A New Information Exposure Situation Awareness Model Based on Cubic Exponential Smoothing and Its Prediction Method

  • Weijin Jiang
  • Yirong JiangEmail author
  • Jiahui Chen
  • Yang Wang
  • Yuhui Xu
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 1042)


A lot of information in the social network is accompanied by the continuous transmission of users, and there are many forms of propagation, fermentation, evolution, emergence and outbreaks, which make it difficult for analysts to predict the information dissemination situation at the next moment. However, if the information dissemination can be effectively predicted and perceived, it plays a very important role in hot event discovery, personalized information recommendation, bad information early warning and so on. Therefore, the study of this problem is of great practical value. This paper first study of situational awareness information transmission method, including the definition of information dissemination situational awareness problem and expounds the basic thought, and analyzes the information dissemination situation and level of the modularity, the relationship between the three exponential smoothing is used for information dissemination model for situational awareness, and to evaluate the application effect of the model has carried on the detailed; In addition, this chapter also studies the prediction method of information spread outburst, including the definition of information explosion, the analysis of related factors that affect the prediction of information dissemination, and the modeling and evaluation of the information outburst prediction model. In addition, some issues related to which features are more sensitive to information explosion prediction are also studied.


Social network information communication Situational awareness Propagation forecast 



This work was supported by the National Natural Science Foundation of China (61772196; 61472136), the Hunan Provincial Focus Social Science Fund (2016ZDB006), Hunan Provincial Social Science Achievement Review Committee results appraisal identification project (Xiang social assessment 2016JD05), Key Project of Hunan Provincial Social Science Achievement Review Committee (XSP 19ZD1005). The authors gratefully acknowledge the financial support provided by the Key Laboratory of Hunan Province for New Retail Virtual Reality Technology (2017TP1026).


  1. 1.
    Craig, S.: By the numbers: 200+ amazing face book user statistics, June 2015. Accessed 29 June 2015, 19 July 2015
  2. 2.
    Statista: Leading social networks worldwide as of March 2015, ranked by number of active users (in millions) [OL], 15 April 2015. Accessed 19 July 2015
  3. 3.
    Statista: Number of monthly active WeChat users from 2nd quarter 2010 to 1st quarter 2015 (in millions) [0L], 30 April 2015. Accessed 19 July 2015
  4. 4.
    Craig, S.: By the Numbers: 40 Amazing Weibo Statistics [OL], 18 April 2015. Accessed 19 July 2015
  5. 5.
    Luchina, F.: Ellen’s Oscar Selfie Most Retweeted Tweet Ever [0L], 02 March 2014. Accessed 19 July 2015
  6. 6.
    Wikipedia: Socialnetwork [0L], 29 July 2015. Accessed 29 July 2015
  7. 7.
    Lumbreras, A., Gavalda, R.: Applying trust metrics based on user interactions to recommendation in social networks. In: Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2012, pp. 1159–1164 (2012)Google Scholar
  8. 8.
    Marin, A., Wellman, B.: Social network analysis: an introduction. In: The SAGE Handbook of Social Network Analysis, pp. 11–25 (2017)Google Scholar
  9. 9.
    Kwak, H., Lee, C., Park, H., et al.: What is Twitter, a social network or a news media? In: Proceedings of the 19th International Conference on World Wide Web, pp. 591–600. ACM (2010)Google Scholar
  10. 10.
    Ren, X., Lu, L.: Overview of sorting methods for important nodes in networks. Chin. Sci. Bull. 13, 004 (2014)Google Scholar
  11. 11.
    Abdullah, S., Wu, X.: An epidemic model for news spreading on Twitter. In: 2011 23rd IEEE International Conference on Tools with Artificial Intelligence (ICTAI), pp. 163–169 (2017)Google Scholar
  12. 12.
    Xiong, F., Liu, Y., Zhang, Z., et al.: An information diffusion model based on retweeting mechanism for online social media. Phys. Lett. A 376(30), 2103–2108 (2016)Google Scholar
  13. 13.
    Lilt, D., Chen, X.: Rumor propagation in online social networks like Twitter—A simulation study. In: 2011 Third International Conference on Multimedia Information Networking and Security (MINES), pp. 278–282 (2016)Google Scholar
  14. 14.
    Zaman, T., Fox, E.B., Bradlow, E.T.: A Bayesian approach for predicting the popularity of tweets. Ann. Appl. Stat. 8(3), 1583–1611 (2014)MathSciNetCrossRefGoogle Scholar
  15. 15.
    Suh, B., Hong, L., Pirolli, P., et al.: Want to be retweeted? Large scale analytics on factors impacting retweet in Twitter network. In: 2016 IEEE Second International Conference on Social Computing (SocialCom), pp. 177–184 (2016)Google Scholar
  16. 16.
    Peng, H.K., Zhu, J., Piao, D., et al.: Retweet modeling using conditional random fields. In: 2015 IEEE 11th International Conference on Data Mining Workshops (ICDMW), pp. 336–343 (2015)Google Scholar
  17. 17.
    Hong, L., Dan, O., Damson, B.D.: Predicting popular messages in Twitter. In: Proceedings of the 20th International Conference Companion on World Wide Web, pp. 57–58. ACM (2016)Google Scholar
  18. 18.
    Bao, Y., Yi, C., Xue, Y., Dong, Y.: Precise modeling rumor propagation and control strategy on social networks. In: Kazienko, P., Chawla, N. (eds.) Applications of Social Media and Social Network Analysis. LNSN, pp. 77–102. Springer, Cham (2015). Scholar
  19. 19.
    Wang, J., Jiang, C., Qian, J.: Robustness of interdependent networks with different link patterns against cascading failures. Phys. A: Stat. Mech. Appl. 393, 535–541 (2014)CrossRefGoogle Scholar
  20. 20.
    Wang, J.: Mitigation strategies on scale-free networks against cascading failures. Phys. A 392(9), 2257–2264 (2013)CrossRefGoogle Scholar
  21. 21.
    Dou, B.L., Wang, X.G., Zhang, S.Y.: Robustness of networks against cascading failures. Phys. A: Stat. Mech. Appl. 389(11), 2310–2317 (2016)CrossRefGoogle Scholar
  22. 22.
    Qiao, X., Yang, C., Li, X., et al.: A user context based trust degree calculation method in social network services. J. Comput. Sci. 34(12), 2403–2413 (2011)Google Scholar
  23. 23.
    Jiang, J., Yi, C., Bao, Y., et al.: Online community perceiving method on social network. In: 1st International Workshop on Cloud Computing and Information Security. Atlantis Press (2013)Google Scholar
  24. 24.
    Beatty, P., Reap, I., Dick, S., et al.: Consumer trust in e-commerce web sites: a meta-study. ACM Comput. Surv. (CSUR) 43(3), 14 (2011)CrossRefGoogle Scholar
  25. 25.
    Sherchan, W., Nepal, S., Paris, C.: A survey of trust in social networks. ACM Comput. Surv. (CSUR) 45(4), 47 (2013)CrossRefGoogle Scholar
  26. 26.
    Jure, L.: Stanford Large Network Dataset Collection [0L]. Accessed 26 August 2015
  27. 27.
    Jiang, W., Zhong, L., Zhang, L., Shi, D.: Multi-agent dynamic collaboration model based on active logical sequence of complex systems. Chin. J. Comput. 36(5), 1115–1124 (2013)CrossRefGoogle Scholar
  28. 28.
    Jiang, W., Xu, Y., Gu, H., Zhang, L.: Dynamic trust calculation model and credit management mechanism of online trading. Sci. Sin. Inform. 44(9), 1084–1101 (2014)CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  • Weijin Jiang
    • 1
    • 2
  • Yirong Jiang
    • 3
    Email author
  • Jiahui Chen
    • 1
  • Yang Wang
    • 1
  • Yuhui Xu
    • 1
  1. 1.Institute of Big Data and Internet Innovation, Mobile E-Business Collaborative Innovation Center of Hunan ProvinceHunan University of Technology and BusinessChangshaChina
  2. 2.School of Computer Science and TechnologyWuhan University of TechnologyWuhanChina
  3. 3.Tonghua Normal UniversityTonghuaChina

Personalised recommendations