An Extend SIR Opinion Dynamic Model Base on Empirical Signed Network Mining

2014 ◽  
Vol 513-517 ◽  
pp. 2744-2747
Author(s):  
Wei Li ◽  
Pei Li ◽  
Hui Wang

Relations between users on online social media sites often reflect a mixture of positive and negative interactions. The network composed by those positive and negative relations is called signed social network. We design a web crawler to collect the data base on a special web event of battle between Fang Zhouzi and Han Han. And we construct a signed social network with sentiment weighted relationships base on this empirical data. Under this empirical spread web structure, we construct an extended SIR spread model in such a signed social network with sentiment weighted relationships, and we study influence with the network factors of signed, directed and weighted on opinion spreading. Under this model, we could know the proportion of signed edges is most important factor to the spread result.

2017 ◽  
Vol 117 (10) ◽  
pp. 2417-2430 ◽  
Author(s):  
Juhwan Kim ◽  
Sunghae Jun ◽  
Dong-Sik Jang ◽  
Sangsung Park

Purpose Patent contains vast information on developed technologies because of the patent system. So, it is important to analyze patent data for understanding technologies. Most previous studies on patent analysis were focused on the technology itself. Their research results lacked the consideration of products. But the patent analysis based on products is crucial for company because a company grows by sales of competitive products. The purpose of this paper is to propose a novel methodology of patent analysis for product-based technology. This study contributes to the product development strategy of a company. Design/methodology/approach The primary goal for developing technology is to release a new product. So it is important to analyze the technology based on the product. In this study, the authors analyze Apple’s technologies based in iPod, iPhone, and iPad. In addition, the authors propose a new methodology to analyze product-based technology. The authors call this an integrated social network mining (ISNM). In the ISNM, the authors carry out a social network analysis (SNA) according to each product of Apple, and integrate all SNA results of iPod, iPhone, and iPad using the technological keywords. Findings In this case study, the authors analyze Apple’s technologies according to Apple’s innovative products, such as the iPod, iPhone, and iPad. From the ISNM results of Apple’s technology, the authors can find which technological detail is more important in overall structure of Apple’s technologies. Practical implications This study contributes to the management of technology including new product development, technological innovation, and research and development planning. To know the technological relationship between whole technologies based on products can be the source of intensification of technological competitiveness. Originality/value Most of studies on technology analysis were focused on patent technology itself. Though one of their research goals was to develop new product, they had their limits considering the products because they did not use the technology information in the technology analysis. The originality of this research is to use the product information in technology analysis using the proposed ISNM.


2019 ◽  
Vol 7 (2) ◽  
pp. 015 ◽  
Author(s):  
Mariluz Congosto

The incorporation of digital sources from online social media into historical research brings great opportunities, although it is not without technological challenges. The huge amount of information that can be obtained from these platforms obliges us to resort to the use of quantitative methodologies in which algorithms have special relevance, especially regarding network analysis and data mining. The Recovery of Historical Memory in Spain on the social network Twitter will be analysed in this article. An open-code tool called T-Hoarder was used; it is based on objectivity, transparency and knowledge-sharing. It has been in use since 2012.


Author(s):  
James A. Danowski

This chapter presents six examples of organization-related social network mining: 1) interorganizational and sentiment networks in the Deepwater BP Oil Spill events, 2) intraorganizational interdepartmental networks in the Savannah College of Art and Design (SCAD), 3) who-to-whom email networks across the organizational hierarchy the Ford Motor Company’s automotive engineering innovation: “Sync® w/ MyFord Touch”, 4) networks of selected individuals who left that organization, 5) semantic associations across email for a corporate innovation in that organization, and 6) assessment of sentiment across its email for innovations over time. These examples are discussed in terms of motivations, methods, implications, and applications.


Author(s):  
Yingzi Jin ◽  
Yutaka Matsuo

Previous chapters focused on the models of static networks, which consider a relational network at a given point in time. However, real-world social networks are dynamic in nature; for example, friends of friends become friends. Social network research has, in recent years, paid increasing attention to dynamic and longitudinal network analysis in order to understand network evolution, belief formation, friendship formation, and so on. This chapter focuses mainly on the dynamics and evolutional patterns of social networks. The chapter introduces real-world applications and reviews major theories and models of dynamic network mining.


Complexity ◽  
2020 ◽  
Vol 2020 ◽  
pp. 1-14
Author(s):  
Xiaolong Deng ◽  
Hao Ding ◽  
Yong Chen ◽  
Cai Chen ◽  
Tiejun Lv

In recent years, while extensive researches on various networks properties have been proposed and accomplished, little has been proposed and done on network robustness and node vulnerability assessment under cascades in directed large-scale online community networks. In essential, an online directed social network is a group-centered and information spread-dominated online platform which is very different from the traditional undirected social network. Some further research studies have indicated that the online social network has high robustness to random removals of nodes but fails to the intentional attacks, particularly to those attacks based on node betweenness or node directed coefficient. To explore on the robustness of directed social network, in this article, we have proposed two novel node centralities of ITG (information transfer gain-based probability clustering coefficient) and I M p v (directed path-based node importance centrality). These two new centrality models are designed to capture this cascading effect in directed online social networks. Furthermore, we also propose a new and highly efficient computing method based on iterations for I M p v . Then, with the abundant experiments on the synthetic signed network and real-life networks derived from directed online social media and directed human mobile phone calling network, it has been proved that our ITG and I M p v based on directed social network robustness and node vulnerability assessment method is more accurate, efficient, and faster than several traditional centrality methods such as degree and betweenness. And we also have proposed the solid reasoning and proof process of iteration times k in computation of I M p v . To the best knowledge of us, our research has drawn some new light on the leading edge of robustness on the directed social network.


2011 ◽  
pp. 149-175 ◽  
Author(s):  
Yutaka Matsuo ◽  
Junichiro Mori ◽  
Mitsuru Ishizuka

This chapter describes social network mining from the Web. Since the end of the 1990s, several attempts have been made to mine social network information from e-mail messages, message boards, Web linkage structure, and Web content. In this chapter, we specifically examine the social network extraction from the Web using a search engine. The Web is a huge source of information about relations among persons. Therefore, we can build a social network by merging the information distributed on the Web. The growth of information on the Web, in addition to the development of a search engine, opens new possibilities to process the vast amounts of relevant information and mine important structures and knowledge.


Sign in / Sign up

Export Citation Format

Share Document