SlideShare a Scribd company logo
International Journal of Engineering Research and Development 
e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com 
Volume 10, Issue 6 (June 2014), PP.01-04 
Data-Based Influence Maximization using Community Detection 
Abhishek Singh 
Department of Computer Engineering Indian Institute of Technology Banaras Hindu University 
Abstract:- Influence maximization is the problem of finding a set of users in a social network, such that by 
targeting this set, one maximizes the expected spread of influence in the network .In this work, I am proposing a 
new algorithm drawing inspiration from the works done in the same field by [9] and [10]. The main motive 
behind this work is to emulate the relationship between the fields of Community Detection and Viral Marketing 
whose existence in the real world is intuitive. To do this I have taken inspiration from the work done by [10]. 
But as far as the actual diffusion process goes I am proposing using the Credit Distribution Model described by 
[9], which has been proven to be faster than any other existing models instead of the Heat Diffusion Model that 
has been used originally. 
Keywords:- Influence Maximization, Community Detection, Viral Marketing 
I. INTRODUCTION 
In today‟s era with the spread and penetration of the internet in our day to day lives.there has been an 
increased interest in analysing the social behaviour of individuals on online social networks. With people 
becoming more and more active on the web, these social platforms provide an almost alternative lifestyle. The 
field of social network analysis looks to explore possibilities in this alternate society and has with time grown 
out of the technical domain into business, economics, politics and many such fields. 
The field of social network analysis can be broken down into multiple areas of research. Two such 
areas, research in which has found prevalence in recent times are Community detection and Viral Marketing. 
Lots of work has been done in these fields and huge amount of literature can be found on both of them. In this 
paper we have tried to understand and exploit these two fields and the way they connect with each other in real 
world networks. 
Community detection as the name suggests is about detecting groups in a network of actors, actors 
being individuals who form the network, based on parameters that define the connection between these actors. 
These parameters may be as direct as friendship or kinship to more complex as shared interests, connections etc. 
These communities are important as they can be viewed as a platform for sharing knowledge, data, emotions, 
sentiments etc. 
Viral Marketing may have found its initial use in business analytics but with growing research it has 
outgrown the field of computer research and found its application in myriads of domains. Viral marketing is an 
advertisement technique where one identifies a subset of „actors‟ of the social network so as to obtain a “word of 
mouth” effect in promoting the product. 
As we go about tackling these problems we find that they are connected at a very basic level by a 
special set of actors who are uniquely positioned in the network. These actors are known as influencers, as be it 
the survival of community or spreading of an innovation/idea/product in a network, there is always a need for 
certain ‘actors’ who have influence over the rest of the community. This can be seen in viral marketing as 
companies trying to identify an initial seed set of individuals to launch their producttp with the aim of achieving 
as much spread of word as possible. In terms of community detection, a certain set of individuals that share 
interests can be seen influencing each other. For example, an individual who shares interests in terms of his 
movie preferences with another individual would be compelled to watch a new movie if he/she sees positive 
feedback from the other. When this happens, the community detection algorithms increases the parameter used 
to represent the common interests among such individuals which results in detection of community. So, 
although both community detection and viral marketing are different areas, the underlying problem in both the 
cases is the same. This is the problem of maximizing the spread of influence in a network. 
Formally, the problem of Influence maximization involves finding a seed set of users in an online 
social network to adopt an innovation and spread the information, so that the influence of innovation or product 
in the network is maximized. Influence maximization is a problem applied not only to tasks related to social 
networks but can be used for different other applications.‟ 
Finding these 'few initial users' in these large networks is the major challenge of the problem and for 
which, huge amount of data is needed to be processed. Not only the processing of huge amount of data is 
required, timeliness of the processes are also important. For this, the time complexity of the process should be 
1
Data-Based Influence Maximization using Community Detection 
small. The most popular approaches in this area are greedy algorithm and/or optimizations to the greedy 
algorithms. It was observed that the individuals are connected to many others based on different interests. So a 
product/idea/event, which is to be 'spread' in the network, belongs to a particular community of the individual 
only. So, instead of targeting the entire network to find 'influential seeds', one can find the community first, 
where the probability of spreading is high and subsequently finding the 'seed'/'seeds'. 
Using the community detection approach is also advantageous to us in scenarios where the locality of 
influence needs to be controlled. For example, a global company launching a new product would want the 
publicity to be maximized as well as evenly distributed across the globe. In this paper we try to combine the 
work done on Influence Maximization by [], with community detection and put forward an efficient algorithm 
for Influence Maximization in real world social networks. The aim of this algorithm is to try and optimize the 
number of nodes that are processed in the reverse k neighbour step for determining SNP value for nodes by 
emulating the relationship between community detection and viral marketing. 
The rest of the paper is organized as follows: section 2 discusses about the related works, section 3 
describes our method, section 4 provides experimental results and sections 5 concludes and discuss the future 
aspect of the work. 
II. RELATED WORK 
The concept of spreading of an idea, or an innovation or influence for that matter was first studied in 
the field of economy, giving birth to viral marketing. Several models have been proposed to simulate this 
process. There are two models in particular that have gained widespread acceptance. These are the Linear 
Threshold Model and the Independent Cascade Model. The Linear Threshold model states that every node in a 
network has some threshold which is needed to be achieved after which it can become active. The Independent 
Cascade model on the other hand gives a probabilistic methodology to this. It proposes that any active node in a 
network would get a single chance to activate an inactive node, which it can do with certain probability. The 
problem of Influence Maximization was first studied by Domingos and Richardson[1][3]. Although there 
attempts at solving this problem were probabilistic. Since Domingos and Richardson studied the problem of 
Influence Maximization, the other researchers [5][7] have proposed greedy approaches rather than the 
probabilistic approach suggested by the formers. In 2003, Kempeet.al[3], proposed a greedy approach to solve 
what they viewed as a discrete optimization problem. After this several modifications and improvements have 
been proposed over this original approach. 
AmitGoyal et al, proposed a credit distribution based Influence Maximization model, which worked by 
distributing credits to users for activating other users based on an action log of activities performed by all users. 
Another work combining viral marketing and community detections has been done by [10]. They have proposed 
a clustering method called H_Clustering for community detection. In our approach, we have taken inspiration 
from this clustering approach in identifying communities. 
III. PROPOSED METHOD 
In this work, I propose to combine the work done by [9] and [10], in order to give a new algorithm for 
the Influence Maximization problem, that keeps into consideration the history of actions that have been taken by 
the users in determining their influence over each other. Also, it uses the concept of community detection and its 
relationship with the field of Viral Marketing. I propose that instead of the HDM model which has been used to 
simulate propagation of influence, the credit distribution model given by [9], would prove to be a far better and 
accurate model for the same. The proposed algorithm starts by assigning credits to users based on their activities 
as shown in the action log. Here‟s an example as to how this would work. Flixster(www.flixster.com) is one of 
the main players in the mobile and social movie rating business. Here, an action is a user rating a movie. In 
other words, if user v rates “The King‟s Speech”, and later on v‟s friend u does the same, it would be considered 
that the action of rating “The King‟s Speech” has propagated from v to u. Although unlike the actual algorithm 
proposed by [9], which is not a propagation algorithm, I propose to use this scanning of action log to determine 
probabilistic influence between any two users. Once we have these influence values we can apply the 
Independent Cascade Model on the network, with probability values that are actually significant. This approach 
is clearly more practical and hence more accurate than assigning random probability values to each of these 
edges. 
Once we have a graph of users with connection between them showing probabilistic influence, I 
propose to use the work done by [10], on community detection based Influence Maximization. The community 
detection step starts by assigning similarity values between two nodes. Similarity for any given pair of nodes is 
defined as 
2
Data-Based Influence Maximization using Community Detection 
The stopping criterion for this algorithm is the modularity gain between iterations. It is defined mathematically 
as 
A graphical representation of the community detection process has been shown below. 
Once this community detection process is over I propose to use the IC model for determining the Influence 
spread and determining seed set accordingly. 
Fig 1.Genereal Influence Maximization Process 
3 
Vs. 
Fig 2. The proposed algorithm 
The figures above show a comparison between general Influence Maximization algorithm vs the 
algorithm proposed in this paper. The algorithm simulations in the proposed algorithm are based on the 
Independent Cascade Model. 
IV. CONCLUSION 
In this work I have proposed a new algorithm for Influence Maximization in Social Networks drawing 
inspiration from the work done in the same field by [9] and [10]. The aim of this work is to, 
1. Redefine the way we take weights between users for the IC model. I have proposed that instead of 
random assignment of weights, we learn from the actions taken by users and use these action logs to 
determine mutual influence between these users.
Data-Based Influence Maximization using Community Detection 
2. Emulate the relationship between the fields of Viral Marketing and Community Detection in order to 
4 
improve the time complexity of the algorithm. 
To achieve this goal, I have drawn inspiration from the work done on CIM by [10]. Although instead of 
using the HDM, I propose to use any algorithm based on the IC model. As this would be more accurate. 
REFERENCES 
[1]. P. Domingos and M. Richardson. Mining the network value of customers 2001 
[2]. M. Richardson and P. Domingos.Mining Knowledge-Sharing Sites for Viral Marketing 2002. 
[3]. D. Kempe, J. Kleinberg, and E. Tardos. Maximizing the spread of influence through a social network, 
2003 
[4]. S. M. Flip Korn and S. Muthukrishnan. Influence sets based on reverse nearest neighbour queries, 2000 
[5]. W. Chen, Y. Wang, and S. Yang.Efficient influence maximization in social networks. 2009. 
[6]. J. Leskovec, A. Krause, C. Guestrin, C. Faloutsos,J. VanBriesen, and N. Glance. Cost-effective 
outbreak detection in networks. 
[7]. W. Chen, Y. Wang, and C. Wang.Scalable Influence Maximization for Prevalent Viral Marketing in 
Large-Scale Social Networks, 2010. 
[8]. Influence Maximization through Identifying Seed Nodesfrom Implicit Social Networks 
[9]. AmitGoyal, Francesco Bronchi, Laks V. S. Lakshmanan, A data based approach to Social Influence 
Maximization. 
[10]. Y. C. Chen, W. Y. Zhu, W. C. Peng, W. C. Lee, S. Y. Lee. CIM: Community based Influence 
Maximization in Social Networks, ACM 2010. 
.

More Related Content

What's hot

Multimode network based efficient and scalable learning of collective behavior
Multimode network based efficient and scalable learning of collective behaviorMultimode network based efficient and scalable learning of collective behavior
Multimode network based efficient and scalable learning of collective behavior
IAEME Publication
 
Social media influencers_2010_0
Social media influencers_2010_0Social media influencers_2010_0
Social media influencers_2010_0
Bijgespijkerd.nl
 
Selas Turkiye Influence And Passivity In Social Media Excerpted
Selas Turkiye Influence And Passivity In Social Media ExcerptedSelas Turkiye Influence And Passivity In Social Media Excerpted
Selas Turkiye Influence And Passivity In Social Media Excerpted
Ziya NISANOGLU
 
Multiparty Access Control For Online Social Networks : Model and Mechanisms.
Multiparty Access Control For Online Social Networks : Model and Mechanisms.Multiparty Access Control For Online Social Networks : Model and Mechanisms.
Multiparty Access Control For Online Social Networks : Model and Mechanisms.
Kiran K.V.S.
 
Strategy Before Tactics
Strategy Before TacticsStrategy Before Tactics
Strategy Before Tactics
Mike Kujawski
 
Least Cost Influence by Mapping Online Social Networks
Least Cost Influence by Mapping Online Social Networks Least Cost Influence by Mapping Online Social Networks
Least Cost Influence by Mapping Online Social Networks
paperpublications3
 
Web Politics 2.0
Web Politics 2.0Web Politics 2.0
Web Politics 2.0
Farsam Shadab
 
Survey of data mining techniques for social
Survey of data mining techniques for socialSurvey of data mining techniques for social
Survey of data mining techniques for social
Firas Husseini
 
2000-ACM-SigMobile-Mobile computing and communications review - Marc Smith - ...
2000-ACM-SigMobile-Mobile computing and communications review - Marc Smith - ...2000-ACM-SigMobile-Mobile computing and communications review - Marc Smith - ...
2000-ACM-SigMobile-Mobile computing and communications review - Marc Smith - ...
Marc Smith
 
Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...
Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...
Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...
BAINIDA
 
Big Data Analytics : A Social Network Approach
Big Data Analytics : A Social Network ApproachBig Data Analytics : A Social Network Approach
Big Data Analytics : A Social Network Approach
Andry Alamsyah
 
Measuring User Influence in Twitter
Measuring User Influence in TwitterMeasuring User Influence in Twitter
Measuring User Influence in Twitter
augustodefranco .
 
Dv31821825
Dv31821825Dv31821825
Dv31821825
IJERA Editor
 
iCTRE: The Informal community Transformer into Recommendation Engine
iCTRE: The Informal community Transformer into Recommendation EngineiCTRE: The Informal community Transformer into Recommendation Engine
iCTRE: The Informal community Transformer into Recommendation Engine
IRJET Journal
 
STRUCTURAL COUPLING IN WEB 2.0 APPLICATIONS
STRUCTURAL COUPLING IN WEB 2.0 APPLICATIONSSTRUCTURAL COUPLING IN WEB 2.0 APPLICATIONS
STRUCTURAL COUPLING IN WEB 2.0 APPLICATIONS
ijcsit
 

What's hot (15)

Multimode network based efficient and scalable learning of collective behavior
Multimode network based efficient and scalable learning of collective behaviorMultimode network based efficient and scalable learning of collective behavior
Multimode network based efficient and scalable learning of collective behavior
 
Social media influencers_2010_0
Social media influencers_2010_0Social media influencers_2010_0
Social media influencers_2010_0
 
Selas Turkiye Influence And Passivity In Social Media Excerpted
Selas Turkiye Influence And Passivity In Social Media ExcerptedSelas Turkiye Influence And Passivity In Social Media Excerpted
Selas Turkiye Influence And Passivity In Social Media Excerpted
 
Multiparty Access Control For Online Social Networks : Model and Mechanisms.
Multiparty Access Control For Online Social Networks : Model and Mechanisms.Multiparty Access Control For Online Social Networks : Model and Mechanisms.
Multiparty Access Control For Online Social Networks : Model and Mechanisms.
 
Strategy Before Tactics
Strategy Before TacticsStrategy Before Tactics
Strategy Before Tactics
 
Least Cost Influence by Mapping Online Social Networks
Least Cost Influence by Mapping Online Social Networks Least Cost Influence by Mapping Online Social Networks
Least Cost Influence by Mapping Online Social Networks
 
Web Politics 2.0
Web Politics 2.0Web Politics 2.0
Web Politics 2.0
 
Survey of data mining techniques for social
Survey of data mining techniques for socialSurvey of data mining techniques for social
Survey of data mining techniques for social
 
2000-ACM-SigMobile-Mobile computing and communications review - Marc Smith - ...
2000-ACM-SigMobile-Mobile computing and communications review - Marc Smith - ...2000-ACM-SigMobile-Mobile computing and communications review - Marc Smith - ...
2000-ACM-SigMobile-Mobile computing and communications review - Marc Smith - ...
 
Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...
Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...
Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...
 
Big Data Analytics : A Social Network Approach
Big Data Analytics : A Social Network ApproachBig Data Analytics : A Social Network Approach
Big Data Analytics : A Social Network Approach
 
Measuring User Influence in Twitter
Measuring User Influence in TwitterMeasuring User Influence in Twitter
Measuring User Influence in Twitter
 
Dv31821825
Dv31821825Dv31821825
Dv31821825
 
iCTRE: The Informal community Transformer into Recommendation Engine
iCTRE: The Informal community Transformer into Recommendation EngineiCTRE: The Informal community Transformer into Recommendation Engine
iCTRE: The Informal community Transformer into Recommendation Engine
 
STRUCTURAL COUPLING IN WEB 2.0 APPLICATIONS
STRUCTURAL COUPLING IN WEB 2.0 APPLICATIONSSTRUCTURAL COUPLING IN WEB 2.0 APPLICATIONS
STRUCTURAL COUPLING IN WEB 2.0 APPLICATIONS
 

Viewers also liked

Geo connections presentation
Geo connections presentationGeo connections presentation
Geo connections presentation
Trishelnine
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
 
A1080107
A1080107A1080107
A1080107
IJERD Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
 
E1083237
E1083237E1083237
E1083237
IJERD Editor
 
Pratosmart: non esiste città intelligente senza cittadini intelligenti
Pratosmart: non esiste città intelligente senza cittadini intelligentiPratosmart: non esiste città intelligente senza cittadini intelligenti
Pratosmart: non esiste città intelligente senza cittadini intelligenti
ilTempe
 
W. nee-batismo-parte-1
W. nee-batismo-parte-1W. nee-batismo-parte-1
W. nee-batismo-parte-1
Francisco Deuzilene
 
USB FLASH DISK PROMOSI - BARANG SOUVENIR MERCHANDISE
USB FLASH DISK PROMOSI - BARANG SOUVENIR MERCHANDISEUSB FLASH DISK PROMOSI - BARANG SOUVENIR MERCHANDISE
USB FLASH DISK PROMOSI - BARANG SOUVENIR MERCHANDISE
USB Promosi Indonesia
 
Láminas de anatomia patológica leucemia
Láminas de anatomia patológica leucemiaLáminas de anatomia patológica leucemia
Láminas de anatomia patológica leucemia
Dr Renato Soares de Melo
 
2016 03-04-manuel utilisateur-nova-ideo_version_boite_a_idees
2016 03-04-manuel utilisateur-nova-ideo_version_boite_a_idees2016 03-04-manuel utilisateur-nova-ideo_version_boite_a_idees
2016 03-04-manuel utilisateur-nova-ideo_version_boite_a_idees
Michael Launay
 
מאחורי הקלעים של חוויית משתמש - איך מייצרים חוויית משתמש ממכרת?
מאחורי הקלעים של חוויית משתמש - איך מייצרים חוויית משתמש ממכרת?מאחורי הקלעים של חוויית משתמש - איך מייצרים חוויית משתמש ממכרת?
מאחורי הקלעים של חוויית משתמש - איך מייצרים חוויית משתמש ממכרת?
Alon Eini
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
 

Viewers also liked (17)

Geo connections presentation
Geo connections presentationGeo connections presentation
Geo connections presentation
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
A1080107
A1080107A1080107
A1080107
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
E1083237
E1083237E1083237
E1083237
 
Pratosmart: non esiste città intelligente senza cittadini intelligenti
Pratosmart: non esiste città intelligente senza cittadini intelligentiPratosmart: non esiste città intelligente senza cittadini intelligenti
Pratosmart: non esiste città intelligente senza cittadini intelligenti
 
W. nee-batismo-parte-1
W. nee-batismo-parte-1W. nee-batismo-parte-1
W. nee-batismo-parte-1
 
USB FLASH DISK PROMOSI - BARANG SOUVENIR MERCHANDISE
USB FLASH DISK PROMOSI - BARANG SOUVENIR MERCHANDISEUSB FLASH DISK PROMOSI - BARANG SOUVENIR MERCHANDISE
USB FLASH DISK PROMOSI - BARANG SOUVENIR MERCHANDISE
 
Láminas de anatomia patológica leucemia
Láminas de anatomia patológica leucemiaLáminas de anatomia patológica leucemia
Láminas de anatomia patológica leucemia
 
Ivete
IveteIvete
Ivete
 
2016 03-04-manuel utilisateur-nova-ideo_version_boite_a_idees
2016 03-04-manuel utilisateur-nova-ideo_version_boite_a_idees2016 03-04-manuel utilisateur-nova-ideo_version_boite_a_idees
2016 03-04-manuel utilisateur-nova-ideo_version_boite_a_idees
 
מאחורי הקלעים של חוויית משתמש - איך מייצרים חוויית משתמש ממכרת?
מאחורי הקלעים של חוויית משתמש - איך מייצרים חוויית משתמש ממכרת?מאחורי הקלעים של חוויית משתמש - איך מייצרים חוויית משתמש ממכרת?
מאחורי הקלעים של חוויית משתמש - איך מייצרים חוויית משתמש ממכרת?
 
Ap grades 7 10 cg
Ap grades 7 10 cgAp grades 7 10 cg
Ap grades 7 10 cg
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 

Similar to A1060104

Detection and Minimization Influence of Rumor in Social Network
Detection and Minimization Influence of Rumor in Social NetworkDetection and Minimization Influence of Rumor in Social Network
Detection and Minimization Influence of Rumor in Social Network
IRJET Journal
 
NOVEL MACHINE LEARNING ALGORITHMS FOR CENTRALITY AND CLIQUES DETECTION IN YOU...
NOVEL MACHINE LEARNING ALGORITHMS FOR CENTRALITY AND CLIQUES DETECTION IN YOU...NOVEL MACHINE LEARNING ALGORITHMS FOR CENTRALITY AND CLIQUES DETECTION IN YOU...
NOVEL MACHINE LEARNING ALGORITHMS FOR CENTRALITY AND CLIQUES DETECTION IN YOU...
gerogepatton
 
Novel Machine Learning Algorithms for Centrality and Cliques Detection in You...
Novel Machine Learning Algorithms for Centrality and Cliques Detection in You...Novel Machine Learning Algorithms for Centrality and Cliques Detection in You...
Novel Machine Learning Algorithms for Centrality and Cliques Detection in You...
gerogepatton
 
The Web and the Collective Intelligence - How to use Collective Intelligence ...
The Web and the Collective Intelligence - How to use Collective Intelligence ...The Web and the Collective Intelligence - How to use Collective Intelligence ...
The Web and the Collective Intelligence - How to use Collective Intelligence ...
Hélio Teixeira
 
Web 2.0 Collective Intelligence - How to use collective intelligence techniqu...
Web 2.0 Collective Intelligence - How to use collective intelligence techniqu...Web 2.0 Collective Intelligence - How to use collective intelligence techniqu...
Web 2.0 Collective Intelligence - How to use collective intelligence techniqu...
Paul Gilbreath
 
Behavioural Modelling Outcomes prediction using Casual Factors
Behavioural Modelling Outcomes prediction using Casual  FactorsBehavioural Modelling Outcomes prediction using Casual  Factors
Behavioural Modelling Outcomes prediction using Casual Factors
IJMER
 
Crowdsourcing: A Survey
Crowdsourcing: A SurveyCrowdsourcing: A Survey
Crowdsourcing: A Survey
IJERA Editor
 
Knime social media_white_paper
Knime social media_white_paperKnime social media_white_paper
Knime social media_white_paper
Firas Husseini
 
A Survey on Multi-party Privacy Disputes in Social Networks
A Survey on Multi-party Privacy Disputes in Social NetworksA Survey on Multi-party Privacy Disputes in Social Networks
A Survey on Multi-party Privacy Disputes in Social Networks
IRJET Journal
 
IRJET- Event Detection and Text Summary by Disaster Warning
IRJET- Event Detection and Text Summary by Disaster WarningIRJET- Event Detection and Text Summary by Disaster Warning
IRJET- Event Detection and Text Summary by Disaster Warning
IRJET Journal
 
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET Journal
 
Eswc2012 submission 68
Eswc2012 submission 68Eswc2012 submission 68
Eswc2012 submission 68
STIinnsbruck
 
A retro.pdf
A retro.pdfA retro.pdf
A retro.pdf
ssusere3dd62
 
Running Research Communities in Asian markets
Running Research Communities in Asian marketsRunning Research Communities in Asian markets
Running Research Communities in Asian markets
InSites Consulting
 
ifib Lunchbag: CHI2018 Highlights - Algorithms in (Social) Practice and more
ifib Lunchbag: CHI2018 Highlights - Algorithms in (Social) Practice and moreifib Lunchbag: CHI2018 Highlights - Algorithms in (Social) Practice and more
ifib Lunchbag: CHI2018 Highlights - Algorithms in (Social) Practice and more
hen_drik
 
Socially augmented software empowering software operation through social cont...
Socially augmented software empowering software operation through social cont...Socially augmented software empowering software operation through social cont...
Socially augmented software empowering software operation through social cont...
Engineering and Social Informatics (ESOTICS)
 
Towards Decision Support and Goal AchievementIdentifying Ac.docx
Towards Decision Support and Goal AchievementIdentifying Ac.docxTowards Decision Support and Goal AchievementIdentifying Ac.docx
Towards Decision Support and Goal AchievementIdentifying Ac.docx
turveycharlyn
 
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
ijtsrd
 
Networks, Crowds & Markets Final Paper
Networks, Crowds & Markets Final PaperNetworks, Crowds & Markets Final Paper
Networks, Crowds & Markets Final Paper
Jason Rawlins
 
A strategic Analysis of Knowledge Sharing and Social Change Platforms
A strategic Analysis of Knowledge Sharing and Social Change PlatformsA strategic Analysis of Knowledge Sharing and Social Change Platforms
A strategic Analysis of Knowledge Sharing and Social Change Platforms
Helene Finidori
 

Similar to A1060104 (20)

Detection and Minimization Influence of Rumor in Social Network
Detection and Minimization Influence of Rumor in Social NetworkDetection and Minimization Influence of Rumor in Social Network
Detection and Minimization Influence of Rumor in Social Network
 
NOVEL MACHINE LEARNING ALGORITHMS FOR CENTRALITY AND CLIQUES DETECTION IN YOU...
NOVEL MACHINE LEARNING ALGORITHMS FOR CENTRALITY AND CLIQUES DETECTION IN YOU...NOVEL MACHINE LEARNING ALGORITHMS FOR CENTRALITY AND CLIQUES DETECTION IN YOU...
NOVEL MACHINE LEARNING ALGORITHMS FOR CENTRALITY AND CLIQUES DETECTION IN YOU...
 
Novel Machine Learning Algorithms for Centrality and Cliques Detection in You...
Novel Machine Learning Algorithms for Centrality and Cliques Detection in You...Novel Machine Learning Algorithms for Centrality and Cliques Detection in You...
Novel Machine Learning Algorithms for Centrality and Cliques Detection in You...
 
The Web and the Collective Intelligence - How to use Collective Intelligence ...
The Web and the Collective Intelligence - How to use Collective Intelligence ...The Web and the Collective Intelligence - How to use Collective Intelligence ...
The Web and the Collective Intelligence - How to use Collective Intelligence ...
 
Web 2.0 Collective Intelligence - How to use collective intelligence techniqu...
Web 2.0 Collective Intelligence - How to use collective intelligence techniqu...Web 2.0 Collective Intelligence - How to use collective intelligence techniqu...
Web 2.0 Collective Intelligence - How to use collective intelligence techniqu...
 
Behavioural Modelling Outcomes prediction using Casual Factors
Behavioural Modelling Outcomes prediction using Casual  FactorsBehavioural Modelling Outcomes prediction using Casual  Factors
Behavioural Modelling Outcomes prediction using Casual Factors
 
Crowdsourcing: A Survey
Crowdsourcing: A SurveyCrowdsourcing: A Survey
Crowdsourcing: A Survey
 
Knime social media_white_paper
Knime social media_white_paperKnime social media_white_paper
Knime social media_white_paper
 
A Survey on Multi-party Privacy Disputes in Social Networks
A Survey on Multi-party Privacy Disputes in Social NetworksA Survey on Multi-party Privacy Disputes in Social Networks
A Survey on Multi-party Privacy Disputes in Social Networks
 
IRJET- Event Detection and Text Summary by Disaster Warning
IRJET- Event Detection and Text Summary by Disaster WarningIRJET- Event Detection and Text Summary by Disaster Warning
IRJET- Event Detection and Text Summary by Disaster Warning
 
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
 
Eswc2012 submission 68
Eswc2012 submission 68Eswc2012 submission 68
Eswc2012 submission 68
 
A retro.pdf
A retro.pdfA retro.pdf
A retro.pdf
 
Running Research Communities in Asian markets
Running Research Communities in Asian marketsRunning Research Communities in Asian markets
Running Research Communities in Asian markets
 
ifib Lunchbag: CHI2018 Highlights - Algorithms in (Social) Practice and more
ifib Lunchbag: CHI2018 Highlights - Algorithms in (Social) Practice and moreifib Lunchbag: CHI2018 Highlights - Algorithms in (Social) Practice and more
ifib Lunchbag: CHI2018 Highlights - Algorithms in (Social) Practice and more
 
Socially augmented software empowering software operation through social cont...
Socially augmented software empowering software operation through social cont...Socially augmented software empowering software operation through social cont...
Socially augmented software empowering software operation through social cont...
 
Towards Decision Support and Goal AchievementIdentifying Ac.docx
Towards Decision Support and Goal AchievementIdentifying Ac.docxTowards Decision Support and Goal AchievementIdentifying Ac.docx
Towards Decision Support and Goal AchievementIdentifying Ac.docx
 
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
 
Networks, Crowds & Markets Final Paper
Networks, Crowds & Markets Final PaperNetworks, Crowds & Markets Final Paper
Networks, Crowds & Markets Final Paper
 
A strategic Analysis of Knowledge Sharing and Social Change Platforms
A strategic Analysis of Knowledge Sharing and Social Change PlatformsA strategic Analysis of Knowledge Sharing and Social Change Platforms
A strategic Analysis of Knowledge Sharing and Social Change Platforms
 

More from IJERD Editor

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
IJERD Editor
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACE
IJERD Editor
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
IJERD Editor
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
IJERD Editor
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding Design
IJERD Editor
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and Verification
IJERD Editor
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
IJERD Editor
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
IJERD Editor
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive Manufacturing
IJERD Editor
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
IJERD Editor
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
IJERD Editor
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
IJERD Editor
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
IJERD Editor
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
IJERD Editor
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
IJERD Editor
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
IJERD Editor
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF Dxing
IJERD Editor
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
IJERD Editor
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart Grid
IJERD Editor
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powder
IJERD Editor
 

More from IJERD Editor (20)

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACE
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding Design
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and Verification
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive Manufacturing
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF Dxing
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart Grid
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powder
 

A1060104

  • 1. International Journal of Engineering Research and Development e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com Volume 10, Issue 6 (June 2014), PP.01-04 Data-Based Influence Maximization using Community Detection Abhishek Singh Department of Computer Engineering Indian Institute of Technology Banaras Hindu University Abstract:- Influence maximization is the problem of finding a set of users in a social network, such that by targeting this set, one maximizes the expected spread of influence in the network .In this work, I am proposing a new algorithm drawing inspiration from the works done in the same field by [9] and [10]. The main motive behind this work is to emulate the relationship between the fields of Community Detection and Viral Marketing whose existence in the real world is intuitive. To do this I have taken inspiration from the work done by [10]. But as far as the actual diffusion process goes I am proposing using the Credit Distribution Model described by [9], which has been proven to be faster than any other existing models instead of the Heat Diffusion Model that has been used originally. Keywords:- Influence Maximization, Community Detection, Viral Marketing I. INTRODUCTION In today‟s era with the spread and penetration of the internet in our day to day lives.there has been an increased interest in analysing the social behaviour of individuals on online social networks. With people becoming more and more active on the web, these social platforms provide an almost alternative lifestyle. The field of social network analysis looks to explore possibilities in this alternate society and has with time grown out of the technical domain into business, economics, politics and many such fields. The field of social network analysis can be broken down into multiple areas of research. Two such areas, research in which has found prevalence in recent times are Community detection and Viral Marketing. Lots of work has been done in these fields and huge amount of literature can be found on both of them. In this paper we have tried to understand and exploit these two fields and the way they connect with each other in real world networks. Community detection as the name suggests is about detecting groups in a network of actors, actors being individuals who form the network, based on parameters that define the connection between these actors. These parameters may be as direct as friendship or kinship to more complex as shared interests, connections etc. These communities are important as they can be viewed as a platform for sharing knowledge, data, emotions, sentiments etc. Viral Marketing may have found its initial use in business analytics but with growing research it has outgrown the field of computer research and found its application in myriads of domains. Viral marketing is an advertisement technique where one identifies a subset of „actors‟ of the social network so as to obtain a “word of mouth” effect in promoting the product. As we go about tackling these problems we find that they are connected at a very basic level by a special set of actors who are uniquely positioned in the network. These actors are known as influencers, as be it the survival of community or spreading of an innovation/idea/product in a network, there is always a need for certain ‘actors’ who have influence over the rest of the community. This can be seen in viral marketing as companies trying to identify an initial seed set of individuals to launch their producttp with the aim of achieving as much spread of word as possible. In terms of community detection, a certain set of individuals that share interests can be seen influencing each other. For example, an individual who shares interests in terms of his movie preferences with another individual would be compelled to watch a new movie if he/she sees positive feedback from the other. When this happens, the community detection algorithms increases the parameter used to represent the common interests among such individuals which results in detection of community. So, although both community detection and viral marketing are different areas, the underlying problem in both the cases is the same. This is the problem of maximizing the spread of influence in a network. Formally, the problem of Influence maximization involves finding a seed set of users in an online social network to adopt an innovation and spread the information, so that the influence of innovation or product in the network is maximized. Influence maximization is a problem applied not only to tasks related to social networks but can be used for different other applications.‟ Finding these 'few initial users' in these large networks is the major challenge of the problem and for which, huge amount of data is needed to be processed. Not only the processing of huge amount of data is required, timeliness of the processes are also important. For this, the time complexity of the process should be 1
  • 2. Data-Based Influence Maximization using Community Detection small. The most popular approaches in this area are greedy algorithm and/or optimizations to the greedy algorithms. It was observed that the individuals are connected to many others based on different interests. So a product/idea/event, which is to be 'spread' in the network, belongs to a particular community of the individual only. So, instead of targeting the entire network to find 'influential seeds', one can find the community first, where the probability of spreading is high and subsequently finding the 'seed'/'seeds'. Using the community detection approach is also advantageous to us in scenarios where the locality of influence needs to be controlled. For example, a global company launching a new product would want the publicity to be maximized as well as evenly distributed across the globe. In this paper we try to combine the work done on Influence Maximization by [], with community detection and put forward an efficient algorithm for Influence Maximization in real world social networks. The aim of this algorithm is to try and optimize the number of nodes that are processed in the reverse k neighbour step for determining SNP value for nodes by emulating the relationship between community detection and viral marketing. The rest of the paper is organized as follows: section 2 discusses about the related works, section 3 describes our method, section 4 provides experimental results and sections 5 concludes and discuss the future aspect of the work. II. RELATED WORK The concept of spreading of an idea, or an innovation or influence for that matter was first studied in the field of economy, giving birth to viral marketing. Several models have been proposed to simulate this process. There are two models in particular that have gained widespread acceptance. These are the Linear Threshold Model and the Independent Cascade Model. The Linear Threshold model states that every node in a network has some threshold which is needed to be achieved after which it can become active. The Independent Cascade model on the other hand gives a probabilistic methodology to this. It proposes that any active node in a network would get a single chance to activate an inactive node, which it can do with certain probability. The problem of Influence Maximization was first studied by Domingos and Richardson[1][3]. Although there attempts at solving this problem were probabilistic. Since Domingos and Richardson studied the problem of Influence Maximization, the other researchers [5][7] have proposed greedy approaches rather than the probabilistic approach suggested by the formers. In 2003, Kempeet.al[3], proposed a greedy approach to solve what they viewed as a discrete optimization problem. After this several modifications and improvements have been proposed over this original approach. AmitGoyal et al, proposed a credit distribution based Influence Maximization model, which worked by distributing credits to users for activating other users based on an action log of activities performed by all users. Another work combining viral marketing and community detections has been done by [10]. They have proposed a clustering method called H_Clustering for community detection. In our approach, we have taken inspiration from this clustering approach in identifying communities. III. PROPOSED METHOD In this work, I propose to combine the work done by [9] and [10], in order to give a new algorithm for the Influence Maximization problem, that keeps into consideration the history of actions that have been taken by the users in determining their influence over each other. Also, it uses the concept of community detection and its relationship with the field of Viral Marketing. I propose that instead of the HDM model which has been used to simulate propagation of influence, the credit distribution model given by [9], would prove to be a far better and accurate model for the same. The proposed algorithm starts by assigning credits to users based on their activities as shown in the action log. Here‟s an example as to how this would work. Flixster(www.flixster.com) is one of the main players in the mobile and social movie rating business. Here, an action is a user rating a movie. In other words, if user v rates “The King‟s Speech”, and later on v‟s friend u does the same, it would be considered that the action of rating “The King‟s Speech” has propagated from v to u. Although unlike the actual algorithm proposed by [9], which is not a propagation algorithm, I propose to use this scanning of action log to determine probabilistic influence between any two users. Once we have these influence values we can apply the Independent Cascade Model on the network, with probability values that are actually significant. This approach is clearly more practical and hence more accurate than assigning random probability values to each of these edges. Once we have a graph of users with connection between them showing probabilistic influence, I propose to use the work done by [10], on community detection based Influence Maximization. The community detection step starts by assigning similarity values between two nodes. Similarity for any given pair of nodes is defined as 2
  • 3. Data-Based Influence Maximization using Community Detection The stopping criterion for this algorithm is the modularity gain between iterations. It is defined mathematically as A graphical representation of the community detection process has been shown below. Once this community detection process is over I propose to use the IC model for determining the Influence spread and determining seed set accordingly. Fig 1.Genereal Influence Maximization Process 3 Vs. Fig 2. The proposed algorithm The figures above show a comparison between general Influence Maximization algorithm vs the algorithm proposed in this paper. The algorithm simulations in the proposed algorithm are based on the Independent Cascade Model. IV. CONCLUSION In this work I have proposed a new algorithm for Influence Maximization in Social Networks drawing inspiration from the work done in the same field by [9] and [10]. The aim of this work is to, 1. Redefine the way we take weights between users for the IC model. I have proposed that instead of random assignment of weights, we learn from the actions taken by users and use these action logs to determine mutual influence between these users.
  • 4. Data-Based Influence Maximization using Community Detection 2. Emulate the relationship between the fields of Viral Marketing and Community Detection in order to 4 improve the time complexity of the algorithm. To achieve this goal, I have drawn inspiration from the work done on CIM by [10]. Although instead of using the HDM, I propose to use any algorithm based on the IC model. As this would be more accurate. REFERENCES [1]. P. Domingos and M. Richardson. Mining the network value of customers 2001 [2]. M. Richardson and P. Domingos.Mining Knowledge-Sharing Sites for Viral Marketing 2002. [3]. D. Kempe, J. Kleinberg, and E. Tardos. Maximizing the spread of influence through a social network, 2003 [4]. S. M. Flip Korn and S. Muthukrishnan. Influence sets based on reverse nearest neighbour queries, 2000 [5]. W. Chen, Y. Wang, and S. Yang.Efficient influence maximization in social networks. 2009. [6]. J. Leskovec, A. Krause, C. Guestrin, C. Faloutsos,J. VanBriesen, and N. Glance. Cost-effective outbreak detection in networks. [7]. W. Chen, Y. Wang, and C. Wang.Scalable Influence Maximization for Prevalent Viral Marketing in Large-Scale Social Networks, 2010. [8]. Influence Maximization through Identifying Seed Nodesfrom Implicit Social Networks [9]. AmitGoyal, Francesco Bronchi, Laks V. S. Lakshmanan, A data based approach to Social Influence Maximization. [10]. Y. C. Chen, W. Y. Zhu, W. C. Peng, W. C. Lee, S. Y. Lee. CIM: Community based Influence Maximization in Social Networks, ACM 2010. .