Computer and Modernization ›› 2023, Vol. 0 ›› Issue (06): 39-42.doi: 10.3969/j.issn.1006-2475.2023.06.007
• DESIGN AND ANALYSIS OF ALGORITHM • Previous Articles Next Articles
WANG Liu, ZHU Yi-xin, HAN Li-ying
Received:
2022-10-14
Revised:
2022-11-13
Online:
2023-06-28
Published:
2023-06-28
CLC Number:
WANG Liu, ZHU Yi-xin, HAN Li-ying. Opinion Leaders Mining Method Based on Improved Hits Algorithm[J]. Computer and Modernization, 2023, 0(06): 39-42.
Add to citation manager EndNote|Ris|BibTeX
URL: http://www.c-a-m.org.cn/EN/10.3969/j.issn.1006-2475.2023.06.007
[1] | 冯继民. 对网络中信息流的研究[J]. 管理科学文摘, 1995(5):51. |
[2] | 王环,朱敏. 基于点权的混合K-shell关键节点识别方法[J]. 华东师范大学学报(自然科学版), 2019(3):101-109. |
[3] | 张森. 现代性视域中网络意见领袖的代际演替[J]. 人民论坛, 2020(22):110-112. |
[4] | 林心宇,任映红. 重大突发公共卫生事件的网络舆情及引导机制研究[J]. 学术研究, 2021(7):65-68. |
[5] | 王顶,徐军,段存玉,等. 基于PageRank的用户影响力评价改进算法[J]. 哈尔滨工业大学学报, 2018,50(5):60-67. |
[6] | 黄贤英,阳安志,刘小洋,等. 一种改进的微博用户影响力评估算法[J]. 计算机工程, 2019,45(12):294-299. |
[7] | 于笑明,李文杰. 基于用户转发的User-BehaviorRank算法研究[J]. 天津理工大学学报, 2018,34(1):19-24. |
[8] | 王曰芬,王一山,杨洁. 基于社区发现和关键节点识别的网络舆情主题发现与实证分析[J]. 图书与情报, 2020(5):48-58. |
[9] | 徐冰村,张晓冬. 开源社区中的意见领袖识别及跟随效应仿真[J]. 情报理论与实践, 2019,42(12):101-107. |
[10] | 陈芬,高小欢,彭玥,等. 融合文本倾向性分析的微博意见领袖识别[J]. 数据分析与知识发现, 2019,3(11):120-128. |
[11] | 祝旭冉. 基于"谷爱凌"话题的微博意见领袖实证分析[J]. 新媒体研究, 2022,8(14):119-122. |
[12] | 王佳敏,吴鹏,陈芬,等. 突发事件中意见领袖的识别和影响力实证研究[J]. 情报学报, 2016,35(2):169-176. |
[13] | 张连峰,周红磊,王丹,等. 基于超网络理论的微博舆情关键节点挖掘[J]. 情报学报, 2019,38(12):1286-1296. |
[14] | 罗晓光,溪璐路. 基于社会网络分析方法的顾客口碑意见领袖研究[J]. 管理评论, 2012,24(1):75-81. |
[15] | 库珊,刘钊. 基于PageRank与HITS的改进算法的网页排名优化[J]. 武汉科技大学学报, 2019,42(2):155-160. |
[16] | 熊涛,何跃. 微博转发网络中意见领袖的识别与分析[J]. 现代图书情报技术, 2013(6):55-62. |
[17] | LIU P.Determination of the weights for the ultimate cross efficiency using expert scoring method[J]. Engineering Letters, 2021,29(3). |
[18] | 马宁,刘怡君. 微博中谣言信息与辟谣信息综合影响力对比研究[J]. 情报资料工作, 2020,41(3):41-48. |
[19] | 王丽君,戴建华. 网络舆情衍生链的定量分析方法研究[J]. 情报科学, 2016,34(7):59-63. |
[20] | KLEINBERG J M.Authoritative sources in a hyperlinked environment[J]. Journal of the ACM, 1999,46(5):604-632. |
[21] | 毛国君,谢松燕,胡殿军. PageRank模型的改进及微博用户影响力挖掘算法[J]. 计算机应用与软件, 2017,34(5):28-32. |
[22] | 郭博,许昊迪,雷水旺. 知乎平台用户影响力分析与关键意见领袖挖掘[J]. 图书情报工作, 2018,62(20):122-132. |
[23] | NEWMAN M E J. 网络科学引论[M]. 郭世泽,陈哲,译. 北京:电子工业出版社, 2014. |
[24] | 陈红松,王钢,张鹏. 基于Hadoop云平台的新浪微博社交网络关键节点挖掘算法[J]. 东南大学学报(自然科学版), 2018,48(4):590-595. |
[25] | RAHMAN M, SA C L, MASUD M A K. Predicting firms’ financial distress: An empirical analysis using the f-score model[J]. Journal of Risk and Financial Management, 2021,14(5):1-16. |
[26] | 杨柯帆. 中文微博短文本主题挖掘方法研究与原型系统开发[D]. 大连:大连海事大学, 2017. |
[27] | 欧阳纯萍,陈湘龙,刘永彬. 基于网络新闻评论的四度用户影响力分析模型[J]. 计算机工程与设计, 2021,42(9):2671-2678. |
[28] | 贾春园. 关联数据挖掘在微博意见领袖识别中的研究[D]. 郑州:郑州大学, 2017. |
[1] | WANG Hong-jie, XU Sheng-chao, YANG Bo, MAO Ming-yang, JIANG Jin-ling. Automatic Arrangement Method of Cloud Network Security Service Chain Based on SRv6 Technology [J]. Computer and Modernization, 2024, 0(01): 1-5. |
[2] | HU Chong-jia, LIU Jin-zhou, FANG Li. Unsupervised Domain Adaptation for Outdoor Point Cloud Semantic Segmentation [J]. Computer and Modernization, 2024, 0(01): 74-79. |
[3] | HUANG Yu-ting, CHEN Lin, LIN Hong-gang, . An Importance Assessment Method of Network Assets in Critical Information Infrastructure Based on Percolation Theory [J]. Computer and Modernization, 2023, 0(11): 51-56. |
[4] | CHEN Chen, ZHUANG Yi, GAO Zeng. QoE-driven High-availability Transmission Framework for SDN [J]. Computer and Modernization, 2023, 0(11): 62-68. |
[5] | LI Xiang, ZHUANG Yi. Critical Fault Point Identification Method for Routing Algorithms Using XGBoost [J]. Computer and Modernization, 2023, 0(11): 75-81. |
[6] | JIANG Hou-hai, ZHUANG Yi, CAO Zi-ning. A Fast Failure Recovery Scheme for SDN Based on Flow Aggregation and Congestion Avoidance [J]. Computer and Modernization, 2023, 0(10): 77-83. |
[7] | WANG Hong-jie, XU Sheng-chao. Clustering Method of Cloud Platform Abnormal Transmission Data Based on Hilbert Similarity [J]. Computer and Modernization, 2023, 0(09): 27-31. |
[8] | YANG Liu-qing, WANG Chong. Personalized Recommendation Method of Web Service Resources Based on Maximum Entropy [J]. Computer and Modernization, 2023, 0(09): 32-37. |
[9] | JIANG Hou-hai, ZHUANG Yi, CAO Zi-ning. SDN Reliability Evaluation Algorithm Based on Improved BDD [J]. Computer and Modernization, 2023, 0(09): 64-69. |
[10] | XIAO Hang, LI Peng, MA Hui-ping, ZHU Feng, . RFID System Security Analysis Model Based on Stochastic Petri Net [J]. Computer and Modernization, 2023, 0(09): 105-114. |
[11] | CHEN Gang, WANG Zhi-jian, XU Sheng-chao. Mobile Edge Computing Task Offloading Based on Feasible Point Tracking Continuous#br# Convex Approximation [J]. Computer and Modernization, 2023, 0(08): 93-97. |
[12] | YANG Bo, XU Sheng-chao. Security Protection Method of Cloud Network Special Line Scenarios Based on SRv6#br# Service Chain [J]. Computer and Modernization, 2023, 0(08): 107-111. |
[13] | LEI Yi-han, CAO Li-feng, HAN Meng-da, HAN Xue. Security Handover Architecture and Method for Software Defined Space-ground#br# Integration Network [J]. Computer and Modernization, 2023, 0(08): 119-126. |
[14] | LI Jin-hai, HU Xu. Analysis of Hot Topics of College Online Public Opinion Based on Baidu Tieba [J]. Computer and Modernization, 2020, 0(09): 12-18. |
[15] | ZHANG Cheng, MIAO Xin-rui, MOU Xue-man. 3D Visualization of High Precision Map Lanes [J]. Computer and Modernization, 2020, 0(08): 21-25. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||