e-Xploration
31.9K views | +2 today
Follow
e-Xploration
antropologiaNet, dataviz, collective intelligence, algorithms, social learning, social change, digital humanities
Curated by luiy
Your new post is loading...
Your new post is loading...
Scooped by luiy
Scoop.it!

Serendipia - Wikipedia, la enciclopedia libre

Una serendipia es un descubrimiento o un hallazgo afortunado e inesperado que se produce cuando se está buscando otra cosa distinta. También puede referirse a la habilidad de un sujeto para reconocer que ha hecho un descubrimiento importante aunque no tenga relación con lo que busca. En términos más generales se puede denominar así también a la casualidad, coincidencia o accidente.

En la historia de la ciencia son frecuentes las serendipias. Por ejemplo, Albert Einstein reconoce esta cualidad en algunos de sus hallazgos. También existen casos de serendipias en obras literarias, cuando un autor escribe sobre algo que ha imaginado y que no se conoce en su época, y se demuestra posteriormente que eso existe tal como lo definió el escritor, con los mismos detalles. No se debe confundir con la anticipación o la ciencia-ficción, donde se adelantan inventos mucho más genéricos que casi todo el mundo cree que probablemente existirán algún día.

El término serendipia deriva del inglés serendipity, neologismo acuñado por Horace Walpole en 1754 a partir de un cuento tradicional persa llamado «Los tres príncipes de Serendip», en el que los protagonistas, unos príncipes de la isla Serendip —que era el nombre árabe de la isla de Ceilán, la actual Sri Lanka—, solucionaban sus problemas a través de increíbles casualidades. Las versiones inglesas del relato provienen del libro Peregrinaggio di tre giovani figluoli del re di Serendippo publicado en Venecia en 1557 por Michele Tramezzino, según traducción de Christoforo Armeno.[1][2] El cuento se recoge en el libro de poemas de 1302 Hasht Bihist ("Ocho paraísos") de Amir Kushrau.[2]

more...
No comment yet.
Rescooped by luiy from Politique des algorithmes
Scoop.it!

Penalités algorithmiques ou manuelles (Google) ? > Blog AxeNet

Penalités algorithmiques ou manuelles (Google) ? > Blog AxeNet | e-Xploration | Scoop.it
Comment mieux distinguer les pénalités de Google réalisées par l'algo ou un humain.

Via Dominique Cardon
luiy's insight:
Les pénalités manuelles.

C’est la charmante équipe de Matt Cutts qui vous les inflige. Un véritable humain de chair et d’os est passé par là et a jugé que votre site avait des pratiques contraires aux guidelines de Google.

Dans les cas de pénalité manuelle, vous êtes alerté par un message sur votre compte Google webmaster Tools (au passage, Olivier Duffez à fait un bon récap de tous les messages possibles que l’on pouvait recevoir sur GWT). Il est donc indispensable d’avoir un compte Google pour être prévenu.

Pour ma part, les seules pénalités que j’ai pu voir étaient afférentes à une suspicion de liens artificiels ou « non naturels ».

 

Les pénalités algorithmiques.

Les pénalités d’algo les plus connues sont les filtres Panda et Pingouin.
La spécificité de ces filtres est qu’ils s’appliquent globalement à tous les sites concernés par les modifications d’algo ( avec parfois quelques dommages collatéraux). Ils ne font jamais l’objet d’une alerte ou message personnel dans Webmaster Tools !


La confirmation de Matt Cutts:

Une fois le site corrigé (à condition d’avoir trouvé pourquoi il était pénalisé), il faudra attendre le prochain update du filtre pour voir si votre action a fonctionné.

On note qu’un porte-parole de Google a annoncé que pour Panda, le filtre serait à priori maintenant mis à jour en continu, ce qui devrait permettre de sortir du trou plus rapidement pour ceux qui ont été pénalisés. Notons aussi qu’il n’y a pas que Panda et Pingouin dans la vie, les pénalités existaient bien avant.

À retenirAucune information ne vous est transmise dans webmasters Tools dans le cas d’une pénalité algorithmique.
more...
No comment yet.
Rescooped by luiy from Nodes and edges
Scoop.it!

Research Images | Nicholas Christakis, MD, PhD – HUMAN NATURE LAB at Harvard University


Via Lamia Ben
luiy's insight:

This graph shows the largest connected subcomponent involving 2,200 individuals in 2000 from the Framingham Heart Study Social Network. Each node represents one person. Nodes with blue borders are men and those with red borders are women. The size of each node is proportional to the person’s body-mass index. The interior color of the circles indicates the person’s obesity status: yellow denotes an obese person (body-mass index, ≥30) and green denotes a non-obese person. The colors of the ties between the nodes indicate the relationship between them: purple denotes a friendship or marital tie and orange denotes a familial tie (e.g., siblings).


Clusters of obese and non-obese individuals are visible in the network, as confirmed by mathematical models discussed in the paper. These clusters are not only due to individuals of similar body size preferentially forming ties, but also due to influence, whereby one person’s body size affects that of another. For more details, see: N.A. Christakis and J.H. Fowler, “The Spread of Obesity in a Large Social Network Over 32 Years,” New England Journal of Medicine 2007; 35: 370-379. [download hi-res]

more...
Lamia Ben's curator insight, April 28, 2013 4:16 AM

A great collection of Social Network Analysis Studies from Human Nature Lab at Harvard

Scooped by luiy
Scoop.it!

Call for interest - an OER for training teacher trainers | eLearning

Call for interest - an OER for training teacher trainers | eLearning | e-Xploration | Scoop.it
luiy's insight:

The International Council for Open and Distance Education (ICDE) invites expressions of interest for producing courseware in the form of an open educational resource for training teacher trainers in high quality open, distance and online learning. The target group for this call is an institution or consortium of actors/ institutions and the initial focus of the project is Africa.

Open, distance and online learning is rapidly expanding in universities and colleges in Africa and Asia, but faculty training has not caught up with the speed of development. According to the African Union Commission, the number of new teachers required in Africa by the year 2015 is estimated to be 3.6 million.

 

Online training using OERs will facilitate mass training of teacher trainers, which again will facilitate trained teachers in filling the huge gap in demand for educators in Africa. By using OERs, courseware can be adapted to different cultures and languages.

 

The OER/ courseware to receive an ICDE grant should focus on the needs of teacher trainers to deliver high quality faculty training in open and distance/ online learning. The first regional area of priority should be Africa. A regional focus on Asia will be considered when the project has delivered. 

 

The expressions of interest must be submitted to the ICDE Secretariat, icde@icde.org byFriday 31 May 2013. ICDE will invite a smaller selection of applicants to deliver a bid in the form of a project proposal. One successful bidder will be invited to enter into a contract with ICDE.  The value of the grant is USD 8,500.

more...
No comment yet.
Rescooped by luiy from OSINT News
Scoop.it!

GIS and Agent-Based Modelling: Social Media and the Emergence of Open-Source Geospatial Intelligence

GIS and Agent-Based Modelling: Social Media and the Emergence of Open-Source Geospatial Intelligence | e-Xploration | Scoop.it

Via Paulo Félix
luiy's insight:

We have just finished a paper entitled 'Social Media and the Emergence of Open-Source Geospatial Intelligence' for Socio-Cultural Dynamics and Global Security. For those interested below is the abstract: The emergence of social media has provided the public with an effective and irrepressible real-time mechanism to broadcast information. The great popularity of platforms such as twitter and YouTube, and the substantial amount of content that is communicated through them are making social media an essential component of open-source intelligence. The information communicated through such feeds conveys the interests and opinions of individuals, and reveals links and the complex structure of social networks. However, this information is only partially exploited if one does not consider its geographical aspect. Indeed, social media feeds more often than not have some sort of geographic content, as they may communicate the location from where a particular report is contributed, the geolocation of an image, or they may refer to a specific sociocultural hotspot. By harvesting this geographic content from social media feeds we can transfer the extracted knowledge from the amorphous cyberspace to the geographic space, and gain a unique understanding of the human lansdscape, its structure and organization, and its evolution over time. This new-found opportunity signals the emergence of open-source geospatial intelligence, whereby social media contributions can be analyzed and mined to gain unparalleled situational awareness. In this paper we showcase a number of sample applications that highlight the capabilities of harvesting geospatial intelligence from social media feeds, focusing particularly on twitter as a representative data source.

more...
No comment yet.
Rescooped by luiy from The Rise of the Algorithmic Medium
Scoop.it!

Index-Based Subgraph Matching Algorithm (ISMA): Fast Subgraph Enumeration in Large Networks Using Optimized Search Trees

Index-Based Subgraph Matching Algorithm (ISMA): Fast Subgraph Enumeration in Large Networks Using Optimized Search Trees | e-Xploration | Scoop.it
PLOS ONE: an inclusive, peer-reviewed, open-access resource from the PUBLIC LIBRARY OF SCIENCE. Reports of well-performed scientific studies from all disciplines freely available to the whole world.

Via Pierre Levy
luiy's insight:

Subgraph matching algorithms are designed to find all instances of predefined subgraphs in a large graph or network and play an important role in the discovery and analysis of so-called network motifs, subgraph patterns which occur more often than expected by chance. We present the index-based subgraph matching algorithm (ISMA), a novel tree-based algorithm. ISMA realizes a speedup compared to existing algorithms by carefully selecting the order in which the nodes of a query subgraph are investigated. In order to achieve this, we developed a number of data structures and maximally exploited symmetry characteristics of the subgraph. We compared ISMA to a naive recursive tree-based algorithm and to a number of well-known subgraph matching algorithms. Our algorithm outperforms the other algorithms, especially on large networks and with large query subgraphs. An implementation of ISMA in Java is freely available at http://sourceforge.net/projects/isma/.

more...
Pierre Levy's curator insight, April 22, 2013 1:53 PM

Subgraph matching algorithms are designed to find all instances of predefined subgraphs in a large graph or network and play an important role in the discovery and analysis of so-called network motifs, subgraph patterns which occur more often than expected by chance

Rescooped by luiy from The New Global Open Public Sphere
Scoop.it!

La Sociedad de la Ignorancia y otros ensayos.


Via A Petapouca, Pierre Levy
more...
betogomez's curator insight, June 12, 2013 4:54 AM

La Sociedad de la Ignorancia y otros ensayos. #Ebook 

Rescooped by luiy from Philosophy everywhere everywhen
Scoop.it!

Wildcat: The otherness of the other is none other than me or you

Wildcat: The otherness of the other is none other than me or you | e-Xploration | Scoop.it

The point is this: The otherness of an ‘other’ is none other than you. Allow me a moment to explain, for it is no simple matter, to realize that otherness is fundamentally a complex trait-building, pattern making characteristic of our minds.


Via Wildcat2030
luiy's insight:

And as emergent semantic networks our minds define and redefine continuously in a hyper complex dynamic process that which we consider as meaningful. In the case we are talking about here the ‘meaningfulness’ resides with the concept of the ‘other’. In the conceptual scaffolding I am proposing to you here, the very term ‘other’ transforms to become an extension of that which is ‘me’, but even that transformation is only the first step into a greater motion still. The motion I refer to is the one in which the ‘other’ is not only an extension but forms a nucleic reality within your own self-description. In this case the nucleic form or image that the ‘other’ has become is no longer disassociated from the powers at play within your own mind but constitutes ipso-facto a strength of activity, dynamically interacting with the overall process of your own self description.

more...
Wildcat2030's curator insight, April 26, 2013 7:59 AM

My latest entry in the Ultrashorts Project

Rescooped by luiy from Humanidades digitales
Scoop.it!

The Future of the Past Is Now: Digital Humanities Resource Guide

The Future of the Past Is Now: Digital Humanities Resource Guide | e-Xploration | Scoop.it
Inspired by the work of colleagues @ the new Digital Public Library of America and others we've interviewed here at The Junto, here are some bookmark-worthy links to what's going on in the ever-evo...

Via Leoncio Lopez-Ocon
luiy's insight:

Inspired by the work of colleagues @ the new Digital Public Library of America and others we’ve interviewed here at The Junto, here are some bookmark-worthy links to what’s going on in the ever-evolving field of the digital humanities. We’ll update this list as projects develop, so if you’re working on a digital history initiative, please let us know so we can add it to the Resources page.

 

If you use new media in the classroom, how effective do you find it to be in communicating historical content/class themes? Please share your views on digital pedagogy in the comments.

more...
No comment yet.
Rescooped by luiy from OSINT News
Scoop.it!

Brazen Crimeware Marketing Branches Out to Social Networks

Brazen Crimeware Marketing Branches Out to Social Networks | e-Xploration | Scoop.it
The secrecy of underground forums where financial malware and crimeware kits are traded is well guarded, to the point that few are able to penetrate them without some kind of internal sponsor. Here...

Via Paulo Félix
luiy's insight:

Kessem said the Facebook page was updated frequently with information about botnets, exploits and their version of Zeus.

“Beyond having compiled a working Zeus Trojan kit, the developer customized an attractive control panel for the admin (basic and familiar in functionality, and taken from previous Zeus versions), the developer and his team created a demo website for potential buyers—which they have no qualms about sharing publicly,” Kessem said.

 

While this particular criminal is an outlier, the use of social networks to market crimeware speaks to the commodity nature some of the malware used for fraud. Zeus source code was leaked online in 2011, and since then many variants have popped up, each with varying degrees of functionality. While high-end underground forums are out of reach for many, others such as this developer, might be trying to expand their reach with his own version of the banking malware and taking advantage of a market shift where some of the more professional malware dealers have been laying low. Some, such as the keepers of the Citadel Trojan, have sworn off commercially selling their kit and will trade only with current and trusted customers.

 

“Underground forums are fairly well protected; these folks want to keep a low profile,” said George Tubin, senior security researcher at Trusteer. “But, you can imagine that maybe some want to branch out a little and get into a new market and attract folks who are not part of this secret underground as a way to reach out. Maybe they want to reach out to a new group of folks with no access to forums or don’t know how to get to them.”

In fact, commercial versions of Zeus, SpyEye and Ice IX aren’t for sale either, another trend leading toward crimeware kits and service offerings available online.

 

“This case shows that the code leak, leading to the availability of the Trojan, makes for an even more diverse crimeware market, one that gives room to new offerings, especially at a time when all the major developers are staying away from the commercial arena,” Kessem said. “Marketing cybercrime in such an open and accessible manner is not something common.”

more...
No comment yet.
Rescooped by luiy from The future of medicine and health
Scoop.it!

Open Your Mind to the New Psychedelic Science | Wired Science | Wired.com

Open Your Mind to the New Psychedelic Science | Wired Science | Wired.com | e-Xploration | Scoop.it
In recent years, a small cadre of scientists has cautiously rekindled the scientific study of psychedelics.

-

“Now that we’ve been able to start getting some evidence on the benefits, it changes people’s calculus,” said Rick Doblin, the founder and executive director of the Multidisciplinary Association for Psychedelic Studies (MAPS), one of the meeting’s sponsors.

Doblin and MAPS have been battling regulators since the mid-80s to allow research and clinical trials with psychedelics. The recent revival of psychedelic science may be one sign their efforts are finally paying off.

Public attitudes towards illegal drugs in general may be shifting. A recent Pew Research Center survey, for example, found for the first time that more than half of Americans think marijuana should be legal. Baby boomers in particular, who may have hidden their stash while raising kids, seem to be loosening up in their old age, the survey found.

The interest in psychedelics may also have something to do with a growing sense of frustration over the lack of promising new psychiatric drugs in the pipeline. Many of the current drugs are based on compounds discovered serendipitously in the 1950s, and true innovation has been so hard to come by that many companies are giving up.

Meanwhile, people have been using hallucinogens for centuries, often in religious healing ceremonies, and yes, sometimes just for the hell of it. But just because they’re party drugs for some doesn’t mean they can’t be the subject of serious scientific inquiry. Or does it? After all, it didn’t end so well the first time around.


Via Wildcat2030
luiy's insight:

“This opens a door to the scientific study of mystical experiences,” Griffiths said. In future work, he hopes to investigate how the psilocybin experience may differ in people with different personality types, religious backgrounds, and genetics.

 

Clearly, drugs like psilocybin have powerful effects on the mind, but the rationale for using them in psychiatry requires a fair amount of hand waving. The same could be said of virtually all psychiatric treatments already on the market, however: Nobody really knows how they work.

The classic psychedelics, including psilocybin and LSD, stimulate receptors for serotonin, a neurotransmitter that’s also targeted, albeit in different ways, by approved antidepressant and anti-anxiety drugs like Prozac and Zoloft.

 

Several scientists at the conference pointed to findings that activity in the brain’s default mode network is elevated in people with depression. Because psilocybin and ayahuasca seem to dampen activity in this network, perhaps they could help.

 

It’s hard to connect those dots without a strong dose of speculation, but one idea is that the elevated activity in the default mode network reflects too much attention directed inward. People in the grips of depression, the thinking goes, are trapped in an endless cycle of critical self-examination, and a little neural desynchronization might help them reboot.

 

Araújo presented promising preliminary findings on using ayahausca to reduce symptoms of depression, and he’s recently gotten approval for a larger clinical trial in Brazil. The British group has approval to begin a trial with psilocybin.

more...
No comment yet.
Scooped by luiy
Scoop.it!

Colloque #dhiha5. Conditions de recherche et Digital Humanities : quelles perspectives pour les jeunes chercheurs ? – Appel à contributions

luiy's insight:

Les 10 et 11 juin prochains, l’Institut historique allemand à Paris organisera avec L.I.S.A. – das Wissenschaftsportal der Gerda Henkel Stiftung et avec l’aide du Centre pour l’édition électronique ouverte(Cléo) la cinquième édition de son colloque annuel sur les Digital Humanities. La rencontre entre chercheurs européens sera consacrée cette année aux renouvellement des conditions de la recherche. Après une introduction du colloque par Christian Jacob, quatre tables-rondes seront consacrées a la culture numérique, la formation des chercheurs, l’évaluation de la recherche et les modes de financement :

-       Formes numériques de notre culture scientifique : ce que changent les Digital Humanities (avec Edward Vanhoutte, Dominique Boullier et Arianna Ciula)

-       Questions de formation : quelles nouvelles compétences sont nécessaires ? (avec Malte Rehbein et Jean-Michel Salaün)

-       Assurer la qualité et évaluer la recherche (avec Milena Žic-Fuchs et Denise Pumain)

-       Carrières, financements et reconnaissance académique (avec Claudine Moulin et Pascal Arnaud)

Les organisateurs proposent à l’ensemble de la communauté scientifique de participer collectivement et publiquement à la préparation du colloque en produisant des contributions sur chacun de ces sujets : les contributions peuvent prendre la forme de textes collectifs rédigés sur des pad ou des wikis, de billets de blogs ou de carnets de recherche, de sélections de ressources valorisées au sein de groupes Zotero, Diigo, de pages Scoop it ou Storify, des médias audio-visuelles, des dessins, podcasts, films etc. Tous les moyens du web peuvent être mobilisés pour élaborer une discussion collective. La seule condition pour contribuer est de produire une ressource publique, marquée par le tag “#dhiha5” et signalée en commentaire sur le blog du colloque : http://dhiha.hypotheses.org/. Il est aussi possible d’envoyer sa contribution aux organisateurs (contacts ci-dessous) pour en demander la publication directement sur ce même blog.

L’ensemble des contributions sera synthétisée et restitués in situ au cours de chacune des tables-rondes par un groupe de chercheurs franco-allemand. On demandera aux autres intervenants de réagir aux contributions. Les contributions amendées et discutées formeront la base d’un manifeste qui sera rédigé collectivement en fin de colloque.

A vos claviers ! Et que la conversation scientifique commence dès maintenant.

Mareike König (mkoenig [at] dhi-paris.fr)

Pierre Mounier (pierre.mounier[at] ehess.fr)

Georgios Chatzoudis (chatzoudis[at]gerda-henkel-stiftung.de)

more...
No comment yet.
Rescooped by luiy from Social Foraging
Scoop.it!

Computer scientists start second project to improve access to NHS patient database

Computer scientists start second project to improve access to NHS patient database | e-Xploration | Scoop.it

Two Sussex academics have begun work on developing a system for assessing the quality of patient information held in a new NHS database.

 

Dr Rosemary Tate, a medical statistician and computer scientist in Informatics, and Dr Natalia Beloff, Senior Lecturer in Software Engineering, worked with Brighton-based company Dataline Software to develop a system, called TRIALVIZ, that allows users to extract real-time information from the database and to search based on a specified set of criteria. Prior to this, extracting such information was time-consuming and required considerable expertise.
 
The current application of this tool will help in the development of new medicines, by enabling users to select suitable patients for a clinical trial. But the flexible design means that many other healthcare applications are possible.
 
Now, in a second project, Dr Tate has been awarded a one-year Senior Research Fellowship to develop a mechanism for assessing – and improving – the quality of the data held within the CPRD.
 
Working with Dr Beloff, Dr Tate will develop a protocol and framework for measuring data quality, and will also create a software component for extracting data-quality statistics and constructing practice-based quality scores.

 


Via Ashish Umre
more...
No comment yet.
Rescooped by luiy from Online Relations & Community management
Scoop.it!

Corée du Sud : Une nation connectée

Corée du Sud : Une nation connectée | e-Xploration | Scoop.it
    Quelques statistiques sur internet en Corée du Sud La Corée du Sud est une des nations les plus présentes sur internet avec 82% de sa population qui est en ligne. En moyenne les coréens ac...

Via eRelations
luiy's insight:
L’avenir digital de la Corée du Sud

Selon toute vraisemblance, l’avenir digital de la Corée se jouera sur les téléphones et autres appareils mobiles. L’Asie-Pacifique détient plus de 50% des utilisateurs mondiaux de la téléphonie mobile et la Corée du Sud est à l’avant-scène de ce changement vers l’accès à internet sur les appareils intelligents. Ces derniers temps on assiste en Corée à une augmentation phénoménale et très rapide du marché des téléphones mobiles avec des marques maison comme LG, Samsung, etc., et des services personnalisables qui permettent l’accès en tout temps, de partout et à peu de frais à l’internet.

 

Le Canada devrait analyser l’évolution numérique incroyable qui a lieu en Corée et appliquer certains principes comme une implication concrète du gouvernement dans l’innovation digitale afin de mousser davantagel’innovation et la créativité technologique des entreprises d’ici. 

more...
No comment yet.
Scooped by luiy
Scoop.it!

Avatars and Theory

Avatars and Theory | e-Xploration | Scoop.it
Guest post by Alan Sondheim. I started working with avatars in text-based applications such as newsgroups, email lists, MOOs, LPMUDs, and IRC.
luiy's insight:

I started working with avatars in text-based applications such as newsgroups, email lists, MOOs, LPMUDs, and IRC. Below is a list of what I perceived as their common characters – and the relationship of those characteristics to everyday, i.e. non-CMC, life. Current notes are in brackets.

JENNIFER, JULU, NIKUKO, ALAN

1 system resonances – what entrances and exits available – sendmail for example (from telnet 25 to configuration files), doctor for another [at this point text-based avatars were attached to applications that were not avatar-based. on the other hand the Eliza program in emacs allowed for the development of personality and dialog, and might be one of the first online avatar environments.]

 

2 explorations of self and fragmentations – discomforts, tremblings as totality is problematized [this tends towards issues of abjection, wounding, frisson, arousal, and death within the virtual - which might cynically be seen as nothing more than a rearrangement of digital bits.]

 

3 psychotic emanations – selves generating worlds, inability to return or manipulate one in relation to another [the worlds such as IRC were widely disparate and appeared autonomous; to carry Jennifer from one to another required reassertions. the same is true today, but mixed-reality work tends to blur all of this - in other wor(l)ds the environments exist in potential wells that allow tunneling.]

 

4 perturbations within systems – IRC or alt.jen-coolest for examples [it was, and still is, possible to perturb systems, to work at the edges of the game space, to hack and infiltrate - annihilating a performance platform at the end of a performance in Second Life, or having human performs work at the edges of a mocap space are two examples.]

 

5 theoretical turns – Jennifer’s ‘panties on the ground’ – desire in relation to metaphysical system building [sexual-theoretical turns, as both male and female avatars operated within fetishization and abjection, two trends that have become commonplace in virtual sexuality. what happens when an avatar is 'in tatters,' falling apart, collapsing?]

 

6 problematics of author and authoring – ‘deaths of authors’ [like the uncanny between real and virtual worlds, there is an uncanny between avatar creator/controller/human performer and avatar; through an analysis of projection and introjection, avatar and (presumably) human become inextricably entangled.]

 

7 multiculturalisms (Nikuko), sexualities (Julu), Alan and the rhetoric of innocence [multiculturalisms extend to virtual cultures and their ethnographies, but what occurs in the virtual doesn't stay in the virtual.]

more...
No comment yet.
Rescooped by luiy from Ma santé et le digital francophone
Scoop.it!

Facebook comme outil d’identification des tendances en matière d’obésité

Facebook comme outil d’identification des tendances en matière d’obésité | e-Xploration | Scoop.it
Si Twitter permet d’identifier les formes de propagation de certaines pathologies, Facebook est quant à lui un espace et un outil qualifié pour identifier les tendances de développement de l’obésité.

Via Emmanuel Capitaine
luiy's insight:

Si Twitter permet d’identifier les formes de propagation de certaines pathologies, Facebook est quant à lui un espace et un outil qualifié pour identifier les tendances de développement de l’obésité. C’est le résultat auquel sont arrivés des chercheurs du Boston Children’s Hospital, en effectuant des analyses sur un volume conséquent de statuts et d’activités d’utilisateurs du réseau sociaul Facebook.

 

Les chercheurs ont en effet découvert l’existence d’une corrélation entre les publications des utilisateurs déclarant des activités sportives ou encore les Like de produits de sports, de bien-être, etc et le taux d’obésité dans une population définie. Ainsi, plus le taux de personnes publiant des statuts d’activités sportives est élevé, plus le taux d’obésité dans la région concernée est faible. Et plus le taux de personnes publiant des statuts liés à des shows TV ou des activités domestiques/sédentaires est élevé, plus le taux d’obésité dans cette région est important.

more...
No comment yet.
Scooped by luiy
Scoop.it!

Design & Social Context. Structural Visualisation

Design & Social Context. Structural Visualisation | e-Xploration | Scoop.it
luiy's insight:

This data visualisation was undertaken in order to better understand the structure and composition of the Higher Education (HE) segment of the College of Design and Social Context (DSC) at RMIT University.


One of RMIT's three colleges, DSC has a total HE EFTSL of around 11000, and a headcount over 14000 students. DSC's largest school by HE EFTSL is Media and Communications. Across all schools, undergraduate enrolments account for the greatest share of student load, and RTS/CGS (government subsidised) places the greatest proportion of fund sources. 210 programs are offered across the eight schools of DSC. Over 2000 courses sit across these programs (not illustrated). The centre captures articulation pathways between programs.

 

Coloured lines illustrate pathways within schools. Line width indicates the enrolment volume of the source program in each articulation pair. Grey lines capture existing and potential articulations across schools. Here, transparency indicates the EFTSL size of the source program. The chart captures a total of approximately 4700 articulation pathways. Note that individual program codes have been scrambled for the purposes of this public release.

 

Visualisation created using Processing 1.5.1, XlsReader 0.1.1.

Processing source: core, functions. Download rmit_dsc.zip for core.pde, functions.pde and the DSC_Radial.xls file required to run the visualisation from within Processing (note that program codes within the xls file have been altered prior to this public release).


more...
No comment yet.
Rescooped by luiy from Open Knowledge
Scoop.it!

Reams of raw data are the tools of transparency

Reams of raw data are the tools of transparency | e-Xploration | Scoop.it

“Data” has become a buzzword in journalism in recent years, as technological advances have allowed for increased analysis, interpretation and presentation of the swathes of information now at our fingertips.

Data has always been part of the journalistic tool kit. But the volume and accessibility of data, combined with technological advances that help collect, analyse and clean data – as well as visualisation software, such as interactive maps – mean journalists, bloggers, web designers, statisticians and programmers are now able to analyse, contextualise and present data in new ways.


Via Irina Radchenko
luiy's insight:

Data journalism is increasingly part of the tool kit of ‘The Irish Times’. The Crime Statistics Ireland series last year saw us analyse recorded crime statistics for every Garda station in the country, using traditional journalism skills to give depth to the trends shown by the figures. What might otherwise have been just figures on a spreadsheet was brought to life by interactive tables that allowed irishtimes.com users to look at crime statistics from their local station.

 

Similarly, when the Government shut Garda stations earlier this year we were able to map the closures online, to help people visualise where the closures were taking place.

 

Data journalism also goes on behind the scenes; increasingly, stories that end up as words on a newspaper page begin their journey through the newsroom as numbers on a spreadsheet. It’s the job of our relatively new but growing team of data journalists to find the stories in the figures.

more...
No comment yet.
Rescooped by luiy from Conciencia Colectiva
Scoop.it!

Así es LiFi, la tecnología que ofrece 500 Mb por segundo y que jubilará al WiFi

Así es LiFi, la tecnología que ofrece 500 Mb por segundo y que jubilará al WiFi | e-Xploration | Scoop.it

Quédense con este nombre: LiFi, acrónimo de Light Fidelity. El heredero natural de la tecnología WiFi promete dar mucho que hablar en los próximos años.


Via mezcal, Abel Revoredo
more...
Juanjo Pina's curator insight, April 26, 2013 3:13 AM

No sé yo... funciona... ¿cuando la luz está encendida? ¿?

Rescooped by luiy from Google Apps Script
Scoop.it!

Neo4j Blog: Gmail Email analysis with Neo4j - and spreadsheets

Neo4j Blog: Gmail Email analysis with Neo4j - and spreadsheets | e-Xploration | Scoop.it

"In this blog post, we’ll take a look at how we can actually use Romain’s [Gmail Meter] output, and generate a neo4j database that will allow us to visually and graph-ically explore the email traffic in our gmail inboxes - without doing doing any coding of course"


Via Martin Hawksey
luiy's insight:

A bunch of different graphistas have pointed out to me in recent months that there is something funny about Graphs and email. Specifically, about graphs and email analysis. From my work in previous years at security companies, I know that Email Forensics is actually big business. Figuring out who emails whom, about what topics, with what frequency, at what times - is important. Especially when the proverbial sh*t hits the fan and fraud comes to light - like in the Enron case. How do I get insight into email traffic? How do I know what was communicated to who? And how do I get that insight, without spending a true fortune?

So a couple of days ago I came across an article or two that features Gmail Meter. This is of course not one of these powerful enterprise-ready forensics tools, but it is interesting. Written by Romain Vialard, it provides you with a really straightforward way to get all kinds of stats and data about your use of Gmail. It does so using a Google Apps Script, that is available to anyone using Google Docs’ spreadsheet functionality. In this blog post, we’ll take a look at how we can actually use Romain’s output, and generate a neo4j database that will allow us to visually and graph-ically explore the email traffic in our gmail inboxes - without doing doing any coding of course. Because I don’t know how to do that - but I do do spreadsheets, as you know by now.
more...
No comment yet.
Rescooped by luiy from Social Network Analysis #sna
Scoop.it!

Social network analysis for journalists using the Twitter API | School of Data - Evidence is Power

Social network analysis for journalists using the Twitter API | School of Data - Evidence is Power | e-Xploration | Scoop.it
Evidence is Power

Via ukituki
luiy's insight:

Social Network analysis allows us to identify players in a social network and how they are related to each other. For example: I want to identify people who are involved in a certain topic - either to interview or to understand what different groups are engaging in debate.

 

What you’ll Need:

Gephi (http://gephi.org)OpenRefine (http://openrefine.org)The Sample SpreadsheetAnother sample DatasetBonus: The twitter search to graph tool

 

Step 1: Basic Social Networks

Throughout this exercise we will use Gephi for graph analysis and visualization. Let’s start by getting a small graph into gephi.

 

Take a look at the sample spreadsheet - this is data from a fictional case you are investigating.

In your country the minister of health (Mark Illinger) recently bought 500,000 respiration masks from a company (Clearsky-Health) during a flu-scare that turned out non substantial. The masks were never used and rot away in the basement of the ministry. During your investigation you found that during the period of this deal Clearsky-Health was consulted by Flowingwater Consulting and paid them a large sum for their services. A consulting company owned by Adele Meral-Poisson. Adele Meral-Poisson is a well known lobbyist and the wife of Mark Illinger.

 

While we don’t need to apply network analysis to understand this fictional case - it helps understanding the sample spreadsheet. Gephi is able to import spreadsheets like this through it’s “import csv” section. Let’s do this.

 

Walkthrough Importing CSV into GephiSave the Sample Spreadsheet as csv (or click download as → comma seperated values if using google spreadsheet)Start GephiSelect File → OpenSelect the csv file safed from the sample spreadsheet.You will get a import report - check whether the number of nodes and edges seem correct and there are no errors reported
more...
No comment yet.
Rescooped by luiy from Collective intelligence
Scoop.it!

Applying crowdsourcing to humanitarian disasters

Applying crowdsourcing to humanitarian disasters | e-Xploration | Scoop.it
Imagery for the Crowd is a fascinating project currently in beta stages.  It's being run by the US Department of State Humanitarian Information Unit. The system uses a crowdsourcing model to proces...

Via Viktor Markowski
luiy's insight:

Imagery for the Crowd is a fascinating project currently in beta stages.  It’s being run by the US Department of State Humanitarian Information Unit.

The system uses a crowdsourcing model to process high-resolution satellite imagery that has been purchased by the state, and converting it into web-based mapping by volunteers.

 

The data is maintained by a UK organisation called Open Street Map.  They’re a non-profit that works to ensure that the data volunteers are providing is freely available.  They were chosen after their success in mapping Haiti after an earthquake struck the region in 2010.

 

It’s a great example of how social tools are being used to deliver real benefits in a crucial area.  You can find out more about Imagery to the Crowd by watching the video below.

more...
Viktor Markowski's curator insight, April 26, 2013 3:09 PM

It’s a great example of how social tools are being used to deliver real benefits in a crucial area.  You can find out more about Imagery to the Crowd by watching the video

Scooped by luiy
Scoop.it!

Next Practices for OER Quality Evaluation: Using Analytics to Support Continuous Improvement

Keynote at the Learning Analytics and Knowledge conference (LAK 2013), Leuven, Belgium - for the Learning Object Analytics for Collections, Repositories & Federations workshop

more...
No comment yet.
Rescooped by luiy from Digital Protest
Scoop.it!

Giants, Hackers, Trolls: Where Mythology and Online Activism Meet

Giants, Hackers, Trolls: Where Mythology and Online Activism Meet | e-Xploration | Scoop.it
The online world has much more in common with the mythological world than you might expect. A look at Bradley Manning, WikiLeaks, and Anonymous and their corresponding roles in mythology.

Via John Postill
luiy's insight:

Netizens have come to know a “troll” as ”someone who posts a deliberately provocative message” to fuel an argument online.

That these inflammatory net users were labeled as “trolls” was no accident. The original meaning of a troll is found in Scandinavian mythology, in which trolls are “creatures bent on mischief and wickedness.”

In fact, the online world has much more in common with the mythological world than you might expect. Many of the roles that have emerged in the Internet age are very similar to the structure used in traditional tales to impart some truth to listeners.

For instance, Loki, in Scandinavian folklore, is a trickster, a character set on breaking rules for ultimately positive effects. In the online world, a trickster is a whistleblower, the unconventional agent who will alert the rest of the world in order to trigger social change, such as former United States army soldier Bradley Manning, who is accused of passing on classified information to WikiLeaks.

In the same vein, blacksmiths and dwarves take material in its raw form and build objects that allow the gods to fight against their enemies. They give the raw material a shape that is useful and understandable, similar to what professional and citizen journalists do with information that is made available online by WikiLeaks.

And in Norse mythology, when Thor and the other gods fail to launch Baldr's funeral ship so that he may be resurrected in the other world, they call upon a giantess of supernatural power to propel the ship forward. In the online world, organizations of “giant” power such as Anonymous throw their weight behind information or causes to increase their awareness.

more...
No comment yet.
Scooped by luiy
Scoop.it!

actualizando Oycib con Firefox :::

actualizando Oycib con Firefox ::: | e-Xploration | Scoop.it
luiy's insight:

Actualización Oycib 2013 - 01.

 

Muy práctico ha resultado la actualización de la plataforma directamente en Firefox. Una opción que no conocia y esta vez ha resultado. imprescindible. No puedo decir lo mismo de Safari y Chrome, que para esto no dan el ancho, es decir no tienen mejores opciones que Firefox.

 

Firefox ha sido en distintas ocasiones la base de mi Red Personal de Aprendizaje (PLE o PLN). En estos casos se encuentra en que Firefox es una herramienta básica para el desarrollo de proyectos en Internet.

 

De manera general, comentamos que estamos editando CSS, JSON, HTML, GEXF. Parece que esto ya será cosa de siempre, es decir, la actualización, cada vez que aplicamos algo nuevo, surge la idea de probar alguna nueva experiencia en el diseño.

 

De momento, el proceso ha sido muy interesante, mientras mas le rascamos, mas encontramos en técnicas, teorias y lenguajes.

 

Se aceptan comentarios, sugerencias y colaboraciones..

 

... publicaremos otro post sobre el proceso.

more...
No comment yet.