Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Social network combined ring layer user comprehensive influence evaluation and forgery discrimination method

A social network and discriminative method technology, applied in data processing applications, special data processing applications, instruments, etc., can solve the problems of unreliable and missing social network information in behavior changes among users

Active Publication Date: 2020-11-06
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF3 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, most of the research methods on user influence are carried out on the basis of multivariate information, only focusing on the direct behavior of individual users and self-defined basic information, without deeply integrating the circles they belong to, cascading forwarding structure, and time quantification factors and other important factors, ignoring the behavior changes among users in the process of information dissemination and the problems of unreliable or missing information in real social networks.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Social network combined ring layer user comprehensive influence evaluation and forgery discrimination method
  • Social network combined ring layer user comprehensive influence evaluation and forgery discrimination method
  • Social network combined ring layer user comprehensive influence evaluation and forgery discrimination method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0108] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0109] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0110] It should be noted that the technical solutions of the various embodiments can be combined with each other, but it must be based on the realization of those skilled in the art. When the combination of technical solutions is contradictory or cannot be realized, it should be regarded as a combination o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a social network combined ring layer user comprehensive influence evaluation and forgery discrimination method. The method for evaluating the comprehensive influence of circleusers comprises the steps of user identity information mapping, user indirect influence evaluation, user direct influence evaluation, user influence anomaly detection, influence comprehensive evaluation, influence hierarchical tagging and the like. According to the invention, influence measurement analysis is carried out on social network user attribute information and circle layer key event information in a database. The quantified influence is subjected to anomaly detection, the complexity of evaluating the user influence in a complex relation network is reduced, and finally, the user influence evaluation result is obtained through tagging for semantic expression, so that the method is intuitive and easy to understand.

Description

technical field [0001] The invention relates to the field of network influence assessment, in particular to a method for comprehensive influence assessment and forgery discrimination of circle users combined with social networks. Background technique [0002] With the help of big data and the rapid development of mobile social technology, today's social network presents significant characteristics of mobility and localization. At present, most of the research methods on user influence are carried out on the basis of multivariate information, only focusing on the direct behavior of individual users and self-defined basic information, without deeply integrating the circles they belong to, cascading forwarding structure, and time quantification factors and other important factors, ignoring the behavior changes among users in the process of information dissemination and the problems of unreliable or missing information in real social networks. Although the real influence of use...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/9536G06Q50/00
CPCG06F16/9536G06Q50/01
Inventor 张凤荔谭琪王瑞锦张志扬刘楠李志郭鹏宇王雪婷
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products