2016
DOI: 10.1007/978-3-7091-0741-6
|View full text |Cite
|
Sign up to set email alerts
|

Network Analysis Literacy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
27
0
11

Year Published

2017
2017
2022
2022

Publication Types

Select...
3
3
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 49 publications
(38 citation statements)
references
References 0 publications
0
27
0
11
Order By: Relevance
“…Adding regular expressions that capture typos and abbreviations (method 3) further improves the hit rate to 72.4% and also increases the κ-coefficient to 79%. Given that many methods in social network analysis are quite sensitive to false-negative and false-positive edges [12,Chapter 5], the hit rate itself is not a helpful measure but it shows that least, with method 3 − 6, enough statements are actually assigned a receiver. Methods 3 to 6 show very close κ coefficients that are nearly indistinguishable; however, method 5 has a marginally higher quality.…”
Section: A Resultsmentioning
confidence: 99%
“…Adding regular expressions that capture typos and abbreviations (method 3) further improves the hit rate to 72.4% and also increases the κ-coefficient to 79%. Given that many methods in social network analysis are quite sensitive to false-negative and false-positive edges [12,Chapter 5], the hit rate itself is not a helpful measure but it shows that least, with method 3 − 6, enough statements are actually assigned a receiver. Methods 3 to 6 show very close κ coefficients that are nearly indistinguishable; however, method 5 has a marginally higher quality.…”
Section: A Resultsmentioning
confidence: 99%
“…In addition, there are data processing basics, such as the ability to read in all tables of FlyClockbase and produce a report of all inconsistencies and errors that require human attention. The arrival of big data has brought substantial experience with questions of data hygiene (G oldston 2008; H owe et al 2008; K rishnamurthy et al 2011; G itelman 2013; M c C allum 2013; S chutt and O’N eil 2013; M ahmood 2016; Z weig 2016). Most of this expertise is also essential for correctly and efficiently handling data in VBIRs.…”
Section: Discussionmentioning
confidence: 99%
“…2008; K rishnamurthy et al . 2011; G itelman 2013; M c C allum 2013; S chutt and O’N eil 2013; M ahmood 2016; Z weig 2016). Most of this expertise is also essential for correctly and efficiently handling data in VBIR s. For all features like those above and all error types detected, a solution only needs to be implemented once for simultaneously improving the reliability of all VBIR s.…”
Section: Towards a Compiler For Advancing Flyclockbase And Biologymentioning
confidence: 99%
“…Day 13 (Analysis of social networks, time activity of publishing pages, identification of harmful sources of information in networks with the use of artificial neural networks, machine learning), M. Kaya, Ö Erdogan 14 (Memes on social networks studying and clustering, similarities between texts, emerging events identifying, forecast), K.A. Zweig 15 (Network analytical activities, methods of presenting data in the form of complex networks, models of random graphs, centrality indices and their use in network analysis, the humanitarian aspect of the analysis of social networks, etc). A large number of works are currently devoted to the in-depth analysis of information from social networks, among which the monographs by M. Russell 16,17 (Information extraction from various social networks, research of application program interfaces of various networks, analysis of text files, determination of text similarity, classification, pattern recognition, neural networks in the analysis of social networks).…”
Section: Introductionmentioning
confidence: 99%