SlideShare a Scribd company logo
Social Media Analysis Using K-
Means Clustering
Made By
Nishant Alsatwar
Introduction
• Social Media Analysis is based on the
analyzing the Facebook Data Set that we have
obtained from UCI Repository.
• We’re going to use K-Means Clustering
Algorithm to obtain the results in the form of
clusters.
• Clusters are analyzed to conclude the results.
Motivation
• Nowadays social media is very popular way to get
connected with friends and colleagues.
• When someone sends you a friend request that
request depends upon some common interests
or they might be your family members or
colleagues, etc.
• Our aim is to find out the intention behind
sending the friend request. Clusters are formed
on the basis of common interest and groups.
Objective
• The general theme of this survey is to know
the intention behind a friend request that a
people can request to his friend or somebody
else. Making it easy to understand the
intention of a request sent.
• To differentiate the users of the social media
on the basis of their friendship network and
dividing them in various clusters according to
relations of Mutual Friendship.
What is Data Mining ?
• Data mining is extracting useful information
from a lot of raw and unprocessed data using
some techniques such as data cleaning and
preprocessing.
What is Data Analysis ?
• Data Analysis deals with the utilization of
various techniques to extract useful
information from large volume of data and
obtained results are analyzed in order to
predict some useful patterns.
Proposed System
• Minimum RAM : 2GB
• Minimum HDD : 250GB
• OS : Windows
• Application Platform : R Studio
K- means Clustering
• The main idea is to define k centers, one for
each cluster.
• The next step is to take each point belonging
to a given dataset and associate it to the
nearest center.
• Find the distance between center and each
point using Euclidean Distance Formula.
Block Diagram
Mathematical Modelling
• Let X = {x1,x2,x3,……..,xn} be the set of data points and V = {v1,v2,…….,vc}
• be the set of centers.
• [1] Randomly select ‘c’ cluster centers.
• [2] Calculate the distance between each data point and cluster centers.
• [3] Assign the data point to the cluster center whose distance from the
• cluster center is minimum of all the cluster centers.
• [4] Recalculate the new cluster center using:
• where, ‘ci’ represents the number of data points in ith cluster.
• [5] Recalculate the distance between each data point and new obtained
cluster
• centers.
• [6] If no data point was reassigned then stop, otherwise repeat from step
[3].
Mathematical Modelling
• Calculate the values for the points with
respect to the centroid with the help of
Euclidean Distance Formula.
Dataset Description
Node 1 Node 2 Link Timestamp
1 12 1 0
1 20 1 1.22E+09
1 24 1 1.23E+09
1 25 1 1.23E+09
1 26 1 0
1 27 1 0
2 3 1 1.18E+09
Dataset Description
• “Node 1” represents “Person 1” and “Node 2”
represents “Person 2”, “Link” represents the
friendship network between those two
persons. If it exists, then the value in Link field
will be “1” (One) otherwise it will be “0”
(Zero). The “Timestamp” field represents the
standard format for the timestamp on what
time the friend request sent to the person.
Timestamp Conversion
http://tools.zenverse.net/timestamp-to-date/
• Using the website mentioned above, we can
convert the timestamp into human readable
time and date format.
• This website uses online application to convert
Unix Hexadecimal Timestamp into Human
Readable Format.
Timestamp Conversion
Timestamp Conversion
Timestamp Conversion
Timestamp Conversion
Expected Output When Dataset is
Linear
Expected Output When Dataset is
Linear
Expected Output When Dataset is
Linear
Expected Output When Dataset is
Non-Linear
Friend Recommendation
Friend Recommendation
• “Correlation” between networks means that
the topologies of different networks share
similar properties. According to these similar
properties, we can make inferences from one
network to another.
Friend Recommendation
• For example, if two nodes have a strong tie in
the Flickr tag network, we might guess that
they are also in each other’s contact list.
However, we cannot say that they will be
friends with each other in Flickr: Remember
that the topologies of the tag and contact
networks are not the same. To make more
precise recommendation, we should
determine ho the two networks are
correlated.
Network Alignment
• “Network alignment” is defined as the action
of mapping one network to another with a
number of constraints/rules. It has been
widely applied in the fields of bio-informatics
and computer vision. Here, we take advantage
of the study of network alignment in other
fields, such as bio-informatics, to use as a new
approach in social media.
Network Alignment
• To model the network correlations, we propose to align
tag and contact networks through important tag
feature selection.
• An “important” feature is decided by whether it
contributes to the correlation of the tag network with
the contact network, or in other words, makes the
topologies of the two networks more similar. The
reason we select important features is that a person
usually presents many social features in social
networks, some of which are attractive to others, and
some of which are not very useful for building
relationships.
Example
• A photographer uploads images to Flickr tags
such as “natural animals”, “historical buildings”,
“street views” and “people”. We view these tags
as different feature words. The photographer
may find that most of his friends in the Flickr
network contact him because of the photos
tagged with “natural animals” and “historical
buildings”, rather than “street views” and
“people”. This indicates that the first two feature
words are more important than the last two for
friend recommendation.
Friend Recommendation
• If two users in the tag network have a strong
similarity in the selected features after the
alignment, we can infer that they have a
higher possibility of having a relationship in
the contact network.
• To make more precise friend
recommendation, we also consider network
structure preservation in our algorithm in
addition to network alignment.
Preservation
• “preservation” means that we do not
significantly change the tag network structure
before and after alignment. By preserving the
tag network structure on Flickr, we reduce the
over-fitting risk of our algorithm.
Social media analytics research serves
several purposes:
• facilitating conversations and interaction
between online communities and
• extracting useful patterns and intelligence to
serve entities that include, but are not limited
to, active contributors in ongoing dialogues.
Results
Conclusion
• Recent work in machine learning and data mining has made impressive
strides toward learning highly accurate models of relational data.
• Making use of appropriate algorithms such as K-means for extraction of
useful patterns will leads to useful results.
• We propose a new friend recommendation method, based on network
correlation, by considering the effect of different social roles.
• To model the correlation between different networks, we develop a
method that aligns these networks through important feature selection.
• We also consider preserving the network structure for a more precise
recommendation.
• We conduct comprehensive experiments to show that the proposed
method significantly improves the accuracy of friend-recommendation.
References
• [1] Constraint Neighborhood Projections for Semi-
Supervised Clustering Hongjun Wang, Tao Li, Tianrui Li, and
Yan Yang.
• [2] Learning Assignment Order of Instances for the
Constrained K-Means Clustering Algorithm, Yi Hong and
Sam Kwong, Senior Member, IEEE
• [3] Extensions of Kmeans-Type Algorithms: A New
Clustering Framework by Integrating Intracluster
Compactness and Intercluster Separation Xiaohui Huang,
Yunming Ye, and Haijun Zhang.
• [4] Special Section on Social Media as Sensors.
• 5] Special Issue on Social Media Analytics: Understanding
the Pulse of the Society.
References
• [6] Visual Analytics for Multimodal Social Network Analysis:
A Design Study with Social Scientists.
• [7] Social Friend Recommendation Based on Multiple
Network Correlation.
• [8] OpinionFlow: Visual Analysis of Opinion Diffusion on
Social Media Yingcai Wu, Member, IEEE, Shixia Liu, Senior
Member, IEEE, Kai Yan, Mengchen Liu, Fangzhao Wu.
• [9] A Survey on Visual Analytics of Social Media Data
Yingcai Wu, Nan Cao, David Gotz, Yap-Peng Tan, and Daniel
A. Keim
• [10] Analyzing and Visualizing Web Opinion Development
and Social Interactions With Density-Based Clustering
Christopher C. Yang and Tobun Dorbin Ng, Member, IEEE.
Thank You

More Related Content

What's hot

Cascading behavior in the networks
Cascading behavior in the networksCascading behavior in the networks
Cascading behavior in the networks
Vani Kandhasamy
 
Music Recommendation 2018
Music Recommendation 2018Music Recommendation 2018
Music Recommendation 2018
Fabien Gouyon
 
Facebook privacy and security
Facebook privacy and securityFacebook privacy and security
Facebook privacy and security
Gonetech Solutions
 
Planet f the Social Networking System
Planet f the Social Networking SystemPlanet f the Social Networking System
Planet f the Social Networking System
pankaj Nayal
 
Community detection algorithms
Community detection algorithmsCommunity detection algorithms
Community detection algorithms
Alireza Andalib
 
Networking on LinkedIn 101
Networking on LinkedIn 101Networking on LinkedIn 101
Networking on LinkedIn 101
LinkedIn
 
Social Network Analysis (SNA)
Social Network Analysis (SNA)Social Network Analysis (SNA)
Social Network Analysis (SNA)
Development Innovations
 
Data-Driven Attribution Under the Hood - Simon Poulton
Data-Driven Attribution Under the Hood - Simon PoultonData-Driven Attribution Under the Hood - Simon Poulton
Data-Driven Attribution Under the Hood - Simon Poulton
State of Search Conference
 
Social media privacy issues
Social media privacy issuesSocial media privacy issues
Social media privacy issues
Nousheen Arshad
 
Social Network Analysis:Methods and Applications Chapter 9
Social Network Analysis:Methods and Applications Chapter 9Social Network Analysis:Methods and Applications Chapter 9
Social Network Analysis:Methods and Applications Chapter 9
Kunwoo Park
 
The History of Facebook: 10 Year Anniversary
The History of Facebook: 10 Year AnniversaryThe History of Facebook: 10 Year Anniversary
The History of Facebook: 10 Year Anniversary
Business 2 Community
 
Complex networks - Assortativity
Complex networks -  AssortativityComplex networks -  Assortativity
Complex networks - Assortativity
Jaqueline Passos do Nascimento
 
project report of social networking web sites
project report of social networking web sitesproject report of social networking web sites
project report of social networking web sites
Gyanendra Pratap Singh
 
Whatsapp PPT Presentation
Whatsapp PPT PresentationWhatsapp PPT Presentation
Whatsapp PPT Presentation
VOCCE ICT
 
social media seminar - as prepared for Ploughshares Fund
social media seminar - as prepared for Ploughshares Fundsocial media seminar - as prepared for Ploughshares Fund
social media seminar - as prepared for Ploughshares Fund
Susan Tenby
 
Lesson 28
Lesson 28Lesson 28
Lesson 28
Tracie King
 
Social media metrics & analytics social media metrics & analytics
Social media  metrics & analytics social media  metrics & analyticsSocial media  metrics & analytics social media  metrics & analytics
Social media metrics & analytics social media metrics & analytics
Fabby4
 
Social Network Analysis [1994]
Social Network Analysis [1994]Social Network Analysis [1994]
Social Network Analysis [1994]
sub-alkhalissi
 
Recommender systems
Recommender systemsRecommender systems
Recommender systems
Tamer Rezk
 
Chat application
Chat applicationChat application
Chat application
Mudasir Sunasara
 

What's hot (20)

Cascading behavior in the networks
Cascading behavior in the networksCascading behavior in the networks
Cascading behavior in the networks
 
Music Recommendation 2018
Music Recommendation 2018Music Recommendation 2018
Music Recommendation 2018
 
Facebook privacy and security
Facebook privacy and securityFacebook privacy and security
Facebook privacy and security
 
Planet f the Social Networking System
Planet f the Social Networking SystemPlanet f the Social Networking System
Planet f the Social Networking System
 
Community detection algorithms
Community detection algorithmsCommunity detection algorithms
Community detection algorithms
 
Networking on LinkedIn 101
Networking on LinkedIn 101Networking on LinkedIn 101
Networking on LinkedIn 101
 
Social Network Analysis (SNA)
Social Network Analysis (SNA)Social Network Analysis (SNA)
Social Network Analysis (SNA)
 
Data-Driven Attribution Under the Hood - Simon Poulton
Data-Driven Attribution Under the Hood - Simon PoultonData-Driven Attribution Under the Hood - Simon Poulton
Data-Driven Attribution Under the Hood - Simon Poulton
 
Social media privacy issues
Social media privacy issuesSocial media privacy issues
Social media privacy issues
 
Social Network Analysis:Methods and Applications Chapter 9
Social Network Analysis:Methods and Applications Chapter 9Social Network Analysis:Methods and Applications Chapter 9
Social Network Analysis:Methods and Applications Chapter 9
 
The History of Facebook: 10 Year Anniversary
The History of Facebook: 10 Year AnniversaryThe History of Facebook: 10 Year Anniversary
The History of Facebook: 10 Year Anniversary
 
Complex networks - Assortativity
Complex networks -  AssortativityComplex networks -  Assortativity
Complex networks - Assortativity
 
project report of social networking web sites
project report of social networking web sitesproject report of social networking web sites
project report of social networking web sites
 
Whatsapp PPT Presentation
Whatsapp PPT PresentationWhatsapp PPT Presentation
Whatsapp PPT Presentation
 
social media seminar - as prepared for Ploughshares Fund
social media seminar - as prepared for Ploughshares Fundsocial media seminar - as prepared for Ploughshares Fund
social media seminar - as prepared for Ploughshares Fund
 
Lesson 28
Lesson 28Lesson 28
Lesson 28
 
Social media metrics & analytics social media metrics & analytics
Social media  metrics & analytics social media  metrics & analyticsSocial media  metrics & analytics social media  metrics & analytics
Social media metrics & analytics social media metrics & analytics
 
Social Network Analysis [1994]
Social Network Analysis [1994]Social Network Analysis [1994]
Social Network Analysis [1994]
 
Recommender systems
Recommender systemsRecommender systems
Recommender systems
 
Chat application
Chat applicationChat application
Chat application
 

Similar to Data Mining In Social Networks Using K-Means Clustering Algorithm

Social Friend Overlying Communities Based on Social Network Context
Social Friend Overlying Communities Based on Social Network ContextSocial Friend Overlying Communities Based on Social Network Context
Social Friend Overlying Communities Based on Social Network Context
IRJET Journal
 
Sylva workshop.gt that camp.2012
Sylva workshop.gt that camp.2012Sylva workshop.gt that camp.2012
Sylva workshop.gt that camp.2012
CameliaN
 
Social Network Analysis Using Gephi
Social Network Analysis Using Gephi Social Network Analysis Using Gephi
Social Network Analysis Using Gephi
Goa App
 
Recomendation system: Community Detection Based Recomendation System using Hy...
Recomendation system: Community Detection Based Recomendation System using Hy...Recomendation system: Community Detection Based Recomendation System using Hy...
Recomendation system: Community Detection Based Recomendation System using Hy...
Rajul Kukreja
 
CS6010 Social Network Analysis Unit V
CS6010 Social Network Analysis Unit VCS6010 Social Network Analysis Unit V
CS6010 Social Network Analysis Unit V
pkaviya
 
Exploring Generative Models of Tripartite Graphs for Recommendation in Social...
Exploring Generative Models of Tripartite Graphs for Recommendation in Social...Exploring Generative Models of Tripartite Graphs for Recommendation in Social...
Exploring Generative Models of Tripartite Graphs for Recommendation in Social...
Charalampos Chelmis
 
Alluding Communities in Social Networking Websites using Enhanced Quasi-cliqu...
Alluding Communities in Social Networking Websites using Enhanced Quasi-cliqu...Alluding Communities in Social Networking Websites using Enhanced Quasi-cliqu...
Alluding Communities in Social Networking Websites using Enhanced Quasi-cliqu...
IJMTST Journal
 
Chapter 3.pdf
Chapter 3.pdfChapter 3.pdf
Tutorial on Relationship Mining In Online Social Networks
Tutorial on Relationship Mining In Online Social NetworksTutorial on Relationship Mining In Online Social Networks
Tutorial on Relationship Mining In Online Social Networks
pjing2
 
TruSIS: Trust Accross Social Network
TruSIS: Trust Accross Social NetworkTruSIS: Trust Accross Social Network
TruSIS: Trust Accross Social Network
Lora Aroyo
 
Network Measures Social Computing-Unit 2.pptx
Network Measures Social Computing-Unit 2.pptxNetwork Measures Social Computing-Unit 2.pptx
Network Measures Social Computing-Unit 2.pptx
chavanprasad17092001
 
Asymmetric Social Proximity Based Private Matching Protocols for Online Socia...
Asymmetric Social Proximity Based Private Matching Protocols for Online Socia...Asymmetric Social Proximity Based Private Matching Protocols for Online Socia...
Asymmetric Social Proximity Based Private Matching Protocols for Online Socia...
syeda yasmeen
 
cs224w-79-final
cs224w-79-finalcs224w-79-final
cs224w-79-final
Darren Koh
 
kdd2015-feed (1)
kdd2015-feed (1)kdd2015-feed (1)
kdd2015-feed (1)
Guy Lebanon
 
Prediction of Reaction towards Textual Posts in Social Networks
Prediction of Reaction towards Textual Posts in Social NetworksPrediction of Reaction towards Textual Posts in Social Networks
Prediction of Reaction towards Textual Posts in Social Networks
Mohamed El-Geish
 
Social Network Analysis with Spark
Social Network Analysis with SparkSocial Network Analysis with Spark
Social Network Analysis with Spark
Ghulam Imaduddin
 
Book Recommendations.pptx
Book Recommendations.pptxBook Recommendations.pptx
Book Recommendations.pptx
DishaSharma337110
 
bookrecommendations-230615063942-3b1016c9 (1).pdf
bookrecommendations-230615063942-3b1016c9 (1).pdfbookrecommendations-230615063942-3b1016c9 (1).pdf
bookrecommendations-230615063942-3b1016c9 (1).pdf
13DikshaDatir
 
Social Network Analysis & an Introduction to Tools
Social Network Analysis & an Introduction to ToolsSocial Network Analysis & an Introduction to Tools
Social Network Analysis & an Introduction to Tools
Patti Anklam
 
Social network analysis course 2010 - 2011
Social network analysis course 2010 - 2011Social network analysis course 2010 - 2011
Social network analysis course 2010 - 2011
guillaume ereteo
 

Similar to Data Mining In Social Networks Using K-Means Clustering Algorithm (20)

Social Friend Overlying Communities Based on Social Network Context
Social Friend Overlying Communities Based on Social Network ContextSocial Friend Overlying Communities Based on Social Network Context
Social Friend Overlying Communities Based on Social Network Context
 
Sylva workshop.gt that camp.2012
Sylva workshop.gt that camp.2012Sylva workshop.gt that camp.2012
Sylva workshop.gt that camp.2012
 
Social Network Analysis Using Gephi
Social Network Analysis Using Gephi Social Network Analysis Using Gephi
Social Network Analysis Using Gephi
 
Recomendation system: Community Detection Based Recomendation System using Hy...
Recomendation system: Community Detection Based Recomendation System using Hy...Recomendation system: Community Detection Based Recomendation System using Hy...
Recomendation system: Community Detection Based Recomendation System using Hy...
 
CS6010 Social Network Analysis Unit V
CS6010 Social Network Analysis Unit VCS6010 Social Network Analysis Unit V
CS6010 Social Network Analysis Unit V
 
Exploring Generative Models of Tripartite Graphs for Recommendation in Social...
Exploring Generative Models of Tripartite Graphs for Recommendation in Social...Exploring Generative Models of Tripartite Graphs for Recommendation in Social...
Exploring Generative Models of Tripartite Graphs for Recommendation in Social...
 
Alluding Communities in Social Networking Websites using Enhanced Quasi-cliqu...
Alluding Communities in Social Networking Websites using Enhanced Quasi-cliqu...Alluding Communities in Social Networking Websites using Enhanced Quasi-cliqu...
Alluding Communities in Social Networking Websites using Enhanced Quasi-cliqu...
 
Chapter 3.pdf
Chapter 3.pdfChapter 3.pdf
Chapter 3.pdf
 
Tutorial on Relationship Mining In Online Social Networks
Tutorial on Relationship Mining In Online Social NetworksTutorial on Relationship Mining In Online Social Networks
Tutorial on Relationship Mining In Online Social Networks
 
TruSIS: Trust Accross Social Network
TruSIS: Trust Accross Social NetworkTruSIS: Trust Accross Social Network
TruSIS: Trust Accross Social Network
 
Network Measures Social Computing-Unit 2.pptx
Network Measures Social Computing-Unit 2.pptxNetwork Measures Social Computing-Unit 2.pptx
Network Measures Social Computing-Unit 2.pptx
 
Asymmetric Social Proximity Based Private Matching Protocols for Online Socia...
Asymmetric Social Proximity Based Private Matching Protocols for Online Socia...Asymmetric Social Proximity Based Private Matching Protocols for Online Socia...
Asymmetric Social Proximity Based Private Matching Protocols for Online Socia...
 
cs224w-79-final
cs224w-79-finalcs224w-79-final
cs224w-79-final
 
kdd2015-feed (1)
kdd2015-feed (1)kdd2015-feed (1)
kdd2015-feed (1)
 
Prediction of Reaction towards Textual Posts in Social Networks
Prediction of Reaction towards Textual Posts in Social NetworksPrediction of Reaction towards Textual Posts in Social Networks
Prediction of Reaction towards Textual Posts in Social Networks
 
Social Network Analysis with Spark
Social Network Analysis with SparkSocial Network Analysis with Spark
Social Network Analysis with Spark
 
Book Recommendations.pptx
Book Recommendations.pptxBook Recommendations.pptx
Book Recommendations.pptx
 
bookrecommendations-230615063942-3b1016c9 (1).pdf
bookrecommendations-230615063942-3b1016c9 (1).pdfbookrecommendations-230615063942-3b1016c9 (1).pdf
bookrecommendations-230615063942-3b1016c9 (1).pdf
 
Social Network Analysis & an Introduction to Tools
Social Network Analysis & an Introduction to ToolsSocial Network Analysis & an Introduction to Tools
Social Network Analysis & an Introduction to Tools
 
Social network analysis course 2010 - 2011
Social network analysis course 2010 - 2011Social network analysis course 2010 - 2011
Social network analysis course 2010 - 2011
 

Recently uploaded

Satta Matka Dpboss Kalyan Fix Game matka
Satta Matka Dpboss Kalyan Fix Game matkaSatta Matka Dpboss Kalyan Fix Game matka
一比一原版(CSULB毕业证)加州州立大学长滩分校毕业证如何办理
一比一原版(CSULB毕业证)加州州立大学长滩分校毕业证如何办理一比一原版(CSULB毕业证)加州州立大学长滩分校毕业证如何办理
一比一原版(CSULB毕业证)加州州立大学长滩分校毕业证如何办理
exqfuhe
 
Call Girls Hyderabad🔥7023059433🔥Vip Profile Escorts in Hyderabad Available 24/7
Call Girls Hyderabad🔥7023059433🔥Vip Profile Escorts in Hyderabad Available 24/7Call Girls Hyderabad🔥7023059433🔥Vip Profile Escorts in Hyderabad Available 24/7
Call Girls Hyderabad🔥7023059433🔥Vip Profile Escorts in Hyderabad Available 24/7
manji sharman06
 
On Storytelling & Magic Realism in Rushdie’s Midnight’s Children, Shame, and ...
On Storytelling & Magic Realism in Rushdie’s Midnight’s Children, Shame, and ...On Storytelling & Magic Realism in Rushdie’s Midnight’s Children, Shame, and ...
On Storytelling & Magic Realism in Rushdie’s Midnight’s Children, Shame, and ...
AJHSSR Journal
 
TACKLING ILLEGAL LOGGING: PROBLEMS AND CHALLENGES
TACKLING ILLEGAL LOGGING: PROBLEMS AND CHALLENGESTACKLING ILLEGAL LOGGING: PROBLEMS AND CHALLENGES
TACKLING ILLEGAL LOGGING: PROBLEMS AND CHALLENGES
AJHSSR Journal
 
TSF - Task 1 - Digital Marketing : Social Media
TSF - Task 1 - Digital Marketing  : Social MediaTSF - Task 1 - Digital Marketing  : Social Media
TSF - Task 1 - Digital Marketing : Social Media
JayaBharne2
 
Facebook Fan Page Profits to boost your profits today!
Facebook Fan Page Profits  to boost your profits today!Facebook Fan Page Profits  to boost your profits today!
Facebook Fan Page Profits to boost your profits today!
Rohit Gupta
 
Ahmedabad Call Girls 🔥 9352988975 ❤️ Book High Class Models In Ahmedabad
Ahmedabad Call Girls 🔥 9352988975 ❤️  Book High Class Models In AhmedabadAhmedabad Call Girls 🔥 9352988975 ❤️  Book High Class Models In Ahmedabad
Ahmedabad Call Girls 🔥 9352988975 ❤️ Book High Class Models In Ahmedabad
falaqmalikmodel
 
Top Google Tools for SEO: Enhance Your Website's Performance
Top Google Tools for SEO: Enhance Your Website's PerformanceTop Google Tools for SEO: Enhance Your Website's Performance
Top Google Tools for SEO: Enhance Your Website's Performance
Elysian Digital Services Pvt. Ltd.
 
Pulse Vibes Media.......................
Pulse Vibes Media.......................Pulse Vibes Media.......................
Pulse Vibes Media.......................
davidhasan005
 
一比一原版(uon毕业证书)澳洲纽卡斯尔大学毕业证如何办理
一比一原版(uon毕业证书)澳洲纽卡斯尔大学毕业证如何办理一比一原版(uon毕业证书)澳洲纽卡斯尔大学毕业证如何办理
一比一原版(uon毕业证书)澳洲纽卡斯尔大学毕业证如何办理
tohufue
 
一比一原版(lu毕业证书)拉夫堡大学毕业证如何办理
一比一原版(lu毕业证书)拉夫堡大学毕业证如何办理一比一原版(lu毕业证书)拉夫堡大学毕业证如何办理
一比一原版(lu毕业证书)拉夫堡大学毕业证如何办理
aoxfo
 
9861615390 Satta Dpboss Sattamatka matka
9861615390 Satta Dpboss Sattamatka matka9861615390 Satta Dpboss Sattamatka matka
一比一原版(UCSD毕业证)加利福尼亚大学圣迭戈分校毕业证如何办理
一比一原版(UCSD毕业证)加利福尼亚大学圣迭戈分校毕业证如何办理一比一原版(UCSD毕业证)加利福尼亚大学圣迭戈分校毕业证如何办理
一比一原版(UCSD毕业证)加利福尼亚大学圣迭戈分校毕业证如何办理
wozek1
 
CYBER SECURITY ENHANCEMENT IN NIGERIA. A CASE STUDY OF SIX STATES IN THE NORT...
CYBER SECURITY ENHANCEMENT IN NIGERIA. A CASE STUDY OF SIX STATES IN THE NORT...CYBER SECURITY ENHANCEMENT IN NIGERIA. A CASE STUDY OF SIX STATES IN THE NORT...
CYBER SECURITY ENHANCEMENT IN NIGERIA. A CASE STUDY OF SIX STATES IN THE NORT...
AJHSSR Journal
 
Using Playlists to Increase YouTube Watch Time
Using Playlists to Increase YouTube Watch TimeUsing Playlists to Increase YouTube Watch Time
Using Playlists to Increase YouTube Watch Time
SocioCosmos
 

Recently uploaded (16)

Satta Matka Dpboss Kalyan Fix Game matka
Satta Matka Dpboss Kalyan Fix Game matkaSatta Matka Dpboss Kalyan Fix Game matka
Satta Matka Dpboss Kalyan Fix Game matka
 
一比一原版(CSULB毕业证)加州州立大学长滩分校毕业证如何办理
一比一原版(CSULB毕业证)加州州立大学长滩分校毕业证如何办理一比一原版(CSULB毕业证)加州州立大学长滩分校毕业证如何办理
一比一原版(CSULB毕业证)加州州立大学长滩分校毕业证如何办理
 
Call Girls Hyderabad🔥7023059433🔥Vip Profile Escorts in Hyderabad Available 24/7
Call Girls Hyderabad🔥7023059433🔥Vip Profile Escorts in Hyderabad Available 24/7Call Girls Hyderabad🔥7023059433🔥Vip Profile Escorts in Hyderabad Available 24/7
Call Girls Hyderabad🔥7023059433🔥Vip Profile Escorts in Hyderabad Available 24/7
 
On Storytelling & Magic Realism in Rushdie’s Midnight’s Children, Shame, and ...
On Storytelling & Magic Realism in Rushdie’s Midnight’s Children, Shame, and ...On Storytelling & Magic Realism in Rushdie’s Midnight’s Children, Shame, and ...
On Storytelling & Magic Realism in Rushdie’s Midnight’s Children, Shame, and ...
 
TACKLING ILLEGAL LOGGING: PROBLEMS AND CHALLENGES
TACKLING ILLEGAL LOGGING: PROBLEMS AND CHALLENGESTACKLING ILLEGAL LOGGING: PROBLEMS AND CHALLENGES
TACKLING ILLEGAL LOGGING: PROBLEMS AND CHALLENGES
 
TSF - Task 1 - Digital Marketing : Social Media
TSF - Task 1 - Digital Marketing  : Social MediaTSF - Task 1 - Digital Marketing  : Social Media
TSF - Task 1 - Digital Marketing : Social Media
 
Facebook Fan Page Profits to boost your profits today!
Facebook Fan Page Profits  to boost your profits today!Facebook Fan Page Profits  to boost your profits today!
Facebook Fan Page Profits to boost your profits today!
 
Ahmedabad Call Girls 🔥 9352988975 ❤️ Book High Class Models In Ahmedabad
Ahmedabad Call Girls 🔥 9352988975 ❤️  Book High Class Models In AhmedabadAhmedabad Call Girls 🔥 9352988975 ❤️  Book High Class Models In Ahmedabad
Ahmedabad Call Girls 🔥 9352988975 ❤️ Book High Class Models In Ahmedabad
 
Top Google Tools for SEO: Enhance Your Website's Performance
Top Google Tools for SEO: Enhance Your Website's PerformanceTop Google Tools for SEO: Enhance Your Website's Performance
Top Google Tools for SEO: Enhance Your Website's Performance
 
Pulse Vibes Media.......................
Pulse Vibes Media.......................Pulse Vibes Media.......................
Pulse Vibes Media.......................
 
一比一原版(uon毕业证书)澳洲纽卡斯尔大学毕业证如何办理
一比一原版(uon毕业证书)澳洲纽卡斯尔大学毕业证如何办理一比一原版(uon毕业证书)澳洲纽卡斯尔大学毕业证如何办理
一比一原版(uon毕业证书)澳洲纽卡斯尔大学毕业证如何办理
 
一比一原版(lu毕业证书)拉夫堡大学毕业证如何办理
一比一原版(lu毕业证书)拉夫堡大学毕业证如何办理一比一原版(lu毕业证书)拉夫堡大学毕业证如何办理
一比一原版(lu毕业证书)拉夫堡大学毕业证如何办理
 
9861615390 Satta Dpboss Sattamatka matka
9861615390 Satta Dpboss Sattamatka matka9861615390 Satta Dpboss Sattamatka matka
9861615390 Satta Dpboss Sattamatka matka
 
一比一原版(UCSD毕业证)加利福尼亚大学圣迭戈分校毕业证如何办理
一比一原版(UCSD毕业证)加利福尼亚大学圣迭戈分校毕业证如何办理一比一原版(UCSD毕业证)加利福尼亚大学圣迭戈分校毕业证如何办理
一比一原版(UCSD毕业证)加利福尼亚大学圣迭戈分校毕业证如何办理
 
CYBER SECURITY ENHANCEMENT IN NIGERIA. A CASE STUDY OF SIX STATES IN THE NORT...
CYBER SECURITY ENHANCEMENT IN NIGERIA. A CASE STUDY OF SIX STATES IN THE NORT...CYBER SECURITY ENHANCEMENT IN NIGERIA. A CASE STUDY OF SIX STATES IN THE NORT...
CYBER SECURITY ENHANCEMENT IN NIGERIA. A CASE STUDY OF SIX STATES IN THE NORT...
 
Using Playlists to Increase YouTube Watch Time
Using Playlists to Increase YouTube Watch TimeUsing Playlists to Increase YouTube Watch Time
Using Playlists to Increase YouTube Watch Time
 

Data Mining In Social Networks Using K-Means Clustering Algorithm

  • 1. Social Media Analysis Using K- Means Clustering Made By Nishant Alsatwar
  • 2. Introduction • Social Media Analysis is based on the analyzing the Facebook Data Set that we have obtained from UCI Repository. • We’re going to use K-Means Clustering Algorithm to obtain the results in the form of clusters. • Clusters are analyzed to conclude the results.
  • 3. Motivation • Nowadays social media is very popular way to get connected with friends and colleagues. • When someone sends you a friend request that request depends upon some common interests or they might be your family members or colleagues, etc. • Our aim is to find out the intention behind sending the friend request. Clusters are formed on the basis of common interest and groups.
  • 4. Objective • The general theme of this survey is to know the intention behind a friend request that a people can request to his friend or somebody else. Making it easy to understand the intention of a request sent. • To differentiate the users of the social media on the basis of their friendship network and dividing them in various clusters according to relations of Mutual Friendship.
  • 5. What is Data Mining ? • Data mining is extracting useful information from a lot of raw and unprocessed data using some techniques such as data cleaning and preprocessing.
  • 6. What is Data Analysis ? • Data Analysis deals with the utilization of various techniques to extract useful information from large volume of data and obtained results are analyzed in order to predict some useful patterns.
  • 7. Proposed System • Minimum RAM : 2GB • Minimum HDD : 250GB • OS : Windows • Application Platform : R Studio
  • 8. K- means Clustering • The main idea is to define k centers, one for each cluster. • The next step is to take each point belonging to a given dataset and associate it to the nearest center. • Find the distance between center and each point using Euclidean Distance Formula.
  • 10. Mathematical Modelling • Let X = {x1,x2,x3,……..,xn} be the set of data points and V = {v1,v2,…….,vc} • be the set of centers. • [1] Randomly select ‘c’ cluster centers. • [2] Calculate the distance between each data point and cluster centers. • [3] Assign the data point to the cluster center whose distance from the • cluster center is minimum of all the cluster centers. • [4] Recalculate the new cluster center using: • where, ‘ci’ represents the number of data points in ith cluster. • [5] Recalculate the distance between each data point and new obtained cluster • centers. • [6] If no data point was reassigned then stop, otherwise repeat from step [3].
  • 11. Mathematical Modelling • Calculate the values for the points with respect to the centroid with the help of Euclidean Distance Formula.
  • 12. Dataset Description Node 1 Node 2 Link Timestamp 1 12 1 0 1 20 1 1.22E+09 1 24 1 1.23E+09 1 25 1 1.23E+09 1 26 1 0 1 27 1 0 2 3 1 1.18E+09
  • 13. Dataset Description • “Node 1” represents “Person 1” and “Node 2” represents “Person 2”, “Link” represents the friendship network between those two persons. If it exists, then the value in Link field will be “1” (One) otherwise it will be “0” (Zero). The “Timestamp” field represents the standard format for the timestamp on what time the friend request sent to the person.
  • 14. Timestamp Conversion http://tools.zenverse.net/timestamp-to-date/ • Using the website mentioned above, we can convert the timestamp into human readable time and date format. • This website uses online application to convert Unix Hexadecimal Timestamp into Human Readable Format.
  • 19. Expected Output When Dataset is Linear
  • 20. Expected Output When Dataset is Linear
  • 21. Expected Output When Dataset is Linear
  • 22. Expected Output When Dataset is Non-Linear
  • 24. Friend Recommendation • “Correlation” between networks means that the topologies of different networks share similar properties. According to these similar properties, we can make inferences from one network to another.
  • 25. Friend Recommendation • For example, if two nodes have a strong tie in the Flickr tag network, we might guess that they are also in each other’s contact list. However, we cannot say that they will be friends with each other in Flickr: Remember that the topologies of the tag and contact networks are not the same. To make more precise recommendation, we should determine ho the two networks are correlated.
  • 26. Network Alignment • “Network alignment” is defined as the action of mapping one network to another with a number of constraints/rules. It has been widely applied in the fields of bio-informatics and computer vision. Here, we take advantage of the study of network alignment in other fields, such as bio-informatics, to use as a new approach in social media.
  • 27. Network Alignment • To model the network correlations, we propose to align tag and contact networks through important tag feature selection. • An “important” feature is decided by whether it contributes to the correlation of the tag network with the contact network, or in other words, makes the topologies of the two networks more similar. The reason we select important features is that a person usually presents many social features in social networks, some of which are attractive to others, and some of which are not very useful for building relationships.
  • 28. Example • A photographer uploads images to Flickr tags such as “natural animals”, “historical buildings”, “street views” and “people”. We view these tags as different feature words. The photographer may find that most of his friends in the Flickr network contact him because of the photos tagged with “natural animals” and “historical buildings”, rather than “street views” and “people”. This indicates that the first two feature words are more important than the last two for friend recommendation.
  • 29. Friend Recommendation • If two users in the tag network have a strong similarity in the selected features after the alignment, we can infer that they have a higher possibility of having a relationship in the contact network. • To make more precise friend recommendation, we also consider network structure preservation in our algorithm in addition to network alignment.
  • 30. Preservation • “preservation” means that we do not significantly change the tag network structure before and after alignment. By preserving the tag network structure on Flickr, we reduce the over-fitting risk of our algorithm.
  • 31.
  • 32. Social media analytics research serves several purposes: • facilitating conversations and interaction between online communities and • extracting useful patterns and intelligence to serve entities that include, but are not limited to, active contributors in ongoing dialogues.
  • 34. Conclusion • Recent work in machine learning and data mining has made impressive strides toward learning highly accurate models of relational data. • Making use of appropriate algorithms such as K-means for extraction of useful patterns will leads to useful results. • We propose a new friend recommendation method, based on network correlation, by considering the effect of different social roles. • To model the correlation between different networks, we develop a method that aligns these networks through important feature selection. • We also consider preserving the network structure for a more precise recommendation. • We conduct comprehensive experiments to show that the proposed method significantly improves the accuracy of friend-recommendation.
  • 35. References • [1] Constraint Neighborhood Projections for Semi- Supervised Clustering Hongjun Wang, Tao Li, Tianrui Li, and Yan Yang. • [2] Learning Assignment Order of Instances for the Constrained K-Means Clustering Algorithm, Yi Hong and Sam Kwong, Senior Member, IEEE • [3] Extensions of Kmeans-Type Algorithms: A New Clustering Framework by Integrating Intracluster Compactness and Intercluster Separation Xiaohui Huang, Yunming Ye, and Haijun Zhang. • [4] Special Section on Social Media as Sensors. • 5] Special Issue on Social Media Analytics: Understanding the Pulse of the Society.
  • 36. References • [6] Visual Analytics for Multimodal Social Network Analysis: A Design Study with Social Scientists. • [7] Social Friend Recommendation Based on Multiple Network Correlation. • [8] OpinionFlow: Visual Analysis of Opinion Diffusion on Social Media Yingcai Wu, Member, IEEE, Shixia Liu, Senior Member, IEEE, Kai Yan, Mengchen Liu, Fangzhao Wu. • [9] A Survey on Visual Analytics of Social Media Data Yingcai Wu, Nan Cao, David Gotz, Yap-Peng Tan, and Daniel A. Keim • [10] Analyzing and Visualizing Web Opinion Development and Social Interactions With Density-Based Clustering Christopher C. Yang and Tobun Dorbin Ng, Member, IEEE.