Calculation Method of Chinese Public Event Information Entropy
Author:
Affiliation:

Fund Project:

National Program on Key Basic Research Project of China (973) (2013CB329602); National Natural Science Foundation of China (61202457, 61472108, 61402149)

  • Article
  • | |
  • Metrics
  • |
  • Reference [32]
  • |
  • Related
  • |
  • Cited by
  • | |
  • Comments
    Abstract:

    With the proliferation of the Chinese social network (especially the rise of weibo), the productivity and lifestyle of the country's society is more and more profoundly influenced by the Chinese internet public events. Due to the lack of the effective technical means, the efficiency of information processing is limited. This paper proposes a public event information entropy calculation method. First, a mathematical modeling of event information content is built. Then, multidimensional random variable information entropy of the public events is calculated based on Shannon information theory. Furthermore, a new technical index of quantitative analysis to the internet public events is put forward, laying out a foundation for further research work.

    Reference
    [1] Arab spring. https://en.wikipedia.org/wiki/Arab_Spring
    [2] Public opinion. http://en.wikipedia.org/wiki/Public_opinion
    [3] Key VO. Public Opinion and American Democarcy. New York:John Wiley, 2012.
    [4] Mueller JE. War, Presidents, and Public Opinion. New York:Wiley, 1973.
    [5] Lerman K, Gilder A, Dredze M, Pereira F. Reading the markets:Forecasting public opinion of political candidates by news analysis. In:Proc. of the 22nd Int'l Conf. on Computational Linguistics (Coling 2008). 2008. 473-480.
    [6] Akcora CG, Bayir MA, Demirbas M, Ferhatosmanoglu H. Identifying Breakpoints in Public Opinion. In:Proc. of the 1st Workshop on Social Media Analytics (SOMA 2010). Washington:ACM Press, 2010.[doi:10.1145/1964858.1964867]
    [7] Li J, Zhou XG, Chen B. Research on analysis and monitoring of Internet public opinion. In:Proc. of the 2012 Int'l Conf. of Modern Computer Science and Applications Advances in Intelligent Systems and Computing, Vol.191. Berlin:Springer-Verlag, 2013. 449-453.[doi:10.1007/978-3-642-33030-8_72]
    [8] Social computing. http://en.wikipedia.org/wiki/Social_computing
    [9] Lazer D, Pentland A, Adamic L, Aral S, Barabasi AL, Brewer D, Christakis NA, Contractor N, Fowler J, Gutmann M, Jebara T, King G, Macy M, Roy D, Van Alstyne M. SOCIAL SCIENCE:Computational social science. Science, 2009,323(5915):721-723.[doi:10.1126/science.1167742]
    [10] Wang FY, Zeng DJ, Mao WJ. Social computing:Its significance, development and research status. e-Science, 2010,7:3-14(in Chinese with English abstract).
    [11] Chen H, Wang FY, Zeng D. Intelligence and security informatics for homeland security:Information, communication, and transportation. IEEE Trans. on Intelligent Transportation Systems, 2004,5(4):329-341.[doi:10.1109/TITS.2004.837824]
    [12] Wang FY. From Social Computing to Social Manufacturing:an upcoming industry revolution. Strategy & Policy Decision Research, 2012,27(6):658-669(in Chinese).[doi:10.3969/j.issn.1000-3045.2012.06.002]
    [13] Wang FY, Zeng DJ, Cao ZD. Social computing methods for non-traditional security challenges enabled by the social media in cyberspace. Science & Technology Review, 2011,29(12):15-22(in Chinese with English abstract).[doi:10.3981/j.issn.1000-7857. 2011.12.001]
    [14] Wang FY. Social computing and dynamical state analysis of digitalized and networked societies. Science & Technology Review, 2005,23(9):4-6(in Chinese with English abstract).[doi:10.3321/j.issn:1000-7857.2005.09.002]
    [15] Tan HY. Research on Chinese event extraction[Ph.D. Thesis]. Harbin:Harbin Institute of Technology, 2008(in Chinese with English abstract).
    [16] Yeung RW, Wrote; Cai N, et al., Trans. Information Theory and Network Coding. Beijing:Higher Education Press, 2011(in Chinese).
    [17] Jaynes ET. Information and statistical mechanics. Physical Review, 1957,106(4):620-630.[doi:10.1103/PhysRev.106.620]
    [18] Li XD. The method study about probability distribution based on the principle of maximum entropy[MS. Thesis]. Beijing:North China Electric Power University, 2008(in Chinese with English abstract).
    [19] Chen Y, Zhang HL. Overview of social computing in information security. Journal of Tsinghua University (Sci & Tech), 2011, 51(10):1323-1328(in Chinese with English abstract).
    [20] Waters M, Wrote; Yang SH, Trans. Modern Sociological Theory. Beijing:Huaxia Publishing House, 2000(in Chinese).
    [21] Zhao XS. I was in awe of the human society axiom. In:Ma XP, ed. The Humanities Reader. 2006(in Chinese). http://www.teacherclub.com.cn/tresearch/blog/showArticle.jsp?ArticleCode=1390764846&CID=00001
    附中文参考文献:
    [10] 王飞跃,曾大军,毛文吉.社会计算的意义、发展与研究状况.e-Science,2010,7:3-14
    [12] 王飞跃.从社会计算到社会制造:一场即将来临的产业革命.中国科学院战略与决策研究,2012,27(6):658-669.[doi:10.3969/j. issn.1000-3045.2012.06.002]
    [13] 王飞跃,曾大军,曹志冬.网络虚拟社会中非常规安全问题与社会计算方法.科技导报,2011,29(12):15-22.[doi:10.3981/j.issn. 1000-7857.2011.12.001]
    [14] 王飞跃.社会计算与数字网络化社会的动态分析.科技导报,2005,23(9):4-6.[doi:10.3321/j.issn:1000-7857.2005.09.002]
    [15] 谭红叶.中文事件抽取关键技术研究[博士学位论文].哈尔滨:哈尔滨工业大学,2008.
    [16] Yeung RW,著;蔡宁,等,译.信息论与网络编码.北京:高教出版社,2011.
    [18] 李宪东.基于最大熵原理的确定概率分布的方法研究[硕士学位论文].北京:华北电力大学,2008.
    [19] 陈昱,张慧琳.社会计算在信息安全中的应用.清华大学学报(自然科学版),2011,51(10):1323-1328.
    [20] Waters M,著;杨善华,译.现代社会学理论.北京:华夏出版社,2000.
    [21] 赵鑫珊.我对人类社会公理的敬畏.见:马小平,编.人文素养读本.2006. http://www.teacherclub.com.cn/tresearch/blog/showArticle.jsp?ArticleCode=1390764846&CID=00001
    Related
    Cited by
    Comments
    Comments
    分享到微博
    Submit
Get Citation

靳锐,张宏莉,张玥,王星.中文公众事件信息熵计算方法.软件学报,2016,27(11):2855-2869

Copy
Share
Article Metrics
  • Abstract:3248
  • PDF: 22269
  • HTML: 2506
  • Cited by: 0
History
  • Received:February 17,2015
  • Revised:May 08,2015
  • Online: November 26,2015
You are the first2035055Visitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063