Friendship Identification on Location Based Social Networks Using Ensemble Learning Technique

  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract

    The brisk development of client information and geographic area information in the area built long range interpersonal communication applications, it is logically troublesome for clients to quick and absolutely discover the data they need. With the expedient development and generally abuse of cell phone, area based informal organization (LBSN) has turned out to be one critical stage for some novel applications. The area data will help to find companion relationship, companion suggestion, network identification, and manual for excursion, notice merchandise et cetera. We separated client social relationship, registration separation and registration compose are the three most huge key highlights. After the component extraction, we connected Adaboost troupe classifier with different base classifiers to order. In view of the trial results, Adaboost with Rehashed Incremental Pruning to Deliver Mistake Decrease (RIPPER) gives the best outcome contrasted with other base classifiers.




  • Keywords

    Location-based social network, friendship prediction, behavioral analysis, ensemble classifier.

  • References

      [1] Tan R, Gu J, Yang J, Lin X, Chen P & Qiao Z, “Designs of privacy protection in location-aware mobile social networking applications”, Journal of Software, (2010), pp.298-309.

      [2] Cho E, Myers SA & Leskovec J, “Friendship and mobility: User movement in location-based social networks”, KDD, (2011), pp.1082-1090.

      [3] Li N & Chen G, “Multi-Layered Friendship Modeling for Location-Based Mobile Social Networks”, Int’l. Conf. Mobile and Ubiquitous Systems: Computing, Networking and Services, (2009), pp.1-10.

      [4] Sadilek HK and Bigham JP, “Finding your friends and following them to where you are”, Fifth ACM International Conference on Web Search and Data Mining, (2012), pp.723-732.

      [5] Leskovec J, Huttenlocher D & Kleinberg J, “Predicting positive and negative links in online social networks”, Proceedings of the19th international conference on World Wide Web, (2010), pp.641-650.

      [6] Ma J, Xu H & Chen H, “Friendship prediction in recommender system”, Journal of National University of Defense Technology, Vol.35, No.1, (2013), pp.163–168.

      [7] Quercia D, Askham H & Crowcroft J, “Tweet LDA: supervised topic classification and link prediction in Twitter”, Proceedings of the 4th Annual ACM Web Science Conference, (2012), pp.247–250.

      [8] Crandalla DJ, Backstrom L, Cosley D, Suri S, Huttenlocher D & Kleinberg J, “Inferring social ties from geographic coincidences”, National Academy of Sciences, Vol.107, No.52, (2010), pp.22436–22441.

      [9] Xu-Rui G, Li W & Wei-Li W, “An algorithm for friendship prediction on location-based social networks”, International Conference on Computational Social Networks, (2015), pp.193-204.

      [10] Cranshaw J, Toch E, Hone J, Kittur A & Sadeh N, “Bridging the gap between physical location and online social networks”, 12th ACM International Conference on Ubiquitous Computing (UbiComp), (2010), pp.119–128.

      [11] Wang H, Li Z & Lee WC, “PGT: Measuring mobility relationship using personal, global and temporal factors”, 14th IEEE International Conference on Data Mining (ICDM), (2014), pp.570–579.

      [12] Krawczyk B, Minku LL, Gama J, Stefanowski J & Woźniak M, “Ensemble learning for data stream analysis: A survey”, Information Fusion, Vol.37, (2017), pp.132-156.

      [13] Malekipirbazari M & Aksakalli V, “Risk assessment in social lending via random forests”, Expert Systems with Applications, Vol.42, No.10, (2015), pp.4621-4631.

      [14] D'Andrea E, Ducange P, Lazzerini B & Marcelloni F, “Real-time detection of traffic from twitter stream analysis”, IEEE transactions on intelligent transportation systems, Vol.16, No.4, (2015), pp.2269-2283.

      [15] Xiao C, Freeman DM & Hwa T, “Detecting clusters of fake accounts in online social networks”, 8th ACM Workshop on Artificial Intelligence and Security, (2015), pp.91-101.

      [16] Hall M, Frank E, Holmes G, Pfahringer B, Reutemann P & Witten IH, “The WEKA data mining software: an update”, ACM SIGKDD explorations newsletter, Vol.11, No.1, (2009), pp.10-18.




Article ID: 24239
DOI: 10.14419/ijet.v7i4.36.24239

Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.