Araştırma Makalesi
BibTex RIS Kaynak Göster

APPLICATION OF SOCIAL COMPUTING ANALYSIS VIA ATTITUDES OF MEDIA USERS

Yıl 2016, Cilt: 2 Sayı: 1, 1 - 12, 30.06.2016

Öz

Analyzing and modeling of social platforms and media data are rather developed and still developing today. Social behaviors are analyzed and characterized with social and artificial intelligence, statistical methods, analytical approaches and evolutionary algorithms. Data mining and machine learning are used in the social computing. In this study, social computing included, two surveys used a questionnaire with 43 different questions handed over in random sample to 537 different high school students in Istanbul. Social media attitudes of students were evaluated using J48 algorithm. According to J48 algorithm, which constitutes machine learning, learning took place for 14 questions out of 43. The analysis produced a Kappa Statistic (K) value of 0.446 and F-Measure of 0.701. A decision tree was created to support decision-making.

Kaynakça

  • [1]F.-Y. Wang, «Toward a paradigm shift in social computing: The acp approach,» cilt 22, no. 5, pp. 65-67, 2007. [2]F.-Y. Wang, D. Zeng, K. M. Carley ve W. Mao, «Social computing: From social informatics to social intelligence,» IEEE Intelligent Systems, cilt 22, no. 2, pp. 79-83, 2007. [3]I. King, J. Li ve K. T. Chan, «A Brief Survey of Computational Approaches in Social Computing,» IJCNN'09 Proceedings of the 2009 international joint conference on Neural Networks, NJ,USA, 2009. [4]F.-Y. Wang, «Computational theory and method on complex system,» China Basic Science, cilt 6, no. 5, p. 3–10, 2004. [5]F.-Y. Wang ve S. T. Tang, «Artificial societies for integrated and sustainable development of metropolitan systems,» IEEE Intelligent Systems, cilt 19, no. 4, pp. 82-87, 2004. [6]M. W. Macy ve R. Willer, «From Factors to Actors: Computational Sociology and Agent-Based Modeling,» Annual Review of Sociology, no. 28, pp. 143-166, 2002. [7]W. Mao ve F. Wang , Advances in Intelligence and Security Informatics, Oxford, UK: Academic Press, 2012. [8]D. Wen, Y. Yuan ve X. R. Li, «Artificial Societies, Computational Experiments, and Parallel Systems: An Investigation on a Computational Theory for Complex Socioeconomic Systems,» IEEE Transactions on Services Computing, cilt 6, no. 2, pp. 177-185, 2015. [9]F. -y. Wang, D. -j. Zeng ve Y. Yuan, «An ACP-based Approach for Complexity Analysis of E-commerce System,» Complex Systems and Complexity Science, cilt 5, no. 3, pp. 1-8, 2008. [10]J. Sifeng, X. Gang, F. Dong ve H. Chunpeng, «Study on the emergency rescue decision support system of petrochemical plant based on ACP theory,» in Proceedings of the 6th Management Annual Meeting, 2011. [11]G. Xiong, X. Dong, D. Fan ve F. Zhu, «Parallel Bus Rapid Transit (BRT) operation management system based on ACP approach,» Networking, Sensing and Control (ICNSC), 2012 9th IEEE International Conference on, 2012. [12]B. Ning, F.-y. Wang, H.-r. Dong , R.-m. Li, D. Wen ve L. Li, «Parallel Systems for Urban Rail Transportation Based on ACP Approach,» Journal of Transportation Systems Engineering and Information Technology, cilt 10, no. 6, pp. 23-28, 2010. [13]F. -Y. Wang, J. Zhao ve S. -X. Lun, «Artificial power systems for the operation and management of complex power grids,» Southern Power System Technology, cilt 2, no. 3, pp. 1-11, 2008. [14]P. Singla ve M. Richardson, «Yes, There is a Correlation From Social Networks to Personal Behavior on the Web,» WWW '08 Proceedings of the 17th international conference on World Wide Web, New York, 2008. [15]B. He, C. Macdonald ve I. Ounis, «Ranking opinionated blog posts using opinionfinder,» SIGIR '08 Proceedings of the 31st annual international ACM SIGIR conference on Research and development in information, New York, 2008. [16]A. Sun, M. Hu ve E. -P. Lim, «Searching blogs and news: a study on popular queries,» SIGIR '08 Proceedings of the 31st annual international ACM SIGIR conference on Research and development in information retrieval, New York, 2008. [17]J. L. Elsas, J. Arguello, C. Jamie ve J. G. Carbonell, «Retrieval and feedback models for blog feed search,» SIGIR '08 Proceedings of the 31st annual international ACM SIGIR conference on Research and development in information retrieval, New York, 2008. [18]N. Sadeh, J. Hong, L. Cranor, I. Fette, P. Kelley, M. Prabaker ve J. Rao, «Understanding and capturing people’s privacy policies in a mobile social networking application,» Personal and Ubiquitous Computing. Springer, cilt 13, no. 6, pp. 401-412, 2009. [19]G. Danezis, «Inferring privacy policies for social networking services,» AISec '09 Proceedings of the 2nd ACM workshop on Security and artificial intelligence , New York, 2009. [20]L. Fang ve K. LeFevre, «Privacy wizards for social networking sites,» WWW '10 Proceedings of the 19th international conference on World wide web, New York, 2010. [21]J. Xie, B. P. Knijnenburg ve H. Jin, «Location sharing privacy preference: analysis and personalized recommendation,» IUI '14 Proceedings of the 19th international conference on Intelligent User Interfaces, New York, 2014. [22]E. Alpaydin, «Introduction to Machine Learning,» Introduction to Machine Learning, USA, Barnes&Noble, 2004, pp. 350-368. [23]D. -A. SITAR-TĂUT ve A. -V. SITAR-TĂUT, «Overview on How Data Mining Tools May Support Cardiovascular Disease,» Journal of Applied Computer Science & Mathematics, cilt 8, no. 4, pp. 57-62, 2010. [24]L. Gaga, V. S. Moustakis, Y. Vlachakis ve G. Charissis, «ID+: Enhancing medical knowledge acquisition with machine learning,» dx.doi.org, cilt 10, no. 2, pp. 79-94, 1996. [25]J. R. QUINLAN, «Induction of Decision Trees, Machine Learning,» Kluwer Academic Publishers, cilt 1, pp. 81-106, 1986. [26]K. Mollazade, H. Ahmadi, M. Omid ve R. Alimardani, «An Intelligent Combined Method Based on Power Spectral Density, Decision Trees and Fuzzy Logic for Hydraulic Pumps Fault Diagnosis,» World Academy of Science, Engineering and Technology International Journal of Mechanical, Aerospace, Industrial, Mechatronic and Manufacturing Engineering, cilt 2, no. 8, p. 986, 2008. [27]J. Li, A. W. Fu ve P. Fahey, «Efficient discovery of risk patterns in medical data,» Efficient discovery of risk patterns in medical data, Elsiver, cilt 45, no. 1, pp. 77-89, 2009. [28]F. S. Argın, Ortaokul ve Lise Öğrencilerinin Sosyal Medyaya İlişkin Tutumlarının İncelenmesi, Istanbul: Yeditepe Üniversitesi, 2013. [29]L. H. Witten, E. Frank ve M. A. Hall, Data mining: practical machine learning tools and techniques, New York: Morgan Kaufmann. Elsiver., 2011. [30]«http://www.cs.waikato.ac.nz/ml/weka/,» 20 Aralık 2015. Available: http://www.cs.waikato.ac.nz/ml/weka/. [31]E. K. Aydogan, C. Gencer ve S. Akbulut, «Churn Analysis AndCustomer SegmentationOf A CosmeticsBrand Using Data MiningTechniques,» Journal of Engineering and Natural Sciences, cilt 26, no. 1, pp. 42-56, 2008. [32]J. Han ve M. Kamber, Data Mining Concepts and Techniques, Francisco, CA: Morgan Kaufmann, Elsiver inc, 2006. [33]J. Cohen, «A Coefficient of Agreement For Nominal Scales,» Educational and Psychological Measurement, cilt 20, pp. 37-46, 1960. [34]J. . L. Fleiss, «Measuring nominal scale agreement among many raters,» Psychological Bulletin, cilt 76, no. 5, pp. 378-382, 1971. [35]J. R. Landis ve G. G. Koch , «The measurement of observer agreement for categorical data,» PubMed , cilt 33, no. 1, pp. 159-74, 1977. [36]P. Brennan ve A. J. Silman, «Statistical Methods for Assessing Observer Variability in Clinical Measures,» BMJ Clinical Research, cilt 304, no. 6840, pp. 1491-4, 1992.
Toplam 1 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Konular Mühendislik
Bölüm Sayı
Yazarlar

Turhan Civelek

Yayımlanma Tarihi 30 Haziran 2016
Yayımlandığı Sayı Yıl 2016 Cilt: 2 Sayı: 1

Kaynak Göster

APA Civelek, T. (2016). APPLICATION OF SOCIAL COMPUTING ANALYSIS VIA ATTITUDES OF MEDIA USERS. Kirklareli University Journal of Engineering and Science, 2(1), 1-12.