Differently from the general online social network(OSN),locationbased mobile social network(LMSN),which seamlessly integrates mobile computing and social computing technologies,has unique characteristics of temporal,s...Differently from the general online social network(OSN),locationbased mobile social network(LMSN),which seamlessly integrates mobile computing and social computing technologies,has unique characteristics of temporal,spatial and social correlation.Recommending friends instantly based on current location of users in the real world has become increasingly popular in LMSN.However,the existing friend recommendation methods based on topological structures of a social network or non-topological information such as similar user profiles cannot well address the instant making friends in the real world.In this article,we analyze users' check-in behavior in a real LMSN site named Gowalla.According to this analysis,we present an approach of recommending friends instantly for LMSN users by considering the real-time physical location proximity,offline behavior similarity and friendship network information in the virtual community simultaneously.This approach effectively bridges the gap between the offline behavior of users in the real world and online friendship network information in the virtual community.Finally,we use the real user check-in dataset of Gowalla to verify the effectiveness of our approach.展开更多
Due to the increasing number of wireless mobile devices,the possibility of mobile communications without infrastructure becomes a reality.The Decentralized Mobile Social Network(DMSN) is a paradigm where nodes can mov...Due to the increasing number of wireless mobile devices,the possibility of mobile communications without infrastructure becomes a reality.The Decentralized Mobile Social Network(DMSN) is a paradigm where nodes can move freely and organize themselves arbitrarily.Routing in these environments is difficult for the reason of the rapid changes of the social relationship graph's topology.Meanwhile,the social ties among nodes change overtime.Therefore,an efficient data forwarding mechanism should be considered over the temporal weighted relationship graph.In this paper,an Advanced routing Protocol based on Parameters Optimization in the Weighted mobile social network(APPOW) is proposed to improve the delivery success ratio and reduce the cost of exchanging information.APPOW combines the normalized relative weights of three local social metrics,i.e.,LinkRank,similarity and contact strength,to select the next relay node.The weights of the three metrics are derived by pair-wise learning algorithm.The result shows that APPOW outperforms the state-ofthe-art SimBet Routing in delivering message and significantly reduces the average hops.Additionally,the delivery performance of APPOW is close to Epidemic Routing but without message duplications.展开更多
With the fast-growth of mobile social network, people' s interactions are frequently marked with location information, such as longitude and latitude of visited base station. This boom of data has led to considerable...With the fast-growth of mobile social network, people' s interactions are frequently marked with location information, such as longitude and latitude of visited base station. This boom of data has led to considerable interest in research fields such as user behavior mining, trajectory discovery and social demographics. However, there is little research on community discovery in mobile social networks, and this is the problem this work tackles with. In this work, we take advantage of one simple property that people in different locations often belong to different social circles in order to discover communities in these networks. Based on this property, which we referred to as Location-lnteraction Disparity (LID), we proposed a state network and then define a quality function evaluating community detection results. We also propose a hybrid community- detection algorithm using LID tor discovering location-based communities effectively and efficiently. Experiments on synthesis networks show that this algorithm can run effectively in time and discover communities with high precision. In realworld networks, the method reveals people's different social circles in different places with high efficiency.展开更多
The issue of privacy protection for mobile social networks is a frontier topic in the field of social network applications.The existing researches on user privacy protection in mobile social network mainly focus on pr...The issue of privacy protection for mobile social networks is a frontier topic in the field of social network applications.The existing researches on user privacy protection in mobile social network mainly focus on privacy preserving data publishing and access control.There is little research on the association of user privacy information,so it is not easy to design personalized privacy protection strategy,but also increase the complexity of user privacy settings.Therefore,this paper concentrates on the association of user privacy information taking big data analysis tools,so as to provide data support for personalized privacy protection strategy design.展开更多
Fractal and self similarity of complex networks have attracted much attention in recent years. The fractal dimension is a useful method to describe the fractal property of networks. However, the fractal features of mo...Fractal and self similarity of complex networks have attracted much attention in recent years. The fractal dimension is a useful method to describe the fractal property of networks. However, the fractal features of mobile social networks (MSNs) are inadequately investigated. In this work, a box-covering method based on the ratio of excluded mass to closeness centrality is presented to investigate the fractal feature of MSNs. Using this method, we find that some MSNs are fractal at different time intervals. Our simulation results indicate that the proposed method is available for analyzing the fractal property of MSNs.展开更多
With the rapid development of the new generation of information technology,the analysis of mobile social network big data is getting deeper and deeper.At the same time,the risk of privacy disclosure in social network ...With the rapid development of the new generation of information technology,the analysis of mobile social network big data is getting deeper and deeper.At the same time,the risk of privacy disclosure in social network is also very obvious.In this paper,we summarize the main access control model in mobile social network,analyze their contribution and point out their disadvantages.On this basis,a practical privacy policy is defined through authorization model supporting personalized privacy preferences.Experiments have been conducted on synthetic data sets.The result shows that the proposed privacy protecting model could improve the security of the mobile social network while keeping high execution efficiency.展开更多
Energy is the determinant factor for the survival of Mobile Sensor Networks(MSN).Based on the analysis of the energy distribution in this paper,a two-phase relocation algorithm is proposed based on the balance between...Energy is the determinant factor for the survival of Mobile Sensor Networks(MSN).Based on the analysis of the energy distribution in this paper,a two-phase relocation algorithm is proposed based on the balance between the energy provision and energy consumption distribution.Our main objectives are to maximize the coverage percentage and to minimize the total distance of node movements.This algorithm is designed to meet the requirement of non-uniform distribution network applications,to extend the lifetime of MSN and to simplify the design of the routing protocol.In ad-dition,test results show the feasibility of our proposed relocation algorithm.展开更多
This research is about the nuisances of social media applications on a Wi-Fi network at a university campus in Ghana. The aim was to access the security risk on the network, the speed of the network, and the data cons...This research is about the nuisances of social media applications on a Wi-Fi network at a university campus in Ghana. The aim was to access the security risk on the network, the speed of the network, and the data consumption of those platforms on the network. Network Mapper (Nmap Zenmap) Graphical User Interface 7.80 application was used to scan the various social media platforms to identify the protocols, ports, services, etc. to enable in accessing the vulnerability of the network. Data consumption of users’ mobile devices was collected and analyzed. Device Accounting (DA) based on the various social media applications was used. The results of the analysis revealed that the network is prone to attacks due to the nature of the protocols, ports, and services on social media applications. The numerous users with average monthly data consumption per user of 4 gigabytes, 300 megabytes on social media alone are a clear indication of high traffic as well as the cost of maintaining the network. A URL filtering of the social media websites was proposed on Rockus Outdoor AP to help curb the nuisance.展开更多
This paper researched and analyzedweb2.0 technology and mobile social network.Then researched and implemented the mobile twitter system.This paper introduces the function and modules of mobile client and PC server res...This paper researched and analyzedweb2.0 technology and mobile social network.Then researched and implemented the mobile twitter system.This paper introduces the function and modules of mobile client and PC server respectively.We also had the user experience and system test which are wrote in this paper.展开更多
移动社交网络(mobile social network,简称MSN)利用移动用户之间的社交关系,通过节点间的协作式转发实现消息交付.然而,随着大数据时代的到来,MSN需要满足移动用户日益增长的对内容(如视频)的需求.由于信息中心网络(information-centric...移动社交网络(mobile social network,简称MSN)利用移动用户之间的社交关系,通过节点间的协作式转发实现消息交付.然而,随着大数据时代的到来,MSN需要满足移动用户日益增长的对内容(如视频)的需求.由于信息中心网络(information-centric networking,简称ICN)对移动性的支持,基于ICN架构,提出了一种MSN中基于社区划分的路由机制.在兴趣决策中,利用节点请求中的内容名字获取用户的兴趣偏好,进而计算用户间的兴趣差异度量;根据兴趣差异将节点划分为兴趣社区,依据这些兴趣社区进行兴趣包路由.在数据决策中,根据节点历史相遇信息计算用户间的相遇规律度量,根据相遇规律将节点划分为社交社区,依据这些社交社区进行数据包路由.同时,根据兴趣社区和社交社区信息优化节点的内容缓存,以快速满足未来的内容请求.进行了仿真实验,通过与现有机制在包交付率、平均延迟、平均跳数和网络开销方面的性能对比,表明所提出的机制是可行且有效的.展开更多
The article takes China’s e-commerce as the research object.Starting from the macro level of e-commerce development and taking the rapid rise of“Pinduoduo”as an example,it discusses the“traffic dilemma”and its in...The article takes China’s e-commerce as the research object.Starting from the macro level of e-commerce development and taking the rapid rise of“Pinduoduo”as an example,it discusses the“traffic dilemma”and its influence in the traditional e-commerce platform.This discovers the internal mechanism of mobile e-commerce to solve the problem of traffic distribution mechanism by socialization.After that,this study compares the difference between traditional e-commerce and social-commerce systematically,and concludes that traditional e-commerce platform is a necessary process of the development of social-commerce.Socialization is an important trend of the development of traditional e-commerce and social-commerce will promote the realization of C2B model.展开更多
The explosive growth of mobile data demand is becoming an increasing burden on current cellular network.To address this issue,we propose a solution of opportunistic data offloading for alleviating overloaded cellular ...The explosive growth of mobile data demand is becoming an increasing burden on current cellular network.To address this issue,we propose a solution of opportunistic data offloading for alleviating overloaded cellular traffic.The principle behind it is to select a few important users as seeds for data sharing.The three critical steps are detailed as follows.We first explore individual interests of users by the construction of user profiles,on which an interest graph is built by Gaussian graphical modeling.We then apply the extreme value theory to threshold the encounter duration of user pairs.So,a contact graph is generated to indicate the social relationships of users.Moreover,a contact-interest graph is developed on the basis of the social ties and individual interests of users.Corresponding on different graphs,three strategies are finally proposed for seed selection in an aim to maximize overloaded cellular data.We evaluate the performance of our algorithms by the trace data of real-word mobility.It demonstrates the effectiveness of the strategy of taking social relationships and individual interests into account.展开更多
基金National Key Basic Research Program of China (973 Program) under Grant No.2012CB315802 and No.2013CB329102.National Natural Science Foundation of China under Grant No.61171102 and No.61132001.New generation broadband wireless mobile communication network Key Projects for Science and Technology Development under Grant No.2011ZX03002-002-01,Beijing Nova Program under Grant No.2008B50 and Beijing Higher Education Young Elite Teacher Project under Grant No.YETP0478
文摘Differently from the general online social network(OSN),locationbased mobile social network(LMSN),which seamlessly integrates mobile computing and social computing technologies,has unique characteristics of temporal,spatial and social correlation.Recommending friends instantly based on current location of users in the real world has become increasingly popular in LMSN.However,the existing friend recommendation methods based on topological structures of a social network or non-topological information such as similar user profiles cannot well address the instant making friends in the real world.In this article,we analyze users' check-in behavior in a real LMSN site named Gowalla.According to this analysis,we present an approach of recommending friends instantly for LMSN users by considering the real-time physical location proximity,offline behavior similarity and friendship network information in the virtual community simultaneously.This approach effectively bridges the gap between the offline behavior of users in the real world and online friendship network information in the virtual community.Finally,we use the real user check-in dataset of Gowalla to verify the effectiveness of our approach.
基金supported by NSFC (Grant No. 61172074, 61471028, 61371069, and 61272505)Fundamental Research Funds for the Central Universities under Grant No. 2015JBM016+1 种基金the Research Fund for the Doctoral Program of Higher Education of China under Grant No.20130009110015the financial support from China Scholarship Council
文摘Due to the increasing number of wireless mobile devices,the possibility of mobile communications without infrastructure becomes a reality.The Decentralized Mobile Social Network(DMSN) is a paradigm where nodes can move freely and organize themselves arbitrarily.Routing in these environments is difficult for the reason of the rapid changes of the social relationship graph's topology.Meanwhile,the social ties among nodes change overtime.Therefore,an efficient data forwarding mechanism should be considered over the temporal weighted relationship graph.In this paper,an Advanced routing Protocol based on Parameters Optimization in the Weighted mobile social network(APPOW) is proposed to improve the delivery success ratio and reduce the cost of exchanging information.APPOW combines the normalized relative weights of three local social metrics,i.e.,LinkRank,similarity and contact strength,to select the next relay node.The weights of the three metrics are derived by pair-wise learning algorithm.The result shows that APPOW outperforms the state-ofthe-art SimBet Routing in delivering message and significantly reduces the average hops.Additionally,the delivery performance of APPOW is close to Epidemic Routing but without message duplications.
基金supported by the National High Technology Research and Development Program of China under Grant No.2014AA015103Beijing Natural Science Foundation under Grant No.4152023+1 种基金the National Natural Science Foundation of China under Grant No.61473006the National Science and Technology Support Plan under Grant No.2014BAG01B02
文摘With the fast-growth of mobile social network, people' s interactions are frequently marked with location information, such as longitude and latitude of visited base station. This boom of data has led to considerable interest in research fields such as user behavior mining, trajectory discovery and social demographics. However, there is little research on community discovery in mobile social networks, and this is the problem this work tackles with. In this work, we take advantage of one simple property that people in different locations often belong to different social circles in order to discover communities in these networks. Based on this property, which we referred to as Location-lnteraction Disparity (LID), we proposed a state network and then define a quality function evaluating community detection results. We also propose a hybrid community- detection algorithm using LID tor discovering location-based communities effectively and efficiently. Experiments on synthesis networks show that this algorithm can run effectively in time and discover communities with high precision. In realworld networks, the method reveals people's different social circles in different places with high efficiency.
基金We thank the anonymous reviewers and editors for their very constructive comments.the National Social Science Foundation Project of China under Grant 16BTQ085.
文摘The issue of privacy protection for mobile social networks is a frontier topic in the field of social network applications.The existing researches on user privacy protection in mobile social network mainly focus on privacy preserving data publishing and access control.There is little research on the association of user privacy information,so it is not easy to design personalized privacy protection strategy,but also increase the complexity of user privacy settings.Therefore,this paper concentrates on the association of user privacy information taking big data analysis tools,so as to provide data support for personalized privacy protection strategy design.
基金Supported by the National Natural Science Foundation of China under Grant Nos 61501217,61363015,61501218 and 61262020the Natural Science Foundation of Jiangxi Province under Grant No 20142BAB206026
文摘Fractal and self similarity of complex networks have attracted much attention in recent years. The fractal dimension is a useful method to describe the fractal property of networks. However, the fractal features of mobile social networks (MSNs) are inadequately investigated. In this work, a box-covering method based on the ratio of excluded mass to closeness centrality is presented to investigate the fractal feature of MSNs. Using this method, we find that some MSNs are fractal at different time intervals. Our simulation results indicate that the proposed method is available for analyzing the fractal property of MSNs.
基金We thank the anonymous reviewers and editors for their very constructive comments.This work was supported by the National Social Science Foundation Project of China under Grant 16BTQ085.
文摘With the rapid development of the new generation of information technology,the analysis of mobile social network big data is getting deeper and deeper.At the same time,the risk of privacy disclosure in social network is also very obvious.In this paper,we summarize the main access control model in mobile social network,analyze their contribution and point out their disadvantages.On this basis,a practical privacy policy is defined through authorization model supporting personalized privacy preferences.Experiments have been conducted on synthetic data sets.The result shows that the proposed privacy protecting model could improve the security of the mobile social network while keeping high execution efficiency.
文摘Energy is the determinant factor for the survival of Mobile Sensor Networks(MSN).Based on the analysis of the energy distribution in this paper,a two-phase relocation algorithm is proposed based on the balance between the energy provision and energy consumption distribution.Our main objectives are to maximize the coverage percentage and to minimize the total distance of node movements.This algorithm is designed to meet the requirement of non-uniform distribution network applications,to extend the lifetime of MSN and to simplify the design of the routing protocol.In ad-dition,test results show the feasibility of our proposed relocation algorithm.
文摘This research is about the nuisances of social media applications on a Wi-Fi network at a university campus in Ghana. The aim was to access the security risk on the network, the speed of the network, and the data consumption of those platforms on the network. Network Mapper (Nmap Zenmap) Graphical User Interface 7.80 application was used to scan the various social media platforms to identify the protocols, ports, services, etc. to enable in accessing the vulnerability of the network. Data consumption of users’ mobile devices was collected and analyzed. Device Accounting (DA) based on the various social media applications was used. The results of the analysis revealed that the network is prone to attacks due to the nature of the protocols, ports, and services on social media applications. The numerous users with average monthly data consumption per user of 4 gigabytes, 300 megabytes on social media alone are a clear indication of high traffic as well as the cost of maintaining the network. A URL filtering of the social media websites was proposed on Rockus Outdoor AP to help curb the nuisance.
基金This work was supported by the National Natural Science Foundation of China (61273107, 61573077, 61503003), the Dalian Leading, Dalian, China, the Doctoral Foundation of Tianjin Normal University (135202XB1613), the Postdoctoral Science Foundation of China (2015M581332), and the Natural Science Foundation of Anhui Province (150808. 5QF126)
文摘This paper researched and analyzedweb2.0 technology and mobile social network.Then researched and implemented the mobile twitter system.This paper introduces the function and modules of mobile client and PC server respectively.We also had the user experience and system test which are wrote in this paper.
文摘移动社交网络(mobile social network,简称MSN)利用移动用户之间的社交关系,通过节点间的协作式转发实现消息交付.然而,随着大数据时代的到来,MSN需要满足移动用户日益增长的对内容(如视频)的需求.由于信息中心网络(information-centric networking,简称ICN)对移动性的支持,基于ICN架构,提出了一种MSN中基于社区划分的路由机制.在兴趣决策中,利用节点请求中的内容名字获取用户的兴趣偏好,进而计算用户间的兴趣差异度量;根据兴趣差异将节点划分为兴趣社区,依据这些兴趣社区进行兴趣包路由.在数据决策中,根据节点历史相遇信息计算用户间的相遇规律度量,根据相遇规律将节点划分为社交社区,依据这些社交社区进行数据包路由.同时,根据兴趣社区和社交社区信息优化节点的内容缓存,以快速满足未来的内容请求.进行了仿真实验,通过与现有机制在包交付率、平均延迟、平均跳数和网络开销方面的性能对比,表明所提出的机制是可行且有效的.
文摘The article takes China’s e-commerce as the research object.Starting from the macro level of e-commerce development and taking the rapid rise of“Pinduoduo”as an example,it discusses the“traffic dilemma”and its influence in the traditional e-commerce platform.This discovers the internal mechanism of mobile e-commerce to solve the problem of traffic distribution mechanism by socialization.After that,this study compares the difference between traditional e-commerce and social-commerce systematically,and concludes that traditional e-commerce platform is a necessary process of the development of social-commerce.Socialization is an important trend of the development of traditional e-commerce and social-commerce will promote the realization of C2B model.
基金This work was supported in part by National Natural Science Foundation of China under Grant No.61502261,61572457,61379132Key Research and Development Plan Project of Shandong Province under Grant No.2016GGX101032+1 种基金Science,Technology Plan Project for Colleges and Universities of Shandong Province under Grant No.J14LN85the Natural Science Foundation of Shandong Province under Grant No.ZR2017PF013.
文摘The explosive growth of mobile data demand is becoming an increasing burden on current cellular network.To address this issue,we propose a solution of opportunistic data offloading for alleviating overloaded cellular traffic.The principle behind it is to select a few important users as seeds for data sharing.The three critical steps are detailed as follows.We first explore individual interests of users by the construction of user profiles,on which an interest graph is built by Gaussian graphical modeling.We then apply the extreme value theory to threshold the encounter duration of user pairs.So,a contact graph is generated to indicate the social relationships of users.Moreover,a contact-interest graph is developed on the basis of the social ties and individual interests of users.Corresponding on different graphs,three strategies are finally proposed for seed selection in an aim to maximize overloaded cellular data.We evaluate the performance of our algorithms by the trace data of real-word mobility.It demonstrates the effectiveness of the strategy of taking social relationships and individual interests into account.