User Profile Completion with Online Social Circles

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 3

Abstract

 User profile is a kind of most effective feature and cue of user behavioranalysis. However, most ofusers'profiles are incomplete and untruthful, and users' tag and profile data are rathersparse on social media. It makes profile completionbecomeapopularresearch topic. Users have manystrongrelationships online, and theserelationshipsformmany social circles, such as classmate, family and colleague. A user'sdifferent online social circlescanrepresentthisuser'svarious social attributes. We focus the task of user profile completion in thispaper. We propose an algorithm of userprofile completion via users' social circles by non-negative matrix factorization. Themethodcandetectauser's multi-dimension social characteristicsfromvarious social circles. Wealsotransfer the concept of social circle to academic networks. A papermay cite otherpaperswithseveral intentions. Some of the referencesmaybe relevant according to the researchproblems and otherreferencesmaybe relevant according to the methodologies. The references of different topics formdifferent "referencecircle". By an academicpaper'sdifferent "referencecircle", our model candetect the paper's keywords in differentviews. The experiment on Facebook LinkedInand Microsoft AcademicSearch show ourmethod has improved performance than state-of-art methods.

Authors and Affiliations

Hailong Qin,Ting Liu , Jing Liu ,Chin-Yew Lin

Keywords

Related Articles

Analysis of Data Mining Tasks, Techniques, Tools, Applications And Trend

Data mining is a process which finds useful patterns from huge amount of data. It is a powerful new technology with great potential to help companies focus on the most important information in their data warehouses. It u...

 Yours Advance Security Hood (Yash)

[sub][/sub] Hacking of any online account is a practice done by an unauthorized person to get an access in an account of some other person. People says that usually person get hacked because of his own mistake of...

 Human Being Character Analysis from Their Social Networking Profiles

In this paper, characteristics of human beings obtained from profile statement present in their social networking profile status are analyzed in terms of introvert, extrovert or ambivert. Recently, Machine learning plays...

 Detecting Masquerade in Face Recognition System – A Literature  survey

 A masquerader is an (often external) attacker is one who, after succeeding in obtaining a legitimateuser’s credentials, attempts to use the stolen identity to carry out malicious actions.Automatic detection of...

 Mathematical Modeling of Image Steganographic System

 Image based steganography is a dangerous technique of hiding secret messages in the image in such a way that no one apart from the sender and intended recipient suspects the existence of the message. It is based...

Download PDF file
  • EP ID EP112363
  • DOI -
  • Views 112
  • Downloads 0

How To Cite

Hailong Qin, Ting Liu, Jing Liu, Chin-Yew Lin (2016). User Profile Completion with Online Social Circles. IOSR Journals (IOSR Journal of Computer Engineering), 18(3), 9-15. https://europub.co.uk/articles/-A-112363