• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Social Network Information Propagation Model Based on Individual Behavior

    2017-05-09 01:39:19LejunZhangHongjieLiChunhuiZhaoXiaoyingLei
    China Communications 2017年7期

    Lejun Zhang , Hongjie Li , Chunhui Zhao , Xiaoying Lei *

    1 College of Information Engineering, Yangzhou University, Yangzhou, 225127,China

    2 College of Computer Science and Technology, Harbin Engineering University Harbin 150001,China* The corresponding author, email: xylei@yzu.edu.cn

    I. INTRODUCTION

    Social networking has become the most popular means of information exchange in people’s daily lives. Therefore, information dissemination in social networks has attracted the attention of many researchers. Traditional research mostly focuses on the macroscopic characteristics of the network and less on the traits of individual behavior in social networks.However, there is a significant link between information dissemination in social networks and the behavior of individuals. Because of the complexity of social networks, research and modeling can be difficult in a real network environment and requires establishing an information propagation model in line with the real network characteristics and propagation mechanisms. Building an information dissemination model for social networks based on individual behavior provides the prerequisite and foundation for the future of social network analysis.

    The rapid rise of social media has attracted a large number of researchers to model the behavior of users on social media[1], the users’ forwarding behavior on Twitter[2], their review behavior of pictures on Flickr[3], their interaction behavior on MySpace[4], scholars’cooperative behavior on paper research[5],and users’ behavior when citing research documents. A maximized influence can actually attribute to individual behavior modeling.Anagnostopoulos et al.[2]and Wang et al.[6]proposed methods to quantify the influence of users. Goyal et al.[7]constructed a user behavior model using the user behavior logs of social networks. While national studies of individual behavior based on social networks lag behind those of other countries, tracking and development are more rapid and have produced a series of research results. For instance,Cao Jianxun verified the differences in individual behavior between accessing common sites and accessing porn sites and designed a method of porn site identi fication based on individual behavior[8]. Liu Guohua conducted empirical research on the behavior of mobile phone users when sending text messages and conducted a statistical analysis of users’ behavioral characteristics[9]. Tang Yu analyzed the relationship between online and offline networking and provided metrics and analysis methods based on structures and relationships[10]. Individual behavior models also play an important role in practical applications. Hong Wenxing established a recruitment system for the city of Xiamen by analyzing individual behavior, which is of considerable practical value[11]. Tang Jie built a probability model that models and predicts human behavior by studying internet users, and veri fied its validity with a real data set from social networks[12].From the above-discussed research approaches, we can see achievements in the study of individual behavior; however, an information dissemination model based on individual behavior has not been reported yet. This paper aims to establish an information dissemination model for social networks based on individual behavior.

    In this paper, the authors show a social-network information dissemination model based on individual behaviors and propose a classification and identi fication method for individual behaviors.

    II. INDIVIDUAL BEHAVIOR CLASSIFICATION AND RECOGNITION METHOD

    There are many researches about user behavior in online social networks and information dissemination exists. One of the common methods is extracting user behavior characteristics and use machine learning algorithm to classify and predict user behavior[13]. The features they widely use are the in fluence of user,the intimacy between the users, the interest similarity of user, Weibo content importance,and so forth. In online social network, individuals usually have different behavior, which will influence the information dissemination.For example, an inactive user will not forward the message received. So the behavior of individuals will decide the dissemination direction and span. But most of the existing methods consider that the individual’s behavior in the social network is the same during the process of information dissemination.

    The individuals in social networks play different roles in the information dissemination process. We consider the individual behavior of homogeneous and heterogeneous groups,which is the basis for conducting the individual classi fication. First, we classify individual behavior based on the acts of individuals in the information dissemination process. Then,we extract factors that in fluence individual behavior and quantify the feature value of these factors. Finally, we use machine-learning methods to identify the type of individual.

    2.1 Individual behavior classi fication

    Since every individual has his/her own way of thinking, emotion, and will, individual behavior will have a variety of manifestations. This article classifies the behavior of individuals based on how they performed when receiving and forwarding information in social networks, which directly relates to the dissemination of information. We found that some individuals are accustomed to receiving information, but do not like forwarding information. Some individuals receive and forward information while other individuals do not.Therefore, we divided the test subjects into Spreader, Terminator, and Ignorant based on how they disseminate information.

    1.Spreader: The test subjects accepted information from other individuals in social networks and spread the information to their adjacent individuals; abbreviated as S.

    2.2 Factors affecting individual behavior

    Different individuals have different habits,and the same individual will demonstrate a different behavior depending on the sources of information. In the following, we extract four features from individuals who released information and individuals who received the information and from their relationship. The features can be quanti fied and build the basis for identifying an individual’s behavior and type. The four features are described below.

    2.2.1 Individual in fluence

    Different individuals have different in fluence in social networks, so their impact on the choices and behavior of other individuals vary.To study the influence of an individual who has published information on the sharing behavior of other individuals, the paper analyzes the characteristics associated with the individual’s in fluence, such as professional authority and popularity. However, these features are qualitative and difficult to quantify. Therefore,this paper presents an index to measure an individual’s in fluence that is easy to quantify and is a generalization of the features described above.

    Since this article is about an individual’s performance in the dissemination of information, we characterize the individual by his/her ability to influence other individuals to disseminate information in the network. The more information is shared, the greater the individual’s influence. The average time an information is shared can be used as indicator to measure the individual’s in fluence. In addition, the individual’s position in the network is directly related to the individual’s in fluence.This is mainly re flected by the degree of network topology. Studies have shown that the number of Twitter fans indirectly reflects the user’s in fluence[14]. The higher the number, the more users can directly see the information published by him/her. The more users see the information, the more likely it is that the information is forwarded. The more often the information is forwarded, the quicker it spreads to a larger audience.

    In this paper, we estimate an individual’s influence by determining the average probability that his/her information is shared. This is calculated by the ratio of the average share time and the average number of individuals who obtain the information. The number of individuals who receive the information is obtained by traversing the whole spread tree and is not easy to obtain. Therefore, in this article,we approximate this number by the number of fans. It is worth noting that the in fluence of the most in fluential individual may be overestimated due to this approximation because the number of fans may be far less than the number of individuals who received information.To reduce this effect, we added an exponential according to reference [1]. Through a thorough analysis, we set the value to 1/3.

    2.2.2 Forwarding preference

    To extract the features that in fluence an individual to receive or forward information, we need to consider the individual’s forwarding preferences. Some individuals prefer forwarding behavior, like sharing information with friends. Other individuals just like to read information or express their feelings and views,but do not like to forward information. We use the forwarding preference of individuals to characterize the forwarding possibility when receiving information. Whether an individual chooses to forward information depends on his/her habits, personality, and preferences. We can identify a pattern in an individual’s behavior from historical records of his/her behavior.If the historical data reveals that the individual frequently forwarded information, it indicates a high degree of individual forwarding preferences.

    In this paper, we express an individual’s forwarding preference by the ratio of his/her average daily forwarding amount and the average daily release amount. To reflect the individual’s recent dynamics, we consider the amount of his/her forwarding and releasing activities in the past month. Because an individual’s behavior varies over time, the individual’s preferences or behavior may change.Selecting the individual’s behavior in the past month can re flect the current status of the individual.

    2.2.3 Individual activity

    Not all registered users in a social network are active users. There are also non-active users and zombie users. The amount of time an individual spends online can re flect the activity of the individual to a certain extent because the individual’s activity is directly related to the ability of receiving information. Obviously, if the individual has not been online for a while,he/she is not able to receive, read, or forward information.

    We focus on an individual’s activity to characterize his/her ability to receive information. An individual’s activity can also change over time because the individual may no longer be curious about or interested in the social networking site, and therefore his/her activity will naturally drop. We use the individual’s online time within the past week (7 days) to quantify the individual’s activity as follows.

    We divide one day into eight periods: 0:00-3:00 marks the first period, 3:00-6:00 marks the second period, 6:00-9:00 marks the third period, 9:00-12:00 marks the fourth period,12:00-15:00 marks the fifth period, 15:00-18:00 marks the sixth period, 18:00~21:00 marks the seventh period, and 21:00~24:00 marks the eighth period.

    Suppose

    Definition 3: Assume that individualube expressed as:

    2.2.4 Forwarding intimacy

    Because every individual has his/her own feelings and way of thinking, an individual’s acceptance of information from different individuals differs. Just as in real life, where relationships between people can be close, alienated, important, or unimportant, the users of social networks can have strong or weak ties.People tend to be more concerned with close relationships. In social networks, individuals are more likely to share information coming from users with whom they have a close relationship. If in the past individualufrequently forwarded information that was released by individualv, then he/she is more likely to forward information from individualvin the future.

    We use forwarding intimacy to characterize an individual’s preference for the information source. We can determine an individual’s intimacy from his/her historical records. The more information individualuforwarded that he/she had received from individualv, the higher the forwarding intimacy between individualuand individualv. To take the characteristics of an individual’s change of behavior over time into account, we consider the interaction record between the two individuals from the last month.

    2.3 Individual behavior recognition method

    The accumulation of real-time individual behavior logs in social networks makes the research on individual behavior models more convenient and effective. An individual’s past behavior reflects his/her behavior pattern to a certain extent. Based on the characteristics of the individual’s past behavior, we can predict his/her behavior and decisions. Based on their information dissemination behavior, we divided the test subjects into three categories:Spreader, Terminator, and Ignorant. Therefore,the task of identifying an individual’s behavior is mapped into the task of classifying the individual’s behavior characteristics.

    Details of the individual classi fication process are as follows:

    III. INFORMATION PROPAGATION MODEL BASED ON INDIVIDUAL BEHAVIOR

    The classi fication and identi fication method of an individual’s behavior lays the foundation for constructing an information transmission model. Figure 1 shows the flow chart of the model construction.

    3.1 Random time generation method

    Previous studies have shown that the time delay in information dissemination has a significant impact on the scale and speed of information dissemination [15, 16]. However,the traditional information dissemination model does not take into account the time delay of the information dissemination process, or it cannot reproduce the process reliably. Therefore, this paper proposes a method for generating a random time to simulate an individual’s behavior when receiving information with a delay.

    Individuals cannot immediately receive information when it is released because they are not likely to remain online at any time.We call the time that passes between releasing of information and the individual reading the information the receiving delay. Because the behavior of the individual receiving the information is random, it is impossible to determine the exact receiving delay. Although the receiving delay is random, it has certain stability in general. It can count the frequency of the individual’s activities in each period according to the behavior of the individual on social networking sites. We then simulate the individual’s receiving delay behavior based on the statistical results. We introduce our simulation method of an individual’s receiving delay in detail below, which is the method for generating a random time.

    We obtain the individual’s frequencies of activity for the respective periods, where a period is divided into 24 hours and represented researchers found that 75% of the information was forwarded in the first twenty-four hours after its release on Twitter, and this proportion has increased year by year. This means that the vast majority of the forwarding behavior occurs within twenty-four hours after the release of the information. To keep our method simple, we assume that the individual’s reading and forwarding behavior occurs in the first twenty-four hours after the information is pushed to the individual’s home page.

    Our random time generation steps are as follows:

    Fig. 1 Flow chart of model construction

    (2)Randomly generate a number i between 1 and 100 and take out the element arr [i].

    (3)Determine the random interval

    The unit of time used is minutes; it has some randomness to it but is consistent with the individual’s activity frequency, which we

    3.2 Information visibility prediction method

    An individual receives a lot of information every day, but his/her energy is limited, and the individual will miss reading some of the information since he/she cannot pay attention to all of this information all the time. The traditional information dissemination model is based on the assumption that information will be seen and read when it is pushed to the individual’s home page. This is not the case, because the visibility of information has an important influence on the scale and speed of information dissemination. In this paper, we propose an information visibility prediction method, which makes the design of the information dissemination model more appropriate to the actual process of information dissemination. The design of the information visibility prediction method is given below.

    3.3 Information dissemination model based on individual behavior

    The method we introduced above lays the foundation for an information dissemination model based on individual behavior. We describe the model’s design and algorithm below.

    To facilitate the description, we consider four properties (<>,<>,<Type>,<Status>)for each individual. Propertyrefers to the total delay from the beginning of the information release to the reading time of the upper level individual that directly forwarded the information to him/her. Propertyrefers to the delay from the time when the upper level individual forwarded the information to the time that the individual read the information.The sum ofandis the total delay of the individual from the beginning of the information release, and it is used as propertyfor the next level individual. Type refers to the type of the individual that we de fined as Spreader(S), Terminator (T), or Ignorant (I) in Section 2.1. Status refers to the state of the individual.We distinguish between two states: known and unknown. State “known” means that the individual has read the information. State “unknown” means that the individual did not see the information.

    Figure 2 is a schematic diagram of information dissemination, whereis the individual who released the information,is of the Terminator (T) type who reads the information(i.e., the state of the individual is known) but does not forward it,is of the Ignorant (I)type who does not see the information (i.e.,the individual is in the unknown state) and does not transfer the information, andis the of Spreader (S) type who sees the information and forwards it. As can be seen in the figure,it can get the scale of information dissemination as long as the individuals who are in the known state are counted.

    (1) At the initial moment, the information is not released, all individuals in the network do not know the information, the state of all individuals is unknown, K is the individual set of individuals in the known state who read the information and is empty, R is the set of individuals who forwarded the information and is empty, and set A is empty.

    (2) One individual in the network (whom we call the release individual) has released a new message. The release individual’s attributes at the moment when he/she released the information (i.e., at the initial moment of information dissemination) are (0, 0, S, known),so the values ofandare 0 and the release individual wants to spread the information and is of type S. Because the release individual must have read the information, his/her state is known. We can calculate the in fluence of the release of the individual when determining the release individual.

    (3) The information will be pushed to all the fans of the individual after the information is released or forwarded, then all the fans of the individual can be added to the set A.

    Fig. 2 Schematic diagram of information transmission

    (5) After the random delay time, the individualjvisits his/her home page, but does not necessarily read the information released by the release individual. We can predict the probability that individualjsees the information according to the information visibility prediction method introduced in Section 3.2.The probability that individualjwill read this information is, which is calculated using the formula described in Step 6.

    (6) Calculate the characteristic value of the individual which includes the forwarding preference, individual activity, forwarding intimacy to the upper individual, and the individual type determined by the individual identification method introduced in Section 3.1.

    (7) If individualjwho read this message is an S-type individual, add him/her to sets K and R, and go back to step 3. If individualjwho read this message is a T-type individual,add him/her to set K, and continue to the next step. If individualjwho read this message is an I-type individual, continue to step (8).

    (8) When the collection A is empty, the calculation ends.

    3.4 Result evaluation method of information dissemination

    The information dissemination model designed in this paper can be used to predict the scale of information dissemination and the time of propagation. Since the results cannot be the same as the real results, it is effective as long as the prediction results are in a reasonable range, and the difference between the predicted results and the real results can be explained.

    We found that the forwarding scale follows the power-law distribution from existing research results[18]:

    Equation (10) is equivalent to (11):

    In order to better evaluate the prediction results, the accuracy of the prediction is used as the evaluation index of the prediction results.The prediction accuracy is de fined as the ratio of the correct number to the total number of predictions:

    The evaluation method is cited by other articles many times. In order to facilitate comparison we use formula (12) as evaluation method.

    IV. RESULT AND DISCUSSION

    4.1 Data description

    Sina Weibo is the country’s largest domestic micro-blogging site. It has many registered and online users, and has become the most common means of spreading information. Its excellent social networking features and information dissemination capabilities are very relevant for our research, and it is the ideal platform for data collection.

    Sina Weibo contains an enormous amount of data and is the ideal platform for social network analysis and data mining research,but its open platform limits the external API interface used to access the data. The complete information cannot be accessed through the API interface only, and, therefore, the APIs do not meet the demand for this study. Although Sina Weibo makes some of the data sets publicly available, these data sets contain either only user data or only some of the micro blog content data. The user data and content data do not correspond, and we cannot obtain the complete dissemination routes and user relationship topologies. Therefore, we use crawler technology to imitate the client operations and collect the data from the hard disk.

    We use a breadth- first strategy to extract the data. We first select a user as seed node and then get the user’s fans and a list of fans. Next,we obtain the attentions and Weibo messages of each node from October 1, 2014 to March 1, 2015. Finally, we clean up the data, which results in 20853 remaining users and 846573 pieces of Weibo information.

    4.2 Information dissemination prediction

    Because the scale of information dissemination cannot be easily determined, the information dissemination model constructed in this paper cannot assess the scale of information dissemination. However, we can obtain the forwarding scale from the data set and we can use the information dissemination model proposed in this paper to predict the accuracy of the forwarding scale. We randomly sampled 1000 users from the data set, filtered out those users with less than 10 original messages, and predicted the forwarding size for each user.Figure 3 shows the accuracy of prediction for each user.

    As can be seen in Figure 3, the prediction accuracy of the information dissemination model proposed in this paper lies in the range of 0.8-0.9 and has a good accuracy. It also indirectly proves the rationality and validity of the information dissemination model constructed from the aspects of individual behavior.

    Figure 3 also shows that while the prediction of the forwarding scale is accurate in general, some individuals’ predictions are not ideal. We analyzed the outliers whose accuracy is low and found that these nodes share common features: (1) the number of fans is small (2) the number of messages released recently is low,and (3) the level of activity is low.

    We analyzed the common features of the outliers and found that the impact of fewer fans will lead to a greater impact, the activity is low because they have fewer recent release messages and therefore less information of the individual is exposed and we cannot fully extract the behavior characteristics of the individual. However, the prediction accuracy of the information forwarding scale equals the average of all messages of the individual and therefore the prediction result is not sufficiently stable.

    Some researchers used machine learning algorithm to classify and predict user behavior,such as Support Vector Machine (SVM)[13]and Extreme Learning Machine (ELM)[19]. The features they widely use are the influence of user, the intimacy between the users, the interest similarity of user; We compared our work with them in Table 1.

    Fig. 3 Forwarding scale prediction accuracy

    We discussed the prediction of the scale of information dissemination above. The infor-mation dissemination model proposed in this paper can also provide us a time prediction of information dissemination. To better describe the propagation time information, we propose an indicator as de fined below:

    De finition 4: Assume that the number of pressed as:

    As can be seen in Figure 4, the difference of most of the predicted values and true values is not large, indicating that the information propagation time prediction and the actual situation is similar. The information propagation model proposed in this paper can effectively predict the information propagation time. However,Figure 4 also shows that there are several differences between the predictive value and the real value. Through repeated analysis, we conclude that the individuals, whose propagation time predictions are not sufficiently accurate,have a common feature their number of fans is small. The relationship between the number of individual fans and the prediction accuracy of the propagation time is analyzed below.

    Before calculating individual time prediction accuracy of information dissemination,we must first establish a method to judge the prediction accuracy. We de fine that the prediction is correct as long as Formula (14) is met.

    Based on the statistics, the accuracy of the individual corresponding to the number of different fans, the relationship between the number of fans, and the time of propagation prediction are established as shown in Figure 5. As can be seen in Figure 5, when the number of fans of an individual is small, the rate of time prediction accuracy of information dissemination is low. When the number of fans increases, the prediction accuracy also gradually increases. When the number of fans reached a certain size, the prediction results have a stable accuracy. The generated random time is highly random, and this is particularly evident when the number of fans is small.However, with an increasing number of fans,the original contingency exhibits a certain degree of inevitability and reduces the predicted distortion due to the large sample.

    4.3 In fluence of individual type distribution on information transmission

    In the network, different individuals play different roles in the process of information transmission. Therefore, this paper classifies the individual and constructs the information dissemination model based on the individual’s behavior. If the proportion of various individ-uals in the network is different, what is the impact on the scale and speed of information dissemination?

    Table I Comparison experiment table

    Fig. 4 Information propagation time prediction

    We re-predict the spread scale of information by modifying the distribution of the individual types of proportion. First, we reduce the number of type-S individuals, and then we increase the number of type-S individuals.These two situations of individual type distributions are shown in Table 2.

    In Table 1, the default row corresponds to the distribution proportion of the individual’s type under normal conditions. For the Type1 row, we take the default row and replace half of type-S individuals by type T. For the Type2 row, we take the default row and randomly replace some of the type-T individuals by type S, so that the proportion of type-S individuals is 2%. These cases are predicted and we obtain a variety of information dissemination scales. The prediction results of the information dissemination scales are shown in Figure 6, where the x-axis represents the propagation time of the information, the y-axis represents the proportion of the information that is received by the individual, and each line corresponds to one of the three cases shown in Table 1.

    By analyzing the in fluence of different individual behaviors on the information dissemination of social networks, we found that when different proportions of individuals are used,the influence on the information dissemination process and the results are also different.From the experimental results we can clearly conclude that the more type-S individuals we have i.e., the more individuals who are willing to accept information and spread it the greater and faster the spread of information.

    4.4 Eff ect of forwarding delay on information transmission

    The information dissemination model proposed in this paper considers the impact of forwarding delay on the process of information dissemination and is more appropriate to the true communication process. The necessity and effectiveness of the forwarding delay is verified based on real data sets. The random times when individuals receive information is reduced by half. We use this model to predict the transmission of information and compare the results of the forecast and the original pre-diction results in Figure 7. The “default” line shows the normal delay in the case of information dissemination of the results and the “modify” line shows the case where the propagation delay time has been changed.

    Table II Distribution proportion of individuals

    Fig. 5 Relationship between individual fans account and the propagation time prediction accuracy

    Fig. 6 Effect of individual type change on the spread scale

    As can be seen in Figure 7, the forwarding delay will not only affect the speed of information propagation, but will also affect the scale of information dissemination. It is consistent with the view mentioned in the literature [17], i.e., the closer the time when the individual sees the information is to the release time of the information, the greater the probability that the information is forwarded.This is consistent with the observed individual forwarding behavior, i.e., people like to forward the latest news.

    4.5 Eff ect of information visibility on information dissemination

    Individuals may not see all the information,because their attention and concern is limited,and they receive a lot of information every day. Information that is not looked at is naturally not known and cannot be forwarded. This means that the visibility of the information directly affects the spread of the information.We conducted the following experiments to verify the results.

    To verify that changes in information visibility affect the outcome of information propagation, we conducted an experiment where we reduced information visibility by half and re-predicted the results of information dissemination. Figure 8 compares the prediction results with the original predictions. The “default” line shows the results for the original information visibility, and the “alter” line shows the results for the modi fied visibility.

    As can be seen in Figure 8, decreasing the information visibility reduces the speed and size of information dissemination. This is consistent with people’s perception that the more people see the information, the more likely that they will pay attention and forward that information. It also con firms the necessity and rationality of considering the visibility of the information when constructing an information dissemination model.

    V. CONCLUSION

    Fig. 7 Effect of forwarding delay on the process of information transmission

    Fig. 8 Effect of the spread of information visibility

    The main contributions of this paper are as follows: (1) constructing a social-network information dissemination model based on individual behavior, (2) proposing a classi fication and identification method for individual behavior, (3) illustrating the dissemination of information when constructing the model, and(4) presenting a model that not only predicts the scale of information dissemination, but also the propagation time. For the dissemination of information, we presented a method for generating a random time to simulate the delay in propagating the information and raising the information visibility in the prediction method.

    This paper provides a new perspective on the importance of individual behavior on the dissemination of information. The random time generation method simulates the delay characteristics of the information dissemination process. This allows us to predict the propagation time and to bring the scale prediction of information dissemination closer to the actual situation. The method of forecasting the information visibility can predict the likelihood that the individual will see the information, describe the propagation of information more accurately, and improve the forecast accuracy of the information dissemination time and scale. The model is based on the classi fication and identi fication of individual behavior and takes into account the delay characteristics of information dissemination. Combined with the information visibility prediction method,we can predict the scale and velocity of information propagation quite accurately. Although the proposed information propagation model provides several achievements, it can still be improved. We plan to conduct further research and will use complex text analysis techniques,such as sentiment analysis, to build a more detailed information dissemination model.

    ACKNOWLEGEMENTS

    The authors would like to thank the reviewers for their detailed reviews and constructive comments, which have helped improve the quality of this paper. This work is sponsored by the National Natural Science Foundation of China under grant number No. 61100008;the Natural Science Foundation of Heilongjiang Province of China under Grant No.LC2016024.

    [1] Macskassy SA, Michelson M. “Why Do People Retweet? Anti-Homophily Wins the Day!”Proc.5th Int. AAAI Conf. on Weblogs and Social Media, pp 209—216, 2011.

    [2] Anagnostopoulos A, Kumar R, Mahdian M. “Influence and correlation in social networks”ACM SIGKDD International Conference on KnowledgeDiscovery and Data Mining, pp 7-15, 2008.

    [3] De Choudhury M, Sundaram H, John A, et al.“Contextual Prediction of Communication Flow in Social Networks”.IEEE/WIC/ACM International Conference on Web Intelligence.pp 57-65,2007.

    [4] Sun Y, Barber R, Gupta M, et al. “Co-author Relationship Prediction in Heterogeneous Bibliographic Networks”2011 International Conference on Advances in Social Networks Analysis and Mining, pp 121-128, 2011.

    [5] Sun Y, Han J, Aggarwal CC, et al. “When Will It Happen? Relationship Prediction in Heterogeneous Information Networks”Proceedings of the fifth ACM international conference on Web search and data mining. pp 663-672, 2012.

    [6] Tang J, Sun J, Wang C, et al. “Social Influence Analysis in Large-Scale Networks”.ACM SIGKDD Conference on Knowledge Discovery & Data Mining. pp 807—816, 2009.

    [7] Goyal A, Bonchi F, Lakshmanan LVS. “Learning In fluence Probabilities in Social Networks”.Third ACM International Conference on Web Search &Data Mining.pp 241—250, 2010.

    [8] Cao J, Liu J, et al. “The Identification of Porn Website based on User Behavior”.Computer Research and Development, vol. 50, no. 2, pp 430-436, 2013.

    [9] Liu G, Xie C, et al. “Social Network Behavior Analysis Based on SMS”.Computer Applications and Software, vol. 28, no. 6, pp 220-224, 2011

    [10] Tang Y, He M, et al. “Analysis of Embedded Network Structure based on User Preference”.Journal of Electronics, vol. 40, no. 7, pp 1339-1344,2012

    [11] Hong W, Li L, Li T, et al. “iHR: An Online Recruiting System for Xiamen Talent Service Center”.Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining, pp 1177-1185, 2013.

    [12] Tang J, Wu S, Sun J. “Confluence: conformity in fluence in large social networks”ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.pp 347-355, 2013.

    [13] Mogadala A, Varma V. “Twitter user behavior understanding with mood transition prediction”.Proceedings of the Workshop on Data Driven User Behavioral Modelling & Mining from Social Media, vol. 286, no. 4, pp 31-34, 2012

    [14] Cheung CMK, Chiu PY, Lee MKO. “Online Social Networks: Why Do Students Use Facebook?”.Computers in Human Behavior, vol. 27, no. 4,pp1337-1343, 2011

    [15] Zhang W, Wang L, Dai J, et al. “The Study of Information Dissemination Behavior in Online Social Network with Propagation Delay”.Journal of Scienti fic Research & Reports, vol. 3, no. 19,pp 2486-2500, 2014.

    [16] Yan Q, Wu L, Liu C, et al. “Information Propagation in Online Social Network Based on Human Dynamics”.Abstract & Applied Analysis, vol.Special Issue, no. 2, pp 173-186, 2013

    [17] Zhao H, Liu G, Shi C, et al. “A Retweet Number Prediction Model Based on Followers’ Retweet Intention and In fluence”Data Mining Workshop(ICDMW), 2014 IEEE International Conference on IEEE, pp 952-959, 2014:.

    [18] Huberman BA, Plt P, Pitkow JE, et al. “Strong Regularities in World Wide Web Surfing”.Science, vol. 280, no. 5360,pp 95-97, 1997

    [19] Liu H, Li Y. “Weibo Information Propagation Dissemination Based on User Behavior Using ELM”.Mathematical Problems in Engineering, pp 1-11,2015.

    中文字幕高清在线视频| 视频区欧美日本亚洲| 欧美精品一区二区大全| 首页视频小说图片口味搜索| 91老司机精品| 国产精品国产三级国产专区5o| 国产淫语在线视频| 日韩,欧美,国产一区二区三区| 一级,二级,三级黄色视频| 热99re8久久精品国产| 国产精品一区二区免费欧美 | 叶爱在线成人免费视频播放| 日本wwww免费看| 国产成人av激情在线播放| 国产精品免费视频内射| 一区福利在线观看| 男女边摸边吃奶| 中文精品一卡2卡3卡4更新| 丰满少妇做爰视频| 国产在线观看jvid| 天天操日日干夜夜撸| 一本—道久久a久久精品蜜桃钙片| 午夜日韩欧美国产| 免费黄频网站在线观看国产| 国产免费福利视频在线观看| www.精华液| 国产精品熟女久久久久浪| 国产亚洲精品第一综合不卡| 天堂中文最新版在线下载| 国产成人免费观看mmmm| 高清欧美精品videossex| 久久久久久久大尺度免费视频| 久久av网站| 18在线观看网站| 亚洲第一欧美日韩一区二区三区 | 亚洲国产精品成人久久小说| 久久亚洲精品不卡| 欧美在线一区亚洲| 日本猛色少妇xxxxx猛交久久| 老司机亚洲免费影院| 91成人精品电影| 精品久久久久久久毛片微露脸 | 久久人人爽人人片av| 精品人妻在线不人妻| 99国产精品一区二区蜜桃av | 黄色片一级片一级黄色片| 啦啦啦在线免费观看视频4| 国产精品熟女久久久久浪| 国产无遮挡羞羞视频在线观看| 国产精品麻豆人妻色哟哟久久| 久久精品aⅴ一区二区三区四区| 69av精品久久久久久 | 国产老妇伦熟女老妇高清| 国产成人系列免费观看| 母亲3免费完整高清在线观看| 中文字幕色久视频| 亚洲va日本ⅴa欧美va伊人久久 | 一进一出抽搐动态| 无限看片的www在线观看| 日本91视频免费播放| 免费高清在线观看日韩| 国产男人的电影天堂91| 亚洲一区中文字幕在线| 久热这里只有精品99| 纵有疾风起免费观看全集完整版| 久久ye,这里只有精品| 一边摸一边做爽爽视频免费| 一本一本久久a久久精品综合妖精| 麻豆av在线久日| 男女高潮啪啪啪动态图| 激情视频va一区二区三区| 一本一本久久a久久精品综合妖精| 国产色视频综合| 日本av手机在线免费观看| 美女视频免费永久观看网站| 黑丝袜美女国产一区| 日本撒尿小便嘘嘘汇集6| 伦理电影免费视频| 国产成人欧美| 大陆偷拍与自拍| 免费不卡黄色视频| 手机成人av网站| 成年动漫av网址| 99国产精品一区二区蜜桃av | 久久久久视频综合| 久久国产精品影院| 久久中文看片网| 久久性视频一级片| 午夜91福利影院| 免费黄频网站在线观看国产| 电影成人av| 男女高潮啪啪啪动态图| 亚洲国产成人一精品久久久| 性色av乱码一区二区三区2| 99久久精品国产亚洲精品| 午夜91福利影院| 无遮挡黄片免费观看| 亚洲精品中文字幕一二三四区 | 一边摸一边抽搐一进一出视频| 久久精品熟女亚洲av麻豆精品| a级毛片在线看网站| 一本色道久久久久久精品综合| 91大片在线观看| 亚洲国产欧美网| 咕卡用的链子| 国产av一区二区精品久久| 久久免费观看电影| 久久热在线av| 十八禁高潮呻吟视频| 91成年电影在线观看| 99久久国产精品久久久| 欧美国产精品va在线观看不卡| 亚洲国产看品久久| 一区在线观看完整版| 啦啦啦在线免费观看视频4| 国产精品影院久久| 亚洲九九香蕉| 伦理电影免费视频| 乱人伦中国视频| 中文字幕另类日韩欧美亚洲嫩草| av一本久久久久| 动漫黄色视频在线观看| 美女脱内裤让男人舔精品视频| 777米奇影视久久| 一级a爱视频在线免费观看| 人人妻人人爽人人添夜夜欢视频| 亚洲人成电影免费在线| 亚洲午夜精品一区,二区,三区| 两个人免费观看高清视频| 在线观看免费日韩欧美大片| 天天躁日日躁夜夜躁夜夜| 男女无遮挡免费网站观看| 亚洲精品日韩在线中文字幕| 国产成人精品久久二区二区免费| 欧美黑人精品巨大| 国产国语露脸激情在线看| 搡老熟女国产l中国老女人| 精品一区二区三卡| 亚洲一卡2卡3卡4卡5卡精品中文| 精品卡一卡二卡四卡免费| 欧美av亚洲av综合av国产av| 国产精品偷伦视频观看了| 一级毛片精品| 欧美黑人精品巨大| 热99re8久久精品国产| 免费在线观看视频国产中文字幕亚洲 | 亚洲性夜色夜夜综合| 大码成人一级视频| 韩国高清视频一区二区三区| 大香蕉久久网| 男女高潮啪啪啪动态图| 国产野战对白在线观看| 电影成人av| 日本av手机在线免费观看| 新久久久久国产一级毛片| 亚洲国产欧美一区二区综合| 在线观看免费高清a一片| 午夜影院在线不卡| 欧美日韩一级在线毛片| 国产精品99久久99久久久不卡| 亚洲久久久国产精品| 亚洲熟女精品中文字幕| 在线十欧美十亚洲十日本专区| 亚洲成人国产一区在线观看| 一本色道久久久久久精品综合| 久久国产精品影院| 中文字幕另类日韩欧美亚洲嫩草| 国产成人av激情在线播放| av在线app专区| 国产成人精品久久二区二区91| 国产日韩一区二区三区精品不卡| 伊人久久大香线蕉亚洲五| 日韩熟女老妇一区二区性免费视频| 国产成人免费观看mmmm| 久久国产精品影院| 免费观看人在逋| 欧美国产精品一级二级三级| www.自偷自拍.com| 99国产精品一区二区蜜桃av | 日韩一卡2卡3卡4卡2021年| 老司机亚洲免费影院| 亚洲男人天堂网一区| 两人在一起打扑克的视频| 亚洲精品成人av观看孕妇| 美女高潮到喷水免费观看| 777米奇影视久久| 国产无遮挡羞羞视频在线观看| 国产有黄有色有爽视频| 啦啦啦中文免费视频观看日本| 亚洲国产毛片av蜜桃av| 中文字幕人妻熟女乱码| a级毛片黄视频| 成年人免费黄色播放视频| 中文字幕色久视频| 女人被躁到高潮嗷嗷叫费观| 亚洲一区二区三区欧美精品| 国产精品久久久久成人av| 欧美黄色片欧美黄色片| 人妻久久中文字幕网| 999精品在线视频| 黄频高清免费视频| 少妇猛男粗大的猛烈进出视频| 美女午夜性视频免费| 免费观看a级毛片全部| 中文字幕精品免费在线观看视频| 啦啦啦 在线观看视频| 久久久国产一区二区| 国产一级毛片在线| 中亚洲国语对白在线视频| 99国产精品99久久久久| 久热这里只有精品99| 久久久精品国产亚洲av高清涩受| 另类精品久久| a级毛片在线看网站| 亚洲成人手机| 另类亚洲欧美激情| 人人妻人人澡人人看| 国产精品99久久99久久久不卡| 性高湖久久久久久久久免费观看| 两个人看的免费小视频| 久久狼人影院| 精品一区二区三区四区五区乱码| 99热全是精品| cao死你这个sao货| 午夜福利影视在线免费观看| 国产精品.久久久| www.精华液| 99久久人妻综合| 久久精品成人免费网站| 在线十欧美十亚洲十日本专区| 久久久水蜜桃国产精品网| 自拍欧美九色日韩亚洲蝌蚪91| 午夜视频精品福利| 欧美亚洲 丝袜 人妻 在线| 国产成+人综合+亚洲专区| 人人妻人人爽人人添夜夜欢视频| 欧美国产精品一级二级三级| 啦啦啦免费观看视频1| 欧美日韩一级在线毛片| 热re99久久精品国产66热6| 男女之事视频高清在线观看| 精品卡一卡二卡四卡免费| 久久中文看片网| 亚洲第一欧美日韩一区二区三区 | 在线观看一区二区三区激情| 午夜老司机福利片| 美女视频免费永久观看网站| a在线观看视频网站| 夜夜骑夜夜射夜夜干| 亚洲成av片中文字幕在线观看| 大片电影免费在线观看免费| 在线观看人妻少妇| 黄色片一级片一级黄色片| 亚洲欧美激情在线| 欧美精品人与动牲交sv欧美| 国产精品久久久久成人av| 岛国毛片在线播放| xxxhd国产人妻xxx| 免费在线观看完整版高清| 精品欧美一区二区三区在线| 十八禁高潮呻吟视频| 桃红色精品国产亚洲av| 狂野欧美激情性bbbbbb| 大型av网站在线播放| 99国产精品99久久久久| 亚洲精品美女久久av网站| 日本猛色少妇xxxxx猛交久久| av天堂在线播放| 后天国语完整版免费观看| 一边摸一边抽搐一进一出视频| 90打野战视频偷拍视频| 精品国产乱子伦一区二区三区 | 亚洲精品av麻豆狂野| 考比视频在线观看| 中文字幕色久视频| 在线观看人妻少妇| 两人在一起打扑克的视频| 亚洲国产欧美日韩在线播放| 在线观看免费日韩欧美大片| 水蜜桃什么品种好| 永久免费av网站大全| 在线观看舔阴道视频| 久久久久精品人妻al黑| 亚洲精品国产色婷婷电影| 亚洲欧美色中文字幕在线| 亚洲人成电影免费在线| 少妇粗大呻吟视频| 国产熟女午夜一区二区三区| 久久久精品区二区三区| 免费高清在线观看视频在线观看| 亚洲专区国产一区二区| a级毛片在线看网站| 欧美 亚洲 国产 日韩一| 美女高潮到喷水免费观看| 久久热在线av| 亚洲国产精品999| 欧美日韩亚洲国产一区二区在线观看 | 狂野欧美激情性xxxx| 三上悠亚av全集在线观看| 日韩大码丰满熟妇| 99热全是精品| 日韩大码丰满熟妇| 国产日韩欧美视频二区| 十八禁人妻一区二区| 男人爽女人下面视频在线观看| 免费高清在线观看日韩| netflix在线观看网站| 日本黄色日本黄色录像| 午夜免费鲁丝| 国产又色又爽无遮挡免| √禁漫天堂资源中文www| 少妇精品久久久久久久| 久久久久视频综合| 国产日韩欧美在线精品| 国产男人的电影天堂91| 美女午夜性视频免费| 亚洲免费av在线视频| 欧美+亚洲+日韩+国产| 国产av又大| 日韩中文字幕欧美一区二区| 国产精品偷伦视频观看了| 亚洲专区国产一区二区| 人成视频在线观看免费观看| 欧美日韩精品网址| 久久精品国产亚洲av高清一级| 黑人操中国人逼视频| 日韩熟女老妇一区二区性免费视频| 我的亚洲天堂| 男女床上黄色一级片免费看| 黄色怎么调成土黄色| 免费在线观看完整版高清| 正在播放国产对白刺激| 蜜桃在线观看..| 日本猛色少妇xxxxx猛交久久| 亚洲第一av免费看| 精品欧美一区二区三区在线| 男人添女人高潮全过程视频| 国产激情久久老熟女| 91成人精品电影| 性少妇av在线| 国产在线一区二区三区精| 国产欧美日韩综合在线一区二区| 亚洲专区中文字幕在线| 三级毛片av免费| 18禁观看日本| 亚洲国产av影院在线观看| 18禁观看日本| 老司机午夜十八禁免费视频| 精品亚洲乱码少妇综合久久| 99热网站在线观看| 在线观看人妻少妇| 777米奇影视久久| 国产成人系列免费观看| 国产亚洲欧美精品永久| 精品人妻在线不人妻| √禁漫天堂资源中文www| 成年动漫av网址| 欧美另类亚洲清纯唯美| 午夜免费观看性视频| 熟女少妇亚洲综合色aaa.| 亚洲国产看品久久| 欧美少妇被猛烈插入视频| 午夜免费观看性视频| 国产精品秋霞免费鲁丝片| 国产精品熟女久久久久浪| 日韩欧美免费精品| 亚洲成人手机| 亚洲久久久国产精品| 亚洲欧洲日产国产| kizo精华| 黄片播放在线免费| 亚洲精品粉嫩美女一区| 亚洲av片天天在线观看| 中文字幕人妻丝袜制服| 久久久久网色| 视频在线观看一区二区三区| 丰满饥渴人妻一区二区三| 亚洲人成电影观看| 亚洲精品中文字幕在线视频| 亚洲人成电影免费在线| 午夜免费成人在线视频| 国产成人欧美在线观看 | 成人国产一区最新在线观看| 久久这里只有精品19| 久久精品国产a三级三级三级| 久久久精品国产亚洲av高清涩受| 国产亚洲av片在线观看秒播厂| 两人在一起打扑克的视频| 日本91视频免费播放| 狂野欧美激情性xxxx| 国产xxxxx性猛交| 一级片'在线观看视频| 青春草视频在线免费观看| 欧美日韩亚洲国产一区二区在线观看 | 成人18禁高潮啪啪吃奶动态图| 宅男免费午夜| 亚洲色图综合在线观看| 女性生殖器流出的白浆| 女人爽到高潮嗷嗷叫在线视频| 中文字幕人妻丝袜制服| 午夜激情av网站| 麻豆av在线久日| 亚洲成人免费电影在线观看| 99香蕉大伊视频| 日韩欧美国产一区二区入口| 爱豆传媒免费全集在线观看| 精品一品国产午夜福利视频| 国产人伦9x9x在线观看| 日韩,欧美,国产一区二区三区| 国产1区2区3区精品| 亚洲av电影在线进入| 人妻人人澡人人爽人人| 欧美精品一区二区大全| 建设人人有责人人尽责人人享有的| 一区二区三区精品91| 国产一级毛片在线| 日韩一卡2卡3卡4卡2021年| 日本91视频免费播放| 中文精品一卡2卡3卡4更新| 日韩欧美一区视频在线观看| 搡老乐熟女国产| 亚洲久久久国产精品| 免费一级毛片在线播放高清视频 | 久久久久久亚洲精品国产蜜桃av| 日韩 欧美 亚洲 中文字幕| 夫妻午夜视频| 91精品三级在线观看| 真人做人爱边吃奶动态| 叶爱在线成人免费视频播放| 9热在线视频观看99| 久久精品成人免费网站| 欧美日韩亚洲高清精品| 少妇人妻久久综合中文| 日本欧美视频一区| 制服人妻中文乱码| 日韩三级视频一区二区三区| 丝袜美足系列| 久久99一区二区三区| 亚洲专区国产一区二区| 69精品国产乱码久久久| 精品亚洲成国产av| 免费av中文字幕在线| 久久av网站| 免费一级毛片在线播放高清视频 | 国产精品亚洲av一区麻豆| 亚洲国产看品久久| 人人澡人人妻人| 美女高潮到喷水免费观看| 日本av免费视频播放| 一二三四在线观看免费中文在| 久久精品亚洲av国产电影网| 国产深夜福利视频在线观看| 人妻久久中文字幕网| 蜜桃在线观看..| 国产99久久九九免费精品| 老司机影院毛片| 欧美国产精品va在线观看不卡| 中国美女看黄片| 老汉色∧v一级毛片| 精品国产一区二区久久| 日韩电影二区| 我的亚洲天堂| 欧美日韩亚洲综合一区二区三区_| 国产精品久久久久久精品电影小说| 桃红色精品国产亚洲av| 久久精品国产a三级三级三级| 777米奇影视久久| 亚洲精品一二三| 国精品久久久久久国模美| 欧美日韩亚洲综合一区二区三区_| 丝袜脚勾引网站| 成年人黄色毛片网站| 老熟女久久久| 亚洲欧洲日产国产| 亚洲国产日韩一区二区| 两性午夜刺激爽爽歪歪视频在线观看 | 亚洲国产欧美网| 亚洲一码二码三码区别大吗| 动漫黄色视频在线观看| e午夜精品久久久久久久| 欧美黑人精品巨大| 国产av国产精品国产| 丝袜美腿诱惑在线| a级毛片黄视频| 如日韩欧美国产精品一区二区三区| 亚洲精品一区蜜桃| 欧美少妇被猛烈插入视频| 亚洲国产日韩一区二区| 久久精品亚洲熟妇少妇任你| 青草久久国产| 日本91视频免费播放| 男女国产视频网站| 女人久久www免费人成看片| 色婷婷久久久亚洲欧美| tocl精华| 国产在线观看jvid| 天堂8中文在线网| 精品国产一区二区三区久久久樱花| 欧美日韩精品网址| 操出白浆在线播放| 男人添女人高潮全过程视频| 黄色怎么调成土黄色| 91av网站免费观看| 天堂俺去俺来也www色官网| 亚洲国产av影院在线观看| 午夜福利乱码中文字幕| 日日摸夜夜添夜夜添小说| 最近最新中文字幕大全免费视频| 妹子高潮喷水视频| 首页视频小说图片口味搜索| 国产伦理片在线播放av一区| netflix在线观看网站| 色精品久久人妻99蜜桃| 18禁观看日本| 亚洲欧洲日产国产| 欧美日韩中文字幕国产精品一区二区三区 | 久久99热这里只频精品6学生| 91av网站免费观看| 在线观看www视频免费| 国产区一区二久久| 久久av网站| 午夜福利影视在线免费观看| 桃红色精品国产亚洲av| 国产野战对白在线观看| 久久热在线av| 中文字幕人妻丝袜制服| 国产精品久久久久久精品古装| 日韩大片免费观看网站| 人人妻人人爽人人添夜夜欢视频| 亚洲专区字幕在线| 国产av又大| 国产日韩欧美在线精品| 久久青草综合色| 亚洲欧美一区二区三区黑人| 欧美日韩黄片免| 精品久久蜜臀av无| 日韩,欧美,国产一区二区三区| www日本在线高清视频| 制服诱惑二区| 国产成人系列免费观看| 亚洲欧美日韩高清在线视频 | 美女扒开内裤让男人捅视频| 19禁男女啪啪无遮挡网站| 亚洲午夜精品一区,二区,三区| 中文字幕人妻熟女乱码| 午夜免费观看性视频| 男男h啪啪无遮挡| 啪啪无遮挡十八禁网站| 丝瓜视频免费看黄片| 男女国产视频网站| 国产av精品麻豆| 男人爽女人下面视频在线观看| 久久免费观看电影| 精品国产超薄肉色丝袜足j| 18禁裸乳无遮挡动漫免费视频| 国产91精品成人一区二区三区 | 欧美精品啪啪一区二区三区 | 国产精品一二三区在线看| 首页视频小说图片口味搜索| 亚洲精品美女久久久久99蜜臀| 免费在线观看视频国产中文字幕亚洲 | 9热在线视频观看99| 18禁黄网站禁片午夜丰满| 人妻 亚洲 视频| 欧美日韩国产mv在线观看视频| 黄片大片在线免费观看| 欧美精品高潮呻吟av久久| 脱女人内裤的视频| 老鸭窝网址在线观看| 国产精品影院久久| 久久综合国产亚洲精品| 满18在线观看网站| 好男人电影高清在线观看| 亚洲欧洲精品一区二区精品久久久| 美女脱内裤让男人舔精品视频| 亚洲精品在线美女| 大片电影免费在线观看免费| videosex国产| 日韩一区二区三区影片| 精品久久蜜臀av无| 五月开心婷婷网| 麻豆乱淫一区二区| 成人国语在线视频| 成年人免费黄色播放视频| 日韩 亚洲 欧美在线| 免费不卡黄色视频| 91精品三级在线观看| 下体分泌物呈黄色| 日本vs欧美在线观看视频| a级片在线免费高清观看视频| 高清欧美精品videossex| 美女主播在线视频| 热99久久久久精品小说推荐| 无限看片的www在线观看| 99精品久久久久人妻精品| 国产av一区二区精品久久| 午夜福利影视在线免费观看| 久久香蕉激情| 热99久久久久精品小说推荐| 免费在线观看视频国产中文字幕亚洲 | 国产精品99久久99久久久不卡| 99热网站在线观看| 日本黄色日本黄色录像| 97精品久久久久久久久久精品| 成人国语在线视频| 欧美激情极品国产一区二区三区| 国产精品1区2区在线观看. | 黄频高清免费视频| 亚洲专区中文字幕在线| 精品第一国产精品| 永久免费av网站大全| 97在线人人人人妻| 精品国内亚洲2022精品成人 | 亚洲av美国av| 一边摸一边抽搐一进一出视频|