Mining of Leaders in Mobile Telecom Social Networks

Author(s):  
Mantian (Mandy) Hu

In the age of Big Data, the social network data collected by telecom operators are growing exponentially. How to exploit these data and mine value from them is an important issue. In this article, an accurate marketing strategy based on social network is proposed. The strategy intends to help telecom operators to improve their marketing efficiency. This method is based on mutual peers' influence in social network, by identifying the influential users (leaders). These users can promote the information diffusion prominently. A precise marketing is realized by taking advantage of the user's influence. Data were collected from China Mobile and analyzed. For the massive datasets, the Apache Spark was chosen for its good scalability, effectiveness and efficiency. The result shows a great increase of the telecom traffic, compared with the result without leader identification.

2017 ◽  
Vol 2 (2) ◽  
pp. 60
Author(s):  
Zainab Nayyar ◽  
Nousheen Hashmi ◽  
Nazish Rafique ◽  
Khurram Mahmood

The main purpose of analyzing the social network data is to observe the behaviors and trends that are followed by people. How people interact with each other, what they usually share, what are their interests on social networks, so that analysts can focus on new trends for the provision of those aspects which are of great interest for people so in this research article an easy approach of gathering and analyzing data through keyword based search in social networks is examined using NodeXL and data is gathered from twitter in which political trends have been analyzed. As a result the political trends among people are analyzed.


Information ◽  
2020 ◽  
Vol 11 (6) ◽  
pp. 306
Author(s):  
Nikolaus Nova Parulian ◽  
Tiffany Lu ◽  
Shubhanshu Mishra ◽  
Mihai Avram ◽  
Jana Diesner

Observed social networks are often considered as proxies for underlying social networks. The analysis of observed networks oftentimes involves the identification of influential nodes via various centrality measures. This paper brings insights from research on adversarial attacks on machine learning systems to the domain of social networks by studying strategies by which an adversary can minimally perturb the observed network structure to achieve their target function of modifying the ranking of a target node according to centrality measures. This can represent the attempt of an adversary to boost or demote the degree to which others perceive individual nodes as influential or powerful. We study the impact of adversarial attacks on targets and victims, and identify metric-based security strategies to mitigate such attacks. We conduct a series of controlled experiments on synthetic network data to identify attacks that allow the adversary to achieve their objective with a single move. We then replicate the experiments with empirical network data. We run our experiments on common network topologies and use common centrality measures. We identify a small set of moves that result in the adversary achieving their objective. This set is smaller for decreasing centrality measures than for increasing them. For both synthetic and empirical networks, we observe that larger networks are less prone to adversarial attacks than smaller ones. Adversarial moves have a higher impact on cellular and small-world networks, while random and scale-free networks are harder to perturb. Also, empirical networks are harder to attack than synthetic networks. Using correlation analysis on our experimental results, we identify how combining measures with low correlation can aid in reducing the effectiveness of adversarial moves. Our results also advance the knowledge about the robustness of centrality measures to network perturbations. The notion of changing social network data to yield adversarial outcomes has practical implications, e.g., for information diffusion on social media, influence and power dynamics in social systems, and developing solutions to improving network security.


Author(s):  
Vijayaganth V.

Social networks have increased momentously in the last decade. Individuals are depending on interpersonal organizations for data, news, and the assessment of different clients on various topics. These issues often make social network data very complex to analyze manually, resulting in the persistent use of computational means for analyzing them. Data mining gives a variety of systems for identifying helpful learning from huge datasets and a wide range of techniques for detecting useful knowledge from massive datasets like trends, patterns and rules. This chapter discusses different data mining techniques used in mining social networks.


Methodology ◽  
2006 ◽  
Vol 2 (1) ◽  
pp. 42-47 ◽  
Author(s):  
Bonne J. H. Zijlstra ◽  
Marijtje A. J. van Duijn ◽  
Tom A. B. Snijders

The p 2 model is a random effects model with covariates for the analysis of binary directed social network data coming from a single observation of a social network. Here, a multilevel variant of the p 2 model is proposed for the case of multiple observations of social networks, for example, in a sample of schools. The multilevel p 2 model defines an identical p 2 model for each independent observation of the social network, where parameters are allowed to vary across the multiple networks. The multilevel p 2 model is estimated with a Bayesian Markov Chain Monte Carlo (MCMC) algorithm that was implemented in free software for the statistical analysis of complete social network data, called StOCNET. The new model is illustrated with a study on the received practical support by Dutch high school pupils of different ethnic backgrounds.


2019 ◽  
pp. 81-93
Author(s):  
Iliya L. Musabirov ◽  

The article presents a description of the approach to the use of data visualization in various educational Analytics tools when building University courses. In addition to the analysis of educational behavior, socio-psychological approaches, including the theory of expectations and social values, and the social network approach, are separately considered as prospects for analysis. An example of designing training Analytics using modern data analysis and visualization tools is analyzed.


Author(s):  
A S Mukhin ◽  
I A Rytsarev ◽  
R A Paringer ◽  
A V Kupriyanov ◽  
D V Kirsh

The article is devoted to the definition of such groups in social networks. The object of the study was selected data social network Vk. Text data was collected, processed and analyzed. To solve the problem of obtaining the necessary information, research was conducted in the field of optimization of data collection of the social network Vk. A software tool that provides the collection and subsequent processing of the necessary data from the specified resources has been developed. The existing algorithms of text analysis, mainly of large volume, were investigated and applied.


E-Marketing ◽  
2012 ◽  
pp. 185-197
Author(s):  
Przemyslaw Kazienko ◽  
Piotr Doskocz ◽  
Tomasz Kajdanowicz

The chapter describes a method how to perform a classification task without any demographic features and based only on the social network data. The concept of such collective classification facilitates to identify potential customers by means of services used or products purchased by the current customers, i.e. classes they belong to as well as using social relationships between the known and potential customers. As a result, a personalized offer can be prepared for the new clients. This innovative marketing method can boost targeted marketing campaigns.


Author(s):  
Przemyslaw Kazienko ◽  
Piotr Doskocz ◽  
Tomasz Kajdanowicz

The chapter describes a method how to perform a classification task without any demographic features and based only on the social network data. The concept of such collective classification facilitates to identify potential customers by means of services used or products purchased by the current customers, i.e. classes they belong to as well as using social relationships between the known and potential customers. As a result, a personalized offer can be prepared for the new clients. This innovative marketing method can boost targeted marketing campaigns.


2019 ◽  
Vol 2 (1) ◽  
pp. 99-122 ◽  
Author(s):  
Katherine Faust ◽  
George E. Tita

Over the past decade, a considerable literature has emerged within criminology stemming from the collection of social network data and the adoption of social network analysis by a cadre of scholars. We review recent contributions to four areas of crime research: co-offending networks, illicit networks, gang-rivalry networks, and neighborhoods and crime. Our review highlights potential pitfalls that one might encounter when using social networks in criminological research and points to fruitful directions for further research. In particular, we recommend paying special attention to the clear specifications of what ties in the network are assumed to be doing, potential measurement weaknesses that can arise when using police or investigative data to construct a network, and understanding dynamic social network processes related to criminological outcomes. We envision a bright future in which the social network perspective will be more fully integrated into criminological theories, analyses, and applications.


2013 ◽  
Vol 427-429 ◽  
pp. 2188-2191
Author(s):  
Lei Liu ◽  
Quan Bao Gao

The rapid development of network and information technology makes the network become the indispensable part in people's life. Network design uses email as a starting point, instead of actual letters. Then Happy Nets, BBS etc. are evolved from it, with virtual as their major feature. In the process of social networks evolution, the personal image transformed from the actual into the virtual one. All this has contributed to the birth of the social network, which then makes the contacts among people presenting the feature of network expansion and cost reduction. The popular social network nowadays is considered to be social plus network, namely, through the network, as a carrier, people are connected to form a virtual community with certain characteristics. Based on the genetic algorithm and genetic coding technology, the article is designed to make the optimal data analysis and create a optimistic cyber environment in the process of the social networks explosive development.


Sign in / Sign up

Export Citation Format

Share Document