental Research Funds for the Central Universities of Chinathe National Natural Science Foundation of China under Grant No. 60905029the Beijing Natural Science Foundation under Grant No. 4112046
文摘Mobile social networks, which consist of mobile users who communicate with each other using cell phones are reflections of people's interactions in social lives. Discovering typed communities (e.g., family communities or corporate communities) in mobile social networks is a very promising problem. For example, it can help mobile operators to determine the target users for precision marketing. In this paper we propose discovering typed communities in mobile social networks by utilizing the labels of relationships between users. We use the user logs stored by mobile operators, including communication and user movement records, to collectively label all the relationships in a network, by employing an undirected probabilistic graphical model, i.e., conditional random fields. Then we use two methods to discover typed communities based on the results of relationship labeling: one is simply retaining or cutting relationships according to their labels, and the other is using sophisticated weighted community detection algorithms. The experimental results show that our proposed framework performs well in terms of the accuracy of typed community detection in mobile social networks.
基金supported by the National Natural Science Foundation of China (Nos. 61370192, 61432015, 61428203, and 61572347)the US National Science Foundation (Nos. CNS-1319915 and CNS-1343355)
文摘Mobile social sensing network is one kind of emerging networks in which sensing tasks are performed by mobile users and sensing data are shared and collected by leveraging the intermittent inter-contacts among mobile users. Traditional ad hoc routing protocols are inapplicable or perform poorly for data collection or data sharing in such mobile social networks because nodes are seldom fully connected. In recent years, many routing protocols (especially social-based routing) are proposed to improve the delivery ratio in mobile social networks, but most of them do not consider the load of nodes thus may lead to unbalanced energy consumption among nodes. In this paper, we propose a simple Energy Efficient framework for Social-based Routing (EE-SR) in mobile social sensing networks to balance the load of nodes while maintaining the delivery ratio within an acceptable range by limiting the chances of forwarding in traditional social-based routing. Furthermore, we also propose an improved version of EE-SR to dynamically adjust the controlling parameter. Simulation results on real-life mobile traces demonstrate the efficiency of our proposed framework.
基金supported by the National Natural Science Foundation of China (61372117)
文摘To cope with the explosive data demands, offloading cellular traffic through mobile social networks(MSNs) has become a promising approach to alleviate traffic load. Indeed, the repeated data transmission results in a great deal of unnecessary traffic. Existing solutions generally adopt proactive caching and achieve traffic shifting by exploiting opportunistic contacts. The key challenge to maximize the offloading utility needs leveraging the trade-off between the offloaded traffic and the users' delay requirement. Since current caching scheme rarely address this challenge, in this paper, we first quantitatively interpret the offloading revenues on the cellular operator side associated with the scale of caching users, then develop a centralized caching protocol to maximize the offloading revenues, which includes the selective algorithm of caching location based on set-cover, the cached-data dissemination strategy based on multi-path routing and the cache replacement policy based on data popularity. The experimental results on real-world mobility traces show that the proposed caching protocol outperforms existing schemes in offloading scenario.
基金This work was supported in part by National Natural Science Foundation of China under Grant No.61502261,61572457,61379132Key Research and Development Plan Project of Shandong Province under Grant No.2016GGX101032+1 种基金Science,Technology Plan Project for Colleges and Universities of Shandong Province under Grant No.J14LN85the Natural Science Foundation of Shandong Province under Grant No.ZR2017PF013.
文摘The explosive growth of mobile data demand is becoming an increasing burden on current cellular network.To address this issue,we propose a solution of opportunistic data offloading for alleviating overloaded cellular traffic.The principle behind it is to select a few important users as seeds for data sharing.The three critical steps are detailed as follows.We first explore individual interests of users by the construction of user profiles,on which an interest graph is built by Gaussian graphical modeling.We then apply the extreme value theory to threshold the encounter duration of user pairs.So,a contact graph is generated to indicate the social relationships of users.Moreover,a contact-interest graph is developed on the basis of the social ties and individual interests of users.Corresponding on different graphs,three strategies are finally proposed for seed selection in an aim to maximize overloaded cellular data.We evaluate the performance of our algorithms by the trace data of real-word mobility.It demonstrates the effectiveness of the strategy of taking social relationships and individual interests into account.
基金the Youth Project (2012) "Elements of Discrimination, economic the Overflow and Sustainable Growth" (71203129)the National Natural Science Foundation of China and Shanghai Education Science 2012 (B12019)
文摘This research focuses on the impact of family's human capital on social mobility in China's rural community.Empirical research is conducted based on data from surveying a typical rural community in the past 20 yr.The study indicates that social mobility in rural area is active in the past 20 yr,and the human capital of family,represented by primary labor's education level,has played an essential role in mobility of low social class.Meanwhile,socio-economic development and the change of supply and demand in labor market dims the signaling role of degree education,but the impact of occupational training is increasingly remarkable.Therefore,the change from sole degree education to multi-leveled education including occupational education and training is a main way for China's rural families in low class to realize social mobility.
文摘This study critically evaluates the communication strategies used in the campaign for social mobilization for the National Programme on Immunization in Nigeria. Its objective is to determine the communication factors that contributed to the participation of individuals and groups in the programme at the federal, state, and local government levels. Fifty four subjects, consisting of five policy and decision makers in health, information, and education sectors, five community leaders, 15 media personnel, 15 state health officials, 20 LGA officials, 12 representatives of non-governmental organizations, five opinion leaders, seven clinic staff, six state health officials, and eight mothers were purposively selected from the federal level and two states; Imo and Kano states of Nigeria. Methodology used for data collection includes individual and group interviews and critical evaluation instruments. Findings show that the mass campaign strategy proved to be the most effective strategy for reaching both rural and urban dwellers and specific groups with immunization messages. The alliance between the health workers and community leaders, social groups, NGOs and the information education sectors, had a multiplier effect on the campaign and helped to create feelings of solidarity. The ubiquitous channels of traditional and religious leaders and youth groups helped to spread immunization messages and gain support for the programme. Women and women groups were adequately involved at the federal level and in Imo State, a Christian state in the South-East. This was not the case in Kano State, a Muslim state in the north due to sociocuitural factors. The sustainability of the programme lies in more integration, more intersectoral collaboration, more institutionalization, more quality verification, more decentralization, greater local political commitment, and a multistrategic approach to campaign planning and implementation.
文摘With higher education entering the public’s vision,the expansion of higher education opportunities has gradually become a hot topic.The lower class is eager to achieve class mobility through this opportunity,while the upper class firmly grasps the few high-quality places in higher education.What role will the expansion of higher education opportunities plays in the overall social stratification?This paper discusses the impact of the expansion of higher education opportunities on social stratification from the upper class and the lower class.
文摘Vanity Fair reveals a degenerating era when different social groups are only interested in wealth, prestige and power. Giv-en this background, social mobility increases among the aristocracy, the rising bourgeoisie and the proletariat. In this novel, it is ob-vious that the most impressive character Becky Sharp is from the lower class and experiences the social mobility in her life. This pa-per explores the motivations of Becky Sharp's social mobility corresponding with Max Weber's three-component theory of stratifi-cation. The research methods are based on analyzing congenital factors, acquired factors and psychological factors.
基金supported by the National Basic Research Program of China(973 Program) through grant 2012CB316004the Doctoral Program of Higher Education(SRFDP)+1 种基金Research Grants Council Earmarked Research Grants(RGC ERG) Joint Research Scheme through Specialized Research Fund 20133402140001National Natural Science Foundation of China through grant 61379003
文摘Cellular networks are overloaded due to the mobile traffic surge,and mobile social networks(MSNets) can be leveraged for traffic offloading.In this paper,we study the issue of choosing seed users for maximizing the mobile traffic offloaded from cellular networks.We introduce a gossip-style social cascade(GSC) model to model the epidemic-like information diffusion process in MSNets.For static-case and mobile-case networks,we establish an equivalent view and a temporal mapping of the information diffusion process,respectively.We further prove the submodularity in the information diffusion and propose a greedy algorithm to choose the seed users for traffic offloading,yielding a sub-optimal solution to the NP-hard traffic offloading maximization(TOM) problem.Experiments are carried out to study the offloading performance,illustrating that the greedy algorithm significantly outperforms the heuristic and random algorithms,and user mobility can help further reduce cellular load.
文摘The assay argues that the Equality-Inequality dialectics is a very complex issue,which reflects many social dilemmas.On one side are the state official commitments to secure,maintain and protect all kinds of formal equalities.On the other side are the natural and genetic distinctions that differ between human-beings while creating and maintaining inequality.In fact,this is kind of a contradiction exists in many fields of social sciences.The essay’s author reviews some of the relevant historical events,such as social mobility,individualism and education and points out on future solutions.Among the proposed suggestions are:1)Embracing Frankl’s giving“Meaning to Life”as a leverage for increasing pleasure of life;2)Recognizing and promoting Creative Individualism as the legitimized ground for inequality;3)Increasing Social Cohesion,required for social empowerment and attaining security and happiness.
文摘Many people believe that democracy is something that can lead everyone toward a better nation and a free and fair society. In 1954, Brown v. Board of Education fundamentally changed the education system in the United States and was a turning point in the evolution of U,S. democracy that made the beautiful American dream available for each individual. However, six decades later, the debate over educational inequality continues. People are still fighting for their equality and well-being. Along with dramatically influential political, economic, and social factors in the United States, educational inequality destroys the commitment of this democratic nation to offer equal opportunity, care, and social justice to younger members of the community. This paper discusses the current problem of educational inequality as it relates to racial and socioeconomic discrimination in urban schools. The aim of this study is to explore knowledge of inequality in the U.S. school system and to raise social and educational awareness to help American children to have equal chances in education and to achieve future success.