Responsive image
博碩士論文 etd-0115116-163418 詳細資訊
Title page for etd-0115116-163418
論文名稱
Title
新貪婪基因演算法解社群網路影響力最大化問題
A NewGreedy Genetic Algorithm for Influence Maximization in Social Network
系所名稱
Department
畢業學年期
Year, semester
語文別
Language
學位類別
Degree
頁數
Number of pages
53
研究生
Author
指導教授
Advisor
召集委員
Convenor
口試委員
Advisory Committee
口試日期
Date of Exam
2016-01-15
繳交日期
Date of Submission
2016-02-15
關鍵字
Keywords
社群網路、影響力最大化問題、基因演算法、新式貪婪演算法、傳播模型、演化式演算法
influence maximization problem, social network, meta-heuristic algorithm, genetic algorithm, NewGreedy algorithm, propagation model
統計
Statistics
本論文已被瀏覽 5720 次,被下載 0
The thesis/dissertation has been browsed 5720 times, has been downloaded 0 times.
中文摘要
隨著網路技術的成熟,社群網路已經逐漸融入了人們的生活,人們可以藉由發表訊息在社群網路上,將自己的所見所聞分享給他們的朋友。因此將廣告放在社群網路上,藉由分享訊息的動作,為產品打廣告,如何在社群網路中挑選那些影響力大的人變成了現今重要的議題。這類型的問題稱之為影響力最大化問題,目標在於尋找一個元素數量為 k 的種子集,使得此種子集的影響力為最大。影響力是透過傳播模型計算得知,由於此問題是一個 NP-hard 問題。很難在一個合理的時間內尋找到最佳解。有學者設計一個 greedy 演算法,來尋求此問題的近似解,但效果不是很理想。因此本論文設計了一個高效能的演算法,以新式貪婪演算法降低重複搜尋的核心概念來增強基因演算法的搜尋效率。本論文使用了數個社群網路的資料集,並與其他演算法比較。實驗結果顯示,本論文提出之演算法在種子集較大時,找到的種子集之影響力優於傳統的基因演算法 10%,而且搜尋速度也比一些演化式演算法來的快速。
Abstract
With the advance of computer and internet technologies, social networks have become an integral part of most people’s life. People can now use social networks to send out messages. They can also share pictures or articles with their friends. For this reason, many businessmen advertise their products by the social networks. As such, one of the critical research topics that come up is how to find people that have the largest influence; i.e., the so-called influence maximization problem. The goal of this problem is to find a k-size seed set which has a maxi-
mum influence with respect to a particular propagation model. For the influence maximization problem is NP-hard, it is obvious that an exhausted search algorithm is not able to fine the solution in a reasonable time. In order to solve this problem, some researchers rely on greedy algorithms to find a approximate solution for this problem, but the quality of the solution is simply not good enough. Hence, a high-performance algorithm for solving the influence maximization problem, which leverages the strength of the new greedy algorithm and the genetic algorithm (GA), is presented in this thesis. Experimental results show that the proposed algorithm outperforms simple GA by about 10% in terms of the quality, with the speed that is faster than many meta-heuristic algorithms.
目次 Table of Contents
論文審定書 i
誌謝 iii
摘要 iv
Abstract v
List of Figures viii
List of Tables ix
Chapter 1 簡介 1
1.1 動機 2
1.2 論文貢獻 3
1.3 論文架構 3
Chapter 2 相關文獻探討 5
2.1 影響力最大化問題 5
2.1.1 定義 5
2.1.2 傳播模型(Propagation Model) 6
2.1.2.1 Independent Cascade Model 7
2.1.2.2 Linear Threshold Model 9
2.1.3 計算影響力 10
2.2 貪婪演算法 10
2.3 Cost-Effective Lazy Forward演算法 12
2.4 新式貪婪演算法 12
2.5 模擬退火演算法 13
2.6 基因演算法 15
2.7 結論 17
Chapter 3 新貪婪基因演算法 18
3.1 演算法設計概念 18
3.2 演算法流程 19
3.2.1 初始化設定 19
3.2.2 更新 21
3.2.3 選擇 21
3.2.4 交配 23
3.2.5 突變 24
3.3 範例 25
Chapter 4 實驗結果 27
4.1 執行環境、參數設定 27
4.2 模擬結果 28
4.2.1 資料集介紹 28
4.2.2 實驗數據分析 29
4.2.2.1 影響力 29
4.2.2.2 標準差 31
4.2.2.3 時間 33
4.3 總結 35
Chapter 5 結論與未來展望 37
5.1 結論 37
5.2 未來展望 37
Bibliography 39
參考文獻 References
[1] internet live stats, “Internet Users,” Accessed on February 14, 2016. [Online]. Available: http://www.internetlivestats.com/internet-users/
[2] K. Zhongbao and Z. Changshui, “Reply networks on a bulletin board system,” Phys. Rev.E, vol. 67, no. 3, p. 036117, 2002.
[3] H. Rheingold, The virtual community: Homesteading on the electronic frontier.MIT Press, 1993, vol. 2.
[4] J. A. Oravec, “Bookmarking the world: Weblog applications in education,” Adolescent and Adult Literacy, vol. 45, no. 7, pp. 616–621, 2002.
[5] Wikipedia, “Social networking service,” Accessed on February 14, 2016. [Online]. Available: https://en.wikipedia.org/wiki/Social networking service
[6] Facebook, “Company Info,” Accessed on February 14, 2016. [Online]. Available: http://newsroom.fb.com/company-info/
[7] S. Keach, “Instagram February 14, now has more 2016. [Online]. Available: users than Twitter,” Accessed on http://www.trustedreviews.com/news/instagram-now-has-more-users-than-twitter
[8] C. Smith, “By the numbers: 40 amazing weibo statistics,” Accessed on February 14, 2016. [Online]. Available: http://expandedramblings.com/index.php/weibo-user-statistics/
[9] W. Raghupathi and V. Raghupathi, “Big data analytics in healthcare: promise and potential,” Health Information Science and Systems, vol. 2, no. 1, p. 3, 2014.
[10] A. Goyal, F. Bonchi, and L. V. S. Lakshmanan, “A data-based approach to social influence maximization,” Very Large Data Base Endowment, vol. 5, no. 1, pp. 73–84, 2011.
[11] W. Chen, C. Wang, and Y. Wang, “Scalable influence maximization for prevalent viral marketing in large-scale networks,” in Proceedings of ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2010, pp. 1029–1038. [12] S. Bharathi, D. Kempe, and M. Salek, “Competitive influence maximization in social networks,” in Internet and Network Economics, 2007, pp. 306–311.
[13] N. Du, B. Wu, X. Pei, B. Wang, and L. Xu, “Community detection in large-scale social networks,” in Proceedings of the WebKDD and SNA-KDD 2007 Workshop on Web Mining and Social Network Analysis, 2007, pp. 16–25.
[14] S. Fortunato, “Community detection in graphs,” Physics Reports, vol. 486, no. 3-5, pp. 75–174, 2010.
[15] S. Bhagat, G. Cormode, and S. Muthukrishnan, “Node classification in social networks,” in Social Network Data Analytics, 2011, pp. 115–148.
[16] T. Kajdanowicz, P. Kazienko, and P. Doskocz, “Label-dependent feature extraction in social networks for node classification,” in Social Informatics, 2010, pp. 89–102.
[17] C. C. Aggarwal and H. Wang, “Text mining in social networks,” in Social Network Data Analytics, 2011, pp. 353–378.
[18] C. C. Aggarwal and C. Zhai, Mining Text Data. Springer, 2012.
[19] C. C. Aggarwal and H. Wang, “An introduction to social network data analytics,” in Social Network Data Analytics, 2011, pp. 1–15.
[20] C. Faloutsos and K.-I. Lin, “Fastmap: A fast algorithm for indexing, data-mining and visualization of traditional and multimedia datasets,” Special Interest Group on Management of Data Record, vol. 24, no. 2, pp. 163–174, 1995.
[21] D. S. Hochbaum, Approximation Algorithm for NP-hard Problems. PWS Publishing Co., 1996.
[22] D. Kempe, J. Kleinberg, and E. Tardos, “Maximizing the spread of influence through a social network,” in Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2003, pp. 137–146.
[23] J. Leskovec, A. Krause, C. Guestrin, C. Faloutsos, J. VanBriesen, and N. Glance, “Cost-effective outbreak detection in networks,” in Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2007, pp. 420–429.
[24] W. Chen, Y. Wang, and S. Yang, “Efficient influence maximization in social networks,” in Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2009, pp. 199–208.
[25] M. Dorigo and M. Birattari, “Ant colony optimization,” in Encyclopedia of Machine Learning, 2010, pp. 36–39.
[26] M. Dorigo and L. M. Gambardella, “Ant colony system: a cooperative learning approach to the traveling salesman problem,” IEEE Transactions on Evolutionary Computation, vol. 1, no. 1, pp. 53–66, 1997.
[27] J. Kennedy, “Particle swarm optimization,” in Encyclopedia of Machine Learning, 2010, pp. 760–766.
[28] H. P. Moreton and C. H. S ́equin, “Functional optimization for fair surface design,” SIGGRAPH Computer Graphic, vol. 26, no. 2, pp. 167–176, 1992.
[29] Q. Jiang, G. Song, G. Cong, Y. Wang, W. Si, and K. Xie, “Simulated annealing based influence maximization in social networks,” in Proceedings of the Association for the Advancement of Artificial Intelligence, 2011, pp. 127–132.
[30] J. Guo, Y. Liu, J. Shen, Z. Wei, and J. Lv, “Influence maximization algorithm based on genetic algorithm,” Computational Information System, vol. 10, no. 21, pp. 9255–9262, 2014.
[31] M. Basilevsky and A. Shamov, “The local definition of the optimum ascent path on a multi-dimensional potential energy surface and its practical application for the location of saddle points,” Chemical Physics, vol. 60, no. 3, pp. 347–358, 1981.
[32] W. Chen, Y. Yuan, and L. Zhang, “Scalable influence maximization in social networks under the linear threshold model,” in Proceedings of the IEEE International Conference on International Component Manufacturing & Design Show, 2010, pp. 88–97.
[33] S. Z. Selim and K. Alsultan, “A simulated annealing algorithm for the clustering problem,” Pattern Recongnition, vol. 24, no. 10, pp. 1003–1008, 1991.
[34] A. K. Jain, M. N. Murty, and P. J. Flynn, “Data clustering: A review,” ACM Computing Surveys, vol. 31, no. 3, pp. 264–323, 1999.
[35] J. Beasley and P. Chu, “A genetic algorithm for the set covering problem,” European Journal of Operational Research, vol. 94, no. 2, pp. 392–404, 1996.
[36] M. Research, “Influence diffusion dynamics and influence maximization in social networks,” Accessed on February 14, 2016. [Online]. Available: http://research.microsoft.com/en-us/people/weic/projects.aspx
[37] J. Leskovec, “General relativity and quantum cosmology collaboration network,” Accessed on February 14, 2016. [Online]. Available: https://snap.stanford.edu/data/ca-GrQc.html
電子全文 Fulltext
本電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。
論文使用權限 Thesis access permission:自定論文開放時間 user define
開放時間 Available:
校內 Campus:永不公開 not available
校外 Off-campus:永不公開 not available

您的 IP(校外) 位址是 3.141.198.146
論文開放下載的時間是 校外不公開

Your IP address is 3.141.198.146
This thesis will be available to you on Indicate off-campus access is not available.

紙本論文 Printed copies
紙本論文的公開資訊在102學年度以後相對較為完整。如果需要查詢101學年度以前的紙本論文公開資訊,請聯繫圖資處紙本論文服務櫃台。如有不便之處敬請見諒。
開放時間 available 永不公開 not available

QR Code