Community and Important Actors Analysis with Different Keywords in Social Network

被引:0
|
作者
Cahyana, Nanang [1 ]
Munir, Rinaldi [1 ]
机构
[1] Bandung Inst Technol, Sch Elect Engn & Informat, Bandung, Indonesia
来源
2017 3RD INTERNATIONAL CONFERENCE ON SCIENCE IN INFORMATION TECHNOLOGY (ICSITECH) | 2017年
关键词
community detection; centrality; crawling; fuzzy relation; twitter; different keywords; social network;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Twitter has hundreds of millions of users around the world. Using the Twitter as a social network analysis material is very much in demand. Social network analysis can analyze groups and actors of a social network so that it can detect early behaviors that will be performed by groups and actors. But social network analysis in general has not shown strong groups and actors because it uses only one keyword. As a result, this method is quite difficult in detecting early events of a group and actors, especially those associated with cyberterrorist. For that, it needs a method of social network analysis so that the group and the actors produced are really strong and can be detected early behavior that will be done group and actors. The method in question is the use of several different keywords but have the same topic. With this method, it can be obtained a network pattern of groups and powerful actors related to the desired topic so that it can detect earlier behavior that will be done groups and actors. The results obtained are different keywords but have a high value of similarity topics can produce groups and actors are getting stronger. It can increase in the value of graph metric. So this method is feasible to search relationships between different keywords to find the powerfull community and important actor in social network.
引用
收藏
页码:498 / 502
页数:5
相关论文
共 50 条
  • [41] Quantum-Social Network Analysis for Community Detection: A Comprehensive Review
    Muhuri, Samya
    Singh, Shashank Sheshar
    IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2024, 11 (05): : 6795 - 6806
  • [42] Malware detection and classification using community detection and social network analysis
    Reddy, Varshini
    Kolli, Naimisha
    Balakrishnan, N.
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2021, 17 (04) : 333 - 346
  • [43] The Important Role of Motivation and Pleasure Deficits on Social Functioning in Patients With Schizophrenia: A Network Analysis
    Hu, Hui-xin
    Lau, Wilson Y. S.
    Ma, Eugenia P. Y.
    Hung, Karen S. Y.
    Chen, Si-yu
    Cheng, Kin-shing
    Cheung, Eric F. C.
    Lui, Simon S. Y.
    Chan, Raymond C. K.
    SCHIZOPHRENIA BULLETIN, 2022, 48 (04) : 860 - 870
  • [44] Tag-Based User Interest Discovery Though Keywords Extraction in Social Network
    Yang, Ping
    Song, Yan
    Ji, Yang
    BIG DATA COMPUTING AND COMMUNICATIONS, 2015, 9196 : 363 - 372
  • [45] Community Detection in an Integrated Internet of Things and Social Network Architecture
    Misra, Sudip
    Barthwal, Romil
    Obaidat, Mohammad S.
    2012 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2012, : 1647 - 1652
  • [46] Research on Community Characteristics of Multi-source Social Network
    Li M.
    Chen X.
    Yin Y.
    Wang H.
    Wang W.
    Gongcheng Kexue Yu Jishu/Advanced Engineering Sciences, 2017, 49 : 195 - 202
  • [47] An Efficient Genetic Algorithm for Fuzzy Community Detection in Social Network
    Shakya, Harish Kumar
    Singh, Kuldeep
    Biswas, Bhaskar
    ADVANCED INFORMATICS FOR COMPUTING RESEARCH, ICAICR 2017, 2017, 712 : 63 - 72
  • [48] Social community detection and message propagation scheme based on personal willingness in social network
    Gu, Ke
    Wang, Linyu
    Yin, Bo
    SOFT COMPUTING, 2019, 23 (15) : 6267 - 6285
  • [49] Social community detection and message propagation scheme based on personal willingness in social network
    Ke Gu
    Linyu Wang
    Bo Yin
    Soft Computing, 2019, 23 : 6267 - 6285
  • [50] Structural Analysis of IWA Social Network
    Liu, Wenpeng
    Cao, Yanan
    Li, Diying
    Niu, Wenjia
    Tan, Jianlong
    Hu, Yue
    Guo, Li
    APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY, ATIS 2015, 2015, 557 : 141 - 152