Monday, June 3, 2019
Context Inference from Social Networks
Context Inference from Social profitssContext Inference from Social Networks A Tie Strength Based ApproachSneha KamalReshmi.SAbstract All online sharing systems gather data that reflects users behavior and their sh bed activi weds. Relationship item betwixt two users is varying continuously. Static pro drop behindonist list in the fond network is unable to express it completely. Tie strength is used to quantitatively describe real social relations. It is base on lots of features derived from activi inter-group chats of a users in social network. We introduce a poser to visor compel strength in the midst of users in a given scope. Here a novel definition of delineate strength is introduced which exploits the existence of multiple online social links among the individuals. The proposed system infer the background from users fundamental interaction use the applications of Natural language processing systems and clustering techniques. From this context the tie strength amongst users are found. Then evaluates and analysis the performance of this model.Keywords- Clustering, Natural Language Processing, Social Context, Social Network, Tie StrengthI. IntroductionA tie is formed surrounded by two persons it they are friends or they have interactive behaviors in social network. Strength of a tie represents the degree of relationship between two entities and it merchantman be various. Tie strength in social network depends upon the exchange and transmission of information, and influence between social network users. The friend list of user is incompetent to reflect real social relation of users directly, because all friends are equally wielded. Interactive activities such as comment organize more sense in maintaining the relationship. So watertight tie may have more interactions.Strong ties are peoples which are we really trust. Although such trusted friendships empennage provide emotional and economic support. The majority of social media do no t incorporate tie strength in the creation and management of relationships, and treat all users the same either friend or stranger. The first attempt to take into meanation is the social role of a friendship was done by Facebook and Google+ by the introduction of the circles. Users can use circles as a technique to organize their contacts, creating different groups for relatives, work colleagues, close friends and so on. But this group of contacts does not provide quantitative information ab extinct the real strength of the ties.The most common technique used to measure the tie strength is the closeness of relationship. and so close friends have material tie while others have weak ties. Numerous other methods of strengthens have as well been proposed. This includes frequency of contacts and mutual acknowledgement of contacts. some other possible indicators of tie strength include extend of multiplicity with a tie, the duration of the contacts, the overlap of membership in an or ganization between the parties to a tie and the overlap of social circles. However, in our opinion these approaches have some shortcomings. Firstly, the intensity of conversations strongly depends from user to user, making it difficult to understand which of these conversations are dedicated to suggest relationships. Secondly, do not take into account that strong ties must be powered by a form of social grooming that is mainly based on geographical nearness and face-to-face contacts.Our contribution in this paper is assessing the tie strength between two friends on social network. Although distinguishing between strong and weak ties. For that we infer the thematic fields talked about by users with their contacts, is called the social contexts of a user. For this purpose we use the textual information such as picture show descriptions, comments, post of users. With users permission we gather such information. NLP techniques are applied to gather such information and find most relev ant information is called cross or word. A gear up of such a tag of a user is called the users personomy. The users social contexts come out after applying a clustering algorithm over this personomy and classifying the users contacts in these clusters. From this clusters find the users with more tie strength.II. Related WorksThe community can be extracted from social network based on the actions of users in 2. This method extracts the users that are similar in actions, interests or tastes as a community. Initially a small community will be formed consists of two or more users. Seeing the actions performed by their friends may make users curious. Therefore, similar small communities can be extended to form a larger community. Compared to other method extracted nodes in the communities may not have the best density.In 3 introduce the practical(prenominal) Tie Strength (VTS)-scale and their scoring methods appear to provide a valid and reliable measure of tie strength in virtual com munities. They developed a model that measures the tie-strength in virtual communities. The VTS-scale is able to distinguishing between two components of tie-strength associates and friendship. But, the content of to each one component needs more investigation.In 4 observe the communication patterns of millions of unstable phone users. That helps to concurrently study the topical anesthetic and the global structure of a society-wide communication network. Observe the coupling between interaction strengths and the networks local structure. Then weak ties are removed.In 5 four factors are proposed which depends upon the strength of the tie. They are time closeness intensity and reciprocal service. They argued that degree of overlap between the two individuals friendship network varies depending on the tie strength between the users. Tie strength is depends on the diffusion of influence and information. Most of the network model deals implicitly with strong ties.III. Proposed System The model takes the advantage of users interactions in social networks. It infers the social contexts in which users are involved and which of their contacts belongs to that context. The proposed method consists of 4 modules. They are context data generation, affinity propagation algorithm, context based clustering, tie strength of users. And the output is a community with puzzle of users.Figure 1. Proposed methodA. Context information GenerationIn this step obtain the interaction of a given user with all other users. In the case of facebook data of a finicky user is obtained from the post of the users and comments given to the photos etc. Then apply Natural Language Processing (NLP) to this collected information. It provides a predefined model for sentence splitting, tokenizing and POS tagging. POS tag method in NLP is applied here.B. judge Cloud GenerationInitially from the interaction of users stop words such as and,the,at etc. are removed. This will pass as an gossip to NLP . NLP will split the given text, using POS tagging. Which identifies each word as part-of-speech category such as Noun, Verb, etc. After keeping the noun and verb all other are removed. The resulting words will consider as a set of tags of a user whose interaction with others. The set of tag of u and v in a social interaction is denoted by T(luv), whose tag cloud is denoted by TC(luv).Figure 3 Tag Cloud of each userC. simile MeasurementThe main features of the algorithm are Tri-set calculation, similarity computation, seed construction and clustering.Tri set will consist of Cofeature garnish (CFS), Unilateral Feature Set (UFS), and Significant Cofeature Set (SCS).Cofeature Set Consider di and dj, be the two objects in a data set. Suppose that some features of di is also belong to dj. Therefore, construct a new subset consisting of these features and their determine in dj.Unilateral Feature Set Suppose that some features of di, does not belong to dj. Therefore, construct a new sub set consisting of these features and their values in di.Significant Cofeature Set Suppose that some features of di, also belong to the most significant features of dj. So, Therefore, construct a new subset consisting of these features and their values as the most significant features in dj.From this we can calculate the similarity between two points as (1)Where nm ,nq and np are the values of the features with in the set CFS SCS and UFS respectively. And CFS,UFS, and SCS, channelise the fig of tuples in CFS(i,j), UFS(i,j), and SCS(i,j)respectively. The set CFS is result of the intersection of the objects. UFS consists of unshared Features. SCS takes into account the most significant features.D. Inferring the Social ContextSeed resemblance Propagation Algorithm Seed Affinity Propagation (SAP) is a semi supervised clustering. The aim is from the initial labeled object we cluster the large number of unlabeled object efficiently. To guarantee accuracy and avoid a blind search for see ds we use Mean Features Selection method. The similarities between tags are passed as input to the algorithm in the form of matrix. The different locomote involved in algorithm areLet D be a data set which consists of set of features of each object and the value associated with these object.Construct the seed from a few labeled object using Mean feature selection Method. visualize the tri set between the object i and j(CFS(i,j), UFS(i,j), and SCS(i,j)).Similarity calculation between the object using the equation (1).Self similarity computation Calculate s (l,l) is the mean value of the similarities. These values are referred to as preferences.Initialize the matrixes of messagesMessage Matrix Computation Compute availability matrix a (i,j) and responsibility matrix r(i,j).Exemplar selection By adding the availability and responsibility matrixes we find the exemplar for each object i is the maximum of r(i,j) + a (i,j).Update the matrix usingRt+1 = (1-)Rt+ Rt-1 (2)At+1 = (1-)At+ At-1 (3)Where 0,1 is a damping factor. R and A represent the responsibility matrix and availability matrix respectively, and t indicate the iteration times.Iterating steps 6,7and 8 until the exemplar selection result stays constant for a number of iterations.Here the input to the algorithm is is the similarity between the tags mentioned above. It find a number of clusters, but we does not consider all the clusters. We choose K number of clusters base on a threshold value.2) Other users to social context After finding the context of a user, we find the other users with the same context. For finding the similarity compare the tag cloud formed during the interaction of u and v (TC(Iuv)), with the tags in the context of user u TC(cti).ctuv= (4)Similarity is calculated by using cosine similarity method. Two inputs will consider as vectors. And calculate the angle between these vectors. So the output will be a cluster consists of several users. From this cluster also we find users with str ong tie strength. Then the ads will post to this the wall of users who have strong tie strength.Figure 2. Inferring Social contextE. Tie Strength MeasurementsCluster consists of set of users. They are represented as a graph where nodes are users and edges represent the link between the users. From the given graph we find the tie strength between the users by using similarity and node interaction methods. Output is a weighted graph, where weight in the edge represents the value of tie strength between the two users.Where w represents the intensity of interaction between the nodes, so here we pass the tag weight between the users as w. Td is the set of neighbors of the nodes. If the value of Str(u,v) is greater, indicate that the tie strength between u and v is strong.Figure.5 Graphical Representation of Tie Strength between UsersIV. ApplicationsFind the community based on tie strength, so the users in the community may have similar interest. For providing publicity when the ad is pos ted in the users wall, its visibility will be limited to those of his contacts that share a strong tie with the user. So the companies can target the potential customers.V. ConclusionThe model takes the advantage of tie strength between the users in the social network to provide publicity to users. Here we applied NLP and data mining techniques. Interaction of users in social network is canvass using NLP and find Tag cloud of each user. Then calculated the semantic relationship between each tag in the tag cloud. Then apply affinity propagation and obtain the social context of each user. Then associate users in his contacts to the clusters. From this cluster we find the users with strong tie strength. The method will help the companies to find their potential users. Based on the interest of users we can post the corresponding ads to their walls.ReferencesLuca Pappalardo, Giulio Rossetti and Dino Pedreschi. How well do we know each other? detecting tie strength in multidimensional s ocial networks, 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining.Seyed Ahmad Moosavi and MehrdadJalali. Community espial in Online Social Networks Using Actions of Users,978-1-4799-3351-8/14/$31.00 2014 IEEE.Andrea Petrczi and Tams Nepusz. Measuring tie-strength in virtual social networks http//www.insna.org/Connections-Web/Volume27-2/5.Petrczi.pdf.J.P. Onnela and J. Sarama ki. Structure and tie srength in mobile communication network, PNAS published online April 24, 2007.Mark S. Granovetter The Strength of Weak Ties, American Journal of Sociology Volume 78 Issue6 (May 1973) 1360-1380.Yaxi He, Chunhong Zhang and Yang Ji. Principle Features for Tie Strength Estimation in Micro-blog Social Network 2012 IEEE 12th International Conference on Computer and Information Technology.Renchu Guan and Xiaohu Shi, Text Clustering with Seeds AffinityPropagation, IEEE Transactions on Knowledge and Data Engineering, Vol. 23, NO. 4, April 2011.T. Pedersen , S. Patwardhan, and J. Michelizzi Wordnet Similarity Measuring the relatedness of concepts, .Demonstration Papers atHLT-NAACL 2004, 2004, pp. 3841, Association for Computational Linguistics.FakhriHasanzadeh and MehrdadJalali, Detecting Communities in Social Networks by Techniques of Clustering and Analysis of Communications,978-1-4799-3351-8/14/$31.00 2014 IEEE.B. Frey and D. Dueck,Clustering by transient messages between datapoints, Science, vol. 315, no. 5814, pp. 972976, 2007.Sandra Servia-Rodrguez, Ana Fernndez-Vilas, Rebeca P. Daz-Redondo, and Jos J. Pazos-Arias. Inferring Contexts From Facebook Interactions A Social Publicity Scenario, IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 15, NO. 6, OCTOBER 2013.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment