Advertisement

ActiveDBC: learning Knowledge-based Information propagation in mobile social networks

  • Jiho Park
  • Jegwang Ryu
  • Sung-Bong Yang
Article

Abstract

Due to fast-growing mobile devices usage such as smartphones and wearable devices, the rapid information propagation in the Mobile Social Networks environment is very important. In particular, information transmission of people with repeated daily patterns in complex areas such as big cities requires a very meaningful analysis. We address the problem of identifying a key player who can quickly propagate the information to the whole network. This problem, in other words, often refer as the information propagation problem. In this research, we selected the top-k influential nodes to learn the knowledge-based movements of people by using a Markov chain process in a real-life environment. Subsequently, their movement probabilities according to virtual regions were used to ensure appropriate clustering based on the Density-based Spatial Clustering of Applications with Noise (DBSCAN) algorithm. Since moving patterns in a university campus data have a dense collection of people, the DBSCAN algorithm was useful for producing very dense groupings. After clustering, we also elected the top-k influential nodes based on the results learned from the score of each node according to groups. We determined the rate at which information spreads by using trace data from a real network. Our experiments were conducted in the Opportunistic Network Environment simulator. The results showed that the proposed method has outstanding performance for the level of spreading time in comparison to other methods such as Naïve, Degree, and K-means. Furthermore, we compared the performance of RandomDBC with that of ActiveDBC, proving that the latter method was important to extract the influential top-k nodes, and showed superior performance.

Keywords

DBSCAN Markov chain Machine learning Real trace data Opportunistic network environment simulator 

Notes

Acknowledgements

This research was supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education, Science, and Technology (2016R1A2B4010142).

References

  1. 1.
    Xu, Q., Su, Z., Zhang, K., Ren, P., & Shen, X. S. (2015). Epidemic information dissemination in mobile social networks with opportunistic links. IEEE Transactions on Emerging Topics in Computing, 3(3), 399–409.CrossRefGoogle Scholar
  2. 2.
    Ma, H., Yang, H., Lyu, M. R., & King, I. (2008). Mining social networks using heat diffusion processes for marketing candidates selection. In Proceedings of the 17th ACM conference on information and knowledge management (pp. 233–242).Google Scholar
  3. 3.
    Kempe, D., Kleinberg, J., & Tardos, E. (2003). Maximizing the spread of influence through a social network. In: Proceedings of ACM SIGKDD.Google Scholar
  4. 4.
    Lu, Z., Wen, Y., & Cao, G. (2014). Information diffusion in mobile social networks: The speed perspective. In Proceedings of IEEE INFOCOM (pp. 1932–1940).Google Scholar
  5. 5.
    Ning, T., Yang, Z., Wu, H. & Han, Z. (2013). Self-interest-drive incentives for ad dissemination in autonomous mobile social networks. In: Proceedings of IEEE INFOCOM.Google Scholar
  6. 6.
    Kempe, D., Kleinberg, J., & Tardos, É. (2003). Maximizing the spread of influence through a social network. In Proceedings of the 9th ACM SIGKDD international conference on knowledge discovery and data mining (pp. 137–146).Google Scholar
  7. 7.
    Richardson, M., & Domingos, P. (2002). Mining knowledge-sharing sites for viral marketing. In Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining (pp. 61–70).Google Scholar
  8. 8.
    Myers, S. A., Zhu, C., & Leskovec, J. (2012). Information diffusion and external influence in networks. In Proceedings of the 18th ACM SIGKDD international conference on knowledge discovery and data mining (pp. 33–41).Google Scholar
  9. 9.
    Kim, Y., Kim, J. K., Seok, J., & Du Kim, B. (2016). Information propagation modeling in a drone network using disease epidemic models. In 2016 Eighth international conference on ubiquitous and future networks (ICUFN) (pp. 79-81).Google Scholar
  10. 10.
    Araniti, G., Orsino, A., Militano, L., Wang, L., & Iera, A. (2017). Context-aware information diffusion for alerting messages in 5G mobile social networks. IEEE Internet of Things Journal, 4(2), 427–436.CrossRefGoogle Scholar
  11. 11.
    Chen, W., Wang, C., & Wang, Y. (2010). Scalable influence maximization for prevalent viral marketing in large-scale social networks. In: Proceedings of ACM SIGKDD.Google Scholar
  12. 12.
    Wang, Y., Cong, G., Song, G., & Xie, K. (2010). Community-based greedy algorithm for mining top-k influential nodes in mobile social networks. In: Proceedings of ACM SIGKDD.Google Scholar
  13. 13.
    Lu, Z., Wen, Y., Zhang, W., Zheng, Q., & Cao, G. (2016). Towards information diffusion in mobile social networks. IEEE Transactions on Mobile Computing, 15(5), 1292–1304.CrossRefGoogle Scholar
  14. 14.
    Lu, Z., Sun, X., & La Porta, T. (2016). Cooperative data offload in opportunistic networks: From mobile devices to Infrastructure. arXiv preprint arXiv:1606.03493.
  15. 15.
  16. 16.
    Lee, J. K., & Hou, J. C. (2006). Modeling steady-state and transient behaviors of user mobility: formulation, analysis, and application. In Proceedings of the 7th ACM international symposium on Mobile ad hoc networking and computing (pp. 85–96).Google Scholar
  17. 17.
    Ester, M., Kriegel, H. P., Sander, J., & Xu, X. (1996). A density-based algorithm for discovering clusters in large spatial databases with noise. In: Kdd (Vol. 96, No. 34, pp. 226–231).Google Scholar
  18. 18.
    Mai, S. T., Assent, I., & Storgaard, M. (2016, August). AnyDBC: An Efficient Anytime Density-based Clustering Algorithm for Very Large Complex Datasets. In Proceedings of the 22nd ACM SIGKDD international conference on knowledge discovery and data mining (pp. 1025–1034). ACM.Google Scholar
  19. 19.
    Keranen, A. (2008). Opportunistic network environment simulator. Special Assignment report, Helsinki University of Technology, Department of Communications and Networking.Google Scholar
  20. 20.
    Conti, M., Giordano, S., May, M., & Passarella, A. (2010). From opportunistic networks to opportunistic computing. IEEE Communications Magazine, 48(9), 126–139.CrossRefGoogle Scholar
  21. 21.
    Zhang, Z. (2006). Routing in intermittently connected mobile ad hoc networks and delay tolerant networks: Overview and challenges. IEEE Communications Surveys and Tutorials, 8(1), 24–37.CrossRefGoogle Scholar
  22. 22.
    Tsai, T. C., & Chan, H. H. (2015). NCCU trace: Social-network-aware mobility trace. IEEE Communications Magazine, 53(10), 144–149.CrossRefGoogle Scholar
  23. 23.
    Fratini, A., & Caleffi, M. (2014). Medical emergency alarm dissemination in urban environments. Telematics and Informatics, 31(3), 511–517.CrossRefGoogle Scholar
  24. 24.
    Pelusi, L., Passarella, A., & Conti, M. (2006). Opportunistic networking: data forwarding in disconnected mobile ad hoc networks. IEEE Communications Magazine, 44(11), 15.CrossRefGoogle Scholar
  25. 25.
    Srinivasan, V., Motani, M., Ooi, W.T. (2006). Analysis and implications of student contact patterns derived from campus schedules. In: Proceedings of ACM MobiCom, Los Angeles, CA (pp. 86–97).Google Scholar
  26. 26.
    Hui, P. (2008). People are the network: experimental design and evaluation of social-based forwarding algorithms, Ph.D. Dissertation, UCAM-CL-TR-713. University of Cambridge, Computer Laboratory.Google Scholar
  27. 27.
    Eagle, N., & Pentland, A. (2006). Reality mining: sensing complex social systems. Personal and Ubiquitous Computing, 10(4), 255–268.CrossRefGoogle Scholar
  28. 28.
    Socievole, A., De Rango, F., Caputo, A. (2014). Wireless contacts, Facebook friendships and interests: analysis of a multi-layer social network in an academic environment. In: 2014 IFIP Wireless Days (WD).Google Scholar
  29. 29.
    Freeman, L. C. (1978). Centrality in social networks conceptual clarification. Social Networks, 1(3), 215–239.CrossRefGoogle Scholar
  30. 30.
    Alsabti, K., Ranka, S., & Singh, V. (1997). An efficient k-means clustering algorithm.Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2017

Authors and Affiliations

  1. 1.Department of Computer ScienceYonsei UniversitySeoulKorea

Personalised recommendations