Analysis of Coauthorship Network in Political Science using Centrality Measures
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 10
Abstract
In recent era, networks of data are growing massively and forming a shape of complex structure. Data scientists try to analyze different complex networks and utilize these networks to understand the complex structure of a network in a meaningful way. There is a need to detect and identify such a complex network in order to know how these networks provide communication means while using the complex structure. Social network analysis provides methods to explore and analyze such complex networks using graph theories, network properties and community detection algorithms. In this paper, an analysis of co-authorship network of Public Relation and Public Administration subjects of Microsoft Academic Graph (MAG) is presented, using common centrality measures. The authors belong to different research and academic institutes present all over the world. Cohesive groups of authors have been identified and ranked on the basis of centrality measures, such as betweenness, degree, page rank and closeness. Experimental results show the discovery of authors who are good in specific domain, have a strong field knowledge and maintain collaboration among their peers in the field of Public Relations and Public Administration.
Authors and Affiliations
Adeel Ahmed, Muhammad Fahad Khan, Muhammad Usman, Khalid Saleem
A Study of Retrieval Methods of Multi-Dimensional Images in Different Domains
Multiple amount of multi-dimensional images are designed and most of them are available on internet at free of cost. The 3D images include three characteristics namely width, height, and depth. The images which are creat...
Hybrid Approach for Detection of Hard Exudates
Diabetic Retinopathy is a severe and widely spread eye disease which can lead to blindness. Hence, early detection of Diabetic Retinopathy is a must. Hard Exudates are the primary sign of Diabetic Retinopathy. Early trea...
Multi-Agent System Testing: A Survey
In recent years, agent-based systems have received considerable attention in both academics and industry. The agent-oriented paradigm can be considered a natural extension to the object-oriented (OO) paradigm. Agents di...
Anomaly Detection with Machine Learning and Graph Databases in Fraud Management
In this paper, the task of fraud detection using the methods of data analysis and machine learning based on social and transaction graphs is considered. The algorithms for feature calculation, outlier detection and ident...
Detecting Distributed Denial of Service Attacks Using Data Mining Techniques
Users and organizations find it continuously challenging to deal with distributed denial of service (DDoS) attacks. . The security engineer works to keep a service available at all times by dealing with intruder attacks....