Application of a time delay neural network for predicting positive and negative links in social networks

Application of a time delay neural network for predicting positive and negative links in social networks

The structure of online social networks cannot in most cases be defined only by the relationships among its members. The interuser relations on the website of social networks are often a mixture of positive and friendly interactions, such as trust and interest, and at the same time negative interactions, such as mistrust and lack of interest. One of the issues with signed social networks is the prediction of edge signs. Some of the most recent studies have tried to extract features of the users and their relations with their neighbors to solve this problem. The results of such works demonstrate a relative success for such efforts. The present paper is an effort to offer a rather new approach to solve the problem that has not been addressed yet. The approach uses the distributed time delay neural network to present a model capable of predicting the sign of hidden or unknown edges. The goal is to have the neural network trained by available data and then assess its efficiency of the network. Our implementation on the actual datasets of Slashdot media shows that the algorithm, while simple, has a higher rate of precision in comparison to other existing methods.

___

  • [1] Ye J, Cheng H, Zhu Z, Chen M. Predicting positive and negative links in signed social networks by transfer learning. In: Proceedings of the 22nd International Conference on World Wide Web; 13–17 May 2013. pp. 1477-1488.
  • [2] Leskovec J, Huttenlocher D, Kleinberg J. Predicting positive and negative links in online social networks. In: Proceedings of the 19th International Conference on World Wide Web; 26–30 April 2010. pp. 641-650.
  • [3] Newman MEJ. The structure and function of complex networks. SIAM Rev 2003; 45: 167-256.
  • [4] Burke M, Kraut R. Mopping up: modeling Wikipedia promotion decisions. In: Proceedings of the 2008 ACM conference on Computer Supported Cooperative Work; 8–12 November 2008. pp. 27-36.
  • [5] Guha R, Kumar R, Raghavan P, Tomkins A. Propagation of trust and distrust. In: Proceedings of the 13th International Conference on World Wide Web; 17–22 May 2004. pp. 403-412.
  • [6] Massa P, Avesani P. Controversial users demand local trust metrics: an experimental study on epinions.com community. In: Proceedings of the 20th National Conference on Artificial Intelligence; 2005. pp. 121-126.
  • [7] Brzozowski MJ, Hogg T, Szabo G. Friends and foes: ideological social networking. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems; 5–10 April 2008. pp. 817-820.
  • [8] Kunegis J, Lommatzsch A, Bauckhage C. The Slashdot Zoo: mining a social network with negative edges. In: Proceedings of the 18th International Conference on World Wide Web; 20–24 April 2009. pp. 741-750.
  • [9] Lampe CAC, Johnston E, Resnick P. Follow the reader: filtering comments on Slashdot. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems; 2007. pp. 1253-1262.
  • [10] Leskovec J, Huttenlocher D, Kleinberg J. Signed networks in social media. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems; 2010. pp. 1361-1370.
  • [11] Dubois T, Golbeck J, Srinivasan A. Predicting trust and distrust in social networks. Privacy, security, risk and trust (PASSAT). In: 2011 IEEE Third International Conference on Social Computing; 2011. pp. 418-424.
  • [12] Wang C, Bulatov AA. Inferring attitude in online social networks based on quadratic correlation. In: Yu JXU, Ravindran B, Pudi V, editors. Advances in Knowledge Discovery and Data Mining. Cambridge, MA, USA: AAAI Press, 2014. pp. 139-150.
  • [13] Liu F, Liu B, Wang X, Liu M, Wang B. Features for link prediction in social networks: a comprehensive study. In: IEEE International Conference on Systems, Man, and Cybernetics; 2012. pp. 1706-1711.
  • [14] Chiang KY, Natarajan N, Tewari A, Dhillon IS. Exploiting longer cycles for link prediction in signed networks. In: Proceedings of the 20th ACM International Conference on Information and Knowledge Management; 2011. pp. 1157-1162.
  • [15] Malekzadeh M, Fazli M, Khalilabadi PJ, Rabiee H, Safari M. Social balance and signed network formation games. In: Proceedings of KDD Workshop on Social Network Analysis; 2011.
  • [16] Haykin S. Neural Networks: A Comprehensive Foundation. New York, NY, USA: Pearson Education.
  • [17] Waibel A, Hanazawa T, Hinton G, Shikano K, Lang KJ. Phoneme recognition using time-delay neural networks. IEEE T Acoust Speech 1989; 37: 328-339.
  • [18] Reese MG. Application of a time-delay neural network to promoter annotation in the Drosophila melanogaster genome. Comput Chem 2001; 26: 51-56.
  • [19] More JJ The Levenberg-Marquardt algorithm: implementation and theory In: Watson GA, editor Numerical Analysis New York, NY, USA: Springer, 1978 pp 105-116.
  • [20] Dohnal IJ. Using of Levenberg-Marquardt method in identification by neural networks. In: Student EEICT; 2004. pp. 361-365.
  • [21] Zouhal LM, Denoeux T. An evidence-theoretic K-NN rule with parameter optimization. IEEE T Syst Man Cy C 1998; 28: 263-271.
  • [22] Kavousi K, Sadeghi M, Moshiri B, Araabi BN, Moosavi-Movahedi AA. Evidence theoretic protein fold classification based on the concept of hyperfold. Math Biosci 2012; 240: 148-160.
Turkish Journal of Electrical Engineering and Computer Sciences-Cover
  • ISSN: 1300-0632
  • Yayın Aralığı: 6
  • Yayıncı: TÜBİTAK
Sayıdaki Diğer Makaleler

Bayesian compressive sensing framework for spectrum reconstruction in Rayleigh fading channels

Asad MAHMOOD, Abdul GHAFOOR, Sajjad HUSSAIN, Nadia IQBAL

Modeling and rotor field-oriented control of a faulty three-phase induction motor based on GSA for tuning of PI controllers

Mohammad JANNATI, Ali MONADI, Nik Rumzi NIK IDRIS, Ahmad Athif MOHD FAUDZI, Frede BLAABJERG

Power system harmonic reduction and voltage control using DFIG converters as an active filter

Eskandar GHOLIPOUR, Seyyed Mostafa NOSRATABADI

Novel, graded, priority-oriented admission control in mobile networks

Siddu Payappa ALGUR, Niharika KUMAR

Peak-to-average power ratio reduction using backtracking search optimization algorithm in OFDM systems

Necmi TAŞPINAR, Yüksel BOZKURT TOKUR

An adaptive fuzzy PI controlled bus quantity enhancer for wave energy systems

Emre OZKOP, ismail Hakkı ALTAŞ, Adel Mahmoud SHARAF

Enhancement of a reduced order doubly fed induction generator model for wind farm transient stability analyses

Mehmet Kenan DÖŞOĞLU, Ayşen ARSOY BASA

Fast measurement of headlamps by means of a developed fuzzy luxmeter based on a fuzzy mapping algorithm

Mustafa Şinasi AYAS, İsmail Hakkı ALTAŞ, Turhan ALÇELİK

Gravitational search algorithm for determining controller parameters in an automatic voltage regulator system

Nuran YORÜKEREN, Serhat DUMAN, İsmail H. ALTAŞ

Shunt active power filter control for compensating current power quality problems in three-phase three-wire systems based on an adaptive notch filter

Seyed Hossein TABATABAEI, Mehran BAJESTAN MOSLEHI, Alireza JALILIAN