300,481 research outputs found

    Mining a medieval social network by kernel SOM and related methods

    Get PDF
    This paper briefly presents several ways to understand the organization of a large social network (several hundreds of persons). We compare approaches coming from data mining for clustering the vertices of a graph (spectral clustering, self-organizing algorithms. . .) and provide methods for representing the graph from these analysis. All these methods are illustrated on a medieval social network and the way they can help to understand its organization is underlined

    A survey of data mining techniques for social media analysis

    Get PDF
    Social network has gained remarkable attention in the last decade. Accessing social network sites such as Twitter, Facebook LinkedIn and Google+ through the internet and the web 2.0 technologies has become more affordable. People are becoming more interested in and relying on social network for information, news and opinion of other users on diverse subject matters. The heavy reliance on social network sites causes them to generate massive data characterised by three computational issues namely; size, noise and dynamism. These issues often make social network data very complex to analyse manually, resulting in the pertinent use of computational means of analysing them. Data mining provides a wide range of techniques for detecting useful knowledge from massive datasets like trends, patterns and rules [44]. Data mining techniques are used for information retrieval, statistical modelling and machine learning. These techniques employ data pre-processing, data analysis, and data interpretation processes in the course of data analysis. This survey discusses different data mining techniques used in mining diverse aspects of the social network over decades going from the historical techniques to the up-to-date models, including our novel technique named TRCM. All the techniques covered in this survey are listed in the Table.1 including the tools employed as well as names of their authors

    The Complexity of Finding Effectors

    Full text link
    The NP-hard EFFECTORS problem on directed graphs is motivated by applications in network mining, particularly concerning the analysis of probabilistic information-propagation processes in social networks. In the corresponding model the arcs carry probabilities and there is a probabilistic diffusion process activating nodes by neighboring activated nodes with probabilities as specified by the arcs. The point is to explain a given network activation state as well as possible by using a minimum number of "effector nodes"; these are selected before the activation process starts. We correct, complement, and extend previous work from the data mining community by a more thorough computational complexity analysis of EFFECTORS, identifying both tractable and intractable cases. To this end, we also exploit a parameterization measuring the "degree of randomness" (the number of "really" probabilistic arcs) which might prove useful for analyzing other probabilistic network diffusion problems as well.Comment: 28 page

    Data Preparation for Social Network Mining and Analysis

    Get PDF

    Methods of Social Network Analysis for Data Mining

    Get PDF
    V této bakalářské práci jsou popsány některé z mnoha metod analýzy sociálních sítí, spolu s popisem a vizualizací těchto dat. Součástí práce je popis implementace aplikace provádějící tuto analýzu na základě několika implementovaných metod. Je zde popsán výstup analýzy a jeho srovnání s jiným softwarem pro analýzu sociálních sítí.This bachelor thesis describes some of many methods for social network analysis. There is also a description of the data visualization. The thesis contains description of implementation of aplication for social network analysis using several methods. Output of analysis is confronted with output of other software for social network analysis.

    A qualitative study of stakeholders' perspectives on the social network service environment

    Get PDF
    Over two billion people are using the Internet at present, assisted by the mediating activities of software agents which deal with the diversity and complexity of information. There are, however, ethical issues due to the monitoring-and-surveillance, data mining and autonomous nature of software agents. Considering the context, this study aims to comprehend stakeholders' perspectives on the social network service environment in order to identify the main considerations for the design of software agents in social network services in the near future. Twenty-one stakeholders, belonging to three key stakeholder groups, were recruited using a purposive sampling strategy for unstandardised semi-structured e-mail interviews. The interview data were analysed using a qualitative content analysis method. It was possible to identify three main considerations for the design of software agents in social network services, which were classified into the following categories: comprehensive understanding of users' perception of privacy, user type recognition algorithms for software agent development and existing software agents enhancement

    Detecting cyber threats through social network analysis: short survey

    Get PDF
    This article considers a short survey of basic methods of social networks analysis, which are used for detecting cyber threats. The main types of social network threats are presented. Basic methods of graph theory and data mining, that deals with social networks analysis are described. Typical security tasks of social network analysis, such as community detection in network, detection of leaders in communities, detection experts in networks, clustering text information and others are considered

    Using social media data to understand mobile customer experience and behavior

    Get PDF
    Understanding mobile customer experience and behavior is an important task for cellular service providers to improve the satisfaction of their customers. To that end, cellular service providers regularly measure the properties of their mobile network, such as signal strength, dropped calls, call blockage, and radio interface failures (RIFs). In addition to these passive measurements collected within the network, understanding customer sentiment from direct customer feedback is also an important means of evaluating user experience. Customers have varied perceptions of mobile network quality, and also react differently to advertising, news articles, and the introduction of new equipment and services. Traditional methods used to assess customer sentiment include direct surveys and mining the transcripts of calls made to customer care centers. Along with this feedback provided directly to the service providers, the rise in social media potentially presents new opportunities to gain further insight into customers by mining public social media data as well. According to a note from one of the largest online social network (OSN) sites in the US [7], as of September 2010 there are 175 million registered users, and 95 million text messages communicated among users per day. Additionally, many OSNs provide APIs to retrieve publically available message data, which can be used to collect this data for analysis and interpretation. Our plan is to correlate different sources of measurements and user feedback to understand the social media usage patterns from mobile data users in a large nationwide cellular network. In particular, we are interested in quantifying the traffic volume, the growing trend of social media usage and how it interacts with traditional communication channels, such as voice calls, text messaging, etc. In addition, we are interested in detecting interesting network events from users' communication on OSN sites and studying the temporal aspects - how the various types of user feedback behave with respect to timing. We develop a novel approach which combines burst detection and text mining to detect emerging issues from online messages on a large OSN network. Through a case study, our method shows promising results in identifying a burst of activities using the OSN feedback, whereas customer care notes exhibit noticeable delays in detecting such an event which may lead to unnecessary operational expenses. --Mobile customer experience,social media,text data mining,customer feedback
    corecore