-
A Matrix Factorization Model for Hellinger-based Trust Management in Social Internet of Things
Authors:
Soroush Aalibagi,
Hamidreza Mahyar,
Ali Movaghar,
H. Eugene Stanley
Abstract:
The Social Internet of Things (SIoT), integration of the Internet of Things and Social Networks paradigms, has been introduced to build a network of smart nodes that are capable of establishing social links. In order to deal with misbehaving service provider nodes, service requestor nodes must evaluate their trustworthiness levels. In this paper, we propose a novel trust management mechanism in th…
▽ More
The Social Internet of Things (SIoT), integration of the Internet of Things and Social Networks paradigms, has been introduced to build a network of smart nodes that are capable of establishing social links. In order to deal with misbehaving service provider nodes, service requestor nodes must evaluate their trustworthiness levels. In this paper, we propose a novel trust management mechanism in the SIoT to predict the most reliable service providers for each service requestor, which leads to reduce the risk of being exposed to malicious nodes. We model the SIoT with a flexible bipartite graph (containing two sets of nodes: service providers and service requestors), then build a social network among the service requestor nodes, using the Hellinger distance. Afterward, we develop a social trust model using nodes' centrality and similarity measures to extract trust behaviors among the social network nodes. Finally, a matrix factorization technique is designed to extract latent features of SIoT nodes, find trustworthy nodes, and mitigate the data sparsity and cold start problems. We analyze the effect of parameters in the proposed trust prediction mechanism on prediction accuracy. The results indicate that feedbacks from the neighboring nodes of a specific service requestor with high Hellinger similarity in our mechanism outperforms the best existing methods. We also show that utilizing the social trust model, which only considers a similarity measure, significantly improves the accuracy of the prediction mechanism. Furthermore, we evaluate the effectiveness of the proposed trust management system through a real-world SIoT use case. Our results demonstrate that the proposed mechanism is resilient to different types of network attacks, and it can accurately find the most proper and trustworthy service provider.
△ Less
Submitted 2 March, 2021; v1 submitted 26 September, 2019;
originally announced September 2019.
-
Increasing trend of scientists to switch between topics
Authors:
An Zeng,
Zhesi Shen,
Jianlin Zhou,
Ying Fan,
Zengru Di,
Yougui Wang,
H. Eugene Stanley,
Shlomo Havlin
Abstract:
We analyze the publication records of individual scientists, aiming to quantify the topic switching dynamics of scientists and its influence. For each scientist, the relations among her publications are characterized via shared references. We find that the co-citing network of the papers of a scientist exhibits a clear community structure where each major community represents a research topic. Our…
▽ More
We analyze the publication records of individual scientists, aiming to quantify the topic switching dynamics of scientists and its influence. For each scientist, the relations among her publications are characterized via shared references. We find that the co-citing network of the papers of a scientist exhibits a clear community structure where each major community represents a research topic. Our analysis suggests that scientists tend to have a narrow distribution of the number of topics. However, researchers nowadays switch more frequently between topics than those in the early days. We also find that high switching probability in early career (<12y) is associated with low overall productivity, while it is correlated with high overall productivity in latter career. Interestingly, the average citation per paper, however, is in all career stages negatively correlated with the switching probability. We propose a model with exploitation and exploration mechanisms that can explain the main observed features.
△ Less
Submitted 10 December, 2018;
originally announced December 2018.
-
Exact results of the limited penetrable horizontal visibility graph associated to random time series and its application
Authors:
Minggang Wang,
Andre L. M. Vilela,
Rui** Du,
Longfeng Zhao,
Gaogao Dong,
Lixin Tian,
H. Eugene Stanley
Abstract:
The limited penetrable horizontal visibility algorithm is a new time analysis tool and is a further development of the horizontal visibility algorithm. We present some exact results on the topological properties of the limited penetrable horizontal visibility graph associated with random series. We show that the random series maps on a limited penetrable horizontal visibility graph with exponentia…
▽ More
The limited penetrable horizontal visibility algorithm is a new time analysis tool and is a further development of the horizontal visibility algorithm. We present some exact results on the topological properties of the limited penetrable horizontal visibility graph associated with random series. We show that the random series maps on a limited penetrable horizontal visibility graph with exponential degree distribution $P(k)\sim exp[-λ(k-2ρ-2)], λ= ln[(2ρ+3)/(2ρ+2)],ρ=0,1,2,...,k=2ρ+2,2ρ+3,...$, independent of the probability distribution from which the series was generated. We deduce the exact expressions of the mean degree and the clustering coefficient and demonstrate the long distance visibility property. Numerical simulations confirm the accuracy of our theoretical results. We then examine several deterministic chaotic series (a logistic map, the H$\acute{e}$non map, the Lorentz system, and an energy price chaotic system) and a real crude oil price series to test our results. The empirical results show that the limited penetrable horizontal visibility algorithm is direct, has a low computational cost when discriminating chaos from uncorrelated randomness, and is able to measure the global evolution characteristics of the real time series.
△ Less
Submitted 26 October, 2017;
originally announced October 2017.
-
Languages cool as they expand: Allometric scaling and the decreasing need for new words
Authors:
Alexander M. Petersen,
Joel N. Tenenbaum,
Shlomo Havlin,
H. Eugene Stanley,
Matjaz Perc
Abstract:
We analyze the occurrence frequencies of over 15 million words recorded in millions of books published during the past two centuries in seven different languages. For all languages and chronological subsets of the data we confirm that two scaling regimes characterize the word frequency distributions, with only the more common words obeying the classic Zipf law. Using corpora of unprecedented size,…
▽ More
We analyze the occurrence frequencies of over 15 million words recorded in millions of books published during the past two centuries in seven different languages. For all languages and chronological subsets of the data we confirm that two scaling regimes characterize the word frequency distributions, with only the more common words obeying the classic Zipf law. Using corpora of unprecedented size, we test the allometric scaling relation between the corpus size and the vocabulary size of growing languages to demonstrate a decreasing marginal need for new words, a feature that is likely related to the underlying correlations between words. We calculate the annual growth fluctuations of word use which has a decreasing trend as the corpus size increases, indicating a slowdown in linguistic evolution following language expansion. This "cooling pattern" forms the basis of a third statistical regularity, which unlike the Zipf and the Heaps law, is dynamical in nature.
△ Less
Submitted 11 December, 2012;
originally announced December 2012.