CN104008163A - Trust based social network maximum influence node calculation method - Google Patents
Trust based social network maximum influence node calculation method Download PDFInfo
- Publication number
- CN104008163A CN104008163A CN201410234220.0A CN201410234220A CN104008163A CN 104008163 A CN104008163 A CN 104008163A CN 201410234220 A CN201410234220 A CN 201410234220A CN 104008163 A CN104008163 A CN 104008163A
- Authority
- CN
- China
- Prior art keywords
- node
- trust
- community network
- degree
- social networks
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/958—Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking
Landscapes
- Engineering & Computer Science (AREA)
- Databases & Information Systems (AREA)
- Theoretical Computer Science (AREA)
- Data Mining & Analysis (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention particularly discloses a trust based social network maximum influence node calculation method and relates to the technical field of social networking. The trust based social network maximum influence node calculation method comprises calculating the trust degree between nodes due to analysis of transaction conditions between the nodes, calculating the influence value between the nodes according to the distance between the nodes, synthesizing the trust degree and the influence value of the nodes, obtaining the node comprehensive influence, synthesizing the node comprehensive influence and the number of nodes which can be activated to find out the potential node having the largest influence and adding the selected node into node concentration; selecting the node having the largest influence; enabling the selected node to be used for developing a social network. The trust based social network maximum influence node calculation method has practical application prospects in aspects such as the internet network safety due to being relates to aspects such as direct trust, indirect trust, direct influence, indirect influence, comprehensive influence and social network influence between the users.
Description
Technical field
The present invention relates to social networks technical field, in particular, is to maximize based on the community network of trusting the computing method that affect node.
Background technology
In recent years, along with the universal and develop rapidly of Internet, a large amount of community networks are shown one's talent, as the Friendster based on love affair, and the LinkedIn based on work relationship etc.Community network is by the complex network forming because of the interactive relation forming between Social Individual and individuality.The community network of this complexity, the propagation to information and diffusion play vital effect, and community network is a double-edged sword simultaneously.Utilize on the one hand the interchange that community network is convenient for people to and diffuse information, such as, community network has huge effect at the real idea fermentation of reflection broad masses.Meanwhile, under the supervision of a few thing that makes government by community network in the people, play a part positive for building a sound social environment.On the other hand, utilize community network to make the harmful thing of the country and people with chance also to some lawless persons.Therefore, in the time utilizing social networks, how to accomplish to maximize favourable factors and minimize unfavourable ones, effectively supervision, is also the subject matter of community network development now.Huge in view of the number of members of some large-scale community networks, and relation is each other more complicated, finally can be on people's behavior generation impact.Their appearance maximizes and has brought huge challenge to the society of legacy network.There is the research of many related fields.Traditional greedy algorithm of naturally climbing the mountain proposing as Kemple and Kleinberg, each step is all chosen the current influential node of tool, but too high for large-scale social networks complexity, and does not consider the degree of belief problem between node, and impracticable.The people such as farming family's hall have proposed a kind of new-type hybrid having the greatest impact algorithm based on linear threshold, this algorithm is divided into two stages: heuristics phase is chosen the node of potential impact maximum, the greed stage is chosen the node having the greatest impact, but do not consider the different different problems of node activation threshold, equally the degree of belief between node is not considered yet.The community network based on threshold value that the people such as Chen Hao propose maximizes impact, the problem that different node activation thresholds is different is improved, but do not consider equally the importance of the degree of belief between node, ignored the impact that its maximization on community network produces.
As previously mentioned, the social maximization problems research of current social network, is all generally based on linear threshold model and independent cascade model.For the research of having the greatest impact of community network, mainly concentrate under independent cascade model and utilize time module feature to reduce in the complexity of greedy algorithm at present.But all just consider the impact between node, the degree of belief between node had not been considered.Due to the limitation of considering, cause the imperfection of research method, the community network that makes finally to choose maximize affect the obtained coverage of set of node can be relatively little.
Summary of the invention
Object of the present invention, for the disappearance existing in prior art and deficiency, proposes to maximize based on the community network of trusting the computing method that affect node.
The present invention is the research of the relevant issues of carrying out under social networks, because social networks is an abstract and complicated object, analyzes for convenient, has introduced the method for graph theory, by the social networks imagery of abstract.And introduce and trust this element, consider to trust the material impact to activating node, by the degree of belief between node and influence value combination, draw combined influence value, then be worth having the greatest impact of community network node according to combined influence.
The present invention, proposes a kind of heuritic approach (as shown in Figure 1) based on trusting between node based on linear threshold model, its basic procedure:
First, calculate the degree of belief between node by the transaction situation between analysis node, calculate internodal influence value according to the distance of distance between node, degree of belief to node and influence value carry out comprehensively, obtain the combined influence of egress, the combined influence of node and the current nodes that can activate of this node are carried out comprehensively, finding out the node of potential impact maximum, the node of choosing is joined in set of node.
Secondly, choose the node having the greatest impact.
Finally, by the set of node of choosing for developing social networks.
The community network that the present invention is based on trust maximizes the computing method that affect node, and concrete steps are:
A. defining social networks and social networks maximizes and affects the discovery of node, chooses
B. heuristics phase: (1), if un-activation node v is the out-degree node that has activated node u, v is direct trust to the trust of u, calculates directly and trusts; If v is reached at the node of u, v is indirect trust to the trust of u, calculates indirectly and trusts.(2) if un-activation node v is the out-degree node that has activated node u, u is direct impact on the impact of v, calculates directly impact; If v is reached at the node of u, u is remote effect on the impact of v, calculates remote effect.(3) influence value calculating in conjunction with above-mentioned two situations and trust value, the combined influence of computing node u.(4) the node combined influence value drawing according to above step and can activate interstitial content, the community network that calculates node affects.(5) node that the community network of heuristics phase being chosen has the greatest impact joins in having the greatest impact of community network node set.
C. the greed stage: from remaining node, choose the current node that can activate at most node that has, join in having the greatest impact of community network node set.
D. the generation of having the greatest impact of community network node set.
Wherein, the detailed process of described steps A is:
Described social networks turns to two orderly tuple <V of a figure G with form, E>,
|V|=n,V={v
1,v
2,......v
n},|E|=m,E={e
1,e
2,e
3......e
m}
Each user in social networks is used as to a node, is expressed as:
G=(V,E)
(1) V is a non-NULL finite set, and the set being made up of the user node in social networks, is called vertex set;
(2) E represents the finite multiple subset of the ordered set V & V of the relation between user in social networks, and the set that element repeats, is called limit collection, referred to as limit.
Described node is the major part that forms social networks, regards the each user in social networks as a node, is divided into according to the state of node:
(1) activate node, in social networks, if a certain user node has been bought a certain commodity or accepted a certain idea, be called the node of activation about these commodity or idea.
(2) un-activation node, in social networks, if a certain user node is not bought a certain commodity or do not accepted a certain idea, is called the un-activation node about these commodity or idea.
Mutual relationship between described node is divided into:
(1) out-degree node, in G=(V, E),
the node of limit using u as initial point terminal pointed, is called the out-degree node of node u.
(2) in-degree node, in G=(V, E),
the node of the corresponding initial point in limit using u as terminal, is called the in-degree node of node u.
(3) can reach node, in G=(V, E),
u
1can arrive u by specific path
2, and u
2not u
1out-degree node, claim u
2u
1reached at node.
(4) unreachable node, in G=(V, E),
u
1do not exist path to arrive u
2, claim u
2u
1unreachable node.
Described social networks maximizes affect node discovery, finds in social networks the influential member of tool.
Described k social networks maximizes affects choosing of node, makes the number finally buying or diffuse information maximum, and introduces heuristic factor c, chooses in heuristics phase
individual having the greatest impact of community network node, the greed stage is chosen
individual having the greatest impact of community network node.
Wherein, the detailed process of described step B is:
(1) if un-activation node v is the out-degree node that has activated node u, the direct trust that v produces u, its computing method are:
Wherein,
DT
uvfor the trust of v to u.Wherein, O
srepresent the recommendation success of u to v,
be illustrated in and recommend for the k time successfully, while recommending successfully, O
sbe 1, recommend failed O
sbe 0.
W
sweights while representing to recommend successfully,
be illustrated in the weights while recommending for the k time successfully;
O
crepresent the weights of evaluating, and O
c∈ [0,1],
represent the weights of the evaluation providing while recommendation for the k time,
RTN (u) is the prestige of node u.N (u) is the set of the out-degree node of u, RTN (u → w) be u go out the trust value of limit neighbours w to it, out (u) represents the out-degree of u, i.e. the trust value RTN (u) of u depends on its trust of all limit neighbours of going out to it.
For each node, a given initial trust value.
If v is reached at the node of u, v produces indirectly and trusts u, and its computing method are:
IT
uvthe trust of v to u.U is n bar to the path of v, and traversal u is to each paths of v, h
ibe u to the level at v place on the i path of v, be equivalent to the height of v on binary tree, array H[n] in deposit the level of each u to v place on the path of v.
(2) if un-activation node v is the out-degree node that has activated node u, u has a direct impact v, and its computing method are:
Wherein, DI
uvfor the direct impact that u produces v, λ is decay factor, and W (u, v) is the weight on limit (u, v), and out (u) is the out-degree of node u, and set O (v) is the set that goes out limit neighbours of node v.
If v is reached at the node of u, u produces remote effect to v, and its computing method are:
IE
uvfor the remote effect of u to v generation.Wherein, PA[n] [n] be u to the set of the node of process in all paths of v, for each road is through distributing a two-dimensional array.PA[i] storage is j node in i paths in [j]; PA[i] [n] be every paths i, total n paths, every u is to the path effects sum of v;
represent that i paths did not travel through; W is the weights that connect the limit of two adjacent nodes in a paths; λ represents the reduction of weights effect; Out (p
i) expression node p
iout-degree.
(3) suppose to activate node u, un-activation node is v, and u can arrive v by specific path, introduces multi-stress θ, θ ∈ [0,1].
If 1. un-activation node v is the out-degree node that has activated node u, the computing method of the combined influence of u to v are:
CE
uv=θDI
uv+(1-θ)DT
uv (5)
If 2. v is reached at the node of u, the computing method of the combined influence of u to v are:
CE
uv=θIE
uv+(1-θ)IT
uv (6)
(4) heuristics phase is chosen social network influence to maximize the standard of node is combined influence and the current nodes that activates of node of node.By both combinations, can find more accurately community network to maximize affects node, and joins in the set of having the greatest impact of community network node.The node that heuristics phase is selected, although not necessarily have maximum coverage, is but containing huge potential impact.
Social network influence node is calculated as follows:
Wherein, MISN
uit is the community network impact of u; R (u → v) represent that u can arrive v through specific path; R represents a certain paths of u to v; r
active=0 represents not live through this paths; N is the current nodes being activated by u; Out (u) is the out-degree of node u.
(5) according to the community network impact of the node having calculated, therefrom choose the node that community network has the greatest impact, join in having the greatest impact of community network node set.
Wherein, the detailed process of described step C is:
The greed stage is exactly from remaining node, chooses the current node that can activate at most node that has, and joins in having the greatest impact of community network node set.
Wherein, the detailed process of described step D is:
The generation of having the greatest impact of community network node set.
As mentioned above, compared with prior art, what the present invention proposed maximizes based on the community network of trusting the computing method that affect node, and can choose more accurately community network maximization affects node, thereby realizes as much as possible having the greatest impact of community network.The present invention, from direct trust, trusts indirectly, directly impact, and remote effect, combined influence, the aspects such as community network impact, realize choosing of having the greatest impact of community network node.
Brief description of the drawings
Fig. 1 maximizes based on the community network of trusting the FB(flow block) that affects node computing method in the present invention;
Fig. 2 is that the community network that the present invention is based on trust maximizes the network node figure of an example that affects node computing method.
Embodiment
Below in conjunction with drawings and Examples, the present invention is further described
First the present invention maximizes and affects the discovery of node and define social networks and social networks:
Define 1 social networks.A social networks can form turn to a figure G, and figure G is two orderly tuple <V, E>, wherein,
(1) V is a non-NULL finite set, and the set being made up of the user node in social networks, is called vertex set.
(2) E represents the finite multiple subset of the ordered set V & V of the relation between user in social networks, and the set that element repeats, is called limit collection, referred to as limit.
Define 2 social network influence and maximize node discovery.Find the influential member of tool in social networks.Select k social networks to maximize to affect node to make the number finally buying or diffuse information maximum.
In the present invention, the each user in social networks is used as to a node, can be expressed as: G=(V, E), V represents the user node set in social networks, E represents the limit between user node in social networks.| V|=n, V={v
1, v
2... v
n, choose from figure G in heuristics phase
individual node, adds figure
The complex network being made up of the relation between user and user due to social networks, so the present invention has carried out related definition to concepts such as nodes.
Define 3 nodes.Node is the major part that forms social networks, regards the each user in social networks as a node in this article, and each node has the attribute of himself.Meanwhile, according to the state of node, node can be divided into again: activated node and un-activation node.
(1) activated node.In social networks, if a certain user node has been bought a certain commodity or accepted a certain idea, be called the node of activation about these commodity or idea.
(2) un-activation node.In social networks, if a certain user node is not bought a certain commodity or do not accepted a certain idea, be called the un-activation node about these commodity or idea.
Definition 4 is according to the position relationship between node, and the mutual relationship between node is divided into: out-degree node, in-degree node, can reach node, unreachable node.
(1) out-degree node.In G=(V, E),
the node of limit using u as initial point terminal pointed, is called the out-degree node of node u.
(2) in-degree node.In G=(V, E),
the node of the corresponding initial point in limit using u as terminal, is called the in-degree node of node u.
(3) can reach node.In G=(V, E),
u
1can arrive u by specific path
2, and u
2not u
1out-degree node, claim u
2u
1reached at node.
(4) unreachable node.In G=(V, E),
u
1do not exist path to arrive u
2, claim u
2u
1unreachable node.
Provide community network of the present invention below, and maximize the computing method that affect node:
Maximize the computing method that affect node based on the community network of trusting, the concrete steps of these computing method are:
A. defining social networks and social networks maximizes and affects the discovery of node, chooses
B. heuristics phase: (1), if un-activation node v is the out-degree node that has activated node u, v is direct trust to the trust of u, calculates directly and trusts; If v is reached at the node of u, v is indirect trust to the trust of u, calculates indirectly and trusts.(2) if un-activation node v is the out-degree node that has activated node u, u is direct impact on the impact of v, calculates directly impact; If v is reached at the node of u, u is remote effect on the impact of v, calculates remote effect.(3) influence value calculating in conjunction with above-mentioned two situations and trust value, the combined influence value of computing node u.(4) the node combined influence value drawing according to above step and can activate interstitial content, the community network that calculates node affects.(5) node that the community network of heuristics phase being chosen has the greatest impact joins in having the greatest impact of community network node set.
C. the greed stage: from remaining node, choose the current node that can activate at most node that has, join in having the greatest impact of community network node set.
D. the generation of having the greatest impact of community network node set.
The research for having the greatest impact of community network node in the past, has all just considered the impact between node, it is considered herein that, the degree of belief between node has vital effect to the node in activation social networks as much as possible.Therefore,, with respect to research in the past, the present invention is more comprehensive.
(1) calculating of directly trusting and indirectly trusting
User node in social networks has been divided into and has activated node and un-activation node, division according to being whether user node is bought certain commodity or whether accepted certain idea.And whether buy certain commodity or whether accept certain idea, depend on whether user is subject to others impact and the trusting degree of user to others' recommendation.
Definition 5 is trusted.Un-activation node in social networks according to self in the past with activate the situation that contacts (bought other commodity in the past or accepted the situation of other idea under the recommendation that activates node) of node or activated the prestige of node, produce trust to a certain degree to activating node.According to the source difference of trusting, will trust again point in order directly to trust and indirect trust.
A. directly trust.Supposing to activate node is u, and un-activation node is v, in the time of out-degree node that v is u, illustrates and between u and v, has contact, and according to contact situation in the past and the prestige of node u itself, v will produce directly trust to u, abbreviation DT.
B. indirectly trust.Supposing to activate node is u, and un-activation node is v, and in the time of reached at node that v is u, the prestige of node u is through the transmission of n layer, and v will produce indirectly and trust u, is called for short IT.
If un-activation node v is the out-degree node that has activated node u, v directly trusts as follows to u generation:
Wherein,
DT
uvfor the trust of v to u.Wherein, O
srepresent the recommendation success of u and v,
be illustrated in and recommend for the k time successfully, while recommending successfully, O
sbe 1, recommend failed O
sbe 0.W
sweights while representing to recommend successfully,
be illustrated in the weights while recommending for the k time successfully; O
crepresent the weights of evaluating, and O
c∈ [0,1],
represent the weights of the evaluation providing while recommendation for the k time,
RTN (u) is the prestige of node u.N (u) is the set of the out-degree node of u, RTN (u → w) be u go out the trust value of limit neighbours w to it, out (u) represents the out-degree of u.Be the trust value RTN (u) of u, depend on its trust of all limit neighbours of going out to it.For each node, a given initial trust value.
If v is reached at the node of u, v produces indirectly and trusts u, and its computing method are:
IT
uvthe trust of v to u.U is n bar to the path of v, and traversal u is to each paths of v, h
ibe u to the level at v place on the i path of v, be equivalent to the height of v on binary tree, array H[n] in deposit the level of each u to v place on the path of v.
(2) the directly calculating of impact and remote effect
Not only there is trusting relationship in the user node in social networks,, also influence each other meanwhile.There is certain impact to unactivated node in the node having activated.
Definition 6 impacts.In social networks, un-activation node is subject to activating the impact of node, can produce and activate similar the reacting of node certain commodity or certain idea.According to the source difference of impact, impact is divided into direct impact and remote effect.
A. directly impact.Supposing to activate node is u, and un-activation node is v, and in the time of out-degree node that v is u, u will exert an influence to v, and the namely direct impact of u on v is called for short DI.
B. remote effect.Supposing to activate node is u, and un-activation node is v, and in the time of reached at node that v is u, u, by transmission successively, will exert an influence to v, and the namely remote effect of u to v are called for short IE.
If un-activation node v is the out-degree node that has activated node u, u will have a direct impact as follows to v:
DI
uvfor the direct impact of u on v generation.Wherein λ is decay factor, and W (u, v) is the weight on limit (u, v), and out (u) is the out-degree of node u, and set O (v) is the set that goes out limit neighbours of node v.
If v is reached at the node of u, will to produce remote effect to v as follows for u:
IE
uvfor the remote effect of u to v generation.Wherein PA[n] be u in [n] to the set of the node of process in the path of v, for each road is through distributing a two-dimensional array; PA[i] storage is j node in i paths in [j]; PA[i] [n] be every paths i, total n paths, every u is to the path effects sum of v;
represent that i paths did not travel through; W is the weights that connect the limit of two adjacent nodes in a paths; λ represents the reduction of weights effect; Out (p
i) expression node p
iout-degree.
(3) calculating of combined influence
In order to obtain the comprehensive unified impact of egress u on v, define combined influence.Because node v exists direct trust and indirectly trusts u, and u exists direct impact and remote effect to v, for being maximized, the community network of postorder affects node (The Max Influence of Social Networking Node, MISN) the work of choosing is carried out fast and effectively, by these four effective combinations of factor, can obtain the combined influence of node u to v, be called for short CE.
Suppose to activate node u, un-activation node is v, and u can arrive v by certain path, introduces multi-stress θ, θ ∈ [0,1].
If a. un-activation node v is the out-degree node that has activated node u, combined influence is:
CE
uv=θDI
uv+(1-θ)DT
uv (5)
If b. v is reached at the node of u, combined influence is:
CE
uv=θIE
uv+(1-θ)IT
uv (6)
(4) calculating of the community network of node impact
Heuristics phase is chosen social networks, and to maximize the standard that affects node be combined influence and the current nodes that activates of node of node.By both combinations, can find more accurately having the greatest impact of community network node, and join in having the greatest impact of community network node set.The node that heuristics phase is selected, although not necessarily have maximum coverage, is but containing huge potential impact.
Social network influence node is calculated as follows:
SN
uit is the combined influence of u.Wherein R (u → v) represent that u can arrive v through certain path; R represents the wherein paths of u to v, r
active=0 represents not live through this paths; N is the number of the current node being activated by u; Out (u) is the out-degree of node u.
Embodiment:
Provide the community network impact calculating (as shown in Figure 2) that following embodiment illustrates node.V={u
1, u
2,, u
3, u
4,, u
5, u
6, u
7, u
8, E={ (u
1, u
2), (u
1, u
3), (u
1, u
4), (u
2, u
5), (u
2, u
6), (u
3, u
7), (u
4, u
5), (u
4, u
7), (u
5, u
6), (u
4, u
7), (u
6, u
8), (u
7, u
8), wherein (u
1, u
2) represent u
1, u
2between limit.
This embodiment has 8 nodes, suppose therefrom to choose 4 nodes as having the greatest impact of community network node, heuristic factor C=0.5, heuristics phase should be chosen two nodes and adds having the greatest impact of community network node set, and the greed stage should be chosen two nodes and add having the greatest impact of community network node set.
Suppose u
1for activating node, u
2, u
3, u
4, u
5, u
6, u
7, u
8for un-activation node.
1. u
1→ u
2, calculate direct trust and directly impact according to formula (1) (3), then calculate combined influence according to formula (5).
2. u
1→ u
3, calculate direct trust and directly impact according to formula (1) (3), then calculate combined influence according to formula (5).
3. u
1→ u
4, calculate direct trust and directly impact according to formula (1) (3), then calculate combined influence according to formula (5).
4. u
1→ u
5, have two paths: u
1→ u
2→ u
5, u
1→ u
4→ u
5.Calculate respectively u according to formula (2) (4)
1→ u
2→ u
5and u
1→ u
4→ u
5indirect trust and remote effect, then calculate combined influence separately according to formula (6).
5. u
1→ u
6, have two paths: u
1→ u
2→ u
6, u
1→ u
2→ u
5→ u
6.Calculate respectively u according to formula (2) (4)
1→ u
2→ u
6and u
1→ u
2→ u
5→ u
6indirect trust and remote effect, then calculate combined influence separately according to formula (6).
6. u
1→ u
7, have two paths: u
1→ u
4→ u
7, u
1→ u
3→ u
7.Calculate respectively u according to formula (2) (4)
1→ u
4→ u
7and u
1→ u
3→ u
7indirect trust and remote effect, then calculate combined influence separately according to formula (6).
7. u
1→ u
8, have five paths u
1→ u
2→ u
5→ u
6→ u
8, u
1→ u
2→ u
6→ u
8, u
1→ u
4→ u
5→ u
6→ u
8, u
1→ u
4→ u
7→ u
8, u
1→ u
3→ u
7→ u
8.Calculate respectively u according to formula (2) (4)
2→ u
5→ u
6→ u
8, u
1→ u
2→ u
6→ u
8, u
1→ u
4→ u
5→ u
6→ u
8, u
1→ u
4→ u
7→ u
8, u
1→ u
3→ u
7→ u
8indirect trust and remote effect, then calculate combined influence separately according to formula (6).
8. by all combined influence substitution formula (7) that calculate above, calculate node u
1community network impact.
Suppose respectively successively u
2, u
3, u
4, u
5, u
6, u
7, u
8for un-activation node, calculate the direct trust of each node and indirectly trust, directly impact and remote effect, combined influence, finally calculate the community network impact of each node, after calculating finishes, therefrom choose the node that two community networks have the greatest impact, add the set of having the greatest impact of community network.
Calculate the nodes that remaining unchecked node can activate at most, choose two nodes that can activate maximum nodes, add the set of having the greatest impact of community network.
Having the greatest impact of community network node set generates.
In sum, the present invention is to be the research of carrying out relevant issues under a relatively abstract and complicated object condition at social networks itself.For convenience of analyzing, introduce the method for graph theory, by the social networks imagery of abstract.And introduce and trust this element, consider the material impact of trusting activating node, the degree of belief between node and influence value are carried out to combination, draw combined influence, then draw having the greatest impact of community network node according to combined influence.Compared with prior art, the computing method of having the greatest impact of the community network node based on trusting that the present invention proposes, can choose more accurately having the greatest impact of community network node, thereby realize as much as possible having the greatest impact of community network.The present invention, from direct trust, trusts indirectly, directly impact, and remote effect, combined influence, the aspects such as community network impact, realize choosing of having the greatest impact of community network node.As can be seen here, in current Renren Network, in the social networks such as microblogging, for better diffusing information and finding the most influential user etc. to there is the prospect of practical application, make influential user propagate positive information, make great efforts to build a positive network environment.Meanwhile, due to the trust and the impact that the present invention relates between user, so safely etc. also there is the prospect of practical application in aspect at Internet.
Claims (9)
1. maximize based on the community network of trusting computing method that affect node, it is characterized in that, based on Graph-theoretical Approach, its computing method basic step is:
The first step, definition social networks and social networks maximize affects the discovery of node, choose;
Second step, heuristics phase;
The 3rd step, the greed stage;
The 4th step, the generation of having the greatest impact of community network node set.
2. the community network based on trusting according to claim 1 maximizes the computing method that affect node, it is characterized in that, described first step definition, comprises step:
Described social networks turns to two orderly tuple <V of a figure G with form, E>,
|V|=n,V={v
1,v
2,......v
n},|E|=m,E={e
1,e
2,e
3......e
m}
Each user in social networks is used as to a node, is expressed as:
G=(V,E)
(1) V is a non-NULL finite set, and the set being made up of the user node in social networks, is called vertex set;
(2) E represents the finite multiple subset of the ordered set V & V of the relation between user in social networks, and the set that element repeats, is called limit collection, referred to as limit;
Described node is the major part that forms social networks, regards the each user in social networks as a node, is divided into according to the state of node:
(1) activate node, in social networks, if a certain user node has been bought a certain commodity or accepted a certain idea, be called the node of activation about these commodity or idea;
(2) un-activation node, in social networks, if a certain user node is not bought a certain commodity or do not accepted a certain idea, is called the un-activation node about these commodity or idea;
Mutual relationship between described node is divided into:
(1) out-degree node, in G=(V, E),
the node of limit using u as initial point terminal pointed, is called the out-degree node of node u;
(2) in-degree node, in G=(V, E),
the node of the corresponding initial point in limit using u as terminal, is called the in-degree node of node u;
(3) can reach node, in G=(V, E),
u
1can arrive u by specific path
2, and u
2not u
1out-degree node, claim u
2u
1reached at node;
(4) unreachable node, in G=(V, E),
u
1do not exist path to arrive u
2, claim u
2u
1unreachable node;
Described social networks maximizes affect node discovery, finds in social networks the influential member of tool;
Described k social networks maximizes affects choosing of node, makes the number finally buying or diffuse information maximum, and introduces heuristic factor c, chooses in heuristics phase
individual having the greatest impact of community network node, the greed stage is chosen
individual having the greatest impact of community network node.
3. the community network based on trusting according to claim 1 maximizes the computing method that affect node, it is characterized in that, described second step heuristics phase, comprises step:
(1) directly trust and indirectly trust;
(2) directly impact and remote effect;
(3) node combined influence;
(4) community network affects node calculating;
(5) choose having the greatest impact of community network node.
4. the community network based on trusting according to claim 1 maximizes the computing method that affect node, it is characterized in that, described the 3rd step greed stage, comprise step: from remaining node, choose the current node that can activate at most node that has, join in having the greatest impact of community network node set.
5. the community network based on trusting according to claim 3 maximizes the computing method that affect node, it is characterized in that, described (one) directly trusts and indirectly trusts, and also comprises step:
If un-activation node v is the out-degree node that has activated node u, v is direct trust to the trust of u, and direct trust is calculated:
Its computing method are:
Wherein,
DT
uvfor the trust of v to u;
Wherein, O
srepresent the recommendation success of u to v,
be illustrated in and recommend for the k time successfully, while recommending successfully, O
sbe 1, recommend failed O
sbe 0;
W
sweights while representing to recommend successfully,
be illustrated in the weights while recommending for the k time successfully;
O
crepresent the weights of evaluating, and O
c∈ [0,1],
represent the weights of the evaluation providing while recommendation for the k time,
RTN (u) is the prestige of node u; N (u) is the set of the out-degree node of u, RTN (u → w) be u go out the trust value of limit neighbours w to it, out (u) represents the out-degree of u;
Be the trust value RTN (u) of u, depend on its trust of all limit neighbours of going out to it;
For each node, a given initial trust value;
If v is reached at the node of u, v is indirect trust to the trust of u, and indirect trust is calculated, and its computing method are:
IT
uvthe trust of v to u; U is n bar to the path of v, and traversal u is to each paths h of v
ibe u to the level at v place on the i path of v, be equivalent to the height of v on binary tree, array H[n] in deposit the level of each u to v place on the path of v.
6. the community network based on trusting according to claim 3 maximizes the computing method that affect node, it is characterized in that, described (two) directly affect and remote effect, also comprise step:
If un-activation node v is the out-degree node that has activated node u, u has a direct impact v, and direct impact is calculated, and its computing method are:
Wherein, DI
uvfor the direct impact that u produces v, λ is decay factor, and W (u, v) is the weight on limit (u, v), and out (u) is the out-degree of node u, and set O (v) is the set that goes out limit neighbours of node v;
If v is reached at the node of u, u produces remote effect to v, and remote effect are calculated, and its computing method are:
IE
uvfor the remote effect of u to v generation;
Wherein, PA[n] [n] be u to the set of the node of process in all paths of v, for each road is through distributing a two-dimensional array;
PA[i] storage is j node in i paths in [j];
PA[i] [n] be every paths i, total n paths, every u is to the path effects sum of v;
represent that i paths did not travel through;
W is the weights that connect the limit of two adjacent nodes in a paths;
λ represents the reduction of weights effect; Out (p
i) expression node p
iout-degree.
7. the community network based on trusting according to claim 3 maximizes the computing method that affect node, it is characterized in that, described (three) node combined influence, also comprise step: to above-mentioned directly and the influence value that calculates of indirect two kinds of situations and trust value to carry out result comprehensive, calculate the combined influence value of node u;
Described combined influence, because node v exists direct trust and indirectly trusts u, and u exists direct impact and remote effect to v, for the work of choosing that makes the community network maximization of postorder affect node is carried out fast and effectively, by these four effective combinations of factor, can obtain the combined influence of node u to v, be called for short CE;
Suppose to activate node u, un-activation node is v, and u can arrive v by certain path, introduces multi-stress θ, θ ∈ [0,1];
(1) if un-activation node v is the out-degree node that has activated node u, combined influence is:
CE
uv=θDI
uv+(1-θ)DT
uv (5)
(2) if v is reached at the node of u, combined influence is:
CE
uv=θIE
uv+(1-θ)IT
uv (6)。
8. the community network based on trusting according to claim 3 maximizes the computing method that affect node, it is characterized in that, described (four) community network affects the calculating of node, also comprises step:
The node combined influence value drawing according to above step and the activated interstitial content of node, calculate the community network impact of node, is calculated as follows:
MISN
uit is the community network impact of u;
Wherein R (u → v) represent that u can arrive v through certain path;
R represents the wherein paths of u to v, r
active=0 represents not live through this paths;
N is the number of the current node being activated by u;
Out (u) is the out-degree of node u.
9. the community network based on trusting according to claim 3 maximizes the computing method that affect node, it is characterized in that, described (five) choose having the greatest impact of community network node, also comprise step: the node that community network is had the greatest impact joins in the set of having the greatest impact of community network node.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410234220.0A CN104008163A (en) | 2014-05-29 | 2014-05-29 | Trust based social network maximum influence node calculation method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410234220.0A CN104008163A (en) | 2014-05-29 | 2014-05-29 | Trust based social network maximum influence node calculation method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104008163A true CN104008163A (en) | 2014-08-27 |
Family
ID=51368820
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410234220.0A Pending CN104008163A (en) | 2014-05-29 | 2014-05-29 | Trust based social network maximum influence node calculation method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104008163A (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104901887A (en) * | 2015-05-18 | 2015-09-09 | 北京哈工大计算机网络与信息安全技术研究中心 | Social trust-based safety routing method of Internet of Things |
CN105656644A (en) * | 2014-11-12 | 2016-06-08 | 阿里巴巴集团控股有限公司 | Evaluation method for account importance in computer system and system thereof |
CN106875281A (en) * | 2017-03-13 | 2017-06-20 | 哈尔滨工程大学 | Community network node method for digging based on greedy subgraph |
CN107067329A (en) * | 2017-03-07 | 2017-08-18 | 北京大学深圳研究生院 | The computational methods and device of a kind of movable social networks interior joint confidence level |
CN107368499A (en) * | 2016-05-12 | 2017-11-21 | 中国移动通信集团广东有限公司 | A kind of client's tag modeling and recommendation method and device |
CN107967345A (en) * | 2017-12-12 | 2018-04-27 | 梁金凤 | A kind of social networks famous person information recommending apparatus |
CN108280533A (en) * | 2017-11-24 | 2018-07-13 | 浙江理工大学 | A kind of optimal configuration method for meeting the global external city vehicle community network community for trusting value constraint and recommending |
CN108599991A (en) * | 2018-03-21 | 2018-09-28 | 安徽大学 | The key node searching method of Trust transitivity is influenced in social Internet of Things |
CN109508415A (en) * | 2018-06-27 | 2019-03-22 | 北京理工大学 | Influence based on social networks hierarchical structure maximizes subset method for building up |
CN109787896A (en) * | 2018-12-05 | 2019-05-21 | 北京邮电大学 | A kind of node selecting method and equipment for communication link building |
CN111325968A (en) * | 2018-12-13 | 2020-06-23 | 深圳先进技术研究院 | Traffic bottleneck prediction method and system based on congestion diffusion and electronic equipment |
-
2014
- 2014-05-29 CN CN201410234220.0A patent/CN104008163A/en active Pending
Cited By (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105656644B (en) * | 2014-11-12 | 2019-02-01 | 阿里巴巴集团控股有限公司 | The appraisal procedure and its system of account number importance in computer system |
CN105656644A (en) * | 2014-11-12 | 2016-06-08 | 阿里巴巴集团控股有限公司 | Evaluation method for account importance in computer system and system thereof |
CN104901887B (en) * | 2015-05-18 | 2018-01-12 | 北京哈工大计算机网络与信息安全技术研究中心 | A kind of Internet of Things safety routing method trusted based on society |
CN104901887A (en) * | 2015-05-18 | 2015-09-09 | 北京哈工大计算机网络与信息安全技术研究中心 | Social trust-based safety routing method of Internet of Things |
CN107368499A (en) * | 2016-05-12 | 2017-11-21 | 中国移动通信集团广东有限公司 | A kind of client's tag modeling and recommendation method and device |
CN107368499B (en) * | 2016-05-12 | 2020-12-01 | 中国移动通信集团广东有限公司 | Client label modeling and recommending method and device |
CN107067329B (en) * | 2017-03-07 | 2021-09-21 | 北京大学深圳研究生院 | Method and device for calculating node credibility in active social network |
CN107067329A (en) * | 2017-03-07 | 2017-08-18 | 北京大学深圳研究生院 | The computational methods and device of a kind of movable social networks interior joint confidence level |
CN106875281B (en) * | 2017-03-13 | 2020-12-18 | 哈尔滨工程大学 | Social network node mining activation method based on greedy subgraph |
CN106875281A (en) * | 2017-03-13 | 2017-06-20 | 哈尔滨工程大学 | Community network node method for digging based on greedy subgraph |
CN108280533A (en) * | 2017-11-24 | 2018-07-13 | 浙江理工大学 | A kind of optimal configuration method for meeting the global external city vehicle community network community for trusting value constraint and recommending |
CN107967345A (en) * | 2017-12-12 | 2018-04-27 | 梁金凤 | A kind of social networks famous person information recommending apparatus |
CN108599991A (en) * | 2018-03-21 | 2018-09-28 | 安徽大学 | The key node searching method of Trust transitivity is influenced in social Internet of Things |
CN108599991B (en) * | 2018-03-21 | 2020-12-29 | 安徽大学 | Method for searching key nodes influencing trust transfer in social Internet of things |
CN109508415A (en) * | 2018-06-27 | 2019-03-22 | 北京理工大学 | Influence based on social networks hierarchical structure maximizes subset method for building up |
CN109508415B (en) * | 2018-06-27 | 2021-01-05 | 北京理工大学 | Influence maximization seed set establishment method based on social network hierarchical structure |
CN109787896A (en) * | 2018-12-05 | 2019-05-21 | 北京邮电大学 | A kind of node selecting method and equipment for communication link building |
CN109787896B (en) * | 2018-12-05 | 2020-08-14 | 北京邮电大学 | Node selection method and equipment for communication link construction |
CN111325968A (en) * | 2018-12-13 | 2020-06-23 | 深圳先进技术研究院 | Traffic bottleneck prediction method and system based on congestion diffusion and electronic equipment |
CN111325968B (en) * | 2018-12-13 | 2021-05-25 | 深圳先进技术研究院 | Traffic bottleneck prediction method and system based on congestion diffusion and electronic equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104008163A (en) | Trust based social network maximum influence node calculation method | |
Das Sarma et al. | Distributed verification and hardness of distributed approximation | |
Bérard et al. | Brunet-Derrida behavior of branching-selection particle systems on the line | |
CN103793476B (en) | Network community based collaborative filtering recommendation method | |
CN108492201A (en) | A kind of social network influence power maximization approach based on community structure | |
Sun et al. | A trust management model to enhance security of cloud computing environments | |
CN102982108B (en) | Recommendation trust degree computational methods between the user in a kind of social network environment | |
Liu et al. | Trust and reputation management | |
Wang et al. | DeepDirect: Learning directions of social ties with edge-based network embedding | |
Baral et al. | Epistemic planning (Dagstuhl seminar 17231) | |
CN104820945A (en) | Online social network information transmision maximization method based on community structure mining algorithm | |
CN103345513B (en) | A kind of propagated based on friends friend recommendation method in social networks | |
Buccafurri et al. | Driving global team formation in social networks to obtain diversity | |
Shahinzadeh et al. | The Transition Toward Merging Big Data Analytics, IoT, and Artificial Intelligence with Blockchain in Transactive Energy Markets | |
Drake et al. | Modified choice function heuristic selection for the multidimensional knapsack problem | |
Lee et al. | A network-flow based influence propagation model for social networks | |
Hu et al. | Topological potential: modeling node importance with activity and local effect in complex networks | |
Kadge et al. | Graph based forecasting for social networking site | |
CN105577434A (en) | Multi-association mining method and device based on social network | |
CN113377656A (en) | Crowd-sourcing recommendation method based on graph neural network | |
Jia et al. | Learning to predict links by integrating structure and interaction information in microblogs | |
Cheriyan et al. | Region aware influence maximization in signed social network using pr quadtree | |
CN104063516B (en) | Based on the social networks rubbish filtering method that distributed matrix characteristics of decomposition is extracted | |
Crawford | Triple Bottom Line Performance: finding the balance | |
Gupta et al. | Taxonomy of tree based classification algorithm |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20140827 |