Saturday, March 30, 2019
Context Inference from Social Networks
Context consequence from hearty Ne tworksContext Inference from Social Networks A Tie cleverness Based ApproachSneha KamalReshmi.S revoke All online sharing systems gather entropy that weighs users behavior and their sh ard activi cross stick tos. Relationship gradation surrounded by two users is varying continuously. passive friend list in the companionable mesh topology is unable to expect it completely. Tie speciality is used to quantitatively describe real sociable relations. It is found on lots of brags derived from activi sleeping cars of a users in kind engagement. We introduce a assume to measure pull back long suit among users in a stipulation context. Here a wise definition of tie stance is introduced which exploits the existence of multiple online social relate amid the individuals. The proposed system infer the context from users fundamental interaction using the applications of inwrought language processing methods and clustering techniques. From this context the tie personnel among users atomic piece 18 found. and so evaluates and analysis the performance of this model.Key invents- Clustering, Natural Language Processing, Social Context, Social Network, Tie StrengthI. IntroductionA tie is form amidst two persons it they are friends or they brace interactive behaviors in social earnings. Strength of a tie represents the degree of relationship between two entities and it can be various. Tie strength in social network depends upon the exchange and transmission of information, and influence between social network users. The friend list of user is incompetent to reflect real social relation of users directly, because all(a) friends are equally treated. synergistic activities such as comment make more sense in maintaining the relationship. So sinewy tie may defecate more interactions. healthful ties are peoples which are we really trusted. Although such trusted friendships can bear emotional and economic suppor t. The majority of social media do non comprise tie strength in the creation and management of relationships, and treat all users the same either friend or stranger. The first attempt to harbour into consideration is the social role of a friendship was done by Facebook and Google+ by the introduction of the circles. Users can use circles as a technique to organize their contacts, creating different convocations for relatives, work colleagues, close friends and so on. But this group of contacts does not provide quantitative information about the real strength of the ties.The about common technique used to measure the tie strength is the closeness of relationship. Thus close friends have impregnable tie spot new(prenominal)s have weak ties. Numerous other methods of strengthens have also been proposed. This entangles oftenness of contacts and mutual ac copeledgement of contacts. Other possible indicators of tie strength include extend of multiplicity with a tie, the duration of the contacts, the overlap of membership in an organization between the parties to a tie and the overlap of social circles. However, in our opinion these approaches have round shortcomings. Firstly, the fanaticism of conversations self-coloredly depends from user to user, devising it difficult to understand which of these conversations are dedicated to intimate relationships. Secondly, do not take into account that strong ties must be powered by a form of social grooming that is mainly based on geographical nearness and face-to-face contacts.Our contribution in this paper is assessing the tie strength between two friends on social network. Although distinguishing between strong and weak ties. For that we infer the thematic fields talked about by users with their contacts, is called the social contexts of a user. For this purpose we use the textual information such as photo descriptions, comments, post of users. With users permission we gather such information. human language technology techniques are applied to gather such information and find most pertinent information is called smidgen or word. A set of such a tag of a user is called the users personomy. The users social contexts come out after collapseing a clustering algorithm over this personomy and classifying the users contacts in these clusters. From this clusters find the users with more tie strength.II. Related WorksThe friendship can be extracted from social network based on the actions of users in 2. This method extracts the users that are similar in actions, interests or tastes as a community. Initially a small community will be formed consists of two or more users. visual perception the actions performed by their friends may make users curious. T herefore, similar small communities can be extended to form a larger community. Compared to other method extracted nodes in the communities may not have the best density.In 3 introduce the realistic Tie Strength (VTS)-scale and their scorin g methods appear to provide a legal and reliable measure of tie strength in virtual communities. They true a model that measures the tie-strength in virtual communities. The VTS-scale is able to distinguishing between two components of tie-strength associates and friendship. But, the content of individually component needs more investigation.In 4 chance upon the communication patterns of millions of mobile phone users. That helps to concurrently study the local and the world-wide structure of a society-wide communication network. Observe the coupling between interaction strengths and the networks local structure. Then weak ties are removed.In 5 four factors are proposed which depends upon the strength of the tie. They are time closeness intensity and reciprocal service. They argued that degree of overlap between the two individuals friendship network varies depending on the tie strength between the users. Tie strength is depends on the diffusion of influence and information. Mo st of the network model deals implicitly with strong ties.III. Proposed SystemThe model takes the advantage of users interactions in social networks. It infers the social contexts in which users are involved and which of their contacts belongs to that context. The proposed method consists of 4 modules. They are context information generation, affinity propagation algorithm, context based clustering, tie strength of users. And the output is a community with set of users.Figure 1. Proposed methodA. Context entropy GenerationIn this step obtain the interaction of a given user with all other users. In the case of facebook data of a particular user is obtained from the post of the users and comments given to the photos etc. Then apply Natural Language Processing (NLP) to this collected information. It provides a predefined model for meter splitting, tokenizing and POS tagging. POS tag method in NLP is applied here.B. Tag cloud GenerationInitially from the interaction of users stop words such as and,the,at etc. are removed. This will pass as an comment to NLP. NLP will split the given text, using POS tagging. Which identifies each word as part-of-speech category such as Noun, Verb, etc. After keeping the noun and verb all other are removed. The resulting words will consider as a set of tags of a user whose interaction with others. The set of tag of u and v in a social interaction is denoted by T(luv), whose tag cloud is denoted by TC(luv).Figure 3 Tag denigrate of each userC. affinity MeasurementThe main features of the algorithm are Tri-set calculation, affinity computation, informant seduceion and clustering.Tri set will consist of Cofeature circle (CFS), Unilateral Feature go by (UFS), and Significant Cofeature Set (SCS).Cofeature Set care di and dj, be the two objects in a data set. Suppose that some features of di is also belong to dj. Therefore, construct a new subset consisting of these features and their prys in dj.Unilateral Feature Set S uppose that some features of di, does not belong to dj. Therefore, construct a new subset consisting of these features and their values in di.Significant Cofeature Set Suppose that some features of di, also belong to the most significant features of dj. So, Therefore, construct a new subset consisting of these features and their values as the most significant features in dj.From this we can calculate the similarity between two points as (1)Where nm ,nq and np are the values of the features with in the set CFS SCS and UFS respectively. And CFS,UFS, and SCS, indicate the name of tuples in CFS(i,j), UFS(i,j), and SCS(i,j)respectively. The set CFS is result of the intersection of the objects. UFS consists of unshared Features. SCS takes into account the most significant features.D. Inferring the Social ContextSeed Affinity Propagation algorithm Seed Affinity Propagation (SAP) is a semi supervised clustering. The consume is from the initial labeled object we cluster the large number o f unlabelled object efficiently. To guarantee accuracy and avoid a blind lookup for seeds we use Mean Features Selection method. The similarities between tags are passed as input to the algorithm in the form of matrix. The different steps involved in algorithm areLet D be a data set which consists of set of features of each object and the value associated with these object.Construct the seed from a few labeled object using Mean feature selection Method.Calculate the tri set between the object i and j(CFS(i,j), UFS(i,j), and SCS(i,j)).Similarity calculation between the object using the equation (1).Self similarity computation Calculate s (l,l) is the mean value of the similarities. These values are referred to as preferences.Initialize the matrixes of messagesMessage Matrix Computation Compute availableness matrix a (i,j) and responsibility matrix r(i,j).Exemplar selection By adding the availability and responsibility matrixes we find the exemplar for each object i is the maximum of r(i,j) + a (i,j).Update the matrix usingRt+1 = (1-)Rt+ Rt-1 (2)At+1 = (1-)At+ At-1 (3)Where 0,1 is a damping factor. R and A represent the responsibility matrix and availability matrix respectively, and t indicate the iteration times.Iterating steps 6,7and 8 until the exemplar selection result stays constant for a number of iterations.Here the input to the algorithm is is the similarity between the tags mentioned above. It find a number of clusters, but we does not consider all the clusters. We choose K number of clusters base on a threshold value.2) Other users to social context After finding the context of a user, we find the other users with the same context. For finding the similarity compare the tag cloud formed during the interaction of u and v (TC(Iuv)), with the tags in the context of user u TC(cti).ctuv= (4)Similarity is calculated by using cosine similarity method. Two inputs will consider as vectors. And calculate the angle between these vectors. So the output will be a cluster consists of some(prenominal) users. From this cluster also we find users with strong tie strength. Then the ads will post to this the wall of users who have strong tie strength.Figure 2. Inferring Social contextE. Tie Strength MeasurementsCluster consists of set of users. They are represented as a graph where nodes are users and edges represent the link between the users. From the given graph we find the tie strength between the users by using similarity and node interaction methods. Output is a dull graph, where weight in the edge represents the value of tie strength between the two users.Where w represents the intensity of interaction between the nodes, so here we pass the tag weight between the users as w. Td is the set of neighbors of the nodes. If the value of Str(u,v) is greater, indicate that the tie strength between u and v is strong.Figure.5 vivid Representation of Tie Strength between UsersIV. ApplicationsFind the community based on tie strength, so the us ers in the community may have similar interest. For providing publicity when the ad is posted in the users wall, its visibility will be limited to those of his contacts that share a strong tie with the user. So the companies can target the potential customers.V. ConclusionThe model takes the advantage of tie strength between the users in the social network to provide publicity to users. Here we applied NLP and data mine techniques. Interaction of users in social network is analyzed using NLP and find Tag cloud of each user. Then calculated the semantic relationship between each tag in the tag cloud. Then apply affinity propagation and obtain the social context of each user. Then associate users in his contacts to the clusters. From this cluster we find the users with strong tie strength. The method will help the companies to find their potential users. Based on the interest of users we can post the corresponding ads to their walls.ReferencesLuca Pappalardo, Giulio Rossetti and Dino Pedreschi. How well do we know each other? detecting tie strength in 2-dimensional social networks, 2012 IEEE/ACM International convention on Advances in Social Networks epitome and Mining.Seyed Ahmad Moosavi and MehrdadJalali. Community Detection in Online Social Networks Using Actions of Users,978-1-4799-3351-8/14/$31.00 2014 IEEE.Andrea Petrczi and tam-o-shanters Nepusz. Measuring tie-strength in virtual social networks http//www.insna.org/Connections-Web/Volume27-2/5.Petrczi.pdf.J.P. Onnela and J. Sarama ki. Structure and tie srength in mobile communication network, PNAS published online April 24, 2007.Mark S. Granovetter The Strength of wakeful Ties, American Journal of Sociology Volume 78 Issue6 (May 1973) 1360-1380.Yaxi He, Chunhong Zhang and Yang Ji. Principle Features for Tie Strength Estimation in Micro-blog Social Network 2012 IEEE 12th International Conference on Computer and Information Technology.Renchu Guan and Xiaohu Shi, Text Clustering with Seeds Affinity Propagation, IEEE proceedings on Knowledge and Data Engineering, Vol. 23, NO. 4, April 2011.T. Pedersen, S. Patwardhan, and J. Michelizzi Wordnet Similarity Measuring the relatedness of concepts, .Demonstration text file atHLT-NAACL 2004, 2004, pp. 3841, Association for Computational Linguistics.FakhriHasanzadeh and MehrdadJalali, Detecting Communities in Social Networks by Techniques of Clustering and Analysis of Communications,978-1-4799-3351-8/14/$31.00 2014 IEEE.B. Frey and D. Dueck,Clustering by passing messages between datapoints, Science, vol. 315, no. 5814, pp. 972976, 2007.Sandra Servia-Rodrguez, Ana Fernndez-Vilas, Rebeca P. Daz-Redondo, and Jos J. Pazos-Arias. Inferring Contexts From Facebook Interactions A Social Publicity Scenario, IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 15, NO. 6, OCTOBER 2013.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment