Computer and Modernization ›› 2023, Vol. 0 ›› Issue (06): 39-42.doi: 10.3969/j.issn.1006-2475.2023.06.007
• DESIGN AND ANALYSIS OF ALGORITHM • Previous Articles Next Articles
WANG Liu, ZHU Yi-xin, HAN Li-ying
Received:
2022-10-14
Revised:
2022-11-13
Online:
2023-06-28
Published:
2023-06-28
CLC Number:
WANG Liu, ZHU Yi-xin, HAN Li-ying. Opinion Leaders Mining Method Based on Improved Hits Algorithm[J]. Computer and Modernization, 2023, 0(06): 39-42.
Add to citation manager EndNote|Ris|BibTeX
URL: http://www.c-a-m.org.cn/EN/10.3969/j.issn.1006-2475.2023.06.007
[1] 冯继民. 对网络中信息流的研究[J]. 管理科学文摘, 1995(5):51. [2] 王环,朱敏. 基于点权的混合K-shell关键节点识别方法[J]. 华东师范大学学报(自然科学版), 2019(3):101-109. [3] 张森. 现代性视域中网络意见领袖的代际演替[J]. 人民论坛, 2020(22):110-112. [4] 林心宇,任映红. 重大突发公共卫生事件的网络舆情及引导机制研究[J]. 学术研究, 2021(7):65-68. [5] 王顶,徐军,段存玉,等. 基于PageRank的用户影响力评价改进算法[J]. 哈尔滨工业大学学报, 2018,50(5):60-67. [6] 黄贤英,阳安志,刘小洋,等. 一种改进的微博用户影响力评估算法[J]. 计算机工程, 2019,45(12):294-299. [7] 于笑明,李文杰. 基于用户转发的User-BehaviorRank算法研究[J]. 天津理工大学学报, 2018,34(1):19-24. [8] 王曰芬,王一山,杨洁. 基于社区发现和关键节点识别的网络舆情主题发现与实证分析[J]. 图书与情报, 2020(5):48-58. [9] 徐冰村,张晓冬. 开源社区中的意见领袖识别及跟随效应仿真[J]. 情报理论与实践, 2019,42(12):101-107. [10] 陈芬,高小欢,彭玥,等. 融合文本倾向性分析的微博意见领袖识别[J]. 数据分析与知识发现, 2019,3(11):120-128. [11] 祝旭冉. 基于"谷爱凌"话题的微博意见领袖实证分析[J]. 新媒体研究, 2022,8(14):119-122. [12] 王佳敏,吴鹏,陈芬,等. 突发事件中意见领袖的识别和影响力实证研究[J]. 情报学报, 2016,35(2):169-176. [13] 张连峰,周红磊,王丹,等. 基于超网络理论的微博舆情关键节点挖掘[J]. 情报学报, 2019,38(12):1286-1296. [14] 罗晓光,溪璐路. 基于社会网络分析方法的顾客口碑意见领袖研究[J]. 管理评论, 2012,24(1):75-81. [15] 库珊,刘钊. 基于PageRank与HITS的改进算法的网页排名优化[J]. 武汉科技大学学报, 2019,42(2):155-160. [16] 熊涛,何跃. 微博转发网络中意见领袖的识别与分析[J]. 现代图书情报技术, 2013(6):55-62. [17] LIU P.Determination of the weights for the ultimate cross efficiency using expert scoring method[J]. Engineering Letters, 2021,29(3). [18] 马宁,刘怡君. 微博中谣言信息与辟谣信息综合影响力对比研究[J]. 情报资料工作, 2020,41(3):41-48. [19] 王丽君,戴建华. 网络舆情衍生链的定量分析方法研究[J]. 情报科学, 2016,34(7):59-63. [20] KLEINBERG J M.Authoritative sources in a hyperlinked environment[J]. Journal of the ACM, 1999,46(5):604-632. [21] 毛国君,谢松燕,胡殿军. PageRank模型的改进及微博用户影响力挖掘算法[J]. 计算机应用与软件, 2017,34(5):28-32. [22] 郭博,许昊迪,雷水旺. 知乎平台用户影响力分析与关键意见领袖挖掘[J]. 图书情报工作, 2018,62(20):122-132. [23] NEWMAN M E J. 网络科学引论[M]. 郭世泽,陈哲,译. 北京:电子工业出版社, 2014. [24] 陈红松,王钢,张鹏. 基于Hadoop云平台的新浪微博社交网络关键节点挖掘算法[J]. 东南大学学报(自然科学版), 2018,48(4):590-595. [25] RAHMAN M, SA C L, MASUD M A K. Predicting firms’ financial distress: An empirical analysis using the f-score model[J]. Journal of Risk and Financial Management, 2021,14(5):1-16. [26] 杨柯帆. 中文微博短文本主题挖掘方法研究与原型系统开发[D]. 大连:大连海事大学, 2017. [27] 欧阳纯萍,陈湘龙,刘永彬. 基于网络新闻评论的四度用户影响力分析模型[J]. 计算机工程与设计, 2021,42(9):2671-2678. [28] 贾春园. 关联数据挖掘在微博意见领袖识别中的研究[D]. 郑州:郑州大学, 2017. |
[1] | LYU Meijing1, NIAN Mei1, ZHANG Jun1, 2, FU Lusen1. Anomaly Detection of Network Traffic Based on Autoencoder [J]. Computer and Modernization, 2024, 0(12): 40-44. |
[2] | XIAO Junbi, QIU Yi. SDN Failure Detection and Recovery Scheme Based on State-aware Data Plane [J]. Computer and Modernization, 2024, 0(12): 116-123. |
[3] | ZHANG Tai1, YAN Zihao2, DUAN Jie2, ZHANG Zhihong2. Information Forwarding Strategy of Internet of Vehicles in Named Data Network [J]. Computer and Modernization, 2024, 0(11): 19-27. |
[4] | DONG Chongchong, ZHAO Cong, WU You, ZHANG Lei, ZHANG Jiawen, LI Zhihao. Zero-trust Dynamic Evaluation Method for IoT Terminals [J]. Computer and Modernization, 2024, 0(11): 41-45. |
[5] | WANG Cong1, YANG Wenjuan1, DING Xingwang2. An Aggregation Model of Historical Archive Resources Based on Multimodal#br# Information Fusion [J]. Computer and Modernization, 2024, 0(10): 120-126. |
[6] | MA Huiping1, LI Peng1, 2, HU Sujun1. Security Game Analysis Model of RFID System Based on Bayesian Attack Graph [J]. Computer and Modernization, 2024, 0(07): 93-99. |
[7] | ZHAO Wenbo1, XIANG Dong1, WANG Jiubin2, DENG Yuehui3, ZHANG Wei1, KANG Qian1, LI Yujie1. Infrared Image Segmentation of Electrical Equipment Based on Improved Slime Mould Algorithm and Tsallis Entropy [J]. Computer and Modernization, 2024, 0(06): 70-75. |
[8] | LI Shuang1, 2, YE Ning1, 2, XU Kang1, 2, WANG Su1, WANG Ruchuan1, 2. Edge Computing Unloading Method for Intelligent Elderly Care [J]. Computer and Modernization, 2024, 0(06): 95-102. |
[9] | SU Kaixuan . Network Intrusion Detection Based on Improved XGBoost Model [J]. Computer and Modernization, 2024, 0(06): 109-114. |
[10] | YUAN Hongwei1, CHANG Lijun1, HAO Jianhuan2, FAN Na2, WANG Chao2, LUO Chuang2, ZHANG Zehui2. Trajectory Interest Points Mining Based on Label Propagation and Privacy Protection [J]. Computer and Modernization, 2024, 0(05): 46-54. |
[11] | WANG Dongyue, LIU Hao. Multi-agent Genetic Algorithm Based Cloud Platform Anti-fake Data Injection Attack Method [J]. Computer and Modernization, 2024, 0(04): 21-26. |
[12] | YOU Jiajing1, 2, HE Yueshun1, HE Linlin1, ZHONG Hailong1, 2. Encryption Traffic Classification Method Based on AHP-CNN [J]. Computer and Modernization, 2024, 0(04): 83-87. |
[13] | ZHU Yong-shi, YANG Zi-yi, ZHAO Liang-ju, YAO Rui-chu. Volume-hiding Dynamic Encrypted Multi-maps [J]. Computer and Modernization, 0, (): 114-120. |
[14] | WANG Hong-jie, XU Sheng-chao, YANG Bo, MAO Ming-yang, JIANG Jin-ling. Automatic Arrangement Method of Cloud Network Security Service Chain Based on SRv6 Technology [J]. Computer and Modernization, 2024, 0(01): 1-5. |
[15] | HU Chong-jia, LIU Jin-zhou, FANG Li. Unsupervised Domain Adaptation for Outdoor Point Cloud Semantic Segmentation [J]. Computer and Modernization, 2024, 0(01): 74-79. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||