SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 4, Issue 1, pp: (12-15), Month: April 2017 – September 2017, Available at: www.paperpublications.org
Page | 12
Paper Publications
Least Cost Influence by Mapping Online Social
Networks
1
Bessmitha S, 2
Shajini N
1
PG Student, Dept of CSE, 2
Associate Professor, Dept of CSE
Abstract: The online social network has become popular for sharing the information. Online social networks
exhibit many platforms to create awareness of new products. In recent time Least cost Influence problem to find
minimum number of seed user is most important topic in online social networks. The eventual target is to find the
least advertising cost set of users which produce enormous influence. In existing many diffusion models are used.
In this paper the stochastic threshold model is used to find the seed user in multiple online social networks to
maximize the influence. This model decreases the processing time comparing to the other models.
Keywords: Stochastic threshold model, influence, diffusion, multiple networks, online social networks.
I. INTRODUCTION
A social network is a social structure made up of a set of social actors such as individuals or organizations, and
other social interactions between actors. The social network perspective provides a set of methods for analyzing the
structure of whole social entities as well as a variety of theories explaining the patterns observed in these structures. The
study of these structures uses social network analysis to identify local and global patterns, locate influential entities, and
examine network dynamics. A Social network can be defined as a set of socially relevant individuals with some patterns
of interactions or contacts among them, which are connected by one or more online relations. Online social networks
(OSN) provide platforms for users to share information and to communicate with their families and friends. With the
prosperous development of online social networks, many marketers have exploited the opportunities and attempt to select
influential users within online social media to influence other users through online.
The growth of online social networks like facebook, twitter, gmail and so on has created major communication medium.
The people of 83% believe platforms like twitter, facebook help them make new friends. Each day facebook users spend
10.5 billion minutes on the online social network. 50% of facebook users have more than 100 friends, 340 million tweets
are sent out every day on twitter. An online social network can be defined as a set of socially relevant individuals with
some patterns of interactions or contacts among them, which are connected by one or more online relations. Online social
networks provide platforms for users to communicate and share information with the relatives and friends effectively,
connecting users across the world. The various online social networks are fundamentally classified by their node degree
distributions. The most frequently mentioned categories of online social networks are randomly distributed, scale free and
complex networks.
Online social networks (OSN) are self-organizing, emergent, dynamic, and complex. They are most commonly
characterized as scale-free and small-word effect. The scale-free network was defined as a social network whose degree
distribution is at least infinitely close to a power law form indicating that the network is independent of the social network
scale. The main feature of a scale-free social network is inhomogeneity. Most of the nodes in a social network have few
physical link connections, while the connections of a few nodes far exceed the average number of physical link
connections within the social network. An online social network is the small-word effect. It describes that almost any two
nodes in the online social network even non-neighboring nodes can be connected by a very short path. In addition, small-
world online social networks are governed by two important parameters clustering, coefficient and the diameter.
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 4, Issue 1, pp: (12-15), Month: April 2017 – September 2017, Available at: www.paperpublications.org
Page | 13
Paper Publications
In many markets, customers are strongly influenced by the opinions of their friends. Viral marketing takes advantage of
this to promote a product by marketing it primarily to those with the strongest influence in the market.
Further people trust and act on recommendations from friends and their further influence their friends. This is referred to
as influence propagation. Influence propagation has become an important mechanism for viral marketing. This further
motivates the researchers to carry out extensive studies on various aspects of the influence propagation problem. Influence
Maximization problem is a problem of finding a small set of nodes that maximizes the spread of influence.
Table 1: list of Abbreviation
LCI Least Cost Influence
OSN Online Social Networks
LT Linear Threshold
IC Independent Cascade
II. RELATED WORK
In existing the single network was used. In this it is very difficult to find the overlapping users. While considering the
single network the information are spread inaccurately. The influence in only one network fails to identify the most
influential users [1]. There are also works on Linear Threshold (LT) model in which the active user can be found only up
to a threshold value. Then the greedy algorithm is used in which the improvements are slow and not scalable. Here, a
social network is modeled as a graph with nodes representing individuals and edges representing connections or
relationship between two individuals. Influences are propagated in the network according to the model [2] .The researches
have started to explore multiplex networks [3], [4] which studied the connection between offline and online networks. In
existing it focus on information sharing but it does not focus on solving least cost influence problem.
III. PROPOSED SYSTEM
The Least Cost Influence (LCI) problem is solved by coupling multiple networks into single network. The seed user is
found from multiple online social networks. The seed user refers to the user who is active for more time in online social
network. The seed user will propagate massive influence. To find the seed user the stochastic threshold model and
improved greedy algorithm is used. In particular, the improvement factor scales up with the size of the network which
allows the algorithm to run on very large networks with millions of nodes. It improves the scalability in large network and
has better marketing.
A. Network initialization:
A social networking service is a platform to build social networks or social relations among people who share similar
personal and career interests, activities, background or real life connection. Create one or more social network for the
information sharing in the online social network so it helps us to gather information from one user to another user.
The accounts are initialized by registering all the individual elements into database and common password is given. By
giving network id and password login to the network and the information are shared.
B. Coupling network:
The multiple networks are coupled into single network by using star lossless coupling. The lossless coupling scheme
preserves all properties of original networks to achieve high-quality solutions. The star lossless coupling is the one in
which multiple inputs are given and it gives one output. In star loss less coupling the coupling is done by synchronizing
the network edges. The networks are coupled by connecting intermediate node. The intermediate node act as the gateway
and all the information are transferred through the intermediate node. The lossless coupling scheme returns solution with
higher quality. To understand the benefit of taking consideration of overlapping users and coupled network, influencing a
fraction of the nodes in all networks by selecting seeds from each network and taking the union to compare with seeds
achieved from lossless coupling scheme.
C. Stochastic threshold model:
The stochastic threshold is the threshold at which the analyst can be confident that if one peak for a heterozygote is above
this threshold. This increases confidence in homozygous calls made for single source samples and alleles attributed to
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 4, Issue 1, pp: (12-15), Month: April 2017 – September 2017, Available at: www.paperpublications.org
Page | 14
Paper Publications
each contributor in mixture analysis. The stochastic threshold is the point at which variation begins a rapid increase. In
this model the heuristic of choosing nodes with probability distribution is done. The first node if chosen it will activate a
large fraction of network. This model identifies a subset of individuals whom adopt a service or a product and in turn
influence others, producing an effect which spreads in the social network as much as possible.
D. Finding seed user:
The seed users are the users that actively participate in network. In multiple networks the seed user is found based on all
online social networks they participate. Seed user can trigger massive influence diffusion. The seed user is found by
implementing greedy algorithm. The greedy algorithm is designed to achieve optimal solution. A scalable greedy
algorithm is used to solve the LCI problem. The greedy algorithm runs much faster in the Lossless coupled networks. In
particular, the improvement factor scales up with the size of the network which allows the algorithm to run on very large
networks with millions of nodes. Considering multiplex networks instead of a single network can effectively choose the
most influential users. In particular, the improvement factor scales up with the size of the network which allows the
algorithm to run on very large networks with millions of nodes. Considering multiplex networks instead of a single
network can effectively choose the most influential users.
In greedy algorithm the threshold value is used. Given a system of coupled networks G. Initialize a heap. Add the active
users having higher marginal gain with similar interest in to the heap. Counter value is updated for every addition of new
users in to the heap. Repeat the process until there is no active user. Returns the node of maximum marginal value from a
max heap after removing least marginal value user from the heap. The counter displays the updated value. The users who
are using the network above threshold value are inserted in to the heap. The heap sorts the active user by extracting the
maximum user. The heap is a special case of balanced binary tree data structure where root node is compared with its
children and is sorted as key (α) ≥ key (β). The seed users are found and the information is shared through the seed
user to the different network. The lossless coupling scheme achieves the best result in both networks. When the networks
is considered as a standalone network and choose seeds individually, the seeds size is relatively larger than choosing from
the coupled network. The sizes decrease this improvement is also due to the information diffusion across several networks
by the overlapping users.
Fig 1: Architecture diagram
User1
Twitter
Facebook
Gmail
Twitter
Facebook
Gmail
User3
User2
Twitter
Facebook
Gmail
Integrated
Password
Integrated
Password
Integrated
Password
Database
Star
Lossless
coupling
Greedy
Algorithm
Stochastic
threshold
model
Seed User
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 4, Issue 1, pp: (12-15), Month: April 2017 – September 2017, Available at: www.paperpublications.org
Page | 15
Paper Publications
The Fig.1 explains the system architecture of the proposed system to find seed user. The seed users are the one who active
in online social network for long time. It is mainly used in viral marketing. When a company produces a new product they
advertise the new products in online social networks. While advertising these products in single network its cost is very
high and the seed user is found inaccurately because the seed user found in one network will be highly active in other
network. To avoid this multiple network is used. The same user uses multiple networks. So to find the seed user in
multiple networks the networks are coupled into single network. In this project facebook, gmail and twitter are
considered. The user registers to multiple network and give the integrated password. The multiple networks of the
different user are coupled using star lossless coupling. After coupling all the multiple networks into single network all
these information are stored in the database. From the database by using greedy algorithm the performance of each user is
analyzed and the seed user is found. In greedy algorithm the users above threshold value are inserted into the heap and
heap sorts all the user and maximum user will be the seed user.
IV. CONCLUSION
The study of Influence Maximization is being studied from years. But this model neglected the effect of active users in the
network and processing time of these model increased as network size increases. Hence, we proposed a stochastic
threshold model for Influence Maximization in multiple online social networks. This model has better marketing and
reduces the processing time.
Advantages:
 Improves the scalability in large networks.
 Less processing time.
 It triggers a massive influence.
 It has better marketing.
Disadvantages:
 It relies on low degree of nodes.
 Less realistic marketing.
 Processing time is high.
REFERENCES
[1] Huiyuan Zhang, Dung T. Nguyen, and My T. Thai, “Least Cost Influence Across Multiple Social
Networks,”IEEE/ACM Trans. Netw., vol.24, no.2, April 2016.
[2] Kempe, J. Kleinberg, and E. Tardos, “Maximizing the spread of influence through a social network,” in Proc. KDD,
2003, pp. 137–146.
[3] O. Yagan, D. Qian, J. Zhang, and D. Cochran, “Information diffusion in overlaying social-physical networks,” in
Proc. CISS, 2012, pp. 1–6.
[4] X. Liu, Q. He, Y. Tian, W.-C. Lee, J. McPherson, and J. Han, “Event based social networks: Linking the online and
offline social worlds,” in Proc. KDD, 2012, pp. 1032–1040.
[5] W. Chen, C. Wang, and Y. Wang, “Scalable influence maximization for prevalent viral marketing in large-scale
social networks,” in Proc. SIGKDD, 2010, pp. 1029–1038.
[6] H. Zhang, T. N. Dinh, and M. T. Thai, “Maximizing the spread of positive influence in online social networks,” in
Proc. IEEE Int. Conf. Distrib.Computing Syst., 2013, pp. 317–326.
[7] T. N. Dinh, H. Zhang, D. T. Nguyen, and M. T. Thai, “Cost-effective viral marketing for time-critical campaigns in
large-scale social networks,” IEEE/ACM Trans. Netw., vol. 22, no. 6, pp. 2001–2011, Dec.2013.

Contenu connexe

Tendances

2000-ACM-SigMobile-Mobile computing and communications review - Marc Smith - ...
2000-ACM-SigMobile-Mobile computing and communications review - Marc Smith - ...2000-ACM-SigMobile-Mobile computing and communications review - Marc Smith - ...
2000-ACM-SigMobile-Mobile computing and communications review - Marc Smith - ...
Marc Smith
 
1999 ACM SIGCHI - Counting on Community in Cyberspace
1999   ACM SIGCHI - Counting on Community in Cyberspace1999   ACM SIGCHI - Counting on Community in Cyberspace
1999 ACM SIGCHI - Counting on Community in Cyberspace
Marc Smith
 
Network Theory
Network TheoryNetwork Theory
Network Theory
Son Maroon
 
2009-Social computing-Analyzing social media networks
2009-Social computing-Analyzing social media networks2009-Social computing-Analyzing social media networks
2009-Social computing-Analyzing social media networks
Marc Smith
 
2000 - CSCW - Conversation Trees and Threaded Chats
2000  - CSCW - Conversation Trees and Threaded Chats2000  - CSCW - Conversation Trees and Threaded Chats
2000 - CSCW - Conversation Trees and Threaded Chats
Marc Smith
 

Tendances (19)

2000-ACM-SigMobile-Mobile computing and communications review - Marc Smith - ...
2000-ACM-SigMobile-Mobile computing and communications review - Marc Smith - ...2000-ACM-SigMobile-Mobile computing and communications review - Marc Smith - ...
2000-ACM-SigMobile-Mobile computing and communications review - Marc Smith - ...
 
Roles In Networks
Roles In NetworksRoles In Networks
Roles In Networks
 
Social Network Analysis for Competitive Intelligence
Social Network Analysis for Competitive IntelligenceSocial Network Analysis for Competitive Intelligence
Social Network Analysis for Competitive Intelligence
 
1999 ACM SIGCHI - Counting on Community in Cyberspace
1999   ACM SIGCHI - Counting on Community in Cyberspace1999   ACM SIGCHI - Counting on Community in Cyberspace
1999 ACM SIGCHI - Counting on Community in Cyberspace
 
The Basics of Social Network Analysis
The Basics of Social Network AnalysisThe Basics of Social Network Analysis
The Basics of Social Network Analysis
 
Social Network Analysis
Social Network AnalysisSocial Network Analysis
Social Network Analysis
 
Mining and analyzing social media part 2 - hicss47 tutorial - dave king
Mining and analyzing social media   part 2 - hicss47 tutorial - dave kingMining and analyzing social media   part 2 - hicss47 tutorial - dave king
Mining and analyzing social media part 2 - hicss47 tutorial - dave king
 
02 Network Data Collection
02 Network Data Collection02 Network Data Collection
02 Network Data Collection
 
Social network analysis course 2010 - 2011
Social network analysis course 2010 - 2011Social network analysis course 2010 - 2011
Social network analysis course 2010 - 2011
 
Social network websites: best practices from leading services
Social network websites: best practices from leading servicesSocial network websites: best practices from leading services
Social network websites: best practices from leading services
 
Network Theory
Network TheoryNetwork Theory
Network Theory
 
CSE509 Lecture 6
CSE509 Lecture 6CSE509 Lecture 6
CSE509 Lecture 6
 
Social Interaction and the Power of Mobility Estimation (2013)
Social Interaction and the Power of Mobility Estimation (2013)Social Interaction and the Power of Mobility Estimation (2013)
Social Interaction and the Power of Mobility Estimation (2013)
 
A Guide to Social Network Analysis
A Guide to Social Network AnalysisA Guide to Social Network Analysis
A Guide to Social Network Analysis
 
Survey of data mining techniques for social
Survey of data mining techniques for socialSurvey of data mining techniques for social
Survey of data mining techniques for social
 
2009-Social computing-Analyzing social media networks
2009-Social computing-Analyzing social media networks2009-Social computing-Analyzing social media networks
2009-Social computing-Analyzing social media networks
 
2009 - Connected Action - Marc Smith - Social Media Network Analysis
2009 - Connected Action - Marc Smith - Social Media Network Analysis2009 - Connected Action - Marc Smith - Social Media Network Analysis
2009 - Connected Action - Marc Smith - Social Media Network Analysis
 
2000 - CSCW - Conversation Trees and Threaded Chats
2000  - CSCW - Conversation Trees and Threaded Chats2000  - CSCW - Conversation Trees and Threaded Chats
2000 - CSCW - Conversation Trees and Threaded Chats
 
05 Network Canvas (2017)
05 Network Canvas (2017)05 Network Canvas (2017)
05 Network Canvas (2017)
 

Similaire à Least Cost Influence by Mapping Online Social Networks

Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
ijtsrd
 
Citizen speak out: public e-Engagement experience of Slovakia
Citizen speak out: public e-Engagement experience of Slovakia Citizen speak out: public e-Engagement experience of Slovakia
Citizen speak out: public e-Engagement experience of Slovakia
Anton Shynkaruk
 
A Novel Frame Work System Used In Mobile with Cloud Based Environment
A Novel Frame Work System Used In Mobile with Cloud Based EnvironmentA Novel Frame Work System Used In Mobile with Cloud Based Environment
A Novel Frame Work System Used In Mobile with Cloud Based Environment
paperpublications3
 

Similaire à Least Cost Influence by Mapping Online Social Networks (20)

An improvised model for identifying influential nodes in multi parameter soci...
An improvised model for identifying influential nodes in multi parameter soci...An improvised model for identifying influential nodes in multi parameter soci...
An improvised model for identifying influential nodes in multi parameter soci...
 
Multiple Regression to Analyse Social Graph of Brand Awareness
Multiple Regression to Analyse Social Graph of Brand AwarenessMultiple Regression to Analyse Social Graph of Brand Awareness
Multiple Regression to Analyse Social Graph of Brand Awareness
 
Social Network Analysis
Social Network AnalysisSocial Network Analysis
Social Network Analysis
 
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
 
An Empirical Study On IMDb And Its Communities Based On The Network Of Co-Rev...
An Empirical Study On IMDb And Its Communities Based On The Network Of Co-Rev...An Empirical Study On IMDb And Its Communities Based On The Network Of Co-Rev...
An Empirical Study On IMDb And Its Communities Based On The Network Of Co-Rev...
 
Online social network mining current trends and research issues
Online social network mining current trends and research issuesOnline social network mining current trends and research issues
Online social network mining current trends and research issues
 
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyComprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
 
Detection and Minimization Influence of Rumor in Social Network
Detection and Minimization Influence of Rumor in Social NetworkDetection and Minimization Influence of Rumor in Social Network
Detection and Minimization Influence of Rumor in Social Network
 
2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis
 
The Impacts of Social Networking and Its Analysis
The Impacts of Social Networking and Its AnalysisThe Impacts of Social Networking and Its Analysis
The Impacts of Social Networking and Its Analysis
 
A1060104
A1060104A1060104
A1060104
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
A1060104
A1060104A1060104
A1060104
 
A REVIEW ON SOCIOLOGICAL IMPACTS OF SOCIAL NETWORKING
A REVIEW ON SOCIOLOGICAL IMPACTS OF SOCIAL NETWORKINGA REVIEW ON SOCIOLOGICAL IMPACTS OF SOCIAL NETWORKING
A REVIEW ON SOCIOLOGICAL IMPACTS OF SOCIAL NETWORKING
 
Social networking
Social networkingSocial networking
Social networking
 
Citizen speak out: public e-Engagement experience of Slovakia
Citizen speak out: public e-Engagement experience of Slovakia Citizen speak out: public e-Engagement experience of Slovakia
Citizen speak out: public e-Engagement experience of Slovakia
 
The Synereo Whitepaper
The Synereo WhitepaperThe Synereo Whitepaper
The Synereo Whitepaper
 
A Novel Frame Work System Used In Mobile with Cloud Based Environment
A Novel Frame Work System Used In Mobile with Cloud Based EnvironmentA Novel Frame Work System Used In Mobile with Cloud Based Environment
A Novel Frame Work System Used In Mobile with Cloud Based Environment
 
The Mathematics of Social Network Analysis: Metrics for Academic Social Networks
The Mathematics of Social Network Analysis: Metrics for Academic Social NetworksThe Mathematics of Social Network Analysis: Metrics for Academic Social Networks
The Mathematics of Social Network Analysis: Metrics for Academic Social Networks
 
Sampling of User Behavior Using Online Social Network
Sampling of User Behavior Using Online Social NetworkSampling of User Behavior Using Online Social Network
Sampling of User Behavior Using Online Social Network
 

Dernier

Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Dr.Costas Sachpazis
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
Tonystark477637
 

Dernier (20)

(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 

Least Cost Influence by Mapping Online Social Networks

  • 1. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 4, Issue 1, pp: (12-15), Month: April 2017 – September 2017, Available at: www.paperpublications.org Page | 12 Paper Publications Least Cost Influence by Mapping Online Social Networks 1 Bessmitha S, 2 Shajini N 1 PG Student, Dept of CSE, 2 Associate Professor, Dept of CSE Abstract: The online social network has become popular for sharing the information. Online social networks exhibit many platforms to create awareness of new products. In recent time Least cost Influence problem to find minimum number of seed user is most important topic in online social networks. The eventual target is to find the least advertising cost set of users which produce enormous influence. In existing many diffusion models are used. In this paper the stochastic threshold model is used to find the seed user in multiple online social networks to maximize the influence. This model decreases the processing time comparing to the other models. Keywords: Stochastic threshold model, influence, diffusion, multiple networks, online social networks. I. INTRODUCTION A social network is a social structure made up of a set of social actors such as individuals or organizations, and other social interactions between actors. The social network perspective provides a set of methods for analyzing the structure of whole social entities as well as a variety of theories explaining the patterns observed in these structures. The study of these structures uses social network analysis to identify local and global patterns, locate influential entities, and examine network dynamics. A Social network can be defined as a set of socially relevant individuals with some patterns of interactions or contacts among them, which are connected by one or more online relations. Online social networks (OSN) provide platforms for users to share information and to communicate with their families and friends. With the prosperous development of online social networks, many marketers have exploited the opportunities and attempt to select influential users within online social media to influence other users through online. The growth of online social networks like facebook, twitter, gmail and so on has created major communication medium. The people of 83% believe platforms like twitter, facebook help them make new friends. Each day facebook users spend 10.5 billion minutes on the online social network. 50% of facebook users have more than 100 friends, 340 million tweets are sent out every day on twitter. An online social network can be defined as a set of socially relevant individuals with some patterns of interactions or contacts among them, which are connected by one or more online relations. Online social networks provide platforms for users to communicate and share information with the relatives and friends effectively, connecting users across the world. The various online social networks are fundamentally classified by their node degree distributions. The most frequently mentioned categories of online social networks are randomly distributed, scale free and complex networks. Online social networks (OSN) are self-organizing, emergent, dynamic, and complex. They are most commonly characterized as scale-free and small-word effect. The scale-free network was defined as a social network whose degree distribution is at least infinitely close to a power law form indicating that the network is independent of the social network scale. The main feature of a scale-free social network is inhomogeneity. Most of the nodes in a social network have few physical link connections, while the connections of a few nodes far exceed the average number of physical link connections within the social network. An online social network is the small-word effect. It describes that almost any two nodes in the online social network even non-neighboring nodes can be connected by a very short path. In addition, small- world online social networks are governed by two important parameters clustering, coefficient and the diameter.
  • 2. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 4, Issue 1, pp: (12-15), Month: April 2017 – September 2017, Available at: www.paperpublications.org Page | 13 Paper Publications In many markets, customers are strongly influenced by the opinions of their friends. Viral marketing takes advantage of this to promote a product by marketing it primarily to those with the strongest influence in the market. Further people trust and act on recommendations from friends and their further influence their friends. This is referred to as influence propagation. Influence propagation has become an important mechanism for viral marketing. This further motivates the researchers to carry out extensive studies on various aspects of the influence propagation problem. Influence Maximization problem is a problem of finding a small set of nodes that maximizes the spread of influence. Table 1: list of Abbreviation LCI Least Cost Influence OSN Online Social Networks LT Linear Threshold IC Independent Cascade II. RELATED WORK In existing the single network was used. In this it is very difficult to find the overlapping users. While considering the single network the information are spread inaccurately. The influence in only one network fails to identify the most influential users [1]. There are also works on Linear Threshold (LT) model in which the active user can be found only up to a threshold value. Then the greedy algorithm is used in which the improvements are slow and not scalable. Here, a social network is modeled as a graph with nodes representing individuals and edges representing connections or relationship between two individuals. Influences are propagated in the network according to the model [2] .The researches have started to explore multiplex networks [3], [4] which studied the connection between offline and online networks. In existing it focus on information sharing but it does not focus on solving least cost influence problem. III. PROPOSED SYSTEM The Least Cost Influence (LCI) problem is solved by coupling multiple networks into single network. The seed user is found from multiple online social networks. The seed user refers to the user who is active for more time in online social network. The seed user will propagate massive influence. To find the seed user the stochastic threshold model and improved greedy algorithm is used. In particular, the improvement factor scales up with the size of the network which allows the algorithm to run on very large networks with millions of nodes. It improves the scalability in large network and has better marketing. A. Network initialization: A social networking service is a platform to build social networks or social relations among people who share similar personal and career interests, activities, background or real life connection. Create one or more social network for the information sharing in the online social network so it helps us to gather information from one user to another user. The accounts are initialized by registering all the individual elements into database and common password is given. By giving network id and password login to the network and the information are shared. B. Coupling network: The multiple networks are coupled into single network by using star lossless coupling. The lossless coupling scheme preserves all properties of original networks to achieve high-quality solutions. The star lossless coupling is the one in which multiple inputs are given and it gives one output. In star loss less coupling the coupling is done by synchronizing the network edges. The networks are coupled by connecting intermediate node. The intermediate node act as the gateway and all the information are transferred through the intermediate node. The lossless coupling scheme returns solution with higher quality. To understand the benefit of taking consideration of overlapping users and coupled network, influencing a fraction of the nodes in all networks by selecting seeds from each network and taking the union to compare with seeds achieved from lossless coupling scheme. C. Stochastic threshold model: The stochastic threshold is the threshold at which the analyst can be confident that if one peak for a heterozygote is above this threshold. This increases confidence in homozygous calls made for single source samples and alleles attributed to
  • 3. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 4, Issue 1, pp: (12-15), Month: April 2017 – September 2017, Available at: www.paperpublications.org Page | 14 Paper Publications each contributor in mixture analysis. The stochastic threshold is the point at which variation begins a rapid increase. In this model the heuristic of choosing nodes with probability distribution is done. The first node if chosen it will activate a large fraction of network. This model identifies a subset of individuals whom adopt a service or a product and in turn influence others, producing an effect which spreads in the social network as much as possible. D. Finding seed user: The seed users are the users that actively participate in network. In multiple networks the seed user is found based on all online social networks they participate. Seed user can trigger massive influence diffusion. The seed user is found by implementing greedy algorithm. The greedy algorithm is designed to achieve optimal solution. A scalable greedy algorithm is used to solve the LCI problem. The greedy algorithm runs much faster in the Lossless coupled networks. In particular, the improvement factor scales up with the size of the network which allows the algorithm to run on very large networks with millions of nodes. Considering multiplex networks instead of a single network can effectively choose the most influential users. In particular, the improvement factor scales up with the size of the network which allows the algorithm to run on very large networks with millions of nodes. Considering multiplex networks instead of a single network can effectively choose the most influential users. In greedy algorithm the threshold value is used. Given a system of coupled networks G. Initialize a heap. Add the active users having higher marginal gain with similar interest in to the heap. Counter value is updated for every addition of new users in to the heap. Repeat the process until there is no active user. Returns the node of maximum marginal value from a max heap after removing least marginal value user from the heap. The counter displays the updated value. The users who are using the network above threshold value are inserted in to the heap. The heap sorts the active user by extracting the maximum user. The heap is a special case of balanced binary tree data structure where root node is compared with its children and is sorted as key (α) ≥ key (β). The seed users are found and the information is shared through the seed user to the different network. The lossless coupling scheme achieves the best result in both networks. When the networks is considered as a standalone network and choose seeds individually, the seeds size is relatively larger than choosing from the coupled network. The sizes decrease this improvement is also due to the information diffusion across several networks by the overlapping users. Fig 1: Architecture diagram User1 Twitter Facebook Gmail Twitter Facebook Gmail User3 User2 Twitter Facebook Gmail Integrated Password Integrated Password Integrated Password Database Star Lossless coupling Greedy Algorithm Stochastic threshold model Seed User
  • 4. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 4, Issue 1, pp: (12-15), Month: April 2017 – September 2017, Available at: www.paperpublications.org Page | 15 Paper Publications The Fig.1 explains the system architecture of the proposed system to find seed user. The seed users are the one who active in online social network for long time. It is mainly used in viral marketing. When a company produces a new product they advertise the new products in online social networks. While advertising these products in single network its cost is very high and the seed user is found inaccurately because the seed user found in one network will be highly active in other network. To avoid this multiple network is used. The same user uses multiple networks. So to find the seed user in multiple networks the networks are coupled into single network. In this project facebook, gmail and twitter are considered. The user registers to multiple network and give the integrated password. The multiple networks of the different user are coupled using star lossless coupling. After coupling all the multiple networks into single network all these information are stored in the database. From the database by using greedy algorithm the performance of each user is analyzed and the seed user is found. In greedy algorithm the users above threshold value are inserted into the heap and heap sorts all the user and maximum user will be the seed user. IV. CONCLUSION The study of Influence Maximization is being studied from years. But this model neglected the effect of active users in the network and processing time of these model increased as network size increases. Hence, we proposed a stochastic threshold model for Influence Maximization in multiple online social networks. This model has better marketing and reduces the processing time. Advantages:  Improves the scalability in large networks.  Less processing time.  It triggers a massive influence.  It has better marketing. Disadvantages:  It relies on low degree of nodes.  Less realistic marketing.  Processing time is high. REFERENCES [1] Huiyuan Zhang, Dung T. Nguyen, and My T. Thai, “Least Cost Influence Across Multiple Social Networks,”IEEE/ACM Trans. Netw., vol.24, no.2, April 2016. [2] Kempe, J. Kleinberg, and E. Tardos, “Maximizing the spread of influence through a social network,” in Proc. KDD, 2003, pp. 137–146. [3] O. Yagan, D. Qian, J. Zhang, and D. Cochran, “Information diffusion in overlaying social-physical networks,” in Proc. CISS, 2012, pp. 1–6. [4] X. Liu, Q. He, Y. Tian, W.-C. Lee, J. McPherson, and J. Han, “Event based social networks: Linking the online and offline social worlds,” in Proc. KDD, 2012, pp. 1032–1040. [5] W. Chen, C. Wang, and Y. Wang, “Scalable influence maximization for prevalent viral marketing in large-scale social networks,” in Proc. SIGKDD, 2010, pp. 1029–1038. [6] H. Zhang, T. N. Dinh, and M. T. Thai, “Maximizing the spread of positive influence in online social networks,” in Proc. IEEE Int. Conf. Distrib.Computing Syst., 2013, pp. 317–326. [7] T. N. Dinh, H. Zhang, D. T. Nguyen, and M. T. Thai, “Cost-effective viral marketing for time-critical campaigns in large-scale social networks,” IEEE/ACM Trans. Netw., vol. 22, no. 6, pp. 2001–2011, Dec.2013.