• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

¿µ¹® ³í¹®Áö

Ȩ Ȩ > ¿¬±¸¹®Çå > ¿µ¹® ³í¹®Áö > TIIS (Çѱ¹ÀÎÅͳÝÁ¤º¸ÇÐȸ)

TIIS (Çѱ¹ÀÎÅͳÝÁ¤º¸ÇÐȸ)

Current Result Document :

ÇѱÛÁ¦¸ñ(Korean Title) A Method of Finding Hidden Key Users Based on Transfer Entropy in Microblog Network
¿µ¹®Á¦¸ñ(English Title) A Method of Finding Hidden Key Users Based on Transfer Entropy in Microblog Network
ÀúÀÚ(Author) Wakeel Ahmad   S. M. Adnan Shah   Aun Irtaza   Meijuan Yin   Xiaonan Liu   Gongzhen He   Jing Chen   Ziqi Tang   Bo Zhao   Meijuan Yin   Xiaonan Liu   Gongzhen He                             
¿ø¹®¼ö·Ïó(Citation) VOL 14 NO. 08 PP. 3184 ~ 3200 (2020. 08)
Çѱ۳»¿ë
(Korean Abstract)
¿µ¹®³»¿ë
(English Abstract)
Finding key users in microblog has been a research hotspot in recent years. There are two kinds of key users: obvious and hidden ones. Influence of the former is direct while that of the latter is indirect. Most of existing methods evaluate user's direct influence, so key users they can find usually obvious ones, and their ability to identify hidden key users is very low as hidden ones exert influence in a very covert way. Consequently, the algorithm of finding hidden key users based on topic transfer entropy, called TTE, is proposed. TTE algorithm believes that hidden key users are those normal users possessing a high covert influence on obvious ones. Firstly, obvious key users are discovered based on microblog propagation scale. Then, based on microblogs' topic similarity and time correlation, the transfer entropy from ordinary users' blogs to obvious key users is calculated and used to measure the covert influence. Finally, hidden influence degrees of ordinary users are comprehensively evaluated by combining above indicators with the influence of both ordinary users and obvious ones. We conducted experiments on Sina Weibo, and the results showed that TTE algorithm had a good ability to identify hidden key users.
Å°¿öµå(Keyword) Binary Patterns   Ternary Patterns   Directional Local Quinary Patterns      Classification   Early & Late Blight   Tomato   Apple   and Potato Disease   Hidden key users   microblog   obvious key users   influence   transfer entropy   Hidden key users   microblog   obvious key users   influence   transfer entropy                          
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå