###
DOI:
Journal of Software:2014.25(S2):44-52

内嵌人格分析的社交关系强度层次模型及算法
李艳兵,叶剑,朱珍民
(中国科学院 计算技术研究所, 北京 100190;移动计算与新型终端北京市重点实验室, 北京 100190)
Design of TPM Chip Based on Signal Integrity Analysis
LI Yan-Bing,YE Jian,ZHU Zhen-Min
(PLA Information Engineering University, Zhengzhou 450001, China;State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450001, China)
Abstract
Chart / table
Reference
Similar Articles
Article :Browse 1294   Download 1958
Received:June 15, 2013    Revised:August 21, 2013
> 中文摘要: 社交网络中用户关系强度计算对于个性化社交服务呈现具有重要意义.同时,心理学研究表明人格特征是影响用户关系强度的关键因素之一.基于社会心理学中人与人之间的关系产生原理,提出一种内嵌人格分析的社交关系强度层次模型及计算方法.通过社交网络行为建模,建立用户大五人格特征预测模型,实现用户人格倾向性演算.同时结合偏好相似性和交互熟悉性计算,实现嵌入人格特征的用户关系强度的求解算法.最后,本文通过构建人人网社交关系仿真实验平台,验证了该方法的合理性和有效性.
中文关键词: 社交网络  关系强度  人格特征
Abstract:It is important for personalized social services to calculate the relationship strength between users in a social network. Meanwhile, the psychological studies has shown that the personality traits is one of the key factors affecting the user's relationship strength. Based on the relationship generation principle in the social psychology, this paper proposes a personality embedded social relationship strength hierarchical model and algorithm. With the analysis of a user's behavior in social network, this paper predicts the Big Five personality traits of the user to calculate the propensity of personality. The propensity of personality is combined with the similarity of preference and the familiarity of interaction to formalize the personality embedded user relationship strength calculation. At the end of this paper, the proposed algorithm is demonstrated to be reasonable and effective in a simulation experiment of RENREN social network.
文章编号:     中图分类号:    文献标志码:
基金项目:国家自然科学基金(61076109);国家高技术研究发展计划(863)(2009AA011902) 国家自然科学基金(61076109);国家高技术研究发展计划(863)(2009AA011902)
Foundation items:
Reference text:

李艳兵,叶剑,朱珍民.内嵌人格分析的社交关系强度层次模型及算法.软件学报,2014,25(S2):44-52

LI Yan-Bing,YE Jian,ZHU Zhen-Min.Design of TPM Chip Based on Signal Integrity Analysis.Journal of Software,2014,25(S2):44-52