A New Supervised Epidemic Model for Intelligent Viral Content Classification
AbstractIn this study, we propose an information diffusion model which is based on neural networks, artificial intelligence and supervised epidemic approach. We collected epidemically diffused data from Twitter with supervision to create a ranking system that forms the base of our diffusion model. The collected data is also used to train the proposed model. The outputs of the proposed model are shown to be useful for the provenance problem and the diffusion prediction systems in both physical and social networks. Knowing the viral content beforehand can be used in advertisement, industry, politics or any other end user that wants to reach a large number of people. Our performance analysis show that the proposed model can achieve over 90% training success rate and 78% test success rate of classifying viral content which is better than some of the existing models.
Barbier, G., Feng, Z., Gundecha, P., & Liu, H. (2013). Provenance data in social media. Synthesis Lectures on Data Mining and Knowledge Discovery, 4(1), 1-84.
Bakshy, E., Rosenn, I., Marlow, C., & Adamic, L. (2012, April). The role of social networks in information diffusion. In Proceedings of the 21st international conference on World Wide Web (pp. 519-528). ACM.
Milgram, S. (1967). The small world problem. Psychology today, 2(1), 60-67.
Wu, F., Huberman, B. A., Adamic, L. A., & Tyler, J. R. (2004). Information flow in social groups. Physica A: Statistical Mechanics and its Applications, 337(1), 327-335.
Zafarani, R., Abbasi, M. A., & Liu, H. (2014). Social media mining: an introduction. Cambridge University Press.
Keeling, M. J., & Eames, K. T. (2005). Networks and epidemic models. Journal of the Royal Society Interface, 2(4), 295-307.
Jin, Fang, et al. "Epidemiological modeling of news and rumors on Twitter. "Proceedings of the 7th Workshop on Social Network Mining and Analysis. ACM, 2013
Yang, Jaewon, and Jure Leskovec. "Modeling information diffusion in implicit networks." Data Mining (ICDM), 2010 IEEE 10th International Conference on. IEEE, 2010.
Leskovec, Jure, Lada A. Adamic, and Bernardo A. Huberman. "The dynamics of viral marketing." ACM Transactions on the Web (TWEB)1.1 (2007): 5
Bakshy, Eytan, et al. "The role of social networks in information diffusion. “Proceedings of the 21st international conference on World Wide Web. ACM, 2012
Aral, Sinan, and Dylan Walker. "Identifying influential and susceptible members of social networks." Science 337.6092 (2012): 337-341.
Guille, Adrien, and Hakim Hacid. "A predictive model for the temporal dynamics of information diffusion in online social networks." Proceedings of the 21st international conference companion on World Wide Web. ACM, 2012.
Md. S. Bayzid, A. Iqbal, C. S. Hyder, M. T. Irfan,” Application of Artificial Neural Network in Social Computing in the Context of Third World Countries”, 5th International Conference on Electrical and Computer Engineering, ICECE, 2008
M. Thelwall, D. Wilkinso, S. Uppal, “Data Mining Emotion in Social Network Communication: Gender Differences in MySpace”, Journal of the American Society for Information Science and Technology, 2010.
Zhao, J., Lui, J. C., Towsley, D., Guan, X., & Zhou, Y. (2011, April). Empirical analysis of the evolution of follower network: A case study on Douban. InComputer Communications Workshops (INFOCOM WKSHPS), 2011 IEEE Conference on (pp. 924-929). IEEE.
Ghenname, M., Abik, M., Ajhoun, R., Subercaze, J., Gravier, C., & Laforest, F. (2013, November). Personalized recommendation based hashtags on e-learning systems. In ISKO-Maghreb, 2013 3rd International Symposium (pp. 1-8). IEEE.
Li, L. H., Lee, F. M., & Liu, W. J. (2006). The timely product recommendation based on RFM method.
Shani, G., Meisles, A., Gleyzer, Y., Rokach, L., & Ben-Shimon, D. (2007). A stereotypes-based hybrid recommender system for media items. In Workshop on Intelligent Techniques for Web Personalization, Vancouver, Canada (pp. 76-83).
Diao, Q., Qiu, M., Wu, C. Y., Smola, A. J., Jiang, J., & Wang, C. (2014, August). Jointly modeling aspects, ratings and sentiments for movie recommendation (jmars). In Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining (pp. 193-202). ACM.
Kong, D., & Zhai, Y. (2012, November). Trust based recommendation system in service-oriented cloud computing. In Cloud and Service Computing (CSC), 2012 International Conference on (pp. 176-179). IEEE.
E. Tyugu, “Artificial Intelligence in Cyber Defense”, 3rd International Conference on Cyber Conflict, pp. 1-11, Tallinn, 2011
W. Britt, S. Gopalaswamy, J. A. Hamilton, G. V. Dozier, K. H. Chang, “Computer Defense Using Artificial Intelligence”, Spring simulation multiconference, Vol. 3, pp. 378-386, 2007
L.A. M. Pereira, L. C. S. Afonso, J. P. Papa, Z. A. Vale, C. C. O. Ramos, D.S. Gastaldello, A.N. Souza , “Multilayer Perceptron Neural Networks Training Through Charged System Search and its Application for Non-Technical Losses Detection”, Innovative Smart Grid Technologies Latin America (ISGT LA), pp. 1-6, Sao Paulo, 2013
Y. Lin, “Application of Extracted Rules from a Multilayer Perceptron Network to Moulding Machine Cycle Time Improvement”, IEEE Transactions On Components, Packaging And Manufacturing Technology, Vol. 1(3), pp. 436 – 445, 2011
S. Sagiroglu, U. Yavanoglu, E. N. Guven, “Web based Machine Learning for Language Identification and Translation”, International Conference on Machine Learning and Applications, pp. 280-285, Cincinnati, OH, 2007
U. Yavanoglu, O. Kaplan, H. Atli, G. Tanis, O. Milletsever, S. Sagiroglu, “Intelligent Decision Support System For Energy Investments”, 12th International Conference on Machine Learning and Applications (ICMLA), vol. 2, pp. 224-231, Miami, FL, 2013
Van Mieghem, P., Omic, J., & Kooij, R. (2009). Virus spread in networks.IEEE/ACM Transactions on Networking, 17(1), 1-14.
Copyright (c) 2018 International Journal of Intelligent Systems and Applications in Engineering
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.