Modeling and Analysis of Intentional And Unintentional Security Vulnerabilities in a Mobile Platform Page: 55
xi, 149 pages : illustrations (chiefly color)View a full description of this dissertation.
Extracted Text
The following text was automatically extracted from the image on this page using optical character recognition software:
Number of 4.
Reply Message -.
Percentage
N ' N
Common Fuzzy Logic N Relationship
Follower -- NN
Percentage (Rule Base) Strength
Output
Mean Reply
Delay
Percentage
Validation
- - - User Feedback
- - - Input Data Output Data - - - -
MySql
Database
FIGURE 7.2. Proposed fuzzy system architecture for link (relationship) strength
Evaluation.
7.2. Context-Dependent Classification of Twitter Users
Social networks are formed by social groups of people that are linked by social bond or
relationship. In a group, one can follow another or one can be followed by the other. In the twitter
jargon, those two types of individuals are called followers and followees, respectively. Unlike
in the case of emails, the mutual relationships between individuals/groups in the twitter network
can be tracked by monitoring the tweets. Even though it is possible to compile email message and
response pairs, the sparseness of data there makes it difficult to estimate the strength of relationship
between the corresponding individuals. In the twitter (generally, SN) domain, on the other hand, it
is possible to estimate the SN link (relationship) strengths by using the followee-follower message
statistics. At a gross level, it can be said that better the mutual communication, higher the link
(relationship) strength. Further, if the link between two individuals is stronger, it is unlikely that
either of them is a twammer.55
Upcoming Pages
Here’s what’s next.
Search Inside
This dissertation can be searched. Note: Results may vary based on the legibility of text within the document.
Tools / Downloads
Get a copy of this page or view the extracted text.
Citing and Sharing
Basic information for referencing this web page. We also provide extended guidance on usage rights, references, copying or embedding.
Reference the current page of this Dissertation.
Mohamed Issadeen, Mohamed Fazeen. Modeling and Analysis of Intentional And Unintentional Security Vulnerabilities in a Mobile Platform, dissertation, December 2014; Denton, Texas. (https://digital.library.unt.edu/ark:/67531/metadc700067/m1/69/: accessed July 18, 2024), University of North Texas Libraries, UNT Digital Library, https://digital.library.unt.edu; .