Skip to main content

A Method of Internet-Analysis by the Tools of Graph Theory

  • Conference paper
Intelligent Decision Technologies

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 15))

Abstract

The developed method and its interpretation as a graph model have demonstrated the possibility of the use of optimization methods and further analysis tools in the Internet-analysis. This method has been mathematically formalized and implemented with the aid of linear programming tools. Secondly, the practical implementation of the method has proved that this method has mathematical base and allows a researcher to aggregate statistics [1]. Finally, this analysis can be used as a methodological basis for a preliminary study of the interests of young scientists and graduate students. This may likely provide an objective assessment of the relevance of ongoing or planned research in virtually some limited [1] areas of interest (science’s researches, science’s activity, and etc.).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Zipf, G.K.: Human Behavior and the Principle of Least Effort. Addison-Wesley, Cambridge (1949)

    Google Scholar 

  2. Kavun, S.: Informational security: textbook / Kavun, S., vol. 368. Pub. of INZHEK, Kharkiv (2009)

    Google Scholar 

  3. Ponomarenko, V.: Conceptual foundations of economic security: monograph / Ponomarenko, V., Kavun, S., vol. 256. Pub. INZHEK, Kharkiv (2008)

    Google Scholar 

  4. Landauer, T.K., Foltz, P.W., Laham, D.: An Introduction to Latent Semantic Analysis. Discourse Processes 25, 259–284 (1998)

    Article  Google Scholar 

  5. Kavun, S.: Analysis of categorical apparatus in the field of economic and information security / Kavun S, Mikhalchuk I / Economic of development: Science magazine, vol. 3 (51), pp. 9–14. Pub. INZHEK, Kharkiv (2009)

    Google Scholar 

  6. Kavun, S.: Model of insiders in the company. In: Kavun, S., Sorbat, I. (eds.) Securitatea Informaţională: ed. a 5-a Jubiliară Conf. Intern., April 16-17, vol. 76, ASEM, Chişinău (2008)

    Google Scholar 

  7. Shkarlet, S.: The economic security of enterprise: innovation aspect: monograph / Shkarlet, S., vol. 436. Books view of the NAU, Kiev (2007)

    Google Scholar 

  8. Kurkin, N.: Managing the economic security of the enterprise: monograph/ Kurkin, N., vol. 452. Art-Press, Dnepropetrovsk (2004)

    Google Scholar 

  9. Senchagov, V.: Strategic objectives mechanism to ensure the economic security. In: Senchagov, V.: Problems of Theory and Practice of Management, vol. (3), pp. 18–23 (2009)

    Google Scholar 

  10. Ponomarenko, V., Klebanova, T., Chernov, N.: Economic security in the region: analysis, evaluation, and prediction: monograph, vol. 143. INZHEK, Kh (2004)

    Google Scholar 

  11. Geyets, V.: The modeling of economic security: power, region, enterprise: monograph / Geyets, V., Kizim, M., Klebanova, T., Chernyak, O., vol. 240. Pub. INZHEK, Kharkiv (2006)

    Google Scholar 

  12. Oleynikov, E.: Principles of Economic Security (State, region, company, person. In: Oleynikov, E. (ed.) Moscow: JSC "Business School" Intelligence-Synthesis, vol. 288 (1997)

    Google Scholar 

  13. Kavun, S.: Method for constructing a security policy organization. In: Kavun, S., Shubina, G.: Business-Inform., vol. (1-2), pp. 96–102 (2005)

    Google Scholar 

  14. Murdoch, C.: Economic factors as objects of security: Economics security & vulnerability. In: Knorr, K., Trager, F.: Economics Interests & National Security, vol. 867, Lawrence (2001)

    Google Scholar 

  15. Eric Johnson, M.: Managing Information Risk and the Economics of Security, 1st edn. Interperiodica distributed exclusively, vol. 347. Springer Science + Business Media LLC (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sergii V. Kavun .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kavun, S.V., Mykhalchuk, I.V., Kalashnykova, N.I., Zyma, O.G. (2012). A Method of Internet-Analysis by the Tools of Graph Theory. In: Watada, J., Watanabe, T., Phillips-Wren, G., Howlett, R., Jain, L. (eds) Intelligent Decision Technologies. Smart Innovation, Systems and Technologies, vol 15. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29977-3_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-29977-3_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-29976-6

  • Online ISBN: 978-3-642-29977-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics