Social Network Extraction: A Review of Automatic Techniques

نویسندگان

  • Tasleem Arif
  • Rashid Ali
  • M. Asger
چکیده

The advent of Web 2. 0 has been instrumental in paradigm shift of how people communicate? These communications are a rich source of relationship data. Analyzing such a vast amount of relationship data is not a trivial task. Social Network Analysis is a promising field of research to take advantage of this huge pool of relationship data. But before this data is analyzed from Social Network Analysis perspective, Social Networks have to be extracted from this data. Social network extraction deals with the extraction of online social networks from a wide variety of online resources. These resources include web documents, e-mail communication, Internet relay chats, web usage logs, event logs, instant messenger logs, online blogs etc. Social network extraction is beneficial for many Web mining and social network applications such as expert finding for research guidance, potential speakers and contributors for conferences, journals, workshops, product recommendation, targeted advertising etc. In the last decade, many efforts have been made in the area of social network extraction. As a result, a good number of social network extraction methods have been proposed in the literature. These social network extraction methods use different sources for social network extraction. Some of these systems also use data from more than one resource. Although there are some social

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Advanced Hybrid Honeypot for Providing Effective Resistance in Automatic Network Generation

Increasing usage of Internet and computer networks by individuals and organizations and also attackers’ usage of new methods and tools in an attempt to endanger network security, have led to the emergence of a wide range of threats to networks. A honeypot is one of the basic techniques employed for network security improvement. It is basically designed to be attacked so as to get the attackers’...

متن کامل

A review of neural network detection methods for breast cancer: review article

Breast cancer is the most common cancer among women and the earlier it is diagnosed, the easier it is to treat. The most common way to diagnose breast cancer is mammography. Mammography is a simple chest x-ray and a tool for early detection of non-palpable breast cancers and tumors. However, due to some limitations of this method such as low sensitivity especially in dense breasts, other method...

متن کامل

Reverse Engineering of Network Software Binary Codes for Identification of Syntax and Semantics of Protocol Messages

Reverse engineering of network applications especially from the security point of view is of high importance and interest. Many network applications use proprietary protocols which specifications are not publicly available. Reverse engineering of such applications could provide us with vital information to understand their embedded unknown protocols. This could facilitate many tasks including d...

متن کامل

Using Machine Learning Algorithms for Automatic Cyber Bullying Detection in Arabic Social Media

Social media allows people interact to express their thoughts or feelings about different subjects. However, some of users may write offensive twits to other via social media which known as cyber bullying. Successful prevention depends on automatically detecting malicious messages. Automatic detection of bullying in the text of social media by analyzing the text "twits" via one of the machine l...

متن کامل

Object-Oriented Method for Automatic Extraction of Road from High Resolution Satellite Images

As the information carried in a high spatial resolution image is not represented by single pixels but by meaningful image objects, which include the association of multiple pixels and their mutual relations, the object based method has become one of the most commonly used strategies for the processing of high resolution imagery. This processing comprises two fundamental and critical steps towar...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014