SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
Integrated Intelligent Research(IIR) International Journal of Business Intelligent
Volume: 04 Issue: 01 June 2015,Pages No.11- 14
ISSN: 2278-2400
11
A Study of Work Related Excessive Time Uses of
Mobile Phones & Social Networks in Fuzzy
Cognitive Mapping (FCM)
Siji A J1
, A.Mary Vinnarasi2
, J. Befija Minnie3
1
M.Sc Student, Department of Mathematics, Loyola College
2
M.Phil. student, Department of Mathematics, Loyola College
3
Ph.D. Research Scholar, Department of Mathematics, Loyola College
Email:1
annlitjes@gmail.com, 2
vinnumath1990@yahoo.co.in
Abstract-Work related Modern worlds young generation use
significant time on mobile phone and social networks. It has
become a day today activity for most of them. The area of this
study become more concerned when the time use of on these
activities takes priorities over other activities. Excessive time
use on these activities has effects over an individuals health,
behaviors, financial status, interpersonal relationships, mental
health etc. In this paper an attempt is made to study the adverse
effects of excessive time use on mobile phones and social
networks among youth by using Fuzzy Cognitive mapping
(FCM).
Keywords: Time uses, Excessive uses of Mobile Phones and
Social Networks, Health Problems, Fuzzy Cognitive maps
I. INTRODUCTION
In 1965, L.A. Zadeh has introduced a mathematical model
called Fuzzy Cognitive Maps. After a decade in the year 1976,
Political scientist R. Axelrod[1] used this fuzzy model to study
decision making in social and political systems. Then B.
Kosko[2,3,4] enhanced the power of cognitive maps
considering fuzzy values for the concepts of the cognitive map
and fuzzy degrees of interrelationships between concepts.
FCMs can successfully represent knowledge and human
experience, introduced concepts to represent the essential
elements and the cause and effect relationships among the
concepts to model the behavior of any system. It is a very
convenient simple and powerful tool, which is used in
numerous fields such as social economical and medical etc. In
this modern world young generation use most of time on
mobile phone, face book, email etc. and this become their
routine habit. So in this paper we analyze the effect of
excessive time use on mobile phones, face book and other
social networks among youth in Chennai. Moreover the data
which we have collected from the youth is an unsupervised one
and also there is an uncertainty in the concepts. Hence fuzzy is
the best tool to analyze these problems. This article has five
sections, section one gives about social media ,section two
deals with the preliminaries of Fuzzy Cognitive maps, section
three gives the description and adaption of the problem to FCM
model and conclusion and future direction based on our study
in the final section.
1.1 Time Use
Time is an important resource for everyone. It is also a limited
resource in that we have only 24 hours in a day to put to
competing uses. How we use this limited resource is important
and has implications for our economic and social well-being.
Given this importance, the use or allocation of time has been
studied by academics and policy analysts since the early
twentieth century. However, more systematic collection of
time use data originated only in 1924, when significant
quantities time use data were collected by Soviet United. Since
then, smaller “bits and pieces of information” on time use were
collected with a focus on specific activities such as leisure and
travel patterns, but it was not until 1960s that more systematic
attempts was made to collect comparable data for large group
of countries.
1.2 Heavy Mobile Phone Use Increases Cancer Risk
Heavy uses of mobile phones have a 240 percent increased risk
of developing a malignant tumor on the side of the head where
they press the phone to their ear. “Heavy use” as 2,000 hours
of mobile phone use in the course of a decade, which
"corresponds to 10 years' use in the work place for one hour
per day." Of the 2,200 cancer patients, who ranged in age from
20 to 80 years old, 905 had a malignant brain tumor and just
under one-tenth of that number were heavy mobile phone
users. "Of these 905 cases, 85 were so-called high users of
mobile phones, that is they began early to use mobile and/or
wireless telephones and used them a lot. In addition, people
who started using a mobile phone before age 20 are also at
greater risk of developing a malignant brain tumor.
1.3 Social Media
A considerable amount of the 90 minutes that teens spend
using their cell phones is devoted to texting—and now, for a
small percentage of teens, a new wrinkle, sexing, in which they
Integrated Intelligent Research(IIR) International Journal of Business Intelligent
Volume: 04 Issue: 01 June 2015,Pages No.11- 14
ISSN: 2278-2400
12
send semi-nude and sometimes nude images of themselves to
their friends and other people. Of course, once an image is sent
to someone by cell phone, it can be forwarded on to other
people or even uploaded to YouTube, where millions of people
can see it. The term social media, as we understand it, refers to
sites such as Face book, Twitter, LinkedIn, and YouTube that
enable people to send messages, images, and video that can be
read or seen by large numbers of people. These social media
sites can be accessed on the Internet by computers, tablets, and
cell phones. We do much of the communication through social
media is “phatic.” These messages, sometimes called “small
talk,” are not to communicate information as much as
indicating we are present. Phatic communication, as
Malinowski pointed out, is a form of “verbal togetherness.”
The huge numbers of texted messages we send one another are
caused more by the need to maintain our network of friends
and consolidate our togetherness with one another than by the
desire to convey information. Erikson published his book in
1963, well before the development of cell phones, but his
comments about adolescent needs and the quest for identity
ring true (to adopt a telephone metaphor) today as well.
Young girls who become fans of Madonna or Lady Gaga or
cute guy vampire actors or whomever and young boys who
idolize football and other sports stars or other kinds of heroic
figures are, Erikson would say, going through a stage in which
they are struggling to consolidate their identities and using
their heroes as a means toward accomplishing this task.
But why texting rather than talking? One reason is that texting
is more private and another reason is that it is less direct. If you
talk on your cell phone where there are other people, they
sometimes can hear what you are saying to the person you are
talking to. In addition, texting enables people to send messages
without needing to be concerned about where the recipients of
these messages are or what they are doing. When you text a
message, you don’t face the problem of having to actually
conduct a conversation. But the goal of text-ing is a kind of
conversation, and conversation, Erikson has explained, plays a
crucial role in the lives of adolescents.
1.4 Media Use by 8- to 18-Year-Olds
A Kaiser Family Foundation study based on a large survey of
media usage by 8- to 18-year-olds in 2009 provides us the
following statistics (the chart is my construction of the data):
Time per Day Activity
4.29 hours Watching TV
2.31 hours Music and other audio
1.29 hours Computer use
1.13 hours playing video games
0.38 hours Reading
10.45 hours Total. But since 8- to 18-year-olds multitask 29%
of the time, the total time spent reduces to a total of 7.38 hours
per day. The Kaiser Family Foundation survey didn’t count
cell phone use as experience with media, though many 8- to
18-year-olds uses their cell phones to watch television or listen
to music. According to the report, they spend an average of 90
minutes a day on cell phones. The conclusion we reach from
looking at these statistics is that young people in America lead
media-saturated lives.
II. DEFINITION AND ILLUSTRATION OF FUZZY
COGNITIVE MAPS (FCMS)
The FCMs work on the opinion of experts. FCMs model the
world as a collection of classes and causal relations between
classes. FCMs are fuzzy signed directed graphs with feedback.
The directed edge eij from causal concept Ci to concept Ci
measures how much Cj causes Ci. The time varying concept
function Ci(t) measures the non-negative occurrence of some
fuzzy event, perhaps the strength of a political sentiment,
historical trend or military objective. The edges eij take values
in the fuzzy causal interval [–1, 1]. eij= 0 indicates no causality,
eij> 0 indicates causal increase, Cj increases as Ci increases (or
Ci decreases as Cj decreases). eij< 0 indicates causal decrease or
negative causality. Cj decreases as Ci increases (or Cj increases
as Ci decreases). Simple FCMs have edge values in {–1, 0, 1}.
1.1 Definitions
Definition 2.1.1: An FCM is a directed graph with concepts
like policies, events etc. as nodes and causalities as edges. It
represents causal relationship between concepts.
Definition 2.1.2: FCMs with edge weights or causalities from
the set {–1, 0, 1}, are called simple FCMs.
Definition 2.1.3: Consider the nodes or concepts C1,….Cn of
the FCM. Suppose the directed graph is drawn using edge
weight eij ∈{0, 1, –1}. The matrix E be defined by E = (eij)
where eij is the weight of the directed edge Ci C. E is called the
adjacency matrix of the FCM, also known as the connection
matrix of the FCM.
Definition 2.1.4: Let C1,….Cn be the nodes of an FCM. A =
(a1, a2,….,an) where ai∈{0, 1}. A is called the instantaneous
state vector and it denotes the on-off position of the node at an
instant.
ai= 0 if ai is OFF and
ai= 1 if ai is ON for i = 1, 2, …, n.
Definition2.1.5: Let 1 2
C C , 1 2
C C ….., n-1 n
C C be a cycle.
When Ci is switched on and if the causality flows through the
edges of a cycle and if it again causes Ci, we say that the
dynamical system goes round and round. This is true for any
node Ci, for i = 1,2… n. The equilibrium state for this
dynamical system is called the hidden pattern.
Definition 2.1.6: Finite number of FCMs can be combined
together to produce the joint effect of all the FCMs. Let E1, E2
Integrated Intelligent Research(IIR) International Journal of Business Intelligent
Volume: 04 Issue: 01 June 2015,Pages No.11- 14
ISSN: 2278-2400
13
….Ep be the adjacency matrices of the FCMs with nodes C1,
C2, .Cn then the combined FCM is got by adding all the
adjacency matrices E1, E2, ….Ep.
We denote the combined FCM adjacency matrix by E = E1 +
E2 + … + Ep. Suppose A = (a1, a2,….,an) is a vector which is
passed into a dynamical system E. Then AE = (a’1, a’2,…., a’n)
after thresholding and updating the vector suppose we get (b1,
b2,….,bn) we denote that by (a1, a2,….,an)↪(b1, b2,….,bn). Thus
the symbol ‘↪’ means the resultant vector has been threshold
and updated.
2.2Method of finding the hidden patterns
Let C1, C2,.,Cn be the nodes of an FCM, with feedback. Let E
be the associated adjacency matrix. Let us find the hidden
pattern when C1is switched on. When an input is given as the
vector A1 = (1, 0, 0,., 0), the data should pass through the
relation matrix E. This is done by multiplying A1 by the matrix
E. Let A1E = (a1, a2,., an) with the threshold operation that is by
replacing ai by 1 if ai<k and ai by 0 if ai< k (k is a suitable
positive integer).We update the resulting concept, the concept
C1 is included in the updated vector by making the first
coordinate as 1 in the resulting vector. Suppose A1E → A2 then
consider A2E and repeat the same procedure. This procedure is
repeated till we get a limit cycle or a fixed point.
III. ADAPTATION OF THE PROBLEM
There are many factors contributing to work related excessive
time uses of mobile phones and networks inducing factors
(situations) will lead to work life imbalance. Here the study is
made among the eleven situations inducing factors and to find
out which situations has more influence in provoking the other
situation inducing factors and result in life of young geration.
With the help of expert’s opinion the data has been arrived.
Since the data is linguistic by nature it makes it very difficult to
analyze it with other mathematical tools. Fuzzy Cognitive
Mapping is useful in such a way to analyze these linguistic
data and make easier to drive the result. With FCM, it is
understood addiction to mobile phones and social networks
results in the development of negative behaviors which
ultimately causes the imbalance of normal life has been studied
in this paper. The following attributes are taken as the nodes of
the FCM. A = {A1, A2, A3, A4, A5,A6, A7, A8, A9, A10, A11}
where A1, A2, A3, A4, A5,A6, A7, A8, A9, A10, A11as
A1- Neglecting daily obligations
(Family life, work, college)
A2- Poor performance at work or studies
A3 -Health problems
A4- Long time mobile taking and texting
A5 - Night packages
A6 - Disrupted sleep
A7- Constantly checking face book comments
Or twitter feels
A8 - Distractions
A9 - Constantly checking missed calls & messages
A10 - Addiction on mobile phones and
Social networks
A11 - Depression
A5
A7
A6
A4
A2
A11
A9
A8
A3
A1
A10
1 2 3 4 5 6 7 8 9 10 11
1
2
3
4
5
6
7
8
9
10
11
A A A A A A A A A A A
A 0 0 0 0 0 0 0 0 0 0 0
A 0 0 0 0 0 0 0
A
A
A
A
A
A
A
A
A
0 0 0 1
0 1 0 0 0 0 0 0 0 0 0
1 1 1 0 0 1 0 0 0 0 0
0 0 0 1 0 0 0 0 0 0 0
0 1 1 0 0 0 0 0 0 0 0
1 1 0 0 0 0 0 1 0 1 0
0 1 0 0 0 0 0 0 0 0 0
0 1 0 0 0 0 0 1 0 1 0
1 1 0 1 0 0 1 1 1 0 0
0 0 1 0 0 0 0 0 0 0 0
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
on the dynamical system E is as follows:
X = (0 0 0 1 0 0 0 0 0 0 0 0)
XE = (1 2 2 0 0 1 1 2 1 0 0 1)
↪ (1 1 1 0 0 1 1 1 1 0 01) = X1
X1E = (1 0 2 0 0 1 4 0 1 9 0 0)
↪ (1 0 1 0 0 1 1 0 1 1 0 0) = X2
X2E = (3 0 1 0 0 1 3 0 0 5 0 0)
↪ (1 0 1 0 0 1 1 0 0 1 0 0) = X3
X3E = (3 0 1 0 0 1 3 0 0 5 0 0)
↪ (1 0 1 0 0 1 1 0 0 1 0 0) = X4 = X3
Here X3 is the hidden pattern and which is the fixed point.
The result of the study indicates that the ON state
areA1,A3,A6,A7,A10 that is neglecting daily obligation health
problems and checking facebook comments or twitter feeds
and addiction on mobile phones and social networks.
IV. CONCLUSION
Through the results it is understood addiction to mobile phones
and social networks results in the development of negative
behaviors which ultimately causes the imbalance of normal
life. It is an undeniable fact that the use of mobile phones and
social networks cannot be avoided completely. However, an
individual can ensure that time spent on these activities should
not affect the other important activities such as sleep, studies,
Integrated Intelligent Research(IIR) International Journal of Business Intelligent
Volume: 04 Issue: 01 June 2015,Pages No.11- 14
ISSN: 2278-2400
14
physical exercise, proper meals etc. to lead a well-balanced and
healthy life.
Future Direction
The study is limited to behavioral attributes however it can be
extended to psychological, social and interpersonal problems
due to excessive time use on mobile phones and social
networks. Also it can be extended to study how it affects the
nation’s productivity.
REFERENCES
[1] Axelrod, R.(1976). Structure of decision: The cognitive maps of political
elites. Princeton, NJ: Princeton university press.
[2] Anna, L., Kari, T., & Anssi, A. (2006). Meta-analysis of mobile phone use
and intracranial tumors. Scandinavian Journal of Work, Environment &
Health, 32, 171-177.
[3] Bakke, E. (2010). A model and measure of mobile communication
competence. Human Communication Reseach, 36, 348-371.
[4] Bianchi, A., & Phillips, J. G.(2005). Psychological predictors of problem
mobile
[5] phone use. CyberPsychology & Behavior. 8, 39-51.
[6] Billieux, J., Linden, M., D,acremont, M., Ceschi, G., & Zermatten, A.
(2007). Does impulsivity relate to perceived dependence on and actual use
of mobile phone? Applied Cognitive Psychology, 21, 527-537.
[7] Kosco, B.”Fuzzy Cognitive Maps” International journal of man-machine
studies, January, (1986), 62-75
[8] Kosco, B., Neural Networks and Fuzzy Systems: A Dynamical Systems
Approach to Machine Intelligence, Prentice Hall of India, 1997
[9] The American Association of Behavioral and Social Sciences Journal (The
AABSS Journal, 2011, Volume15)
[10]Vasantha Kandasamy W.B and Smarandache Florentin “Analysis of social
aspects of migrant laborers living with HIV/AIDS using Fuzzy Theory and
Neutrosophic Cognitive Maps”, Xiquan, Phoenix (2004)
[11]Vasantha Kandasamy W.B and Smarandache Florentin“Fuzzy Cognitive
Maps and Neutrosophic Cognitive Maps”, Xiquan, Phoenix (2003
[12] Vasantha Kandasamy W.B, Florentin Smarandacheand
Ilanthenral, “Elementary fuzzy matrix theory andfuzzy models for
social scientists”.(2007).
[13]Tsandiras, A.K.and Mararitis , K.G.(1996). Using Crtainty neurons in
Fuzzy Cognitive Maps , Neural Network World , 6,719 – 728.

Mais conteúdo relacionado

Semelhante a A Study of Work Related Excessive Time Uses of Mobile Phones & Social Networks in Fuzzy Cognitive Mapping (FCM)

Psychological Factors of Mobile Phone Users and Social Media Networks on Indi...
Psychological Factors of Mobile Phone Users and Social Media Networks on Indi...Psychological Factors of Mobile Phone Users and Social Media Networks on Indi...
Psychological Factors of Mobile Phone Users and Social Media Networks on Indi...journal ijrtem
 
Are Social Media Websites Harmful To The Youth?
Are Social Media Websites Harmful To The Youth?Are Social Media Websites Harmful To The Youth?
Are Social Media Websites Harmful To The Youth?Evan Atkinson
 
Net Children Go Mobile European Report February 2014
Net Children Go Mobile European Report February 2014Net Children Go Mobile European Report February 2014
Net Children Go Mobile European Report February 2014Krishna De
 
STS-Module-4-5-6-7.docx
STS-Module-4-5-6-7.docxSTS-Module-4-5-6-7.docx
STS-Module-4-5-6-7.docxJohnLoisVan
 
Marketing with the connected consumer
Marketing with the connected consumerMarketing with the connected consumer
Marketing with the connected consumercraig lefebvre
 
Interpersonal communication notes for powerpoint
Interpersonal communication notes for powerpointInterpersonal communication notes for powerpoint
Interpersonal communication notes for powerpointLauraSieckmann
 
Ict and communication
Ict and communicationIct and communication
Ict and communicationnazri88
 
Mobile phone and youth culture
Mobile phone and youth cultureMobile phone and youth culture
Mobile phone and youth cultureHezekiah Hlychho
 
Mobile phone and youth culture by Hezekiah
Mobile phone and youth culture by HezekiahMobile phone and youth culture by Hezekiah
Mobile phone and youth culture by Hezekiahpumascomm
 
Youth media usage
Youth media usageYouth media usage
Youth media usageElad Ratson
 

Semelhante a A Study of Work Related Excessive Time Uses of Mobile Phones & Social Networks in Fuzzy Cognitive Mapping (FCM) (12)

Psychological Factors of Mobile Phone Users and Social Media Networks on Indi...
Psychological Factors of Mobile Phone Users and Social Media Networks on Indi...Psychological Factors of Mobile Phone Users and Social Media Networks on Indi...
Psychological Factors of Mobile Phone Users and Social Media Networks on Indi...
 
Are Social Media Websites Harmful To The Youth?
Are Social Media Websites Harmful To The Youth?Are Social Media Websites Harmful To The Youth?
Are Social Media Websites Harmful To The Youth?
 
Social Media Presentation Final
Social Media Presentation FinalSocial Media Presentation Final
Social Media Presentation Final
 
Final Paper
Final PaperFinal Paper
Final Paper
 
Net Children Go Mobile European Report February 2014
Net Children Go Mobile European Report February 2014Net Children Go Mobile European Report February 2014
Net Children Go Mobile European Report February 2014
 
STS-Module-4-5-6-7.docx
STS-Module-4-5-6-7.docxSTS-Module-4-5-6-7.docx
STS-Module-4-5-6-7.docx
 
Marketing with the connected consumer
Marketing with the connected consumerMarketing with the connected consumer
Marketing with the connected consumer
 
Interpersonal communication notes for powerpoint
Interpersonal communication notes for powerpointInterpersonal communication notes for powerpoint
Interpersonal communication notes for powerpoint
 
Ict and communication
Ict and communicationIct and communication
Ict and communication
 
Mobile phone and youth culture
Mobile phone and youth cultureMobile phone and youth culture
Mobile phone and youth culture
 
Mobile phone and youth culture by Hezekiah
Mobile phone and youth culture by HezekiahMobile phone and youth culture by Hezekiah
Mobile phone and youth culture by Hezekiah
 
Youth media usage
Youth media usageYouth media usage
Youth media usage
 

Mais de ijcnes

A Survey of Ontology-based Information Extraction for Social Media Content An...
A Survey of Ontology-based Information Extraction for Social Media Content An...A Survey of Ontology-based Information Extraction for Social Media Content An...
A Survey of Ontology-based Information Extraction for Social Media Content An...ijcnes
 
Economic Growth of Information Technology (It) Industry on the Indian Economy
Economic Growth of Information Technology (It) Industry on the Indian EconomyEconomic Growth of Information Technology (It) Industry on the Indian Economy
Economic Growth of Information Technology (It) Industry on the Indian Economyijcnes
 
An analysis of Mobile Learning Implementation in Shinas College of Technology...
An analysis of Mobile Learning Implementation in Shinas College of Technology...An analysis of Mobile Learning Implementation in Shinas College of Technology...
An analysis of Mobile Learning Implementation in Shinas College of Technology...ijcnes
 
A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...
A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...
A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...ijcnes
 
Challenges of E-government in Oman
Challenges of E-government in OmanChallenges of E-government in Oman
Challenges of E-government in Omanijcnes
 
Power Management in Micro grid Using Hybrid Energy Storage System
Power Management in Micro grid Using Hybrid Energy Storage SystemPower Management in Micro grid Using Hybrid Energy Storage System
Power Management in Micro grid Using Hybrid Energy Storage Systemijcnes
 
Holistic Forecasting of Onset of Diabetes through Data Mining Techniques
Holistic Forecasting of Onset of Diabetes through Data Mining TechniquesHolistic Forecasting of Onset of Diabetes through Data Mining Techniques
Holistic Forecasting of Onset of Diabetes through Data Mining Techniquesijcnes
 
A Survey on Disease Prediction from Retinal Colour Fundus Images using Image ...
A Survey on Disease Prediction from Retinal Colour Fundus Images using Image ...A Survey on Disease Prediction from Retinal Colour Fundus Images using Image ...
A Survey on Disease Prediction from Retinal Colour Fundus Images using Image ...ijcnes
 
Feature Extraction in Content based Image Retrieval
Feature Extraction in Content based Image RetrievalFeature Extraction in Content based Image Retrieval
Feature Extraction in Content based Image Retrievalijcnes
 
Challenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud ComputingChallenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud Computingijcnes
 
Detection of Node Activity and Selfish & Malicious Behavioral Patterns using ...
Detection of Node Activity and Selfish & Malicious Behavioral Patterns using ...Detection of Node Activity and Selfish & Malicious Behavioral Patterns using ...
Detection of Node Activity and Selfish & Malicious Behavioral Patterns using ...ijcnes
 
Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...
Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...
Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...ijcnes
 
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor NetworksAn Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networksijcnes
 
Secured Seamless Wi-Fi Enhancement in Dynamic Vehicles
Secured Seamless Wi-Fi Enhancement in Dynamic VehiclesSecured Seamless Wi-Fi Enhancement in Dynamic Vehicles
Secured Seamless Wi-Fi Enhancement in Dynamic Vehiclesijcnes
 
Virtual Position based Olsr Protocol for Wireless Sensor Networks
Virtual Position based Olsr Protocol for Wireless Sensor NetworksVirtual Position based Olsr Protocol for Wireless Sensor Networks
Virtual Position based Olsr Protocol for Wireless Sensor Networksijcnes
 
Mitigation and control of Defeating Jammers using P-1 Factorization
Mitigation and control of Defeating Jammers using P-1 FactorizationMitigation and control of Defeating Jammers using P-1 Factorization
Mitigation and control of Defeating Jammers using P-1 Factorizationijcnes
 
An analysis and impact factors on Agriculture field using Data Mining Techniques
An analysis and impact factors on Agriculture field using Data Mining TechniquesAn analysis and impact factors on Agriculture field using Data Mining Techniques
An analysis and impact factors on Agriculture field using Data Mining Techniquesijcnes
 
A Study on Code Smell Detection with Refactoring Tools in Object Oriented Lan...
A Study on Code Smell Detection with Refactoring Tools in Object Oriented Lan...A Study on Code Smell Detection with Refactoring Tools in Object Oriented Lan...
A Study on Code Smell Detection with Refactoring Tools in Object Oriented Lan...ijcnes
 
Priority Based Multi Sen Car Technique in WSN
Priority Based Multi Sen Car Technique in WSNPriority Based Multi Sen Car Technique in WSN
Priority Based Multi Sen Car Technique in WSNijcnes
 
Semantic Search of E-Learning Documents Using Ontology Based System
Semantic Search of E-Learning Documents Using Ontology Based SystemSemantic Search of E-Learning Documents Using Ontology Based System
Semantic Search of E-Learning Documents Using Ontology Based Systemijcnes
 

Mais de ijcnes (20)

A Survey of Ontology-based Information Extraction for Social Media Content An...
A Survey of Ontology-based Information Extraction for Social Media Content An...A Survey of Ontology-based Information Extraction for Social Media Content An...
A Survey of Ontology-based Information Extraction for Social Media Content An...
 
Economic Growth of Information Technology (It) Industry on the Indian Economy
Economic Growth of Information Technology (It) Industry on the Indian EconomyEconomic Growth of Information Technology (It) Industry on the Indian Economy
Economic Growth of Information Technology (It) Industry on the Indian Economy
 
An analysis of Mobile Learning Implementation in Shinas College of Technology...
An analysis of Mobile Learning Implementation in Shinas College of Technology...An analysis of Mobile Learning Implementation in Shinas College of Technology...
An analysis of Mobile Learning Implementation in Shinas College of Technology...
 
A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...
A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...
A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...
 
Challenges of E-government in Oman
Challenges of E-government in OmanChallenges of E-government in Oman
Challenges of E-government in Oman
 
Power Management in Micro grid Using Hybrid Energy Storage System
Power Management in Micro grid Using Hybrid Energy Storage SystemPower Management in Micro grid Using Hybrid Energy Storage System
Power Management in Micro grid Using Hybrid Energy Storage System
 
Holistic Forecasting of Onset of Diabetes through Data Mining Techniques
Holistic Forecasting of Onset of Diabetes through Data Mining TechniquesHolistic Forecasting of Onset of Diabetes through Data Mining Techniques
Holistic Forecasting of Onset of Diabetes through Data Mining Techniques
 
A Survey on Disease Prediction from Retinal Colour Fundus Images using Image ...
A Survey on Disease Prediction from Retinal Colour Fundus Images using Image ...A Survey on Disease Prediction from Retinal Colour Fundus Images using Image ...
A Survey on Disease Prediction from Retinal Colour Fundus Images using Image ...
 
Feature Extraction in Content based Image Retrieval
Feature Extraction in Content based Image RetrievalFeature Extraction in Content based Image Retrieval
Feature Extraction in Content based Image Retrieval
 
Challenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud ComputingChallenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud Computing
 
Detection of Node Activity and Selfish & Malicious Behavioral Patterns using ...
Detection of Node Activity and Selfish & Malicious Behavioral Patterns using ...Detection of Node Activity and Selfish & Malicious Behavioral Patterns using ...
Detection of Node Activity and Selfish & Malicious Behavioral Patterns using ...
 
Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...
Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...
Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...
 
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor NetworksAn Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
 
Secured Seamless Wi-Fi Enhancement in Dynamic Vehicles
Secured Seamless Wi-Fi Enhancement in Dynamic VehiclesSecured Seamless Wi-Fi Enhancement in Dynamic Vehicles
Secured Seamless Wi-Fi Enhancement in Dynamic Vehicles
 
Virtual Position based Olsr Protocol for Wireless Sensor Networks
Virtual Position based Olsr Protocol for Wireless Sensor NetworksVirtual Position based Olsr Protocol for Wireless Sensor Networks
Virtual Position based Olsr Protocol for Wireless Sensor Networks
 
Mitigation and control of Defeating Jammers using P-1 Factorization
Mitigation and control of Defeating Jammers using P-1 FactorizationMitigation and control of Defeating Jammers using P-1 Factorization
Mitigation and control of Defeating Jammers using P-1 Factorization
 
An analysis and impact factors on Agriculture field using Data Mining Techniques
An analysis and impact factors on Agriculture field using Data Mining TechniquesAn analysis and impact factors on Agriculture field using Data Mining Techniques
An analysis and impact factors on Agriculture field using Data Mining Techniques
 
A Study on Code Smell Detection with Refactoring Tools in Object Oriented Lan...
A Study on Code Smell Detection with Refactoring Tools in Object Oriented Lan...A Study on Code Smell Detection with Refactoring Tools in Object Oriented Lan...
A Study on Code Smell Detection with Refactoring Tools in Object Oriented Lan...
 
Priority Based Multi Sen Car Technique in WSN
Priority Based Multi Sen Car Technique in WSNPriority Based Multi Sen Car Technique in WSN
Priority Based Multi Sen Car Technique in WSN
 
Semantic Search of E-Learning Documents Using Ontology Based System
Semantic Search of E-Learning Documents Using Ontology Based SystemSemantic Search of E-Learning Documents Using Ontology Based System
Semantic Search of E-Learning Documents Using Ontology Based System
 

Último

Livre Implementing_Six_Sigma_and_Lean_A_prac([Ron_Basu]_).pdf
Livre Implementing_Six_Sigma_and_Lean_A_prac([Ron_Basu]_).pdfLivre Implementing_Six_Sigma_and_Lean_A_prac([Ron_Basu]_).pdf
Livre Implementing_Six_Sigma_and_Lean_A_prac([Ron_Basu]_).pdfsaad175691
 
AntColonyOptimizationManetNetworkAODV.pptx
AntColonyOptimizationManetNetworkAODV.pptxAntColonyOptimizationManetNetworkAODV.pptx
AntColonyOptimizationManetNetworkAODV.pptxLina Kadam
 
Submerged Combustion, Explosion Flame Combustion, Pulsating Combustion, and E...
Submerged Combustion, Explosion Flame Combustion, Pulsating Combustion, and E...Submerged Combustion, Explosion Flame Combustion, Pulsating Combustion, and E...
Submerged Combustion, Explosion Flame Combustion, Pulsating Combustion, and E...Ayisha586983
 
Secure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech LabsSecure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech Labsamber724300
 
A brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision ProA brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision ProRay Yuan Liu
 
Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Romil Mishra
 
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfComprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfalene1
 
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.elesangwon
 
22CYT12 & Chemistry for Computer Systems_Unit-II-Corrosion & its Control Meth...
22CYT12 & Chemistry for Computer Systems_Unit-II-Corrosion & its Control Meth...22CYT12 & Chemistry for Computer Systems_Unit-II-Corrosion & its Control Meth...
22CYT12 & Chemistry for Computer Systems_Unit-II-Corrosion & its Control Meth...KrishnaveniKrishnara1
 
Theory of Machine Notes / Lecture Material .pdf
Theory of Machine Notes / Lecture Material .pdfTheory of Machine Notes / Lecture Material .pdf
Theory of Machine Notes / Lecture Material .pdfShreyas Pandit
 
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Sumanth A
 
Machine Learning 5G Federated Learning.pdf
Machine Learning 5G Federated Learning.pdfMachine Learning 5G Federated Learning.pdf
Machine Learning 5G Federated Learning.pdfadeyimikaipaye
 
10 AsymmetricKey Cryptography students.pptx
10 AsymmetricKey Cryptography students.pptx10 AsymmetricKey Cryptography students.pptx
10 AsymmetricKey Cryptography students.pptxAdityaGoogle
 
Prach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism CommunityPrach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism Communityprachaibot
 
Detection&Tracking - Thermal imaging object detection and tracking
Detection&Tracking - Thermal imaging object detection and trackingDetection&Tracking - Thermal imaging object detection and tracking
Detection&Tracking - Thermal imaging object detection and trackinghadarpinhas1
 
SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATIONSOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATIONSneha Padhiar
 
Artificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewArtificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewsandhya757531
 
1- Practice occupational health and safety procedures.pptx
1- Practice occupational health and safety procedures.pptx1- Practice occupational health and safety procedures.pptx
1- Practice occupational health and safety procedures.pptxMel Paras
 
Introduction of Object Oriented Programming Language using Java. .pptx
Introduction of Object Oriented Programming Language using Java. .pptxIntroduction of Object Oriented Programming Language using Java. .pptx
Introduction of Object Oriented Programming Language using Java. .pptxPoonam60376
 

Último (20)

Livre Implementing_Six_Sigma_and_Lean_A_prac([Ron_Basu]_).pdf
Livre Implementing_Six_Sigma_and_Lean_A_prac([Ron_Basu]_).pdfLivre Implementing_Six_Sigma_and_Lean_A_prac([Ron_Basu]_).pdf
Livre Implementing_Six_Sigma_and_Lean_A_prac([Ron_Basu]_).pdf
 
AntColonyOptimizationManetNetworkAODV.pptx
AntColonyOptimizationManetNetworkAODV.pptxAntColonyOptimizationManetNetworkAODV.pptx
AntColonyOptimizationManetNetworkAODV.pptx
 
Submerged Combustion, Explosion Flame Combustion, Pulsating Combustion, and E...
Submerged Combustion, Explosion Flame Combustion, Pulsating Combustion, and E...Submerged Combustion, Explosion Flame Combustion, Pulsating Combustion, and E...
Submerged Combustion, Explosion Flame Combustion, Pulsating Combustion, and E...
 
Secure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech LabsSecure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech Labs
 
A brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision ProA brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision Pro
 
Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________
 
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfComprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
 
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
 
22CYT12 & Chemistry for Computer Systems_Unit-II-Corrosion & its Control Meth...
22CYT12 & Chemistry for Computer Systems_Unit-II-Corrosion & its Control Meth...22CYT12 & Chemistry for Computer Systems_Unit-II-Corrosion & its Control Meth...
22CYT12 & Chemistry for Computer Systems_Unit-II-Corrosion & its Control Meth...
 
Theory of Machine Notes / Lecture Material .pdf
Theory of Machine Notes / Lecture Material .pdfTheory of Machine Notes / Lecture Material .pdf
Theory of Machine Notes / Lecture Material .pdf
 
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
 
Versatile Engineering Construction Firms
Versatile Engineering Construction FirmsVersatile Engineering Construction Firms
Versatile Engineering Construction Firms
 
Machine Learning 5G Federated Learning.pdf
Machine Learning 5G Federated Learning.pdfMachine Learning 5G Federated Learning.pdf
Machine Learning 5G Federated Learning.pdf
 
10 AsymmetricKey Cryptography students.pptx
10 AsymmetricKey Cryptography students.pptx10 AsymmetricKey Cryptography students.pptx
10 AsymmetricKey Cryptography students.pptx
 
Prach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism CommunityPrach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism Community
 
Detection&Tracking - Thermal imaging object detection and tracking
Detection&Tracking - Thermal imaging object detection and trackingDetection&Tracking - Thermal imaging object detection and tracking
Detection&Tracking - Thermal imaging object detection and tracking
 
SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATIONSOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
 
Artificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewArtificial Intelligence in Power System overview
Artificial Intelligence in Power System overview
 
1- Practice occupational health and safety procedures.pptx
1- Practice occupational health and safety procedures.pptx1- Practice occupational health and safety procedures.pptx
1- Practice occupational health and safety procedures.pptx
 
Introduction of Object Oriented Programming Language using Java. .pptx
Introduction of Object Oriented Programming Language using Java. .pptxIntroduction of Object Oriented Programming Language using Java. .pptx
Introduction of Object Oriented Programming Language using Java. .pptx
 

A Study of Work Related Excessive Time Uses of Mobile Phones & Social Networks in Fuzzy Cognitive Mapping (FCM)

  • 1. Integrated Intelligent Research(IIR) International Journal of Business Intelligent Volume: 04 Issue: 01 June 2015,Pages No.11- 14 ISSN: 2278-2400 11 A Study of Work Related Excessive Time Uses of Mobile Phones & Social Networks in Fuzzy Cognitive Mapping (FCM) Siji A J1 , A.Mary Vinnarasi2 , J. Befija Minnie3 1 M.Sc Student, Department of Mathematics, Loyola College 2 M.Phil. student, Department of Mathematics, Loyola College 3 Ph.D. Research Scholar, Department of Mathematics, Loyola College Email:1 annlitjes@gmail.com, 2 vinnumath1990@yahoo.co.in Abstract-Work related Modern worlds young generation use significant time on mobile phone and social networks. It has become a day today activity for most of them. The area of this study become more concerned when the time use of on these activities takes priorities over other activities. Excessive time use on these activities has effects over an individuals health, behaviors, financial status, interpersonal relationships, mental health etc. In this paper an attempt is made to study the adverse effects of excessive time use on mobile phones and social networks among youth by using Fuzzy Cognitive mapping (FCM). Keywords: Time uses, Excessive uses of Mobile Phones and Social Networks, Health Problems, Fuzzy Cognitive maps I. INTRODUCTION In 1965, L.A. Zadeh has introduced a mathematical model called Fuzzy Cognitive Maps. After a decade in the year 1976, Political scientist R. Axelrod[1] used this fuzzy model to study decision making in social and political systems. Then B. Kosko[2,3,4] enhanced the power of cognitive maps considering fuzzy values for the concepts of the cognitive map and fuzzy degrees of interrelationships between concepts. FCMs can successfully represent knowledge and human experience, introduced concepts to represent the essential elements and the cause and effect relationships among the concepts to model the behavior of any system. It is a very convenient simple and powerful tool, which is used in numerous fields such as social economical and medical etc. In this modern world young generation use most of time on mobile phone, face book, email etc. and this become their routine habit. So in this paper we analyze the effect of excessive time use on mobile phones, face book and other social networks among youth in Chennai. Moreover the data which we have collected from the youth is an unsupervised one and also there is an uncertainty in the concepts. Hence fuzzy is the best tool to analyze these problems. This article has five sections, section one gives about social media ,section two deals with the preliminaries of Fuzzy Cognitive maps, section three gives the description and adaption of the problem to FCM model and conclusion and future direction based on our study in the final section. 1.1 Time Use Time is an important resource for everyone. It is also a limited resource in that we have only 24 hours in a day to put to competing uses. How we use this limited resource is important and has implications for our economic and social well-being. Given this importance, the use or allocation of time has been studied by academics and policy analysts since the early twentieth century. However, more systematic collection of time use data originated only in 1924, when significant quantities time use data were collected by Soviet United. Since then, smaller “bits and pieces of information” on time use were collected with a focus on specific activities such as leisure and travel patterns, but it was not until 1960s that more systematic attempts was made to collect comparable data for large group of countries. 1.2 Heavy Mobile Phone Use Increases Cancer Risk Heavy uses of mobile phones have a 240 percent increased risk of developing a malignant tumor on the side of the head where they press the phone to their ear. “Heavy use” as 2,000 hours of mobile phone use in the course of a decade, which "corresponds to 10 years' use in the work place for one hour per day." Of the 2,200 cancer patients, who ranged in age from 20 to 80 years old, 905 had a malignant brain tumor and just under one-tenth of that number were heavy mobile phone users. "Of these 905 cases, 85 were so-called high users of mobile phones, that is they began early to use mobile and/or wireless telephones and used them a lot. In addition, people who started using a mobile phone before age 20 are also at greater risk of developing a malignant brain tumor. 1.3 Social Media A considerable amount of the 90 minutes that teens spend using their cell phones is devoted to texting—and now, for a small percentage of teens, a new wrinkle, sexing, in which they
  • 2. Integrated Intelligent Research(IIR) International Journal of Business Intelligent Volume: 04 Issue: 01 June 2015,Pages No.11- 14 ISSN: 2278-2400 12 send semi-nude and sometimes nude images of themselves to their friends and other people. Of course, once an image is sent to someone by cell phone, it can be forwarded on to other people or even uploaded to YouTube, where millions of people can see it. The term social media, as we understand it, refers to sites such as Face book, Twitter, LinkedIn, and YouTube that enable people to send messages, images, and video that can be read or seen by large numbers of people. These social media sites can be accessed on the Internet by computers, tablets, and cell phones. We do much of the communication through social media is “phatic.” These messages, sometimes called “small talk,” are not to communicate information as much as indicating we are present. Phatic communication, as Malinowski pointed out, is a form of “verbal togetherness.” The huge numbers of texted messages we send one another are caused more by the need to maintain our network of friends and consolidate our togetherness with one another than by the desire to convey information. Erikson published his book in 1963, well before the development of cell phones, but his comments about adolescent needs and the quest for identity ring true (to adopt a telephone metaphor) today as well. Young girls who become fans of Madonna or Lady Gaga or cute guy vampire actors or whomever and young boys who idolize football and other sports stars or other kinds of heroic figures are, Erikson would say, going through a stage in which they are struggling to consolidate their identities and using their heroes as a means toward accomplishing this task. But why texting rather than talking? One reason is that texting is more private and another reason is that it is less direct. If you talk on your cell phone where there are other people, they sometimes can hear what you are saying to the person you are talking to. In addition, texting enables people to send messages without needing to be concerned about where the recipients of these messages are or what they are doing. When you text a message, you don’t face the problem of having to actually conduct a conversation. But the goal of text-ing is a kind of conversation, and conversation, Erikson has explained, plays a crucial role in the lives of adolescents. 1.4 Media Use by 8- to 18-Year-Olds A Kaiser Family Foundation study based on a large survey of media usage by 8- to 18-year-olds in 2009 provides us the following statistics (the chart is my construction of the data): Time per Day Activity 4.29 hours Watching TV 2.31 hours Music and other audio 1.29 hours Computer use 1.13 hours playing video games 0.38 hours Reading 10.45 hours Total. But since 8- to 18-year-olds multitask 29% of the time, the total time spent reduces to a total of 7.38 hours per day. The Kaiser Family Foundation survey didn’t count cell phone use as experience with media, though many 8- to 18-year-olds uses their cell phones to watch television or listen to music. According to the report, they spend an average of 90 minutes a day on cell phones. The conclusion we reach from looking at these statistics is that young people in America lead media-saturated lives. II. DEFINITION AND ILLUSTRATION OF FUZZY COGNITIVE MAPS (FCMS) The FCMs work on the opinion of experts. FCMs model the world as a collection of classes and causal relations between classes. FCMs are fuzzy signed directed graphs with feedback. The directed edge eij from causal concept Ci to concept Ci measures how much Cj causes Ci. The time varying concept function Ci(t) measures the non-negative occurrence of some fuzzy event, perhaps the strength of a political sentiment, historical trend or military objective. The edges eij take values in the fuzzy causal interval [–1, 1]. eij= 0 indicates no causality, eij> 0 indicates causal increase, Cj increases as Ci increases (or Ci decreases as Cj decreases). eij< 0 indicates causal decrease or negative causality. Cj decreases as Ci increases (or Cj increases as Ci decreases). Simple FCMs have edge values in {–1, 0, 1}. 1.1 Definitions Definition 2.1.1: An FCM is a directed graph with concepts like policies, events etc. as nodes and causalities as edges. It represents causal relationship between concepts. Definition 2.1.2: FCMs with edge weights or causalities from the set {–1, 0, 1}, are called simple FCMs. Definition 2.1.3: Consider the nodes or concepts C1,….Cn of the FCM. Suppose the directed graph is drawn using edge weight eij ∈{0, 1, –1}. The matrix E be defined by E = (eij) where eij is the weight of the directed edge Ci C. E is called the adjacency matrix of the FCM, also known as the connection matrix of the FCM. Definition 2.1.4: Let C1,….Cn be the nodes of an FCM. A = (a1, a2,….,an) where ai∈{0, 1}. A is called the instantaneous state vector and it denotes the on-off position of the node at an instant. ai= 0 if ai is OFF and ai= 1 if ai is ON for i = 1, 2, …, n. Definition2.1.5: Let 1 2 C C , 1 2 C C ….., n-1 n C C be a cycle. When Ci is switched on and if the causality flows through the edges of a cycle and if it again causes Ci, we say that the dynamical system goes round and round. This is true for any node Ci, for i = 1,2… n. The equilibrium state for this dynamical system is called the hidden pattern. Definition 2.1.6: Finite number of FCMs can be combined together to produce the joint effect of all the FCMs. Let E1, E2
  • 3. Integrated Intelligent Research(IIR) International Journal of Business Intelligent Volume: 04 Issue: 01 June 2015,Pages No.11- 14 ISSN: 2278-2400 13 ….Ep be the adjacency matrices of the FCMs with nodes C1, C2, .Cn then the combined FCM is got by adding all the adjacency matrices E1, E2, ….Ep. We denote the combined FCM adjacency matrix by E = E1 + E2 + … + Ep. Suppose A = (a1, a2,….,an) is a vector which is passed into a dynamical system E. Then AE = (a’1, a’2,…., a’n) after thresholding and updating the vector suppose we get (b1, b2,….,bn) we denote that by (a1, a2,….,an)↪(b1, b2,….,bn). Thus the symbol ‘↪’ means the resultant vector has been threshold and updated. 2.2Method of finding the hidden patterns Let C1, C2,.,Cn be the nodes of an FCM, with feedback. Let E be the associated adjacency matrix. Let us find the hidden pattern when C1is switched on. When an input is given as the vector A1 = (1, 0, 0,., 0), the data should pass through the relation matrix E. This is done by multiplying A1 by the matrix E. Let A1E = (a1, a2,., an) with the threshold operation that is by replacing ai by 1 if ai<k and ai by 0 if ai< k (k is a suitable positive integer).We update the resulting concept, the concept C1 is included in the updated vector by making the first coordinate as 1 in the resulting vector. Suppose A1E → A2 then consider A2E and repeat the same procedure. This procedure is repeated till we get a limit cycle or a fixed point. III. ADAPTATION OF THE PROBLEM There are many factors contributing to work related excessive time uses of mobile phones and networks inducing factors (situations) will lead to work life imbalance. Here the study is made among the eleven situations inducing factors and to find out which situations has more influence in provoking the other situation inducing factors and result in life of young geration. With the help of expert’s opinion the data has been arrived. Since the data is linguistic by nature it makes it very difficult to analyze it with other mathematical tools. Fuzzy Cognitive Mapping is useful in such a way to analyze these linguistic data and make easier to drive the result. With FCM, it is understood addiction to mobile phones and social networks results in the development of negative behaviors which ultimately causes the imbalance of normal life has been studied in this paper. The following attributes are taken as the nodes of the FCM. A = {A1, A2, A3, A4, A5,A6, A7, A8, A9, A10, A11} where A1, A2, A3, A4, A5,A6, A7, A8, A9, A10, A11as A1- Neglecting daily obligations (Family life, work, college) A2- Poor performance at work or studies A3 -Health problems A4- Long time mobile taking and texting A5 - Night packages A6 - Disrupted sleep A7- Constantly checking face book comments Or twitter feels A8 - Distractions A9 - Constantly checking missed calls & messages A10 - Addiction on mobile phones and Social networks A11 - Depression A5 A7 A6 A4 A2 A11 A9 A8 A3 A1 A10 1 2 3 4 5 6 7 8 9 10 11 1 2 3 4 5 6 7 8 9 10 11 A A A A A A A A A A A A 0 0 0 0 0 0 0 0 0 0 0 A 0 0 0 0 0 0 0 A A A A A A A A A 0 0 0 1 0 1 0 0 0 0 0 0 0 0 0 1 1 1 0 0 1 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 1 1 0 0 0 0 0 0 0 0 1 1 0 0 0 0 0 1 0 1 0 0 1 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 1 0 1 0 1 1 0 1 0 0 1 1 1 0 0 0 0 1 0 0 0 0 0 0 0 0                                     on the dynamical system E is as follows: X = (0 0 0 1 0 0 0 0 0 0 0 0) XE = (1 2 2 0 0 1 1 2 1 0 0 1) ↪ (1 1 1 0 0 1 1 1 1 0 01) = X1 X1E = (1 0 2 0 0 1 4 0 1 9 0 0) ↪ (1 0 1 0 0 1 1 0 1 1 0 0) = X2 X2E = (3 0 1 0 0 1 3 0 0 5 0 0) ↪ (1 0 1 0 0 1 1 0 0 1 0 0) = X3 X3E = (3 0 1 0 0 1 3 0 0 5 0 0) ↪ (1 0 1 0 0 1 1 0 0 1 0 0) = X4 = X3 Here X3 is the hidden pattern and which is the fixed point. The result of the study indicates that the ON state areA1,A3,A6,A7,A10 that is neglecting daily obligation health problems and checking facebook comments or twitter feeds and addiction on mobile phones and social networks. IV. CONCLUSION Through the results it is understood addiction to mobile phones and social networks results in the development of negative behaviors which ultimately causes the imbalance of normal life. It is an undeniable fact that the use of mobile phones and social networks cannot be avoided completely. However, an individual can ensure that time spent on these activities should not affect the other important activities such as sleep, studies,
  • 4. Integrated Intelligent Research(IIR) International Journal of Business Intelligent Volume: 04 Issue: 01 June 2015,Pages No.11- 14 ISSN: 2278-2400 14 physical exercise, proper meals etc. to lead a well-balanced and healthy life. Future Direction The study is limited to behavioral attributes however it can be extended to psychological, social and interpersonal problems due to excessive time use on mobile phones and social networks. Also it can be extended to study how it affects the nation’s productivity. REFERENCES [1] Axelrod, R.(1976). Structure of decision: The cognitive maps of political elites. Princeton, NJ: Princeton university press. [2] Anna, L., Kari, T., & Anssi, A. (2006). Meta-analysis of mobile phone use and intracranial tumors. Scandinavian Journal of Work, Environment & Health, 32, 171-177. [3] Bakke, E. (2010). A model and measure of mobile communication competence. Human Communication Reseach, 36, 348-371. [4] Bianchi, A., & Phillips, J. G.(2005). Psychological predictors of problem mobile [5] phone use. CyberPsychology & Behavior. 8, 39-51. [6] Billieux, J., Linden, M., D,acremont, M., Ceschi, G., & Zermatten, A. (2007). Does impulsivity relate to perceived dependence on and actual use of mobile phone? Applied Cognitive Psychology, 21, 527-537. [7] Kosco, B.”Fuzzy Cognitive Maps” International journal of man-machine studies, January, (1986), 62-75 [8] Kosco, B., Neural Networks and Fuzzy Systems: A Dynamical Systems Approach to Machine Intelligence, Prentice Hall of India, 1997 [9] The American Association of Behavioral and Social Sciences Journal (The AABSS Journal, 2011, Volume15) [10]Vasantha Kandasamy W.B and Smarandache Florentin “Analysis of social aspects of migrant laborers living with HIV/AIDS using Fuzzy Theory and Neutrosophic Cognitive Maps”, Xiquan, Phoenix (2004) [11]Vasantha Kandasamy W.B and Smarandache Florentin“Fuzzy Cognitive Maps and Neutrosophic Cognitive Maps”, Xiquan, Phoenix (2003 [12] Vasantha Kandasamy W.B, Florentin Smarandacheand Ilanthenral, “Elementary fuzzy matrix theory andfuzzy models for social scientists”.(2007). [13]Tsandiras, A.K.and Mararitis , K.G.(1996). Using Crtainty neurons in Fuzzy Cognitive Maps , Neural Network World , 6,719 – 728.