Keyword Selection Methodology for Identification of Major Events using Social Networks

Author(s):  
Eitan Bahir ◽  
Ammatzia. Peled

The understanding of information communicated over social networks enables quick tracking of real events as they occur. In other cases, where the “crowd” factor is on high note, it is possible to identify events and to evaluate their magnitude, even before they occur. A full assessment of the content generated by social network users is very complex. This, due to the gigantic volume of data communicated over the net at any given time. Using few, well defined, keywords for the detection of relevant data reduces, considerably, the processing effort and expedites the identification of events, such as wildfire, floods or terror attacks. The preliminary results here has shown that by using keywords, specially tailored for different types of major events, one may detect ‘abnormal' surges of social network activities. Also, presented are threshold values, in terms of magnitude and frequency designed for early detection of these events. This approach is the basis for the development of algorithms for early identification real time systems and for geographical tracking of major events.

Author(s):  
Kousik Das ◽  
Rupkumar Mahapatra ◽  
Sovan Samanta ◽  
Anita Pal

Social network is the perfect place for connecting people. The social network is a social structure formed by a set of nodes (persons, organizations, etc.) and a set of links (connection between nodes). People feel very comfortable to share news and information through a social network. This chapter measures the influential persons in different types of online and offline social networks.


Author(s):  
Jia Xu

In most embedded, real-time applications, processes need to satisfy various important constraints and dependencies, such as release times, offsets, precedence relations, and exclusion relations. Embedded, real-time systems with high assurance requirements often must execute many different types of processes with such constraints and dependencies. Some of the processes may be periodic and some of them may be asynchronous. Some of the processes may have hard deadlines and some of them may have soft deadlines. For some of the processes, especially the hard real-time processes, complete knowledge about their characteristics can and must be acquired before run-time. For other processes, prior knowledge of their worst case computation time and their data requirements may not be available. It is important for many embedded real-time systems to be able to simultaneously satisfy as many important constraints and dependencies as possible for as many different types of processes as possible. In this paper, we discuss what types of important constraints and dependencies can be satisfied among what types of processes. We also present a method which guarantees that, for every process, no matter whether it is periodic or asynchronous, and no matter whether it has a hard deadline or a soft deadline, as long as the characteristics of that process are known before run-time, then that process will be guaranteed to be completed before predetermined time limits, while simultaneously satisfying many important constraints and dependencies with other processes.


Author(s):  
Weiyu Zhang ◽  
Rong Wang

This paper examines interest-oriented vs. relationship-oriented social network sites in China and their different implications for collective action. By utilizing a structural analysis of the design features and a survey of members of the social networks, this paper shows that the way a social network site is designed strongly suggests the formation and maintenance of different types of social ties. The social networks formed among strangers who share common interests imply different types of collective action, compared to the social networks that aim at the replication and strengthening of off-line relationships.


2014 ◽  
Vol 2014 ◽  
pp. 1-13 ◽  
Author(s):  
Katarzyna Musial ◽  
Piotr Bródka ◽  
Przemysław Kazienko ◽  
Jarosław Gaworecki

The data gathered in all kinds of web-based systems, which enable users to interact with each other, provides an opportunity to extract social networks that consist of people and relationships between them. The emerging structures are very complex due to the number and type of discovered connections. In web-based systems, the characteristic element of each interaction between users is that there is always an object that serves as a communication medium. This can be, for example, an e-mail sent from one user to another or post at the forum authored by one user and commented on by others. Based on these objects and activities that users perform towards them, different kinds of relationships can be identified and extracted. Additional challenge arises from the fact that hierarchies can exist between objects; for example, a forum consists of one or more groups of topics, and each of them contains topics that finally include posts. In this paper, we propose a new method for creation of multilayered social network based on the data about users activities towards different types of objects between which the hierarchy exists. Due to the flattening, preprocessing procedure of new layers and new relationships in the multilayered social network can be identified and analysed.


Author(s):  
Zakaria Maamar ◽  
Noura Faci ◽  
Soraya Kouadri Mostéfaoui ◽  
Fahim Akhter

This paper discusses a framework that supports weaving social elements into mobile commerce applications. This weaving takes place through different types of social networks that identify the stakeholders taking part in completing these applications. These stakeholders are consumers, providers, and brokers and are connected to each other through relationships such as competition, referral, loyalty, and collaboration. Each relationship is mapped onto a social network upon which a stakeholder relies before engaging in any of these applications and afterwards, making any decision. The value of social networks added to mobile commerce is illustrated with a set of experiments implementing a smart mobile restaurant guide.


2015 ◽  
Vol 29 (13) ◽  
pp. 1550061 ◽  
Author(s):  
Ke Li ◽  
Hui-Jia Li ◽  
Hao Wang

Since the existence of certain and uncertain characteristics of the relationships between nodes in social network, the study of social features is expanded by combining the set pair analysis and social computing. In this paper, a new method is created to describe nodes relationship situation in social network, i.e. set pair relationship situation, including generalized set pair relationship situation, generalized set pair close situation and generalized set pair loosen situation. In order to analyze the situation in social network, each kind of set pair relation situation are classified. Combining with the complexity of the social network system and the features of connection entropy, generalized connection entropy which used to express the complexity of social networks is proposed. It includes the generalized same entropy, the generalized difference entropy, and the generalized opposite entropy. These different types of entropies can be used to analyze the social network relationship stability from a more theoretical view. Then a situation analysis model and the corresponding algorithm is proposed. Finally the effectiveness of this method in analyzing the relationships in social networks is proved. Thus, our model can be used to reveal the relationship between social network and node state stability efficiently.


2011 ◽  
Vol 2011 ◽  
pp. 1-9
Author(s):  
Fang You ◽  
Jianping Liu ◽  
Xinjian Guan ◽  
Jianmin Wang ◽  
Zibin Zheng ◽  
...  

Massively multiplayer online role-playing games (MMORPGs) have great potential as sites for research within the social and human-computer interaction. In the MMORPGs, a stability player taxonomy model is very important for game design. It helps to balance different types of players and improve business strategy of the game. The players in mobile MMORPGs are also connected with social networks; many studies only use the player's own attributes statistics or questionnaire survey method to predict player taxonomy, so lots of social network relations' information will be lost. In this paper, by analyzing the impacts of player's social network, commercial operating data from mobile MMORPGs is used to establish our player taxonomy model (SN model). From the model results, social network-related information in mobile MMORPGs will be considered as important factors to pose this optimized player taxonomy model. As experimental results showed, compared with another player taxonomy model (RA model), our proposed player taxonomy model can achieve good results: classification is more stable.


2021 ◽  
Author(s):  
V.V. Vasilkova ◽  
N.I. Legostaeva

Nowadays, in the field of social bots investigations, we can observe a new research trend — a shift from a technology-centered to sociology-centered interpretations. It leads to the creation of new perspectives for sociology: now the phenomenon of social bots is not only considered as one of the efficient manipulative technologies but has a wider meaning: new communicative technologies have an informational impact on the social networks space. The objective of this research is to assess the new approaches of the established social bots typologies (based on the fields of their usage, objectives, degree of human behavior imitation), and also consider the ambiguity and controversy of the use of such typologies using the example of botnets operating in the VKontakte social network. A method of botnet identification is based on comprehensive methodology developed by the authors which includes the frequency analysis of published messages, botnet profiling, statistical analysis of content, analysis of botnet structural organization, division of content into semantic units, forming content clusters, content analysis inside the clusters, identification of extremes — maximum number of unique texts published by botnets in a particular cluster for a certain period. The methodology was applied for the botnet space investigation of Russian online social network VKontakte in February and October 2018. The survey has fixed that among 10 of the most active performing botnets, three botnets were identified that demonstrate the ambiguity and controversy of their typologization according to the following criteria: botnet “Defrauded shareholders of LenSpetsStroy” — according to the field of their usage, botnet “Political news in Russian and Ukrainian languages” — according to their objectives, botnet “Ksenia Sobchak” — according to the level of human behavior imitation. The authors identified the prospects for sociological analysis of different types of bots in a situation of growing accessibility and routinization of bot technologies used in social networks. Keywords: social bots, botnets, classification, VKontakte social network


2019 ◽  
Vol 25 (2) ◽  
pp. 915-933
Author(s):  
Mª Cruz López de Ayala López ◽  
Pedro Paniagua Santamaría

Young people show very high and intensive levels of social networks use. However, users have different levels of involvement as regards their degree of interactivity in these platforms. Supported by uses and gratifications theory and applying a factor analysis, the motivations that explain their participation in several profiles of social networks and differences between those who do and those who do not comment are analysed. Based on a self-administered survey of 461 young university students, the main conclusions include the diversity of nuances in the combinations of reasons that explain participation in different types of profiles on social networks; particularly worth highlighting are the similarities between profiles of NGOs and those of celebrities. Also of note is the tendency of users who comment on commercial, political, social and leisure profiles to display motivations linked to searching for information, being useful, influencing others, interacting and showing adhesion, depending on the sphere.


2021 ◽  
Vol 30 (05) ◽  
pp. 2150024
Author(s):  
Minh-Tien Nguyen ◽  
Tri-Thanh Nguyen ◽  
Asanobu Kitamoto ◽  
Van-Hau Nguyen

Social networks, e.g. Twitter, have been proved to be almost real-time systems for spreading information, that provide a valuable information channel in emergencies, e.g. disasters. This paper presents a framework designed to distill actionable tweets. The framework tackles the diversity, large volume, and noise of tweets for providing users live information for quick responses. To do that, our framework first retrieves a large number of tweets to ensure the diversity. It next removes irrelevant and indirect tweets for reducing the volume, divides informative tweets into predefined classes for quick navigation, and groups tweets in a class into topics to preserve the diversity. Finally, it ranks tweets in each topic to extract important tweets for the user’s quick scan. For ranking, the framework utilizes event extraction to enrich the semantics and reduce the noise of tweets. After that, the framework builds event graphs for ranking to find out important tweets. To validate the efficiency of our framework, we took Twitter as a case study. Experimental results on five disaster datasets show that our framework achieves promising results compared to strong methods in disaster scenarios.


Sign in / Sign up

Export Citation Format

Share Document