=Paper=
{{Paper
|id=Vol-1382/paper7
|storemode=property
|title=Using AOP Neural Networks to Infer User Behaviours and Interests
|pdfUrl=https://ceur-ws.org/Vol-1382/paper7.pdf
|volume=Vol-1382
|dblpUrl=https://dblp.org/rec/conf/woa/FornaiaNPT15a
}}
==Using AOP Neural Networks to Infer User Behaviours and Interests==
Proc. of the 16th Workshop “From Object to Agents” (WOA15) June 17-19, Naples, Italy Using AOP neural networks to infer user behaviours and interests Andrea Fornaia, Christian Napoli, Giuseppe Pappalardo, and Emiliano Tramontana Department of Mathematics and Informatics University of Catania Viale A. Doria 6, 95125 Catania, Italy {fornaia, napoli, pappalardo, tramontana}@dmi.unict.it Abstract—Generally, users of an ‘ego’ social network provide Still it is highly desirable to have an automatic analysis personal information and actively participate in groups to discuss that can dynamically incorporate data available on the social some topic. We propose a multi-agent driven system to analyse network over time. This is fundamental for building advanced user behaviour and interests by gathering data related to different activities and show that a more comprehensive identity can be services such as e.g. the timely identification of autogenous built from sparse data, while possibly reveal the tentative of some threats. An automated mechanism should take advantage of users to deceive other people. In our approach, user profiles are soft computing approach such as soft artificial intelligence [5], given to a profiling agent that retains relevant data by using particle swarm optimisation and positioning [6], [7], [8], ANN technologies that find categories for users. Even new users, evolutionary methods [9], swarm intelligence [10], neural net- whose profile is still mostly undefined, are given a ’most-likely’ category, therefore the traits of such a category are inferred for works [11], etc.... Neural networks has been proven effective new users. Since a group in a social network such as Facebook for a large number of problems which cannot be solved in can be seen as a category, the agent driven system is also able terms of a priori mathematical models [12], [13], especially to classify user profiles and recommend new groups users can when used with hybrid architectures [14]. We propose an agent subscribe to, according to their interests and preferences. driven artificial intelligence system based upon a Radial Basis Index Terms—Neural Networks, Social Networks, Artificial Probabilistic Neural Network (RBPNN), which is well known Intelligence, Security, Multi-agent Systems. for its capability to classify and generalise datasets and can be continuously trained to recognise novel features, hence can I. I NTRODUCTION easily cope with changing data. The proposed neural network Trust and reliability of data available on social networks has been embedded into a Classification Agent that builds a are important concerns for both service providers and sub- model out of data coming from user profiles, and handled scribers. Given the large size of a social network, in terms by other agents, such as a Profiling Agent and a Crawler of subscribers, data exchanged, and number of links (such as Agent, which retain useful data from different parts of an ‘ego’ friendship, following, membership to groups, endorsements, social network [15], such as Facebook(R). When analysing etc.), it is desirable to have an automatic way to efficiently a social network, as Facebook, the main difficulties are due process data to ensure security and validate at least some con- to: the unknown number of subscribers, friendship relations, tents. User feature and behavioural analysis are two interesting groups, followers, etc.; and the unknown size of data and and important means upon which a solution can be build. features for each subscriber. We overcome such difficulties The first step in this direction is to group users into thanks to several agents, which handle data and retain a categories. Interesting performances have been achieved by representation (in our previous analyser version, a big amount systems analysing user interests, however, in general, such sys- of data has been properly processed using a GPU based tems are only intended for a small context, or for analysing se- solution [16], [17], [18], [19]). Specifically, our Classification lected users. Even though statistical methods make it possible Agent, according to the proposed RBPNN solution, can handle to characterise features and interests for a single user [1], it is partial data, acting as a modeller for dynamically changing difficult to build a proper analytical model for user interactions user’ s profiles. With our classification approach, we are able due to the vastness of data available in a social network, i.e. to perform early identification of autogenous threats: firstly, an number of links, undetermined number of subscriber features, incoherent user profile could be identified when the RBPNN etc. A huge amount of features characterise subscribers, how- prediction of user behaviour, obtained by assigning the user ever a relevant portion of values for such features is missing to a category, differs from the actual behaviour; secondly, for many subscribers in a real environment, hence a complete deception can be revealed by matching user features with formulation of a comprehensive analytical model would be others of undesirable categories of users. Moreover, the agent unfeasible [2], [3], [4]. Moreover, the large amount of data system can use the same classification approach to recommend and the frequency of changes make the numerous reiterations new groups that fit user interests: this is achieved using group needed to formulate the analytical model very computationally subscriptions as categories, instead of the ones specifically costly. designed by the administrator to classify user behaviour. 46 Proc. of the 16th Workshop “From Object to Agents” (WOA15) June 17-19, Naples, Italy Our solution comprises different collaborating agents that can be considered independent parts of the social network that make the social network administrators able to classify and still satisfy the scale-free properties. Clusters generally consist monitor the user behaviour for security enforcement, other of users sharing a set of interests and activities, and users of than enhancing their experience suggesting new groups they the same cluster form a sort of social neighbourhood [22]. can subscribe to, according to their interests. Let us suppose that two users belong to different clusters, The rest of this paper is structured as follows. Section II while being on the same group. When considering the rela- gives the background on the dynamics of a social network. tionship of users and groups, we can see that a group acts as Section III reports about analytical models for classification. a bridge for the contents to flow from a cluster to another (the Section IV describes the proposed multi-agent system based clusters of the correspondent users). Hence, different parts of on RBPNNs. Section V describes the Classification Agent. the network become mutually capable of exchanging contents, Section VI and Section VII reports respectively the performed fostering the small-world behaviour of the social network [23]. experiments and results. Finally, Section VIII draws our con- In this way, clusters of users, representing parts of the social clusions. network, communicate by using weak connections rather than strong ones. Thanks to the said properties of groups we can II. S OCIAL NETWORK DYNAMICS focus our analysis on a partition of the social network (where This work analyses ‘ego’ networks and Facebook is con- a partition is one or several clusters of users), without loosing sidered as a significant representing example. In ‘ego’ social consistence and pertinence with the social network in its networks, the small-world properties are an important char- entireness. acteristic for the actual social dynamic of the network [20]. Moreover, social networks follow a scale-free behaviour [21], B. Existing online social networks i.e. a few nodes (i.e. users) act as important hubs centralising a large number of links, hence data passing through such hubs The main difference between a formal scale-free graph are widely spread on the network. and an online social network is given by the percolation of links [24], i.e. in real life, how worth a certain friend is tends to A. Clusters of users in a social network decrease if there is no good reason to maintain the relationship. For social networks, such as Facebook, we identify two This decrease of interest is still true even in a social network, different kinds of relationships among users. A bidirectional however it has no corresponding support in practice. Such a interaction between a pair of users occurs when such a difficulty on the classification of links results into hard to grip pair exchanges a friendship. Additionally, Facebook provides data when performing an automatic analysis. Moreover, in a groups, i.e. a user is given means to broadcast contents to social network user features change steadily, thus it is difficult all the members of the same group where s/he belongs to. to determine the correlation between a user and his/her specific We define the mutual exchange of friendship between a pair field of interests. Generally, for social networks that let users of users as a strong connection between the pair, whereas participate in a group, an average subscriber tends to sign into for a pair of users that are members of the same group, the a large number of groups, while only a small amount of such membership provides a weak connection between such a pair. groups are really interesting for the user. When a user posts a content into a group, then the resulting The said wide-spread user behaviour would be difficult to one-to-all interaction provides a weak, and sometimes random, generalise using traditional approaches, which are not noise connection with members of the group, who generally share robust. In turn, automatic selections and suggestions of posts a limited number of interests. provided by friends or groups become less useful, because We define the distance between a pair of users as follows. of such inaccuracies. Moreover, it is difficult to distinguish When a pair has exchanged a friendship, then the distance is between trustworthy users and dishonest or unreliable ones. simply 1, otherwise the distance is the minimum count of hops Even though the user profile can be potentially genuine, differ- between the pair by following friendship or group connections. ently from social networks, human networks evolve following Hence, weak connections (available to users belonging to the a homophily law [25] leading a person to connect with others same group) provide means for information to rapidly flow having similar ‘real’ interests. Hence, the homophily law lets across users belonging to portions of the social network that us detect and reason with small, though relevant, differences have no direct friendship relationship. I.e., weak connections between social networks and theoretical scale-free networks. act as bridges between users having no friendship, by allowing Because of such differences, an existing online social network their distance to become equal to 1. cannot adhere to a simple mathematical model, instead, since From the friend list of each subscriber we identify clusters the stochastic behaviour typical of human beings is exhibited, of users. Clusters consist of users having a higher number an advanced nonlinear model is needed. of friendships toward users within the same cluster rather Due to the said untrustworthy, erratic, inconstant and unre- than toward users not belonging to the cluster. Analogous to liable behaviour of users, we maintain that it is paramount to distance between users, we define distance between a pair of uncover hidden or un-explicit interests, giving a representation clusters as the minimum count of hops between one user on of the effective relationships among users. Such (hidden) rela- the first cluster from one in the second cluster. Distant clusters tionships are significant to find categories of users exhibiting 47 Proc. of the 16th Workshop “From Object to Agents” (WOA15) June 17-19, Naples, Italy some common traits. Such an identified category would unveil features that can not be directly detected from the user profile. III. A NALYTICAL MODELS Several generative models can be used to characterise datasets that determine properties and allow grouping data into classes. Generative models are based on stochastic block struc- tures [26], on ‘Infinite Hidden Relational Models’ [27], etc. The main issue of class-based models is the type of relational structure that such solutions describe. Since the definition of a class is attribute-dependent, generally the reported models risk to replicate the existing classes for each new attribute added. E.g. such models would be unable to efficiently organise (inherit) similarities between (from) the classes ‘cats’ and ‘dogs’ as child classes of the more general class ‘mammals’. Such attribute-dependent classes would have to be replicated as the classification generates two different classes of ‘mam- mals’: the class ‘mammals as cats’ and the class ‘mammals Fig. 1. Schema of the data flow through the agents of the proposed system as dogs’. Consequently, in order to distinguish between the different races of cats and dogs, it would be necessary to further multiply the ‘mammals’ class for each one of the be reported to the administrator for further surveys on the identified race. As a consequence, such models quickly lead user behaviour. This is achieved giving the profile of the to an explosion of classes. In addition, we would either have threatening user to the Alert Agent, that constantly handles to add another class to handle each specific use or a mixed all the received notifications, timely warning the administrator membership model, as for crossbred species. with the potentially threats intercepted. Another paradigm concerns the Non-Parametric Latent Fea- The administrator has also the ability to manually define ture Relational Model, i.e. a Bayesian nonparametric model categories built over the activity information of misbehaving in which each entity has boolean valued latent features that users (see Section IV-C); if one of these categories is assigned influence the model’s relations. Such relations depend on well- to a user profile during classification, the Verification Agent known covariant sets, which are neither explicit or known in will ask the Alert Agent to notify the administrator with the the case of a social network during the initial analysis. potential threat detected. The administrator is then able to gather deeper information IV. T HE MULTI - AGENT SYSTEM on the user activities using the functionalities provided by Our aim is to provide to social network administrators a another agent, the Profiling Agent. Using this information, practical and effective tool to predict and monitor user be- s/he can decide what to do according to social network haviour and interests, both for security purposes and user expe- policies. If the user behaviour is considered not compliant rience enhancing. Figure 1 shows the agents for our designed with such policies, the administrator has the ability to use system: a Crawler Agent periodically and autonomously gath- the classification information to automatically identify other ers user information from their social network profiles, other users in the network with the same behaviour, asking the than the list of their group subscriptions. After some pre- Classification Agent to update the inner RBPNN model. On processing tasks, data are given to the Classification Agent the other hand, if the behaviour of the user can be considered that using the inner RBPNN assigns user profiles to known trustworthy, then the new classification label can be simply categories, according to the statistical model built on user in- passed to the Category Agent. formation during training phases. Due to the intrinsic dynamics Since we can see a group of a social network as a category that the social network imposes, this model is constantly and of users, that gets together people with common interests, incrementally updated. we can use the same approach just seen to classify user The classification results, i.e. the associations between user profiles with the groups that better suit their interests. This profiles and categories, are given to the Verification Agent, type of classification results could be directly provided by the that asks the Category Agent to provide the categories already Classification Agent as recommendations for groups that user assigned to a specific user (if any), comparing them with the can subscribe to (see Section IV-D). ones just given from the Classification Agent results. If a specific user had no category assigned, the Verification Agent A. Computing comprehensive identities will notify the Category Agent with the newly one found; if User categories can be chosen by the Classification Agent instead the user already had a category assigned, but differing alone, which is statistically driven, and such categories have from the one just discovered, we could think at this as a a probabilistic meaning that contributes to identify the most clue for an autogenous threat (see Section IV-B) that should appropriate conceivable model for users. The ‘model’ should 48 Proc. of the 16th Workshop “From Object to Agents” (WOA15) June 17-19, Naples, Italy be intended as a kind of representation of the behaviour of a user on the social network. The identified category, provided by the inner RBPNN classifier, can complement and integrate the online identity provided by each subscriber. Such a comprehensive identity, assigned automatically, can help further understanding user behaviours. To make this solution as independent as possible from the social network data infrastructure, we store and manage additional data with a further agent, that is the Category Agent, but where a more integrated solution is desirable (and conceivable), we can Fig. 2. RBPNN setup values: NF is the number of considered features, NS imagine to add such data directly inside the social network number of analysed subscribers, and NG desired number of categories. user profiles. Once a user belongs to a given category, the administrator can be warned by the Alert Agent to check Although in some moments it would depend on human whether the subscribers linked to a category of misbehaving activities (i.e. administrators), such a control system can users are performing activities that conflict with social network then be used to automatically restrict deeper surveys on a policies. When a user posts a content or subscribes to a small number of possibly dangerous users, so that situations group, the social network administration is aware of the when urgent actions are needed can be timely handled. This implicit or explicit choices made beforehand by that user. This automatic selection of users would avert the risk of having to ‘history’ helps understanding whether the current user activity restrain the entirety of subscribers. is coherent or appropriate. Data are continuously sent to the Classification Agent, D. Group recommendation hence tentative categories identified for a new user are either Although in this work the RBPNN model has been used confirmed or changed according to the recent activities. Hence, to assign categories, which correspond to groups, the term more refined alert are given over time. ’categories’ has been used on purpose for its more general meaning. The Classification Agent, with its RBPNN model, B. Preventing deception and threats is able to find and propose non explicit groups, i.e. groups Theoretically, the RBPNN used by the Classification Agent that have not yet been chosen by a subscriber, but which unveils behavioural patterns that the user is expected to follow. are very likely to be eventually chosen since they match the If a user begins to act according to a different behavioural preferences of the subscriber. In a similar way, this RBPNN pattern with respect to those for which s/he has been classified, can be arranged to select users having an high affinity toward then this variation can be used as an alert that let an admin- a group. I.e. the RBPNN can be asked to unveil the affinity of istrator monitor him/her and possibly apply some restrictions a user with a certain category of users, which can be intended after a deeper check has occurred. Such an alert is meant to not only as a group, but also as a behavioural category. reveal a compromised account that has been stolen. V. P ROPOSED RBPNN BASED C LASSIFICATION AGENT Once a user account has been confirmed as compromised, Classical models suffer of the incompleteness of the initial either manually or automatically, the supporting system can input dataset (see Section III). On the other hand, neural net- be set to rise a warning toward all the users that are the target works have been largely used to uncover data classification and of the activities of the perpetrator, in order to possibly avoid find probabilistic categories for data. Therefore, we use Radial tentative deceptions. Basis Probabilistic Neural Networks (RBPNN), managed by Therefore, the proposed Classification Agent can be used an independent agent, to automatically find categories of users, to avoid autogenous threats, such as a misbehaving user or whereby a category reveals common traits for users. Note a thief, as much as a wide range of other online frauds and that group of ‘ego’ networks and social networks, such as several violations. The more online behaviours are modelled, Facebook, can be seen as categories, which the RBPNN finds. by training the RBPNN model with existing user data, the Our neural network, after being correctly trained, generates a more positive and negative activities can be identified by the model for the latent user features, and finds users having such Classification Agent. features. This is usually considered both an interesting and difficult task [28]. However, the activation functions used for C. Security enforcement RBPNNs have to meet some important properties required to Suppose that a user is disposed toward a bad behaviour preserve generalisation abilities and the decision boundaries on the network, then the Classification Agent would associate of Probabilistic Neural Networks (PNN) [29]. The selected such a user with a category previously built by administrators, RBPNN architecture takes advantage from both PNN topology consisting of other misbehaving users. For building such a and Radial Basis Neural Networks (RBNN) used in [30]. category, administrators would simply need to manually flag In a RBPNN both the input and the first hidden layer exactly some selected users, interacting with the Category Agent to match the PNN architecture. In a PNN, each hidden layer store these expert supervised associations. neuron performs the dot product of the input vector u by 49 Proc. of the 16th Workshop “From Object to Agents” (WOA15) June 17-19, Naples, Italy a weight vector W(0) , and then gives output x(1) that is variable could report if the user is male or female; then in case provided to the following summation layer. While preserving the profile does not state the gender, the latter feature has no the PNN topology, to obtain the RBPNN capabilities, the meaning and should not be considered. However, since our activation function is a radial basis function (RBF). We name dataset gives no labels, we can not exclude any feature. f the chosen RBF, so the output of the first hidden layer for Although data are anonymised, users are identified with a the j-esime neuron is unique ID. Moreover, the memberships of users to groups is indirectly identified from the list of subscribers to each group. (1) ||u − W(0) || xj , f Data intended to be input for our RBPNN have been β passed to a preprocessing stage, whereby for each user the where β is a parameter that controls the distribution shape. corresponding feature list has been paired with the list of The second hidden layer in a RBPNN is identical to that of group memberships. This enables us to build a statistically a PNN, it just computes weighted sums of the values received driven classifier that identifies the correspondence between from the preceding neurons. The training for the output layer user features and their groups. is performed as in a classic RBNN, however since the number of summation units is very small and in general remarkably VII. RBPNN FINDINGS less than in usual RBNNs, training becomes simplified and Both user profiles, consisting of features, and user member- speed greatly increased. ships to groups were provided to our RBPNN classifier during The devised topology enable us to distribute different parts the training phase. Therefore, the RBPNN classifier has learnt of the classification task to different layers (see Figure 2). The how to reproduce the correct paths that associate lists of profile first hidden layer of the RBPNN is responsible to perform features with groups. the fundamental task expected from a neural network, i.e. Initially, we have asked our RBPNN to reconstruct the generalise and build an implicit model. The second hidden groups for 250 users. The RBPNN was able to correctly layer selectively sums the output of the first hidden layer. The assign users to the proper groups with only a 5.67% of output layer fulfils the nonlinear mapping, such as classifica- missing assignments: as a remarkable side effect while a tion, approximation and prediction. few groups were not found, no false positive was given (see In order to have a proper classification of the input dataset, Figure 3). Moreover, if we compare the features for such i.e. of users into categories, the size of the input layer matches unclassified users and the average features of their groups, the number NF of features, labelled elements of the dataset relevant differences can be uncovered with respect to the (see Section VI), given to the RBPNN, whereas the size of the average (and correctly classified) user. Just for validation RBF units matches the number of examined subscribers NS . purposes, we have performed the same comparison for users The number of units in the second hidden layer is equal to the with an almost empty profile that the RBPNN could not insert number of output units, these match the number of categories into any category. NG to be found for the subscribers. Then, we have asked our RBPNN to identify categories for new users. In Figure 3 new users are reported in black or VI. E XPERIMENTAL SETUP green and are assigned to a group they have not expressed Since the paramount importance of the classification com- preferences in. For an appreciable percentage of users, i.e. ponent in the proposed multi-agent solution, we have deeply about 20%, the proposed RBPNN has indicated a group that tested the performance of the conceived RBPNN classifier (unknown to the RBPNN) users had membership to. Indeed, a used by the Classification Agent. We used a dataset consist- relevant number of the other 80% of user profiles is (almost) ing of features, i.e. a trace of the user activities and their empty, therefore no classifier, not only our RBPNN, would preferences, coming from real Facebook profiles. Data for manage. On the other hand, how many and which features the features that we have been given have a label which is suffice for a user to be classified depend on the model built a numerical ID, i.e. the feature itself can not be recognised, by the RBPNN (simply counting the number of empty features however this does not affect the scope of this work nor the is ineffective since they are not equally meaningful). analysis performed. As far as the feature lists is concerned, data provide boolean VIII. C ONCLUDING R EMARKS values. The presence or absence of a specific value is expressed With the recent growth of social networks usage, a keen as a boolean flag, e.g. 1 if the user has declared his job or 0 if interest for privacy and deception has arisen. In [31], authors no job information is given in the profile. Among such boolean describe the results of an extensive comparison between two values there are mutually exclusive values such as the gender, important social networks such as Facebook and MySpace, e.g. 1 if male or 0 if female. showing that the interaction of trust and privacy concerns in The intrinsic structure of the dataset prevents us from social networking sites is not yet understood to a sufficient considering only a reduced portion of the feature list for a degree. In [32], authors explore the preservation of privacy user. A piece of information is usually largely spread over and propose a novel method to avoid neighbourhood attacks. a certain number of features, e.g. a boolean variable could The authors show that anonymised data can be used to answer express if the gender is stated or not, and only if stated another aggregate queries accurately. 50 Proc. of the 16th Workshop “From Object to Agents” (WOA15) June 17-19, Naples, Italy above solution would possibly be integrated with the servers handling user data, higher security levels could be achieved and the safety of the subscribers would be preserved, e.g. by timely warning administrator to intervene to check and stop autogenous threats. ACKNOWLEDGEMENTS This work has been partially supported by project PRISMA PON04a2 A/F funded by the Italian Ministry of University within PON 2007-2013 framework, and by project PRIME funded by the Italian Ministry of University and Research within POR FESR Sicilia 2007-2013 framework. R EFERENCES [1] C. Kiss, A. Scholz, and M. Bichler, “Evaluating centrality measures in large call graphs,” in Proceedings of IEEE Enterprise Computing, E-Commerce, and E-Services, 2006. [2] G. Cybenko, “Approximation by superpositions of a sigmoidal function,” Mathematics of Control, Signals and Systems, vol. 2, no. 4, pp. 303–314, 1989. [3] G. Capizzi, F. Bonanno, and C. Napoli, “A new approach for lead- acid batteries modeling by local cosine,” in Power Electronics Elec- trical Drives Automation and Motion (SPEEDAM), 2010 International Symposium on, pp. 1074–1079, IEEE, 2010. [4] M. T. Hagan, H. B. Demuth, M. H. Beale, et al., Neural network design. Pws Pub. Boston, 1996. [5] F. Bonanno, G. Capizzi, A. Gagliano, and C. Napoli, “Optimal man- agement of various renewable energy sources by a new forecasting method,” in Power Electronics, Electrical Drives, Automation and Motion (SPEEDAM), 2012 International Symposium on, pp. 934–940, IEEE, 2012. [6] M. Woźniak, “On positioning traffic in nosql database systems by the use of particle swarm algorithm,” in Proceedings of XV Workshop DAGLI OGGETTI AGLI AGENTI - WOA’2014, vol. 1260, (25-26 September, Catania, Italy), p. paper 5, CEUR Workshop Proceedings (CEUR- WS.org), RWTH Aachen University, 2014. [7] C. Napoli, G. Pappalardo, E. Tramontana, Z. Marszałek, D. Połap, and M. Woźniak, “Simplified firefly algorithm for 2d image key-points search,” in 2014 IEEE Symposium on Computational Intelligence for Human-like Intelligence, pp. 118–125, IEEE, 2014. Fig. 3. Top: RBPNN assigned group memberships: correct findings are shown [8] M. Woźniak and D. Połap, “On some aspects of genetic and evolu- in black, whereas unfound ones are shown in red. Bottom: BPNN assignment tionary methods for optimization purposes,” International Journal of to groups for new users: legitimate memberships are in green. Electronics and Telecommunications, vol. 61, no. 1, pp. 7–16, 2015. DOI: 10.1515/eletel-2015-0001. [9] M. Gabryel, M. Woźniak, and R. Damaševic̆ius, “An application of differential evolution to positioning queueing systems,” Lecture Notes Other previous analyses of data concerning user profiling in Artificial Intelligence - ICAISC’2015, vol. 9120, pp. 379–390, 2015. DOI: 10.1007/978-3-319-19369-4 34. have taken into account the category of words appearing in [10] M. Woźniak, D. Połap, M. Gabryel, R. K. Nowicki, C. Napoli, texts [33], as well as the user behaviour on-line. The latter and E. Tramontana, “Can we preprocess 2d images using artificial solution has been oriented towards an improvement of replica bee colony?,” Lecture Notes in Artificial Intelligence - ICAISC’2015, vol. 9119, pp. 660–671, 2015. DOI: 10.1007/978-3-319-19324-3 59. spreading by considering user bandwidth and availability [34]. [11] F. Bonanno, G. Capizzi, and C. Napoli, “Some remarks on the appli- Moreover, in [35], users have been profiled by observing cation of rnn and prnn for the charge-discharge simulation of advanced their interactions with a workflow management system, in lithium-ions battery energy storage,” in Power Electronics, Electrical Drives, Automation and Motion (SPEEDAM), 2012 International Sym- a working scenario based on a public administration. All posium on, pp. 941–945, IEEE, 2012. the above profiling strategies can be taken into account and [12] F. Bonanno, G. Capizzi, S. Coco, C. Napoli, A. Laudani, and G. Lo Sci- applied into an on-line social network environment for further uto, “Optimal thicknesses determination in a multilayer structure to improve the spp efficiency for photovoltaic devices by an hybrid fem— enriching the classification proposed above. cascade neural network based approach,” in Power Electronics, Elec- We have proposed a multi-agent system for automatic trical Drives, Automation and Motion (SPEEDAM), 2014 International Symposium on, pp. 355–362, IEEE, 2014. analysis of data on a social network and have shown that [13] M. Woźniak, “Fitness function for evolutionary computation applied in interesting results can be obtained in terms of the knowledge dynamic object simulation and positioning,” in IEEE SSCI 2014: 2014 on the behaviour of users. The proposed solution is based IEEE Symposium Series on Computational Intelligence - CIVTS 2014: 2014 IEEE Symposium on Computational Intelligence in Vehicles and on RBPNN and finds for a user the most similar category Transportation Systems, Proceedings, (9-12 December, Orlando, Florida, (or social network group) s/he could belong to. Once the USA), pp. 108–114, IEEE, 2014. DOI: 10.1109/CIVTS.2014.7009485. 51 Proc. of the 16th Workshop “From Object to Agents” (WOA15) June 17-19, Naples, Italy [14] F. Bonanno, G. Capizzi, and C. Napoli, “Hybrid neural networks architectures for soc and voltage prediction of new generation batteries storage,” in IEEE international conference on clean electrical power (ICCEP), pp. 341–344, 2011. [15] C. Jones and E. H. Volpe, “Organizational identification: Extending our understanding of social identities through social networks,” Journal of Organizational Behavior, vol. 32, no. 3, pp. 413–434, 2011. [16] C. Napoli, G. Pappalardo, and E. Tramontana, “A hybrid neuro-wavelet predictor for qos control and stability,” in Proceedings of AIxIA, vol. 8249 of LNCS, pp. 527–538, Springer, 2013. [17] C. Napoli, G. Pappalardo, and E. Tramontana, “Using modularity metrics to assist move method refactoring of large systems,” in Proceedings of International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS), pp. 529–534, IEEE, 2013. [18] C. Napoli, G. Pappalardo, E. Tramontana, and G. Zappalà, “A cloud- distributed gpu architecture for pattern identification in segmented detectors big-data surveys,” The Computer Journal, p. bxu147, 2014. [19] F. Bonanno, G. Capizzi, G. Lo Sciuto, C. Napoli, G. Pappalardo, and E. Tramontana, “A novel cloud-distributed toolbox for optimal energy dispatch management from renewables in igss by using wrnn predictors and gpu parallel solutions,” in Power Electronics, Electrical Drives, Automation and Motion (SPEEDAM), 2014 International Symposium on, pp. 1077–1084, IEEE, 2014. [20] Y.-Y. Ahn, S. Han, H. Kwak, S. Moon, and H. Jeong, “Analysis of topological characteristics of huge online social networking services,” in Proceedings of World Wide Web, pp. 835–844, ACM, 2007. [21] A.-L. Barabási, “Scale-free networks: a decade and beyond,” Science, vol. 325, no. 5939, pp. 412–413, 2009. [22] M. Granovetter, “The Strength of Weak Ties,” The American Journal of Sociology, vol. 78, no. 6, pp. 1360–1380, 1973. [23] S. Schnettler, “A structured overview of 50 years of small-world research,” Social Networks, vol. 31, pp. 165–178, July 2009. [24] N. Schwartz, R. Cohen, D. ben Avraham, A.-L. Barabási, and S. Havlin, “Percolation in directed scale-free networks,” Phys. Rev. E, vol. 66, p. 015104, Jul 2002. [25] M. McPherson, L. Smith-Lovin, and J. M. Cook, “Birds of a feather: Homophily in social networks,” Annual Review of Sociology, vol. 27, no. 1, pp. 415–444, 2001. [26] K. Nowicki and T. A. B. Snijders, “Estimation and prediction for stochastic blockstructures,” Journal of the American Statistical Asso- ciation, vol. 96, no. 455, pp. 1077–1087, 2001. [27] Z. Xu, V. Tresp, K. Yu, and H. peter Kriegel, “Infinite hidden relational models,” in Proceedings of Uncertainity in Artificial Intelligence (UAI), 2006. [28] D. Liben-Nowell and J. Kleinberg, “The link-prediction problem for social networks,” Journal of the American society for information science and technology, vol. 58, no. 7, pp. 1019–1031, 2007. [29] S. O. Haykin, Neural networks and learning machines (3rd Edition), vol. 3. Prentice Hall, 2009. [30] F. Bonanno, G. Capizzi, G. Graditi, C. Napoli, and G. Tina, “A radial basis function neural network based approach for the electrical characteristics estimation of a photovoltaic module,” Applied Energy, vol. 97, pp. 956–961, 2012. [31] C. Dwyer, S. Hiltz, and K. Passerini, “Trust and privacy concern within social networking sites: A comparison of facebook and myspace,” in Proceedings of Americas Conference on Information Systems, pp. 339– 351, 2007. [32] B. Zhou and J. Pei, “Preserving privacy in social networks against neighborhood attacks,” in Proceedings of Data Engineering, IEEE, 2008. [33] C. Napoli, G. Pappalardo, and E. Tramontana, “An agent-driven se- mantical identifier using radial basis neural networks and reinforcement learning,” in Proceedings of XV Workshop ”Dagli Oggetti agli Agenti”, vol. 1260, CEUR-WS, 2014. [34] C. Napoli, G. Pappalardo, and E. Tramontana, “Improving files avail- ability for bittorrent using a diffusion model,” in Proceedings of Inter- national WETICE Conference, pp. 191–196, IEEE, 2014. [35] G. Borowik, M. Wozniak, A. Fornaia, R. Giunta, C. Napoli, G. Pap- palardo, and E. Tramontana, “A software architecture assisting workflow executions on cloud resources,” International Journal of Electronics and Telecommunications, vol. 61, no. 1, pp. 17–23, 2015. 52