SlideShare uma empresa Scribd logo
1 de 8
Baixar para ler offline
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 3, Ver. II (May-Jun. 2016), PP 09-15
www.iosrjournals.org
DOI: 10.9790/0661-1803020915 www.iosrjournals.org 9 | Page
User Profile Completion with Online Social Circles
Hailong Qin1
, Jing Liu2
,Chin-Yew Lin2
,Ting Liu1
1
(Harbin Institute of Technology, China)
2
(Microsoft Research Asia, China)
Abstract :User profile is a kind of most effective feature and cue of user behavioranalysis. However,
most ofusers'profiles are incomplete and untruthful, and users' tag and profile data are rathersparse
on social media. It makes profile completionbecomeapopularresearch topic. Users have
manystrongrelationships online, and theserelationshipsformmany social circles, such as classmate,
family and colleague. A user'sdifferent online social circlescanrepresentthisuser'svarious social
attributes. We focus the task of user profile completion in thispaper. We propose an algorithm of user
profile completion via users' social circles by non-negative matrix factorization. The
methodcandetectauser's multi-dimension social characteristicsfromvarious social circles.
Wealsotransfer the concept of social circle to academic networks. A papermay cite
otherpaperswithseveral intentions. Some of the referencesmaybe relevant according to the
researchproblems and otherreferencesmaybe relevant according to the methodologies. The references
of different topics formdifferent "referencecircle". By an academicpaper'sdifferent "referencecircle",
our model candetect the paper's keywords in differentviews. The experiment on Facebook LinkedIn
and Microsoft AcademicSearch show ourmethod has improved performance than state-of-art
methods.
Keywords -User Profile Completion, Social Circle, Non-negative Matrix Factorization
I. Introduction
Following the development of Web 2.0, more and more people communicate with their real friends on
social network service (SNS), such as Facebook LinkedIn and Twitter. These users publish and share many
feeds on social network. Both these content and users' profiles on SNS can be useful features of user behavior
analysis. However, a main characteristic of on-line social media is that it is easy to provide false profiles such as
gender age, and hometown and so on. So it is difficult to detect these users' true identities and their profiles. For
solving this problem, user profile completion becomes a popular research topic in the area of social network
analysis.
Figure 1. A user's profiles on Facebook.
A user's profiles usually have many items, such as gender, age and school name (Fig 1). For example,
the user's major field can show users' professions and the middle school field can indicate a user's hometown
and school name generally. Most of existed works about user profile completion focus on predicting user's age
User Profile Completion with Online Social Circles
DOI: 10.9790/0661-1803020915 www.iosrjournals.org 10 | Page
or gender via text feature. In general, these simple profiles can be inferred from users' language styles. A lot of
methods classify different age groups and genders with their posts [1, 2, 3, 4]. However, it is difficult to detect
users' other kinds of profiles from text feature. Few users explicitly refer their major or hometown in their posts
frequently. On research of user behavior analysis, these items are usually more informative features. And it is
also difficult to indicate exact classification for these items by texts.
Figure 2. A people’s social circles
A user has many categories of strong relationships on social media. These strong relationships are
constituted of users' online social circles. A user has several social circles on social media, such as classmates in
a school, and colleagues in a company and so on (Figure 2). Social circle reflects an individual's social
environment that can often be leveraged to infer important information about that individuals' attitudes,
behaviors, and decisions [5, 6, 7, 8, 9, 10, 11]. However, this type of social circle is different from traditional
community. In the view of graph, the distribution of edges is not only globally, but also locally inhomogeneous,
with high concentrations of edges within special groups of vertices, and low concentrations between these
groups. This feature of a real networks is called community structure [12]. A node of a community may refer to
people, and it also could be a computer in Internet or a gene in a gene network. Firstly, a traditional community
is larger than a general social circle which may just has three members (such as three family members). On the
other hand, a residential area can be a community in a mobile communication network. And the area may have
several thousand people, but it is not anyone's social circle. Secondly, although there are some common tags or
profiles of each member in same community, these members may don't know each other. In contrast, there are
strong relationships between each member in the same social circle. Namely, a community of mobile network
depends on the location, not explicit social relationships. As suggested above, community detection is focused
on finding arbitrary highly interconnected subgraphs within larger networks, and social circle detection will
instead discover several groups of strong social relationships including one or more specific individuals [13].
Users often communicates with their different social circles (such as families and classmates) on SNS
and members of social circles are usually users' strong relationships. These social circles can represent a user's
multi-dimension social relationships and social attributes. For example, the common characteristics of family
circle are relevant to a user's hometown. And more information about a user's company can be detected from
colleague circles. So members in a same social circle can supplement profiles each other. Obviously, a user
usually has some common profile items with her/his every friend. But Li [14] proposes that profile completion
should only depends on users' close relationships. That means profiles between friends are more likely similar
and valuable. However, Li [14] completes profiles by users' labeled friends, and they are not ground-truths of
users' social circles. Members in a same social circle have most possible to have same profile items, and the
different kinds of profile items can represent a user's different characteristics. So it need an algorithm to
complete user profiles with real social circles. For this purpose, we propose an algorithm by non-negative matrix
factorization. As social circle also has similar situations and features on academic networks. Our algorithm can
also be applied to academic networks for keywords detection of papers.
We hypothesis a user's all profile items are unknown and this user's several social circles are known.
Our task is completing the user's profiles by her/his social circles on social network. For collecting more user
profiles in the view of users' real social circles, this paper proposes a user profile completion model with
members of users' social circles via non-negative matrix factorization. With features of users' circles and all
closed friends' profiles, the algorithm can complete the center user's (The user who own these social circles.)
User Profile Completion with Online Social Circles
DOI: 10.9790/0661-1803020915 www.iosrjournals.org 11 | Page
profiles. Our algorithm conducts on Facebook LinkedIn and Microsoft Academic Research. Results of
experiment prove that our method are more effective than baselines.
The rest of this paper is organized as follows: in the next section, we describe related work. Then we
introduce our methodology of user profile completion via non-negative matrix factorization in section 3. We
describe datasets and experiment in section 4. Finally, we conclude our work and point out avenues for future
research.
II. Related Work
2.1 Profile Completion
User profile completion is a popular area of user analysis. [1,2,3,4,15] predict users' gender and age
according their tweets. [16]infers users' political orientation or ethnicity from various user information.
[17]classifies users' four attributes in Twitter. [18]adds the features of authors' name to profiles completion. All
their ideas are based user classification according user profiles. [19]extracts users' jobs educations and spouses
in Google Plus and Freebase. According to the homophily between users, [20] completes users' profile via their
neighbors’ information. [21] infers users' locations based on social relationships. Bergsma [22] proposes
different types of users have different attributes. Liu [23] completes user profiles via their labeled friends.
However, all of these work do not refer to real social circles.
2.2 Social Circle
Social circle is closely relevant to the term of community which has two interpretations: one is the
geographical notion of community and another is relational. The second one is concerned with the quality of the
character of human relationships, without reference to location [24]. The online social circles carry the second
meaning and do not concern physical locations. The detection of social circles is a new research area which
emerging with the popularity of social networks. It is a clustering problem within ego network, members within
a same social circle do not only have dense relationships, but also have some same profiles. So a social circle is
the group with a specified social meaning.
A growing number of scholars study their subjects in view of social circles. The recommendation
algorithm based on users' circles performs no worse than those based on the full network [25]. Question
recommendation, question popularity analysis and prediction based on social circles get better performance [26,
23]. It is also a main feature of linking users across online social networks [27].
Bernado proposes that it is necessary to mine users' real friends [28]. The evolution of online social
groups is analyzed and predicted by Kairam [29]. Qu and Liu propose a semi-supervised method to detect
social circles in twitter [30]. But some members in user groups are not users' real friends in Twitter. A lot of
groups just classify different types of followees, many of these followees are not users' bilateral friends. Since
2012, some specific social circle detection algorithms have been proposed by Leskovec and Qin [31, 32]. Burton
[13] introduces a detection algorithm of local social circle when whole network is unknown. Liu [33] develops
an algorithm for mining tags of social circles. However, all works are about social circles detection and mining,
there is few work of user analysis based on online social circles.
2.3 Keywords Detection
Wang [34] proposes a method of keywords extraction based on neural network. And [35] integrates
several keywords detection methods to improve performance. Blank [36] extracts keywords of academic papers
by citation graph. Our algorithm considers different topics of references based on citation graph.
III. User Profile Completion (11 Bold)
Figure3.CP can be decomposed into the product of CU and UP.
3.1 Principle
Every user has several items in her/his profiles and different items can represent different social
attributes. On the other hand, a user has many social circles on SNS. Most members among a social circle are
strong relationships. And their common profiles can likely represent attributes of their social circle. In the point
User Profile Completion with Online Social Circles
DOI: 10.9790/0661-1803020915 www.iosrjournals.org 12 | Page
of social circle, attributes of a user's different social circles likely constitute the user's multi-dimension profiles.
So users' profiles can be supplemented with the help of different social circles.
In this work, we select non-negative matrix factorization since matrices can easily embed relationships
of user-circle and user-profile. Our algorithm completes users' profiles by main attributes of users' different
social circles via NMF. This model gets great performance and also has strong interpretability.
Circle-Profile matrix can be factorized into the product of circle-user matrix and user-profile matrix. As
observed matrix, circle-profile matrix represents weights of all members' profile items for every circle. A center
user may have several social circles and members of these social circles are different. So contributions of social
circles for user profile completion are also different. The user-circle matrix can represent different levels of
contribution. And user-profile matrix represents weights of all profile items for every center user.
3.2Algorithm
Definition I: Matrix CP is a circle-profile matrix. CPij is weights of profilej for circlei. All circles and their
members' profile of every dataset are represented in a same matrix. (The matrix do not include the center user
who own this social circle.)
Definition II: Matrix CU is a circle-user matrix. Every row represents a circle in dataset, and every column
represents a center user who owns several social circles. If the center user owns this circle, the value is the
weight of the center user in the circle. Otherwise, the value is 0 in matrix. All center users and their circles of
every dataset are represented in a same matrix. The matrix is initialized by random values.
Definition III: Matrix UP is a user-profile matrix. The value represents weights of profile items to center users.
All center users and their profiles of every dataset are represented in a same matrix. The matrix is initialized by
random values.
We will complete users' profiles according to weights of profiles in matrix UP.
𝐶𝑃 ≈ 𝐶𝑈 × 𝑈𝑃 (1)
According to the principle of matrix factorization, CP can be decomposed into the product of CU and
UP. We can get users' social circles and their friends' profiles, and construct matrix CP. This kind of
factorization accord with the hypothesis of a people's different social circles can represent the people's different
aspects of characteristics.
The NMF is carried out by minimizing the difference between CP and CU×UP. We take Euclidean
Distance (Equation 2) as our loss function to measure the difference between CP and CU×UP.
𝐽 𝐶𝑈, 𝐶𝑃 =
1
2
(𝐶𝑃𝑖𝑗 − 𝐶𝑈𝑖𝑗 × 𝑈𝑃𝑖𝑗 )𝑖𝑗 (2)
As CP are fixed, we find non-negative CU and UP by gradient descent (Equation 3 and 4).
𝐶𝑈𝑖𝑘 = 𝐶𝑈𝑖𝑘 − 𝛼1 × [ 𝐶𝑃 × 𝑈𝑃 𝑇
𝑖𝑘 − 𝐶𝑈 × 𝑈𝑃 × 𝑈𝑃 𝑇
𝑖𝑘 ] (3)
𝑈𝑃𝑘𝑗 = 𝑈𝑃𝑘𝑗 − 𝛼2 × [ 𝐶𝑈 𝑇
× 𝐶𝑃 𝑘𝑗 − 𝐶𝑈 𝑇
× 𝐶𝑈 × 𝑈𝑃 𝑘𝑗 ](4)
Then we set 𝛼1 and𝛼2 as Equation 5 and Equation 6.
𝛼1 =
𝐶𝑈 𝑖𝑘
𝐶𝑈 𝑇×𝐶𝑈×𝑈𝑃 𝑖𝑘
(5)
𝛼2 =
𝑈𝑃 𝑘𝑗
𝐶𝑈×𝑈𝑃×𝑈𝑃 𝑇
𝑘𝑗
(6)
So Equation 7 and Equation 8 are final iteration rules.
𝐶𝑈𝑖𝑘 = 𝐶𝑈𝑖𝑘
(𝐶𝑃×𝑈𝑃 𝑇)𝑖𝑘
𝐶𝑈×𝑈𝑃×𝑈𝑃 𝑇
𝑖𝑘
(7)
𝑈𝑃𝑘𝑗 = 𝑈𝑃𝑘𝑗
(𝐶𝑈 𝑇 ×𝐶𝑃) 𝑘𝑗
𝐶𝑈 𝑇 ×𝐶𝑈×𝑈𝑃 𝑘𝑗
(8)
Matrix UP represents weights of profile items for every user. The high weight items have more
possibility to be center users' profiles
User Profile Completion with Online Social Circles
DOI: 10.9790/0661-1803020915 www.iosrjournals.org 13 | Page
.
IV. Experiment
4.1 Dataset
4.1.1 Facebook
The dataset of Facebook is released in Kaggle1
. It includes 60 users and their social circles. There are
17,115 friends in all social circles, while every user has 19.73 social circle and every social circle has 28.91
friends averagely. Every center users averagely has 16.97 profile items. The task is completing center users'
profiles in this dataset.
4.1.2 LinkedIn
The LinkedIn Dataset is released by University of Illinois at Urbana-Champaign2
. It includes 187 users
and their labeled friends. Different from Facebook dataset, labeled friends are not ground-truths of social circle.
However, there are common characteristics among friends having same labels. So the algorithm completes a
user's profiles by her/his different labeled friends
.
4.1.3 Microsoft Academic Search
Academic network is paper-based network. Most academic papers of computer science propose an
effective methodology to solve a specified problems. Every paper will cite many relevant papers as its
references. The network is consist of relationships of citation. The references of one paper will consist of
different reference circles (Fig 4). Some paper circles may represent paper groups of similar research problems,
and some circles may represent previous relevant methodology. According to citation relationships and
academic meanings of a paper's reference circles, we can infer keywords of the paper collaboratively.
The dataset of academic paper is extracted from Microsoft Academic Search3
. There are 25 papers in
dataset. The part of Related Work is divided into many sections in these papers. All references of every section
are relevant to a similar research problem or a similar research methodology. So these references can be
regarded as ground-truth of reference-circles. The task is detecting center papers' keywords in academic dataset.
We annotate technology terminologies in titles and abstracts of these papers, these terminologies are candidate
keywords of center papers.
Figure4.A paper's references are divided several parts, such as Query Modeling and External Expansion.
4.2 Baseline
4.2.1 TF-IDF
We regard every social circle as a document, and all members' profiles are word in this document. And
compute every profile item p's TF value in Circlei(Equation 9) and p's IDF value (Equation 10) in the circle,
then get TF×IDF values. Finally, select top profile items as profiles of the social circle.
𝑇𝐹𝑝𝑖 =
𝐶𝑜𝑢𝑛𝑡 𝑝 𝑖𝑛 𝐶𝑖𝑟𝑐𝑙𝑒 𝑖
𝑃𝑟𝑜𝑓𝑖𝑙𝑒𝐶𝑜𝑢𝑛𝑡 (𝑚)𝑚 ∈𝐶𝑖𝑟𝑐𝑙𝑒 𝑖
(9)
1
https://www.kaggle.com/c/learning-social-circles/data
2
https://wiki.engr.illinois.edu/display/forward/Dataset-EgoNetUIUC-LinkedinCrawl-Jan2014
3
http://libra.msra.cn/
User Profile Completion with Online Social Circles
DOI: 10.9790/0661-1803020915 www.iosrjournals.org 14 | Page
IDF(P) = 𝑙𝑜𝑔
|𝐶𝑖𝑟𝑐𝑙𝑒 |
𝟏𝐶𝑖𝑟𝑐𝑙𝑒 𝑕 𝑎𝑣𝑖𝑛𝑔𝑝
(10)
4.2.2 Co-Profile
Different from age and gender prediction, detecting multi-dimension profiles is not a classification
problem. We extract users' profiles from friends of social circles. [14]proves that only close friends are effective
for profile completion. So we select co-profile method in [14] as our strong baseline. By the same motivation,
co-profile also completes users' profile by close friends. However, this method detects users' social circles at
thesame time of profile completion. So their social circles in the LinkedIn dataset are not ground-truths. Our
model is more persuasive for effect of user real social circles.
As we have ground-truths of social circles in our dataset, we do not learn circles in co-profile method.
Equation 11 is the cost function of co-profile. v is a center user's friend and C is the circle. f represents a friend's
profile vector, f0 represents a center user's profile vector, The profile vectors update by Equation 12 and 13.
𝜆1 𝜔𝑡 ×𝑣 𝑖,𝑣 𝑗 𝜖 𝐶𝑡
𝑓𝑖 − 𝑓𝑗
2
+ 𝜔𝑡 ×𝑣 𝑖 𝜖𝐶𝑡
𝑓0 − 𝑓𝑗
2
+ 𝜆2 ×𝐾
𝑡=1
𝑡=1𝐾𝑣𝑖𝜖𝐶𝑡(𝜔𝑡× 𝑓𝑖−1)2(11)
𝑓𝑖,𝑦 =
𝑓0,𝑦 + 𝑓 𝑗,𝑦𝑣 𝑗 𝜖𝐶 𝑡
1+ 𝟏𝑛 𝑗 𝜖𝐶 𝑡
, 𝜔𝑡,𝑦 = 1 (12)
𝑓0,𝑦 =
𝑓 𝑗,𝑦𝑣 𝑗 𝜖𝐶 𝑡
𝐾
𝑡=1,𝜔 𝑡,𝑦 =1
𝟏𝑣 𝑗 𝜖𝐶 𝑡
𝐾
𝑡=1,𝜔 𝑡,𝑦 =1
, 𝜔𝑡,𝑦 = 1, ∀𝑡 = 1 … . 𝐾(13)
4.3Result Analysis
Table1. Overview of Dataset
Facebook LinkedIn Microsoft Academic Search
Total Center Users 60 187 25
Total Friends 17,115 5455 625
Avg Circles Per Center User 19.73 3.24 2.56
AvgProfiles Per User 16.97 3.57 7.31
Table2. Precision of User Profiles Completion
Profile Type TF-IDF Co-Profile Social Circle-Completion
Facebook(P@N) N/A 21.66% 19.98% 28.81%
Microsoft Academic
Search(P@N)
N/A 14.88% 12.00% 24.80%
LinkedIn(P@10)
Employer 27.05% 60.00% 42.11%
College 60.13% 61.00% 81.30%
Location 46.70% 68.00% 63.53%
TF-IDF method is an effective and simple method of extracting main profiles and keywords. But
different social circles have different importance for a people. TF-IDF method cannot combine with these
relationships. So TF-IDF gets low performance when completing users' profiles.
In datasets of Facebook and academic data, our method is improved than TF-IDF and co-profile
obviously. Because our method can extract key profiles and keywords of different social circles and different
parts of academic related work. That proves that performances of our work are good in both problems of user
profile completion and academic keywords detection.
In the LinkedIn dataset, only the performance of college profile is better than co-profile. After data
analysis, our algorithm strongly depend on user friends' profile. The lack of friends' profiles will lead bad
performance. The profile items about college in a kind of labeled friends are more identical in the dataset. As we
don't know ground-truths of LinkedIn social circles, we use every user's labeled friends as a kind of social circle.
Different from our model, co-profile includes the process of social circle detection based on labeled friends, so
our friends sets for profile completion are different from baseline. On the other hand, both our experiment and
the baseline do not use ground-truths of social circles in LinkedIn. However, other two datasets prove our model
has better performance for ground-truth of user social circles.
V. Conclusion
The paper proposes an algorithm of user profile completion with the feature of social circle. In the
User Profile Completion with Online Social Circles
DOI: 10.9790/0661-1803020915 www.iosrjournals.org 15 | Page
aspect of social relationships, we combine social memberships and user friends' profiles in a model of non-
negative matrix factorization. The model can supplement users' multi-dimension profiles by social circles and
has strong interpretability.
That is a new viewpoint of user profile completion with user strong relationships. At the same time, we
also apply the concept of social circle to reference category of academic paper. Excepting completing user
profile, the algorithm is also an effective keywords detection method on academic network. The experiment
shows our method has improved performance than state-of-art methods. In future, we will detect multi-
dimension user attributes from users' posts, and try to complete user profile more precisely by combining
features of social circles and user texts. We will also try to explore author circles on academic networks.
Acknowledgements
This work was supported by the National Basic Research Program (973 Program) of China(No.
2014CB340503), National Natural Science Foundation of China (No. 61133012 and No. 61472107).
References
[1] C. Peersman, W. Daelemans, L. Van Vaerenbergh, Predicting age and gender in online social networks, Proceedings of the 3rd
international workshop on Search and mining user-generated contents, ACM, 2011, 37–44.
[2] D. Nguyen, N. A. Smith, C. P. Ros´e, Author age prediction from text using linear regression, Proceedings of the 5th ACL-HLT
Workshop on Language Technology for Cultural Heritage, Social Sciences, and Humanities,Association for Computational
Linguistics, 2011, 115–123.
[3] S. Rosenthal, K. McKeown, Age prediction in blogs: A study of style,content, and online behavior in pre-and post-social media
generations, Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language
Technologies-Volume 1, Associationfor Computational Linguistics, 2011, 763–772.
[4] J. D. Burger, J. Henderson, G. Kim, G. Zarrella, Discriminating gender on twitter, Proceedings of the Conference on Empirical
Methods inNatural Language Processing, Association for Computational Linguistics, 2011, 1301–1309.
[5] I. Ajzen, M. Fishbein, Understanding attitudes and predicting social behavior.(Prentice-Hall, 1980).
[6] M. Roserberg, Society and the adolescent self-image, revised edition,1989.
[7] I. H. Yen, S. L. Syme, The social environment and health: a discussion ofthe epidemiologic literature, Annual review of public
health 20 (1) 1999, 287–308.
[8] T. St˚ahl, A. R¨utten, D. Nutbeam, A. Bauman, L. Kannas, T. Abel, G. L¨uschen, D. J. Rodriquez, J. Vinck, J. van der Zee, The
importanceof the social environment for physically active lifestyleresults from an international study, Social science & medicine 52
(1), 2001,1–10.
[9] C. Wei, Formation of norms in a blog community.
[10] M. Goldberg, S. Kelley, M. Magdon-Ismail, K. Mertsalov, A. Wallace, Finding overlapping communities in social networks, 2010
IEEE Second International Conference on Social Computing (SocialCom), IEEE, 2010, 104–113.
[11] M. De Klepper, E. Sleebos, G. Van de Bunt, F. Agneessens, Similarity infriendship networks: Selection or influence?the effect of
constraining contexts and non-visible individual attributes, Social Networks 32 (1) ,2010,82–90.
[12] M. Girvan, M. E. Newman, Community structure in social and biologicalnetworks, Proceedings of the national academy of sciences
99 (12), 2002, 7821–7826.
[13] S. H. Burton, C. G. Giraud-Carrier, Discovering social circles in directedgraphs, ACM Transactions on Knowledge Discovery from
Data (TKDD) 8 (4) ,2014,21.
[14] R. Li, C. Wang, K. C.-C. Chang, User profiling in an ego network: coprofiling attributes and relationships,Proceedings of the 23rd
international conference on World wide web, ACM, 2014, 819–830.
[15] D. Nguyen, R. Gravel, D. Trieschnigg, T. Meder, ” how old do you think I am?”; a study of language and age in twitter,
Proceedings of the SeventhInternational AAAI Conference on Weblogs and Social Media, AAAI Press,2013.
[16] M. Pennacchiotti, A.-M. Popescu, A machine learning approach to twitteruser classification, ICWSM 11 ,2011, 281–288.
[17] D. Rao, D. Yarowsky, A. Shreevats, M. Gupta, Classifying latent user attributes in twitter,Proceedings of the 2nd international
workshop onSearch and mining user-generated contents, ACM, 2010, 37–44.
[18] D. Rao, M. J. Paul, C. Fink, D. Yarowsky, T. Oates, G. Coppersmith,Hierarchicalbayesian models for latent attribute detection in
social media.ICWSM 11, 2011, 598–601.
[19] J. Li, A. Ritter, E. Hovy, Weakly supervised user profile extraction fromtwitter, ACL, Baltimore.
[20] F. Al Zamal, W. Liu, D. Ruths, Homophily and latent attribute inference:Inferring latent attributes of twitter users from
neighbors.ICWSM,2012.
[21] C. A. Davis Jr, G. L. Pappa, D. R. R. de Oliveira, F. de L Arcanjo, Inferringthe location of twitter messages based on user
relationships, Transactions in GIS 15 (6),2011, 735–751.
[22] S. Bergsma, B. Van Durme, Using conceptual class attributes to characterize social media users.ACL (1), 2013, 710–720.
[23] T. Liu, W.-N. Zhang, L. Cao, Y. Zhang, Question popularity analysis andprediction in community question answering services,
PloS one 9 (5) ,2014, e85236.
[24] J. R. Gusfield, Community: A critical response, (Harper & Row New York,1975.
[25] A. Sharma, M. Gemici, D. Cosley, Friends, strangers, and the value of ego networks for recommendation, ICWSM, 2013.
[26] T. Liu, W.-N. Zhang, Y. Zhang, Socialrobot: a big data-driven humanoidintelligent system in social media services, Multimedia
Systems 1–11.
[27] J. Liu, F. Zhang, X. Song, Y.-I. Song, C.-Y. Lin, H.-W. Hon, What’s ina name?: An unsupervised approach to link users across
communities, Proceedings of the Sixth ACM International Conference on Web Searchand Data Mining, WSDM ’13, ACM, New
York, NY, USA, 2013, 495–504
[28] B. A. Huberman, D. M. Romero, F. Wu, Social networks that matter Twitter under the microscope, arXiv preprint arXiv:0812.1045.
[29] S. R. Kairam, D. J. Wang, J. Leskovec, The life and death of online groups:Predicting group growth and longevity,Proceedings of
the fifth ACMinternational conference on Web search and data mining, ACM, 2012, 673–682.
User Profile Completion with Online Social Circles
DOI: 10.9790/0661-1803020915 www.iosrjournals.org 16 | Page
[30] Z. Qu, Y. Liu, Interactive group suggesting for twitter, Proceedings of the 49th Annual Meeting of the Association for
Computational Linguistics:Human Language Technologies: short papers-Volume 2, Association forComputational Linguistics,
2011, 519–523.
[31] J. Leskovec, J. J. Mcauley, Learning to discover social circles in ego networks, Advances in neural information processing systems,
2012, 539–547.
[32] H. Qin, T. Liu, Y. Ma, Mining user’s real social circle in microblog, Proceedings of the 2012 International Conference on Advances
in SocialNetworks Analysis and Mining (ASONAM 2012), IEEE Computer Society,2012, 348–352.
[33] T. Liu, H. Qin, Detecting and tagging users’ social circles in social media, Multimedia Systems, 2014, 1–9.
[34] J. Wang, H. Peng, J.-s. Hu, Automatic keyphrases extraction from document using neural network, Advances in Machine Learning
and Cybernetics, Springer, 2006, 633–641.
[35] Y. HaCohen-Kerner, Z. Gross, A. Masa, Automatic extraction and learning of keyphrases from scientific articles,Computational
Linguistics andIntelligent Text Processing, Springer, 2005, 657–669.
[36] I. Blank, L. Rokach, G. Shani, Leveraging the citation graph to recommend keywords, Proceedings of the 7th ACM conference on
Recommender systems, ACM, 2013, 359–362.

Mais conteúdo relacionado

Mais procurados

Do you ever use facebook
Do you ever use facebookDo you ever use facebook
Do you ever use facebookhgfhjjff
 
2007-JOSS-Visualizing the signatures of social roles in online discussion groups
2007-JOSS-Visualizing the signatures of social roles in online discussion groups2007-JOSS-Visualizing the signatures of social roles in online discussion groups
2007-JOSS-Visualizing the signatures of social roles in online discussion groupsMarc Smith
 
Authorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social networkAuthorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social networkeSAT Publishing House
 
Social networking
Social networkingSocial networking
Social networkingPreet Raj
 
Rule based messege filtering and blacklist management for online social network
Rule based messege filtering and blacklist management for online social networkRule based messege filtering and blacklist management for online social network
Rule based messege filtering and blacklist management for online social networkeSAT Publishing House
 
2000 - CSCW - Conversation Trees and Threaded Chats
2000  - CSCW - Conversation Trees and Threaded Chats2000  - CSCW - Conversation Trees and Threaded Chats
2000 - CSCW - Conversation Trees and Threaded ChatsMarc Smith
 
Published Paper
Published PaperPublished Paper
Published PaperFaeza Noor
 
2000-ACM SIGCHI-The social life of small graphical chat spaces
2000-ACM SIGCHI-The social life of small graphical chat spaces2000-ACM SIGCHI-The social life of small graphical chat spaces
2000-ACM SIGCHI-The social life of small graphical chat spacesMarc Smith
 
NE7012- SOCIAL NETWORK ANALYSIS
NE7012- SOCIAL NETWORK ANALYSISNE7012- SOCIAL NETWORK ANALYSIS
NE7012- SOCIAL NETWORK ANALYSISrathnaarul
 
a modified weight balanced algorithm for influential users community detectio...
a modified weight balanced algorithm for influential users community detectio...a modified weight balanced algorithm for influential users community detectio...
a modified weight balanced algorithm for influential users community detectio...INFOGAIN PUBLICATION
 
Social Networks and Social Capital
Social Networks and Social CapitalSocial Networks and Social Capital
Social Networks and Social CapitalGiorgos Cheliotis
 
A COMPREHENSIVE STUDY ON DATA EXTRACTION IN SINA WEIBO
A COMPREHENSIVE STUDY ON DATA EXTRACTION IN SINA WEIBOA COMPREHENSIVE STUDY ON DATA EXTRACTION IN SINA WEIBO
A COMPREHENSIVE STUDY ON DATA EXTRACTION IN SINA WEIBOijaia
 
Calrg2015 2015 06-15
Calrg2015 2015 06-15Calrg2015 2015 06-15
Calrg2015 2015 06-15Katy Jordan
 
2009-Social computing-First steps to netviz nirvana
2009-Social computing-First steps to netviz nirvana2009-Social computing-First steps to netviz nirvana
2009-Social computing-First steps to netviz nirvanaMarc Smith
 
The anatomy of the Facebook social graph
The anatomy of the Facebook social graphThe anatomy of the Facebook social graph
The anatomy of the Facebook social graphaugustodefranco .
 
The Future of Social Networks: The Need for Semantics
The Future of Social Networks: The Need for SemanticsThe Future of Social Networks: The Need for Semantics
The Future of Social Networks: The Need for SemanticsJohn Breslin
 
Il laboratorio aperto: limiti e possibilità dell’uso di Facebook, Twitter e Y...
Il laboratorio aperto: limiti e possibilità dell’uso di Facebook, Twitter e Y...Il laboratorio aperto: limiti e possibilità dell’uso di Facebook, Twitter e Y...
Il laboratorio aperto: limiti e possibilità dell’uso di Facebook, Twitter e Y...Manolo Farci
 

Mais procurados (20)

Do you ever use facebook
Do you ever use facebookDo you ever use facebook
Do you ever use facebook
 
2007-JOSS-Visualizing the signatures of social roles in online discussion groups
2007-JOSS-Visualizing the signatures of social roles in online discussion groups2007-JOSS-Visualizing the signatures of social roles in online discussion groups
2007-JOSS-Visualizing the signatures of social roles in online discussion groups
 
Authorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social networkAuthorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social network
 
Social networking
Social networkingSocial networking
Social networking
 
Rule based messege filtering and blacklist management for online social network
Rule based messege filtering and blacklist management for online social networkRule based messege filtering and blacklist management for online social network
Rule based messege filtering and blacklist management for online social network
 
2000 - CSCW - Conversation Trees and Threaded Chats
2000  - CSCW - Conversation Trees and Threaded Chats2000  - CSCW - Conversation Trees and Threaded Chats
2000 - CSCW - Conversation Trees and Threaded Chats
 
Social network
Social networkSocial network
Social network
 
Published Paper
Published PaperPublished Paper
Published Paper
 
2000-ACM SIGCHI-The social life of small graphical chat spaces
2000-ACM SIGCHI-The social life of small graphical chat spaces2000-ACM SIGCHI-The social life of small graphical chat spaces
2000-ACM SIGCHI-The social life of small graphical chat spaces
 
Final project
Final projectFinal project
Final project
 
NE7012- SOCIAL NETWORK ANALYSIS
NE7012- SOCIAL NETWORK ANALYSISNE7012- SOCIAL NETWORK ANALYSIS
NE7012- SOCIAL NETWORK ANALYSIS
 
a modified weight balanced algorithm for influential users community detectio...
a modified weight balanced algorithm for influential users community detectio...a modified weight balanced algorithm for influential users community detectio...
a modified weight balanced algorithm for influential users community detectio...
 
Social Networks and Social Capital
Social Networks and Social CapitalSocial Networks and Social Capital
Social Networks and Social Capital
 
A COMPREHENSIVE STUDY ON DATA EXTRACTION IN SINA WEIBO
A COMPREHENSIVE STUDY ON DATA EXTRACTION IN SINA WEIBOA COMPREHENSIVE STUDY ON DATA EXTRACTION IN SINA WEIBO
A COMPREHENSIVE STUDY ON DATA EXTRACTION IN SINA WEIBO
 
Calrg2015 2015 06-15
Calrg2015 2015 06-15Calrg2015 2015 06-15
Calrg2015 2015 06-15
 
2009-Social computing-First steps to netviz nirvana
2009-Social computing-First steps to netviz nirvana2009-Social computing-First steps to netviz nirvana
2009-Social computing-First steps to netviz nirvana
 
The anatomy of the Facebook social graph
The anatomy of the Facebook social graphThe anatomy of the Facebook social graph
The anatomy of the Facebook social graph
 
Why Networks
Why NetworksWhy Networks
Why Networks
 
The Future of Social Networks: The Need for Semantics
The Future of Social Networks: The Need for SemanticsThe Future of Social Networks: The Need for Semantics
The Future of Social Networks: The Need for Semantics
 
Il laboratorio aperto: limiti e possibilità dell’uso di Facebook, Twitter e Y...
Il laboratorio aperto: limiti e possibilità dell’uso di Facebook, Twitter e Y...Il laboratorio aperto: limiti e possibilità dell’uso di Facebook, Twitter e Y...
Il laboratorio aperto: limiti e possibilità dell’uso di Facebook, Twitter e Y...
 

Destaque

O010439193.jeee [zsep01]
O010439193.jeee [zsep01]O010439193.jeee [zsep01]
O010439193.jeee [zsep01]IOSR Journals
 
The Role of IL-17, Metaphase Reactants on Patients with Early Rheumatoid Arth...
The Role of IL-17, Metaphase Reactants on Patients with Early Rheumatoid Arth...The Role of IL-17, Metaphase Reactants on Patients with Early Rheumatoid Arth...
The Role of IL-17, Metaphase Reactants on Patients with Early Rheumatoid Arth...IOSR Journals
 
Effects of Eccentric Strength Training’s Time on Daily Plasma Testosterone Le...
Effects of Eccentric Strength Training’s Time on Daily Plasma Testosterone Le...Effects of Eccentric Strength Training’s Time on Daily Plasma Testosterone Le...
Effects of Eccentric Strength Training’s Time on Daily Plasma Testosterone Le...IOSR Journals
 
Study of Boron Based Superconductivity and Effect of High Temperature Cuprate...
Study of Boron Based Superconductivity and Effect of High Temperature Cuprate...Study of Boron Based Superconductivity and Effect of High Temperature Cuprate...
Study of Boron Based Superconductivity and Effect of High Temperature Cuprate...IOSR Journals
 
Nasal Parameters of Ibibio and Yakurr Ethnic Groups of South South Nigeria
Nasal Parameters of Ibibio and Yakurr Ethnic Groups of South South NigeriaNasal Parameters of Ibibio and Yakurr Ethnic Groups of South South Nigeria
Nasal Parameters of Ibibio and Yakurr Ethnic Groups of South South NigeriaIOSR Journals
 
Cloud Computing for hand-held Devices:Enhancing Smart phones viability with C...
Cloud Computing for hand-held Devices:Enhancing Smart phones viability with C...Cloud Computing for hand-held Devices:Enhancing Smart phones viability with C...
Cloud Computing for hand-held Devices:Enhancing Smart phones viability with C...IOSR Journals
 
Developing Web Browser-Jan
Developing Web Browser-JanDeveloping Web Browser-Jan
Developing Web Browser-JanIOSR Journals
 
A Literature Review on Iris Segmentation Techniques for Iris Recognition Systems
A Literature Review on Iris Segmentation Techniques for Iris Recognition SystemsA Literature Review on Iris Segmentation Techniques for Iris Recognition Systems
A Literature Review on Iris Segmentation Techniques for Iris Recognition SystemsIOSR Journals
 
Microscopic Image Analysis of Nanoparticles by Edge Detection Using Ant Colon...
Microscopic Image Analysis of Nanoparticles by Edge Detection Using Ant Colon...Microscopic Image Analysis of Nanoparticles by Edge Detection Using Ant Colon...
Microscopic Image Analysis of Nanoparticles by Edge Detection Using Ant Colon...IOSR Journals
 
Enhancing Digital Cephalic Radiography
Enhancing Digital Cephalic RadiographyEnhancing Digital Cephalic Radiography
Enhancing Digital Cephalic RadiographyIOSR Journals
 
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...IOSR Journals
 
Annunciator for Hazard Prevention & Temperature Control
Annunciator for Hazard Prevention & Temperature ControlAnnunciator for Hazard Prevention & Temperature Control
Annunciator for Hazard Prevention & Temperature ControlIOSR Journals
 
Cash Flow Valuation Mode Lin Discrete Time
Cash Flow Valuation Mode Lin Discrete TimeCash Flow Valuation Mode Lin Discrete Time
Cash Flow Valuation Mode Lin Discrete TimeIOSR Journals
 
MATLAB Based Model for Analysis of the Effect of Equivalent Circuit Parameter...
MATLAB Based Model for Analysis of the Effect of Equivalent Circuit Parameter...MATLAB Based Model for Analysis of the Effect of Equivalent Circuit Parameter...
MATLAB Based Model for Analysis of the Effect of Equivalent Circuit Parameter...IOSR Journals
 

Destaque (20)

C012411728
C012411728C012411728
C012411728
 
O010439193.jeee [zsep01]
O010439193.jeee [zsep01]O010439193.jeee [zsep01]
O010439193.jeee [zsep01]
 
The Role of IL-17, Metaphase Reactants on Patients with Early Rheumatoid Arth...
The Role of IL-17, Metaphase Reactants on Patients with Early Rheumatoid Arth...The Role of IL-17, Metaphase Reactants on Patients with Early Rheumatoid Arth...
The Role of IL-17, Metaphase Reactants on Patients with Early Rheumatoid Arth...
 
Effects of Eccentric Strength Training’s Time on Daily Plasma Testosterone Le...
Effects of Eccentric Strength Training’s Time on Daily Plasma Testosterone Le...Effects of Eccentric Strength Training’s Time on Daily Plasma Testosterone Le...
Effects of Eccentric Strength Training’s Time on Daily Plasma Testosterone Le...
 
Study of Boron Based Superconductivity and Effect of High Temperature Cuprate...
Study of Boron Based Superconductivity and Effect of High Temperature Cuprate...Study of Boron Based Superconductivity and Effect of High Temperature Cuprate...
Study of Boron Based Superconductivity and Effect of High Temperature Cuprate...
 
Nasal Parameters of Ibibio and Yakurr Ethnic Groups of South South Nigeria
Nasal Parameters of Ibibio and Yakurr Ethnic Groups of South South NigeriaNasal Parameters of Ibibio and Yakurr Ethnic Groups of South South Nigeria
Nasal Parameters of Ibibio and Yakurr Ethnic Groups of South South Nigeria
 
R130301114118
R130301114118R130301114118
R130301114118
 
A010620104
A010620104A010620104
A010620104
 
Cloud Computing for hand-held Devices:Enhancing Smart phones viability with C...
Cloud Computing for hand-held Devices:Enhancing Smart phones viability with C...Cloud Computing for hand-held Devices:Enhancing Smart phones viability with C...
Cloud Computing for hand-held Devices:Enhancing Smart phones viability with C...
 
Developing Web Browser-Jan
Developing Web Browser-JanDeveloping Web Browser-Jan
Developing Web Browser-Jan
 
A Literature Review on Iris Segmentation Techniques for Iris Recognition Systems
A Literature Review on Iris Segmentation Techniques for Iris Recognition SystemsA Literature Review on Iris Segmentation Techniques for Iris Recognition Systems
A Literature Review on Iris Segmentation Techniques for Iris Recognition Systems
 
Microscopic Image Analysis of Nanoparticles by Edge Detection Using Ant Colon...
Microscopic Image Analysis of Nanoparticles by Edge Detection Using Ant Colon...Microscopic Image Analysis of Nanoparticles by Edge Detection Using Ant Colon...
Microscopic Image Analysis of Nanoparticles by Edge Detection Using Ant Colon...
 
Enhancing Digital Cephalic Radiography
Enhancing Digital Cephalic RadiographyEnhancing Digital Cephalic Radiography
Enhancing Digital Cephalic Radiography
 
B0210714
B0210714B0210714
B0210714
 
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
 
Annunciator for Hazard Prevention & Temperature Control
Annunciator for Hazard Prevention & Temperature ControlAnnunciator for Hazard Prevention & Temperature Control
Annunciator for Hazard Prevention & Temperature Control
 
Cash Flow Valuation Mode Lin Discrete Time
Cash Flow Valuation Mode Lin Discrete TimeCash Flow Valuation Mode Lin Discrete Time
Cash Flow Valuation Mode Lin Discrete Time
 
C010321217
C010321217C010321217
C010321217
 
MATLAB Based Model for Analysis of the Effect of Equivalent Circuit Parameter...
MATLAB Based Model for Analysis of the Effect of Equivalent Circuit Parameter...MATLAB Based Model for Analysis of the Effect of Equivalent Circuit Parameter...
MATLAB Based Model for Analysis of the Effect of Equivalent Circuit Parameter...
 
J017635664
J017635664J017635664
J017635664
 

Semelhante a B1803020915

Social networking-overview
Social networking-overviewSocial networking-overview
Social networking-overviewsakshicherry
 
FRIEND SUGGESTION SYSTEM FOR THE SOCIAL NETWORK BASED ON USER BEHAVIOR
FRIEND SUGGESTION SYSTEM FOR THE SOCIAL NETWORK BASED ON USER BEHAVIORFRIEND SUGGESTION SYSTEM FOR THE SOCIAL NETWORK BASED ON USER BEHAVIOR
FRIEND SUGGESTION SYSTEM FOR THE SOCIAL NETWORK BASED ON USER BEHAVIORijcseit
 
LEARNER CENTERED NETWORK MODELS: A SURVEY
LEARNER CENTERED NETWORK MODELS: A SURVEYLEARNER CENTERED NETWORK MODELS: A SURVEY
LEARNER CENTERED NETWORK MODELS: A SURVEYIJITE
 
Are You Feeling Lonely The Impact ofRelationship Characteri.docx
Are You Feeling Lonely The Impact ofRelationship Characteri.docxAre You Feeling Lonely The Impact ofRelationship Characteri.docx
Are You Feeling Lonely The Impact ofRelationship Characteri.docxrossskuddershamus
 
The Impacts of Social Networking and Its Analysis
The Impacts of Social Networking and Its AnalysisThe Impacts of Social Networking and Its Analysis
The Impacts of Social Networking and Its AnalysisIJMER
 
Final project: A Survey of Convenience and Benefit of Social Networking Sites...
Final project: A Survey of Convenience and Benefit of Social Networking Sites...Final project: A Survey of Convenience and Benefit of Social Networking Sites...
Final project: A Survey of Convenience and Benefit of Social Networking Sites...hoyaohong
 
PROFILR : Toward Preserving Privacy and Functionality in Geosocial Networks
PROFILR : Toward Preserving Privacy and Functionality in Geosocial NetworksPROFILR : Toward Preserving Privacy and Functionality in Geosocial Networks
PROFILR : Toward Preserving Privacy and Functionality in Geosocial NetworksAmarnath Reddy
 
Multimode network based efficient and scalable learning of collective behavior
Multimode network based efficient and scalable learning of collective behaviorMultimode network based efficient and scalable learning of collective behavior
Multimode network based efficient and scalable learning of collective behaviorIAEME Publication
 
Social Networking Websites and Image Privacy
Social Networking Websites and Image PrivacySocial Networking Websites and Image Privacy
Social Networking Websites and Image PrivacyIOSR Journals
 
Survey on personality predication methods using AI
Survey on personality predication methods using AISurvey on personality predication methods using AI
Survey on personality predication methods using AIIJAEMSJORNAL
 
SOCIAL INTERMEDIARIES AND THE LOCATION OF AGENCY: A Conceptual Reconfiguratio...
SOCIAL INTERMEDIARIES AND THE LOCATION OF AGENCY: A Conceptual Reconfiguratio...SOCIAL INTERMEDIARIES AND THE LOCATION OF AGENCY: A Conceptual Reconfiguratio...
SOCIAL INTERMEDIARIES AND THE LOCATION OF AGENCY: A Conceptual Reconfiguratio...Martin Berg
 
ReferencesBruine de Bruin, W., Parker, A. M., & Strough, J. (202.docx
ReferencesBruine de Bruin, W., Parker, A. M., & Strough, J. (202.docxReferencesBruine de Bruin, W., Parker, A. M., & Strough, J. (202.docx
ReferencesBruine de Bruin, W., Parker, A. M., & Strough, J. (202.docxaudeleypearl
 
Social networking .ppt
Social networking .pptSocial networking .ppt
Social networking .pptPRANJAL SAIKIA
 
02 Introduction to Social Networks and Health: Key Concepts and Overview
02 Introduction to Social Networks and Health: Key Concepts and Overview02 Introduction to Social Networks and Health: Key Concepts and Overview
02 Introduction to Social Networks and Health: Key Concepts and OverviewDuke Network Analysis Center
 
The Mathematics of Social Network Analysis: Metrics for Academic Social Networks
The Mathematics of Social Network Analysis: Metrics for Academic Social NetworksThe Mathematics of Social Network Analysis: Metrics for Academic Social Networks
The Mathematics of Social Network Analysis: Metrics for Academic Social NetworksEditor IJCATR
 
Networking Portfolio Term Paper
Networking Portfolio Term PaperNetworking Portfolio Term Paper
Networking Portfolio Term PaperWriters Per Hour
 
2009-Social computing-Analyzing social media networks
2009-Social computing-Analyzing social media networks2009-Social computing-Analyzing social media networks
2009-Social computing-Analyzing social media networksMarc Smith
 

Semelhante a B1803020915 (20)

Scalable
ScalableScalable
Scalable
 
Social networking-overview
Social networking-overviewSocial networking-overview
Social networking-overview
 
FRIEND SUGGESTION SYSTEM FOR THE SOCIAL NETWORK BASED ON USER BEHAVIOR
FRIEND SUGGESTION SYSTEM FOR THE SOCIAL NETWORK BASED ON USER BEHAVIORFRIEND SUGGESTION SYSTEM FOR THE SOCIAL NETWORK BASED ON USER BEHAVIOR
FRIEND SUGGESTION SYSTEM FOR THE SOCIAL NETWORK BASED ON USER BEHAVIOR
 
LEARNER CENTERED NETWORK MODELS: A SURVEY
LEARNER CENTERED NETWORK MODELS: A SURVEYLEARNER CENTERED NETWORK MODELS: A SURVEY
LEARNER CENTERED NETWORK MODELS: A SURVEY
 
Are You Feeling Lonely The Impact ofRelationship Characteri.docx
Are You Feeling Lonely The Impact ofRelationship Characteri.docxAre You Feeling Lonely The Impact ofRelationship Characteri.docx
Are You Feeling Lonely The Impact ofRelationship Characteri.docx
 
The Impacts of Social Networking and Its Analysis
The Impacts of Social Networking and Its AnalysisThe Impacts of Social Networking and Its Analysis
The Impacts of Social Networking and Its Analysis
 
Final project: A Survey of Convenience and Benefit of Social Networking Sites...
Final project: A Survey of Convenience and Benefit of Social Networking Sites...Final project: A Survey of Convenience and Benefit of Social Networking Sites...
Final project: A Survey of Convenience and Benefit of Social Networking Sites...
 
PROFILR : Toward Preserving Privacy and Functionality in Geosocial Networks
PROFILR : Toward Preserving Privacy and Functionality in Geosocial NetworksPROFILR : Toward Preserving Privacy and Functionality in Geosocial Networks
PROFILR : Toward Preserving Privacy and Functionality in Geosocial Networks
 
Multimode network based efficient and scalable learning of collective behavior
Multimode network based efficient and scalable learning of collective behaviorMultimode network based efficient and scalable learning of collective behavior
Multimode network based efficient and scalable learning of collective behavior
 
Social Networking Websites and Image Privacy
Social Networking Websites and Image PrivacySocial Networking Websites and Image Privacy
Social Networking Websites and Image Privacy
 
Survey on personality predication methods using AI
Survey on personality predication methods using AISurvey on personality predication methods using AI
Survey on personality predication methods using AI
 
SOCIAL INTERMEDIARIES AND THE LOCATION OF AGENCY: A Conceptual Reconfiguratio...
SOCIAL INTERMEDIARIES AND THE LOCATION OF AGENCY: A Conceptual Reconfiguratio...SOCIAL INTERMEDIARIES AND THE LOCATION OF AGENCY: A Conceptual Reconfiguratio...
SOCIAL INTERMEDIARIES AND THE LOCATION OF AGENCY: A Conceptual Reconfiguratio...
 
ReferencesBruine de Bruin, W., Parker, A. M., & Strough, J. (202.docx
ReferencesBruine de Bruin, W., Parker, A. M., & Strough, J. (202.docxReferencesBruine de Bruin, W., Parker, A. M., & Strough, J. (202.docx
ReferencesBruine de Bruin, W., Parker, A. M., & Strough, J. (202.docx
 
Social networking .ppt
Social networking .pptSocial networking .ppt
Social networking .ppt
 
2_Doc5_2.pdf
2_Doc5_2.pdf2_Doc5_2.pdf
2_Doc5_2.pdf
 
02 Introduction to Social Networks and Health: Key Concepts and Overview
02 Introduction to Social Networks and Health: Key Concepts and Overview02 Introduction to Social Networks and Health: Key Concepts and Overview
02 Introduction to Social Networks and Health: Key Concepts and Overview
 
The Mathematics of Social Network Analysis: Metrics for Academic Social Networks
The Mathematics of Social Network Analysis: Metrics for Academic Social NetworksThe Mathematics of Social Network Analysis: Metrics for Academic Social Networks
The Mathematics of Social Network Analysis: Metrics for Academic Social Networks
 
Networking Portfolio Term Paper
Networking Portfolio Term PaperNetworking Portfolio Term Paper
Networking Portfolio Term Paper
 
2009-Social computing-Analyzing social media networks
2009-Social computing-Analyzing social media networks2009-Social computing-Analyzing social media networks
2009-Social computing-Analyzing social media networks
 
209
209209
209
 

Mais de IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Último

HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 

Último (20)

HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

B1803020915

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 3, Ver. II (May-Jun. 2016), PP 09-15 www.iosrjournals.org DOI: 10.9790/0661-1803020915 www.iosrjournals.org 9 | Page User Profile Completion with Online Social Circles Hailong Qin1 , Jing Liu2 ,Chin-Yew Lin2 ,Ting Liu1 1 (Harbin Institute of Technology, China) 2 (Microsoft Research Asia, China) Abstract :User profile is a kind of most effective feature and cue of user behavioranalysis. However, most ofusers'profiles are incomplete and untruthful, and users' tag and profile data are rathersparse on social media. It makes profile completionbecomeapopularresearch topic. Users have manystrongrelationships online, and theserelationshipsformmany social circles, such as classmate, family and colleague. A user'sdifferent online social circlescanrepresentthisuser'svarious social attributes. We focus the task of user profile completion in thispaper. We propose an algorithm of user profile completion via users' social circles by non-negative matrix factorization. The methodcandetectauser's multi-dimension social characteristicsfromvarious social circles. Wealsotransfer the concept of social circle to academic networks. A papermay cite otherpaperswithseveral intentions. Some of the referencesmaybe relevant according to the researchproblems and otherreferencesmaybe relevant according to the methodologies. The references of different topics formdifferent "referencecircle". By an academicpaper'sdifferent "referencecircle", our model candetect the paper's keywords in differentviews. The experiment on Facebook LinkedIn and Microsoft AcademicSearch show ourmethod has improved performance than state-of-art methods. Keywords -User Profile Completion, Social Circle, Non-negative Matrix Factorization I. Introduction Following the development of Web 2.0, more and more people communicate with their real friends on social network service (SNS), such as Facebook LinkedIn and Twitter. These users publish and share many feeds on social network. Both these content and users' profiles on SNS can be useful features of user behavior analysis. However, a main characteristic of on-line social media is that it is easy to provide false profiles such as gender age, and hometown and so on. So it is difficult to detect these users' true identities and their profiles. For solving this problem, user profile completion becomes a popular research topic in the area of social network analysis. Figure 1. A user's profiles on Facebook. A user's profiles usually have many items, such as gender, age and school name (Fig 1). For example, the user's major field can show users' professions and the middle school field can indicate a user's hometown and school name generally. Most of existed works about user profile completion focus on predicting user's age
  • 2. User Profile Completion with Online Social Circles DOI: 10.9790/0661-1803020915 www.iosrjournals.org 10 | Page or gender via text feature. In general, these simple profiles can be inferred from users' language styles. A lot of methods classify different age groups and genders with their posts [1, 2, 3, 4]. However, it is difficult to detect users' other kinds of profiles from text feature. Few users explicitly refer their major or hometown in their posts frequently. On research of user behavior analysis, these items are usually more informative features. And it is also difficult to indicate exact classification for these items by texts. Figure 2. A people’s social circles A user has many categories of strong relationships on social media. These strong relationships are constituted of users' online social circles. A user has several social circles on social media, such as classmates in a school, and colleagues in a company and so on (Figure 2). Social circle reflects an individual's social environment that can often be leveraged to infer important information about that individuals' attitudes, behaviors, and decisions [5, 6, 7, 8, 9, 10, 11]. However, this type of social circle is different from traditional community. In the view of graph, the distribution of edges is not only globally, but also locally inhomogeneous, with high concentrations of edges within special groups of vertices, and low concentrations between these groups. This feature of a real networks is called community structure [12]. A node of a community may refer to people, and it also could be a computer in Internet or a gene in a gene network. Firstly, a traditional community is larger than a general social circle which may just has three members (such as three family members). On the other hand, a residential area can be a community in a mobile communication network. And the area may have several thousand people, but it is not anyone's social circle. Secondly, although there are some common tags or profiles of each member in same community, these members may don't know each other. In contrast, there are strong relationships between each member in the same social circle. Namely, a community of mobile network depends on the location, not explicit social relationships. As suggested above, community detection is focused on finding arbitrary highly interconnected subgraphs within larger networks, and social circle detection will instead discover several groups of strong social relationships including one or more specific individuals [13]. Users often communicates with their different social circles (such as families and classmates) on SNS and members of social circles are usually users' strong relationships. These social circles can represent a user's multi-dimension social relationships and social attributes. For example, the common characteristics of family circle are relevant to a user's hometown. And more information about a user's company can be detected from colleague circles. So members in a same social circle can supplement profiles each other. Obviously, a user usually has some common profile items with her/his every friend. But Li [14] proposes that profile completion should only depends on users' close relationships. That means profiles between friends are more likely similar and valuable. However, Li [14] completes profiles by users' labeled friends, and they are not ground-truths of users' social circles. Members in a same social circle have most possible to have same profile items, and the different kinds of profile items can represent a user's different characteristics. So it need an algorithm to complete user profiles with real social circles. For this purpose, we propose an algorithm by non-negative matrix factorization. As social circle also has similar situations and features on academic networks. Our algorithm can also be applied to academic networks for keywords detection of papers. We hypothesis a user's all profile items are unknown and this user's several social circles are known. Our task is completing the user's profiles by her/his social circles on social network. For collecting more user profiles in the view of users' real social circles, this paper proposes a user profile completion model with members of users' social circles via non-negative matrix factorization. With features of users' circles and all closed friends' profiles, the algorithm can complete the center user's (The user who own these social circles.)
  • 3. User Profile Completion with Online Social Circles DOI: 10.9790/0661-1803020915 www.iosrjournals.org 11 | Page profiles. Our algorithm conducts on Facebook LinkedIn and Microsoft Academic Research. Results of experiment prove that our method are more effective than baselines. The rest of this paper is organized as follows: in the next section, we describe related work. Then we introduce our methodology of user profile completion via non-negative matrix factorization in section 3. We describe datasets and experiment in section 4. Finally, we conclude our work and point out avenues for future research. II. Related Work 2.1 Profile Completion User profile completion is a popular area of user analysis. [1,2,3,4,15] predict users' gender and age according their tweets. [16]infers users' political orientation or ethnicity from various user information. [17]classifies users' four attributes in Twitter. [18]adds the features of authors' name to profiles completion. All their ideas are based user classification according user profiles. [19]extracts users' jobs educations and spouses in Google Plus and Freebase. According to the homophily between users, [20] completes users' profile via their neighbors’ information. [21] infers users' locations based on social relationships. Bergsma [22] proposes different types of users have different attributes. Liu [23] completes user profiles via their labeled friends. However, all of these work do not refer to real social circles. 2.2 Social Circle Social circle is closely relevant to the term of community which has two interpretations: one is the geographical notion of community and another is relational. The second one is concerned with the quality of the character of human relationships, without reference to location [24]. The online social circles carry the second meaning and do not concern physical locations. The detection of social circles is a new research area which emerging with the popularity of social networks. It is a clustering problem within ego network, members within a same social circle do not only have dense relationships, but also have some same profiles. So a social circle is the group with a specified social meaning. A growing number of scholars study their subjects in view of social circles. The recommendation algorithm based on users' circles performs no worse than those based on the full network [25]. Question recommendation, question popularity analysis and prediction based on social circles get better performance [26, 23]. It is also a main feature of linking users across online social networks [27]. Bernado proposes that it is necessary to mine users' real friends [28]. The evolution of online social groups is analyzed and predicted by Kairam [29]. Qu and Liu propose a semi-supervised method to detect social circles in twitter [30]. But some members in user groups are not users' real friends in Twitter. A lot of groups just classify different types of followees, many of these followees are not users' bilateral friends. Since 2012, some specific social circle detection algorithms have been proposed by Leskovec and Qin [31, 32]. Burton [13] introduces a detection algorithm of local social circle when whole network is unknown. Liu [33] develops an algorithm for mining tags of social circles. However, all works are about social circles detection and mining, there is few work of user analysis based on online social circles. 2.3 Keywords Detection Wang [34] proposes a method of keywords extraction based on neural network. And [35] integrates several keywords detection methods to improve performance. Blank [36] extracts keywords of academic papers by citation graph. Our algorithm considers different topics of references based on citation graph. III. User Profile Completion (11 Bold) Figure3.CP can be decomposed into the product of CU and UP. 3.1 Principle Every user has several items in her/his profiles and different items can represent different social attributes. On the other hand, a user has many social circles on SNS. Most members among a social circle are strong relationships. And their common profiles can likely represent attributes of their social circle. In the point
  • 4. User Profile Completion with Online Social Circles DOI: 10.9790/0661-1803020915 www.iosrjournals.org 12 | Page of social circle, attributes of a user's different social circles likely constitute the user's multi-dimension profiles. So users' profiles can be supplemented with the help of different social circles. In this work, we select non-negative matrix factorization since matrices can easily embed relationships of user-circle and user-profile. Our algorithm completes users' profiles by main attributes of users' different social circles via NMF. This model gets great performance and also has strong interpretability. Circle-Profile matrix can be factorized into the product of circle-user matrix and user-profile matrix. As observed matrix, circle-profile matrix represents weights of all members' profile items for every circle. A center user may have several social circles and members of these social circles are different. So contributions of social circles for user profile completion are also different. The user-circle matrix can represent different levels of contribution. And user-profile matrix represents weights of all profile items for every center user. 3.2Algorithm Definition I: Matrix CP is a circle-profile matrix. CPij is weights of profilej for circlei. All circles and their members' profile of every dataset are represented in a same matrix. (The matrix do not include the center user who own this social circle.) Definition II: Matrix CU is a circle-user matrix. Every row represents a circle in dataset, and every column represents a center user who owns several social circles. If the center user owns this circle, the value is the weight of the center user in the circle. Otherwise, the value is 0 in matrix. All center users and their circles of every dataset are represented in a same matrix. The matrix is initialized by random values. Definition III: Matrix UP is a user-profile matrix. The value represents weights of profile items to center users. All center users and their profiles of every dataset are represented in a same matrix. The matrix is initialized by random values. We will complete users' profiles according to weights of profiles in matrix UP. 𝐶𝑃 ≈ 𝐶𝑈 × 𝑈𝑃 (1) According to the principle of matrix factorization, CP can be decomposed into the product of CU and UP. We can get users' social circles and their friends' profiles, and construct matrix CP. This kind of factorization accord with the hypothesis of a people's different social circles can represent the people's different aspects of characteristics. The NMF is carried out by minimizing the difference between CP and CU×UP. We take Euclidean Distance (Equation 2) as our loss function to measure the difference between CP and CU×UP. 𝐽 𝐶𝑈, 𝐶𝑃 = 1 2 (𝐶𝑃𝑖𝑗 − 𝐶𝑈𝑖𝑗 × 𝑈𝑃𝑖𝑗 )𝑖𝑗 (2) As CP are fixed, we find non-negative CU and UP by gradient descent (Equation 3 and 4). 𝐶𝑈𝑖𝑘 = 𝐶𝑈𝑖𝑘 − 𝛼1 × [ 𝐶𝑃 × 𝑈𝑃 𝑇 𝑖𝑘 − 𝐶𝑈 × 𝑈𝑃 × 𝑈𝑃 𝑇 𝑖𝑘 ] (3) 𝑈𝑃𝑘𝑗 = 𝑈𝑃𝑘𝑗 − 𝛼2 × [ 𝐶𝑈 𝑇 × 𝐶𝑃 𝑘𝑗 − 𝐶𝑈 𝑇 × 𝐶𝑈 × 𝑈𝑃 𝑘𝑗 ](4) Then we set 𝛼1 and𝛼2 as Equation 5 and Equation 6. 𝛼1 = 𝐶𝑈 𝑖𝑘 𝐶𝑈 𝑇×𝐶𝑈×𝑈𝑃 𝑖𝑘 (5) 𝛼2 = 𝑈𝑃 𝑘𝑗 𝐶𝑈×𝑈𝑃×𝑈𝑃 𝑇 𝑘𝑗 (6) So Equation 7 and Equation 8 are final iteration rules. 𝐶𝑈𝑖𝑘 = 𝐶𝑈𝑖𝑘 (𝐶𝑃×𝑈𝑃 𝑇)𝑖𝑘 𝐶𝑈×𝑈𝑃×𝑈𝑃 𝑇 𝑖𝑘 (7) 𝑈𝑃𝑘𝑗 = 𝑈𝑃𝑘𝑗 (𝐶𝑈 𝑇 ×𝐶𝑃) 𝑘𝑗 𝐶𝑈 𝑇 ×𝐶𝑈×𝑈𝑃 𝑘𝑗 (8) Matrix UP represents weights of profile items for every user. The high weight items have more possibility to be center users' profiles
  • 5. User Profile Completion with Online Social Circles DOI: 10.9790/0661-1803020915 www.iosrjournals.org 13 | Page . IV. Experiment 4.1 Dataset 4.1.1 Facebook The dataset of Facebook is released in Kaggle1 . It includes 60 users and their social circles. There are 17,115 friends in all social circles, while every user has 19.73 social circle and every social circle has 28.91 friends averagely. Every center users averagely has 16.97 profile items. The task is completing center users' profiles in this dataset. 4.1.2 LinkedIn The LinkedIn Dataset is released by University of Illinois at Urbana-Champaign2 . It includes 187 users and their labeled friends. Different from Facebook dataset, labeled friends are not ground-truths of social circle. However, there are common characteristics among friends having same labels. So the algorithm completes a user's profiles by her/his different labeled friends . 4.1.3 Microsoft Academic Search Academic network is paper-based network. Most academic papers of computer science propose an effective methodology to solve a specified problems. Every paper will cite many relevant papers as its references. The network is consist of relationships of citation. The references of one paper will consist of different reference circles (Fig 4). Some paper circles may represent paper groups of similar research problems, and some circles may represent previous relevant methodology. According to citation relationships and academic meanings of a paper's reference circles, we can infer keywords of the paper collaboratively. The dataset of academic paper is extracted from Microsoft Academic Search3 . There are 25 papers in dataset. The part of Related Work is divided into many sections in these papers. All references of every section are relevant to a similar research problem or a similar research methodology. So these references can be regarded as ground-truth of reference-circles. The task is detecting center papers' keywords in academic dataset. We annotate technology terminologies in titles and abstracts of these papers, these terminologies are candidate keywords of center papers. Figure4.A paper's references are divided several parts, such as Query Modeling and External Expansion. 4.2 Baseline 4.2.1 TF-IDF We regard every social circle as a document, and all members' profiles are word in this document. And compute every profile item p's TF value in Circlei(Equation 9) and p's IDF value (Equation 10) in the circle, then get TF×IDF values. Finally, select top profile items as profiles of the social circle. 𝑇𝐹𝑝𝑖 = 𝐶𝑜𝑢𝑛𝑡 𝑝 𝑖𝑛 𝐶𝑖𝑟𝑐𝑙𝑒 𝑖 𝑃𝑟𝑜𝑓𝑖𝑙𝑒𝐶𝑜𝑢𝑛𝑡 (𝑚)𝑚 ∈𝐶𝑖𝑟𝑐𝑙𝑒 𝑖 (9) 1 https://www.kaggle.com/c/learning-social-circles/data 2 https://wiki.engr.illinois.edu/display/forward/Dataset-EgoNetUIUC-LinkedinCrawl-Jan2014 3 http://libra.msra.cn/
  • 6. User Profile Completion with Online Social Circles DOI: 10.9790/0661-1803020915 www.iosrjournals.org 14 | Page IDF(P) = 𝑙𝑜𝑔 |𝐶𝑖𝑟𝑐𝑙𝑒 | 𝟏𝐶𝑖𝑟𝑐𝑙𝑒 𝑕 𝑎𝑣𝑖𝑛𝑔𝑝 (10) 4.2.2 Co-Profile Different from age and gender prediction, detecting multi-dimension profiles is not a classification problem. We extract users' profiles from friends of social circles. [14]proves that only close friends are effective for profile completion. So we select co-profile method in [14] as our strong baseline. By the same motivation, co-profile also completes users' profile by close friends. However, this method detects users' social circles at thesame time of profile completion. So their social circles in the LinkedIn dataset are not ground-truths. Our model is more persuasive for effect of user real social circles. As we have ground-truths of social circles in our dataset, we do not learn circles in co-profile method. Equation 11 is the cost function of co-profile. v is a center user's friend and C is the circle. f represents a friend's profile vector, f0 represents a center user's profile vector, The profile vectors update by Equation 12 and 13. 𝜆1 𝜔𝑡 ×𝑣 𝑖,𝑣 𝑗 𝜖 𝐶𝑡 𝑓𝑖 − 𝑓𝑗 2 + 𝜔𝑡 ×𝑣 𝑖 𝜖𝐶𝑡 𝑓0 − 𝑓𝑗 2 + 𝜆2 ×𝐾 𝑡=1 𝑡=1𝐾𝑣𝑖𝜖𝐶𝑡(𝜔𝑡× 𝑓𝑖−1)2(11) 𝑓𝑖,𝑦 = 𝑓0,𝑦 + 𝑓 𝑗,𝑦𝑣 𝑗 𝜖𝐶 𝑡 1+ 𝟏𝑛 𝑗 𝜖𝐶 𝑡 , 𝜔𝑡,𝑦 = 1 (12) 𝑓0,𝑦 = 𝑓 𝑗,𝑦𝑣 𝑗 𝜖𝐶 𝑡 𝐾 𝑡=1,𝜔 𝑡,𝑦 =1 𝟏𝑣 𝑗 𝜖𝐶 𝑡 𝐾 𝑡=1,𝜔 𝑡,𝑦 =1 , 𝜔𝑡,𝑦 = 1, ∀𝑡 = 1 … . 𝐾(13) 4.3Result Analysis Table1. Overview of Dataset Facebook LinkedIn Microsoft Academic Search Total Center Users 60 187 25 Total Friends 17,115 5455 625 Avg Circles Per Center User 19.73 3.24 2.56 AvgProfiles Per User 16.97 3.57 7.31 Table2. Precision of User Profiles Completion Profile Type TF-IDF Co-Profile Social Circle-Completion Facebook(P@N) N/A 21.66% 19.98% 28.81% Microsoft Academic Search(P@N) N/A 14.88% 12.00% 24.80% LinkedIn(P@10) Employer 27.05% 60.00% 42.11% College 60.13% 61.00% 81.30% Location 46.70% 68.00% 63.53% TF-IDF method is an effective and simple method of extracting main profiles and keywords. But different social circles have different importance for a people. TF-IDF method cannot combine with these relationships. So TF-IDF gets low performance when completing users' profiles. In datasets of Facebook and academic data, our method is improved than TF-IDF and co-profile obviously. Because our method can extract key profiles and keywords of different social circles and different parts of academic related work. That proves that performances of our work are good in both problems of user profile completion and academic keywords detection. In the LinkedIn dataset, only the performance of college profile is better than co-profile. After data analysis, our algorithm strongly depend on user friends' profile. The lack of friends' profiles will lead bad performance. The profile items about college in a kind of labeled friends are more identical in the dataset. As we don't know ground-truths of LinkedIn social circles, we use every user's labeled friends as a kind of social circle. Different from our model, co-profile includes the process of social circle detection based on labeled friends, so our friends sets for profile completion are different from baseline. On the other hand, both our experiment and the baseline do not use ground-truths of social circles in LinkedIn. However, other two datasets prove our model has better performance for ground-truth of user social circles. V. Conclusion The paper proposes an algorithm of user profile completion with the feature of social circle. In the
  • 7. User Profile Completion with Online Social Circles DOI: 10.9790/0661-1803020915 www.iosrjournals.org 15 | Page aspect of social relationships, we combine social memberships and user friends' profiles in a model of non- negative matrix factorization. The model can supplement users' multi-dimension profiles by social circles and has strong interpretability. That is a new viewpoint of user profile completion with user strong relationships. At the same time, we also apply the concept of social circle to reference category of academic paper. Excepting completing user profile, the algorithm is also an effective keywords detection method on academic network. The experiment shows our method has improved performance than state-of-art methods. In future, we will detect multi- dimension user attributes from users' posts, and try to complete user profile more precisely by combining features of social circles and user texts. We will also try to explore author circles on academic networks. Acknowledgements This work was supported by the National Basic Research Program (973 Program) of China(No. 2014CB340503), National Natural Science Foundation of China (No. 61133012 and No. 61472107). References [1] C. Peersman, W. Daelemans, L. Van Vaerenbergh, Predicting age and gender in online social networks, Proceedings of the 3rd international workshop on Search and mining user-generated contents, ACM, 2011, 37–44. [2] D. Nguyen, N. A. Smith, C. P. Ros´e, Author age prediction from text using linear regression, Proceedings of the 5th ACL-HLT Workshop on Language Technology for Cultural Heritage, Social Sciences, and Humanities,Association for Computational Linguistics, 2011, 115–123. [3] S. Rosenthal, K. McKeown, Age prediction in blogs: A study of style,content, and online behavior in pre-and post-social media generations, Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies-Volume 1, Associationfor Computational Linguistics, 2011, 763–772. [4] J. D. Burger, J. Henderson, G. Kim, G. Zarrella, Discriminating gender on twitter, Proceedings of the Conference on Empirical Methods inNatural Language Processing, Association for Computational Linguistics, 2011, 1301–1309. [5] I. Ajzen, M. Fishbein, Understanding attitudes and predicting social behavior.(Prentice-Hall, 1980). [6] M. Roserberg, Society and the adolescent self-image, revised edition,1989. [7] I. H. Yen, S. L. Syme, The social environment and health: a discussion ofthe epidemiologic literature, Annual review of public health 20 (1) 1999, 287–308. [8] T. St˚ahl, A. R¨utten, D. Nutbeam, A. Bauman, L. Kannas, T. Abel, G. L¨uschen, D. J. Rodriquez, J. Vinck, J. van der Zee, The importanceof the social environment for physically active lifestyleresults from an international study, Social science & medicine 52 (1), 2001,1–10. [9] C. Wei, Formation of norms in a blog community. [10] M. Goldberg, S. Kelley, M. Magdon-Ismail, K. Mertsalov, A. Wallace, Finding overlapping communities in social networks, 2010 IEEE Second International Conference on Social Computing (SocialCom), IEEE, 2010, 104–113. [11] M. De Klepper, E. Sleebos, G. Van de Bunt, F. Agneessens, Similarity infriendship networks: Selection or influence?the effect of constraining contexts and non-visible individual attributes, Social Networks 32 (1) ,2010,82–90. [12] M. Girvan, M. E. Newman, Community structure in social and biologicalnetworks, Proceedings of the national academy of sciences 99 (12), 2002, 7821–7826. [13] S. H. Burton, C. G. Giraud-Carrier, Discovering social circles in directedgraphs, ACM Transactions on Knowledge Discovery from Data (TKDD) 8 (4) ,2014,21. [14] R. Li, C. Wang, K. C.-C. Chang, User profiling in an ego network: coprofiling attributes and relationships,Proceedings of the 23rd international conference on World wide web, ACM, 2014, 819–830. [15] D. Nguyen, R. Gravel, D. Trieschnigg, T. Meder, ” how old do you think I am?”; a study of language and age in twitter, Proceedings of the SeventhInternational AAAI Conference on Weblogs and Social Media, AAAI Press,2013. [16] M. Pennacchiotti, A.-M. Popescu, A machine learning approach to twitteruser classification, ICWSM 11 ,2011, 281–288. [17] D. Rao, D. Yarowsky, A. Shreevats, M. Gupta, Classifying latent user attributes in twitter,Proceedings of the 2nd international workshop onSearch and mining user-generated contents, ACM, 2010, 37–44. [18] D. Rao, M. J. Paul, C. Fink, D. Yarowsky, T. Oates, G. Coppersmith,Hierarchicalbayesian models for latent attribute detection in social media.ICWSM 11, 2011, 598–601. [19] J. Li, A. Ritter, E. Hovy, Weakly supervised user profile extraction fromtwitter, ACL, Baltimore. [20] F. Al Zamal, W. Liu, D. Ruths, Homophily and latent attribute inference:Inferring latent attributes of twitter users from neighbors.ICWSM,2012. [21] C. A. Davis Jr, G. L. Pappa, D. R. R. de Oliveira, F. de L Arcanjo, Inferringthe location of twitter messages based on user relationships, Transactions in GIS 15 (6),2011, 735–751. [22] S. Bergsma, B. Van Durme, Using conceptual class attributes to characterize social media users.ACL (1), 2013, 710–720. [23] T. Liu, W.-N. Zhang, L. Cao, Y. Zhang, Question popularity analysis andprediction in community question answering services, PloS one 9 (5) ,2014, e85236. [24] J. R. Gusfield, Community: A critical response, (Harper & Row New York,1975. [25] A. Sharma, M. Gemici, D. Cosley, Friends, strangers, and the value of ego networks for recommendation, ICWSM, 2013. [26] T. Liu, W.-N. Zhang, Y. Zhang, Socialrobot: a big data-driven humanoidintelligent system in social media services, Multimedia Systems 1–11. [27] J. Liu, F. Zhang, X. Song, Y.-I. Song, C.-Y. Lin, H.-W. Hon, What’s ina name?: An unsupervised approach to link users across communities, Proceedings of the Sixth ACM International Conference on Web Searchand Data Mining, WSDM ’13, ACM, New York, NY, USA, 2013, 495–504 [28] B. A. Huberman, D. M. Romero, F. Wu, Social networks that matter Twitter under the microscope, arXiv preprint arXiv:0812.1045. [29] S. R. Kairam, D. J. Wang, J. Leskovec, The life and death of online groups:Predicting group growth and longevity,Proceedings of the fifth ACMinternational conference on Web search and data mining, ACM, 2012, 673–682.
  • 8. User Profile Completion with Online Social Circles DOI: 10.9790/0661-1803020915 www.iosrjournals.org 16 | Page [30] Z. Qu, Y. Liu, Interactive group suggesting for twitter, Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics:Human Language Technologies: short papers-Volume 2, Association forComputational Linguistics, 2011, 519–523. [31] J. Leskovec, J. J. Mcauley, Learning to discover social circles in ego networks, Advances in neural information processing systems, 2012, 539–547. [32] H. Qin, T. Liu, Y. Ma, Mining user’s real social circle in microblog, Proceedings of the 2012 International Conference on Advances in SocialNetworks Analysis and Mining (ASONAM 2012), IEEE Computer Society,2012, 348–352. [33] T. Liu, H. Qin, Detecting and tagging users’ social circles in social media, Multimedia Systems, 2014, 1–9. [34] J. Wang, H. Peng, J.-s. Hu, Automatic keyphrases extraction from document using neural network, Advances in Machine Learning and Cybernetics, Springer, 2006, 633–641. [35] Y. HaCohen-Kerner, Z. Gross, A. Masa, Automatic extraction and learning of keyphrases from scientific articles,Computational Linguistics andIntelligent Text Processing, Springer, 2005, 657–669. [36] I. Blank, L. Rokach, G. Shani, Leveraging the citation graph to recommend keywords, Proceedings of the 7th ACM conference on Recommender systems, ACM, 2013, 359–362.