Computer Science ›› 2017, Vol. 44 ›› Issue (2): 262-266.doi: 10.11896/j.issn.1002-137X.2017.02.043

Previous Articles     Next Articles

Computing Research of User Similarity Based on Micro-blog

ZHENG Zhi-yun, JIA Chun-yuan, WANG Zhen-fei and LI Dun   

  • Online:2018-11-13 Published:2018-11-13

Abstract: For traditional similarity calculation methods and evaluation criteria have defects that accurately and efficientlymeasuring micro-blog users similar relationship is undesirable,a new method to calculate micro-blog user similarity was proposed. For different attribute data structure,different calculation methods are used,and based on the assignment of property statistics for each property,the method uses AHP to determine the weight of each attribute,finally building an integrated similarity calculation model.Experimental results show that the improved method of calculation to measure user similarity precision increases by 22.6%,recall rate increases by 12.7%,and F1 metric improves 29.5%.

Key words: Micro-blog,User similarity,Attribute weight,Analytic hierarchy process

[1] SHARIFI B.Automatic Microblog Class if Cation and Summarization [D].Colorado Springs:University of Colorado,2010.
[2] LIAO Y,MOSHTAGHI M,HAN B.Mining Micro-Blogs:Opportunities and Challenges[C]∥Proceedings of Social Networks:Computational Aspects and Mining.Springer,2011:1-28.
[3] KAPLAN A M,HAENLEIN M.The Early Bird Catches the News:Nine Things You Should Know about Microblogging [J].Business Horizons,2010,0(10):1-9.
[4] XIE Y G,XU Y.Special Research:Microblog in China [J].Modern Communication (Communication University of China),2011(4):75-80.(in Chinese) 谢耘耕,徐颖.微博的历史、现状与发展趋势[J].现代传播(中国传媒大学学报),2011(4):75-80.
[5] YIN D,HONG L.Structural Link Analysis and Prediction inMicroblogs[C]∥Proceedings of 20th ACM Conference on Information and Knowledge Management (CIKM2011).Glasgow,Scotland,UK,2011(10):24-28.
[6] LI Q Q,GU J F.Activity driven modelling of online social network [J].Journal of Systems Engineering,2015(1):9-15.(in Chinese) 李倩倩,顾基发.用户行为驱动的在线社交网络建模[J].系统工程学报,2015(1):9-15.
[7] ZHANG B,ZHANG Y,GAO K N,et al.Combining Relation and Content Analysis for Social Tagging Recommendation [J].Journal of Software,2012,3(3):476-488.(in Chinese) 张斌,张引,高克宁,等.融合关系与内容分析的社会标签推荐[J].软件学报,2012,23(3):476-488.
[8] KRISHNAMURTHY B,GILL P,ARLITT M.A New Chirps About Twitter[C]∥Proceedings of the1st Workshop on Online Social Networks.2008:19-24.
[9] LU P,ZHANG S S,GAO Q Y.Research on BBV Mode with Limited Node Strength Based on Common Neighbors [J].Computer Science,2014,41(4):49-52.(in Chinese) 逯鹏,张姗姗,高庆一.基于共同邻居的点权有限BBV模型研究[J].计算机科学,2014,41(4):49-52.
[10] QIN H Y.Research on Correlative Techniques of Hot-topicDiscovery About Internet Public Opinion [D].Habin:Harbin Engineering University,2010.(in Chinese) 秦宏宇.网络舆情热点发现相关技术研究[D].哈尔滨:哈尔滨工程大学,2010 .
[11] XU Z M,LI D,LIU T,et al.Measuring Similarity between Microblog Users and Its Application [J].Chinese Journal of Computers,2014,37(1):207-218.(in Chinese) 徐志明,李栋,刘挺,等.微博用户的相似性度量及其应用[J].计算机学报,2014,7(1):207-218.
[12] WU S F,XU J M,WU X B.Similarity Measurement of Micro-blogging Users Merging User Tags and Relationships [J].Journal of Intelligence,2014(12):170-173,126.(in Chinese) 吴树芳,徐建民,武晓波.融合用户标签和关系的微博用户相似性度量[J].情报杂志,2014(12):170-173,6 .
[13] SONG D,HEFLIN J.Domain-independent entity reference inRDF graphs[C]∥Proceedings of the 19th ACM International Conference on Information and Knowledge Management.ACM,2010:1821-1824.
[14] GUO J Y,ZHANG Z B,SUN Q Y.Study and Applications of Analytic Hierarchy Process [J].China S afety Science Journal,2008,18(5):148-153.(in Chinese) 郭金玉,张忠彬,孙庆云.层次分析法的研究与应用 [J].中国安全科学学报,2008,8(5):148-153 .
[15] SONG J F,LI G H.Analysis and Improvement on Evaluation of Information Retrieval Algorithm [J].Journal of Chinese Computer Systems,2003,4(10):1800-1804.(in Chinese) 宋峻峰,李国辉.信息检索算法评价指标的分析与改进 [J].小型微型计算机系统,2003,24(10):1800-1804.

No related articles found!
Full text



[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[2] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[3] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[4] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[5] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[6] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[7] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[8] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[9] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .
[10] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99, 116 .