=Paper= {{Paper |id=Vol-1382/paper7 |storemode=property |title=Using AOP Neural Networks to Infer User Behaviours and Interests |pdfUrl=https://ceur-ws.org/Vol-1382/paper7.pdf |volume=Vol-1382 |dblpUrl=https://dblp.org/rec/conf/woa/FornaiaNPT15a }} ==Using AOP Neural Networks to Infer User Behaviours and Interests== https://ceur-ws.org/Vol-1382/paper7.pdf
Proc. of the 16th Workshop “From Object to Agents” (WOA15)                                                 June 17-19, Naples, Italy



Using AOP neural networks to infer user behaviours
                  and interests
                  Andrea Fornaia, Christian Napoli, Giuseppe Pappalardo, and Emiliano Tramontana
                                           Department of Mathematics and Informatics
                                                        University of Catania
                                              Viale A. Doria 6, 95125 Catania, Italy
                                      {fornaia, napoli, pappalardo, tramontana}@dmi.unict.it


   Abstract—Generally, users of an ‘ego’ social network provide          Still it is highly desirable to have an automatic analysis
personal information and actively participate in groups to discuss    that can dynamically incorporate data available on the social
some topic. We propose a multi-agent driven system to analyse         network over time. This is fundamental for building advanced
user behaviour and interests by gathering data related to different
activities and show that a more comprehensive identity can be         services such as e.g. the timely identification of autogenous
built from sparse data, while possibly reveal the tentative of some   threats. An automated mechanism should take advantage of
users to deceive other people. In our approach, user profiles are     soft computing approach such as soft artificial intelligence [5],
given to a profiling agent that retains relevant data by using        particle swarm optimisation and positioning [6], [7], [8],
ANN technologies that find categories for users. Even new users,      evolutionary methods [9], swarm intelligence [10], neural net-
whose profile is still mostly undefined, are given a ’most-likely’
category, therefore the traits of such a category are inferred for    works [11], etc.... Neural networks has been proven effective
new users. Since a group in a social network such as Facebook         for a large number of problems which cannot be solved in
can be seen as a category, the agent driven system is also able       terms of a priori mathematical models [12], [13], especially
to classify user profiles and recommend new groups users can          when used with hybrid architectures [14]. We propose an agent
subscribe to, according to their interests and preferences.           driven artificial intelligence system based upon a Radial Basis
  Index Terms—Neural Networks, Social Networks, Artificial            Probabilistic Neural Network (RBPNN), which is well known
Intelligence, Security, Multi-agent Systems.                          for its capability to classify and generalise datasets and can
                                                                      be continuously trained to recognise novel features, hence can
                        I. I NTRODUCTION                              easily cope with changing data. The proposed neural network
   Trust and reliability of data available on social networks         has been embedded into a Classification Agent that builds a
are important concerns for both service providers and sub-            model out of data coming from user profiles, and handled
scribers. Given the large size of a social network, in terms          by other agents, such as a Profiling Agent and a Crawler
of subscribers, data exchanged, and number of links (such as          Agent, which retain useful data from different parts of an ‘ego’
friendship, following, membership to groups, endorsements,            social network [15], such as Facebook(R). When analysing
etc.), it is desirable to have an automatic way to efficiently        a social network, as Facebook, the main difficulties are due
process data to ensure security and validate at least some con-       to: the unknown number of subscribers, friendship relations,
tents. User feature and behavioural analysis are two interesting      groups, followers, etc.; and the unknown size of data and
and important means upon which a solution can be build.               features for each subscriber. We overcome such difficulties
   The first step in this direction is to group users into            thanks to several agents, which handle data and retain a
categories. Interesting performances have been achieved by            representation (in our previous analyser version, a big amount
systems analysing user interests, however, in general, such sys-      of data has been properly processed using a GPU based
tems are only intended for a small context, or for analysing se-      solution [16], [17], [18], [19]). Specifically, our Classification
lected users. Even though statistical methods make it possible        Agent, according to the proposed RBPNN solution, can handle
to characterise features and interests for a single user [1], it is   partial data, acting as a modeller for dynamically changing
difficult to build a proper analytical model for user interactions    user’ s profiles. With our classification approach, we are able
due to the vastness of data available in a social network, i.e.       to perform early identification of autogenous threats: firstly, an
number of links, undetermined number of subscriber features,          incoherent user profile could be identified when the RBPNN
etc. A huge amount of features characterise subscribers, how-         prediction of user behaviour, obtained by assigning the user
ever a relevant portion of values for such features is missing        to a category, differs from the actual behaviour; secondly,
for many subscribers in a real environment, hence a complete          deception can be revealed by matching user features with
formulation of a comprehensive analytical model would be              others of undesirable categories of users. Moreover, the agent
unfeasible [2], [3], [4]. Moreover, the large amount of data          system can use the same classification approach to recommend
and the frequency of changes make the numerous reiterations           new groups that fit user interests: this is achieved using group
needed to formulate the analytical model very computationally         subscriptions as categories, instead of the ones specifically
costly.                                                               designed by the administrator to classify user behaviour.




                                                                 46
    Proc. of the 16th Workshop “From Object to Agents” (WOA15)                                                   June 17-19, Naples, Italy


   Our solution comprises different collaborating agents that        can be considered independent parts of the social network that
make the social network administrators able to classify and          still satisfy the scale-free properties. Clusters generally consist
monitor the user behaviour for security enforcement, other           of users sharing a set of interests and activities, and users of
than enhancing their experience suggesting new groups they           the same cluster form a sort of social neighbourhood [22].
can subscribe to, according to their interests.                         Let us suppose that two users belong to different clusters,
   The rest of this paper is structured as follows. Section II       while being on the same group. When considering the rela-
gives the background on the dynamics of a social network.            tionship of users and groups, we can see that a group acts as
Section III reports about analytical models for classification.      a bridge for the contents to flow from a cluster to another (the
Section IV describes the proposed multi-agent system based           clusters of the correspondent users). Hence, different parts of
on RBPNNs. Section V describes the Classification Agent.             the network become mutually capable of exchanging contents,
Section VI and Section VII reports respectively the performed        fostering the small-world behaviour of the social network [23].
experiments and results. Finally, Section VIII draws our con-        In this way, clusters of users, representing parts of the social
clusions.                                                            network, communicate by using weak connections rather than
                                                                     strong ones. Thanks to the said properties of groups we can
              II. S OCIAL NETWORK DYNAMICS                           focus our analysis on a partition of the social network (where
   This work analyses ‘ego’ networks and Facebook is con-            a partition is one or several clusters of users), without loosing
sidered as a significant representing example. In ‘ego’ social       consistence and pertinence with the social network in its
networks, the small-world properties are an important char-          entireness.
acteristic for the actual social dynamic of the network [20].
Moreover, social networks follow a scale-free behaviour [21],        B. Existing online social networks
i.e. a few nodes (i.e. users) act as important hubs centralising
a large number of links, hence data passing through such hubs           The main difference between a formal scale-free graph
are widely spread on the network.                                    and an online social network is given by the percolation of
                                                                     links [24], i.e. in real life, how worth a certain friend is tends to
A. Clusters of users in a social network                             decrease if there is no good reason to maintain the relationship.
   For social networks, such as Facebook, we identify two            This decrease of interest is still true even in a social network,
different kinds of relationships among users. A bidirectional        however it has no corresponding support in practice. Such a
interaction between a pair of users occurs when such a               difficulty on the classification of links results into hard to grip
pair exchanges a friendship. Additionally, Facebook provides         data when performing an automatic analysis. Moreover, in a
groups, i.e. a user is given means to broadcast contents to          social network user features change steadily, thus it is difficult
all the members of the same group where s/he belongs to.             to determine the correlation between a user and his/her specific
We define the mutual exchange of friendship between a pair           field of interests. Generally, for social networks that let users
of users as a strong connection between the pair, whereas            participate in a group, an average subscriber tends to sign into
for a pair of users that are members of the same group, the          a large number of groups, while only a small amount of such
membership provides a weak connection between such a pair.           groups are really interesting for the user.
When a user posts a content into a group, then the resulting            The said wide-spread user behaviour would be difficult to
one-to-all interaction provides a weak, and sometimes random,        generalise using traditional approaches, which are not noise
connection with members of the group, who generally share            robust. In turn, automatic selections and suggestions of posts
a limited number of interests.                                       provided by friends or groups become less useful, because
   We define the distance between a pair of users as follows.        of such inaccuracies. Moreover, it is difficult to distinguish
When a pair has exchanged a friendship, then the distance is         between trustworthy users and dishonest or unreliable ones.
simply 1, otherwise the distance is the minimum count of hops        Even though the user profile can be potentially genuine, differ-
between the pair by following friendship or group connections.       ently from social networks, human networks evolve following
Hence, weak connections (available to users belonging to the         a homophily law [25] leading a person to connect with others
same group) provide means for information to rapidly flow            having similar ‘real’ interests. Hence, the homophily law lets
across users belonging to portions of the social network that        us detect and reason with small, though relevant, differences
have no direct friendship relationship. I.e., weak connections       between social networks and theoretical scale-free networks.
act as bridges between users having no friendship, by allowing       Because of such differences, an existing online social network
their distance to become equal to 1.                                 cannot adhere to a simple mathematical model, instead, since
   From the friend list of each subscriber we identify clusters      the stochastic behaviour typical of human beings is exhibited,
of users. Clusters consist of users having a higher number           an advanced nonlinear model is needed.
of friendships toward users within the same cluster rather              Due to the said untrustworthy, erratic, inconstant and unre-
than toward users not belonging to the cluster. Analogous to         liable behaviour of users, we maintain that it is paramount to
distance between users, we define distance between a pair of         uncover hidden or un-explicit interests, giving a representation
clusters as the minimum count of hops between one user on            of the effective relationships among users. Such (hidden) rela-
the first cluster from one in the second cluster. Distant clusters   tionships are significant to find categories of users exhibiting




                                                                     47
Proc. of the 16th Workshop “From Object to Agents” (WOA15)                                                   June 17-19, Naples, Italy


some common traits. Such an identified category would unveil
features that can not be directly detected from the user profile.
                 III. A NALYTICAL MODELS
   Several generative models can be used to characterise
datasets that determine properties and allow grouping data into
classes. Generative models are based on stochastic block struc-
tures [26], on ‘Infinite Hidden Relational Models’ [27], etc.
The main issue of class-based models is the type of relational
structure that such solutions describe. Since the definition of a
class is attribute-dependent, generally the reported models risk
to replicate the existing classes for each new attribute added.
   E.g. such models would be unable to efficiently organise
(inherit) similarities between (from) the classes ‘cats’ and
‘dogs’ as child classes of the more general class ‘mammals’.
Such attribute-dependent classes would have to be replicated
as the classification generates two different classes of ‘mam-
mals’: the class ‘mammals as cats’ and the class ‘mammals           Fig. 1. Schema of the data flow through the agents of the proposed system
as dogs’. Consequently, in order to distinguish between the
different races of cats and dogs, it would be necessary to
further multiply the ‘mammals’ class for each one of the            be reported to the administrator for further surveys on the
identified race. As a consequence, such models quickly lead         user behaviour. This is achieved giving the profile of the
to an explosion of classes. In addition, we would either have       threatening user to the Alert Agent, that constantly handles
to add another class to handle each specific use or a mixed         all the received notifications, timely warning the administrator
membership model, as for crossbred species.                         with the potentially threats intercepted.
   Another paradigm concerns the Non-Parametric Latent Fea-            The administrator has also the ability to manually define
ture Relational Model, i.e. a Bayesian nonparametric model          categories built over the activity information of misbehaving
in which each entity has boolean valued latent features that        users (see Section IV-C); if one of these categories is assigned
influence the model’s relations. Such relations depend on well-     to a user profile during classification, the Verification Agent
known covariant sets, which are neither explicit or known in        will ask the Alert Agent to notify the administrator with the
the case of a social network during the initial analysis.           potential threat detected.
                                                                       The administrator is then able to gather deeper information
               IV. T HE MULTI - AGENT SYSTEM                        on the user activities using the functionalities provided by
   Our aim is to provide to social network administrators a         another agent, the Profiling Agent. Using this information,
practical and effective tool to predict and monitor user be-        s/he can decide what to do according to social network
haviour and interests, both for security purposes and user expe-    policies. If the user behaviour is considered not compliant
rience enhancing. Figure 1 shows the agents for our designed        with such policies, the administrator has the ability to use
system: a Crawler Agent periodically and autonomously gath-         the classification information to automatically identify other
ers user information from their social network profiles, other      users in the network with the same behaviour, asking the
than the list of their group subscriptions. After some pre-         Classification Agent to update the inner RBPNN model. On
processing tasks, data are given to the Classification Agent        the other hand, if the behaviour of the user can be considered
that using the inner RBPNN assigns user profiles to known           trustworthy, then the new classification label can be simply
categories, according to the statistical model built on user in-    passed to the Category Agent.
formation during training phases. Due to the intrinsic dynamics        Since we can see a group of a social network as a category
that the social network imposes, this model is constantly and       of users, that gets together people with common interests,
incrementally updated.                                              we can use the same approach just seen to classify user
   The classification results, i.e. the associations between user   profiles with the groups that better suit their interests. This
profiles and categories, are given to the Verification Agent,       type of classification results could be directly provided by the
that asks the Category Agent to provide the categories already      Classification Agent as recommendations for groups that user
assigned to a specific user (if any), comparing them with the       can subscribe to (see Section IV-D).
ones just given from the Classification Agent results. If a
specific user had no category assigned, the Verification Agent      A. Computing comprehensive identities
will notify the Category Agent with the newly one found; if            User categories can be chosen by the Classification Agent
instead the user already had a category assigned, but differing     alone, which is statistically driven, and such categories have
from the one just discovered, we could think at this as a           a probabilistic meaning that contributes to identify the most
clue for an autogenous threat (see Section IV-B) that should        appropriate conceivable model for users. The ‘model’ should




                                                               48
    Proc. of the 16th Workshop “From Object to Agents” (WOA15)                                                   June 17-19, Naples, Italy


be intended as a kind of representation of the behaviour of a
user on the social network. The identified category, provided
by the inner RBPNN classifier, can complement and integrate
the online identity provided by each subscriber.
   Such a comprehensive identity, assigned automatically, can
help further understanding user behaviours. To make this
solution as independent as possible from the social network
data infrastructure, we store and manage additional data with
a further agent, that is the Category Agent, but where a
more integrated solution is desirable (and conceivable), we can     Fig. 2. RBPNN setup values: NF is the number of considered features, NS
imagine to add such data directly inside the social network         number of analysed subscribers, and NG desired number of categories.
user profiles. Once a user belongs to a given category, the
administrator can be warned by the Alert Agent to check                Although in some moments it would depend on human
whether the subscribers linked to a category of misbehaving         activities (i.e. administrators), such a control system can
users are performing activities that conflict with social network   then be used to automatically restrict deeper surveys on a
policies. When a user posts a content or subscribes to a            small number of possibly dangerous users, so that situations
group, the social network administration is aware of the            when urgent actions are needed can be timely handled. This
implicit or explicit choices made beforehand by that user. This     automatic selection of users would avert the risk of having to
‘history’ helps understanding whether the current user activity     restrain the entirety of subscribers.
is coherent or appropriate.
   Data are continuously sent to the Classification Agent,          D. Group recommendation
hence tentative categories identified for a new user are either        Although in this work the RBPNN model has been used
confirmed or changed according to the recent activities. Hence,     to assign categories, which correspond to groups, the term
more refined alert are given over time.                             ’categories’ has been used on purpose for its more general
                                                                    meaning. The Classification Agent, with its RBPNN model,
B. Preventing deception and threats                                 is able to find and propose non explicit groups, i.e. groups
   Theoretically, the RBPNN used by the Classification Agent        that have not yet been chosen by a subscriber, but which
unveils behavioural patterns that the user is expected to follow.   are very likely to be eventually chosen since they match the
If a user begins to act according to a different behavioural        preferences of the subscriber. In a similar way, this RBPNN
pattern with respect to those for which s/he has been classified,   can be arranged to select users having an high affinity toward
then this variation can be used as an alert that let an admin-      a group. I.e. the RBPNN can be asked to unveil the affinity of
istrator monitor him/her and possibly apply some restrictions       a user with a certain category of users, which can be intended
after a deeper check has occurred. Such an alert is meant to        not only as a group, but also as a behavioural category.
reveal a compromised account that has been stolen.                       V. P ROPOSED RBPNN BASED C LASSIFICATION AGENT
   Once a user account has been confirmed as compromised,
                                                                       Classical models suffer of the incompleteness of the initial
either manually or automatically, the supporting system can
                                                                    input dataset (see Section III). On the other hand, neural net-
be set to rise a warning toward all the users that are the target
                                                                    works have been largely used to uncover data classification and
of the activities of the perpetrator, in order to possibly avoid
                                                                    find probabilistic categories for data. Therefore, we use Radial
tentative deceptions.
                                                                    Basis Probabilistic Neural Networks (RBPNN), managed by
   Therefore, the proposed Classification Agent can be used         an independent agent, to automatically find categories of users,
to avoid autogenous threats, such as a misbehaving user or          whereby a category reveals common traits for users. Note
a thief, as much as a wide range of other online frauds and         that group of ‘ego’ networks and social networks, such as
several violations. The more online behaviours are modelled,        Facebook, can be seen as categories, which the RBPNN finds.
by training the RBPNN model with existing user data, the            Our neural network, after being correctly trained, generates a
more positive and negative activities can be identified by the      model for the latent user features, and finds users having such
Classification Agent.                                               features. This is usually considered both an interesting and
                                                                    difficult task [28]. However, the activation functions used for
C. Security enforcement
                                                                    RBPNNs have to meet some important properties required to
   Suppose that a user is disposed toward a bad behaviour           preserve generalisation abilities and the decision boundaries
on the network, then the Classification Agent would associate       of Probabilistic Neural Networks (PNN) [29]. The selected
such a user with a category previously built by administrators,     RBPNN architecture takes advantage from both PNN topology
consisting of other misbehaving users. For building such a          and Radial Basis Neural Networks (RBNN) used in [30].
category, administrators would simply need to manually flag            In a RBPNN both the input and the first hidden layer exactly
some selected users, interacting with the Category Agent to         match the PNN architecture. In a PNN, each hidden layer
store these expert supervised associations.                         neuron performs the dot product of the input vector u by




                                                                    49
Proc. of the 16th Workshop “From Object to Agents” (WOA15)                                                June 17-19, Naples, Italy


a weight vector W(0) , and then gives output x(1) that is            variable could report if the user is male or female; then in case
provided to the following summation layer. While preserving          the profile does not state the gender, the latter feature has no
the PNN topology, to obtain the RBPNN capabilities, the              meaning and should not be considered. However, since our
activation function is a radial basis function (RBF). We name        dataset gives no labels, we can not exclude any feature.
f the chosen RBF, so the output of the first hidden layer for           Although data are anonymised, users are identified with a
the j-esime neuron is                                                unique ID. Moreover, the memberships of users to groups is
                                                                   indirectly identified from the list of subscribers to each group.
                    (1)        ||u − W(0) ||
                  xj , f                                                Data intended to be input for our RBPNN have been
                                     β                               passed to a preprocessing stage, whereby for each user the
where β is a parameter that controls the distribution shape.         corresponding feature list has been paired with the list of
   The second hidden layer in a RBPNN is identical to that of        group memberships. This enables us to build a statistically
a PNN, it just computes weighted sums of the values received         driven classifier that identifies the correspondence between
from the preceding neurons. The training for the output layer        user features and their groups.
is performed as in a classic RBNN, however since the number
of summation units is very small and in general remarkably                              VII. RBPNN FINDINGS
less than in usual RBNNs, training becomes simplified and               Both user profiles, consisting of features, and user member-
speed greatly increased.                                             ships to groups were provided to our RBPNN classifier during
   The devised topology enable us to distribute different parts      the training phase. Therefore, the RBPNN classifier has learnt
of the classification task to different layers (see Figure 2). The   how to reproduce the correct paths that associate lists of profile
first hidden layer of the RBPNN is responsible to perform            features with groups.
the fundamental task expected from a neural network, i.e.               Initially, we have asked our RBPNN to reconstruct the
generalise and build an implicit model. The second hidden            groups for 250 users. The RBPNN was able to correctly
layer selectively sums the output of the first hidden layer. The     assign users to the proper groups with only a 5.67% of
output layer fulfils the nonlinear mapping, such as classifica-      missing assignments: as a remarkable side effect while a
tion, approximation and prediction.                                  few groups were not found, no false positive was given (see
   In order to have a proper classification of the input dataset,    Figure 3). Moreover, if we compare the features for such
i.e. of users into categories, the size of the input layer matches   unclassified users and the average features of their groups,
the number NF of features, labelled elements of the dataset          relevant differences can be uncovered with respect to the
(see Section VI), given to the RBPNN, whereas the size of the        average (and correctly classified) user. Just for validation
RBF units matches the number of examined subscribers NS .            purposes, we have performed the same comparison for users
The number of units in the second hidden layer is equal to the       with an almost empty profile that the RBPNN could not insert
number of output units, these match the number of categories         into any category.
NG to be found for the subscribers.                                     Then, we have asked our RBPNN to identify categories for
                                                                     new users. In Figure 3 new users are reported in black or
                 VI. E XPERIMENTAL SETUP                             green and are assigned to a group they have not expressed
   Since the paramount importance of the classification com-         preferences in. For an appreciable percentage of users, i.e.
ponent in the proposed multi-agent solution, we have deeply          about 20%, the proposed RBPNN has indicated a group that
tested the performance of the conceived RBPNN classifier             (unknown to the RBPNN) users had membership to. Indeed, a
used by the Classification Agent. We used a dataset consist-         relevant number of the other 80% of user profiles is (almost)
ing of features, i.e. a trace of the user activities and their       empty, therefore no classifier, not only our RBPNN, would
preferences, coming from real Facebook profiles. Data for            manage. On the other hand, how many and which features
the features that we have been given have a label which is           suffice for a user to be classified depend on the model built
a numerical ID, i.e. the feature itself can not be recognised,       by the RBPNN (simply counting the number of empty features
however this does not affect the scope of this work nor the          is ineffective since they are not equally meaningful).
analysis performed.
   As far as the feature lists is concerned, data provide boolean                   VIII. C ONCLUDING R EMARKS
values. The presence or absence of a specific value is expressed        With the recent growth of social networks usage, a keen
as a boolean flag, e.g. 1 if the user has declared his job or 0 if   interest for privacy and deception has arisen. In [31], authors
no job information is given in the profile. Among such boolean       describe the results of an extensive comparison between two
values there are mutually exclusive values such as the gender,       important social networks such as Facebook and MySpace,
e.g. 1 if male or 0 if female.                                       showing that the interaction of trust and privacy concerns in
   The intrinsic structure of the dataset prevents us from           social networking sites is not yet understood to a sufficient
considering only a reduced portion of the feature list for a         degree. In [32], authors explore the preservation of privacy
user. A piece of information is usually largely spread over          and propose a novel method to avoid neighbourhood attacks.
a certain number of features, e.g. a boolean variable could          The authors show that anonymised data can be used to answer
express if the gender is stated or not, and only if stated another   aggregate queries accurately.




                                                                50
     Proc. of the 16th Workshop “From Object to Agents” (WOA15)                                                              June 17-19, Naples, Italy


                                                                            above solution would possibly be integrated with the servers
                                                                            handling user data, higher security levels could be achieved
                                                                            and the safety of the subscribers would be preserved, e.g. by
                                                                            timely warning administrator to intervene to check and stop
                                                                            autogenous threats.

                                                                                                   ACKNOWLEDGEMENTS
                                                                              This work has been partially supported by project PRISMA
                                                                            PON04a2 A/F funded by the Italian Ministry of University
                                                                            within PON 2007-2013 framework, and by project PRIME
                                                                            funded by the Italian Ministry of University and Research
                                                                            within POR FESR Sicilia 2007-2013 framework.

                                                                                                          R EFERENCES
                                                                             [1] C. Kiss, A. Scholz, and M. Bichler, “Evaluating centrality measures
                                                                                 in large call graphs,” in Proceedings of IEEE Enterprise Computing,
                                                                                 E-Commerce, and E-Services, 2006.
                                                                             [2] G. Cybenko, “Approximation by superpositions of a sigmoidal function,”
                                                                                 Mathematics of Control, Signals and Systems, vol. 2, no. 4, pp. 303–314,
                                                                                 1989.
                                                                             [3] G. Capizzi, F. Bonanno, and C. Napoli, “A new approach for lead-
                                                                                 acid batteries modeling by local cosine,” in Power Electronics Elec-
                                                                                 trical Drives Automation and Motion (SPEEDAM), 2010 International
                                                                                 Symposium on, pp. 1074–1079, IEEE, 2010.
                                                                             [4] M. T. Hagan, H. B. Demuth, M. H. Beale, et al., Neural network design.
                                                                                 Pws Pub. Boston, 1996.
                                                                             [5] F. Bonanno, G. Capizzi, A. Gagliano, and C. Napoli, “Optimal man-
                                                                                 agement of various renewable energy sources by a new forecasting
                                                                                 method,” in Power Electronics, Electrical Drives, Automation and
                                                                                 Motion (SPEEDAM), 2012 International Symposium on, pp. 934–940,
                                                                                 IEEE, 2012.
                                                                             [6] M. Woźniak, “On positioning traffic in nosql database systems by the use
                                                                                 of particle swarm algorithm,” in Proceedings of XV Workshop DAGLI
                                                                                 OGGETTI AGLI AGENTI - WOA’2014, vol. 1260, (25-26 September,
                                                                                 Catania, Italy), p. paper 5, CEUR Workshop Proceedings (CEUR-
                                                                                 WS.org), RWTH Aachen University, 2014.
                                                                             [7] C. Napoli, G. Pappalardo, E. Tramontana, Z. Marszałek, D. Połap,
                                                                                 and M. Woźniak, “Simplified firefly algorithm for 2d image key-points
                                                                                 search,” in 2014 IEEE Symposium on Computational Intelligence for
                                                                                 Human-like Intelligence, pp. 118–125, IEEE, 2014.
Fig. 3. Top: RBPNN assigned group memberships: correct findings are shown    [8] M. Woźniak and D. Połap, “On some aspects of genetic and evolu-
in black, whereas unfound ones are shown in red. Bottom: BPNN assignment         tionary methods for optimization purposes,” International Journal of
to groups for new users: legitimate memberships are in green.                    Electronics and Telecommunications, vol. 61, no. 1, pp. 7–16, 2015.
                                                                                 DOI: 10.1515/eletel-2015-0001.
                                                                             [9] M. Gabryel, M. Woźniak, and R. Damaševic̆ius, “An application of
                                                                                 differential evolution to positioning queueing systems,” Lecture Notes
   Other previous analyses of data concerning user profiling                     in Artificial Intelligence - ICAISC’2015, vol. 9120, pp. 379–390, 2015.
                                                                                 DOI: 10.1007/978-3-319-19369-4 34.
have taken into account the category of words appearing in                  [10] M. Woźniak, D. Połap, M. Gabryel, R. K. Nowicki, C. Napoli,
texts [33], as well as the user behaviour on-line. The latter                    and E. Tramontana, “Can we preprocess 2d images using artificial
solution has been oriented towards an improvement of replica                     bee colony?,” Lecture Notes in Artificial Intelligence - ICAISC’2015,
                                                                                 vol. 9119, pp. 660–671, 2015. DOI: 10.1007/978-3-319-19324-3 59.
spreading by considering user bandwidth and availability [34].              [11] F. Bonanno, G. Capizzi, and C. Napoli, “Some remarks on the appli-
Moreover, in [35], users have been profiled by observing                         cation of rnn and prnn for the charge-discharge simulation of advanced
their interactions with a workflow management system, in                         lithium-ions battery energy storage,” in Power Electronics, Electrical
                                                                                 Drives, Automation and Motion (SPEEDAM), 2012 International Sym-
a working scenario based on a public administration. All                         posium on, pp. 941–945, IEEE, 2012.
the above profiling strategies can be taken into account and                [12] F. Bonanno, G. Capizzi, S. Coco, C. Napoli, A. Laudani, and G. Lo Sci-
applied into an on-line social network environment for further                   uto, “Optimal thicknesses determination in a multilayer structure to
                                                                                 improve the spp efficiency for photovoltaic devices by an hybrid fem—
enriching the classification proposed above.                                     cascade neural network based approach,” in Power Electronics, Elec-
   We have proposed a multi-agent system for automatic                           trical Drives, Automation and Motion (SPEEDAM), 2014 International
                                                                                 Symposium on, pp. 355–362, IEEE, 2014.
analysis of data on a social network and have shown that                    [13] M. Woźniak, “Fitness function for evolutionary computation applied in
interesting results can be obtained in terms of the knowledge                    dynamic object simulation and positioning,” in IEEE SSCI 2014: 2014
on the behaviour of users. The proposed solution is based                        IEEE Symposium Series on Computational Intelligence - CIVTS 2014:
                                                                                 2014 IEEE Symposium on Computational Intelligence in Vehicles and
on RBPNN and finds for a user the most similar category                          Transportation Systems, Proceedings, (9-12 December, Orlando, Florida,
(or social network group) s/he could belong to. Once the                         USA), pp. 108–114, IEEE, 2014. DOI: 10.1109/CIVTS.2014.7009485.




                                                                            51
Proc. of the 16th Workshop “From Object to Agents” (WOA15)                       June 17-19, Naples, Italy


[14] F. Bonanno, G. Capizzi, and C. Napoli, “Hybrid neural networks
     architectures for soc and voltage prediction of new generation batteries
     storage,” in IEEE international conference on clean electrical power
     (ICCEP), pp. 341–344, 2011.
[15] C. Jones and E. H. Volpe, “Organizational identification: Extending our
     understanding of social identities through social networks,” Journal of
     Organizational Behavior, vol. 32, no. 3, pp. 413–434, 2011.
[16] C. Napoli, G. Pappalardo, and E. Tramontana, “A hybrid neuro-wavelet
     predictor for qos control and stability,” in Proceedings of AIxIA,
     vol. 8249 of LNCS, pp. 527–538, Springer, 2013.
[17] C. Napoli, G. Pappalardo, and E. Tramontana, “Using modularity metrics
     to assist move method refactoring of large systems,” in Proceedings
     of International Conference on Complex, Intelligent, and Software
     Intensive Systems (CISIS), pp. 529–534, IEEE, 2013.
[18] C. Napoli, G. Pappalardo, E. Tramontana, and G. Zappalà, “A cloud-
     distributed gpu architecture for pattern identification in segmented
     detectors big-data surveys,” The Computer Journal, p. bxu147, 2014.
[19] F. Bonanno, G. Capizzi, G. Lo Sciuto, C. Napoli, G. Pappalardo, and
     E. Tramontana, “A novel cloud-distributed toolbox for optimal energy
     dispatch management from renewables in igss by using wrnn predictors
     and gpu parallel solutions,” in Power Electronics, Electrical Drives,
     Automation and Motion (SPEEDAM), 2014 International Symposium
     on, pp. 1077–1084, IEEE, 2014.
[20] Y.-Y. Ahn, S. Han, H. Kwak, S. Moon, and H. Jeong, “Analysis of
     topological characteristics of huge online social networking services,”
     in Proceedings of World Wide Web, pp. 835–844, ACM, 2007.
[21] A.-L. Barabási, “Scale-free networks: a decade and beyond,” Science,
     vol. 325, no. 5939, pp. 412–413, 2009.
[22] M. Granovetter, “The Strength of Weak Ties,” The American Journal of
     Sociology, vol. 78, no. 6, pp. 1360–1380, 1973.
[23] S. Schnettler, “A structured overview of 50 years of small-world
     research,” Social Networks, vol. 31, pp. 165–178, July 2009.
[24] N. Schwartz, R. Cohen, D. ben Avraham, A.-L. Barabási, and S. Havlin,
     “Percolation in directed scale-free networks,” Phys. Rev. E, vol. 66,
     p. 015104, Jul 2002.
[25] M. McPherson, L. Smith-Lovin, and J. M. Cook, “Birds of a feather:
     Homophily in social networks,” Annual Review of Sociology, vol. 27,
     no. 1, pp. 415–444, 2001.
[26] K. Nowicki and T. A. B. Snijders, “Estimation and prediction for
     stochastic blockstructures,” Journal of the American Statistical Asso-
     ciation, vol. 96, no. 455, pp. 1077–1087, 2001.
[27] Z. Xu, V. Tresp, K. Yu, and H. peter Kriegel, “Infinite hidden relational
     models,” in Proceedings of Uncertainity in Artificial Intelligence (UAI),
     2006.
[28] D. Liben-Nowell and J. Kleinberg, “The link-prediction problem for
     social networks,” Journal of the American society for information
     science and technology, vol. 58, no. 7, pp. 1019–1031, 2007.
[29] S. O. Haykin, Neural networks and learning machines (3rd Edition),
     vol. 3. Prentice Hall, 2009.
[30] F. Bonanno, G. Capizzi, G. Graditi, C. Napoli, and G. Tina, “A
     radial basis function neural network based approach for the electrical
     characteristics estimation of a photovoltaic module,” Applied Energy,
     vol. 97, pp. 956–961, 2012.
[31] C. Dwyer, S. Hiltz, and K. Passerini, “Trust and privacy concern within
     social networking sites: A comparison of facebook and myspace,” in
     Proceedings of Americas Conference on Information Systems, pp. 339–
     351, 2007.
[32] B. Zhou and J. Pei, “Preserving privacy in social networks against
     neighborhood attacks,” in Proceedings of Data Engineering, IEEE, 2008.
[33] C. Napoli, G. Pappalardo, and E. Tramontana, “An agent-driven se-
     mantical identifier using radial basis neural networks and reinforcement
     learning,” in Proceedings of XV Workshop ”Dagli Oggetti agli Agenti”,
     vol. 1260, CEUR-WS, 2014.
[34] C. Napoli, G. Pappalardo, and E. Tramontana, “Improving files avail-
     ability for bittorrent using a diffusion model,” in Proceedings of Inter-
     national WETICE Conference, pp. 191–196, IEEE, 2014.
[35] G. Borowik, M. Wozniak, A. Fornaia, R. Giunta, C. Napoli, G. Pap-
     palardo, and E. Tramontana, “A software architecture assisting workflow
     executions on cloud resources,” International Journal of Electronics and
     Telecommunications, vol. 61, no. 1, pp. 17–23, 2015.




                                                                           52