• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Li Yingying, Ma Shuai, Jiang Haoyi, Liu Zhe, Hu Chunming, Li Xiong. An Approach for Storytelling by Correlating Events from Social Networks[J]. Journal of Computer Research and Development, 2018, 55(9): 1972-1986. DOI: 10.7544/issn1000-1239.2018.20180155
Citation: Li Yingying, Ma Shuai, Jiang Haoyi, Liu Zhe, Hu Chunming, Li Xiong. An Approach for Storytelling by Correlating Events from Social Networks[J]. Journal of Computer Research and Development, 2018, 55(9): 1972-1986. DOI: 10.7544/issn1000-1239.2018.20180155

An Approach for Storytelling by Correlating Events from Social Networks

More Information
  • Published Date: August 31, 2018
  • Social networks, such as Twitter and Sina weibo, have become popular platforms to report the public event. They provide valuable data for us to monitor events and their evolution. However, informal words and fragmented texts make it challenging to extract descriptive information. Monitoring the event progression from fast accumulation of microblogs is also difficult. To this end, we monitor the event progression with a common topic from the social network. This can help us to gain an overview and a detailed documentation of the events. In this paper, we use three consecutive components to meet this end. First, we use a structure based approach to detect events from the microblog dataset. Second, we cluster the events by their topics based on their latent semantic information, and define each cluster as a story. Third, we use a graph based approach to generate a storyline for each story. The storyline is denoted by a directed acyclic graph (DAG) with a summary to express the progression of events in the story. The user experience evaluation indicates that this method can help us to monitor events and their progression by achieving improved accuracy and comprehension compared with the state of art methods.
  • Related Articles

    [1]Li Yuan, Yang Sen, Sun Jing, Zhao Huiqun, Wang Guoren. Influential Cohesive Subgraph Discovery Algorithm in Dual Networks[J]. Journal of Computer Research and Development, 2023, 60(9): 2096-2114. DOI: 10.7544/issn1000-1239.202220337
    [2]Qian Zhongsheng, Yang Jiaxiu, Li Duanming, Ye Zulai. Event Recommendation Strategy Combining User Long-Short Term Interest and vent Influence[J]. Journal of Computer Research and Development, 2022, 59(12): 2803-2815. DOI: 10.7544/issn1000-1239.20210693
    [3]Liu Haijiao, Ma Huifang, Zhao Qiqi, Li Zhixin. Target Community Detection with User Interest Preferences and Influence[J]. Journal of Computer Research and Development, 2021, 58(1): 70-82. DOI: 10.7544/issn1000-1239.2021.20190775
    [4]LiJin, YueKun, ZhangDehai, LiuWeiyi. Robust Influence Blocking Maximization in Social Networks[J]. Journal of Computer Research and Development, 2016, 53(3): 601-610. DOI: 10.7544/issn1000-1239.2016.20148341
    [5]Wu Linping, Wei Yong, Xu Xiaowei, Liu Xu. Impact of System Noise by Quantitative Analysis[J]. Journal of Computer Research and Development, 2015, 52(5): 1146-1152. DOI: 10.7544/issn1000-1239.2015.20131921
    [6]Wang Hao, Li Guohuan, Yao Hongliang, Li Junzhao. Stock Network Community Detection Method Based on Influence Calculating Model[J]. Journal of Computer Research and Development, 2014, 51(10): 2137-2147. DOI: 10.7544/issn1000-1239.2014.20130575
    [7]Zhang Yue, Zhang Hongli, Zhang Weizhe, and Lu Junjia. Identifying the Influential Users in Network Forum[J]. Journal of Computer Research and Development, 2013, 50(10): 2195-2205.
    [8]Ding Zhaoyun, Zhou Bin, Jia Yan, Zhang Lumin. Topical Influence Analysis Based on the Multi-Relational Network in Microblogs[J]. Journal of Computer Research and Development, 2013, 50(10): 2155-2175.
    [9]Liu Huaxiao, Jin Ying, and Ma Pengfei. An Approach to Requirements Change Impact Analysis[J]. Journal of Computer Research and Development, 2013, 50(8): 1769-1777.
    [10]Ma Chi, Li Zhi, Zhang Hong, and Liu Fengyu. Survivability Research on the Impact of Node Failure in MANET[J]. Journal of Computer Research and Development, 2012, 49(3): 550-557.
  • Cited by

    Periodical cited type(35)

    1. 李勇男. 基于异构属性传播的网络用户画像方法. 情报理论与实践. 2025(01): 160-167 .
    2. 吴树芳,高梦蛟,朱杰. 融合兴趣主题矩阵和主题生命树的社交用户长短兴趣挖掘. 情报理论与实践. 2024(02): 161-169 .
    3. 柳涛,丁陈君,姜恩波,许睿,陈方. 基于生成式预训练语言模型的学者画像构建研究. 数字图书馆论坛. 2024(03): 1-11 .
    4. 游兰,田明炎,周烨,陈智军,王伟,金红,曾星,崔海波. 开源软件开发者价值评估体系及其实证研究. 计算机科学. 2024(12): 87-99 .
    5. 李树青,黄金旺,马丹丹,张志旺. 基于显隐式信息融合和单类协同过滤方法的主题词推荐. 图书情报工作. 2023(03): 72-84 .
    6. 张瑞,杨代庆. 面向“小同行”评议的专家画像方法研究. 中国科技资源导刊. 2023(02): 94-103 .
    7. 陈翀,王嘉怡,高欣妍,宣羽菲. 科研人员学术专长的细粒度描述模型及实证研究. 图书情报工作. 2023(17): 118-128 .
    8. 李梓萌,吴玉松,苏丹淳,朱雍,李刚. 基于CTTI数据的中国智库专家群体画像研究. 图书与情报. 2023(05): 27-39 .
    9. 朱敏,梁朝晖,姚林,王翔坤,曹梦琦. 学术引用信息可视化方法综述. 计算机科学. 2022(04): 88-99 .
    10. 杨佳鑫,杜军平,邵蓥侠,李昂,奚军庆. 面向知识产权的科技资源画像构建方法. 软件学报. 2022(04): 1439-1450 .
    11. 李昱,赵静宜,左家平. 人工智能赋能科技管理变革的新趋向. 科技智囊. 2022(04): 52-60 .
    12. 石湘,刘萍. 学者研究兴趣识别综述. 数据分析与知识发现. 2022(04): 16-27 .
    13. 许明英,杜军平,梁美玉,薛哲,李昂. 面向科技大数据的科研团队精准立体画像生成方法. 工程管理科技前沿. 2022(03): 15-22 .
    14. 何胜,熊太纯,吴智勤. 基于标签计算的高校图书馆学者画像及知识推荐研究. 图书馆研究. 2022(04): 89-97 .
    15. 刘涛. 数字化转型背景下高职院校培训者能力画像研究. 软件. 2022(09): 25-31 .
    16. 何胜,柳益君,黄永锋,习海旭,吴智勤. 基于网络大数据的高校图书馆科研用户画像模式构建研究. 图书馆研究与工作. 2022(11): 76-82 .
    17. 王世奇,刘智锋,王继民. 学者画像研究综述. 图书情报工作. 2022(20): 73-81 .
    18. 王霞,季淑娟,蒋伟,王维朗,曹兵,黄冬华. 采用学术大数据辅助初审策略研究. 学术出版与传播. 2022(00): 335-342 .
    19. 秦成磊,章成志. 大数据环境下同行评议面临的问题与对策. 情报理论与实践. 2021(04): 99-112 .
    20. 罗敏,罗亚东,刘明锦. 基于HTML5技术的蜀水文化教育传播平台的建设研究. 现代信息科技. 2021(06): 18-21+24 .
    21. 王欢,朱文球,吴岳忠,何频捷,万烂军. 基于数控机床设备故障领域的命名实体识别. 工程科学学报. 2020(04): 476-482 .
    22. 熊回香,景紫薇,杨梦婷. 在线学术资源中知识图谱的应用研究综述. 情报资料工作. 2020(03): 61-68 .
    23. 姜红玉,汪朋,封雷. 基于流式计算的实时用户画像系统研究. 计算机技术与发展. 2020(07): 186-193 .
    24. 陈彦敏,王皓,马建辉,杜东舫,赵洪科. 基于层级注意力机制的互联网用户信用评估框架. 计算机研究与发展. 2020(08): 1755-1768 . 本站查看
    25. 张秋颖,傅洛伊,王新兵. 基于BERT-BiLSTM-CRF的学者主页信息抽取. 计算机应用研究. 2020(S1): 47-49 .
    26. 逯万辉,荆林波. 基于作者主题模型的学者聚类与学术影响力评价方法研究. 情报资料工作. 2020(04): 60-66 .
    27. 胡志伟,裴雷. 基于自述研究专长的研究领域识别与特征差异分析——以国内图书情报与档案管理专业教师为样本. 文献与数据学报. 2020(04): 40-48 .
    28. 彭程程,吴斌. “智慧校园”学者画像系统研究. 数字图书馆论坛. 2019(02): 2-11 .
    29. 池雪花,刘丽帆,章成志. 基于学术论文的学者研究兴趣标签发现研究. 情报工程. 2019(02): 28-39 .
    30. 张永锋,霍东云,李振华,智强,李燕茜. 学术大数据在企业专家对接中的应用. 大数据. 2019(05): 79-88 .
    31. 韩旭,李寒,张丽敏,梁英. 基于学术行为的学者排名技术及实现. 电脑知识与技术. 2019(26): 1-3+5 .
    32. 吴智勤. 面向知识创新的高校图书馆科研用户画像模型构建. 办公自动化. 2019(23): 55-56+30 .
    33. 陈翀,李楠,梁冰,王晨琳,徐曾旭林,郑婷婷. 基于成果特征的学者学术专长识别方法. 图书情报工作. 2019(20): 96-103 .
    34. 吴智勤,李萍. 大数据情境下高校图书馆科研用户画像构建策略研究. 江苏理工学院学报. 2019(06): 117-121 .
    35. 张亚楠,黄晶丽,王刚. 考虑全局和局部信息的科研人员科研行为立体精准画像构建方法. 情报学报. 2019(10): 1012-1021 .

    Other cited types(31)

Catalog

    Article views (1396) PDF downloads (458) Cited by(66)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return