2017
DOI: 10.11591/ijece.v7i6.pp3692-3699
|View full text |Cite
|
Sign up to set email alerts
|

Clustering in Aggregated User Profiles Across Multiple Social Networks

Abstract: A social network is indeed an abstraction of related groups interacting amongst themselves to develop relationships. However, toanalyze any relationships and psychology behind it, clustering plays a vital role. Clustering enhances the predictability and discoveryof like mindedness amongst users. This article’s goal exploits the technique of Ensemble K-means clusters to extract the entities and their corresponding interestsas per the skills and location by aggregating user profiles across the multiple online so… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
17
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(17 citation statements)
references
References 29 publications
0
17
0
Order By: Relevance
“…[61]), and is anticipated to be the theoretical material for the creation of application of emotional internet infidelity detection through profiling based on social network analysis (e.g. [62]) as well as for the developing affective computing (e.g. [63]) which could counsel on emotional Internet infidelity issue.…”
Section: Resultsmentioning
confidence: 99%
“…[61]), and is anticipated to be the theoretical material for the creation of application of emotional internet infidelity detection through profiling based on social network analysis (e.g. [62]) as well as for the developing affective computing (e.g. [63]) which could counsel on emotional Internet infidelity issue.…”
Section: Resultsmentioning
confidence: 99%
“…Obviously, A can be elevated to any matrices product without upsetting the original structure of the attack geography as listed in Equation (2). The performance of the partition algorithm discussed in [17] can be used to obtain a shorter processing time as well as to avoid complexity in calculation cost of which is not beyond O(n 2 ). Moreover, in the case of big data processing, a solution of missing and impaired datasets presented in [18] can be utilized.…”
Section: Attack Analytical Modelmentioning
confidence: 99%
“…It is a widely known technique with applications in various fields such as social media [1], Web search results optimization [2], wireless sensor networks [3] and also in biochemical neural networks [4] among others. In most cases, the number of clusters to form is already known and is given as an entry to the clustering algorithm.…”
Section: Introductionmentioning
confidence: 99%