Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Micro blog secluded key user analysis method based on topic transferring entropy

A key user and analysis method technology, applied in special data processing applications, instruments, electrical digital data processing, etc., can solve the problems of low recognition of hidden key users, unsuitable analysis, etc.

Active Publication Date: 2018-09-14
PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Existing methods are not suitable for analyzing the influence of such hidden key users, so the recognition of hidden key users is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Micro blog secluded key user analysis method based on topic transferring entropy
  • Micro blog secluded key user analysis method based on topic transferring entropy
  • Micro blog secluded key user analysis method based on topic transferring entropy

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044]In order to make the purpose, technical solution and advantages of the present invention more clear and understandable, the present invention will be further described in detail below in conjunction with the accompanying drawings and technical solutions.

[0045] The analysis of key users on the microblog network mostly relies on the retweeting relationship automatically marked by the microblog system, which is not suitable for analyzing key users whose importance is relatively hidden, such as the behind-the-scenes manipulators who hype microblogs, and the direct forwarding of microblogs and other behaviors are very difficult. It is difficult to find such users. For this reason, embodiment one of the present invention, see figure 1 As shown, a microblog concealed key user analysis method based on topic transfer entropy is provided, including:

[0046] S01) Obtain significant key users and candidate hidden key users through the average spread scale of Weibo;

[0047] S0...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a micro blog secluded key user analysis method based on topic transferring entropy. The method comprises the steps that direct influence of a micro blog user is measured through a micro blog average spread scale, and according to the direct influence, obvious key users and alternative secluded key users are found; micro blog topic sequences of the two types of users are extracted; the topic transferring entropy from the alternative secluded key users to the obvious key users is calculated, and the influence degree of the alternative secluded key users on the obvious key users is measured; based on the direct influence of the alternative secluded key users on the obvious key users and the influence degree of the alternative secluded key users on the obvious key users, the seclusion importance degree of the alternative secluded key users is analyzed, and the secluded key users are identified. The micro blog secluded key user analysis method based on the topic transferring entropy has the advantages that based on micro blog topic similarity and timing sequence relativity, the micro blog topic transferring entropy from the non-obvious key users to the obvious key users is obtained, the seclusion influence degree of the non-obvious key users on the obvious key users is measured, the own direct influence of the non-obvious key users and obvious key users arecombined, the seclusion importance of the users is evaluated, and the accurate identification of the micro blog secluded key users is achieved.

Description

technical field [0001] The invention belongs to the technical field of network data mining, and in particular relates to a microblog hidden key user analysis method based on topic transfer entropy, which is used for accurately identifying hidden key users in a microblog network. Background technique [0002] Weibo is a huge social media, and it is also the distribution center of massive public opinion. Users who play an important role in the dissemination and diffusion of information in Weibo are called Weibo key users. Analyzing the influence of users on information dissemination in Weibo and discovering key users is of great significance for the supervision and guidance of public opinion on Weibo. The analysis of key users in Weibo has been a research hotspot in recent years. The current methods mainly include: under the condition of given communication model parameters, find the set of seed users who make the largest spread of Weibo spread as key users; Build a network,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F17/30
Inventor 尹美娟刘晓楠罗军勇唐梓淇何功震朱玛杨文
Owner PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products