Deployment of social nets in multi-layer model to identify Key individuals using majority voting
Social web and social media are evidenced to be a rich source of user-generated social content. Social media includes multiple numbers of social dimensions represented by different social networks. The identification of important player in these real-world social networks has been in high emphasis...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
Springer Link
2019
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/74472/ http://irep.iium.edu.my/74472/ http://irep.iium.edu.my/74472/ http://irep.iium.edu.my/74472/1/74472_Deployment%20of%20Social%20Nets%20in%20Multi-layer%20model_complete.pdf |
Summary: | Social web and social media are evidenced to be a rich source of user-generated social content. Social media includes multiple numbers of social dimensions represented by different social networks. The identification of important player in these real-world social networks has been in high emphasis due to its effectiveness in multiple disciplines, especially in Law enforcement areas working on dark networks. Many algorithms have been proposed to identify key players according to the objective of interest using suitable network centrality measures. This paper proposes a new perspective of dealing with key players identification by redefining it as a problem of “Key Individual Identification,” across multiple social dimensions. Research deals with each social dimension as a layer in the multiple-layer social network model. The proposed technique extracts a number of features from each network based on social network analysis. The features are assembled to formulate a global feature set representing the behaviors of individuals in all networks individually. The technique then attempts to find key individuals using hybrid classifiers. The results from all classifiers are formulated, and the final decision of an individual to be part of the Individual key set is based on majority voting. This novel technique gives good results on a number of known networks. |
---|