The emergence of various new services has posed a huge challenge to the existing network architecture.To improve the network delay and backhaul pressure,caching popular contents at the edge of network has been conside...The emergence of various new services has posed a huge challenge to the existing network architecture.To improve the network delay and backhaul pressure,caching popular contents at the edge of network has been considered as a feasible scheme.However,how to efficiently utilize the limited caching resources to cache diverse contents has been confirmed as a tough problem in the past decade.In this paper,considering the time-varying user requests and the heterogeneous content sizes,a user preference aware hierarchical cooperative caching strategy in edge-user caching architecture is proposed.We divide the caching strategy into three phases,that is,the content placement,the content delivery and the content update.In the content placement phase,a cooperative content placement algorithm for local content popularity is designed to cache contents proactively.In the content delivery phase,a cooperative delivery algorithm is proposed to deliver the cached contents.In the content update phase,a content update algorithm is proposed according to the popularity of the contents.Finally,the proposed caching strategy is validated using the MovieLens dataset,and the results reveal that the proposed strategy improves the delay performance by at least 35.3%compared with the other three benchmark strategies.展开更多
A deep learning access controlmodel based on user preferences is proposed to address the issue of personal privacy leakage in social networks.Firstly,socialusers andsocialdata entities are extractedfromthe social netw...A deep learning access controlmodel based on user preferences is proposed to address the issue of personal privacy leakage in social networks.Firstly,socialusers andsocialdata entities are extractedfromthe social networkandused to construct homogeneous and heterogeneous graphs.Secondly,a graph neural networkmodel is designed based on user daily social behavior and daily social data to simulate the dissemination and changes of user social preferences and user personal preferences in the social network.Then,high-order neighbor nodes,hidden neighbor nodes,displayed neighbor nodes,and social data nodes are used to update user nodes to expand the depth and breadth of user preferences.Finally,a multi-layer attention network is used to classify user nodes in the homogeneous graph into two classes:allow access and deny access.The fine-grained access control problem in social networks is transformed into a node classification problem in a graph neural network.The model is validated using a dataset and compared with other methods without losing generality.The model improved accuracy by 2.18%compared to the baseline method GraphSAGE,and improved F1 score by 1.45%compared to the baseline method,verifying the effectiveness of the model.展开更多
In order to rank searching results according to the user preferences,a new personalized web pages ranking algorithm called PWPR(personalized web page ranking)with the idea of adjusting the ranking scores of web page...In order to rank searching results according to the user preferences,a new personalized web pages ranking algorithm called PWPR(personalized web page ranking)with the idea of adjusting the ranking scores of web pages in accordance with user preferences is proposed.PWPR assigns the initial weights based on user interests and creates the virtual links and hubs according to user interests.By measuring user click streams,PWPR incrementally reflects users’ favors for the personalized ranking.To improve the accuracy of ranking, PWPR also takes collaborative filtering into consideration when the query with similar is submitted by users who have similar user interests. Detailed simulation results and comparison with other algorithms prove that the proposed PWPR can adaptively provide personalized ranking and truly relevant information to user preferences.展开更多
To overcome the subjectivity of experts in the process of risk response scheme selection, according to the theory of group decision making, a selection method and flow of the risk response schemes for a mining project...To overcome the subjectivity of experts in the process of risk response scheme selection, according to the theory of group decision making, a selection method and flow of the risk response schemes for a mining project was proposed based on fuzzy preference relation and consistency induced ordered weighted averaging (C-IOWA) operator,which can overcome the loss of information in the process of group decision making to a great degree, and improve its efficiency and quality.A numeric example was introduced to illustrate the application of the method, also validating the method as scientific and practicable.展开更多
Over the years, there has been increasing growth in academic digital libraries. It has therefore become overwhelming for researchers to determine important research materials. In most existing research works that cons...Over the years, there has been increasing growth in academic digital libraries. It has therefore become overwhelming for researchers to determine important research materials. In most existing research works that consider scholarly paper recommendation, the researcher’s preference is left out. In this paper, therefore, Frequent Pattern (FP) Growth Algorithm is employed on potential papers generated from the researcher’s preferences to create a list of ranked papers based on citation features. The purpose is to provide a recommender system that is user oriented. A walk through algorithm is implemented to generate all possible frequent patterns from the FP-tree after which an output of ordered recommended papers combining subjective and objective factors of the researchers is produced. Experimental results with a scholarly paper recommendation dataset show that the proposed method is very promising, as it outperforms recommendation baselines as measured with nDCG and MRR.展开更多
Staircase is an important means of vertical transportation. Staircase design exerts a great influence on the aesthetics, transportation efficiency, user comfort and experience level. In this paper, a survey on the sta...Staircase is an important means of vertical transportation. Staircase design exerts a great influence on the aesthetics, transportation efficiency, user comfort and experience level. In this paper, a survey on the staircase rotation preference was conducted, based on the environment behavior studies. Different user frequencies of a pair of scissors stairs in the 2nd teaching building of North China University of Technology were analyzed. The psychological effect was evaluated and quantified, and the user preference on the two staircase rotations was then withdrawn. The survey found that the type of staircase with clockwise upstairs was much more preferred (78%) than the other staircase rotation anti-clock upstairs. Considering different genders, the female shows a 66% higher preference inclination of this type of staircase rotation than the male. To improve the transportation efficiency of the staircase in case of fire, the result of this paper can be very constructive for the evacuation staircase rotation choice for the high-rise buildings.展开更多
Corporations focus on web based education to train their employees ever more than before. Unlike traditional learning environments, web based education applications store large amount of data. This growing availabilit...Corporations focus on web based education to train their employees ever more than before. Unlike traditional learning environments, web based education applications store large amount of data. This growing availability of data stimulated the emergence of a new field called educational data mining. In this study, the classification method is implemented on a data that is obtained from a company which uses web based education to train their employees. The authors' aim is to find out the most critical factors that influence the users' success. For the classification of the data, two decision tree algorithms, Classification and Regression Tree (CART) and Quick, Unbiased and Efficient Statistical Tree (QUEST) are applied. According to the results, assurance of a certificate at the end of the training is found to be the most critical factor that influences the users' success. Position, number of work years and the education level of the user, are also found as important factors.展开更多
The rapid development of the Intemet makes the social network of information dissemination has undergone tremendous changes. Based on the introduction of social network information dissemination mode, this paper analy...The rapid development of the Intemet makes the social network of information dissemination has undergone tremendous changes. Based on the introduction of social network information dissemination mode, this paper analyzes the influencing factors of information dissemination, establishes the user preference model through CP-nets tool, and combines the AHP principle to mine the user's preference order, and obtain the user's optimal preference feature Portfolio, and finally collect the user in the microblogging platform in the historical behavior data. the use of NetLogo different users of information dissemination decision to predict.展开更多
Frequent itemset mining is an essential problem in data mining and plays a key role in many data mining applications.However,users’personal privacy will be leaked in the mining process.In recent years,application of ...Frequent itemset mining is an essential problem in data mining and plays a key role in many data mining applications.However,users’personal privacy will be leaked in the mining process.In recent years,application of local differential privacy protection models to mine frequent itemsets is a relatively reliable and secure protection method.Local differential privacy means that users first perturb the original data and then send these data to the aggregator,preventing the aggregator from revealing the user’s private information.We propose a novel framework that implements frequent itemset mining under local differential privacy and is applicable to user’s multi-attribute.The main technique has bitmap encoding for converting the user’s original data into a binary string.It also includes how to choose the best perturbation algorithm for varying user attributes,and uses the frequent pattern tree(FP-tree)algorithm to mine frequent itemsets.Finally,we incorporate the threshold random response(TRR)algorithm in the framework and compare it with the existing algorithms,and demonstrate that the TRR algorithm has higher accuracy for mining frequent itemsets.展开更多
User interest mining on Sina Weibo is the basis of personalized recommendations,advertising,marketing promotions,and other tasks.Although great progress has been made in this area,previous studies have ignored the dif...User interest mining on Sina Weibo is the basis of personalized recommendations,advertising,marketing promotions,and other tasks.Although great progress has been made in this area,previous studies have ignored the differences among users:the varied behaviors and habits that lead to unique user data characteristics.It is unreasonable to use a single strategy to mine interests from such varied user data.Therefore,this paper proposes an adaptive model for user interest mining based on a multi-agent system whose input includes self-descriptive user data,microblogs and correlations.This method has the ability to select the appropriate strategy based on each user’s data characteristics.The experimental results show that the proposed method performs better than the baselines.展开更多
The exchange of information is an innate and natural process that assist in content dispersal.Social networking sites emerge to enrich their users by providing the facility for sharing information and social interacti...The exchange of information is an innate and natural process that assist in content dispersal.Social networking sites emerge to enrich their users by providing the facility for sharing information and social interaction.The extensive adoption of social networking sites also resulted in user content generation.There are diverse research areas explored by the researchers to investigate the influence of social media on users and confirmed that social media sites have a significant impact on markets,politics and social life.Facebook is extensively used platform to share information,thoughts and opinions through posts and comments.The identification of influential users on the social web has grown as hot research field because of vast applications in diverse areas for instance political campaigns marketing,e-commerce,commercial and,etc.Prior research studies either uses linguistic content or graph-based representation of social network for the detection of influential users.In this article,we incorporate association rule mining algorithms to identify the top influential users through frequent patterns.The association rules have been computed using the standard evaluation measures such as support,confidence,lift,and conviction.To verify the results,we also involve conventional metrics for example accuracy,precision,recall and F1-measure according to the association rules perspective.The detailed experiments are carried out using the benchmark College-Msg dataset extracted by Facebook.The obtained results validate the quality and visibility of the proposed approach.The outcome of propose model verify that the association rule mining is able to generate rules to identify the temporal influential users on Facebook who are consistent on regular basis.The preparation of rule set help to create knowledge-based systems which are efficient and widely used in recent era for decision making to solve real-world problems.展开更多
As social media and online activity continue to pervade all age groups, it serves as a crucial platform for sharing personal experiences and opinions as well as information about attitudes and preferences for certain ...As social media and online activity continue to pervade all age groups, it serves as a crucial platform for sharing personal experiences and opinions as well as information about attitudes and preferences for certain interests or purchases. This generates a wealth of behavioral data, which, while invaluable to businesses, researchers, policymakers, and the cybersecurity sector, presents significant challenges due to its unstructured nature. Existing tools for analyzing this data often lack the capability to effectively retrieve and process it comprehensively. This paper addresses the need for an advanced analytical tool that ethically and legally collects and analyzes social media data and online activity logs, constructing detailed and structured user profiles. It reviews current solutions, highlights their limitations, and introduces a new approach, the Advanced Social Analyzer (ASAN), that bridges these gaps. The proposed solutions technical aspects, implementation, and evaluation are discussed, with results compared to existing methodologies. The paper concludes by suggesting future research directions to further enhance the utility and effectiveness of social media data analysis.展开更多
Traditional researches on user preferences mining mainly explore the user’s overall preferences on the project,but ignore that the fundamental motivation of user preferences comes from their attitudes on some attribu...Traditional researches on user preferences mining mainly explore the user’s overall preferences on the project,but ignore that the fundamental motivation of user preferences comes from their attitudes on some attributes of the project.In addition,traditional researches seldom consider the typical preferences combination of group users,which may have influence on the personalized service for group users.To solve this problem,a method with noise reduction for group user preferences mining is proposed,which focuses on mining the multi-attribute preference tendency of group users.Firstly,both the availability of data and the noise interference on preferences mining are considered in the algorithm design.In the process of generating group user preferences,a new path is used to generate preference keywords so as to reduce the noise interference.Secondly,the Gibbs sampling algorithm is used to estimate the parameters of the model.Finally,using the user comment data of several online shopping websites as experimental objects,the method is used to mine the multi-attribute preferences of different groups.The proposed method is compared with other methods from three aspects of predictive ability,preference mining ability and preference topic similarity.Experimental results show that the method is significantly better thap other existing methods.展开更多
Location privacy receives considerable attentions in emerging location based services.Most current practices however either ignore users' preferences or incompletely fulfill privacy preferences.In this paper,we propo...Location privacy receives considerable attentions in emerging location based services.Most current practices however either ignore users' preferences or incompletely fulfill privacy preferences.In this paper,we propose a privacy protection solution to allow users' preferences in the fundamental query of k nearest neighbors (kNN).Particularly,users are permitted to choose privacy preferences by specifying minimum inferred region.Via Hilbert curve based transformation,the additional workload from users' preferences is alleviated.Furthermore,this transformation reduces time-expensive region queries in 2-D space to range the ones in 1-D space.Therefore,the time efficiency,as well as communication efficiency,is greatly improved due to clustering properties of Hilbert curve.Further,details of choosing anchor points are theoretically elaborated.The empirical studies demonstrate that our implementation delivers both flexibility for users' preferences and scalability for time and communication costs.展开更多
Web-log contains a lot of information related with user activities on the Internet. How to mine user browsing interest patterns effectively is an important and challengeable research topic. On the analysis of the pres...Web-log contains a lot of information related with user activities on the Internet. How to mine user browsing interest patterns effectively is an important and challengeable research topic. On the analysis of the present algorithm’s advantages and disadvantages we propose a new concept: support-interest. Its key insight is that visitor will backtrack if they do not find the information where they expect. And the point from where they backtrack is the expected location for the page. We present User Access Matrix and the corresponding algorithm for discovering such expected locations that can handle page caching by the browser. Since the URL-URL matrix is a sparse matrix which can be represented by List of 3-tuples, we can mine user preferred sub-paths from the computation of this matrix. Accordingly, all the sub-paths are merged, and user preferred paths are formed. Experiments showed that it was accurate and scalable. It’s suitable for website based application, such as to optimize website’s topological structure or to design personalized services. Key words Web Mining - user preferred path - Web-log - support-interest - personalized services CLC number TP 391 Foundation item: Supported by the National High Technology Development (863 program of China) (2001AA113182)Biography: ZHOU Hong-fang (1976-), female.Ph. D candidate, research direction: data mining and knowledge discovery in databases.展开更多
Nowadays, an increasing number of web applications require identification registration. However, the behavior of website registration has not ever been thoroughly studied. We use the database provided by the Chinese S...Nowadays, an increasing number of web applications require identification registration. However, the behavior of website registration has not ever been thoroughly studied. We use the database provided by the Chinese Software Develop Net (CSDN) to provide a complete perspective on this research point. We concentrate on the following three aspects: complexity, correlation, and preference. From these analyses, we draw the following conclusions: firstly, a considerable number of users have not realized the importance of identification and are using very simple identifications that can be attacked very easily. Secondly, there is a strong complexity correlation among the three parts of identification. Thirdly, the top three passwords that users like are 123456789, 12345678 and 11111111, and the top three email providers that they prefer are NETEASE, qq and sina. Further, we provide some suggestions to improve the quality of user passwords.展开更多
Group recommendations derive from a phenomenon in which people tend to participate in activities together regardless of whether they are online or in reality,which creates real scenarios and promotes the development o...Group recommendations derive from a phenomenon in which people tend to participate in activities together regardless of whether they are online or in reality,which creates real scenarios and promotes the development of group recommendation systems.Different from traditional personalized recommendation methods,which are concerned only with the accuracy of recommendations for individuals,group recommendation is expected to balance the needs of multiple users.Building a proper model for a group of users to improve the quality of a recommended list and to achieve a better recommendation has become a large challenge for group recommendation applications.Existing studies often focus on explicit user characteristics,such as gender,occupation,and social status,to analyze the importance of users for modeling group preferences.However,it is usually difficult to obtain extra user information,especially for ad hoc groups.To this end,we design a novel entropy-based method that extracts users’implicit characteristics from users’historical ratings to obtain the weights of group members.These weights represent user importance so that we can obtain group preferences according to user weights and then model the group decision process to make a recommendation.We evaluate our method for the two metrics of recommendation relevance and overall ratings of recommended items.We compare our method to baselines,and experimental results show that our method achieves a significant improvement in group recommendation performance.展开更多
基金supported by Natural Science Foundation of China(Grant 61901070,61801065,62271096,61871062,U20A20157 and 62061007)in part by the Science and Technology Research Program of Chongqing Municipal Education Commission(Grant KJQN202000603 and KJQN201900611)+3 种基金in part by the Natural Science Foundation of Chongqing(Grant CSTB2022NSCQMSX0468,cstc2020jcyjzdxmX0024 and cstc2021jcyjmsxmX0892)in part by University Innovation Research Group of Chongqing(Grant CxQT20017)in part by Youth Innovation Group Support Program of ICE Discipline of CQUPT(SCIE-QN-2022-04)in part by the Chongqing Graduate Student Scientific Research Innovation Project(CYB22246)。
文摘The emergence of various new services has posed a huge challenge to the existing network architecture.To improve the network delay and backhaul pressure,caching popular contents at the edge of network has been considered as a feasible scheme.However,how to efficiently utilize the limited caching resources to cache diverse contents has been confirmed as a tough problem in the past decade.In this paper,considering the time-varying user requests and the heterogeneous content sizes,a user preference aware hierarchical cooperative caching strategy in edge-user caching architecture is proposed.We divide the caching strategy into three phases,that is,the content placement,the content delivery and the content update.In the content placement phase,a cooperative content placement algorithm for local content popularity is designed to cache contents proactively.In the content delivery phase,a cooperative delivery algorithm is proposed to deliver the cached contents.In the content update phase,a content update algorithm is proposed according to the popularity of the contents.Finally,the proposed caching strategy is validated using the MovieLens dataset,and the results reveal that the proposed strategy improves the delay performance by at least 35.3%compared with the other three benchmark strategies.
基金supported by the National Natural Science Foundation of China Project(No.62302540)The Open Foundation of Henan Key Laboratory of Cyberspace Situation Awareness(No.HNTS2022020)+2 种基金Natural Science Foundation of Henan Province Project(No.232300420422)The Natural Science Foundation of Zhongyuan University of Technology(No.K2023QN018)Key Research and Promotion Project of Henan Province in 2021(No.212102310480).
文摘A deep learning access controlmodel based on user preferences is proposed to address the issue of personal privacy leakage in social networks.Firstly,socialusers andsocialdata entities are extractedfromthe social networkandused to construct homogeneous and heterogeneous graphs.Secondly,a graph neural networkmodel is designed based on user daily social behavior and daily social data to simulate the dissemination and changes of user social preferences and user personal preferences in the social network.Then,high-order neighbor nodes,hidden neighbor nodes,displayed neighbor nodes,and social data nodes are used to update user nodes to expand the depth and breadth of user preferences.Finally,a multi-layer attention network is used to classify user nodes in the homogeneous graph into two classes:allow access and deny access.The fine-grained access control problem in social networks is transformed into a node classification problem in a graph neural network.The model is validated using a dataset and compared with other methods without losing generality.The model improved accuracy by 2.18%compared to the baseline method GraphSAGE,and improved F1 score by 1.45%compared to the baseline method,verifying the effectiveness of the model.
基金The Natural Science Foundation of South-Central University for Nationalities(No.YZZ07006)
文摘In order to rank searching results according to the user preferences,a new personalized web pages ranking algorithm called PWPR(personalized web page ranking)with the idea of adjusting the ranking scores of web pages in accordance with user preferences is proposed.PWPR assigns the initial weights based on user interests and creates the virtual links and hubs according to user interests.By measuring user click streams,PWPR incrementally reflects users’ favors for the personalized ranking.To improve the accuracy of ranking, PWPR also takes collaborative filtering into consideration when the query with similar is submitted by users who have similar user interests. Detailed simulation results and comparison with other algorithms prove that the proposed PWPR can adaptively provide personalized ranking and truly relevant information to user preferences.
文摘To overcome the subjectivity of experts in the process of risk response scheme selection, according to the theory of group decision making, a selection method and flow of the risk response schemes for a mining project was proposed based on fuzzy preference relation and consistency induced ordered weighted averaging (C-IOWA) operator,which can overcome the loss of information in the process of group decision making to a great degree, and improve its efficiency and quality.A numeric example was introduced to illustrate the application of the method, also validating the method as scientific and practicable.
文摘Over the years, there has been increasing growth in academic digital libraries. It has therefore become overwhelming for researchers to determine important research materials. In most existing research works that consider scholarly paper recommendation, the researcher’s preference is left out. In this paper, therefore, Frequent Pattern (FP) Growth Algorithm is employed on potential papers generated from the researcher’s preferences to create a list of ranked papers based on citation features. The purpose is to provide a recommender system that is user oriented. A walk through algorithm is implemented to generate all possible frequent patterns from the FP-tree after which an output of ordered recommended papers combining subjective and objective factors of the researchers is produced. Experimental results with a scholarly paper recommendation dataset show that the proposed method is very promising, as it outperforms recommendation baselines as measured with nDCG and MRR.
文摘Staircase is an important means of vertical transportation. Staircase design exerts a great influence on the aesthetics, transportation efficiency, user comfort and experience level. In this paper, a survey on the staircase rotation preference was conducted, based on the environment behavior studies. Different user frequencies of a pair of scissors stairs in the 2nd teaching building of North China University of Technology were analyzed. The psychological effect was evaluated and quantified, and the user preference on the two staircase rotations was then withdrawn. The survey found that the type of staircase with clockwise upstairs was much more preferred (78%) than the other staircase rotation anti-clock upstairs. Considering different genders, the female shows a 66% higher preference inclination of this type of staircase rotation than the male. To improve the transportation efficiency of the staircase in case of fire, the result of this paper can be very constructive for the evacuation staircase rotation choice for the high-rise buildings.
文摘Corporations focus on web based education to train their employees ever more than before. Unlike traditional learning environments, web based education applications store large amount of data. This growing availability of data stimulated the emergence of a new field called educational data mining. In this study, the classification method is implemented on a data that is obtained from a company which uses web based education to train their employees. The authors' aim is to find out the most critical factors that influence the users' success. For the classification of the data, two decision tree algorithms, Classification and Regression Tree (CART) and Quick, Unbiased and Efficient Statistical Tree (QUEST) are applied. According to the results, assurance of a certificate at the end of the training is found to be the most critical factor that influences the users' success. Position, number of work years and the education level of the user, are also found as important factors.
文摘The rapid development of the Intemet makes the social network of information dissemination has undergone tremendous changes. Based on the introduction of social network information dissemination mode, this paper analyzes the influencing factors of information dissemination, establishes the user preference model through CP-nets tool, and combines the AHP principle to mine the user's preference order, and obtain the user's optimal preference feature Portfolio, and finally collect the user in the microblogging platform in the historical behavior data. the use of NetLogo different users of information dissemination decision to predict.
基金This paper is supported by the Inner Mongolia Natural Science Foundation(Grant Number:2018MS06026,Sponsored Authors:Liu,H.and Ma,X.,Sponsors’Websites:http://kjt.nmg.gov.cn/)the Science and Technology Program of Inner Mongolia Autonomous Region(Grant Number:2019GG116,Sponsored Authors:Liu,H.and Ma,X.,Sponsors’Websites:http://kjt.nmg.gov.cn/).
文摘Frequent itemset mining is an essential problem in data mining and plays a key role in many data mining applications.However,users’personal privacy will be leaked in the mining process.In recent years,application of local differential privacy protection models to mine frequent itemsets is a relatively reliable and secure protection method.Local differential privacy means that users first perturb the original data and then send these data to the aggregator,preventing the aggregator from revealing the user’s private information.We propose a novel framework that implements frequent itemset mining under local differential privacy and is applicable to user’s multi-attribute.The main technique has bitmap encoding for converting the user’s original data into a binary string.It also includes how to choose the best perturbation algorithm for varying user attributes,and uses the frequent pattern tree(FP-tree)algorithm to mine frequent itemsets.Finally,we incorporate the threshold random response(TRR)algorithm in the framework and compare it with the existing algorithms,and demonstrate that the TRR algorithm has higher accuracy for mining frequent itemsets.
文摘User interest mining on Sina Weibo is the basis of personalized recommendations,advertising,marketing promotions,and other tasks.Although great progress has been made in this area,previous studies have ignored the differences among users:the varied behaviors and habits that lead to unique user data characteristics.It is unreasonable to use a single strategy to mine interests from such varied user data.Therefore,this paper proposes an adaptive model for user interest mining based on a multi-agent system whose input includes self-descriptive user data,microblogs and correlations.This method has the ability to select the appropriate strategy based on each user’s data characteristics.The experimental results show that the proposed method performs better than the baselines.
基金The authors extend their appreciation to the Deanship of Scientific Research at Imam Mohammad Ibn Saud Islamic University for funding this work through Research Group No.RG-21-51-01.
文摘The exchange of information is an innate and natural process that assist in content dispersal.Social networking sites emerge to enrich their users by providing the facility for sharing information and social interaction.The extensive adoption of social networking sites also resulted in user content generation.There are diverse research areas explored by the researchers to investigate the influence of social media on users and confirmed that social media sites have a significant impact on markets,politics and social life.Facebook is extensively used platform to share information,thoughts and opinions through posts and comments.The identification of influential users on the social web has grown as hot research field because of vast applications in diverse areas for instance political campaigns marketing,e-commerce,commercial and,etc.Prior research studies either uses linguistic content or graph-based representation of social network for the detection of influential users.In this article,we incorporate association rule mining algorithms to identify the top influential users through frequent patterns.The association rules have been computed using the standard evaluation measures such as support,confidence,lift,and conviction.To verify the results,we also involve conventional metrics for example accuracy,precision,recall and F1-measure according to the association rules perspective.The detailed experiments are carried out using the benchmark College-Msg dataset extracted by Facebook.The obtained results validate the quality and visibility of the proposed approach.The outcome of propose model verify that the association rule mining is able to generate rules to identify the temporal influential users on Facebook who are consistent on regular basis.The preparation of rule set help to create knowledge-based systems which are efficient and widely used in recent era for decision making to solve real-world problems.
文摘As social media and online activity continue to pervade all age groups, it serves as a crucial platform for sharing personal experiences and opinions as well as information about attitudes and preferences for certain interests or purchases. This generates a wealth of behavioral data, which, while invaluable to businesses, researchers, policymakers, and the cybersecurity sector, presents significant challenges due to its unstructured nature. Existing tools for analyzing this data often lack the capability to effectively retrieve and process it comprehensively. This paper addresses the need for an advanced analytical tool that ethically and legally collects and analyzes social media data and online activity logs, constructing detailed and structured user profiles. It reviews current solutions, highlights their limitations, and introduces a new approach, the Advanced Social Analyzer (ASAN), that bridges these gaps. The proposed solutions technical aspects, implementation, and evaluation are discussed, with results compared to existing methodologies. The paper concludes by suggesting future research directions to further enhance the utility and effectiveness of social media data analysis.
基金the Major Project of National Social Science Foundation of China under Grant No.20&ZD127.
文摘Traditional researches on user preferences mining mainly explore the user’s overall preferences on the project,but ignore that the fundamental motivation of user preferences comes from their attitudes on some attributes of the project.In addition,traditional researches seldom consider the typical preferences combination of group users,which may have influence on the personalized service for group users.To solve this problem,a method with noise reduction for group user preferences mining is proposed,which focuses on mining the multi-attribute preference tendency of group users.Firstly,both the availability of data and the noise interference on preferences mining are considered in the algorithm design.In the process of generating group user preferences,a new path is used to generate preference keywords so as to reduce the noise interference.Secondly,the Gibbs sampling algorithm is used to estimate the parameters of the model.Finally,using the user comment data of several online shopping websites as experimental objects,the method is used to mine the multi-attribute preferences of different groups.The proposed method is compared with other methods from three aspects of predictive ability,preference mining ability and preference topic similarity.Experimental results show that the method is significantly better thap other existing methods.
基金Supported by the National Natural Science Foundation of China under Grant Nos. 61003057 and 60973023
文摘Location privacy receives considerable attentions in emerging location based services.Most current practices however either ignore users' preferences or incompletely fulfill privacy preferences.In this paper,we propose a privacy protection solution to allow users' preferences in the fundamental query of k nearest neighbors (kNN).Particularly,users are permitted to choose privacy preferences by specifying minimum inferred region.Via Hilbert curve based transformation,the additional workload from users' preferences is alleviated.Furthermore,this transformation reduces time-expensive region queries in 2-D space to range the ones in 1-D space.Therefore,the time efficiency,as well as communication efficiency,is greatly improved due to clustering properties of Hilbert curve.Further,details of choosing anchor points are theoretically elaborated.The empirical studies demonstrate that our implementation delivers both flexibility for users' preferences and scalability for time and communication costs.
文摘Web-log contains a lot of information related with user activities on the Internet. How to mine user browsing interest patterns effectively is an important and challengeable research topic. On the analysis of the present algorithm’s advantages and disadvantages we propose a new concept: support-interest. Its key insight is that visitor will backtrack if they do not find the information where they expect. And the point from where they backtrack is the expected location for the page. We present User Access Matrix and the corresponding algorithm for discovering such expected locations that can handle page caching by the browser. Since the URL-URL matrix is a sparse matrix which can be represented by List of 3-tuples, we can mine user preferred sub-paths from the computation of this matrix. Accordingly, all the sub-paths are merged, and user preferred paths are formed. Experiments showed that it was accurate and scalable. It’s suitable for website based application, such as to optimize website’s topological structure or to design personalized services. Key words Web Mining - user preferred path - Web-log - support-interest - personalized services CLC number TP 391 Foundation item: Supported by the National High Technology Development (863 program of China) (2001AA113182)Biography: ZHOU Hong-fang (1976-), female.Ph. D candidate, research direction: data mining and knowledge discovery in databases.
基金supported by the Foundation for Key Program of Ministry of Education, China under Grant No.311007National Science Foundation Project of China under Grants No. 61202079, No.61170225, No.61271199+1 种基金the Fundamental Research Funds for the Central Universities under Grant No.FRF-TP-09-015Athe Fundamental Research Funds in Beijing Jiaotong University under Grant No.W11JB00630
文摘Nowadays, an increasing number of web applications require identification registration. However, the behavior of website registration has not ever been thoroughly studied. We use the database provided by the Chinese Software Develop Net (CSDN) to provide a complete perspective on this research point. We concentrate on the following three aspects: complexity, correlation, and preference. From these analyses, we draw the following conclusions: firstly, a considerable number of users have not realized the importance of identification and are using very simple identifications that can be attacked very easily. Secondly, there is a strong complexity correlation among the three parts of identification. Thirdly, the top three passwords that users like are 123456789, 12345678 and 11111111, and the top three email providers that they prefer are NETEASE, qq and sina. Further, we provide some suggestions to improve the quality of user passwords.
基金This study is funded by the National Natural Science Foundation of China(Nos.61862013,61662015,U1811264,and U1711263)Guangxi Natural Science Foundation of China(Nos.2018GXNSFAA281199 and 2017GXNSFAA198035)+1 种基金Guangxi Key Laboratory of Automatic Measurement Technology and Instrument(No.YQ19109)Guangxi Key Laboratory of Trusted Software(No.kx201915).
文摘Group recommendations derive from a phenomenon in which people tend to participate in activities together regardless of whether they are online or in reality,which creates real scenarios and promotes the development of group recommendation systems.Different from traditional personalized recommendation methods,which are concerned only with the accuracy of recommendations for individuals,group recommendation is expected to balance the needs of multiple users.Building a proper model for a group of users to improve the quality of a recommended list and to achieve a better recommendation has become a large challenge for group recommendation applications.Existing studies often focus on explicit user characteristics,such as gender,occupation,and social status,to analyze the importance of users for modeling group preferences.However,it is usually difficult to obtain extra user information,especially for ad hoc groups.To this end,we design a novel entropy-based method that extracts users’implicit characteristics from users’historical ratings to obtain the weights of group members.These weights represent user importance so that we can obtain group preferences according to user weights and then model the group decision process to make a recommendation.We evaluate our method for the two metrics of recommendation relevance and overall ratings of recommended items.We compare our method to baselines,and experimental results show that our method achieves a significant improvement in group recommendation performance.