[1]王涛,周斌,曲铭,等. 基于用户行为和影响覆盖的微博价值评价模型[J].计算机技术与发展,2015,25(02):21-24.
 WANG Tao,ZHOU Bin,QU Ming,et al. Microblog Influence Evaluation Model Based on Follower Behavior and Influence Coverage Ratio[J].,2015,25(02):21-24.
点击复制

 基于用户行为和影响覆盖的微博价值评价模型()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
25
期数:
2015年02期
页码:
21-24
栏目:
智能、算法、系统工程
出版日期:
2015-02-10

文章信息/Info

Title:
 Microblog Influence Evaluation Model Based on Follower Behavior and Influence Coverage Ratio
文章编号:
1673-629X(2015)02-0021-04
作者:
 王涛周斌曲铭王忠振
 国防科学技术大学 计算机学院
Author(s):
 WANG Tao ZHOU Bin QU Ming WANG Zhong-zhen
关键词:
 微博价值影响力饱和度转发覆盖人数转发量
Keywords:
 microblogging valueinfluence saturationforwarding coverageamount of forwarding
分类号:
TP31
文献标志码:
A
摘要:
 在已有的对单条微博信息价值的研究中,一般都是从构成微博信息价值的多维因素出发,分析每个因素的权重然后综合进行评定,这样就带来了计算复杂的问题。但是,由于中文语义的复杂性,这种先验的分析方法,难免会有“一概而论”的嫌疑。由于转发行为的本质就是对微博信息价值的认同,而转发人占收到此信息总人数的比率则反映了该信息的普遍影响程度,因此从这两个因素出发研究微博信息价值非常值得思考。为此,文中从粉丝行为和影响覆盖率两个角度出发,引入了“单条微博影响力饱和度”概念,对单条微博信息价值进行了研究,在研究思路上进行了积极拓展。
Abstract:
 Existing research on the information value of a single microblog are generally based on multi-dimensional factors that form the single microblogging information value,analyzing the weight of each factor and then evaluating the overall value,which results in the computational complexity problem. However,due to the Chinese semantic complexity,this transcendental method of analysis will inevita-bly be in question of"over generalization". Since the nature of the forwarding behavior is the recognition of the microblogging informa-tion value,and the ratio between the forwarding number and the total number of people receiving the information reflects the widespread impact of the information,the research based on these two factors are worth considering. In this paper,introduce a novel concept of"sin-gle microblogging influence saturation" in perspective of the follower behavior and the influence coverage ratio,study the value of single microblgging information value,which effectively expands the research ideas.

相似文献/References:

[1]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
 ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(02):1.
[2]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
 LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(02):5.
[3]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
 HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(02):13.
[4]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
 HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(02):21.
[5]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
 LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(02):25.
[6]翁鹤,皮德常. 混沌RBF神经网络异常检测算法[J].计算机技术与发展,2014,24(07):29.
 WENG He,PI De-chang. Chaotic RBF Neural Network Anomaly Detection Algorithm[J].,2014,24(02):29.
[7]刘茜[],荆晓远[],李文倩[],等. 基于流形学习的正交稀疏保留投影[J].计算机技术与发展,2014,24(07):34.
 LIU Qian[],JING Xiao-yuan[,LI Wen-qian[],et al. Orthogonal Sparsity Preserving Projections Based on Manifold Learning[J].,2014,24(02):34.
[8]尚福华,李想,巩淼. 基于模糊框架-产生式知识表示及推理研究[J].计算机技术与发展,2014,24(07):38.
 SHANG Fu-hua,LI Xiang,GONG Miao. Research on Knowledge Representation and Inference Based on Fuzzy Framework-production[J].,2014,24(02):38.
[9]叶偲,李良福,肖樟树. 一种去除运动目标重影的图像镶嵌方法研究[J].计算机技术与发展,2014,24(07):43.
 YE Si,LI Liang-fu,XIAO Zhang-shu. Research of an Image Mosaic Method for Removing Ghost of Moving Targets[J].,2014,24(02):43.
[10]余松平[][],蔡志平[],吴建进[],等. GSM-R信令监测选择录音系统设计与实现[J].计算机技术与发展,2014,24(07):47.
 YU Song-ping[][],CAI Zhi-ping[] WU Jian-jin[],GU Feng-zhi[]. Design and Implementation of an Optional Voice Recording System Based on GSM-R Signaling Monitoring[J].,2014,24(02):47.

更新日期/Last Update: 2015-04-28