Centrality measures with a new index called E-User (Effective User) Index for determiningthe most effective user in Twitter Online Social Network
Journal Title: International Journal on Computer Science and Engineering - Year 2015, Vol 7, Issue 1
Abstract
In this study, we considered the issue of determination of the most effective user in the twitter online social network. We worked on asocial network graph which have relationships (edges) between users who posteda tweet and other users who re-posted it. In other words, we assume that there is a relationship between User-X and User-Y when User-X posted a tweet and User-Y re-postedit. In Social Network Analysis (SNA), there are four fundamental centrality measures such as Degree Centrality, Closeness Centrality, Betweenness Centrality, and Eigenvector Centralities.We developed a new approach for determiningthe most effective user in Twitter online social network by using an index named E-User (Effective User) Index.Through this index, we think that we are able to obtain more realistic results in SNA for Twitter.We designed a small weighted and directed social network graph by using a simulated data and used it for determining the most effective user in this study. In our graph, weights indicate the number of retweets between a user and other user, and directions indicate which user did retweet to other user’s tweet. In the graph, directions can be bidirected. This means that both users did retweet their tweets to each other.
Authors and Affiliations
Murat Yazici , Merve Sarac
Comparative and Analysis of Biometric Systems
Biometric as the science of recognizing an individual based on his or her physical or behavioral traits, it is beginning to gain acceptance as a legitimate method for determining an individual identity. Biometric have no...
Review on Binary Image Steganography and Watermarking
In this paper we have reviewed and analyzed different watermarking and steganography techniques. This is based on image processing in spatial and transform domain. We have reviewed different techniques like data hiding b...
Investigations and Performance Evaluation of Dynamic Routing Protocol with New Proposed Protocol for WAN
Routing is a relevant issue for maintaining good performance and successfully operating in a network. Routing Protocols allow routers to dynamically advertise and learn routes, determine which routes are available and wh...
Efficient and Secure Information Sharing For Security Personnels: A Role and Cooperation Based Approach
To facilitate users to interact with and share information without difficulty and faultlessly across various networks and databases nationwide, a secure and trusted information-sharing nvironment has been recognized as...
IMPROVED HYBRID MODEL FOR DENOISING POISSON CORRUPTED XRAY IMAGES
Medical practitioners are increasingly using digital images during disease diagnosis. Several state-of-the-art medical equipments are producing images of different organs, which are used during various stages of analysis...