Science topic

Social Computing - Science topic

Explore the latest questions and answers in Social Computing, and find Social Computing experts.
Questions related to Social Computing
  • asked a question related to Social Computing
Question
3 answers
I am now carrying out research about DTV and t-learning, but I am limited to experiments with the DTBM network. I read the attached work and I saw in table 1 the presence of the return channel, but I did not see DTBM in it.
Does DTBM have a return channel? I am new on these terms. Thanks for your time.
Relevant answer
Nice Dear Felix Ivan Romero Rodríguez
  • asked a question related to Social Computing
Question
2 answers
titel my project is cross layer design for ad hoc networks
Relevant answer
A useful 2017 survey on cross layer design for ad ho networks is in the following article.
  • asked a question related to Social Computing
Question
4 answers
Hi,
I would like to investigate the possible clustering / data mining algorithms that can deployed in IOT applications. I have two general questions about IOT:
1- Are there exists clustering-based algorithms that are deployed in IOT? 
2- Where can I find useful IOT data for experiment purposes? 
Thank you
Relevant answer
Answer
Dear Abdulatif,
The massive data generated by the Internet of Things (IoT) are considered of high business value, and data mining algorithms can be applied to IoT to extract hidden information from data.
This review article, titled "Data Mining for the Internet of Things: Literature Review and Challenges" may be also useful for your work:
  • asked a question related to Social Computing
Question
4 answers
I would like to model the behaviour of social network users, who may commit various crimes while pretending to be your friend. I have looked at Bayesian networks, Fuzzy Logic, Neural networks, etc. However, there are some missing data/information that may not be gotten easily about the smart (read criminal) social network users. What would be the best AI algorithm to use in such scenario?
Thanks in advance.
Regards,
Paul. 
Relevant answer
Answer
Of course your modeling method also depends on what is feasible to compute.  You can look at related applications and how they apply the different modeling techniques.  For example:
Kolter, Jeremy Z., and Marcus A. Maloof. "Learning to detect malicious executables in the wild." Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 2004.
uses a naieve Bayes approach for detecting malicious executables.  Applied to your problem you would have to define features yourself (e.g. related to the interconnection patterns, vocabulary,...), after which you can learn the mapping of these features to what you want to detect.
I imagine that in your case it is difficult to have a good data-set to learn from (i.e. a list of criminals)
  • asked a question related to Social Computing
Question
3 answers
I am wondering if this architecture supports a possible integration with Interactive Digital TV. Suppose we allow students do their evaluation from room. Then we can implement this architecture for building t-learning using iptv protocol, usin web interfaces, as proposed or native set-top-box application.
Relevant answer
Answer
dear Flex,
please check the pdf
  • asked a question related to Social Computing
Question
8 answers
Hi,
I have some questions:
1. What is the difference between social computing and social media?
2. Web 2.0 tools are identical with social computing tools and the human element exists in the Web 2.0 and social computing, so technically what's the difference between the two concepts: web 2.0 and social computing?
3. Can we say that the three concepts web 2.0, social computing and social media, are the same if there is no difference between them?
Thank you for your help.
My greetings, Nadia
Relevant answer
Answer
Hi Nadia,
Thanks for raising this question.
From my research and experience, I would say, they are different but can be used interchangeably depending on the context.
- Web 2.0 is a technology that allows us to create platforms for interactivity - where feedback and exchange are key features.
- Social Media are the platforms created using these Web 2.0 technologies.
- Social Computing is simply the branch of computer science that focuses on analyzing the relationship between human behavior and computer systems.
Many researchers use them interchangeably, and I think that it is OK depending on the context.
i hope that this input is helpful.
Blessings, Eve
  • asked a question related to Social Computing
Question
8 answers
I would like to use away to use Amazon Mechanical Turk for my own survey application, but it seems It is not possible for those who are not resident of USA or don't have USA credit card.
I found some services such as crowdflower, crowdguru.de, smartsheet which use mturk as a ground layer and built upon it and also some other similar platforms such as Cloudcrowd or Samesource..
However, I am not quite sure which one more suits my goal, and what are the limitations for the tasks that we can put on mturk (if there is any limitation)
I really appreciate all your ideas,
Relevant answer
Answer
Hi Mona,
Co-founder of Prolific Academic here. We've developed an alternative to MTurk tailored for academic research and we are accessible worldwide. Over 200+ researchers have completed over 750+ studies on our platform so far.  
New users can run a trial study for free: https://www.prolific.ac/rr?ref=5ZFZ276D. You can find more information here: www.prolific.ac
Should you have any questions about the platform please don’t hesitate to get in touch.
Cheers,
Katia
  • asked a question related to Social Computing
Question
5 answers
Most of the works have presented metrics for code (complexity, coupling, etc) or social (bugs, issues, and so forth). Regarding to social aspects we have a variety of indicators changing from repositories, companies, etc. What indicators do you think more important to measure maintainability based on social parameters?
Relevant answer
Answer
Hi Eudisley,
a very interesting and pertinent question!
I have researched acceptance of new software, mostly at the example of projects in which I was involved myself. It turned out that the single most important factor was usefulness, as deemed by the future users (not necessarily the customers, note the difference).
This, in turn, covers three narrower cases:
1) Making it possible to complete a task within the system that previously had to be completed outside of it, mostly by "muddling through".
2) Making it considerably faster (and thus more comfortable) to complete a task.
3) Keeping stock of tasks completed or to be done within the system.
Systems not meeting these objectives (which, again, differ from "requirements" in the SE sense of the word in many cases) were not fully accepted first and then mostly let go of by users as time passed.
Hoping I could help. Maybe you could state why (for what kind of research or project) you are interested in this question, or with what method you are planning to find out your point.
All the best,
Christiane
  • asked a question related to Social Computing
Question
4 answers
I would like to compare network structures for two groups that formed on the same topic but for different reasons. I hypothesize that there will be differences in density and network centralization, but it is the case for both random and empirical networks to differ in these values anyway if they are of different sizes.
One possible solution is bootstrapping subgraphs, but I wonder if there are others that have a stronger theoretical basis for network studies?
Relevant answer
Answer
One of them is Dunbar, R. I. M. 
  • asked a question related to Social Computing
Question
10 answers
I am reviewing this area and would like some feedback from researchers working in related projects.
Relevant answer
Answer
From my perspective, working in a related field, the most important question is why you need emotion sensing systems? If the answer is because you want to improve health, then that is the challenge, not the sensing systems as systems, but the success of the health improving interventions. And then the challenge become, how one create good health interventions, how do one stop the destructive behavior and motivate the health improving behavior. Here I think social and cultural aspects, long time behavior and learning/mastery curves is important.
What cultural and social values do the system promote and reproduce?
How do one maintain the health improving behavior over time?
How do one create good and challenging learning and mastery experiences (curves) over time?
In our project RHYME we create multi-sensory Internet of Things (interactive MSE) to motivate social and aesthetic co-creation for children with severe disabilities and their families. Here we use musical improvisation (advanced musical algorithms) and sensory stimulation to motivate social co-creation (positive and equal creative behavior that promote both aesthetical experiences and musical mastery). 
  • asked a question related to Social Computing
Question
4 answers
.
Relevant answer
Answer
To be honest I can hardly imagine any connection between your research goal 'testing the trust of people' and your request for 'downloading a container, include a secret and pick a strong password'.
What do you want to evaluate?
If users put in a 'real secret' or just some random data?
How do you want to appraise if the data is a secret or not?
  • asked a question related to Social Computing
Question
1 answer
Bangladesh has new wide-spread community based health-care providers recently. Your valuable suggestions can help me developing semantic web service to facilitate mass people. Thank you.
Relevant answer
Answer
Hi Hanif,
Ontologies (and semantic technologies in general) can be applied in most domains, bringing numerous benefits compared to more mainstream "traditional" approaches. There are many ontology-based applications in the healthcare domain as well. However, you didn't tell us what exactly you would like this ontology-based system to do.
  • asked a question related to Social Computing
Question
3 answers
I am looking a supervisor from UNISA lecturers pool. In particular, those who are interested on Cloud computing, Disaster Management, Satellite Technology and GIS.
Relevant answer
Answer
Please see our paper Security of Cloud Computing Environment BY Huda Karajeh, Mahmoud Maqableh, Ra'ed (Moh'd Taisir) Masa'deh
In proceeding of: The 23rd IBIMA Conference Vision 2020: Sustainable Growth, Economic Development, and Global Competitiveness, At Valencia, Spain, Volume: pp. 2202-2215
as it might help. Yours,