TIIS (Çѱ¹ÀÎÅͳÝÁ¤º¸ÇÐȸ)
Current Result Document :
ÇѱÛÁ¦¸ñ(Korean Title) |
A Method of Finding Hidden Key Users Based on Transfer Entropy in Microblog Network |
¿µ¹®Á¦¸ñ(English Title) |
A Method of Finding Hidden Key Users Based on Transfer Entropy in Microblog Network |
ÀúÀÚ(Author) |
Wakeel Ahmad
S. M. Adnan Shah
Aun Irtaza
Meijuan Yin
Xiaonan Liu
Gongzhen He
Jing Chen
Ziqi Tang
Bo Zhao
Meijuan Yin
Xiaonan Liu
Gongzhen He
|
¿ø¹®¼ö·Ïó(Citation) |
VOL 14 NO. 08 PP. 3184 ~ 3200 (2020. 08) |
Çѱ۳»¿ë (Korean Abstract) |
|
¿µ¹®³»¿ë (English Abstract) |
Finding key users in microblog has been a research hotspot in recent years. There are two kinds of key users: obvious and hidden ones. Influence of the former is direct while that of the latter is indirect. Most of existing methods evaluate user's direct influence, so key users they can find usually obvious ones, and their ability to identify hidden key users is very low as hidden ones exert influence in a very covert way. Consequently, the algorithm of finding hidden key users based on topic transfer entropy, called TTE, is proposed. TTE algorithm believes that hidden key users are those normal users possessing a high covert influence on obvious ones. Firstly, obvious key users are discovered based on microblog propagation scale. Then, based on microblogs' topic similarity and time correlation, the transfer entropy from ordinary users' blogs to obvious key users is calculated and used to measure the covert influence. Finally, hidden influence degrees of ordinary users are comprehensively evaluated by combining above indicators with the influence of both ordinary users and obvious ones. We conducted experiments on Sina Weibo, and the results showed that TTE algorithm had a good ability to identify hidden key users.
|
Å°¿öµå(Keyword) |
Binary Patterns
Ternary Patterns
Directional Local Quinary Patterns
Classification
Early & Late Blight
Tomato
Apple
and Potato Disease
Hidden key users
microblog
obvious key users
influence
transfer entropy
Hidden key users
microblog
obvious key users
influence
transfer entropy
|
ÆÄÀÏ÷ºÎ |
PDF ´Ù¿î·Îµå
|