چاپ کردن
Projects - آزمايشگاه شبكههاي كامپيوتر coinlab
Projects
جزئیات خبر
Projects
10 09 2016 07:17
کد خبر : 10050835
تعداد بازدید : 31
Research projects of COIN are mentioned below:
- Multilayer Networks/ Heterogeneous Networks: While a considerable amount of research has been done on characteristics of single networks (such as Facebook and Twitter) for over a decade, real phenomena are seldom constrained inside a single network. Indeed, many real-world systems include multiple subsystems or layers of connectivity, and it is important to consider such "multilayer" perspective to improve our understanding of these systems. When only single networks are involved, it is well known that for all the dynamical processes (such as spreading and cascading failures) the structure of the network plays an important role on the outcomes of the process. For example, behavior spreading can stall when it enters a tightly-knit community within the network. The same is true when multilayer networks are involved, but the effect of the layer structures and their interdependence may differ from the single-network case. Therefore, a great deal of interest has been recently devoted to the study of multilayer networks. In summary, there are two types of multilayer networks: (i) Multiplex Networks in which the same set of nodes are across all layers and there are multiple types of relationships between them, (ii) Interconnected (Interdependent) Networks where the nodes are of different types and such networks involve multiple networks. Multilayer networks are also known as heterogeneous, multidimensional, multiple, multisliced, multilevel networks, and networks of networks. In the COIN lab, we are focused on different research problems such as (1) Analyzing, modeling and predicting information diffusion in multilayer networks, (2) Similarity search in heterogeneous networks, (3) Network formation and Evolution, (4) Network Visualization, and (5) Anomaly Detection.
- Social GAN-Bot: These days, presence in social networks is an inevitable part of life. Despite the many benefits, these networks provide an opportunity for users and unreliable institutions to direct users' minds toward their intended goals with a fake identity behind a machine or social bot. Large social networks seek to identify these fake users and thus block them in order to maintain the security of user space. One way to identify these users is based on their manuscripts and texts. Because textual datasets are easy to access, text is now used for identification in various fields such as Fake News Detection, Fake Review or Spam Detection using some tools ranging from classical machine Learning-based methods to recently neural network-based ones. Today, with the success of Generative Adversarial Networks (GAN) in various fields of image generation and detection, this tool is considered very popular among researchers for generation and detection of textual content, too. We also have focused on to analyze the textual content of bots and identify them using this tool.
- IoT/Blockchain: The Internet of Things (IoT) is operating in a variety of areas, and the growth of connected devices is increasing rapidly. There are significant challenges to the growth and development of the Internet of Things, mainly due to the centralized nature of its architecture, the large scale, and the limited resources of most devices in IoT networks. The disadvantages of that are, among others, the possibility of single-point failure (SPOF), multi-to-one network traffic, and lack of real-time support. Also, due to the growth of the number of devices connected to the Internet in the future, the devices are not only expected to be connected to the Internet and other local devices but are also expected to communicate with other devices on the Internet directly. The emphasis on the decentralization of its architecture can overcome some of these obstacles. Blockchain is a distributed ledger technology, and its new generation of smart contracts can be a secure solution for device communication, privacy, data security, access permissions, high accessibility in decentralized IoT architecture. Due to the limited resources of IoT devices, traditional consensus algorithms such as PoW and PoW in the blockchain were computationally expensive and involved high bandwidth overheads and latencies that were not suitable for the IoT ecosystem, which is mostly resource-constrained devices. For this reason, the PoA consensus algorithm, which has low computational power, low block generation delay, high throughput, and low power consumption, and was introduced for private blockchains, was proposed in the Internet of Things. The method of using this algorithm is to select the validator in turn (TBS) that needs to be optimized and face issues such as energy consumption, latency, low-scalability, and system reliability. To address these issues, we propose a lightweight blockchain-based for IoT systems.
- Opinion mining and sentiment analysis: The study of diverse topics such as the propagation of opinions (or its related concepts likes sentiments) about a new product over social networks, or the spreading of a virus across different species (e.g., avian flu spreading through birds and humans), requires the development of suitable spreading models that take into consideration the existence and interactions of different layers within a network. In above research domain, we are mainly focused on the roles of structural properties of a network (i.e., the topology of a multilayer network as an underlying network) in the behavior of dynamical processes over them. Other phenomena may require another approach to be considered. For example, with rapid growth of Web 2.0 technologies and social media, nowadays we have a huge volume of opinionated data recorded in digital forms such as online reviews, forum discussions, comments on blogs and social networks. In the domain of opinion mining and sentiment analysis, we are trying to process the content of a media (e.g., a tweet on Twitter) with NLP (natural language processing) methods for behavior analysis, classification, clustering and profiling. In particular, we are focused on (1) Polarity detection in user reviews on social media sites, (2) Fake review detection, and (3) Text Similarity.
- Crowdsourcing: In general, crowdsourcing can be considered as using a large number of human contributors (called workers) and their capabilities for solving the problems that neither machines nor humans can solve alone. Some of more prominent applications of crowdsourcing include media (e.g., Image) tagging, item categorization, sentiment analysis, data collection, (article) writing, survey, and transcription (from image, audio and video). In addition, there are a number of online marketplaces for crowdsourcing such as Amazon's Mechanical Turk and CrowdFlower. Our work in the area of crowdsourcing is focused on quality control and aggregation methods for the answers collected from crowd workers as one of the biggest challenges in this area.
- Gamefication: Gamification is the use of game elements and game design techniques in non-game contexts to increase target behavior and engagement. Three main areas in which gamification adds value are: (1) External contexts: gamification for company's customers (things like marketing and sales which are external to the organization). (2) Internal contexts: is about applications of gamification for people within a company for example HR, productivity enhancement and crowdsourcing. (3) Behavior change: situations where someone wants to do something but can't get over the hump like health and wellness, sustainability and personal finance. Effective Gamification is benefited by a well-designed Gamified system. So, there are different kinds of frameworks which help marketers and other professionals to step by step design a Gamified system that encourages certain behavior and stimulates engagement. We particularly focused our efforts on applying gamification frameworks on different non-game contexts.
اشتراک گذاری
https://coinlab.ut.ac.ir/article/10050835