CN113239285A - Processing method, device and processing equipment for social network influence - Google Patents

Processing method, device and processing equipment for social network influence Download PDF

Info

Publication number
CN113239285A
CN113239285A CN202110414260.3A CN202110414260A CN113239285A CN 113239285 A CN113239285 A CN 113239285A CN 202110414260 A CN202110414260 A CN 202110414260A CN 113239285 A CN113239285 A CN 113239285A
Authority
CN
China
Prior art keywords
check
user node
place
influence
record
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202110414260.3A
Other languages
Chinese (zh)
Inventor
李登实
张宇
曾露
梁晓聪
赵兰馨
官端正
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jianghan University
Original Assignee
Jianghan University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jianghan University filed Critical Jianghan University
Priority to CN202110414260.3A priority Critical patent/CN113239285A/en
Publication of CN113239285A publication Critical patent/CN113239285A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/953Querying, e.g. by the use of web search engines
    • G06F16/9536Search customisation based on social or collaborative filtering
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/22Matching criteria, e.g. proximity measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N7/00Computing arrangements based on specific mathematical models
    • G06N7/01Probabilistic graphical models, e.g. probabilistic networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/01Social networking

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Artificial Intelligence (AREA)
  • Business, Economics & Management (AREA)
  • Computing Systems (AREA)
  • Evolutionary Computation (AREA)
  • Mathematical Analysis (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Probability & Statistics with Applications (AREA)
  • Algebra (AREA)
  • Computational Mathematics (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Mathematical Optimization (AREA)
  • Pure & Applied Mathematics (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Mathematical Physics (AREA)
  • Software Systems (AREA)
  • Evolutionary Biology (AREA)
  • Health & Medical Sciences (AREA)
  • Economics (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • Tourism & Hospitality (AREA)
  • General Business, Economics & Management (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application provides a processing method, a processing device and processing equipment for social network influence, which are used for separating the social network influence among users from complex confusion factors from the perspective of user positions to obtain more accurate social network influence among users.

Description

Processing method, device and processing equipment for social network influence
Technical Field
The application relates to the field of social networks, in particular to a method, a device and equipment for processing social network influence.
Background
With the continuous development of internet technology and various large social networks, various data in the social networks are increasingly huge, and the data can obviously serve as data support in the process of managing the social networks.
The influence among users in the social network plays an important role in the research of the social network, and the measurement of the influence of the social network has wide application requirements in social public opinion monitoring, personalized marketing, accurate marketing and other aspects, so the research on the measurement of the influence of the social network among users is highly valued.
In the existing research process of related technologies, the inventor finds that although a large number of related research results exist at home and abroad at present, in these researches, the influence strength of users based on behaviors is mainly determined by the occurrence of the same behaviors between the users, and in practical application, the determination method is unstable, or the existing determination method of social network influence between the users is not high in precision.
Disclosure of Invention
The application provides a processing method, a processing device and processing equipment for social network influence, which are used for separating the social network influence among users from complex confusion factors from the perspective of user positions to obtain more accurate social network influence among users.
In a first aspect, the present application provides a method for processing social network influence, where the method includes:
constructing initial social network data of a target social network, wherein the initial social network data is configured by an undirected graph G (V, E, C), the V is a user node contained in the target social network data, the E is an edge set in the undirected graph G (V, E, C), and the C is a place check-in record of the user node;
location check-in record C for traversing user node uuAnd a place check-in record C for user node vvDetermining that the user node u and the user node v have the same check-in place
Figure BDA00030251330800000229
And based on the place of check-in
Figure BDA00030251330800000228
Determining that the two have a connecting edge;
check-in record at location CuAnd place check-in record CvIn, filtering non-first configuration check-in places
Figure BDA00030251330800000230
The location check-in record;
calculating sign-in location
Figure BDA0003025133080000021
Location popularity of
Figure BDA0003025133080000022
And according to location popularity
Figure BDA0003025133080000023
Determining that user node v is at a check-in location
Figure BDA0003025133080000024
Influence received from friend user node after social influence factor is eliminated
Figure BDA0003025133080000025
Under influence of force
Figure BDA0003025133080000026
On the basis, an e exponential time decay model is introduced, and the influence of the user node u on the user node v is redistributed by combining a softmax function to obtain the influence
Figure BDA0003025133080000027
Sign-in record according to location CuAnd place check-in record CvDetermining the similarity S of user behaviors between the user node u and the user node vu,v
Will influence the force
Figure BDA0003025133080000028
Similarity to user behavior Su,vIs output as the influence of the user node u on the user node v.
With reference to the first aspect of the present application, in a first possible implementation manner of the first aspect of the present application, the check-in location is based on
Figure BDA0003025133080000029
Determining that the two have the connecting edge, including:
if the user node u is at the check-in place
Figure BDA00030251330800000210
Time of attendance
Figure BDA00030251330800000211
Later than or equal to the place of check-in of user node v
Figure BDA00030251330800000212
Time of attendance
Figure BDA00030251330800000213
Determining that no connecting edge exists between the two;
if the user node u is at the check-in place
Figure BDA00030251330800000214
Time of attendance
Figure BDA00030251330800000215
Earlier than user node v is at check-in place
Figure BDA00030251330800000216
Time of attendance
Figure BDA00030251330800000217
It is determined that there is a continuous edge between the two.
With reference to the first aspect of the present application, in the second possible aspect of the present applicationIn an implementation, the location popularity of check-in place c is calculated
Figure BDA00030251330800000218
The method comprises the following steps:
check-in place based on filtering non-first configuration
Figure BDA00030251330800000219
Post-location check-in record CuAnd filtering non-first-configuration check-in places
Figure BDA00030251330800000220
Post-location check-in record CvDetermining a check-in location
Figure BDA00030251330800000221
The ratio of the number of sign-in times of all users in the current time period to the total number of sign-in times is used as the position popularity
Figure BDA00030251330800000222
Location popularity
Figure BDA00030251330800000223
Delta is the time period threshold value and is,
Figure BDA00030251330800000224
representing a check-in place for user node v
Figure BDA00030251330800000225
Time of attendance
Figure BDA00030251330800000226
Check-in time of user node u
Figure BDA00030251330800000227
Early, | | represents the size of the set.
With reference to the first aspect of the present application, in a third possible implementation manner of the first aspect of the present application,based on location popularity
Figure BDA0003025133080000031
Determining that user node v is at a check-in location
Figure BDA0003025133080000032
Influence received from friend user node after social influence factor is eliminated
Figure BDA0003025133080000033
The method comprises the following steps:
the preset adjusting coefficient f is compared with the position popularity
Figure BDA0003025133080000034
As the user node v is at the check-in place
Figure BDA0003025133080000035
Influence received from friend user node after social influence factor is eliminated
Figure BDA0003025133080000036
With reference to the first aspect of the present application, in a fourth possible implementation manner of the first aspect of the present application, the check-in record C is recorded according to a placeuAnd place check-in record CvDetermining the similarity S of user behaviors between the user node u and the user node vu,vThe method comprises the following steps:
sign-in record according to location CuAnd place check-in record CvDetermining behavior similarity S by combining improved Jacard similarity coefficientu,v
Degree of similarity of behaviors
Figure BDA0003025133080000037
Figure BDA00030251330800000316
Check-in place for user node u in arrival
Figure BDA0003025133080000038
Previous location check-in record, |v(cv) Check-in place for user node v in arrival
Figure BDA0003025133080000039
Previous location check-in records.
With reference to the first aspect of the present application, in a fifth possible implementation manner of the first aspect of the present application, an expression of an e-exponential time decay model is:
Figure BDA00030251330800000310
p (v | u) is the current influence of the user node u on the user node v, σ is the attenuation coefficient,
Figure BDA00030251330800000311
between 0 and 1, P' (v | u) represents the influence of user node u on user node v before the time decay.
With reference to the first aspect of the present application, in a sixth possible implementation manner of the first aspect of the present application, the influence is
Figure BDA00030251330800000312
The expression of (a) is:
Figure BDA00030251330800000313
in a second aspect, the present application provides a processing apparatus for social network influence, the apparatus including:
the system comprises a construction unit, a log-in unit and a log-in unit, wherein the construction unit is used for constructing initial social network data of a target social network, the initial social network data is configured by an undirected graph G (V, E, C), the V is a user node contained in the target social network data, the E is an edge set in the undirected graph G (V, E, C), and the C is a place sign-in record of the user node;
a determination unit for traversing the user node uLocation check-in record CuAnd a place check-in record C for user node vvDetermining that the user node u and the user node v have the same check-in place
Figure BDA00030251330800000314
And based on the place of check-in
Figure BDA00030251330800000315
Determining that the two have a connecting edge;
a filtering unit for checking in records C at the placeuAnd place check-in record CvIn, filtering non-first configuration check-in places
Figure BDA0003025133080000041
The location check-in record;
a determination unit for calculating the check-in place
Figure BDA0003025133080000042
Location popularity of
Figure BDA0003025133080000043
And according to location popularity
Figure BDA0003025133080000044
Determining that user node v is at a check-in location
Figure BDA0003025133080000045
Influence received from friend user node after social influence factor is eliminated
Figure BDA0003025133080000046
A redistribution unit for influencing force
Figure BDA0003025133080000047
On the basis, an e exponential time decay model is introduced, and the influence of the user node u on the user node v is redistributed by combining a softmax function to obtain the influence
Figure BDA0003025133080000048
A determination unit for checking in record C according to the locationuAnd place check-in record CvDetermining the similarity S of user behaviors between the user node u and the user node vu,v
An output unit for outputting the influence
Figure BDA0003025133080000049
Similarity to user behavior Su,vIs output as the influence of the user node u on the user node v.
With reference to the second aspect of the present application, in a first possible implementation manner of the second aspect of the present application, the determining unit is specifically configured to:
if the user node u is at the check-in place
Figure BDA00030251330800000410
Time of attendance
Figure BDA00030251330800000411
Later than or equal to the place of check-in of user node v
Figure BDA00030251330800000412
Time of attendance
Figure BDA00030251330800000413
Determining that no connecting edge exists between the two;
if the user node u is at the check-in place
Figure BDA00030251330800000414
Time of attendance
Figure BDA00030251330800000415
Earlier than user node v is at check-in place
Figure BDA00030251330800000416
Time of attendance
Figure BDA00030251330800000417
It is determined that there is a continuous edge between the two.
With reference to the second aspect of the present application, in a second possible implementation manner of the second aspect of the present application, the determining unit is specifically configured to:
check-in place based on filtering non-first configuration
Figure BDA00030251330800000418
Post-location check-in record CuAnd filtering non-first-configuration check-in places
Figure BDA00030251330800000419
Post-location check-in record CvDetermining a check-in location
Figure BDA00030251330800000420
The ratio of the number of sign-in times of all users in the current time period to the total number of sign-in times is used as the position popularity
Figure BDA00030251330800000421
Location popularity
Figure BDA00030251330800000422
Delta is the time period threshold value and is,
Figure BDA00030251330800000423
representing a check-in place for user node v
Figure BDA00030251330800000424
Time of attendance
Figure BDA00030251330800000425
Check-in time of user node u
Figure BDA00030251330800000426
Early, | | represents the size of the set.
With reference to the second aspect of the present application, in a third possible implementation manner of the second aspect of the present application, the determining unit is specifically configured to:
the preset adjusting coefficient f is compared with the position popularity
Figure BDA0003025133080000051
As the user node v is at the check-in place
Figure BDA0003025133080000052
Influence received from friend user node after social influence factor is eliminated
Figure BDA0003025133080000053
With reference to the second aspect of the present application, in a fourth possible implementation manner of the second aspect of the present application, the determining unit is specifically configured to:
sign-in record according to location CuAnd place check-in record CvDetermining behavior similarity S by combining improved Jacard similarity coefficientu,v
Degree of similarity of behaviors
Figure BDA0003025133080000054
Figure BDA0003025133080000055
Check-in place for user node u in arrival
Figure BDA0003025133080000056
Previous location check-in record, |v(cv) Check-in place for user node v in arrival
Figure BDA0003025133080000057
Previous location check-in records.
With reference to the second aspect of the present application, in a fifth possible implementation manner of the second aspect of the present application, an expression of the e-exponential time decay model is:
Figure BDA0003025133080000058
p (v | u) is the current influence of the user node u on the user node v, σ is the attenuation coefficient,
Figure BDA0003025133080000059
between 0 and 1, P' (v | u) represents the influence of user node u on user node v before the time decay.
With reference to the second aspect of the present application, in a sixth possible implementation manner of the second aspect of the present application, the influence is
Figure BDA00030251330800000510
The expression of (a) is:
Figure BDA00030251330800000511
in a third aspect, the present application provides a processing device, including a processor and a memory, where the memory stores a computer program, and the processor executes the method provided in the first aspect of the present application or any one of the possible implementation manners of the first aspect of the present application when calling the computer program in the memory.
In a fourth aspect, the present application provides a computer-readable storage medium storing a plurality of instructions adapted to be loaded by a processor to perform the method provided in the first aspect of the present application or any one of the possible implementations of the first aspect of the present application.
From the above, the present application has the following advantageous effects:
aiming at capturing the influence of the social network among users, the method firstly constructs initial social network data of a target social network in an undirected graph mode, configures a social network mode based on position access in the undirected graph, and determines that a user node u and a user node v have the same check-in place based on a place check-in record
Figure BDA0003025133080000061
And based on the check-in place
Figure BDA0003025133080000062
Determining that the two have the connecting edge, namely after determining that the social network influence exists, filtering the non-first-configuration check-in place in the place check-in record
Figure BDA0003025133080000063
To exclude interference factors of the user's personal habits, and then calculate the check-in location
Figure BDA0003025133080000064
Location popularity of
Figure BDA0003025133080000065
And according to location popularity
Figure BDA0003025133080000066
Determining that user node v is at a check-in location
Figure BDA0003025133080000067
Influence received from friend user node after social influence factor is eliminated
Figure BDA0003025133080000068
Interference factors of social masses are eliminated, an e-exponential time decay model is continuously introduced, influence of the user node u on the user node v is redistributed by combining a soffmax function, and influence is obtained
Figure BDA0003025133080000069
So as to eliminate the interference factor of the user' S own social circle and simultaneously determine the user behavior similarity S between the user node u and the user node v according to the place sign-in recordu,vAt this time, the force will be influenced
Figure BDA00030251330800000610
And the userDegree of behavioral similarity Su,vThe ratio is used as the influence of the user node u on the user node v to be output, so that from the perspective of the user position, the influence of the social network among the users is separated from the complicated confusion factors through a multi-layer interference factor elimination mechanism, the more accurate influence of the social network among the users is obtained, and powerful data support is provided for the management and control of the target social network.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
FIG. 1 is a schematic flow chart illustrating a method for processing social network influence according to the present application;
FIG. 2 is a schematic diagram of a social network influencing power processing apparatus according to the present application;
FIG. 3 is a schematic diagram of a processing apparatus according to the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The terms "first," "second," and the like in the description and in the claims of the present application and in the above-described drawings are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It will be appreciated that the data so used may be interchanged under appropriate circumstances such that the embodiments described herein may be practiced otherwise than as specifically illustrated or described herein. Moreover, the terms "comprises," "comprising," and any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or modules is not necessarily limited to those steps or modules explicitly listed, but may include other steps or modules not expressly listed or inherent to such process, method, article, or apparatus. The naming or numbering of the steps appearing in the present application does not mean that the steps in the method flow have to be executed in the chronological/logical order indicated by the naming or numbering, and the named or numbered process steps may be executed in a modified order depending on the technical purpose to be achieved, as long as the same or similar technical effects are achieved.
The division of the modules presented in this application is a logical division, and in practical applications, there may be another division, for example, multiple modules may be combined or integrated into another system, or some features may be omitted, or not executed, and in addition, the shown or discussed coupling or direct coupling or communication connection between each other may be through some interfaces, and the indirect coupling or communication connection between the modules may be in an electrical or other similar form, which is not limited in this application. The modules or sub-modules described as separate components may or may not be physically separated, may or may not be physical modules, or may be distributed in a plurality of circuit modules, and some or all of the modules may be selected according to actual needs to achieve the purpose of the present disclosure.
Before introducing the social network influence processing method provided by the present application, the background related to the present application is first introduced.
The processing method and device for the social network influence and the computer-readable storage medium can be applied to processing equipment and are used for separating the social network influence among the users from complex confusion factors from the perspective of the positions of the users to obtain more accurate social network influence among the users.
In the processing method for social network influence, an execution subject may be a social network influence device, or a server, a physical host, or a User Equipment (UE) type processing device that integrates the social network influence device. The processing device of the social network influence may be implemented in a hardware or software manner, the UE may specifically be a terminal device such as a smart phone, a tablet computer, a notebook computer, a desktop computer, or a Personal Digital Assistant (PDA), and the processing device may be set in a device cluster manner.
Next, a method for processing social network influence provided by the present application is described.
First, referring to fig. 1, fig. 1 shows a schematic flow chart of a processing method of social network influence in the present application, and the processing method of social network influence in the present application may specifically include the following steps:
step S101, constructing initial social network data of a target social network, wherein the initial social network data is configured by an undirected graph G (V, E, C), the V is a user node contained in the target social network data, the E is an edge set in the undirected graph G (V, E, C), and the C is a place check-in record of the user node;
step S102, traversing the place check-in record C of the user node uuAnd a place check-in record C for user node vvDetermining that the user node u and the user node v have the same check-in place
Figure BDA0003025133080000081
And based on the place of check-in
Figure BDA0003025133080000082
Determining that the two have a connecting edge;
step S103, registering the record C in the placeuAnd place check-in record CvIn, filtering non-first configuration check-in places
Figure BDA0003025133080000083
The location check-in record;
step S104, calculating the check-in place
Figure BDA0003025133080000084
Location popularity of
Figure BDA0003025133080000085
And according to location popularity
Figure BDA0003025133080000086
Determining that user node v is at a check-in location
Figure BDA0003025133080000087
Influence received from friend user node after social influence factor is eliminated
Figure BDA0003025133080000088
Step S105, in the influence
Figure BDA0003025133080000089
On the basis, an e exponential time decay model is introduced, and the influence of the user node u on the user node v is redistributed by combining a softmax function to obtain the influence
Figure BDA00030251330800000810
Step S106, according to the place check-in record CuAnd place check-in record CvDetermining the similarity S of user behaviors between the user node u and the user node vu,v
Step S107, influence force
Figure BDA00030251330800000811
Similarity to user behavior Su,vIs output as the influence of the user node u on the user node v.
As can be seen from the embodiment shown in fig. 1, for capturing the social network influence among users, the application first constructs initial social network data of a target social network in the form of an undirected graph in which a social network form based on location access is configured,determining that user node u and user node v have the same check-in place based on place check-in records
Figure BDA00030251330800000812
And based on the check-in place
Figure BDA00030251330800000813
Determining that the two have the connecting edge, namely after determining that the social network influence exists, filtering the non-first-configuration check-in place in the place check-in record
Figure BDA00030251330800000814
To exclude interference factors of the user's personal habits, and then calculate the check-in location
Figure BDA00030251330800000815
Location popularity of
Figure BDA0003025133080000091
And according to location popularity
Figure BDA0003025133080000092
Determining that user node v is at a check-in location
Figure BDA0003025133080000093
Influence received from friend user node after social influence factor is eliminated
Figure BDA0003025133080000094
Interference factors of social masses are eliminated, an e-exponential time decay model is continuously introduced, influence of the user node u on the user node v is redistributed by combining a softmax function, and influence is obtained
Figure BDA0003025133080000095
So as to eliminate the interference factor of the user' S own social circle and simultaneously determine the user behavior similarity S between the user node u and the user node v according to the place sign-in recordu,vAt this time, the force will be influenced
Figure BDA0003025133080000096
Similarity to user behavior Su,vThe ratio is used as the influence of the user node u on the user node v to be output, so that from the perspective of the user position, the influence of the social network among the users is separated from the complicated confusion factors through a multi-layer interference factor elimination mechanism, the more accurate influence of the social network among the users is obtained, and powerful data support is provided for the management and control of the target social network.
The steps of the embodiment shown in fig. 1 and the possible implementation manner thereof in practical applications are described in detail below.
In the application, the processing device applying the processing method of the social network influence can be specifically a device in a target social network, so that for a manager of the target social network, more accurate social network influence among users can be captured from inside, and as a data support, management work such as more accurate data research, public opinion management and control on the target social network is realized.
Of course, the processing device may also be specifically a device outside the target social network, and capture the influence of the social network among the users outside the network, so as to provide data support for the management work of the target social network.
It is understood that capturing the social network influence among these users is, in practical applications, performed after meeting the privacy requirements of the users or obtaining the confirmation of the users.
The target social network may be any form of social network, such as a social network of a microblog, a post bar, and the like, and may be adjusted according to a defined social network form, where the target social network may be worth a social network constructed by a single social network product, and may also be a social network constructed by different social network products, which is not limited herein.
In the existing mechanism for judging the influence of the social network between users, the influence between two users is mainly judged by the occurrence of the same action between the users, and in many cases, it is found that the influence does not necessarily exist between the users acting at different times and in the same place, and even the situation that the majority of users are not related can occur.
Therefore, the method and the device start from the user position, a multi-layer interference factor elimination mechanism is constructed, so that the social network influence among the users is separated from the complex confusion factors, and the precision of the influence is obviously improved.
Firstly, for a target social network, constructing an undirected graph G (V, E, C) as initial social network data, wherein in the undirected graph G (V, E, C), V is a user node contained in the target social network data, E is an edge set in the undirected graph G (V, E, C), and C is a place check-in record of the user node.
Take user node u as an example, CuThe place check-in record of the user node u may include check-in records of the user node u at different places and different times, and specifically, may be represented as
Figure BDA0003025133080000101
Represents a check-in record for any user u, where i represents the ith check-in record for the user node,
Figure BDA0003025133080000102
representing the ith check-in place for user node u,
Figure BDA0003025133080000103
indicating that user node u is at a check-in place
Figure BDA0003025133080000104
The check-in time of.
The place check-in record can be understood as a reporting record of the location of the place, and can be directly obtained through real-time location data or indirectly obtained through landmarks such as restaurants and the like.
It can be understood that, at this time, the undirected graph G (V, E, C) is in the initial state, and in expectation, in the undirected graph G (V, E, C) in the completed state, if there is social network influence between the user nodes, there is a situation of connecting edges between the user nodes.
Thus, the place check-in record C of the user node u is traversed by the applicationuAnd a place check-in record C for user node vvTo confirm that user node u and user node v have the same check-in place
Figure BDA0003025133080000105
And based on the check-in place
Figure BDA0003025133080000106
And determining that the two have connecting edges, and then capturing subsequent influence.
It can be understood that if the same check-in place exists in the check-in records of the two user nodes
Figure BDA0003025133080000107
The social network influence between the two can be directly identified.
In further studies, it is also believed that this determination may be optimized when the same check-in location exists
Figure BDA0003025133080000108
In case of (2), the check-in time is continued to be combined
Figure BDA0003025133080000109
And the accuracy of the judgment result of the social network influence is improved.
For example, if user node u is at a check-in location
Figure BDA00030251330800001010
Time of attendance
Figure BDA00030251330800001011
Later than or equal to the place of check-in of user node v
Figure BDA00030251330800001012
Time of attendance
Figure BDA00030251330800001013
Determining that no connecting edge exists between the two;
if the user node u is at the check-in place
Figure BDA00030251330800001014
Time of attendance
Figure BDA00030251330800001015
Earlier than user node v is at check-in place
Figure BDA00030251330800001016
Time of attendance
Figure BDA00030251330800001017
It is determined that there is a continuous edge between the two.
When the influence of the user node u on the social network of the user node v is judged, the condition that the user node u needs to arrive at the check-in place earlier than the user node v can be limited
Figure BDA00030251330800001018
In this case, user node u may be at the check-in location
Figure BDA00030251330800001019
Generating social network influence on the user node v, namely:
Figure BDA0003025133080000111
if the two user nodes are signed in at the same place and the sign-in time of the user node u is earlier than that of the user node v, a connecting edge exists, and the user node u has an influence on the user node v based on a certain behavior.
And if the two user nodes check in at the same place, but the check-in time of the user node u is later than the check-in time of the user node v, or the two user nodes do not check in at the same place, no connecting edge exists, and the influence is 0.
After the existence of the connecting edge and the influence are determined, the specific measurement of the influence can be carried out by combining the multilayer interference factor elimination mechanism constructed by the application.
Specifically, the interference factor eliminating mechanism comprises three layers, namely, the interference factor of personal habits of the user, the interference factor of social masses and the interference factor of social circles of the user are respectively eliminated.
In the interference factor elimination mechanism of the personal habits of the user, the application considers that the behavior habits of the user can also cause the place check-in behavior of the user, for example, a certain user is in work in a unit, and the user can frequently perform the place check-in behavior at the place due to the repeated characteristic.
The filtering continues to take the user node u as an example, and the check-in record is recorded according to the location
Figure BDA0003025133080000112
Time of attendance
Figure BDA0003025133080000113
Extracting that the user node u is in the same check-in place
Figure BDA0003025133080000114
The earliest check-in record is recorded, and then the check-in place of the user node u is deleted
Figure BDA0003025133080000115
And the time of sign-in is
Figure BDA0003025133080000116
And then, establishing a check-in record set of the initial place check-in behavior of the user node u according to the check-in records, wherein the check-in record set can be expressed as follows:
Figure BDA0003025133080000117
where n represents the total number of check-in records for user node u.
In the interference factor elimination mechanism of the social public, the social public is different from the influence of the social circle (all first-order friends) of the user, the social public is indirect friends of the user, for example, a new web restaurant at a certain place is popular with the public, is widely commented and shared on the homepage of a website such as 'popular comment' and the like, and is recommended to the user A by the website, and if the user A also checks the card at the restaurant, the user A is indicated to be influenced by the social public.
Interference factors of social masses, and popularity of specific available positions
Figure BDA0003025133080000121
The position popularity H refers to the degree that the position is pursued by the public in the current time period, and the influence brought by the position popularity H is in an inverse relation with the influence factor of the public.
Exemplary, location popularity
Figure BDA0003025133080000122
Based on the ratio of the number of check-in times of all users in the current time period to the total number of check-in times, which can be for check-in place c, the specific expression can be:
location popularity
Figure BDA0003025133080000123
Delta is the time period threshold value and is,
Figure BDA0003025133080000124
representing a check-in place for user node v
Figure BDA0003025133080000125
Time of attendance
Figure BDA0003025133080000126
Check-in time of user node u
Figure BDA0003025133080000127
Early, | | represents the size of the set.
The adopted place check-in record can be specifically the above-mentioned filtering non-first configuration check-in place
Figure BDA0003025133080000128
Post-location check-in record CuAnd filtering non-first-configuration check-in places
Figure BDA0003025133080000129
The post place check-in record Cv
While determining location popularity
Figure BDA00030251330800001210
Later, the popularity of the position can be determined
Figure BDA00030251330800001211
Determining that user node v is at a check-in location
Figure BDA00030251330800001212
Influence received from friend user node after social influence factor is eliminated
Figure BDA00030251330800001213
As already mentioned above, location popularity
Figure BDA00030251330800001214
The brought influence and the public influence factor present an inverse relationship, and in the concrete quantization process, an adjusting coefficient can be introduced to more suitably quantize the brought influence,
the preset adjusting coefficient f is compared with the position popularity
Figure BDA00030251330800001215
As the user node v is at the check-in place
Figure BDA00030251330800001216
Influence received from friend user node after social influence factor is eliminated
Figure BDA00030251330800001217
Can be expressed as:
Figure BDA00030251330800001218
wherein, f is an adjusting parameter,
Figure BDA00030251330800001219
indicating that the same check-in place occurred at user node v
Figure BDA00030251330800001220
And checking in the friend user which is in the active state before.
In the interference factor elimination mechanism of the user's own social circle, the influence received from the friend user node is specifically the influence received after the social influence factor is eliminated from the determined user node v at the check-in place c
Figure BDA00030251330800001221
On the basis, an e exponential time decay model is continuously introduced, influence of the user node u on the user node v is redistributed by combining a softmax function, and the obtained influence
Figure BDA00030251330800001222
According to the application, when a location card punching behavior starts to be popular in a friend circle (direct friends) of A and the behavior also occurs in the last A, the A is considered to be influenced by a social circle which is composed of a plurality of first-order friends of a target user node v, firstly, according to the theory that the influence of the behavior among users is attenuated along with the extension of time intervals, an influence time attenuation model is established, and can be expressed as:
Figure BDA0003025133080000131
p (v | u) is the current influence of the user node u on the user node v, σ is the attenuation coefficient,
Figure BDA0003025133080000132
between 0 and 1, P' (v | u) represents the influence of user node u on user node v before the time decay.
Under an influence time attenuation model, for different influence values of different user nodes in the social circle on the target user node due to different activation time intervals, redistributing the influence of u on v according to the softmax function, and obtaining the influence of the user node u on the user node v after eliminating the interference factors of the social masses
Figure BDA0003025133080000133
Can be expressed as:
Figure BDA0003025133080000134
besides, in addition to considering the three interference factors mentioned above, the present application also considers the influence of the similarity of the user on the phase, and the present application also considers that the influence of the behavior similarity is in an inverse relationship with itself.
The method and the device determine the behavior similarity S by adopting an improved Jacard similarity coefficient on the basis of the place check-in record in consideration of the fact that the behavior similarity changes along with time, the position behavior record of the user is less in the initial stage, the position behavior record of the user is more in the later stage, the calculation results of the behavior similarity before and after the calculation results are different, and the behavior similarity changes along with timeu,vSpecifically, it can be expressed as:
degree of similarity of behaviors
Figure BDA0003025133080000135
Wherein the content of the first and second substances,
Figure BDA0003025133080000136
a check-in record for user node u before reaching check-in location c,
Figure BDA0003025133080000137
lv(cv) A check-in record for a place before user node v arrives at check-in place c,
Figure BDA0003025133080000138
by combining the consideration of the above multi-layer interference factors, the interference factors of the personal habits of the users, the interference factors of the social masses, the interference factors of the social circles of the users and the interference factors of the behavior similarity are eliminated, and the influence can be realized
Figure BDA0003025133080000139
Similarity to user behavior Su,vAs the influence of the user node u on the user node v, the ratio of (d) to (d) can be expressed as:
Figure BDA0003025133080000141
the above is the introduction of the processing method for social network influence provided by the present application, and in order to better implement the processing method for social network influence provided by the present application, the present application also provides a processing device for social network influence.
Referring to fig. 2, fig. 2 is a schematic structural diagram of a processing device for social network influence according to the present application, in which the processing device 200 for social network influence specifically includes the following structure:
the constructing unit 201 is configured to construct initial social network data of a target social network, where the initial social network data is configured by an undirected graph G (V, E, C), V is a user node included in the target social network data, E is an edge set in the undirected graph G (V, E, C), and C is a place check-in record of the user node;
a determining unit 202 for traversing the location check-in record C of the user node uuAnd a place check-in record C for user node vvDetermining that the user node u and the user node v have the same check-in place
Figure BDA0003025133080000142
And based on the place of check-in
Figure BDA0003025133080000143
Determining that the two have a connecting edge;
a filtering unit 203 for checking in records C at a placeuAnd place check-in record CvIn, filtering non-first configuration check-in places
Figure BDA0003025133080000144
The location check-in record;
a determination unit 202 for calculating a check-in place
Figure BDA0003025133080000145
Location popularity of
Figure BDA0003025133080000146
And according to location popularity
Figure BDA0003025133080000147
Determining that user node v is at a check-in location
Figure BDA0003025133080000148
Influence received from friend user node after social influence factor is eliminated
Figure BDA0003025133080000149
A redistribution unit 204 for influencing force
Figure BDA00030251330800001410
On the basis, an e exponential time decay model is introduced, and a softmax function is combined to carry out user node u to user nodeRedistributing the influence of the point v to obtain the influence
Figure BDA00030251330800001411
A determination unit 202 for checking in the record C according to the locationuAnd place check-in record CvDetermining the similarity S of user behaviors between the user node u and the user node vu,v
An output unit 205 for outputting the influence
Figure BDA00030251330800001412
Similarity to user behavior Su,vIs output as the influence of the user node u on the user node v.
In another exemplary implementation manner, the determining unit 202 is specifically configured to:
if the user node u is at the check-in place
Figure BDA00030251330800001413
Time of attendance
Figure BDA00030251330800001414
Later than or equal to the place of check-in of user node v
Figure BDA00030251330800001415
Time of attendance
Figure BDA00030251330800001416
Determining that no connecting edge exists between the two;
if the user node u is at the check-in place
Figure BDA0003025133080000151
Time of attendance
Figure BDA0003025133080000152
Earlier than user node v is at check-in place
Figure BDA0003025133080000153
Is signed inTime
Figure BDA0003025133080000154
It is determined that there is a continuous edge between the two.
In another exemplary implementation manner, the determining unit 202 is specifically configured to:
check-in place based on filtering non-first configuration
Figure BDA0003025133080000155
Post-location check-in record CuAnd filtering non-first-configuration check-in places
Figure BDA0003025133080000156
Post-location check-in record CvDetermining a check-in location
Figure BDA0003025133080000157
The ratio of the number of sign-in times of all users in the current time period to the total number of sign-in times is used as the position popularity
Figure BDA0003025133080000158
Location popularity
Figure BDA0003025133080000159
Delta is the time period threshold value and is,
Figure BDA00030251330800001510
representing a check-in place for user node v
Figure BDA00030251330800001511
Time of attendance
Figure BDA00030251330800001512
Check-in time of user node u
Figure BDA00030251330800001513
Early, | | represents the size of the set.
In another exemplary implementation manner, the determining unit 202 is specifically configured to:
the preset adjusting coefficient f is compared with the position popularity
Figure BDA00030251330800001514
As the user node v is at the check-in place
Figure BDA00030251330800001515
Influence received from friend user node after social influence factor is eliminated
Figure BDA00030251330800001516
In another exemplary implementation manner, the determining unit 202 is specifically configured to:
sign-in record according to location CuAnd place check-in record CvDetermining behavior similarity S by combining improved Jacard similarity coefficientu,v
Degree of similarity of behaviors
Figure BDA00030251330800001517
Figure BDA00030251330800001518
Check-in place for user node u in arrival
Figure BDA00030251330800001519
Previous location check-in record, |v(cv) Check-in place for user node v in arrival
Figure BDA00030251330800001520
Previous location check-in records.
In yet another exemplary implementation, the expression of the e-exponential time decay model is:
Figure BDA00030251330800001521
p (v | u) is the current influence of the user node u on the user node v, σ is the attenuation coefficient,
Figure BDA00030251330800001522
between 0 and 1, P' (v | u) represents the influence of user node u on user node v before the time decay.
In yet another exemplary implementation, the force is influenced
Figure BDA00030251330800001523
The expression of (a) is:
Figure BDA00030251330800001524
the present application further provides a processing device, and referring to fig. 3, fig. 3 shows a schematic structural diagram of the processing device of the present application, specifically, the processing device of the present application may include a processor 301, a memory 302, and an input/output device 303, where the processor 301 is configured to implement, when executing a computer program stored in the memory 302, the steps of the processing method for social network influence in the corresponding embodiment of fig. 1; alternatively, the processor 301 is configured to implement the functions of the units in the corresponding embodiment of fig. 2 when executing the computer program stored in the memory 302, and the memory 302 is configured to store the computer program required by the processor 301 to execute the processing method for social network influence in the corresponding embodiment of fig. 1.
Illustratively, the computer program may be divided into one or more modules/units, which are stored in the memory 302 and executed by the processor 301 to accomplish the present application. One or more modules/units may be a series of computer program instruction segments capable of performing certain functions, the instruction segments being used to describe the execution of a computer program in a computer device.
The processing devices may include, but are not limited to, a processor 301, a memory 302, and an input-output device 303. It will be appreciated by those skilled in the art that the illustration is merely an example of a processing device and does not constitute a limitation of a processing device and may include more or less components than those illustrated, or combine certain components, or different components, for example, the processing device may also include a network access device, bus, etc. through which the processor 301, memory 302, input output device 303, and network access device, etc. are connected.
The Processor 301 may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic, discrete hardware components, etc. The general purpose processor may be a microprocessor or the processor may be any conventional processor or the like, the processor being the control center for the processing device and the various interfaces and lines connecting the various parts of the overall device.
The memory 302 may be used to store computer programs and/or modules, and the processor 301 implements various functions of the computer device by running or executing the computer programs and/or modules stored in the memory 302 and invoking data stored in the memory 302. The memory 302 may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system, an application program required for at least one function, and the like; the storage data area may store data created according to the use of the processing apparatus, and the like. In addition, the memory may include high speed random access memory, and may also include non-volatile memory, such as a hard disk, a memory, a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), at least one magnetic disk storage device, a Flash memory device, or other volatile solid state storage device.
The processor 301, when executing the computer program stored in the memory 302, may specifically implement the following functions:
location check-in record C for traversing user node uuAnd a place check-in record C for user node vvDetermining that the user node u and the user node v have the same check-in place
Figure BDA0003025133080000171
And based on the place of check-in
Figure BDA0003025133080000172
Determining that the two have a connecting edge;
check-in record at location CuAnd place check-in record CvIn, filtering non-first configuration check-in places
Figure BDA0003025133080000173
The location check-in record;
calculating sign-in location
Figure BDA0003025133080000174
Location popularity of
Figure BDA0003025133080000175
And according to location popularity
Figure BDA0003025133080000176
Determining that user node v is at a check-in location
Figure BDA0003025133080000177
Influence received from friend user node after social influence factor is eliminated
Figure BDA0003025133080000178
Under influence of force
Figure BDA0003025133080000179
On the basis, an e exponential time decay model is introduced, and the influence of the user node u on the user node v is redistributed by combining a softmax function to obtain the influence
Figure BDA00030251330800001710
Sign-in record according to location CuAnd place check-in record CvDetermining the similarity S of user behaviors between the user node u and the user node vu,v
Will influence the force
Figure BDA00030251330800001711
Similarity to user behavior Su,vIs output as the influence of the user node u on the user node v.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the processing apparatus and the processing device for social network influence and the corresponding units thereof described above may refer to the description of the processing method for social network influence in the corresponding embodiment shown in fig. 1, and are not described herein again in detail.
It will be understood by those skilled in the art that all or part of the steps of the methods of the above embodiments may be performed by instructions or by associated hardware controlled by the instructions, which may be stored in a computer readable storage medium and loaded and executed by a processor.
For this reason, the present application provides a computer-readable storage medium, where a plurality of instructions are stored, where the instructions can be loaded by a processor to execute steps in the method for processing social network influence in the embodiment corresponding to fig. 1 in the present application, and specific operations may refer to the description of the method for processing social network influence in the embodiment corresponding to fig. 1, which is not repeated herein.
Wherein the computer-readable storage medium may include: read Only Memory (ROM), Random Access Memory (RAM), magnetic or optical disks, and the like.
Because the instructions stored in the computer-readable storage medium may execute the steps in the method for processing social network influence according to the embodiment of the present application corresponding to fig. 1, the beneficial effects that can be achieved by the method for processing social network influence according to the embodiment of the present application corresponding to fig. 1 can be achieved, for details, see the foregoing description, and are not repeated herein.
The social network influence processing method, the social network influence processing device, the social network influence processing apparatus, and the computer-readable storage medium provided by the present application are introduced in detail above, and a specific example is applied in the present application to explain the principles and embodiments of the present application, and the description of the above embodiment is only used to help understanding the method and the core idea of the present application; meanwhile, for those skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.

Claims (10)

1. A method for processing social network influence, the method comprising:
constructing initial social network data of a target social network, wherein the initial social network data is configured by an undirected graph G (V, E, C), V is a user node contained in the target social network data, E is an edge set in the undirected graph G (V, E, C), and C is a place check-in record of the user node;
location check-in record C for traversing user node uuAnd a place check-in record C for user node vvDetermining that the user node u and the user node v have the same check-in place
Figure FDA0003025133070000011
And based on the check-in place
Figure FDA0003025133070000012
Determining that the two have a connecting edge;
check-in record C at the placeuAnd the place check-in record CvIn filtering the check-in place
Figure FDA0003025133070000013
The location check-in record;
calculating the check-in location
Figure FDA0003025133070000014
Location popularity of
Figure FDA0003025133070000015
And according to the position popularity
Figure FDA0003025133070000016
Determining that the user node v is at the check-in place
Figure FDA0003025133070000017
Influence received from friend user node after social influence factor is eliminated
Figure FDA0003025133070000018
Under the influence of
Figure FDA0003025133070000019
On the basis, an e exponential time decay model is introduced, and the influence of the user node u on the user node v is redistributed by combining a softmax function to obtain the influence
Figure FDA00030251330700000110
According to the place check-in record CuAnd the place check-in record CvDetermining the similarity S of the user behaviors between the user node u and the user node vu,v
Will influence the force
Figure FDA00030251330700000111
Similarity to the user behavior Su,vIs used as the influence output of the user node u on the user node v.
2. The method of claim 1, wherein the checking-in based on the check-in location
Figure FDA00030251330700000112
Determining that the two have the connecting edge, including:
if the user node u is at the check-in place
Figure FDA00030251330700000113
Time of attendance
Figure FDA00030251330700000114
Later than or equal to the check-in place of the user node v
Figure FDA00030251330700000115
Time of attendance
Figure FDA00030251330700000116
Determining that the two have no connecting edge;
if the user node u is at the check-in place
Figure FDA00030251330700000117
Time of attendance
Figure FDA00030251330700000118
Earlier than the user node v at the check-in place
Figure FDA00030251330700000119
Time of attendance
Figure FDA00030251330700000120
It is determined that there is a continuous edge between the two.
3. The method of claim 1, wherein calculating the location popularity of the check-in place c
Figure FDA00030251330700000121
The method comprises the following steps:
sign-in place based on filtering non-first configuration
Figure FDA00030251330700000122
The post place check-in record CuAnd filtering the non-first configuration check-in places
Figure FDA00030251330700000123
The post place check-in record CvDetermining the check-in location
Figure FDA00030251330700000124
The ratio of the number of check-in times of all users in the current time period to the total number of check-in times is used as the position popularity
Figure FDA0003025133070000021
The location popularity
Figure FDA0003025133070000022
Delta is the time period threshold value and is,
Figure FDA0003025133070000023
representing said user node v at said check-in place
Figure FDA0003025133070000024
Time of attendance
Figure FDA0003025133070000025
The check-in time of the user node u
Figure FDA0003025133070000026
Early, | | represents the size of the set.
4. The method of claim 1, wherein the popularity is based on the location
Figure FDA0003025133070000027
Determining that the user node v is at the check-in place
Figure FDA0003025133070000028
Influence received from friend user node after social influence factor is eliminated
Figure FDA0003025133070000029
The method comprises the following steps:
the preset adjusting coefficient f is compared with the position popularity
Figure FDA00030251330700000210
As the ratio of said user node v at said check-in location
Figure FDA00030251330700000211
Influence received from friend user node after social influence factor is eliminated
Figure FDA00030251330700000212
5. The method of claim 1, wherein the check-in record C is recorded according to the locationuAnd the place check-in record CvDetermining the similarity S of the user behaviors between the user node u and the user node vu,vThe method comprises the following steps:
according to the place check-in record CuAnd the place check-in record CvDetermining the behavioral similarity S in combination with the improved Jacard similarity factoru,v
The behavioral similarity
Figure FDA00030251330700000213
Figure FDA00030251330700000214
For the user node u to arrive at the check-in place
Figure FDA00030251330700000215
Previous location check-in record, |v(cv) For the user node v arriving at the check-in place
Figure FDA00030251330700000216
Previous location check-in records.
6. The method of claim 1, wherein the e-exponential time decay model is expressed by:
Figure FDA00030251330700000217
p (v | u) is the current influence of the user node u on the user node v, σ is an attenuation coefficient,
Figure FDA00030251330700000218
between 0 and 1, P' (v | u) represents the influence of the user node u on the user node v before the time decay.
7. The method of claim 1, wherein the influencing force is
Figure FDA00030251330700000219
The expression of (a) is:
Figure FDA0003025133070000031
8. an apparatus for processing social network influence, the apparatus comprising:
the system comprises a construction unit, a configuration unit and a processing unit, wherein the construction unit is used for constructing initial social network data of a target social network, the initial social network data is configured by an undirected graph G (V, E, C), V is a user node contained in the target social network data, E is an edge set in the undirected graph G (V, E, C), and C is a place check-in record of the user node;
a determination unit for traversing the location check-in record C of the user node uuAnd a place check-in record C for user node vvDetermining that the user node u and the user node v have the same check-in place
Figure FDA0003025133070000032
And based on the check-in place
Figure FDA0003025133070000033
Determining that the two have a connecting edge;
a filtering unit for checking in records C at the placeuAnd the place check-in record CvIn filtering the check-in place
Figure FDA0003025133070000034
The location check-in record;
the determining unit is further used for calculating the check-in place
Figure FDA0003025133070000035
Location popularity of
Figure FDA0003025133070000036
And according to the position popularity
Figure FDA0003025133070000037
Determining that the user node v is at the check-in place
Figure FDA0003025133070000038
Removing social influence factorsInfluence received by friend user node
Figure FDA0003025133070000039
A redistribution unit for redistributing the influence
Figure FDA00030251330700000310
On the basis, an e exponential time decay model is introduced, and the influence of the user node u on the user node v is redistributed by combining a softmax function to obtain the influence
Figure FDA00030251330700000311
The determining unit is also used for checking in the record C according to the placeuAnd the place check-in record CvDetermining the similarity S of the user behaviors between the user node u and the user node vu,v
An output unit for outputting the influence
Figure FDA00030251330700000312
Similarity to the user behavior Su,vIs used as the influence output of the user node u on the user node v.
9. A processing device comprising a processor and a memory, a computer program being stored in the memory, the processor performing the method according to any of claims 1 to 7 when calling the computer program in the memory.
10. A computer-readable storage medium storing a plurality of instructions adapted to be loaded by a processor to perform the method of any one of claims 1 to 7.
CN202110414260.3A 2021-04-16 2021-04-16 Processing method, device and processing equipment for social network influence Withdrawn CN113239285A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110414260.3A CN113239285A (en) 2021-04-16 2021-04-16 Processing method, device and processing equipment for social network influence

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110414260.3A CN113239285A (en) 2021-04-16 2021-04-16 Processing method, device and processing equipment for social network influence

Publications (1)

Publication Number Publication Date
CN113239285A true CN113239285A (en) 2021-08-10

Family

ID=77128477

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110414260.3A Withdrawn CN113239285A (en) 2021-04-16 2021-04-16 Processing method, device and processing equipment for social network influence

Country Status (1)

Country Link
CN (1) CN113239285A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014195958A1 (en) * 2013-06-03 2014-12-11 Hewlett-Packard Development Company, L.P. Influence score of a social media domain
US20150213022A1 (en) * 2014-01-30 2015-07-30 Linkedin Corporation System and method for identifying trending topics in a social network
CN107123056A (en) * 2017-03-03 2017-09-01 华南理工大学 A kind of location-based social big data information maximization method
CN109213926A (en) * 2018-07-12 2019-01-15 南京邮电大学 A kind of location recommendation method divided based on community with Multi-source Information Fusion
CN111680228A (en) * 2020-06-11 2020-09-18 浙江工商大学 Matrix decomposition interest point recommendation method based on geographic position and fusion of social influence and category popularity
CN113127696A (en) * 2021-03-21 2021-07-16 武汉大学深圳研究院 Method for improving accuracy of influence measurement based on behaviors

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014195958A1 (en) * 2013-06-03 2014-12-11 Hewlett-Packard Development Company, L.P. Influence score of a social media domain
US20150213022A1 (en) * 2014-01-30 2015-07-30 Linkedin Corporation System and method for identifying trending topics in a social network
CN107123056A (en) * 2017-03-03 2017-09-01 华南理工大学 A kind of location-based social big data information maximization method
CN109213926A (en) * 2018-07-12 2019-01-15 南京邮电大学 A kind of location recommendation method divided based on community with Multi-source Information Fusion
CN111680228A (en) * 2020-06-11 2020-09-18 浙江工商大学 Matrix decomposition interest point recommendation method based on geographic position and fusion of social influence and category popularity
CN113127696A (en) * 2021-03-21 2021-07-16 武汉大学深圳研究院 Method for improving accuracy of influence measurement based on behaviors

Similar Documents

Publication Publication Date Title
CN103368917B (en) A kind of risk control method and system of network virtual user
CN107404408B (en) Virtual identity association identification method and device
CN108985954B (en) Method for establishing association relation of each identifier and related equipment
JP2016535369A (en) Provision of application programs and user recommendation information
TW201737072A (en) Application program project evaluation method and system
CN109359263B (en) User behavior feature extraction method and system
EP3345154A1 (en) Method, apparatus and system for detecting fraudulent software promotion
CN108959319B (en) Information pushing method and device
CN108366012B (en) Social relationship establishing method and device and electronic equipment
CN109857943B (en) Permission level determination method and device, computer equipment and readable storage medium
WO2017080454A1 (en) Website access path aggregation method and device
CN108170731A (en) Data processing method, device, computer storage media and server
CN109600344A (en) Identify the method, apparatus and electronic equipment of risk group
CN108989101B (en) Log output system and method and electronic equipment
WO2017101652A1 (en) Method and apparatus for determining an access path between website pages
CN106557282A (en) The method and apparatus of response write request
US20210152576A1 (en) Cluster-based precision mitigation of network attacks
CN113505272B (en) Control method and device based on behavior habit, electronic equipment and storage medium
WO2016165414A1 (en) Method and device for push information
CN110674413B (en) User relationship mining method, device, equipment and storage medium
CN110929141A (en) Group mining method, device, equipment and storage medium
CN103810248A (en) Method and device for searching for interpersonal relationship based on photos
CN113572721B (en) Abnormal access detection method and device, electronic equipment and storage medium
CN107092650B (en) Weblog analysis method and device
CN113239285A (en) Processing method, device and processing equipment for social network influence

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20210810

WW01 Invention patent application withdrawn after publication