SlideShare a Scribd company logo
1 of 9
Download to read offline
TELKOMNIKA, Vol.15, No.4, December 2017, pp. 1808~1816
ISSN: 1693-6930, accredited A by DIKTI, Decree No: 58/DIKTI/Kep/2013
DOI:10.12928/TELKOMNIKA.v15i4.6832  1808
Received August 28, 2017; Revised November 10, 2017; Accepted November 25, 2017
How to Calculate the Public Psychological Pressure in
the Social Networks
Rui JIN
1
, Hong-Li ZHANG
2
, Xing WANG
3
, Xiao-Meng WANG
4
School of Computer Science and Technology, Harbin Institute of Technology, Harbin, China, 150001, telp:
+86-0451-86418273
*Corresponding author, e-mail jinrui@hit.edu.cn
1
, zhanghongli@hit.edu.cn
2
, yeahwx@gmail.com
3
,
wangxiaomeng1123@163.com
4
Abstract
With the worldwide application of social networks, new mathematical approaches have been
developed that quantitatively address this online trend, including the concept of social computing. The
analysis of data generated by social networks has become a new field of research; social conflicts on
social networks occur frequently on the internet, and data regarding social behavior on social networks
must be analyzed objectively. In this paper a type of social compouting method based on the principle of
maximum entropyis proposed, and this type of social computing method can solve a series of complex
social computing problems including the calculation of public psychological pressure. The quantitative
calculation of public psychological pressure is so important to the public opinion analysis that it can be
widely applied in a lot of public information analysis fields.
Keywords: public psychological pressure, social computing, information entropy, principle of maximum
entropy, public opinion analysis
Copyright © 2017 Universitas Ahmad Dahlan. All rights reserved.
1. Introduction
In contemporary society the social networks has become the key infrastructure
services. A lot of social information wasdistributed, transmitted, oracquired through social
networking services.
These sercices have a profound influence on the nation's politics, economy, culture and
the organization of social activities. The data from SNS (Social Network Service) commonly
have various media such as text, location, time, audio, and video and so on [1] [2].
At the same time, computer experts and data analysts have begun to show great
interest in the data that are generated by these networks, prompting a new computing approach
called "social computing" [3].
A seminar on social computing was held at Harvard University in 2007, and the U.S.
military held a seminar at Arizona State University in April 2008 on behavior modeling and
behavior forecasting. In 2009, the thinking of social computing began to become the formal
academic concept developed by David Lazer et al. in the journal Science. They considered that
a great deal of information contained in social networks such as blogs, BBS, chats, records of
consumption, and E-mails can be analyzed by data analyst, which involved a lot valuable
information [4].
The people expressed their personal views in the social networks, in which involve a lot
of public mood. How to calculate the public psychological pressure in the social networks is an
extremely essential subject in the public opinion analysis [5] [6] [7].
During the Arab Spring [7], a series of national governments collapsed. The social
networks such as Twitter and Facebook play a vital role in it. When social networks make it
easier or more convenient for the public to access information, countries face inevitable social
and political consequences [8].
This article proposes a type of general-purpose social computing method that could be
widely applied in complex social computing situations that have the characteristic of uncertainty.
The proposed method can be used to apply quantitative calculations to complex social
information systems.
TELKOMNIKA ISSN: 1693-6930 
How to Calculate the Public Psychological Pressure in the Social Networks (Rui JIN)
1809
In this paper we try to calculate the public psychological pressure quantitatively for
social networks, and this is a very meaning work.
2. Related Works
2.1. The Related Theories of Social Computing
Social computing is a kind of calculation thinking which is used to quantitatively
calculate the social properties or the social tendency.
1) The concepts behind Computational Social Science
In 2009, an epoch-making calculation was proposed in the field of social networking
research when David Lazer and others proposed the concept of Computational Social Science.
This concept expounded on the idea that much of the information found on networks such as
blogs, BBSs, chats, log files, and E-mails are mappings of individual and organizational
behavior in society [3].
This description is considered a complete representation for social computing theory.
2) The small world theory
In 1998, Duncan J. Watts and Steven H. Strogatz published a famous paper in the
journal Nature, and in this paper they described the small world theory for social networks [9].
2.2. The Mathematical Modeling of Social Networks
Since the seminal works of Watts and Strogatz (1998) and Barabási and Albert (1999),
network modeling has undergone rapid development. Researchers in the field of network
modeling discovered that large-scale networks across different domains follow similar natural
laws such as scale-free distributions, the small-world effect and strong community structures [9].
Figure 1. A social network
3. A New Type of Social Computing Method
3.1. The Mathematical Model of Social Event
3.1.1. The Structure of a Social Event
Based on the concept of ontologya social event is described in Figure 2 [10].
…….
Social event
Child
content i
Child
content n-
1
Child
content 1
Child
content n
Child content 2
……
Child content 3
Child content 4
Child content 5
Figure 2. The social event structure
 ISSN: 1693-6930
TELKOMNIKA Vol. 15, No. 4, December 2017 : 1808 – 1816
1810
The mathematical description:
Suppose that the social event information is the complete set U ,which is composed of
the subsets Child content 1, Child content 2, …, Child content n-1, and Child content n,
1 2, ,..., nU U U , satisfying the condition that 1 2 1...n nU U U U    ,where 1U represents Child
event 1, 2U represents Child event 2,…, and nU represents Child event n.
According to set properties we know that 1 2... nU U U U   .
As shown in Fig. 2, “Child content 1” is an attribute of the “Social event”, and “Child
content i” is an attribute of “Child content 2”.These Child contents form the subsets of the
“Social event,” for which the set U is the complete set.
Based on general philosophical principles, parts do not exist in isolation within any
system; instead, they mutually influence each other.
3.1.2. The Modeling of Multidimensional Random Variables
Suppose that the discrete random variable X represents the “social event”, and the
event itself is a random information system in which 1X represents “child content 1”, 2X
represents “child content 2”,…, and nX represents “child content n”. Therefore, the discrete
random variable X isequivalent to  1 2, ,..., ,...,i nX X X X , or can be represented as
 1 2, ,..., nX X X X: , where  1 2, ,..., nX X X is the multidimensional random variables for which
the function relation between every (0 )iX i n  is either unknown or is complex and cannot be
described with a specific mathematical formalization.
3.1.3. The Vector Space of Multidimensional Random Variables
Element-event:
 1 2, ,... ...,i nX X X X contains the basic values in its domain of values,forming an
element-event in the vector space that can be represented by  1 2, , , nx x x , and all element-
events constitute the vector space A.
Suppose that the number of elements in set iU is iq . In iU , each (1 )iX i n  obtains
its values, and then are all
1
n
i
i
q

 element-events, which for the vector space Acan be
represented as the matrix A,
1
n
i
i
q

 rows, n columns.
1,1 2,2 n 1,n 1 n,n
1,1 1,2 1, 1 1,
2,1 2,2 2, 1 2, 1
...
...
... ... ... ... ...
... ... ... ... ...
...
n n
n n
q q q q
x x x x
x x x x
A
x x x x 

 
 
 
 
 
 
 
 
 
3.2. A Method to Calculate Social Event Information Entropy
3.2.1. Shannon Entropy
In the 1940s, Claude Shannon, the father of information theory developed the
information theory [11].
The definition:
Suppose that X is a discrete random variable (i.e., one whose range  1 2, ,..., nR x x x
is both finite and countable),let  ( )i ip x P X x  . The information entropy  H X of X is
defined by
TELKOMNIKA ISSN: 1693-6930 
How to Calculate the Public Psychological Pressure in the Social Networks (Rui JIN)
1811
     log
x
H X p x p x  (1)
The entropy  H X of the random variable X is a function of the random variable
probability distribution ( )p x .
Because  1 2, ,..., nX X X X: , it follows that
     1 2 1 2= , , , l , , ,n n
x
H X p x x x ogp x x x   (2)
3.2.2. The Calculation Method Based on the Principle of Maximum Entropy
1) A description of maximum entropy theory
In 1950, E. T. Jayness proposed the principle of maximum entropy. The maximum
entropy statistical model is a type of selection methodused to select the optimal distribution
among eligible probability distributions [12].
 p argmaxH p (3)
2) The maximum entropy distribution of the discrete random variables
Suppose that X is a discrete random variable whose range  1 2, ,..., nR x x x is finite and
countable. Let  ( )i ip x P X x  ; the corresponding probability value is then 1 2, ,..., ,...,i np p p p and
the necessary and sufficient condition is 1 2
1
np p p
n
   [13].
Proof
Because 1
1
n
ii
p
 , based on the Lagrange multiplier method we try to solve the
probability distribution under the maximum entropy constraint condition 1
1
n
ii
p

 1 2
1 1
, l, 1, n
n n
n i i i
i i
F p p p p p p
 
 
     
 
 
.
According to the necessary condition for obtaining the maximum, we take the partial
derivative of ip to get the equation set. Thus, we would have:
/ ln 1 0 1,2, , .i iF p p i n        ,
To solve this,  1ip exp   , and ip is a constant.
According to the constraint condition 1
1i
n
i
p
 ,we know that 1inp  —that is, 1ip n .
Therefore, the entropy function would be
       
1
1/ ln 1/ ln
n
i
H x n n n

   .
The conclusion is that
   lnH x n . (4)
Figure 3. The monotonic behavior of the entropy function    lnH x n
 ISSN: 1693-6930
TELKOMNIKA Vol. 15, No. 4, December 2017 : 1808 – 1816
1812
The entropy calculation formula for multidimensional random variables is similar to that
for a one-dimensional random variable.
Calculating the information content of a social event is a maximum entropy issue for
which the constraint condition is  1 2, , , 1np x x x  , the form of the entropy function is similar
to the form of a one-dimensional random variable, and the information entropy value can be any
positive number.
When the entropy function is maximized, the joint probability distribution is the uniform
probability distribution [13].
 
   
1 2
1 2 1 2
, , ,
= , , , l , , ,
n
n n
x
H X X X
p x x x ogp x x x

  
 1 2l , , , nogp x x x  
.
Suppose that iq represents the amount of iX after obtaining the values. While iX
obtains its value in its basic set of values once, 1.iq 
Table 1. The Value of Sub-Variables
iX 1X 2X ...... nX
iq 1q 2q ...... nq
Then, the discrete multidimensional random variables  1 2, ,..., nX X X have
1
n
i
i
q


distribution items.
According to the constraint condition
 1 2, , , 1np x x x  ,
We would then have  1 2
1 2
1
, , , n
n
p x x x
q q q
 

, and the entropy function is
   
 
1 2 1 2
1 2
1 2
, , , l , , ,
1
l
l
n n
n
n
H X X X ogp x x x
og
q q q
og q q q
   
 

 
.
That is, the entropy function of social event multidimensional random variables is
described by Formula (5).
 2
1
1, , , l
n
n i
i
H X X X og q

 
   
 
 (5)
3) The monotonicity proof of the social event multidimensional random variables entropy
function
The entropy function is
   
 
1 2 1 2
1 2
, , , l , , ,
l
n n
n
H X X X ogp x x x
og q q q
   
  .
TELKOMNIKA ISSN: 1693-6930 
How to Calculate the Public Psychological Pressure in the Social Networks (Rui JIN)
1813
Proof
When  1 2, ,..., nX X X obtains a set of values
'
1( ,..., ,..., )i nq q q , the entropy is '
H ;
however, when 1 2( , ,..., )nX X X obtains another set of values
''
1( ,..., ,..., )i nq q q , the entropy is ''
H .
When '' '
i iq q because 0iq  , then '' '
1 1... ... ... ...i n i nq q q q q q ; thus, we would have
'' '
1 1( ) ( )... ... ... ...i n i nlog logq q q q q q
.
Therefore, '' '
H H and the entropy function has strict monotonicity,Q.E.D.
Based on a theoretical analysis, the calculation method is shown to be appropriate for
almost all social computing situations.
4. A Calculaiton Method for the Entropy of Public Psychological Pressurein the Social
Networks
4.1. The Analysis for Public Psychological Pressure
4.1.1. The Structure of Public Psychological Pressure
There are multiple categories of public moods involved in the public psychological
pressure, and the structure of public psychological pressure is shown in Figure 2. In recent
years the related researchers analyzed the text content of daily Twitter feeds by two mood
tracking tools, namely OpinionFinder thatmeasures positive vs. negative mood and Google-
Profile of Mood States (GPOMS) that measures moodin terms of 6 dimensions [14] [15].
public
psychological pres-
sure
other
moodsworry dread
disappoint-
ment
depression indignation anxiety fear panic
Figure 4. The structure of publicpsychological pressure
4.1.2. The Mathematical Model for Public Psychological Pressure
Based on Fig. 4, the mathematical model is described as follows.
Assume that the discrete random variableX represents the“public psychological
pressure” such that X1 represents “worry”, X2 represents “dread”, X3represents
“disappointment”, X4 represents “depression”, X5 represents “indignation”, X6 represents
“anxiety”, X7 represents “fear”, X8 represents “panic”, X9 represents “other moods”, and X ~
(X1, X2…… X9).
Furthermore, assume that the domain of X is U, and the probabilitydistribution is p(x);
the domain of X1, X2…, and X10 are U1, U2…, and U9, respectively; and the
probabilitydistributions are p1(x), p2(x), …, and p9(x), respectively.
4.2. The Calculation Method
According to the mathematical model, we can obtain the entropy function H of X as
follows:
 1 2 9lH og q q q  (6)
 ISSN: 1693-6930
TELKOMNIKA Vol. 15, No. 4, December 2017 : 1808 – 1816
1814
5. Experiments
5.1. The Experiments Data
In July 2012 a number of important public events occurred that garnered extensive
attention in Chinese social networks. We calculated the corresponding public psychological
pressurefor each event.
Table 2. Public Events
Sequence number Event Time
1 The 7/21 rainstorm in
Beijing.
2012.7.21
2 A Japanese company
discharged carcinogenic
sewage into Nantong city,
Jiangsu Province.
2012.7.25
3 A 3.3- magnitude
earthquake occurred in
Dali, Yunan Province.
2012.7.27
We collected corresponding social media comments concerning these events from
social networks over a 30-day period. These comments tended to be highly integrated and
traditionalwith abundant emotional coloring.
For example, the number of comments collected over 30 days for Event 1 is shown in
Table 3.
Table 3. Event 1
Time(day) No.1 No.2 No.3 No.4 No.5 No.6 No.7 No.8
Number 1356 1795 1837 1936 1846 2305 2541 2252
Time No.9 No.10 No.11 No.12 No.13 No.14 No.15 No.16
Number 2071 1803 1595 1502 1396 1203 1181 1063
Time No.17 No.18 No.19 No.20 No.21 No.22 No.23 No.24
Number 936 982 782 657 662 608 573 562
Time No.25 No.26 No.27 No.28 No.29 No.30
Number 441 382 321 309 331 341
Subsequently, the data for these comments were processed, and the statistical totals of
the pessimistic public sentiments on Day 1 are shown in Table 4.
Table 4. Pessimistic Public Moods on Day 1 for Event 1
X X1 X2 X3 X4 X5 X6 X7 X8 X9
qi 521 637 726 581 672 832 693 825 1
The public psychological pressure H1of the public Event 1 on the firstday can be
calculated as follows.
 1 1 2 9ln , , ,
ln(521*637*726*581*672*
832*693*825*1)
52.16
qH q q 


For example, the number of comments collected over 30 days for Event 1, Event 2,
Event 3 is shown in Table 5.
TELKOMNIKA ISSN: 1693-6930 
How to Calculate the Public Psychological Pressure in the Social Networks (Rui JIN)
1815
Table 5. Public Events
Time(day) No.1 No.2 No.3 No.4 No.5 No.6 No.7 No.8
H1 52.16 54.71 54.08 54.92 54.83 55.52 56.30 55.81
H2 47.81 48.72 49.18 46.82 46.93 44.78 42.93 43.52
H3 33.29 33.92 28.93 24.21 16.83 13.92 12.81 10.38
Time(day) No.9 No.10 No.11 No.12 No.13 No.14 No.15 No.16
H1 56.47 55.92 54.71 53.82 52.06 52.27 51.83 52.01
H2 42.68 42.39 42.01 43.29 41.48 42.82 43.92 42.52
H3 12.28 12.74 10.82 10.77 11.69 10.01 11.92 9.88
Time(day) No.17 No.18 No.19 No.20 No.21 No.22 No.23 No.24
H1 51.93 52.63 52.73 51.39 48.29 45.92 45.83 46.72
H2 42.28 38.58 39.73 38.96 39.72 37.39 36.30 35.93
H3 9.92 8.39 8.38 9.92 10.39 8.82 8.30 7.20
Time(day) No.25 No.26 No.27 No.28 No.29 No.30
H1 42.21 42.93 43.76 42.92 42.02 41.83
H2 36.43 35.72 35.83 36.92 33.62 33.39
H3 6.39 7.30 8.20 6.93 8.36 7.72
Using those data, we can describe the tendency of public psychological pressure over
30 days, as shown in Figures 5.
Figure 5. The H values for Event 1, Event 2, and Event 3
6. Conclusion
This paper presents a new type of social computing method based on maximum entropy
theory. The method has a solid theoretical foundation and can be used to quantitatively analyze
uncertain issues using data gathered through social networks.
Applying the proposed method the public psychological pressure can be
quantitativelycalculated for public information analysis.
7. Acknowledgments
Supported by the Major State Basic Research Development Program of China (973
Program) under Grant 2013CB329602; the National Natural Science Foundation of China under
Grant No.61202457,No.61472108,No.61402149.
References
[1] Setiawan Assegaff, H Hendri, Akwan Sunoto, Herti Yani, Desy Kisbiyanti. Social Media Success
Model for Knowledge Sharing (Scale Development and Validation). TELKOMNIKA.
Telecommunication Computing Electronics and Control. 2017. DOI:
http://dx.doi.org/10.12928/telkomnika.v15i3.5569
 ISSN: 1693-6930
TELKOMNIKA Vol. 15, No. 4, December 2017 : 1808 – 1816
1816
[2] Louis Y, Asur S, Huberman BA. What Trends in Chinese Social Media. 5th SNA-KDD Workshop’11
(SNA-KDD’11), San Diego, CA, USA. 2011.
[3] Social Computing.2016. [URL:http://en.wikipedia.org/wiki/Social_computing].
[4] Lazer D, Pentland A, Adamic L, Aral S, Barabasi AL, Brewer D, Christakis N, Contractor N, Fowler J,
Gutmann M, Jebara T, King G, Macy M, Roy D, Van Alstyne M. Social science. Computational social
science. Science. 2009; 323(5915): 721-723. [doi:10.1126/science.1167742].
[5] Russell G. Brooker and Todd Schaefer. “Methods of Measuring Public Opinion”. PUBLICOPINION IN
THE 21ST CENTURY. 2015.
[6] JA Balazs, JD Velásquez, Opinion mining and information fusion: a survey, Inf. Fusion. 2016; (27):
95–110.
[7] “Arab Spring”. Available at https://en.wikipedia.org/wiki/Arab_Spring.
[8] Khondker, Habibul Haque. Role of the New Media in the Arab Spring. Special Forum on the Arab
Revolutions. 2011: 675-679. http://dx.doi.org/10.1080/14747731.2011.621287
[9] DJ Watts, SH Strogatz. “Collective dynamics of ‘small-world’, networks”. Nature. 1998; 393(6684):
440-442. doi: 10.1038/30918.
[10] Raimond Y, Abdallah S, Sandler M. The Music Ontology.International Conference on Music
Information Retrieval. Austrian Computer Society. 2007: 417-422.
[11] Doran RS, M Ismail, TY Lam, E Lutwak R. The Theory of Information and Coding. Cambridge Books
Online © Cambridge University Press. 2010.
[12] Jaynes ET. Information and statistical mechanics. Physical Review. 1957; 32(1): 3-7.
[13] L, XD. The Method Study About Probability Distribution Based On The Principle Of Maximum
Entropy. Master Degree Dissertation, North China Electric Power University, Beijing, China. 2008.
[14] Aisah Rini Susanti, Taufik Djatna, Wisnu Ananta Kusuma. Twitter’s Sentiment Analysis on Gsm
Services using Multinomial Naïve Bayes. TELKOMNIKA Telecommunication Computing Electronics
and Control. 2017. DOI: http://dx.doi.org/10.12928/telkomnika.v15i3.4284
[15] Johan Bollen, Huina Mao, Xiaojun Zeng. Twitter mood predicts the stock market. Journal of
Computational Science. 2011.

More Related Content

Similar to How to Calculate the Public Psychological Pressure in the Social Networks

A Study of the effects of emotions and Personality on Physical Health using I...
A Study of the effects of emotions and Personality on Physical Health using I...A Study of the effects of emotions and Personality on Physical Health using I...
A Study of the effects of emotions and Personality on Physical Health using I...ijdmtaiir
 
A Study of Pervasive Computing Environments in Improving the Quality of Life ...
A Study of Pervasive Computing Environments in Improving the Quality of Life ...A Study of Pervasive Computing Environments in Improving the Quality of Life ...
A Study of Pervasive Computing Environments in Improving the Quality of Life ...ijdmtaiir
 
Effective Computations and Foundations of Science
Effective Computations and Foundations of ScienceEffective Computations and Foundations of Science
Effective Computations and Foundations of Sciencerahulmonikasharma
 
Artificial intelligence in the field of economics.pdf
Artificial intelligence in the field of economics.pdfArtificial intelligence in the field of economics.pdf
Artificial intelligence in the field of economics.pdfgtsachtsiris
 
Detecting Important Life Events on Twitter Using Frequent Semantic and Syntac...
Detecting Important Life Events on Twitter Using Frequent Semantic and Syntac...Detecting Important Life Events on Twitter Using Frequent Semantic and Syntac...
Detecting Important Life Events on Twitter Using Frequent Semantic and Syntac...COMRADES project
 
Figures of the Many - Quantitative Concepts for Qualitative Thinking
Figures of the Many - Quantitative Concepts for Qualitative ThinkingFigures of the Many - Quantitative Concepts for Qualitative Thinking
Figures of the Many - Quantitative Concepts for Qualitative ThinkingBernhard Rieder
 
Climate Change And Global Warming Essay
Climate Change And Global Warming EssayClimate Change And Global Warming Essay
Climate Change And Global Warming EssayWanda Buck
 
Report IndividualHCI_MaiBodin_Oct 31 2014
Report IndividualHCI_MaiBodin_Oct 31 2014Report IndividualHCI_MaiBodin_Oct 31 2014
Report IndividualHCI_MaiBodin_Oct 31 2014Mai Bodin
 
Social Systems Theory 2012 #1
Social Systems Theory 2012 #1Social Systems Theory 2012 #1
Social Systems Theory 2012 #1Takashi Iba
 
NG2S: A Study of Pro-Environmental Tipping Point via ABMs
NG2S: A Study of Pro-Environmental Tipping Point via ABMsNG2S: A Study of Pro-Environmental Tipping Point via ABMs
NG2S: A Study of Pro-Environmental Tipping Point via ABMsKan Yuenyong
 
Poster presentation 5th BENet (Belgium Network Research Meting), Namur
Poster presentation 5th BENet (Belgium Network Research Meting), Namur Poster presentation 5th BENet (Belgium Network Research Meting), Namur
Poster presentation 5th BENet (Belgium Network Research Meting), Namur Nanyang Technological University
 
Information and knowledge valuation using the information theory and informat...
Information and knowledge valuation using the information theory and informat...Information and knowledge valuation using the information theory and informat...
Information and knowledge valuation using the information theory and informat...Alexander Decker
 
Cyberanthropology
CyberanthropologyCyberanthropology
CyberanthropologyUls Ulsaa
 
7 syed final humanity -72-75
7 syed final humanity -72-757 syed final humanity -72-75
7 syed final humanity -72-75Alexander Decker
 
Rostislav Yavorsky - Research Challenges of Dynamic Socio-Semantic Networks
Rostislav Yavorsky - Research Challenges of Dynamic Socio-Semantic NetworksRostislav Yavorsky - Research Challenges of Dynamic Socio-Semantic Networks
Rostislav Yavorsky - Research Challenges of Dynamic Socio-Semantic NetworksWitology
 
What is the major power linking statistics & data mining
What is the major power linking statistics & data miningWhat is the major power linking statistics & data mining
What is the major power linking statistics & data miningIJDKP
 
Brier, Soren. Cybersemiotics (Lectura)
Brier, Soren. Cybersemiotics (Lectura)Brier, Soren. Cybersemiotics (Lectura)
Brier, Soren. Cybersemiotics (Lectura)scomunicacion
 
A Study On The Development And Application Of Number Theory In Engineering Field
A Study On The Development And Application Of Number Theory In Engineering FieldA Study On The Development And Application Of Number Theory In Engineering Field
A Study On The Development And Application Of Number Theory In Engineering FieldKim Daniels
 
OntoSOC: S ociocultural K nowledge O ntology
OntoSOC:  S ociocultural  K nowledge  O ntology OntoSOC:  S ociocultural  K nowledge  O ntology
OntoSOC: S ociocultural K nowledge O ntology IJwest
 

Similar to How to Calculate the Public Psychological Pressure in the Social Networks (20)

A Study of the effects of emotions and Personality on Physical Health using I...
A Study of the effects of emotions and Personality on Physical Health using I...A Study of the effects of emotions and Personality on Physical Health using I...
A Study of the effects of emotions and Personality on Physical Health using I...
 
A Study of Pervasive Computing Environments in Improving the Quality of Life ...
A Study of Pervasive Computing Environments in Improving the Quality of Life ...A Study of Pervasive Computing Environments in Improving the Quality of Life ...
A Study of Pervasive Computing Environments in Improving the Quality of Life ...
 
Effective Computations and Foundations of Science
Effective Computations and Foundations of ScienceEffective Computations and Foundations of Science
Effective Computations and Foundations of Science
 
Artificial intelligence in the field of economics.pdf
Artificial intelligence in the field of economics.pdfArtificial intelligence in the field of economics.pdf
Artificial intelligence in the field of economics.pdf
 
Detecting Important Life Events on Twitter Using Frequent Semantic and Syntac...
Detecting Important Life Events on Twitter Using Frequent Semantic and Syntac...Detecting Important Life Events on Twitter Using Frequent Semantic and Syntac...
Detecting Important Life Events on Twitter Using Frequent Semantic and Syntac...
 
Figures of the Many - Quantitative Concepts for Qualitative Thinking
Figures of the Many - Quantitative Concepts for Qualitative ThinkingFigures of the Many - Quantitative Concepts for Qualitative Thinking
Figures of the Many - Quantitative Concepts for Qualitative Thinking
 
Climate Change And Global Warming Essay
Climate Change And Global Warming EssayClimate Change And Global Warming Essay
Climate Change And Global Warming Essay
 
Report IndividualHCI_MaiBodin_Oct 31 2014
Report IndividualHCI_MaiBodin_Oct 31 2014Report IndividualHCI_MaiBodin_Oct 31 2014
Report IndividualHCI_MaiBodin_Oct 31 2014
 
Social Systems Theory 2012 #1
Social Systems Theory 2012 #1Social Systems Theory 2012 #1
Social Systems Theory 2012 #1
 
NG2S: A Study of Pro-Environmental Tipping Point via ABMs
NG2S: A Study of Pro-Environmental Tipping Point via ABMsNG2S: A Study of Pro-Environmental Tipping Point via ABMs
NG2S: A Study of Pro-Environmental Tipping Point via ABMs
 
Poster presentation 5th BENet (Belgium Network Research Meting), Namur
Poster presentation 5th BENet (Belgium Network Research Meting), Namur Poster presentation 5th BENet (Belgium Network Research Meting), Namur
Poster presentation 5th BENet (Belgium Network Research Meting), Namur
 
Information and knowledge valuation using the information theory and informat...
Information and knowledge valuation using the information theory and informat...Information and knowledge valuation using the information theory and informat...
Information and knowledge valuation using the information theory and informat...
 
Cyberanthropology
CyberanthropologyCyberanthropology
Cyberanthropology
 
7 syed final humanity -72-75
7 syed final humanity -72-757 syed final humanity -72-75
7 syed final humanity -72-75
 
Sociophysics
SociophysicsSociophysics
Sociophysics
 
Rostislav Yavorsky - Research Challenges of Dynamic Socio-Semantic Networks
Rostislav Yavorsky - Research Challenges of Dynamic Socio-Semantic NetworksRostislav Yavorsky - Research Challenges of Dynamic Socio-Semantic Networks
Rostislav Yavorsky - Research Challenges of Dynamic Socio-Semantic Networks
 
What is the major power linking statistics & data mining
What is the major power linking statistics & data miningWhat is the major power linking statistics & data mining
What is the major power linking statistics & data mining
 
Brier, Soren. Cybersemiotics (Lectura)
Brier, Soren. Cybersemiotics (Lectura)Brier, Soren. Cybersemiotics (Lectura)
Brier, Soren. Cybersemiotics (Lectura)
 
A Study On The Development And Application Of Number Theory In Engineering Field
A Study On The Development And Application Of Number Theory In Engineering FieldA Study On The Development And Application Of Number Theory In Engineering Field
A Study On The Development And Application Of Number Theory In Engineering Field
 
OntoSOC: S ociocultural K nowledge O ntology
OntoSOC:  S ociocultural  K nowledge  O ntology OntoSOC:  S ociocultural  K nowledge  O ntology
OntoSOC: S ociocultural K nowledge O ntology
 

More from TELKOMNIKA JOURNAL

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...TELKOMNIKA JOURNAL
 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...TELKOMNIKA JOURNAL
 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...TELKOMNIKA JOURNAL
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...TELKOMNIKA JOURNAL
 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...TELKOMNIKA JOURNAL
 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaTELKOMNIKA JOURNAL
 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireTELKOMNIKA JOURNAL
 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkTELKOMNIKA JOURNAL
 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsTELKOMNIKA JOURNAL
 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...TELKOMNIKA JOURNAL
 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesTELKOMNIKA JOURNAL
 
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...TELKOMNIKA JOURNAL
 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemTELKOMNIKA JOURNAL
 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...TELKOMNIKA JOURNAL
 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorTELKOMNIKA JOURNAL
 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...TELKOMNIKA JOURNAL
 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...TELKOMNIKA JOURNAL
 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksTELKOMNIKA JOURNAL
 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingTELKOMNIKA JOURNAL
 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...TELKOMNIKA JOURNAL
 

More from TELKOMNIKA JOURNAL (20)

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...
 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...
 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...
 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antenna
 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fire
 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio network
 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bands
 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...
 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertainties
 
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...
 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensor
 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...
 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networks
 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imaging
 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
 

Recently uploaded

CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 

Recently uploaded (20)

CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 

How to Calculate the Public Psychological Pressure in the Social Networks

  • 1. TELKOMNIKA, Vol.15, No.4, December 2017, pp. 1808~1816 ISSN: 1693-6930, accredited A by DIKTI, Decree No: 58/DIKTI/Kep/2013 DOI:10.12928/TELKOMNIKA.v15i4.6832  1808 Received August 28, 2017; Revised November 10, 2017; Accepted November 25, 2017 How to Calculate the Public Psychological Pressure in the Social Networks Rui JIN 1 , Hong-Li ZHANG 2 , Xing WANG 3 , Xiao-Meng WANG 4 School of Computer Science and Technology, Harbin Institute of Technology, Harbin, China, 150001, telp: +86-0451-86418273 *Corresponding author, e-mail jinrui@hit.edu.cn 1 , zhanghongli@hit.edu.cn 2 , yeahwx@gmail.com 3 , wangxiaomeng1123@163.com 4 Abstract With the worldwide application of social networks, new mathematical approaches have been developed that quantitatively address this online trend, including the concept of social computing. The analysis of data generated by social networks has become a new field of research; social conflicts on social networks occur frequently on the internet, and data regarding social behavior on social networks must be analyzed objectively. In this paper a type of social compouting method based on the principle of maximum entropyis proposed, and this type of social computing method can solve a series of complex social computing problems including the calculation of public psychological pressure. The quantitative calculation of public psychological pressure is so important to the public opinion analysis that it can be widely applied in a lot of public information analysis fields. Keywords: public psychological pressure, social computing, information entropy, principle of maximum entropy, public opinion analysis Copyright © 2017 Universitas Ahmad Dahlan. All rights reserved. 1. Introduction In contemporary society the social networks has become the key infrastructure services. A lot of social information wasdistributed, transmitted, oracquired through social networking services. These sercices have a profound influence on the nation's politics, economy, culture and the organization of social activities. The data from SNS (Social Network Service) commonly have various media such as text, location, time, audio, and video and so on [1] [2]. At the same time, computer experts and data analysts have begun to show great interest in the data that are generated by these networks, prompting a new computing approach called "social computing" [3]. A seminar on social computing was held at Harvard University in 2007, and the U.S. military held a seminar at Arizona State University in April 2008 on behavior modeling and behavior forecasting. In 2009, the thinking of social computing began to become the formal academic concept developed by David Lazer et al. in the journal Science. They considered that a great deal of information contained in social networks such as blogs, BBS, chats, records of consumption, and E-mails can be analyzed by data analyst, which involved a lot valuable information [4]. The people expressed their personal views in the social networks, in which involve a lot of public mood. How to calculate the public psychological pressure in the social networks is an extremely essential subject in the public opinion analysis [5] [6] [7]. During the Arab Spring [7], a series of national governments collapsed. The social networks such as Twitter and Facebook play a vital role in it. When social networks make it easier or more convenient for the public to access information, countries face inevitable social and political consequences [8]. This article proposes a type of general-purpose social computing method that could be widely applied in complex social computing situations that have the characteristic of uncertainty. The proposed method can be used to apply quantitative calculations to complex social information systems.
  • 2. TELKOMNIKA ISSN: 1693-6930  How to Calculate the Public Psychological Pressure in the Social Networks (Rui JIN) 1809 In this paper we try to calculate the public psychological pressure quantitatively for social networks, and this is a very meaning work. 2. Related Works 2.1. The Related Theories of Social Computing Social computing is a kind of calculation thinking which is used to quantitatively calculate the social properties or the social tendency. 1) The concepts behind Computational Social Science In 2009, an epoch-making calculation was proposed in the field of social networking research when David Lazer and others proposed the concept of Computational Social Science. This concept expounded on the idea that much of the information found on networks such as blogs, BBSs, chats, log files, and E-mails are mappings of individual and organizational behavior in society [3]. This description is considered a complete representation for social computing theory. 2) The small world theory In 1998, Duncan J. Watts and Steven H. Strogatz published a famous paper in the journal Nature, and in this paper they described the small world theory for social networks [9]. 2.2. The Mathematical Modeling of Social Networks Since the seminal works of Watts and Strogatz (1998) and Barabási and Albert (1999), network modeling has undergone rapid development. Researchers in the field of network modeling discovered that large-scale networks across different domains follow similar natural laws such as scale-free distributions, the small-world effect and strong community structures [9]. Figure 1. A social network 3. A New Type of Social Computing Method 3.1. The Mathematical Model of Social Event 3.1.1. The Structure of a Social Event Based on the concept of ontologya social event is described in Figure 2 [10]. ……. Social event Child content i Child content n- 1 Child content 1 Child content n Child content 2 …… Child content 3 Child content 4 Child content 5 Figure 2. The social event structure
  • 3.  ISSN: 1693-6930 TELKOMNIKA Vol. 15, No. 4, December 2017 : 1808 – 1816 1810 The mathematical description: Suppose that the social event information is the complete set U ,which is composed of the subsets Child content 1, Child content 2, …, Child content n-1, and Child content n, 1 2, ,..., nU U U , satisfying the condition that 1 2 1...n nU U U U    ,where 1U represents Child event 1, 2U represents Child event 2,…, and nU represents Child event n. According to set properties we know that 1 2... nU U U U   . As shown in Fig. 2, “Child content 1” is an attribute of the “Social event”, and “Child content i” is an attribute of “Child content 2”.These Child contents form the subsets of the “Social event,” for which the set U is the complete set. Based on general philosophical principles, parts do not exist in isolation within any system; instead, they mutually influence each other. 3.1.2. The Modeling of Multidimensional Random Variables Suppose that the discrete random variable X represents the “social event”, and the event itself is a random information system in which 1X represents “child content 1”, 2X represents “child content 2”,…, and nX represents “child content n”. Therefore, the discrete random variable X isequivalent to  1 2, ,..., ,...,i nX X X X , or can be represented as  1 2, ,..., nX X X X: , where  1 2, ,..., nX X X is the multidimensional random variables for which the function relation between every (0 )iX i n  is either unknown or is complex and cannot be described with a specific mathematical formalization. 3.1.3. The Vector Space of Multidimensional Random Variables Element-event:  1 2, ,... ...,i nX X X X contains the basic values in its domain of values,forming an element-event in the vector space that can be represented by  1 2, , , nx x x , and all element- events constitute the vector space A. Suppose that the number of elements in set iU is iq . In iU , each (1 )iX i n  obtains its values, and then are all 1 n i i q   element-events, which for the vector space Acan be represented as the matrix A, 1 n i i q   rows, n columns. 1,1 2,2 n 1,n 1 n,n 1,1 1,2 1, 1 1, 2,1 2,2 2, 1 2, 1 ... ... ... ... ... ... ... ... ... ... ... ... ... n n n n q q q q x x x x x x x x A x x x x                     3.2. A Method to Calculate Social Event Information Entropy 3.2.1. Shannon Entropy In the 1940s, Claude Shannon, the father of information theory developed the information theory [11]. The definition: Suppose that X is a discrete random variable (i.e., one whose range  1 2, ,..., nR x x x is both finite and countable),let  ( )i ip x P X x  . The information entropy  H X of X is defined by
  • 4. TELKOMNIKA ISSN: 1693-6930  How to Calculate the Public Psychological Pressure in the Social Networks (Rui JIN) 1811      log x H X p x p x  (1) The entropy  H X of the random variable X is a function of the random variable probability distribution ( )p x . Because  1 2, ,..., nX X X X: , it follows that      1 2 1 2= , , , l , , ,n n x H X p x x x ogp x x x   (2) 3.2.2. The Calculation Method Based on the Principle of Maximum Entropy 1) A description of maximum entropy theory In 1950, E. T. Jayness proposed the principle of maximum entropy. The maximum entropy statistical model is a type of selection methodused to select the optimal distribution among eligible probability distributions [12].  p argmaxH p (3) 2) The maximum entropy distribution of the discrete random variables Suppose that X is a discrete random variable whose range  1 2, ,..., nR x x x is finite and countable. Let  ( )i ip x P X x  ; the corresponding probability value is then 1 2, ,..., ,...,i np p p p and the necessary and sufficient condition is 1 2 1 np p p n    [13]. Proof Because 1 1 n ii p  , based on the Lagrange multiplier method we try to solve the probability distribution under the maximum entropy constraint condition 1 1 n ii p   1 2 1 1 , l, 1, n n n n i i i i i F p p p p p p               . According to the necessary condition for obtaining the maximum, we take the partial derivative of ip to get the equation set. Thus, we would have: / ln 1 0 1,2, , .i iF p p i n        , To solve this,  1ip exp   , and ip is a constant. According to the constraint condition 1 1i n i p  ,we know that 1inp  —that is, 1ip n . Therefore, the entropy function would be         1 1/ ln 1/ ln n i H x n n n     . The conclusion is that    lnH x n . (4) Figure 3. The monotonic behavior of the entropy function    lnH x n
  • 5.  ISSN: 1693-6930 TELKOMNIKA Vol. 15, No. 4, December 2017 : 1808 – 1816 1812 The entropy calculation formula for multidimensional random variables is similar to that for a one-dimensional random variable. Calculating the information content of a social event is a maximum entropy issue for which the constraint condition is  1 2, , , 1np x x x  , the form of the entropy function is similar to the form of a one-dimensional random variable, and the information entropy value can be any positive number. When the entropy function is maximized, the joint probability distribution is the uniform probability distribution [13].       1 2 1 2 1 2 , , , = , , , l , , , n n n x H X X X p x x x ogp x x x      1 2l , , , nogp x x x   . Suppose that iq represents the amount of iX after obtaining the values. While iX obtains its value in its basic set of values once, 1.iq  Table 1. The Value of Sub-Variables iX 1X 2X ...... nX iq 1q 2q ...... nq Then, the discrete multidimensional random variables  1 2, ,..., nX X X have 1 n i i q   distribution items. According to the constraint condition  1 2, , , 1np x x x  , We would then have  1 2 1 2 1 , , , n n p x x x q q q    , and the entropy function is       1 2 1 2 1 2 1 2 , , , l , , , 1 l l n n n n H X X X ogp x x x og q q q og q q q          . That is, the entropy function of social event multidimensional random variables is described by Formula (5).  2 1 1, , , l n n i i H X X X og q           (5) 3) The monotonicity proof of the social event multidimensional random variables entropy function The entropy function is       1 2 1 2 1 2 , , , l , , , l n n n H X X X ogp x x x og q q q       .
  • 6. TELKOMNIKA ISSN: 1693-6930  How to Calculate the Public Psychological Pressure in the Social Networks (Rui JIN) 1813 Proof When  1 2, ,..., nX X X obtains a set of values ' 1( ,..., ,..., )i nq q q , the entropy is ' H ; however, when 1 2( , ,..., )nX X X obtains another set of values '' 1( ,..., ,..., )i nq q q , the entropy is '' H . When '' ' i iq q because 0iq  , then '' ' 1 1... ... ... ...i n i nq q q q q q ; thus, we would have '' ' 1 1( ) ( )... ... ... ...i n i nlog logq q q q q q . Therefore, '' ' H H and the entropy function has strict monotonicity,Q.E.D. Based on a theoretical analysis, the calculation method is shown to be appropriate for almost all social computing situations. 4. A Calculaiton Method for the Entropy of Public Psychological Pressurein the Social Networks 4.1. The Analysis for Public Psychological Pressure 4.1.1. The Structure of Public Psychological Pressure There are multiple categories of public moods involved in the public psychological pressure, and the structure of public psychological pressure is shown in Figure 2. In recent years the related researchers analyzed the text content of daily Twitter feeds by two mood tracking tools, namely OpinionFinder thatmeasures positive vs. negative mood and Google- Profile of Mood States (GPOMS) that measures moodin terms of 6 dimensions [14] [15]. public psychological pres- sure other moodsworry dread disappoint- ment depression indignation anxiety fear panic Figure 4. The structure of publicpsychological pressure 4.1.2. The Mathematical Model for Public Psychological Pressure Based on Fig. 4, the mathematical model is described as follows. Assume that the discrete random variableX represents the“public psychological pressure” such that X1 represents “worry”, X2 represents “dread”, X3represents “disappointment”, X4 represents “depression”, X5 represents “indignation”, X6 represents “anxiety”, X7 represents “fear”, X8 represents “panic”, X9 represents “other moods”, and X ~ (X1, X2…… X9). Furthermore, assume that the domain of X is U, and the probabilitydistribution is p(x); the domain of X1, X2…, and X10 are U1, U2…, and U9, respectively; and the probabilitydistributions are p1(x), p2(x), …, and p9(x), respectively. 4.2. The Calculation Method According to the mathematical model, we can obtain the entropy function H of X as follows:  1 2 9lH og q q q  (6)
  • 7.  ISSN: 1693-6930 TELKOMNIKA Vol. 15, No. 4, December 2017 : 1808 – 1816 1814 5. Experiments 5.1. The Experiments Data In July 2012 a number of important public events occurred that garnered extensive attention in Chinese social networks. We calculated the corresponding public psychological pressurefor each event. Table 2. Public Events Sequence number Event Time 1 The 7/21 rainstorm in Beijing. 2012.7.21 2 A Japanese company discharged carcinogenic sewage into Nantong city, Jiangsu Province. 2012.7.25 3 A 3.3- magnitude earthquake occurred in Dali, Yunan Province. 2012.7.27 We collected corresponding social media comments concerning these events from social networks over a 30-day period. These comments tended to be highly integrated and traditionalwith abundant emotional coloring. For example, the number of comments collected over 30 days for Event 1 is shown in Table 3. Table 3. Event 1 Time(day) No.1 No.2 No.3 No.4 No.5 No.6 No.7 No.8 Number 1356 1795 1837 1936 1846 2305 2541 2252 Time No.9 No.10 No.11 No.12 No.13 No.14 No.15 No.16 Number 2071 1803 1595 1502 1396 1203 1181 1063 Time No.17 No.18 No.19 No.20 No.21 No.22 No.23 No.24 Number 936 982 782 657 662 608 573 562 Time No.25 No.26 No.27 No.28 No.29 No.30 Number 441 382 321 309 331 341 Subsequently, the data for these comments were processed, and the statistical totals of the pessimistic public sentiments on Day 1 are shown in Table 4. Table 4. Pessimistic Public Moods on Day 1 for Event 1 X X1 X2 X3 X4 X5 X6 X7 X8 X9 qi 521 637 726 581 672 832 693 825 1 The public psychological pressure H1of the public Event 1 on the firstday can be calculated as follows.  1 1 2 9ln , , , ln(521*637*726*581*672* 832*693*825*1) 52.16 qH q q    For example, the number of comments collected over 30 days for Event 1, Event 2, Event 3 is shown in Table 5.
  • 8. TELKOMNIKA ISSN: 1693-6930  How to Calculate the Public Psychological Pressure in the Social Networks (Rui JIN) 1815 Table 5. Public Events Time(day) No.1 No.2 No.3 No.4 No.5 No.6 No.7 No.8 H1 52.16 54.71 54.08 54.92 54.83 55.52 56.30 55.81 H2 47.81 48.72 49.18 46.82 46.93 44.78 42.93 43.52 H3 33.29 33.92 28.93 24.21 16.83 13.92 12.81 10.38 Time(day) No.9 No.10 No.11 No.12 No.13 No.14 No.15 No.16 H1 56.47 55.92 54.71 53.82 52.06 52.27 51.83 52.01 H2 42.68 42.39 42.01 43.29 41.48 42.82 43.92 42.52 H3 12.28 12.74 10.82 10.77 11.69 10.01 11.92 9.88 Time(day) No.17 No.18 No.19 No.20 No.21 No.22 No.23 No.24 H1 51.93 52.63 52.73 51.39 48.29 45.92 45.83 46.72 H2 42.28 38.58 39.73 38.96 39.72 37.39 36.30 35.93 H3 9.92 8.39 8.38 9.92 10.39 8.82 8.30 7.20 Time(day) No.25 No.26 No.27 No.28 No.29 No.30 H1 42.21 42.93 43.76 42.92 42.02 41.83 H2 36.43 35.72 35.83 36.92 33.62 33.39 H3 6.39 7.30 8.20 6.93 8.36 7.72 Using those data, we can describe the tendency of public psychological pressure over 30 days, as shown in Figures 5. Figure 5. The H values for Event 1, Event 2, and Event 3 6. Conclusion This paper presents a new type of social computing method based on maximum entropy theory. The method has a solid theoretical foundation and can be used to quantitatively analyze uncertain issues using data gathered through social networks. Applying the proposed method the public psychological pressure can be quantitativelycalculated for public information analysis. 7. Acknowledgments Supported by the Major State Basic Research Development Program of China (973 Program) under Grant 2013CB329602; the National Natural Science Foundation of China under Grant No.61202457,No.61472108,No.61402149. References [1] Setiawan Assegaff, H Hendri, Akwan Sunoto, Herti Yani, Desy Kisbiyanti. Social Media Success Model for Knowledge Sharing (Scale Development and Validation). TELKOMNIKA. Telecommunication Computing Electronics and Control. 2017. DOI: http://dx.doi.org/10.12928/telkomnika.v15i3.5569
  • 9.  ISSN: 1693-6930 TELKOMNIKA Vol. 15, No. 4, December 2017 : 1808 – 1816 1816 [2] Louis Y, Asur S, Huberman BA. What Trends in Chinese Social Media. 5th SNA-KDD Workshop’11 (SNA-KDD’11), San Diego, CA, USA. 2011. [3] Social Computing.2016. [URL:http://en.wikipedia.org/wiki/Social_computing]. [4] Lazer D, Pentland A, Adamic L, Aral S, Barabasi AL, Brewer D, Christakis N, Contractor N, Fowler J, Gutmann M, Jebara T, King G, Macy M, Roy D, Van Alstyne M. Social science. Computational social science. Science. 2009; 323(5915): 721-723. [doi:10.1126/science.1167742]. [5] Russell G. Brooker and Todd Schaefer. “Methods of Measuring Public Opinion”. PUBLICOPINION IN THE 21ST CENTURY. 2015. [6] JA Balazs, JD Velásquez, Opinion mining and information fusion: a survey, Inf. Fusion. 2016; (27): 95–110. [7] “Arab Spring”. Available at https://en.wikipedia.org/wiki/Arab_Spring. [8] Khondker, Habibul Haque. Role of the New Media in the Arab Spring. Special Forum on the Arab Revolutions. 2011: 675-679. http://dx.doi.org/10.1080/14747731.2011.621287 [9] DJ Watts, SH Strogatz. “Collective dynamics of ‘small-world’, networks”. Nature. 1998; 393(6684): 440-442. doi: 10.1038/30918. [10] Raimond Y, Abdallah S, Sandler M. The Music Ontology.International Conference on Music Information Retrieval. Austrian Computer Society. 2007: 417-422. [11] Doran RS, M Ismail, TY Lam, E Lutwak R. The Theory of Information and Coding. Cambridge Books Online © Cambridge University Press. 2010. [12] Jaynes ET. Information and statistical mechanics. Physical Review. 1957; 32(1): 3-7. [13] L, XD. The Method Study About Probability Distribution Based On The Principle Of Maximum Entropy. Master Degree Dissertation, North China Electric Power University, Beijing, China. 2008. [14] Aisah Rini Susanti, Taufik Djatna, Wisnu Ananta Kusuma. Twitter’s Sentiment Analysis on Gsm Services using Multinomial Naïve Bayes. TELKOMNIKA Telecommunication Computing Electronics and Control. 2017. DOI: http://dx.doi.org/10.12928/telkomnika.v15i3.4284 [15] Johan Bollen, Huina Mao, Xiaojun Zeng. Twitter mood predicts the stock market. Journal of Computational Science. 2011.