SlideShare a Scribd company logo
1 of 5
Download to read offline
International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-6, June- 2016]
Infogain Publication (Infogainpublication.com) ISSN : 2454-1311
www.ijaems.com Page | 595
A Modified Weight Balanced Algorithm for
Influential Users Community Detection in
Online social Network (OSNs)
Bhupinder Singh1
, Manju Bala2
, Manoj Kumar3
1
Department of Computer Science, CTIEMT, IKG PTU, Jalandhar, Punjab, India
2
Professor, CTIEMT, Jalandhar, Punjab, India
3
Principal, Daviet, Jalandhar, Punjab, India
Abstract—In the modern era online users are increasing
day by day. Different users are using various social
networks in different forms. The behavior and attitude of
the users of social networking sites varies U2U (User to
User). In online social networking users join many
groups and communities as per interests and according to
the groups’/Communities’ influential user. This paper
consist of 7 sections , first section emphasis on
introduction to the community evelotion and community.
Second section signify movement between communities
,third section involve related work about the research..
Fourth section includes Problem Definition and fifth
section involve Methodology (Proposed Algorithm
Process ,Get Community Matrix, Community
detetcion).Sixth section involve Implementation.
Furthermore implementation include Datasets
,Quantitative performance, Graphical Results,
Enhancement in the existing work..Last section include
Conclusion and then references. In this paper,we are
implementing and proposing the community detection in
social media .In the proposed we have deployed a
Longest Chain Subsequence metric for finding the
number of connections to the kernel community.
Keywords—SocialMedia, OSN, Community, U2U,
Evolution, Weight Balanced, greedy approach.
I. INTRODUCTION
In online social network community analysis and
detection is a vast area of research. Many researchers are
working to find the behavior and influence behavior of
communities in OSNs’. Classification, detection and
evolution of communities in a computational sense, seeks
to assign labels to data. Given a set of features for
community, a classifier attempts to assign a label to that
community. The classifier does this by drawing upon
knowledge derived from examples of how other
communities have been labeled. These examples, referred
to as training data, serve as a source of prior knowledge
that the classifier uses to make decisions about previously
unseen communities. Categorization is a specialization of
classification.
It deals with assigning a category to community. Other
classification algorithms may simply make a yes/no
decision based upon inputs, such as a fraud detector that
indicates whether a credit card transaction is fraudulent.
Categorization algorithms place an object in one of a
small set of categories, such as categorizing cars as
coupes, sedans, SUVs, or vans. Many of the concepts we
discuss in this chapter pertain to classification as a whole,
whereas others are more closely related to categorization.
You’ll see some terms used interchangeably. Community
categorization in the sense is to find the community and
to determine its desired level of surviving.
This new type of data mandates new computational data
analysis approaches that can combine social theories with
statistical and data mining methods[14]. The pressing
demand for new techniques ushers in and entails a new
Inter disciplinary field – social media mining. Thus we
have studied the various techniques for community
evolution in the online social media and we are discussing
existing methods in this paper.
II. MOVEMENT BETWEEN COMMUNITIES
Having analyzed the membership and growth of
communities, we have a tendency to currently
intercommunicate the question of however folks and
topics move between communities. A elementary
question here is that the degree to which individuals bring
topics with them from one community to a different,
versus the degree to that topics arise in a very community
and afterward attract folks from alternative communities.
In alternative words, given a collection of overlapping
communities, do topics tend to follow folks, or do folks
tend to follow topics? we have a tendency to conjointly
investigate a connected question: once folks get into a
community square measure they additional or less
doubtless than alternative members of the community to
be participants in current and future “hot topics” of
dialogue therein community?. While these queries square
measure intuitively terribly natural, it's a challenge to
outline sufficiently precise versions of them that we are
able to build quantitative observations.
III. RELATED WORK
A substantial quantity of hardwork has been dedicated to
the task of distinctive and evaluating closely knit
International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-6, June- 2016]
Infogain Publication (Infogainpublication.com) ISSN : 2454-1311
www.ijaems.com Page | 596
communities in giant social networks, most of that is
predicated on the premise that it's a matter of common
expertise that communities exist in these networks. Akrati
Saxena et al. [1] analysed the impact of the topology of a
social network, specifically its meso scale properties-
community structure and core-periphery structure, on a
acculturation traversing over it. we have a tendency to
propose a acculturation propagation model for artificial
scale free graphs .David Burth et al. [2] represented
however process researches have approached this
subject and therefore the strategies accustomed analyse
such systems. supported on a good tho' non-exaustive
review of the literature, a taxonomy is projected to
classify and describe totally different classes of analysis.
Chang Su et al. [3] projected a community detection rule
supported influential nodes. First, we tend to introduce a
way to notice cogent nodes supported stochastic process.
Then we tend to mix the rule with order statistics theory
to seek out community structure. we tend to apply our
rule in 3 classical information sets and compare to
alternative algorithms. Anna Zygmunt et al. [4]
conferred a proper model of social structure with evolving
groups. a brand new rule decisive a life cycle of social
groups and their cores is conferred. supported the
knowledge derived from them, one will - victimization
Social Network Analysis strategies - build a network of
connections between users, that then may be analysed to
seek out influential users and groups that square measure
shaped around them.
Weishu Hu et al. [5] outlined and study a completely
unique community detection drawback that's to find the
hidden community structure in giant social networks
supported their common interests. we tend to observe that
the users usually pay a lot of attention to those users who
share similar interests, that change how to partition the
users into totally different communities per their common
interests. Liaoruo Wang et al. [6] define and explore a
novel problem called community kernel detection in order
to uncover the hidden community structure in large social
networks. They discover that influential users pay closer
attention to those who are moresimilar to them.
Beiming Sun et al. [7] described that abundant endeavor
has been conducted to investigate info from social
networks, as well as finding the influential users. during
this paper, we tend to propose a graph model to represent
the relationships between on-line posts of 1 topic, so as to
spot the influential users . Michael Trusov et al. [8]
mentioned that the success of web social networking sites
depends on the amount and activity levels of their user
members. though users generally have varied connections
to alternative web site members (i.e., “friends”), solely a
fraction of these alleged friends may very well influence a
member’s web site usage. Emilio Ferrara [9] involved
with the analysis of aggregation patterns and social
dynamics occurring among users of the most important
OSN because the date: Facebook. In detail, we tend to
discuss the mesoscopic options of the community
structure of this network, considering the angle of the
communities, that has not nevertheless been studied on
such an oversized scale.
Suhani Grabowicz P et al. [10] mentioned that in trendy
days social network services are popularly utilized in
electronic commerce systems. so as to market the
business, it's fascinating to explore hidden relationships
among users developed on the social network. during this
paper, we tend to outline and study a completely unique
community detection downside that's to get the hidden
community structure in massive social networks
supported their common interests. David R Hunter et al.
[11] present a scientific examination of a true network
information set victimization most chance estimation for
exponential random graph models moreover as new
procedures to judge however well the models match the
determined networks.
Salvatore Catanese et al. [12] given access to information
regarding Facebook users and their friendly relationship
relations. For this they noninheritable the mandatory
info directly from the side of the web site, so as to
reconstruct a sub graph representing anonymous
interconnections among a big set of users. Author
delineate impromptu, privacy-compliant crawler for
Facebook information extraction. Pasquale American
state Meo et al. [13] explained to work out whether or not
2 distinct users may be thought of similar. during this the
authors planned AN approach so as to estimate the
similarity of 2 users supported the information of social
ties (i.e., common friends and teams of users) existing
among users, and therefore the analysis of activities (i.e.,
social events) during which users area unit concerned.
IV. PROBLEM DEFINITION
The basic structure of social area network in community
detection is categorized in two tasks. Initial step begins
with the identification and extraction of influential kernel
members. The second step is to identify the
corresponding structure of the community kernels. The
problem arises in detection of the exact structure among
the influential kernel members and auxiliary
communities. Most of the conventional algorithms ignore
the link among the auxiliary communities and community
kernels, resulting in failure to distinguish among them.
The overlapping of the communities drops the actual
structure of the community. Although, in order to
distinguish the kernel members, the Page rank and
conductance based algorithm are designed that utilizes the
link information. However, the link information among
the auxiliary and kernel members are ignored finding the
community kernels. Most importantly, the growing
vertices of the network must be addressed developing
robust algorithm with large scalability.
The problem of community detection has many smart
applications, yet as representative user finding, friend
recommendation, network visual image, and marketing.
However, this drawback is non-trivial and poses a group
of challenges. First, it's hard to identify the extremely
potent users.
International Journal of Advanced Engineering, Management and Science (IJAEMS)
Infogain Publication (Infogainpublication.com
www.ijaems.com
V. METHODOLGY
Proposed Algorithm Process
Fig 1: shows flowchart of Proposed Algorithm Process
Compute size of the data
Set initial communities with one node per community
Initialize best community to current value
Compute initial community matrix
Lines and columns sum (speed optimisation)
Compute Best variation
For all the pairs of nodes that could be merged
If they share
edges
If best variation, then keep track of
the pair
Compute the
variation
if i==1 && j==1
dQ = 2 * (communityMat(i,j) - ls(i)*cs(j));
Merge the pair of clusters maximising proximity
Update community matrix
Update lines/colums sum
Update value
If new value is better, save current partition
International Journal of Advanced Engineering, Management and Science (IJAEMS)
Infogainpublication.com)
ETHODOLGY
Proposed Algorithm Process
1: shows flowchart of Proposed Algorithm Process
Get Community
Fig 2: shows flowchart of Adjacent Matrix
Community Detection
Fig 3: shows flowchart of community detection
VI. IMPLEMENTATION
Datasets[15] :- Our experiments are conducted on two
facebook datasets. Facebook data was collected from
survey participants using third party facebook app such as
social circles. The dataset includes node features
(profiles), circles, and ego networks.
Quantitative performance.
and F1-score to evaluate existing techniqu
proposed Algorithm Technique.
Fig 4: Feature construction
We need to compute the size of data.
communities with one node per community
community to current value. Compute initial community
Set initial communities with one node per community
e best community to current value
Compute initial community matrix
Lines and columns sum (speed optimisation)
of nodes that could be merged
If best variation, then keep track of
proximity
If new value is better, save current partition
Number of communities
Initialise adjacency matrix list
Create edges and normalise values by dividing by the sum of
all edges.
Input Data set
Applying existing approach for community Detection
Applying proposed approach for community Detection
Extract Community
[Vol-2, Issue-6, June- 2016]
ISSN : 2454-1311
Page | 597
Community Matrix
2: shows flowchart of Adjacent Matrix
Community Detection
3: shows flowchart of community detection
IMPLEMENTATION
Our experiments are conducted on two
Facebook data was collected from
survey participants using third party facebook app such as
social circles. The dataset includes node features
(profiles), circles, and ego networks.
Quantitative performance. We use Precision, Recall,
score to evaluate existing techniques with our
proposed Algorithm Technique.
: Feature construction[6]
We need to compute the size of data. Set initial
communities with one node per community. Initialise best
community to current value. Compute initial community
Number of communities
Initialise adjacency matrix list
Create edges and normalise values by dividing by the sum of
Input Data set
Applying existing approach for community Detection
Applying proposed approach for community Detection
Extract Community
International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-6, June- 2016]
Infogain Publication (Infogainpublication.com) ISSN : 2454-1311
www.ijaems.com Page | 598
matrix. Lines and columns sum (speed optimisation) .
Initialise best known and current Q values.
curQVal=trace(communityMat)-
sum(sum(communityMat^2));
Loop until no more aggregation is possible.Compute Best
Q variation. For all the pairs of nodes that could be
merged. If they share edges,then Compute the variation in
Q. If best variation, then keep track of the pair. Then
Merge the pair of clusters maximising Q. Update
community matrix. Update lines/colums sum. Further
Update the value. If new Q is better, save current
partition.
Graphical Results:-
Fig. 5: Detection of Community 1 (Facebook Data) :
Existing
Fig. 5: Detection of Community 2 (Facebook Data) :
Existing
Fig. 6: Detection of Community (Facebook Data) :
Proposed
Enhancements in Existing Work
The existing method works on two algorithms Greedy
Algorithm and Weight-Balanced Algorithm (WEBA). The
greedy algorithm works on finding the maximum distance
from a given set of vertices to other connections. The
process is repeated for every vertex from the vertex set in
the graph. The vertex having maximum number of degree
is selected as community head. However, the greedy
algorithm does not consider the link among auxiliary
members and kernel members. In the WEBA algorithm, a
weight measure is associated with each kernel community
followed by optimization for finding the exact kernel
structure and auxiliary kernels. However, in such
algorithm, the small communities’ having less number of
connections has a lower priority value and never gets
identified.
In the proposed we have deployed a Longest Chain
Subsequence metric for finding the number of
connections to the kernel community. The method
performs grouping the communities based on LCSS
metric. Despite of considering only the maximum value,
the algorithm considers the new connections as well as
the overlapped connections for a particular community.
This results in better identification of the kernel
communities as well as the auxiliary communities intact.
The proposed method performs the distance measure with
the Longest Chain Sub Sequences (LCSS) metric defined
as.
( ) ( )
( ) ( ) ji
ji
jiji
jijiij
yifx
yifx
andjifi
YXLCSYXLCS
YXLCSYXLCSd
≠
=
==





==
−−
−−
00
),,,max(
,,
11
11
φ
Fig. 7: show Longest Chain Sub Sequences (LCSS) metric
VI. CONCLUSION
Now it s clear that communities in OSN are playing a
vital role and the users of communities are changing their
role as per community behavior. If the community is
demising then its directly meaning that its users are
leaving that particular community and if the users are
joining the community then it is clear that particular
community will grow in future. Various methods are user
to find the community structure and the analytical
behavior. In future work can be extended to find the
spatial information of the user as well as to the
community in social network. For future work, we would
like to explore the dynamic behavior of community
kernels and their auxiliary communities.We are interested
in how community kernels take shape and evolve over
time. In addition, we would like to combine link and
content information in our problem definition and
algorithm design for practical applications, such as query
dependent community detection. Inspite of assuming the
International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-6, June- 2016]
Infogain Publication (Infogainpublication.com) ISSN : 2454-1311
www.ijaems.com Page | 599
utmost price, the algorithmic program considers the new
connections yet because the overlapped connections for a
selected community. This ends up in higher identification
of the kernel communities yet because the auxiliary
communities intact.
REFERENCES
[1] Akrati Saxena,S.R.S.Iyengar,YayatiGupta,
“Understanding Spreading Patterns on Social
Networks Based on Network Topology”,
arXiv:1505.00457v1 [cs.SI] , May 2015
[2] David Burth Kurka, Alan Godoy, Fernando J. Von
Zuben, “Online Social Network Analysis: A Survey
of Research Applications in Computer Science”,
arXiv:1504.05655v1 [cs.SI] , Apr 2015
[3] Chang Su, Yukun Wang , Lan Zhang “Community
Detection in Social Networks Based on Influential
Nodes ”, Journal of Software, VOL. 9, NO. 9,
September 2014
[4] Anna Zygmunt, Jarosław Ko´zlak, Edward
Nawarecki, Adam Mika, “Determining life cycles of
evolving groups”, AGH University of Science and
Technology, Al. Mickiewicza VOL.35, PP.1102-
1111 Krak´ow, Poland August ,2014
[5] Weishu Hu, Zhiguo Gong, Leong Hou U and Jingzhi
Guo, “Identifying influential user communities on
the social network ”,Department of Computer and
Information Science, Faculty of Science and
Technology, University of Macau, Macao, China,
2013 Taylor & Francis.
[6] Liaoruo Wang, Tiancheng Lou, Jie Tang and John
E. Hopcroft, “Detecting Community Kernels in
Large Social Networks”, ICDM '11 Proceedings of
the 2011 IEEE 11th International Conference on
Data Mining PP. 784-793 ISBN: 978-0-7695-4408-3
[7] Beiming Sun, Vincent TY Ng, “Identifying
Influential Users by Their Postings in Social
Networks”, MSM’12, June 25, 2012, Milwaukee,
Wisconsin, USA. Copyright 2012 ACM 978-1-
4503-1402-2/12/06
[8] Michael Trusov, Anand V.Bodapati, and Randolph
E.Bulkin, “Determining Influential Users in Internet
Social Networks”, Journal of Marketing Research
VOL. XLVII (August 2010), 643–658
[9] Emilio Ferrara, “A large-scale community structure
analysis in Facebook”,Ferrara EPJ Data Science
2012, 1:9
[10]Suhani Grabowicz P, Ramasco J, José J.
Ramasco ,Esteban Moro,Josep M. Pujol, Victor M.
Eguiluz, “Social features of online networks: the
strength of intermediary ties in online social media”,
PLoS ONE 7(1):
e29358.doi:10.1371/journal.pone.0029358,2012
[11]Hunter D, Goodreau S, Handcock M, “Goodness of
fit of social network models”, J Am Stat Assoc
103(481):248-258, 2008.
[12]Salvatore A. Catanese, Pasquale De Meo , Emilio
Ferrara, Giacomo Fiumara, Alessandro
Provetti,“Crawling Facebook for Social Network
Analysis Purposes”, WIMS’11, May 25-27, 2011
Sogndal, Norway
[13]Pasquale De Meo a, Emilio Ferrara b,a, Giacomo
Fiumara a, Alessandro Provetti a,c, “Mixing local
and global information for community detection in
large networks,”, Journal of Computer and System
Sciences VOL. 80 (1), PP.72-87
[14]Manju Bala, Manoj Kumar, Bhupinder Singh,
“Socia Media Evolution and Detection of influential
Community Users in online Social Networks
(OSNs)”, ICACSET 2016 - Singapore on April 14 -
15, 2016
[15]https://snap.stanford.edu/data/

More Related Content

What's hot

Making the invisible visible through SNA
Making the invisible visible through SNAMaking the invisible visible through SNA
Making the invisible visible through SNAMYRA School of Business
 
Current trends of opinion mining and sentiment analysis in social networks
Current trends of opinion mining and sentiment analysis in social networksCurrent trends of opinion mining and sentiment analysis in social networks
Current trends of opinion mining and sentiment analysis in social networkseSAT Publishing House
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)theijes
 
Online social network mining current trends and research issues
Online social network mining current trends and research issuesOnline social network mining current trends and research issues
Online social network mining current trends and research issueseSAT Publishing House
 
Social Network Analysis
Social Network AnalysisSocial Network Analysis
Social Network AnalysisScott Gomer
 
Social network analysis & Big Data - Telecommunications and more
Social network analysis & Big Data - Telecommunications and moreSocial network analysis & Big Data - Telecommunications and more
Social network analysis & Big Data - Telecommunications and moreWael Elrifai
 
01 Introduction to Networks Methods and Measures
01 Introduction to Networks Methods and Measures01 Introduction to Networks Methods and Measures
01 Introduction to Networks Methods and Measuresdnac
 
Social networkanalysisfinal
Social networkanalysisfinalSocial networkanalysisfinal
Social networkanalysisfinalkcarter14
 
Did we become a community - A Literature Review
Did we become a community - A Literature ReviewDid we become a community - A Literature Review
Did we become a community - A Literature ReviewSu-Tuan Lulee
 
00 Introduction to SN&H: Key Concepts and Overview
00 Introduction to SN&H: Key Concepts and Overview00 Introduction to SN&H: Key Concepts and Overview
00 Introduction to SN&H: Key Concepts and OverviewDuke Network Analysis Center
 
2007-JOSS-Visualizing the signatures of social roles in online discussion groups
2007-JOSS-Visualizing the signatures of social roles in online discussion groups2007-JOSS-Visualizing the signatures of social roles in online discussion groups
2007-JOSS-Visualizing the signatures of social roles in online discussion groupsMarc Smith
 
Social Network Analysis
Social Network AnalysisSocial Network Analysis
Social Network AnalysisFred Stutzman
 
Mining and Analyzing Academic Social Networks
Mining and Analyzing Academic Social NetworksMining and Analyzing Academic Social Networks
Mining and Analyzing Academic Social NetworksEditor IJCATR
 
Social Network Analysis power point presentation
Social Network Analysis power point presentation Social Network Analysis power point presentation
Social Network Analysis power point presentation Ratnesh Shah
 
STRUCTURAL COUPLING IN WEB 2.0 APPLICATIONS
STRUCTURAL COUPLING IN WEB 2.0 APPLICATIONSSTRUCTURAL COUPLING IN WEB 2.0 APPLICATIONS
STRUCTURAL COUPLING IN WEB 2.0 APPLICATIONSijcsit
 

What's hot (20)

05 Network Canvas (2017)
05 Network Canvas (2017)05 Network Canvas (2017)
05 Network Canvas (2017)
 
Social network analysis
Social network analysisSocial network analysis
Social network analysis
 
02 Descriptive Statistics (2017)
02 Descriptive Statistics (2017)02 Descriptive Statistics (2017)
02 Descriptive Statistics (2017)
 
Making the invisible visible through SNA
Making the invisible visible through SNAMaking the invisible visible through SNA
Making the invisible visible through SNA
 
Current trends of opinion mining and sentiment analysis in social networks
Current trends of opinion mining and sentiment analysis in social networksCurrent trends of opinion mining and sentiment analysis in social networks
Current trends of opinion mining and sentiment analysis in social networks
 
03 Communities in Networks (2017)
03 Communities in Networks (2017)03 Communities in Networks (2017)
03 Communities in Networks (2017)
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
 
Online social network mining current trends and research issues
Online social network mining current trends and research issuesOnline social network mining current trends and research issues
Online social network mining current trends and research issues
 
Social Network Analysis
Social Network AnalysisSocial Network Analysis
Social Network Analysis
 
Social network analysis & Big Data - Telecommunications and more
Social network analysis & Big Data - Telecommunications and moreSocial network analysis & Big Data - Telecommunications and more
Social network analysis & Big Data - Telecommunications and more
 
01 Introduction to Networks Methods and Measures
01 Introduction to Networks Methods and Measures01 Introduction to Networks Methods and Measures
01 Introduction to Networks Methods and Measures
 
Social networkanalysisfinal
Social networkanalysisfinalSocial networkanalysisfinal
Social networkanalysisfinal
 
Did we become a community - A Literature Review
Did we become a community - A Literature ReviewDid we become a community - A Literature Review
Did we become a community - A Literature Review
 
00 Introduction to SN&H: Key Concepts and Overview
00 Introduction to SN&H: Key Concepts and Overview00 Introduction to SN&H: Key Concepts and Overview
00 Introduction to SN&H: Key Concepts and Overview
 
2007-JOSS-Visualizing the signatures of social roles in online discussion groups
2007-JOSS-Visualizing the signatures of social roles in online discussion groups2007-JOSS-Visualizing the signatures of social roles in online discussion groups
2007-JOSS-Visualizing the signatures of social roles in online discussion groups
 
Social Network Analysis
Social Network AnalysisSocial Network Analysis
Social Network Analysis
 
04 Data Visualization (2017)
04 Data Visualization (2017)04 Data Visualization (2017)
04 Data Visualization (2017)
 
Mining and Analyzing Academic Social Networks
Mining and Analyzing Academic Social NetworksMining and Analyzing Academic Social Networks
Mining and Analyzing Academic Social Networks
 
Social Network Analysis power point presentation
Social Network Analysis power point presentation Social Network Analysis power point presentation
Social Network Analysis power point presentation
 
STRUCTURAL COUPLING IN WEB 2.0 APPLICATIONS
STRUCTURAL COUPLING IN WEB 2.0 APPLICATIONSSTRUCTURAL COUPLING IN WEB 2.0 APPLICATIONS
STRUCTURAL COUPLING IN WEB 2.0 APPLICATIONS
 

Similar to a modified weight balanced algorithm for influential users community detection in online social network (os ns)

Multimode network based efficient and scalable learning of collective behavior
Multimode network based efficient and scalable learning of collective behaviorMultimode network based efficient and scalable learning of collective behavior
Multimode network based efficient and scalable learning of collective behaviorIAEME Publication
 
Networking Portfolio Term Paper
Networking Portfolio Term PaperNetworking Portfolio Term Paper
Networking Portfolio Term PaperWriters Per Hour
 
2006 hicss - you are who you talk to - detecting roles in usenet newsgroups
2006   hicss - you are who you talk to - detecting roles in usenet newsgroups2006   hicss - you are who you talk to - detecting roles in usenet newsgroups
2006 hicss - you are who you talk to - detecting roles in usenet newsgroupsMarc Smith
 
2009-Social computing-Analyzing social media networks
2009-Social computing-Analyzing social media networks2009-Social computing-Analyzing social media networks
2009-Social computing-Analyzing social media networksMarc Smith
 
A topology based approach twittersdlfkjsdlkfj
A topology based approach twittersdlfkjsdlkfjA topology based approach twittersdlfkjsdlkfj
A topology based approach twittersdlfkjsdlkfjKunal Mittal
 
1999 ACM SIGCHI - Counting on Community in Cyberspace
1999   ACM SIGCHI - Counting on Community in Cyberspace1999   ACM SIGCHI - Counting on Community in Cyberspace
1999 ACM SIGCHI - Counting on Community in CyberspaceMarc Smith
 
Multi agent paradigm for cognitive parameter based feature similarity for soc...
Multi agent paradigm for cognitive parameter based feature similarity for soc...Multi agent paradigm for cognitive parameter based feature similarity for soc...
Multi agent paradigm for cognitive parameter based feature similarity for soc...eSAT Journals
 
Multi agent paradigm for cognitive parameter based feature similarity for soc...
Multi agent paradigm for cognitive parameter based feature similarity for soc...Multi agent paradigm for cognitive parameter based feature similarity for soc...
Multi agent paradigm for cognitive parameter based feature similarity for soc...eSAT Publishing House
 
Towards a hybrid recommendation approach using a community detection and eval...
Towards a hybrid recommendation approach using a community detection and eval...Towards a hybrid recommendation approach using a community detection and eval...
Towards a hybrid recommendation approach using a community detection and eval...IJECEIAES
 
02 Introduction to Social Networks and Health: Key Concepts and Overview
02 Introduction to Social Networks and Health: Key Concepts and Overview02 Introduction to Social Networks and Health: Key Concepts and Overview
02 Introduction to Social Networks and Health: Key Concepts and OverviewDuke Network Analysis Center
 
Investigating the process from needs to connect to active participation in on...
Investigating the process from needs to connect to active participation in on...Investigating the process from needs to connect to active participation in on...
Investigating the process from needs to connect to active participation in on...lucymark
 
Social Networking Facebook My Space
Social Networking Facebook My SpaceSocial Networking Facebook My Space
Social Networking Facebook My Spaceannesunita
 
Are You Feeling Lonely The Impact ofRelationship Characteri.docx
Are You Feeling Lonely The Impact ofRelationship Characteri.docxAre You Feeling Lonely The Impact ofRelationship Characteri.docx
Are You Feeling Lonely The Impact ofRelationship Characteri.docxrossskuddershamus
 
Stabilization of Black Cotton Soil with Red Mud and Formulation of Linear Reg...
Stabilization of Black Cotton Soil with Red Mud and Formulation of Linear Reg...Stabilization of Black Cotton Soil with Red Mud and Formulation of Linear Reg...
Stabilization of Black Cotton Soil with Red Mud and Formulation of Linear Reg...IRJET Journal
 
The Impacts of Social Networking and Its Analysis
The Impacts of Social Networking and Its AnalysisThe Impacts of Social Networking and Its Analysis
The Impacts of Social Networking and Its AnalysisIJMER
 

Similar to a modified weight balanced algorithm for influential users community detection in online social network (os ns) (20)

Multimode network based efficient and scalable learning of collective behavior
Multimode network based efficient and scalable learning of collective behaviorMultimode network based efficient and scalable learning of collective behavior
Multimode network based efficient and scalable learning of collective behavior
 
Networking Portfolio Term Paper
Networking Portfolio Term PaperNetworking Portfolio Term Paper
Networking Portfolio Term Paper
 
10.2307@3487236
10.2307@348723610.2307@3487236
10.2307@3487236
 
2006 hicss - you are who you talk to - detecting roles in usenet newsgroups
2006   hicss - you are who you talk to - detecting roles in usenet newsgroups2006   hicss - you are who you talk to - detecting roles in usenet newsgroups
2006 hicss - you are who you talk to - detecting roles in usenet newsgroups
 
2009-Social computing-Analyzing social media networks
2009-Social computing-Analyzing social media networks2009-Social computing-Analyzing social media networks
2009-Social computing-Analyzing social media networks
 
A topology based approach twittersdlfkjsdlkfj
A topology based approach twittersdlfkjsdlkfjA topology based approach twittersdlfkjsdlkfj
A topology based approach twittersdlfkjsdlkfj
 
Internet
InternetInternet
Internet
 
Internet
InternetInternet
Internet
 
1999 ACM SIGCHI - Counting on Community in Cyberspace
1999   ACM SIGCHI - Counting on Community in Cyberspace1999   ACM SIGCHI - Counting on Community in Cyberspace
1999 ACM SIGCHI - Counting on Community in Cyberspace
 
Multi agent paradigm for cognitive parameter based feature similarity for soc...
Multi agent paradigm for cognitive parameter based feature similarity for soc...Multi agent paradigm for cognitive parameter based feature similarity for soc...
Multi agent paradigm for cognitive parameter based feature similarity for soc...
 
Multi agent paradigm for cognitive parameter based feature similarity for soc...
Multi agent paradigm for cognitive parameter based feature similarity for soc...Multi agent paradigm for cognitive parameter based feature similarity for soc...
Multi agent paradigm for cognitive parameter based feature similarity for soc...
 
Towards a hybrid recommendation approach using a community detection and eval...
Towards a hybrid recommendation approach using a community detection and eval...Towards a hybrid recommendation approach using a community detection and eval...
Towards a hybrid recommendation approach using a community detection and eval...
 
02 Introduction to Social Networks and Health: Key Concepts and Overview
02 Introduction to Social Networks and Health: Key Concepts and Overview02 Introduction to Social Networks and Health: Key Concepts and Overview
02 Introduction to Social Networks and Health: Key Concepts and Overview
 
Investigating the process from needs to connect to active participation in on...
Investigating the process from needs to connect to active participation in on...Investigating the process from needs to connect to active participation in on...
Investigating the process from needs to connect to active participation in on...
 
B1803020915
B1803020915B1803020915
B1803020915
 
Social Networking Facebook My Space
Social Networking Facebook My SpaceSocial Networking Facebook My Space
Social Networking Facebook My Space
 
Are You Feeling Lonely The Impact ofRelationship Characteri.docx
Are You Feeling Lonely The Impact ofRelationship Characteri.docxAre You Feeling Lonely The Impact ofRelationship Characteri.docx
Are You Feeling Lonely The Impact ofRelationship Characteri.docx
 
Stabilization of Black Cotton Soil with Red Mud and Formulation of Linear Reg...
Stabilization of Black Cotton Soil with Red Mud and Formulation of Linear Reg...Stabilization of Black Cotton Soil with Red Mud and Formulation of Linear Reg...
Stabilization of Black Cotton Soil with Red Mud and Formulation of Linear Reg...
 
Q046049397
Q046049397Q046049397
Q046049397
 
The Impacts of Social Networking and Its Analysis
The Impacts of Social Networking and Its AnalysisThe Impacts of Social Networking and Its Analysis
The Impacts of Social Networking and Its Analysis
 

Recently uploaded

fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptAfnanAhmad53
 
Post office management system project ..pdf
Post office management system project ..pdfPost office management system project ..pdf
Post office management system project ..pdfKamal Acharya
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiessarkmank1
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdfKamal Acharya
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxMustafa Ahmed
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...Amil baba
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxWorksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxMustafa Ahmed
 
Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)ChandrakantDivate1
 
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...ssuserdfc773
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsvanyagupta248
 
👉 Yavatmal Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Girl S...
👉 Yavatmal Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Girl S...👉 Yavatmal Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Girl S...
👉 Yavatmal Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Girl S...manju garg
 
Query optimization and processing for advanced database systems
Query optimization and processing for advanced database systemsQuery optimization and processing for advanced database systems
Query optimization and processing for advanced database systemsmeharikiros2
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdfAldoGarca30
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"mphochane1998
 

Recently uploaded (20)

fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .ppt
 
Post office management system project ..pdf
Post office management system project ..pdfPost office management system project ..pdf
Post office management system project ..pdf
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptx
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Signal Processing and Linear System Analysis
Signal Processing and Linear System AnalysisSignal Processing and Linear System Analysis
Signal Processing and Linear System Analysis
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxWorksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptx
 
Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)
 
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
👉 Yavatmal Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Girl S...
👉 Yavatmal Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Girl S...👉 Yavatmal Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Girl S...
👉 Yavatmal Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Girl S...
 
Query optimization and processing for advanced database systems
Query optimization and processing for advanced database systemsQuery optimization and processing for advanced database systems
Query optimization and processing for advanced database systems
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 

a modified weight balanced algorithm for influential users community detection in online social network (os ns)

  • 1. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-6, June- 2016] Infogain Publication (Infogainpublication.com) ISSN : 2454-1311 www.ijaems.com Page | 595 A Modified Weight Balanced Algorithm for Influential Users Community Detection in Online social Network (OSNs) Bhupinder Singh1 , Manju Bala2 , Manoj Kumar3 1 Department of Computer Science, CTIEMT, IKG PTU, Jalandhar, Punjab, India 2 Professor, CTIEMT, Jalandhar, Punjab, India 3 Principal, Daviet, Jalandhar, Punjab, India Abstract—In the modern era online users are increasing day by day. Different users are using various social networks in different forms. The behavior and attitude of the users of social networking sites varies U2U (User to User). In online social networking users join many groups and communities as per interests and according to the groups’/Communities’ influential user. This paper consist of 7 sections , first section emphasis on introduction to the community evelotion and community. Second section signify movement between communities ,third section involve related work about the research.. Fourth section includes Problem Definition and fifth section involve Methodology (Proposed Algorithm Process ,Get Community Matrix, Community detetcion).Sixth section involve Implementation. Furthermore implementation include Datasets ,Quantitative performance, Graphical Results, Enhancement in the existing work..Last section include Conclusion and then references. In this paper,we are implementing and proposing the community detection in social media .In the proposed we have deployed a Longest Chain Subsequence metric for finding the number of connections to the kernel community. Keywords—SocialMedia, OSN, Community, U2U, Evolution, Weight Balanced, greedy approach. I. INTRODUCTION In online social network community analysis and detection is a vast area of research. Many researchers are working to find the behavior and influence behavior of communities in OSNs’. Classification, detection and evolution of communities in a computational sense, seeks to assign labels to data. Given a set of features for community, a classifier attempts to assign a label to that community. The classifier does this by drawing upon knowledge derived from examples of how other communities have been labeled. These examples, referred to as training data, serve as a source of prior knowledge that the classifier uses to make decisions about previously unseen communities. Categorization is a specialization of classification. It deals with assigning a category to community. Other classification algorithms may simply make a yes/no decision based upon inputs, such as a fraud detector that indicates whether a credit card transaction is fraudulent. Categorization algorithms place an object in one of a small set of categories, such as categorizing cars as coupes, sedans, SUVs, or vans. Many of the concepts we discuss in this chapter pertain to classification as a whole, whereas others are more closely related to categorization. You’ll see some terms used interchangeably. Community categorization in the sense is to find the community and to determine its desired level of surviving. This new type of data mandates new computational data analysis approaches that can combine social theories with statistical and data mining methods[14]. The pressing demand for new techniques ushers in and entails a new Inter disciplinary field – social media mining. Thus we have studied the various techniques for community evolution in the online social media and we are discussing existing methods in this paper. II. MOVEMENT BETWEEN COMMUNITIES Having analyzed the membership and growth of communities, we have a tendency to currently intercommunicate the question of however folks and topics move between communities. A elementary question here is that the degree to which individuals bring topics with them from one community to a different, versus the degree to that topics arise in a very community and afterward attract folks from alternative communities. In alternative words, given a collection of overlapping communities, do topics tend to follow folks, or do folks tend to follow topics? we have a tendency to conjointly investigate a connected question: once folks get into a community square measure they additional or less doubtless than alternative members of the community to be participants in current and future “hot topics” of dialogue therein community?. While these queries square measure intuitively terribly natural, it's a challenge to outline sufficiently precise versions of them that we are able to build quantitative observations. III. RELATED WORK A substantial quantity of hardwork has been dedicated to the task of distinctive and evaluating closely knit
  • 2. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-6, June- 2016] Infogain Publication (Infogainpublication.com) ISSN : 2454-1311 www.ijaems.com Page | 596 communities in giant social networks, most of that is predicated on the premise that it's a matter of common expertise that communities exist in these networks. Akrati Saxena et al. [1] analysed the impact of the topology of a social network, specifically its meso scale properties- community structure and core-periphery structure, on a acculturation traversing over it. we have a tendency to propose a acculturation propagation model for artificial scale free graphs .David Burth et al. [2] represented however process researches have approached this subject and therefore the strategies accustomed analyse such systems. supported on a good tho' non-exaustive review of the literature, a taxonomy is projected to classify and describe totally different classes of analysis. Chang Su et al. [3] projected a community detection rule supported influential nodes. First, we tend to introduce a way to notice cogent nodes supported stochastic process. Then we tend to mix the rule with order statistics theory to seek out community structure. we tend to apply our rule in 3 classical information sets and compare to alternative algorithms. Anna Zygmunt et al. [4] conferred a proper model of social structure with evolving groups. a brand new rule decisive a life cycle of social groups and their cores is conferred. supported the knowledge derived from them, one will - victimization Social Network Analysis strategies - build a network of connections between users, that then may be analysed to seek out influential users and groups that square measure shaped around them. Weishu Hu et al. [5] outlined and study a completely unique community detection drawback that's to find the hidden community structure in giant social networks supported their common interests. we tend to observe that the users usually pay a lot of attention to those users who share similar interests, that change how to partition the users into totally different communities per their common interests. Liaoruo Wang et al. [6] define and explore a novel problem called community kernel detection in order to uncover the hidden community structure in large social networks. They discover that influential users pay closer attention to those who are moresimilar to them. Beiming Sun et al. [7] described that abundant endeavor has been conducted to investigate info from social networks, as well as finding the influential users. during this paper, we tend to propose a graph model to represent the relationships between on-line posts of 1 topic, so as to spot the influential users . Michael Trusov et al. [8] mentioned that the success of web social networking sites depends on the amount and activity levels of their user members. though users generally have varied connections to alternative web site members (i.e., “friends”), solely a fraction of these alleged friends may very well influence a member’s web site usage. Emilio Ferrara [9] involved with the analysis of aggregation patterns and social dynamics occurring among users of the most important OSN because the date: Facebook. In detail, we tend to discuss the mesoscopic options of the community structure of this network, considering the angle of the communities, that has not nevertheless been studied on such an oversized scale. Suhani Grabowicz P et al. [10] mentioned that in trendy days social network services are popularly utilized in electronic commerce systems. so as to market the business, it's fascinating to explore hidden relationships among users developed on the social network. during this paper, we tend to outline and study a completely unique community detection downside that's to get the hidden community structure in massive social networks supported their common interests. David R Hunter et al. [11] present a scientific examination of a true network information set victimization most chance estimation for exponential random graph models moreover as new procedures to judge however well the models match the determined networks. Salvatore Catanese et al. [12] given access to information regarding Facebook users and their friendly relationship relations. For this they noninheritable the mandatory info directly from the side of the web site, so as to reconstruct a sub graph representing anonymous interconnections among a big set of users. Author delineate impromptu, privacy-compliant crawler for Facebook information extraction. Pasquale American state Meo et al. [13] explained to work out whether or not 2 distinct users may be thought of similar. during this the authors planned AN approach so as to estimate the similarity of 2 users supported the information of social ties (i.e., common friends and teams of users) existing among users, and therefore the analysis of activities (i.e., social events) during which users area unit concerned. IV. PROBLEM DEFINITION The basic structure of social area network in community detection is categorized in two tasks. Initial step begins with the identification and extraction of influential kernel members. The second step is to identify the corresponding structure of the community kernels. The problem arises in detection of the exact structure among the influential kernel members and auxiliary communities. Most of the conventional algorithms ignore the link among the auxiliary communities and community kernels, resulting in failure to distinguish among them. The overlapping of the communities drops the actual structure of the community. Although, in order to distinguish the kernel members, the Page rank and conductance based algorithm are designed that utilizes the link information. However, the link information among the auxiliary and kernel members are ignored finding the community kernels. Most importantly, the growing vertices of the network must be addressed developing robust algorithm with large scalability. The problem of community detection has many smart applications, yet as representative user finding, friend recommendation, network visual image, and marketing. However, this drawback is non-trivial and poses a group of challenges. First, it's hard to identify the extremely potent users.
  • 3. International Journal of Advanced Engineering, Management and Science (IJAEMS) Infogain Publication (Infogainpublication.com www.ijaems.com V. METHODOLGY Proposed Algorithm Process Fig 1: shows flowchart of Proposed Algorithm Process Compute size of the data Set initial communities with one node per community Initialize best community to current value Compute initial community matrix Lines and columns sum (speed optimisation) Compute Best variation For all the pairs of nodes that could be merged If they share edges If best variation, then keep track of the pair Compute the variation if i==1 && j==1 dQ = 2 * (communityMat(i,j) - ls(i)*cs(j)); Merge the pair of clusters maximising proximity Update community matrix Update lines/colums sum Update value If new value is better, save current partition International Journal of Advanced Engineering, Management and Science (IJAEMS) Infogainpublication.com) ETHODOLGY Proposed Algorithm Process 1: shows flowchart of Proposed Algorithm Process Get Community Fig 2: shows flowchart of Adjacent Matrix Community Detection Fig 3: shows flowchart of community detection VI. IMPLEMENTATION Datasets[15] :- Our experiments are conducted on two facebook datasets. Facebook data was collected from survey participants using third party facebook app such as social circles. The dataset includes node features (profiles), circles, and ego networks. Quantitative performance. and F1-score to evaluate existing techniqu proposed Algorithm Technique. Fig 4: Feature construction We need to compute the size of data. communities with one node per community community to current value. Compute initial community Set initial communities with one node per community e best community to current value Compute initial community matrix Lines and columns sum (speed optimisation) of nodes that could be merged If best variation, then keep track of proximity If new value is better, save current partition Number of communities Initialise adjacency matrix list Create edges and normalise values by dividing by the sum of all edges. Input Data set Applying existing approach for community Detection Applying proposed approach for community Detection Extract Community [Vol-2, Issue-6, June- 2016] ISSN : 2454-1311 Page | 597 Community Matrix 2: shows flowchart of Adjacent Matrix Community Detection 3: shows flowchart of community detection IMPLEMENTATION Our experiments are conducted on two Facebook data was collected from survey participants using third party facebook app such as social circles. The dataset includes node features (profiles), circles, and ego networks. Quantitative performance. We use Precision, Recall, score to evaluate existing techniques with our proposed Algorithm Technique. : Feature construction[6] We need to compute the size of data. Set initial communities with one node per community. Initialise best community to current value. Compute initial community Number of communities Initialise adjacency matrix list Create edges and normalise values by dividing by the sum of Input Data set Applying existing approach for community Detection Applying proposed approach for community Detection Extract Community
  • 4. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-6, June- 2016] Infogain Publication (Infogainpublication.com) ISSN : 2454-1311 www.ijaems.com Page | 598 matrix. Lines and columns sum (speed optimisation) . Initialise best known and current Q values. curQVal=trace(communityMat)- sum(sum(communityMat^2)); Loop until no more aggregation is possible.Compute Best Q variation. For all the pairs of nodes that could be merged. If they share edges,then Compute the variation in Q. If best variation, then keep track of the pair. Then Merge the pair of clusters maximising Q. Update community matrix. Update lines/colums sum. Further Update the value. If new Q is better, save current partition. Graphical Results:- Fig. 5: Detection of Community 1 (Facebook Data) : Existing Fig. 5: Detection of Community 2 (Facebook Data) : Existing Fig. 6: Detection of Community (Facebook Data) : Proposed Enhancements in Existing Work The existing method works on two algorithms Greedy Algorithm and Weight-Balanced Algorithm (WEBA). The greedy algorithm works on finding the maximum distance from a given set of vertices to other connections. The process is repeated for every vertex from the vertex set in the graph. The vertex having maximum number of degree is selected as community head. However, the greedy algorithm does not consider the link among auxiliary members and kernel members. In the WEBA algorithm, a weight measure is associated with each kernel community followed by optimization for finding the exact kernel structure and auxiliary kernels. However, in such algorithm, the small communities’ having less number of connections has a lower priority value and never gets identified. In the proposed we have deployed a Longest Chain Subsequence metric for finding the number of connections to the kernel community. The method performs grouping the communities based on LCSS metric. Despite of considering only the maximum value, the algorithm considers the new connections as well as the overlapped connections for a particular community. This results in better identification of the kernel communities as well as the auxiliary communities intact. The proposed method performs the distance measure with the Longest Chain Sub Sequences (LCSS) metric defined as. ( ) ( ) ( ) ( ) ji ji jiji jijiij yifx yifx andjifi YXLCSYXLCS YXLCSYXLCSd ≠ = ==      == −− −− 00 ),,,max( ,, 11 11 φ Fig. 7: show Longest Chain Sub Sequences (LCSS) metric VI. CONCLUSION Now it s clear that communities in OSN are playing a vital role and the users of communities are changing their role as per community behavior. If the community is demising then its directly meaning that its users are leaving that particular community and if the users are joining the community then it is clear that particular community will grow in future. Various methods are user to find the community structure and the analytical behavior. In future work can be extended to find the spatial information of the user as well as to the community in social network. For future work, we would like to explore the dynamic behavior of community kernels and their auxiliary communities.We are interested in how community kernels take shape and evolve over time. In addition, we would like to combine link and content information in our problem definition and algorithm design for practical applications, such as query dependent community detection. Inspite of assuming the
  • 5. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-6, June- 2016] Infogain Publication (Infogainpublication.com) ISSN : 2454-1311 www.ijaems.com Page | 599 utmost price, the algorithmic program considers the new connections yet because the overlapped connections for a selected community. This ends up in higher identification of the kernel communities yet because the auxiliary communities intact. REFERENCES [1] Akrati Saxena,S.R.S.Iyengar,YayatiGupta, “Understanding Spreading Patterns on Social Networks Based on Network Topology”, arXiv:1505.00457v1 [cs.SI] , May 2015 [2] David Burth Kurka, Alan Godoy, Fernando J. Von Zuben, “Online Social Network Analysis: A Survey of Research Applications in Computer Science”, arXiv:1504.05655v1 [cs.SI] , Apr 2015 [3] Chang Su, Yukun Wang , Lan Zhang “Community Detection in Social Networks Based on Influential Nodes ”, Journal of Software, VOL. 9, NO. 9, September 2014 [4] Anna Zygmunt, Jarosław Ko´zlak, Edward Nawarecki, Adam Mika, “Determining life cycles of evolving groups”, AGH University of Science and Technology, Al. Mickiewicza VOL.35, PP.1102- 1111 Krak´ow, Poland August ,2014 [5] Weishu Hu, Zhiguo Gong, Leong Hou U and Jingzhi Guo, “Identifying influential user communities on the social network ”,Department of Computer and Information Science, Faculty of Science and Technology, University of Macau, Macao, China, 2013 Taylor & Francis. [6] Liaoruo Wang, Tiancheng Lou, Jie Tang and John E. Hopcroft, “Detecting Community Kernels in Large Social Networks”, ICDM '11 Proceedings of the 2011 IEEE 11th International Conference on Data Mining PP. 784-793 ISBN: 978-0-7695-4408-3 [7] Beiming Sun, Vincent TY Ng, “Identifying Influential Users by Their Postings in Social Networks”, MSM’12, June 25, 2012, Milwaukee, Wisconsin, USA. Copyright 2012 ACM 978-1- 4503-1402-2/12/06 [8] Michael Trusov, Anand V.Bodapati, and Randolph E.Bulkin, “Determining Influential Users in Internet Social Networks”, Journal of Marketing Research VOL. XLVII (August 2010), 643–658 [9] Emilio Ferrara, “A large-scale community structure analysis in Facebook”,Ferrara EPJ Data Science 2012, 1:9 [10]Suhani Grabowicz P, Ramasco J, José J. Ramasco ,Esteban Moro,Josep M. Pujol, Victor M. Eguiluz, “Social features of online networks: the strength of intermediary ties in online social media”, PLoS ONE 7(1): e29358.doi:10.1371/journal.pone.0029358,2012 [11]Hunter D, Goodreau S, Handcock M, “Goodness of fit of social network models”, J Am Stat Assoc 103(481):248-258, 2008. [12]Salvatore A. Catanese, Pasquale De Meo , Emilio Ferrara, Giacomo Fiumara, Alessandro Provetti,“Crawling Facebook for Social Network Analysis Purposes”, WIMS’11, May 25-27, 2011 Sogndal, Norway [13]Pasquale De Meo a, Emilio Ferrara b,a, Giacomo Fiumara a, Alessandro Provetti a,c, “Mixing local and global information for community detection in large networks,”, Journal of Computer and System Sciences VOL. 80 (1), PP.72-87 [14]Manju Bala, Manoj Kumar, Bhupinder Singh, “Socia Media Evolution and Detection of influential Community Users in online Social Networks (OSNs)”, ICACSET 2016 - Singapore on April 14 - 15, 2016 [15]https://snap.stanford.edu/data/