期刊文献+
共找到15,532篇文章
< 1 2 250 >
每页显示 20 50 100
Impact of different interaction behavior on epidemic spreading in time-dependent social networks
1
作者 黄帅 陈杰 +2 位作者 李梦玉 徐元昊 胡茂彬 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第3期190-195,共6页
We investigate the impact of pairwise and group interactions on the spread of epidemics through an activity-driven model based on time-dependent networks.The effects of pairwise/group interaction proportion and pairwi... We investigate the impact of pairwise and group interactions on the spread of epidemics through an activity-driven model based on time-dependent networks.The effects of pairwise/group interaction proportion and pairwise/group interaction intensity are explored by extensive simulation and theoretical analysis.It is demonstrated that altering the group interaction proportion can either hinder or enhance the spread of epidemics,depending on the relative social intensity of group and pairwise interactions.As the group interaction proportion decreases,the impact of reducing group social intensity diminishes.The ratio of group and pairwise social intensity can affect the effect of group interaction proportion on the scale of infection.A weak heterogeneous activity distribution can raise the epidemic threshold,and reduce the scale of infection.These results benefit the design of epidemic control strategy. 展开更多
关键词 epidemic transmission complex network time-dependent networks social interaction
下载PDF
Deep Learning Social Network Access Control Model Based on User Preferences
2
作者 Fangfang Shan Fuyang Li +3 位作者 Zhenyu Wang Peiyu Ji Mengyi Wang Huifang Sun 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第7期1029-1044,共16页
A deep learning access controlmodel based on user preferences is proposed to address the issue of personal privacy leakage in social networks.Firstly,socialusers andsocialdata entities are extractedfromthe social netw... A deep learning access controlmodel based on user preferences is proposed to address the issue of personal privacy leakage in social networks.Firstly,socialusers andsocialdata entities are extractedfromthe social networkandused to construct homogeneous and heterogeneous graphs.Secondly,a graph neural networkmodel is designed based on user daily social behavior and daily social data to simulate the dissemination and changes of user social preferences and user personal preferences in the social network.Then,high-order neighbor nodes,hidden neighbor nodes,displayed neighbor nodes,and social data nodes are used to update user nodes to expand the depth and breadth of user preferences.Finally,a multi-layer attention network is used to classify user nodes in the homogeneous graph into two classes:allow access and deny access.The fine-grained access control problem in social networks is transformed into a node classification problem in a graph neural network.The model is validated using a dataset and compared with other methods without losing generality.The model improved accuracy by 2.18%compared to the baseline method GraphSAGE,and improved F1 score by 1.45%compared to the baseline method,verifying the effectiveness of the model. 展开更多
关键词 Graph neural networks user preferences access control social network
下载PDF
Predicting Users’ Latent Suicidal Risk in Social Media: An Ensemble Model Based on Social Network Relationships
3
作者 Xiuyang Meng Chunling Wang +3 位作者 Jingran Yang Mairui Li Yue Zhang Luo Wang 《Computers, Materials & Continua》 SCIE EI 2024年第6期4259-4281,共23页
Suicide has become a critical concern,necessitating the development of effective preventative strategies.Social media platforms offer a valuable resource for identifying signs of suicidal ideation.Despite progress in ... Suicide has become a critical concern,necessitating the development of effective preventative strategies.Social media platforms offer a valuable resource for identifying signs of suicidal ideation.Despite progress in detecting suicidal ideation on social media,accurately identifying individuals who express suicidal thoughts less openly or infrequently poses a significant challenge.To tackle this,we have developed a dataset focused on Chinese suicide narratives from Weibo’s Tree Hole feature and introduced an ensemble model named Text Convolutional Neural Network based on Social Network relationships(TCNN-SN).This model enhances predictive performance by leveraging social network relationship features and applying correction factors within a weighted linear fusion framework.It is specifically designed to identify key individuals who can help uncover hidden suicidal users and clusters.Our model,assessed using the bespoke dataset and benchmarked against alternative classification approaches,demonstrates superior accuracy,F1-score and AUC metrics,achieving 88.57%,88.75%and 94.25%,respectively,outperforming traditional TextCNN models by 12.18%,10.84%and 10.85%.We assert that our methodology offers a significant advancement in the predictive identification of individuals at risk,thereby contributing to the prevention and reduction of suicide incidences. 展开更多
关键词 Suicide risk prediction social media social network relationships Weibo Tree Hole deep learning
下载PDF
Network analysis of the relationships between depressive symptoms and social participation activities among Chinese older adults and its implications for nursing
4
作者 Yebo Yu Hewei Min +3 位作者 Wei Pan Ping Chen Xuxi Zhang Xinying Sun 《International Journal of Nursing Sciences》 CSCD 2024年第4期465-472,I0002,共9页
Objective:Network analysis was used to explore the complex inter-relationships between social participation activities and depressive symptoms among the Chinese older population,and the differences in network structur... Objective:Network analysis was used to explore the complex inter-relationships between social participation activities and depressive symptoms among the Chinese older population,and the differences in network structures among different genders,age groups,and urban-rural residency would be compared.Methods:Based on the 2018 wave of the Chinese Longitudinal Healthy Longevity Survey(CLHLS),12,043 people aged 65 to 105 were included.The 10-item Center for Epidemiologic Studies Depression(CESD)Scale was used to assess depressive symptoms and 10 types of social participation activities were collected,including housework,tai-chi,square dancing,visiting and interacting with friends,garden work,reading newspapers or books,raising domestic animals,playing cards or mahjong,watching TV or listening to radio,and organized social activities.R 4.2.1 software was used to estimate the network model and calculate strength and bridge strength.Results:21.60%(2,601/12,043)of the participants had depressive symptoms.The total social participation score was negatively associated with depressive symptoms after adjusting for sociodemographic factors.The network of social participation and depressive symptoms showed that“D9(Inability to get going)”and“S9(Watching TV and/or listening to the radio)”had the highest strength within depressive symptoms and social participation communities,respectively,and“S1(Housework)”,“S9(Watching TV and/or listening to the radio)”,and“D5(Hopelessness)”were the most prominent bridging nodes between the two communities.Most edges linking the two communities were negative.“S5(Graden work)-D5(Hopelessness)”and“S6(Reading newspapers/books)-D4(Everything was an effort)”were the top 2 strongest negative edges.Older females had significantly denser network structures than older males.Compared to older people aged 65e80,the age group 81e105 showed higher network global strength.Conclusions:This study provides novel insights into the complex relationships between social participation and depressive symptoms.Except for doing housework,other social participation activities were found to be protective for depression levels.Different nursing strategies should be taken to prevent and alleviate depressive symptoms for different genders and older people of different ages. 展开更多
关键词 Depressive symptoms network analysis Older adults Sex characteristics social participation
下载PDF
Social Robot Detection Method with Improved Graph Neural Networks
5
作者 Zhenhua Yu Liangxue Bai +1 位作者 Ou Ye Xuya Cong 《Computers, Materials & Continua》 SCIE EI 2024年第2期1773-1795,共23页
Social robot accounts controlled by artificial intelligence or humans are active in social networks,bringing negative impacts to network security and social life.Existing social robot detection methods based on graph ... Social robot accounts controlled by artificial intelligence or humans are active in social networks,bringing negative impacts to network security and social life.Existing social robot detection methods based on graph neural networks suffer from the problem of many social network nodes and complex relationships,which makes it difficult to accurately describe the difference between the topological relations of nodes,resulting in low detection accuracy of social robots.This paper proposes a social robot detection method with the use of an improved neural network.First,social relationship subgraphs are constructed by leveraging the user’s social network to disentangle intricate social relationships effectively.Then,a linear modulated graph attention residual network model is devised to extract the node and network topology features of the social relation subgraph,thereby generating comprehensive social relation subgraph features,and the feature-wise linear modulation module of the model can better learn the differences between the nodes.Next,user text content and behavioral gene sequences are extracted to construct social behavioral features combined with the social relationship subgraph features.Finally,social robots can be more accurately identified by combining user behavioral and relationship features.By carrying out experimental studies based on the publicly available datasets TwiBot-20 and Cresci-15,the suggested method’s detection accuracies can achieve 86.73%and 97.86%,respectively.Compared with the existing mainstream approaches,the accuracy of the proposed method is 2.2%and 1.35%higher on the two datasets.The results show that the method proposed in this paper can effectively detect social robots and maintain a healthy ecological environment of social networks. 展开更多
关键词 social robot detection social relationship subgraph graph attention network feature linear modulation behavioral gene sequences
下载PDF
CRB:A new rumor blocking algorithm in online social networks based on competitive spreading model and influence maximization
6
作者 董晨 徐桂琼 孟蕾 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第8期588-604,共17页
The virtuality and openness of online social platforms make networks a hotbed for the rapid propagation of various rumors.In order to block the outbreak of rumor,one of the most effective containment measures is sprea... The virtuality and openness of online social platforms make networks a hotbed for the rapid propagation of various rumors.In order to block the outbreak of rumor,one of the most effective containment measures is spreading positive information to counterbalance the diffusion of rumor.The spreading mechanism of rumors and effective suppression strategies are significant and challenging research issues.Firstly,in order to simulate the dissemination of multiple types of information,we propose a competitive linear threshold model with state transition(CLTST)to describe the spreading process of rumor and anti-rumor in the same network.Subsequently,we put forward a community-based rumor blocking(CRB)algorithm based on influence maximization theory in social networks.Its crucial step is to identify a set of influential seeds that propagate anti-rumor information to other nodes,which includes community detection,selection of candidate anti-rumor seeds and generation of anti-rumor seed set.Under the CLTST model,the CRB algorithm has been compared with six state-of-the-art algorithms on nine online social networks to verify the performance.Experimental results show that the proposed model can better reflect the process of rumor propagation,and review the propagation mechanism of rumor and anti-rumor in online social networks.Moreover,the proposed CRB algorithm has better performance in weakening the rumor dissemination ability,which can select anti-rumor seeds in networks more accurately and achieve better performance in influence spread,sensitivity analysis,seeds distribution and running time. 展开更多
关键词 online social networks rumor blocking competitive linear threshold model influence maximization
下载PDF
Identifying influential spreaders in social networks: A two-stage quantum-behaved particle swarm optimization with Lévy flight
7
作者 卢鹏丽 揽继茂 +3 位作者 唐建新 张莉 宋仕辉 朱虹羽 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第1期743-754,共12页
The influence maximization problem aims to select a small set of influential nodes, termed a seed set, to maximize their influence coverage in social networks. Although the methods that are based on a greedy strategy ... The influence maximization problem aims to select a small set of influential nodes, termed a seed set, to maximize their influence coverage in social networks. Although the methods that are based on a greedy strategy can obtain good accuracy, they come at the cost of enormous computational time, and are therefore not applicable to practical scenarios in large-scale networks. In addition, the centrality heuristic algorithms that are based on network topology can be completed in relatively less time. However, they tend to fail to achieve satisfactory results because of drawbacks such as overlapped influence spread. In this work, we propose a discrete two-stage metaheuristic optimization combining quantum-behaved particle swarm optimization with Lévy flight to identify a set of the most influential spreaders. According to the framework,first, the particles in the population are tasked to conduct an exploration in the global solution space to eventually converge to an acceptable solution through the crossover and replacement operations. Second, the Lévy flight mechanism is used to perform a wandering walk on the optimal candidate solution in the population to exploit the potentially unidentified influential nodes in the network. Experiments on six real-world social networks show that the proposed algorithm achieves more satisfactory results when compared to other well-known algorithms. 展开更多
关键词 social networks influence maximization metaheuristic optimization quantum-behaved particle swarm optimization Lévy flight
下载PDF
A Large-Scale Group Decision Making Model Based on Trust Relationship and Social Network Updating
8
作者 Rongrong Ren Luyang Su +2 位作者 Xinyu Meng Jianfang Wang Meng Zhao 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第1期429-458,共30页
With the development of big data and social computing,large-scale group decisionmaking(LGDM)is nowmerging with social networks.Using social network analysis(SNA),this study proposes an LGDM consensus model that consid... With the development of big data and social computing,large-scale group decisionmaking(LGDM)is nowmerging with social networks.Using social network analysis(SNA),this study proposes an LGDM consensus model that considers the trust relationship among decisionmakers(DMs).In the process of consensusmeasurement:the social network is constructed according to the social relationship among DMs,and the Louvain method is introduced to classify social networks to form subgroups.In this study,the weights of each decision maker and each subgroup are computed by comprehensive network weights and trust weights.In the process of consensus improvement:A feedback mechanism with four identification and two direction rules is designed to guide the consensus of the improvement process.Based on the trust relationship among DMs,the preferences are modified,and the corresponding social network is updated to accelerate the consensus.Compared with the previous research,the proposedmodel not only allows the subgroups to be reconstructed and updated during the adjustment process,but also improves the accuracy of the adjustment by the feedbackmechanism.Finally,an example analysis is conducted to verify the effectiveness and flexibility of the proposed method.Moreover,compared with previous studies,the superiority of the proposed method in solving the LGDM problem is highlighted. 展开更多
关键词 Large-scale group decision making social network updating trust relationship group consensus feedback mechanism
下载PDF
A Privacy Preservation Method for Attributed Social Network Based on Negative Representation of Information
9
作者 Hao Jiang Yuerong Liao +2 位作者 Dongdong Zhao Wenjian Luo Xingyi Zhang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第7期1045-1075,共31页
Due to the presence of a large amount of personal sensitive information in social networks,privacy preservation issues in social networks have attracted the attention of many scholars.Inspired by the self-nonself disc... Due to the presence of a large amount of personal sensitive information in social networks,privacy preservation issues in social networks have attracted the attention of many scholars.Inspired by the self-nonself discrimination paradigmin the biological immune system,the negative representation of information indicates features such as simplicity and efficiency,which is very suitable for preserving social network privacy.Therefore,we suggest a method to preserve the topology privacy and node attribute privacy of attribute social networks,called AttNetNRI.Specifically,a negative survey-based method is developed to disturb the relationship between nodes in the social network so that the topology structure can be kept private.Moreover,a negative database-based method is proposed to hide node attributes,so that the privacy of node attributes can be preserved while supporting the similarity estimation between different node attributes,which is crucial to the analysis of social networks.To evaluate the performance of the AttNetNRI,empirical studies have been conducted on various attribute social networks and compared with several state-of-the-art methods tailored to preserve the privacy of social networks.The experimental results show the superiority of the developed method in preserving the privacy of attribute social networks and demonstrate the effectiveness of the topology disturbing and attribute hiding parts.The experimental results show the superiority of the developed methods in preserving the privacy of attribute social networks and demonstrate the effectiveness of the topological interference and attribute-hiding components. 展开更多
关键词 Attributed social network topology privacy node attribute privacy negative representation of information negative survey negative database
下载PDF
Location Prediction from Social Media Contents using Location Aware Attention LSTM Network
10
作者 Madhur Arora Sanjay Agrawal Ravindra Patel 《Journal of Harbin Institute of Technology(New Series)》 CAS 2024年第5期68-77,共10页
Location prediction in social media,a growing research field,employs machine learning to identify users' locations from their online activities.This technology,useful in targeted advertising and urban planning,rel... Location prediction in social media,a growing research field,employs machine learning to identify users' locations from their online activities.This technology,useful in targeted advertising and urban planning,relies on natural language processing to analyze social media content and understand the temporal dynamics and structures of social networks.A key application is predicting a Twitter user's location from their tweets,which can be challenging due to the short and unstructured nature of tweet text.To address this challenge,the research introduces a novel machine learning model called the location-aware attention LSTM(LAA-LSTM).This hybrid model combines a Long Short-Term Memory(LSTM) network with an attention mechanism.The LSTM is trained on a dataset of tweets,and the attention network focuses on extracting features related to latitude and longitude,which are crucial for pinpointing the location of a user's tweet.The result analysis shows approx.10% improvement in accuracy over other existing machine learning approaches. 展开更多
关键词 TWITTER social media LOCATION machine learning attention network
下载PDF
Discrete Choice Analysis of Temporal Factors on Social Network Growth
11
作者 Kwok-Wai Cheung Yuk Tai Siu 《Intelligent Information Management》 2024年第1期21-34,共14页
Social networks like Facebook, X (Twitter), and LinkedIn provide an interaction and communication environment for users to generate and share content, allowing for the observation of social behaviours in the digital w... Social networks like Facebook, X (Twitter), and LinkedIn provide an interaction and communication environment for users to generate and share content, allowing for the observation of social behaviours in the digital world. These networks can be viewed as a collection of nodes and edges, where users and their interactions are represented as nodes and the connections between them as edges. Understanding the factors that contribute to the formation of these edges is important for studying network structure and processes. This knowledge can be applied to various areas such as identifying communities, recommending friends, and targeting online advertisements. Several factors, including node popularity and friends-of-friends relationships, influence edge formation and network growth. This research focuses on the temporal activity of nodes and its impact on edge formation. Specifically, the study examines how the minimum age of friends-of-friends edges and the average age of all edges connected to potential target nodes influence the formation of network edges. Discrete choice analysis is used to analyse the combined effect of these temporal factors and other well-known attributes like node degree (i.e., the number of connections a node has) and network distance between nodes. The findings reveal that temporal properties have a similar impact as network proximity in predicting the creation of links. By incorporating temporal features into the models, the accuracy of link prediction can be further improved. 展开更多
关键词 Discrete Choice Models Temporal Factors social network Link Prediction network Growth
下载PDF
Habits on Social Networks at Workplace: A Survey of Motivations and Behaviour
12
作者 Thomas Kakou Kouassi Douatia Koné +3 位作者 Aliou Bamba Aladji Kamagaté Olivier Asseu Yvon Kermarrec 《Open Journal of Applied Sciences》 2024年第8期2154-2168,共15页
This article explores the use of social networks by workers in Abidjan, Côte d’Ivoire, with particular emphasis on a descriptive or quantitative analysis aimed at understanding motivations and methods of use. Mo... This article explores the use of social networks by workers in Abidjan, Côte d’Ivoire, with particular emphasis on a descriptive or quantitative analysis aimed at understanding motivations and methods of use. More than five hundred and fifty questionnaires were distributed, highlighting workers’ preferred digital channels and platforms. The results indicate that the majority use social media through their mobile phones, with WhatsApp being the most popular app, followed by Facebook and LinkedIn. The study reveals that workers use social media for entertainment purposes and to develop professional and social relationships, with 55% unable to live without social media at work for recreational activities. In addition, 35% spend on average 1 to 2 hours on social networks, mainly between 12 p.m. and 2 p.m. It also appears that 46% believe that social networks moderately improve their productivity. These findings can guide marketing strategies, training, technology development and government policies related to the use of social media in the workplace. 展开更多
关键词 social network social Media Applications Poisson’s Law STATISTICS Digital Supports Workers Productivity
下载PDF
Venture Capital Syndication under Social Network Theory:Literature Review and Prospect
13
作者 Junru Zhao Shasha Yang Zhengbin Wang 《Proceedings of Business and Economic Studies》 2024年第4期10-15,共6页
As an important channel for start-ups to obtain R&D funds and external knowledge and information resources,and as one of the key methods for investment institutions to leverage scale and synergy effects to enhance... As an important channel for start-ups to obtain R&D funds and external knowledge and information resources,and as one of the key methods for investment institutions to leverage scale and synergy effects to enhance investment returns,venture capital syndication holds significant research value in the field of venture capital.This paper reviews the literature,summarizing the motivations behind the formation of joint investment networks,the conceptual characteristics of the three core theories of social network theory,and the empirical research on venture capital syndication within the framework of social network theory.It also highlights the existing research results,identifies gaps,and anticipates future research directions. 展开更多
关键词 social network theory Venture capital syndication investment
下载PDF
Improved Key Node Recognition Method of Social Network Based on PageRank Algorithm 被引量:1
14
作者 Lei Hong Yiji Qian +2 位作者 Chaofan Gong Yurui Zhang Xin Zhou 《Computers, Materials & Continua》 SCIE EI 2023年第1期1887-1903,共17页
The types and functions of social networking sites are becoming more abundant with the prevalence of self-media culture,and the number of daily active users of social networking sites represented by Weibo and Zhihu co... The types and functions of social networking sites are becoming more abundant with the prevalence of self-media culture,and the number of daily active users of social networking sites represented by Weibo and Zhihu continues to expand.There are key node users in social networks.Compared with ordinary users,their influence is greater,their radiation range is wider,and their information transmission capabilities are better.The key node users playimportant roles in public opinion monitoring and hot event prediction when evaluating the criticality of nodes in social networking sites.In order to solve the problems of incomplete evaluation factors,poor recognition rate and low accuracy of key nodes of social networking sites,this paper establishes a social networking site key node recognition algorithm(SNSKNIS)based on PageRank(PR)algorithm,and evaluates the importance of social networking site nodes in combination with the influence of nodes and the structure of nodes in social networks.This article takes the Sina Weibo platform as an example,uses the key node identification algorithm system of social networking sites to discover the key nodes in the social network,analyzes its importance in the social network,and displays it visually. 展开更多
关键词 social networking site PageRank algorithm key node
下载PDF
An Influence Maximization Algorithm Based on Improved K-Shell in Temporal Social Networks 被引量:1
15
作者 Wenlong Zhu Yu Miao +2 位作者 Shuangshuang Yang Zuozheng Lian Lianhe Cui 《Computers, Materials & Continua》 SCIE EI 2023年第5期3111-3131,共21页
Influence maximization of temporal social networks(IMT)is a problem that aims to find the most influential set of nodes in the temporal network so that their information can be the most widely spread.To solve the IMT ... Influence maximization of temporal social networks(IMT)is a problem that aims to find the most influential set of nodes in the temporal network so that their information can be the most widely spread.To solve the IMT problem,we propose an influence maximization algorithm based on an improved K-shell method,namely improved K-shell in temporal social networks(KT).The algorithm takes into account the global and local structures of temporal social networks.First,to obtain the kernel value Ks of each node,in the global scope,it layers the network according to the temporal characteristic of nodes by improving the K-shell method.Then,in the local scope,the calculation method of comprehensive degree is proposed to weigh the influence of nodes.Finally,the node with the highest comprehensive degree in each core layer is selected as the seed.However,the seed selection strategy of KT can easily lose some influential nodes.Thus,by optimizing the seed selection strategy,this paper proposes an efficient heuristic algorithm called improved K-shell in temporal social networks for influence maximization(KTIM).According to the hierarchical distribution of cores,the algorithm adds nodes near the central core to the candidate seed set.It then searches for seeds in the candidate seed set according to the comprehensive degree.Experiments showthatKTIMis close to the best performing improved method for influence maximization of temporal graph(IMIT)algorithm in terms of effectiveness,but runs at least an order of magnitude faster than it.Therefore,considering the effectiveness and efficiency simultaneously in temporal social networks,the KTIM algorithm works better than other baseline algorithms. 展开更多
关键词 Temporal social network influence maximization improved K-shell comprehensive degree
下载PDF
A Parallel Approach for Sentiment Analysis on Social Networks Using Spark 被引量:1
16
作者 M.Mohamed Iqbal K.Latha 《Intelligent Automation & Soft Computing》 SCIE 2023年第2期1831-1842,共12页
The public is increasingly using social media platforms such as Twitter and Facebook to express their views on a variety of topics.As a result,social media has emerged as the most effective and largest open source for... The public is increasingly using social media platforms such as Twitter and Facebook to express their views on a variety of topics.As a result,social media has emerged as the most effective and largest open source for obtaining public opinion.Single node computational methods are inefficient for sentiment analysis on such large datasets.Supercomputers or parallel or distributed proces-sing are two options for dealing with such large amounts of data.Most parallel programming frameworks,such as MPI(Message Processing Interface),are dif-ficult to use and scale in environments where supercomputers are expensive.Using the Apache Spark Parallel Model,this proposed work presents a scalable system for sentiment analysis on Twitter.A Spark-based Naive Bayes training technique is suggested for this purpose;unlike prior research,this algorithm does not need any disk access.Millions of tweets have been classified using the trained model.Experiments with various-sized clusters reveal that the suggested strategy is extremely scalable and cost-effective for larger data sets.It is nearly 12 times quicker than the Map Reduce-based model and nearly 21 times faster than the Naive Bayes Classifier in Apache Mahout.To evaluate the framework’s scalabil-ity,we gathered a large training corpus from Twitter.The accuracy of the classi-fier trained with this new dataset was more than 80%. 展开更多
关键词 social networks sentiment analysis big data SPARK tweets classification
下载PDF
Effect of Online Social Networking on Emotional Status and Its Interaction with Offline Reality during the Early Stage of the COVID-19 Pandemic in China
17
作者 Xiaolin Lu Xiaolei Miao 《International Journal of Mental Health Promotion》 2023年第9期1041-1052,共12页
Background:During the early stages of the COVID-19 pandemic in China,social interactions shifted to online spaces due to lockdowns and social distancing measures.As a result,the impact of online social networking on u... Background:During the early stages of the COVID-19 pandemic in China,social interactions shifted to online spaces due to lockdowns and social distancing measures.As a result,the impact of online social networking on users’emotional status has become stronger than ever.This study examines the association between online social networking and Internet users’emotional status and how offline reality affects this relationship.Methods:The study utilizes cross-sectional online survey data(n=3004)and Baidu Migration big data from the first 3 months of the pandemic.Two dimensions of online networking are measured:social support and information sources.Results:First,individuals’online social support(β=0.16,p<0.05)and information sources(β=0.08,p<0.01)are both positively associated to their emotional status during the epidemic.Second,these positive associations are moderated by social status and provincial pandemic control interventions.With regards to the moderation effect of social status,the constructive impact of information sources on emotional well-being is more pronounced among individuals from vulnerable groups compared to those who are not.With regard to the moderation effect of provincial interventions,online social support has the potential to alleviate the adverse repercussions of high rates of confirmed COVID-19 cases and strict lockdown measures while simultaneously augmenting the favorable effects of recovery.Conclusion:The various dimensions of social networking exert distinct effects on emotional status through diverse mechanisms,all of which must be taken into account when designing and adapting pandemic-control interventions. 展开更多
关键词 COVID-19 emotional status online social networking social support information sources
下载PDF
Overlapping community‐based particle swarm optimization algorithm for influence maximization in social networks
18
作者 Lei Zhang Yutong Liu +3 位作者 Haipeng Yang Fan Cheng Qi Liu Xingyi Zhang 《CAAI Transactions on Intelligence Technology》 SCIE EI 2023年第3期893-913,共21页
Influence maximization,whose aim is to maximise the expected number of influenced nodes by selecting a seed set of k influential nodes from a social network,has many applications such as goods advertising and rumour s... Influence maximization,whose aim is to maximise the expected number of influenced nodes by selecting a seed set of k influential nodes from a social network,has many applications such as goods advertising and rumour suppression.Among the existing influence maximization methods,the community‐based ones can achieve a good balance between effectiveness and efficiency.However,this kind of algorithm usually utilise the network community structures by viewing each node as a non‐overlapping node.In fact,many nodes in social networks are overlapping ones,which play more important role in influence spreading.To this end,an overlapping community‐based particle swarm opti-mization algorithm named OCPSO for influence maximization in social networks,which can make full use of overlapping nodes,non‐overlapping nodes,and their interactive information is proposed.Specifically,an overlapping community detection algorithm is used to obtain the information of overlapping community structures,based on which three novel evolutionary strategies,such as initialisation,mutation,and local search are designed in OCPSO for better finding influential nodes.Experimental results in terms of influence spread and running time on nine real‐world social networks demonstrate that the proposed OCPSO is competitive and promising comparing to several state‐of‐the‐arts(e.g.CGA,CMA‐IM,CIM,CDH‐SHRINK,CNCG,and CFIN). 展开更多
关键词 computational intelligence data mining social network
下载PDF
Generalized Jaccard Similarity Based Recurrent DNN for Virtualizing Social Network Communities
19
作者 R.Gnanakumari P.Vijayalakshmi 《Intelligent Automation & Soft Computing》 SCIE 2023年第6期2719-2730,共12页
In social data analytics,Virtual Community(VC)detection is a primary challenge in discovering user relationships and enhancing social recommenda-tions.VC formation is used for personal interaction between communities.... In social data analytics,Virtual Community(VC)detection is a primary challenge in discovering user relationships and enhancing social recommenda-tions.VC formation is used for personal interaction between communities.But the usual methods didn’t find the Suspicious Behaviour(SB)needed to make a VC.The Generalized Jaccard Suspicious Behavior Similarity-based Recurrent Deep Neural Network Classification and Ranking(GJSBS-RDNNCR)Model addresses these issues.The GJSBS-RDNNCR model comprises four layers for VC formation in Social Networks(SN).In the GJSBS-RDNNCR model,the SN is given as an input at the input layer.After that,the User’s Behaviors(UB)are extracted in the first Hidden Layer(HL),and the Generalized Jaccard Similarity coefficient calculates the similarity value at the second HL based on the SB.In the third HL,the similarity values are examined,and SB tendency is classified using the Activation Function(AF)in the Output Layer(OL).Finally,the ranking process is performed with classified users in SN and their SB.Results analysis is performed with metrics such as Classification Accuracy(CA),Time Complexity(TC),and False Positive Rate(FPR).The experimental setup consid-ers 250 tweet users from the dataset to identify the SBs of users. 展开更多
关键词 Online social networks deep learning misbehaviors recurrent network GJS
下载PDF
Maximizing Influence in Temporal Social Networks:A Node Feature-Aware Voting Algorithm
20
作者 Wenlong Zhu Yu Miao +2 位作者 Shuangshuang Yang Zuozheng Lian Lianhe Cui 《Computers, Materials & Continua》 SCIE EI 2023年第12期3095-3117,共23页
Influence Maximization(IM)aims to select a seed set of size k in a social network so that information can be spread most widely under a specific information propagation model through this set of nodes.However,most exi... Influence Maximization(IM)aims to select a seed set of size k in a social network so that information can be spread most widely under a specific information propagation model through this set of nodes.However,most existing studies on the IM problem focus on static social network features,while neglecting the features of temporal social networks.To bridge this gap,we focus on node features reflected by their historical interaction behavior in temporal social networks,i.e.,interaction attributes and self-similarity,and incorporate them into the influence maximization algorithm and information propagation model.Firstly,we propose a node feature-aware voting algorithm,called ISVoteRank,for seed nodes selection.Specifically,before voting,the algorithm sets the initial voting ability of nodes in a personalized manner by combining their features.During the voting process,voting weights are set based on the interaction strength between nodes,allowing nodes to vote at different extents and subsequently weakening their voting ability accordingly.The process concludes by selecting the top k nodes with the highest voting scores as seeds,avoiding the inefficiency of iterative seed selection in traditional voting-based algorithms.Secondly,we extend the Independent Cascade(IC)model and propose the Dynamic Independent Cascade(DIC)model,which aims to capture the dynamic features in the information propagation process by combining node features.Finally,experiments demonstrate that the ISVoteRank algorithm has been improved in both effectiveness and efficiency compared to baseline methods,and the influence spread through the DIC model is improved compared to the IC model. 展开更多
关键词 Temporal social networks influence maximization voting strategy interactive properties SELF-SIMILARITY
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部