skip to main content
10.1145/3331453.3362061acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsaeConference Proceedingsconference-collections
research-article

A New Optimal Algorithm on Information Diffusion Maximization Problem

Authors Info & Claims
Published:22 October 2019Publication History

ABSTRACT

With the rapid development of Internet technology, the social network has become more and more complicated and diversified. Excavating the most influential users from social networks become more difficult and important. The information diffusion maximization algorithm can effectively solve the problem. First, in this paper we proposed a new optimal algorithm (NOA) on the information diffusion maximization problem by synthetically considering the theme feature and degree centrality. Second, we presented a new way of representing the user influence based on the user preference. In addition, in order to compare with other methods more extensively and deeply and verify the effectiveness and superiority of the algorithm, the traditional information diffusion models are extended to the topic-based linear threshold model (TLTM) and the topic-based independent cascade model (TICM) which can describe the information diffusion mechanism more accurately. Experimental results show that NOA algorithm proposed in this paper is 5000 times faster than the climbing greedy algorithm in the worst case and also faster than the CELF(Cost Effective Lazy Forward) algorithm. If the nodes selected through NOA algorithm are used as the initial spreading set, the results have a significant improvement than the climbing greedy algorithm in the diffusion range and the actual influence. And the results also show that the new algorithm is really efficient, accurate and stable.

References

  1. The 2015 statistical report on WeChat users by CuriosityChina, 199IT Internet Data Center, http://www.199it.com/archives/351990.html?weixin_user_id=f0o6ETQjv6IT7PwM6TL39x20z_geYI, 2015.Google ScholarGoogle Scholar
  2. P. Wang, "The Research on Information Diffusion Modeling Over Social Networks," Master Thesis (Shanghai Jiao Tong University), 2011.Google ScholarGoogle Scholar
  3. L. Zheng, "An Improved Clustering Approach of CURE," Inner Mongolian Petrochemical Industry, 2005.Google ScholarGoogle Scholar
  4. Masahiro Kimura, Kazumi Saito, Kouzou Ohara, Hiroshi Motoda, " Learning information diffusion model in a social network for predicting influence of nodes," Intelligent Data Analysis, vol. 15, pp. 633--652, 2011.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. S.Y. Tang, "Information Diffusion Models in Micro-Blogging Networks Based on Hidden Markov Theory and Conditional Random Fields," Master Thesis (South China University of Technology), 2014.Google ScholarGoogle Scholar
  6. Y. Shang, "Distribution dynamics for SIS model on random networks," Journal of Biological Systems, vol. 20(02), pp. 213--220, 2012.Google ScholarGoogle ScholarCross RefCross Ref
  7. B. Macdonald, Shakarian, P., Howard, N., and Moores, "Spreaders in the Network SIR Model: An Empirical Study," Computer Science, 2012.Google ScholarGoogle Scholar
  8. P. Domingos and M. Richardson, "Mining the network value of customers," Seventh Acm Sigkdd International Conference on Knowledge Discovery & Data Mining, pp. 57--66, 2002.Google ScholarGoogle Scholar
  9. D. Kempe, J. Kleinberg and É. Tardos, "Maximizing the spread of influence through a social network," Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining, ACM, pp. 137--146, 2003, DOI:10.1145/956750.956769Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. J. Leskovec, A. Krause, C. Guestrin, et al, "Cost-effective outbreak detection in networks," In Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 420--429, 2007.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. W. Chen, Y. Wang, and S. Yang, "Efficient influence maximization in social networks," In Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 199--208, 2009.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. X.J. Feng, "Potential Based Influence Maximization Algorithm In a Social Network," Master Thesis (Fudan University), 2010.Google ScholarGoogle Scholar
  13. J.T. Tian, Y.T. Wang, and X.J. Feng, "A new hybrid algorithm for influence maximization in social networks," Chinese Journal of Computers, vol. 34(10), pp. 1956--1965, 2011.Google ScholarGoogle ScholarCross RefCross Ref
  14. X. Ge, "Subject-oriented Influence Maximization Problem Research," Master Thesis (Yunnan University), 2013.Google ScholarGoogle Scholar
  15. H.X. Ren, "The Study of Influence Maximization Algorithm Based on Community Structure," Master Thesis (Yanshan University), 2014.Google ScholarGoogle Scholar
  16. Y. Tang, Y. Shi, and X. Xiao, "Influence maximization in near-linear time: a martingale approach," ACM SIGMOD International Conference on Management of Data, pp. 1539--1554, 2015.Google ScholarGoogle Scholar
  17. X.G. Wang, "A new algorithm for the influence maximization problem in dynamic networks or traffic sensor networks," Multimedia Tools & Applications, pp. 1--12, 2016.Google ScholarGoogle Scholar
  18. K. Saito, M. Kimura, K. Ohara, and H. Motoda, "Behavioral analyses of information diffusion models by observed data of social network," Advances in Social Computing, Third International Conference on Social Computing, Behavioral Modeling, and Prediction, pp. 149--158, 2010.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. P.F. Zhou, "Research on the Evaluation Method of Blog's Subject Influence and User's Subject Influence," Master Thesis (South China University of Technology), 2015.Google ScholarGoogle Scholar
  20. M. Aravamudan, A. Rajasekharan, and K. G. Ramakrishnan, "Methods and systems for selecting and presenting content based on context sensitive user preferences, " U.S. Patent No. 9, 213, 755. 15 Dec. 2015.Google ScholarGoogle Scholar
  21. H. F. Liu, "A new user similarity model to improve the accuracy of collaborative filtering," Knowledge-Based Systems, vol. 56, pp156--166, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  22. Y. Xue, J.Qi, X. Xie, R. Zhang and J. Huang, "Solving the data sparsity problem in destination prediction," The VLDB Journal, 24(2), pp219--243,2015.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. S. Feil, M. Kretzer, K. Werder and A. Maedche, "Using gamification to tackle the cold-start problem in recommender systems," In Proceedings of the 19th ACM Conference on Computer Supported Cooperative Work and Social Computing Companion, pp. 253--256, 2016.Google ScholarGoogle Scholar
  24. G. Pilato and G. Vassallo, "TSVD as a Statistical Estimator in the Latent Semantic Analysis Paradigm", Emerging Topics in Computing IEEE Transactions on, pp. 185--192, 2015.Google ScholarGoogle ScholarCross RefCross Ref
  25. Sina Micro-blog Dataset, datatang.com, http://www.datatang.com/data/46758/, 2014.Google ScholarGoogle Scholar

Index Terms

  1. A New Optimal Algorithm on Information Diffusion Maximization Problem

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Other conferences
              CSAE '19: Proceedings of the 3rd International Conference on Computer Science and Application Engineering
              October 2019
              942 pages
              ISBN:9781450362948
              DOI:10.1145/3331453

              Copyright © 2019 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 22 October 2019

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article
              • Research
              • Refereed limited

              Acceptance Rates

              Overall Acceptance Rate368of770submissions,48%

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader