 Research
 Open Access
When social computing meets soft computing: opportunities and insights
 Fei Hao^{1, 2},
 DooSoon Park^{3}Email author and
 Zheng Pei^{4}
https://doi.org/10.1186/s136730180131z
© The Author(s) 2018
 Received: 30 January 2018
 Accepted: 12 March 2018
 Published: 26 March 2018
Abstract
The characteristics of the massive social media data, diverse mobile sensing devices as well as the highly complex and dynamic user’s social behavioral patterns have led to the generation of huge amounts of high dimension, uncertain, imprecision and noisy data from social networks. Thanks to the emerging soft computing techniques which unlike the conventional hard computing. It is widely used for coping with the tolerant of imprecision, uncertainty, partial truth, and approximation. One of the most important and promising applications is social network analysis (SNA) that is the process of investigating social structures and relevant properties through the use of network and graph theories. This paper aims to survey various SNA approaches using soft computing techniques such as fuzzy logic, formal concept analysis, rough sets theory and soft set theory. In addition, the relevant software packages about SNA are clearly summarized.
Keywords
 Social computing
 Soft computing
 Fuzzy logic
 Formal concept analysis
 Rough sets
Introduction
Social media are computermediated tools that allow people to create, share or exchange information, ideas, pictures, audio or videos in virtual communities by using open Internet. Among online social networking services, there exist very interesting and challengeable research works on how to improve an efficient social media computing and how to make an effective social network analysis and mining from the perspectives of both academia and industry. Therefore, social computing, as a research discipline, is emerging for handling those kind of data generated from social media. Normally, various social computing related techniques include statistical approaches, graph based approaches and so forth. However, a human nature is present in the social networks. This implies that the social networks are humanlikefull of imprecise relations and connections between individuals, vague terms, groups and individuals with indefinite descriptions and characteristics of interests [1]. In order to better cope with these burning issues, advances on soft computing technologies, such as fuzzy set, formal concept analysis and rough set theories, probabilistic computing, as well as neural network and system, are paving a road to more valuable and feasible solutions to the emerging social media and big data, finally bringing a brilliant future of wisdom and intelligent social media network. This survey will be carried out for SNA from following various aspects, i.e., network representation, reputation/position analysis of users, social relationships characterization, topological structure analysis, social data analysis.
This paper is structured as follows: “Social computing” section overviews the main stream soft computing techniques; Then, a comprehensive taxonomy and its soft computing techniques based SNA approaches are presented in “Soft computing” section. Finally, “When social computing meets soft computing” section concludes this paper by presenting general remarks regarding the current stage of the research and a brief analysis of future perspectives.
Social computing
This section will present the basic definition of social computing as well as the potential applications.
Definition of social computing
The terminology of social computing was firstly proposed in 1994. However, there are various definitions for social computing. Schuler [2] pointed out that social computing can be any type of computing application that uses software as a medium or focus of social relations. Therefore, his opinion emphasized the importance of social softwares. Dryer et al. [3] stated that social computing is the interplay between persons, social behaviors, and interactions with computing technologies, its design model focuses on the reciprocal interaction of the system design, human behavior, social contribution and interaction results in the mobile computing system. Wang et al. [4, 5] provided the definition of social computing in the narrow/broad sense. Broadly speaking, social computing refers to the computational theory and method for social sciences. Narrowly speaking, social computing is a computational theory and method for social activities, social processes, social structures, social organizations and their functions and effects.
Research fields of social computing
Social computing is not only a technique but also a social phenomena. Basically, social computing has two main research trends: (1) social scienceoriented social computing; (2) applicationoriented social computing. And, these two research trends influence each other.
Social scienceoriented social computing
Social scienceoriented social computing is composed of social networks analysis and computational social science. First, social network analysis mainly covers the topics on social flows, healthcare, key nodes mining for disease dissemination, communities detection and so forth. The approaches about social network analysis are mainly categorized as: agentbased model, theoretical physics approach, and graph theory. Milgram et al. [6] and Watts et al. [7] pioneered the research on smallworld. Based on their work, Barabasi et al. [8] found the connection between nodes followed the powerlaw distribution. In addition, there are other significant research achievements, such as strong and weak ties [9], structural holes [10], and information cascades [11], etc. Second, computational social science is a crossdiscipline among systems science, control science, and complex science. It mainly focuses on the research on social simulation and social system modeling by using equation based modeling and computational modeling [12]. Technically, data mining as a key technology for computational social science, is to discover the interesting and useful patterns from massive data by using machine learning approaches.
Applicationoriented social computing
Applicationoriented social computing refers to a type of particular application which incorporating the methodologies and technologies about social computing, such as communities, social network, social phycology. Applicationoriented social computing experienced three phases: group software, social software and social media [13]. Group software was proposed in 1970s, and it was used in many research institutes. The essence of group software is a collaborative technology with the aim of supporting the interactions collaboratively. For example, computer supported cooperative work and computer supported collaborative learning are two classic group software applications. In 2005, as the rapid development of Web 2.0 [14], social media is emerging. Social media emphasizes the active interaction from users, users can complete the social interactions by generating, consuming the contents over the social media. Recently, the wide usage of ubiquitous devices, such as mobile phones and smart devices, the mobile social media [15–17] attracts much attention from academia and industry.
Soft computing
Fuzzy logic
Fuzzy logic (FL), a commonly used soft computing approach, provides a simple way to get a definite conclusion based upon vague, ambiguous, imprecise, noisy or missing information of inputs. The working principle of FL is to process the data by allowing partial set membership rather than crisp set membership or nonmembership. Fuzzy expert system consists of fuzzification unit that converts crisp values into fuzzified input [25]. It consists of inference engine that contains if then else rules and a defuzzification unit to convert the result in a readable form. FL incorporates fuzzy rule based IF X AND Y THEN Z inference approach to solve problem rather than attempting to model a system mathematically. For example, fuzzy inference engine can be used for obtaining the trust relationship between mobile users in mobile social networks [26].
Formal concept analysis
Formal concept analysis (FCA) [27] is a typical computational intelligence technique for data analysis. FCA defines formal concepts to represent the relationships between objects and attributes in a domain. The objects and attributes are grouped into formal concepts, and then a conceptual hierarchy of all formal concepts (also called as formal concept lattice) can be constructed, which is a complete lattice. Therefore, giving a formal context, FCA can derive all formal concepts from this context and construct their formal concept lattice. Formally, relations of subsets of objects as well as attributes can be analyzed in the formal concept lattice, in addition, conceptual hierarchy provide information to order them according to a subconcept–superconcept relation [28, 29].
Rough set theory
Rough sets theory (RST) [30–32] has been widely used for processing the incomplete and uncertain information. Recent years have witnessed the ubiquitous applications of RST in machine learning, data mining, and decision support analysis fields. Theoretically, RST provides a useful method to understand unkownledge by using knowledge base, in fact, when the available information is not enough to determine the exact value of a given set, lower and upper approximations in RST can be used for the representation of this set. The approximation synthesis of concepts from the acquired data is the main objective of the rough set analysis [33]. In real world practices, if a subset is difficult to define a concept in a given knowledge base, then rough sets can “approximate” the subset with respect to the knowledge base.
Soft set theory
The soft set theory [34, 35] is used as a general mathematical tool for dealing with uncertainty. It is proved that soft set is the generalization of the fuzzy set [36], also a topological space \((X, \tau )\) can be represented by soft set. Up to now, many operations and applications of soft sets have been provided [37, 38]. Soft set, as efficient uncertain information processing mathematical methodology, is used to help us for finding the optimized solution under the uncertain environment. It can easily characterize the incomplete and uncertain information from the parameterization point of view, especially for the inconsistency and incompleteness of the uncertain information.
When social computing meets soft computing
The rest of this section will provide the comprehensive survey on soft computing techniques (FL, FCA, RST) based social networks analysis from the aspects of structural analysis, social data analysis and social interaction analysis.
Representation of social networks
Social network is often modeled with a graph (sometimes an adjacency matrix) where the nodes indicating the individuals and edges indicating the relationships between the individuals. Most literatures considers the social relationships are binary value, i.e., 0 or 1. As a matter of fact, the social relationships between individuals are very complex and dynamic under different context, thus there exist much uncertainty or vagueness in social networks.
Fuzzy logic based representation approach
FCA based representation approach
Based on this representation approach, Hao et al. [51] first studied the kbalanced trusted cliques detection in signed social networks [23]. Further, they investigated the kclique communities detection in social networks [29]. In both works [29] and [51], the authors initially converted the given social network into a formal context and then constructed the corresponding concept lattice. Finally, the important findings on equivalence between the equiconcepts and cliques are proved. In addition, Dorflein [52] stated and proved that the basic theorem on coherence networks of concept lattices as an extension of the basic theorem on concept lattices.
Positional analysis
In social networks, the major purpose of positional analysis is to find similarities between individuals of a social network. One of the widely studied notions in the positional analysis of social networks is regular equivalence [53, 54]. As fuzzy social networks have received considerable attention, a regular equivalence to fuzzy social networks is generalized [42]. Based on FL, Portmann et al. [54] introduced a framework FORA to gain deeper insights into an organizations online reputation. Kudelka et al. [55] proposed a hybrid approach where the FCA is used for finding author’s profiles based on keywords and fuzzy rules to learn the properties of the authors and to enhance the set of experts. Expert or influential people identification is an important task in social network positional analysis [56]. Kudelka et al. [54] introduced a new soft computing method for expert identification in social networks based on formal concept analysis and fuzzy rules. They proposed a hybrid approach where the formal concept analysis is used for finding author’s profiles based on keywords and fuzzy rules to learn the properties of the authors and to enhance the set of experts.
Topological structure analysis
FLbased topological structure mining
The problem of fuzzy community detection in networks was early studied in [57, 58], it allows each vertex of the graph to belong to multiple communities at the same time, determined by exact numerical membership degrees, even in the presence of uncertainty in the data being analyzed. Golsefid et al. [59] proposed a fuzzy clustering model for detecting overlapping communities in complex networks. Their proposed model was developed based on the CPM clustering model [60] and assigns each node to each cluster by degree of belonging over an interval [0,1]. Therefore, instead of one node belonging to exactly one cluster, it can belong to more than one cluster, and associated with each node was a set of membership levels. Davis et al. [46] attempted to identify fuzzy overlapping groups in social networks using stochastic model. They modeled the fuzzy overlapping group detection as an optimization problem. In summary, the ideas of these approaches are based on fuzzy membership function which is defined for the connections for one node to other communities.
FCAbased topological structure mining
Rome et al. [61] observed that the web subgraph can be viewed as a formal context and that web communities can be modeled by formal concepts. They utilized FCA to explore the community structure of the Web graph. Hao et al. [29] detected the kbalanced trusted cliques from signed social networks based on FCA. Further, Hao et al. [51] proposed a novel algorithm for mining the kclique and kclique communities based on FCA. They proved that all Equiconcepts^{1} appearing in formal concept lattice of social network exactly match the cliques in social networks and also proved that the kclique communities detection problem is equivalent to finding the kintent Equiconcepts in the concept lattice of a social network. To reduce the high repetition rate between communitycores and isolated community, Fu et al. [62] presented an algorithm for detecting Blog community based on FCA. Initially, concept lattice was built from linkage relations between Blogs, then clusters were divided from the lattice based on equivalence relation, finally communities were clustered in each cluster based on the similarity of concepts [63, 64]. Ali et al. [65] investigated the community detection based on FCA, their approach take the formal context of the given social network, and determine the partial communities. Then, the ignored nodes are reassigned to the communities by maximizing GroupNode modularity function. Aiming to address the cliques discovery from big graph, our recent work [66] adopted the formal concept analysis techniques and proposed a novel framework, called “cSketch” for identifying the cliques from big graphs. This framework takes the graph stream as the initial input, and summarizes the original graph stream into the sketched graph by using Hashing function over the vertices; Based on the obtained sketched graph, formal concept analysis is utilized for mining the cliques from it. The resulting cliques is approximate to the cliques appearing in the original graph. Ref. [67] exploited the formation principle of maximal cliques in social networks based on formal concept analysis. The authors proposed a FCAbased approach for detecting the bases of maximal cliques and detection theorem. Their work provides a new research solution and direction for future topological structure analysis in various complex networking systems. Hao et al. [68] pioneered a novel approach for similarity evaluation between graphs based on FCA. The feature of this approach is able to characterize the relationships between nodes and further reveal the similarity between graphs. Therefore, the highlight of their proposed approach is to take vertices and edges into account simultaneously. Thus, the measuring accuracy for graph matching can be improved.
Overall, FCAbased topological structure mining is conducted based on the equivalence relation between equiconcepts and topological structures. These approaches are not dependent on the mathematical model, but also not dependent on the heuristics. Hence, this kind of approach provides a novel points for mining the topological structure from social networks.
RSTbased topological structure mining
Regarding to this research branch, RST is often integrated with other traditional clustering algorithms in order to improve the detection performance of community discovery [69, 70]. Wang et al. [69] considered the difficulty of determining the value of K, and the relations among the cluster object or community node and the community. To overcome this disadvantage, they devised a community finding algorithm by incorporating the RST and kmean clustering algorithm. Their proposed method is mainly used to find overlapping communities, and it can multianglely reflect the social network information better. In addition, our previous work [71] proposed rough kclique theory that relaxes the conventional kclique by using the newly defined upper/lower vertices approximation that are used for describing the boundary of the given subgraph. Therefore, the topological structure of any given subgraph can be characterized by the virtue of rough kclique theory.
Social web mining
Social web mining, a specific web mining procedure over social media, may help to collect knowledge from the communities, hyperlink references, opinion graphs and most liked information. Thus, social web mining is a efficient way for discovering useful knowledge and extracting social intelligence from the web log data obtained from open source websites that are available on the web [72]. Social media web sites personalization is the procedure of modifying the content and structure of a web site to the precise requirements of each user taking benefit of the user’s directional behavior. The main phases of the web personalization comprises of: (1) the collection of web data; (2) the preprocessing phase of these data; (3) the analysis of the collected data and (4) the purpose of the actions that should be performed. The log files are collected from the proxy server log. The gathered data are undergoing a preprocessing phase to remove the unwanted and noisy information. The web directories are discovered based on the user and session clustering. For grouping the user and session, the Neuro Fuzzy Clustering Approach (NFCA) is applied [19]. Additionally, Ant Colony Optimization (ACO), as an advanced soft computing methodology, is used for social web mining. Ahmad et al. [73] presented an ACO based approach for expert identification and query routing in social networks. Kwon et al. [74] proposed a novel method for sentiment trend analysis using ACO algorithm and SentiWordNet. They first collected social data in the form of Resource Description Framework (RDF) triples, and then used ACO algorithm to digitized the amassed RDF triples. Using ACO algorithm, the pheromone values were computed to extract the trends of the user’s sentiments with the modified equations. Next, the user’s sentiment scores were evaluated for the computed pheromone values with respect to the sentiment words with SentiWordNet. Finally, they analyzed the sentiment trend of the online user by time.
Social data analysis
Soft computing techniques based SNA provides several new social data analysis solutions for social networking services, such as folksonomy mining [75], tag recommendation, social marketing [76], social recommendation and sentiment analysis [77]. Jaschke et al. [78] proposed an algorithm for mining iceberg trilattices for mining the frequent triconcepts. Hao et al. [79] proposed an approach of variable precision concept [80] based extended conceptual knowledge discovery in folksonomy for tag recommendation and resource suggestion. Based on FCA, [26] presented a novel approach for tag recommendation based on users’ interest lattice matching (UILM). UILM constructs the users’ interest lattice according to users’ interest context extracted from tagging data. Lattice matching is then proposed and applied to obtain the users that are similar to the current user. Zhang et al. [81] studied the friends recommendation in social network. Basically, FCA is applied to analyzing the binary relation between users and terms of microblogs text. Then, a concept lattice was constructed to store the knowledge context based on the relationship among users and terms for assisting recommendation. By calculating the concept similarity and matching visited candidate users with the constructed concept lattice, the followee can be recommend in terms of these similarity. Recently, sentiment analysis, as an emerging topic, is becoming more and more important in social networks. Mukkamala et al. [82] presented an integrated modeling approach for analysis of social data with the sentiment analysis based on the FL. Trung et al. [55] proposed a fuzzy propagation modeling for opinion mining by sentiment analysis of online social networks. Further, a practical system named TweetScope, has been implemented to efficiently collect and analyze all possible tweets from customers. Considering the vague sentiment words in social networks, for example, the “excellent” and “good” are both expressed with positive sentiment, however, the positive degree of both words are not the same. To address this problem, Jusoh et al. [83] introduced the use of a fuzzy lexicon and fuzzy sets in deciding the degree of positive and negative. Regarding to the data sparse and information overload issues, Hao et al. [38] proposed a soft setbased recommendation model and devised the corresponding algorithm. Their approach is easier for implementation and recommendation; Besides, their approach not only recommend the items, but also make the feedback regarding to the results. Thus, there is no data sparse issue. Therefore, it is believed that the proposed approach can be applied into many other potential recommendation systems.
Human mobility analysis is another interesting research topic. Considering the human movement data including high levels of uncertainty and noise. Soft computing owns the necessary characteristics to extract accurate mobility models [84]. Proposed a novel approach to extract personal mobility patterns by means of the fuzzy cmeans (FCM) algorithm. Their achievements will help to comprehensively capture and understand the movement of people in large spatial regions.
Medicine and healthcare services
The rapid development of ICT industrials is facilitating the advancement of medicine and healthcare. Particularly, healthcare has been promoted to an important social issue related to people’s work and study. This past decade has witnessed the dramatic development of modern medical technologies by virtue of the wireless internet, the Internet of Things, and other ubiquitous technologies [85]. This section is devoted to overviewing the related literatures on soft computingbased social network analysis in medicine/healthcare services. Hao et al. [85] firstly represented the medical treatment data as an 3order tensor that includes three dimensions of the objective, treatment phase, and treatment plan. Each element in this constructed tensor indicates an evaluation. Based on this representation model, a threedimensional fuzzy evaluation model for selecting the sustainable medical treatment plan is further devised. In order to obtain a sustainable treatment plan, the membership functions for various evaluation linguistic terms are established. Then, a vertical aggregation was carried out (i.e., the degrees of membership are aggregated from the dimension of treatment phase), and then the overall degrees of membership were aggregated by a linear aggregation formula (i.e., horizontal aggregation). As we all known, medicine functions exploration is a challenge issue, a traditional clinic medical approach is to test it in both animal and human. Unfortunately, it usually consume a long time for identifying the functions of the medicine. To cope with this issue, Hao et al. [68] evaluated the similarity between the targeted graph (since the molecular structure of the targeted medicine can be modeled as a graph) and the graphs (i.e., other existing medicines) in the database via roughk cliques theory which is a novel soft computing methodology [71]. Recently, the dramatic explosion of huge number of heterogeneous medical data in smart healthcare, is leading to many difficulties on both obtaining the intelligence, cognition and natural interactions between doctors and patients. Considering these challenges [86], proposed a big medical data cognitive system with the proposed methodology that is nary formal concept analysis. The unique features of this cognitive system include efficient big data representation, highquality data associations, and natural semantics interpretation among dimensions.
Relevant softwares for social computing
This section lists the softwares for social network analysis [87–90]. Then, several specific softwares for social network analysis based on soft computing are presented as well.
Software packages for social network analysis
No  General software packages  Specialized software packages 

Type  Academic/free  Academic/free 
1  Agna Applied graph and network analysis  Blanche Network dynamics 
2  DyNet (SE and LS) [91] Datadriven visualizations  CIDABM Competing idea diffusion agent based model 
3  GUESS The graph exploration system  CFinder [92] Finding and visualizing dense groups 
4  Pajek [93] Program for large network analysis  Commetrix [94] Dynamic network visualization and analysis 
5  NodeXL [95]: viewing and analyzing network graphs  PGRAPH [96]: Kinship networks 
6  igraph (R, Python, C) [97] Creating and manipulating graphs  SONIVIS Analyzing and visualizing virtual information space 
7  NetVis [98]: dynamic visualization of social networks  ENet [99]: EgoNETwork analysis 
8  ORA [100]: dynamic network analysis  EgoNet [101]: egocentric networks 
9  SocNetV: social networks visualiser  KeyPlayer [102]: identifying nodes 
10  UCINET 6 [103] Comprehensive social network analysis software  KliqFinder: cohesive subgroups 
11  visone: analyis and visualization of social networks  Network genie: network surveys 
12  JUNG (Java): Java Universal Network/graph framework  PNet: exponential random graph models (ERGMs) 
13  libSNA (Python) Opensource library for social network analysis  SONIVIS Analyzing and visualizing virtual information spaces 
14  NetworkX (Python) [104]: package for complex networks  StOCNET [105]: statistical analysis 
Visualization softwares for social networks analysis
No  Software name  Descriptions 

1  aiSee [106]  Graph visualization 
2  Apache Agora [107]  Visualizing virtual communities 
3  Cytoscape [108]  Visualizing molecular interaction networks 
4  Gephi [109]  Visualization and exploration platform 
5  Graphviz [110]  Graph visualization 
6  KrackPlot [111]  Social network visualization program 

Context construction A given social network g, modeled as a graph as shown in Fig. 7. By using the construction approach [29], the formal contexts (as shown in Fig. 8) are easily obtained as follows.

Concept lattice building According to the formal concept lattice generation algorithm presented in [29], the formal concept lattices of the given graph g is shown in Fig. 9.

Social computing issues In this step, we can execute the topological structure mining and analysis based on the above extracted formal concepts. For example, our previous work [29] has proved that the equivalence relation between the equiconcepts and cliques. With this relation, we can extract the kcliques, kclique communities from social networks. Interestingly, the locationfocused communities detection and evolutionary can be accomplished by observing the changing patterns of mtriadic concepts [113]. In field of graph matching, the formal concepts are regarded as the main features of the graphs for further evaluating the similarity between graphs [68].
Conclusions
As the scale of social media and number of users are rapidly increasing, social network analysis (SNA) has become an important tool for experts and researchers in social computing. Specially, the necessary information is often distributed and hidden on social site servers, so there is an urgent demand for designing some new approaches for collection and analysis the social network. Soft computing methodologies like fuzzy sets, neural networks, genetic algorithms, rough sets, soft sets and their hybridizations, have recently been widely utilized to solve data mining problems. They strive to provide approximate solutions at low cost, thereby speeding up the process. In this paper, we firstly answered what happening when social computing meets soft computing. Then, we discussed the stateofart on various soft computing techniques those are used for social networks analysis. It is believed that this paper can provide more insights for researchers from the both social computing and soft computing fields.
Declarations
Authors’ contributions
FH collected, reviewed and classified main literature for the paper, and also completed the writing of this work. DSP identified the insights of this work, especially the soft computing based social computing techniques in ubiquitous healthcare. ZP improved the part of soft computing techniques survey and presentation. All authors read and approved the final manuscript.
Acknowledgements
This research was supported by the National Natural Science Foundation of China (Grant Nos. 61702317, 61372187) and MSIP (Ministry of Science, ICT and Future Planning), Korea, under the ITRC (Information Technology Research Center) support program (IITP20172014000720) supervised by the IITP (Institute for Information & Communications Technology Promotion) and the National Research Foundation of Korea (No. NRF2017R1A2B1008421) and was also supported by the Fundamental Research Funds for the Central Universities (GK201703059, GK201802013), and Fund Program for the Scientific Activities of Selected Returned Overseas Professionals in Shaanxi Province (Grant No. 2017024).
Competing interests
The authors declare that they have no competing interests.
Ethics approval and consent to participate
Not applicable.
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Open AccessThis article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
Authors’ Affiliations
References
 Zadeh LA, Abbasov AM, Shahbazova SN (2015) Fuzzybased techniques in humanlike processing of social network data. Int J Uncertain Fuzziness Knowl Based Syst 23(Suppl. 1):1–14View ArticleGoogle Scholar
 Schuler D (1994) Social computing. Commun ACM 37(1):28–29View ArticleGoogle Scholar
 Dryer DC, Eisbach C, Ark WS (1999) At what cost pervasive? A social computing view of mobile computing systems. IBM Syst J 38(4):652–676View ArticleGoogle Scholar
 Wang FY (2007) Toward a paradigm shift in social computing: the ACP approach. IEEE Intell Syst 22(5):65–67View ArticleGoogle Scholar
 Wang FY, Carley KM, Zeng D, Mao W (2007) Social computing: from social informatics to social intelligence. IEEE Intell Syst 22(2):79–83View ArticleGoogle Scholar
 Milgram S (1967) The smallworld problem. Psychol Today 1(1):61–67Google Scholar
 Watts DJ, Strogatz SH (1998) Collective dynamics of “smallworld” networks. Nature 393:440–442View ArticleMATHGoogle Scholar
 Barabasi AL, Bonabeau E (2003) Scalefree networks. Sci Am 288(5):50–59View ArticleGoogle Scholar
 Granovetter M (1973) The strength of weak ties. Am J Sociol 78(6):1360–1380View ArticleGoogle Scholar
 Zhang E, Wang G, Gao K, Zhao X, Zhang Y (2013) Generalized structural holes finding algorithm by bisection in social communities. In: Sixth international conference on genetic and evolutionary computing. pp 276–279Google Scholar
 Liu Q, Zhang L (2016) Information cascades in online reading: an empirical investigation of panel data. J Imaging Sci Technol 55(4):60504–1605048Google Scholar
 Halpin B (1999) Simulation in sociology. Am Behav Sci 42(10):1488–1508Google Scholar
 Lugano G (2013) Social computing: a classification of existing paradigms. In: Privacy, security, risk and trust. pp 377–382Google Scholar
 O’Reilly T (2007) What is web 2.0: design patterns and business models for the next generation of software. Mpra Paper 97(7):253–259Google Scholar
 Su Z, Xu Q, Qi Q (2016) Big data in mobile social networks: a qoeoriented framework. IEEE Netw 30(1):52–57View ArticleGoogle Scholar
 Hao F, Min G, Lin M, Luo C, Yang LT (2014) MobiFuzzyTrust: an efficient fuzzy trust inference mechanism in mobile social networks. IEEE Trans Parallel Distrib Syst 25(11):2944–2955View ArticleGoogle Scholar
 Choi S (2016) Understanding people with human activities and social interactions for humancentered computing. Hum Centric Comput Inf Sci 6(1):9View ArticleGoogle Scholar
 Shamshirband S, Gocic M, Petkovic D, Saboohi H, Herawan T, Kiah MLM, Akib S (2015) Softcomputing methodologies for precipitation estimation: a case study. IEEE J Sel Top Appl Earth Obs Remote Sens 8(3):1353–1358Google Scholar
 Shan F, Sharma MK (2017) Study for social media mining methods with soft computing. Int J Emerg Technol 8(1):1–4View ArticleGoogle Scholar
 Dong S, Su H, Shi P, Lu R, Wu ZG (2017) Filtering for discretetime switched fuzzy systems with quantization. IEEE Trans Fuzzy Syst 25(6):1616–1628View ArticleGoogle Scholar
 Feng Z, Zheng WX, Wu L (2017) Reachable set estimation of T–S fuzzy systems with timevarying delay. IEEE Trans Fuzzy Syst 25(4):878–891View ArticleGoogle Scholar
 Revay P, CioffiRevilla C (2018) Survey of evolutionary computation methods in social agentbased modeling studies. J Comput Soc Sci 1(1):115–146View ArticleGoogle Scholar
 Friedrich T, Neumann F (2017) What’s hot in evolutionary computation. AAAI, Menlo Park, pp 5064–5066Google Scholar
 Paradarami TK, Bastian ND, Wightman JL (2017) A hybrid recommender system using artificial neural networks. Expert Syst Appl 83:300–313View ArticleGoogle Scholar
 Douven I (2015) Review of r. belohlavek and g. klir (eds). Concepts and fuzzy logic (MIT Press, 2011). Studia Logica 102Google Scholar
 Hao F, Zhong S (2010) Tag recommendation based on user interest lattice matching. In: IEEE international conference on computer science and information technology. pp 276–280Google Scholar
 Ganter B, Wille R (1996) Formal concept analysis. Wissenschaftliche ZeitschriftTechnischen Universitat Dresden 45:8–13MATHGoogle Scholar
 Poelmans J, Elzinga P, Viaene S, Dedene G (2010) Formal concept analysis in knowledge discovery: a survey. In: International conference on conceptual structures: from information to intelligence. pp 139–153Google Scholar
 Hao F, Min G, Pei Z, Park DS, Yang LT (2017) \(k\)clique community detection in social networks based on formal concept analysis. IEEE Syst J 11(1):250–259View ArticleGoogle Scholar
 Pawlak Z (1982) Rough sets. Int J Comput Inf Sci 11(5):341–356View ArticleMATHGoogle Scholar
 Pawlak Z, Skowron A (2007) Rudiments of rough sets. Inf Sci 177(1):3–27MathSciNetView ArticleMATHGoogle Scholar
 Pawlak Z (1998) Rough set theory and its applications to data analysis. J Cybern 29(7):661–688MATHGoogle Scholar
 Zhou Q, Yongsheng LI, Yin C, Jingui LU (2003) Application of rough set theory in data mining. J Nanjing Univ Tech 25(2):44–48Google Scholar
 Molodtsov D (1999) Soft set theoryfirst results. Comput Math Appl 37(4–5):19–31MathSciNetView ArticleMATHGoogle Scholar
 Molodtsov DA, Leonov VY, Kovkov DV (2006) Soft sets technique and its application. Neuron 44(1):59–73MATHGoogle Scholar
 Zadeh LA (1965) Fuzzy sets. Inf Control 8(3):338–353View ArticleMATHGoogle Scholar
 Feng F, Li Y, LeoreanuFotea V (2010) Application of level soft sets in decision making based on intervalvalued fuzzy soft sets. Comput Math Appl 60(6):1756–1767MathSciNetView ArticleMATHGoogle Scholar
 Fei H, Zheng P, Park DS, Phonexay V, Seo HS (2017) Mobile cloud services recommendation: a soft setbased approach. J Ambient Intell Humaniz Comput 9:1–9Google Scholar
 Yager RR (2008) Intelligent social network analysis using granular computing. Int J Intell Syst 23(11):1197–1219View ArticleMATHGoogle Scholar
 Yager RR (2010) Concept representation and database structures in fuzzy social relational networks. IEEE Trans Syst Man Cybern Part A Syst Hum 40(2):413–419View ArticleGoogle Scholar
 Nair PS, Sarasamma ST (2007) Data mining through fuzzy social network analysis. In: Fuzzy information processing society. Nafips’07 meeting of the North American. pp 251–255Google Scholar
 Fan TF, Liau CJ, Lin TY (2007) Positional analysis in fuzzy social networks. In: GRC, p 423Google Scholar
 Fan TF, Liau CJ, Lin TY (2008) A theoretical investigation of regular equivalences for fuzzy graphs. Int J Approx Reason 49(3):678–688MathSciNetView ArticleMATHGoogle Scholar
 Newman MEJ (2004) Analysis of weighted networks. Phys Rev E Stat Nonlin Soft Matter Phys 70(5 Pt 2):056131View ArticleGoogle Scholar
 Brunelli M, Fedrizzi M (2009) A fuzzy approach to social network analysis. In: Social network analysis and mining. ASONAM’09. International conference on advances. pp 225–230Google Scholar
 Davis GB, Carley KM (2008) Clearing the fog: fuzzy, overlapping groups for social networks. Soc Netw 30(3):201–212View ArticleGoogle Scholar
 Ciric M, Bogdanovic S (2010) Fuzzy social network analysis. pp 179–190Google Scholar
 Zadeh LA (2002) Fuzzy logic = computing with words. IEEE Trans Fuzzy Syst 4(2):103–111View ArticleGoogle Scholar
 Li CC, Dong Y, Herrera F, HerreraViedma E, Martínez L (2017) Personalized individual semantics in computing with words for supporting linguistic group decision making. An application on consensus reaching. Inf Fusion 33:29–40View ArticleGoogle Scholar
 Snasel V, Horak Z, Kocibova J, Abraham A (2009) Analyzing social networks using FCA: complexity aspects. In: IEEE/WIC/ACM international joint conferences on web intelligence and intelligent agent technologies. WIIAT, pp 38–41Google Scholar
 Hao F, Yau SS, Min G, Yang LT (2014) Detecting kbalanced trusted cliques in signed social networks. IEEE Internet Comput 18(2):24–31View ArticleGoogle Scholar
 Dörflein SK, Wille R (2005) Coherence networks of concept lattices: the basic theorem. In: International conference on formal concept analysis. Springer, Berlin, pp 344–359Google Scholar
 Borgatti SP, Everett MG (1989) The class of all regular equivalences: algebraic structure and computation. Soc Netw 11(1):65–88MathSciNetView ArticleGoogle Scholar
 Kudelka M, Radvansky M, Horak Z, Krome P, Snasel V (2012) Soft identification of experts in DBLP using FCA and fuzzy rules. In: IEEE international conference on systems, man, and cybernetics. pp 1942–1947Google Scholar
 Trung DN, Jung JJ (2014) Sentiment analysis based on fuzzy propagation in online social networks: a case study on TweetScope. Comput Sci Inf Syst 11(1):215–228View ArticleGoogle Scholar
 Zia MA, Zhang Z, Chen L, Ahmad H, Su S (2017) Identifying influential people based on interaction strength. J Inf Process Syst 13(4):987–999Google Scholar
 Nepusz T, Petroczi A, Negyessy L, Bazso F (2008) Fuzzy communities and the concept of bridgeness in complex networks. Phys Rev E Stat Nonlin Soft Matter Phys 77(2):016107MathSciNetView ArticleGoogle Scholar
 Zhang S, Wang RS, Zhang XS (2007) Uncovering fuzzy community structure in complex networks. Phys Rev E Stat Nonlin Soft Matter Phys 76(2):046103View ArticleGoogle Scholar
 Golsefid SMM, Zarandi MHF, Bastani S (2015) Fuzzy community detection model in social networks. Int J Intell Syst 30(12):1227–1244View ArticleGoogle Scholar
 Gregori E, Lenzini L, Mainardi S (2013) Parallel kclique community detection on largescale networks. IEEE Trans Parallel Distrib Syst 24(8):1651–1660View ArticleGoogle Scholar
 Rome JE, Haralick RM (2005) Towards a formal concept analysis approach to exploring communities on the world wide web. In: International conference on formal concept analysis. Springer, Berlin, pp 33–48Google Scholar
 Fu Y, Cui Z (2014) Research of blog community detection based on FCA. Int J Data Min Intell Inf Technol Appl 4(1):26Google Scholar
 Formica A (2006) Ontologybased concept similarity in formal concept analysis. Inf Sci 176(18):2624–2641MathSciNetView ArticleMATHGoogle Scholar
 Formica A (2008) Concept similarity in formal concept analysis: an information content approach. Knowl Based Syst 21(1):80–87MathSciNetView ArticleGoogle Scholar
 Ali SS, Bentayeb F, Missaoui R, Boussaid O (2014) An efficient method for community detection based on formal concept analysis. In: International symposium on methodologies for intelligent systems. pp 61–72Google Scholar
 Hao F, Park DS (2017) csketch: a novel framework for capturing cliques from big graph. J Supercomput 1:1–13Google Scholar
 Hao F, Park DS, Pei Z (2017) Exploiting the formation of maximal cliques in social networks. Symmetry 9(7):100MathSciNetView ArticleGoogle Scholar
 Hao F, Sim DS, Park DS, Seo HS (2017) Similarity evaluation between graphs: a formal concept analysis approach. J Inf Process Syst 13(5):1158–1167Google Scholar
 Wang Z, Wang Z (2012) Research in social network based on rough set clustering algorithm. Int J Adv Comput Technol 4(15):295–301Google Scholar
 Mitra A, Padhi P (2012) On application of rough set and neighborhood theory in social network. Int J Recent Trends Eng Technol 7(3):38Google Scholar
 Hao F, Park DS, Shao Y (2016) A novel methodology on characterizing topological structure from complex networks. Adv Sci Lett 22(9):2404–2408View ArticleGoogle Scholar
 Cooley RW, Srivastava J (2000) Web usage mining: discovery and application of interesting patterns from web data. University of Minnesota, MinneapolisGoogle Scholar
 Ahmad MA, Srivastava J (2008) An ant colony optimization approach to expert identification in social networks. Springer, BostonView ArticleGoogle Scholar
 Kwon K, Jeon Y, Cho C, Seo J, Chung IJ, Park H (2017) Sentiment trend analysis in social web environments. In: IEEE international conference on big data and smart computingGoogle Scholar
 Hotho A (2006) BibSonomy: a social bookmark and publication sharing system. In: Conceptual structures tool interoperability workshop at the international conference on conceptual structures. pp 87–102Google Scholar
 Ho CW, Wang YB (2015) Repurchase intentions and virtual customer relationships on social media brand community. Hum Centric Comput Inf Sci 5(1):18View ArticleGoogle Scholar
 Singh J, Singh G, Singh R (2017) Optimization of sentiment analysis using machine learning classifiers. Hum Centric Comput Inf Sci 7(1):32View ArticleGoogle Scholar
 Jaschke R, Hotho A, Schmitz C, Ganter B, Stumme G (2007) TRIAS—an algorithm for mining iceberg trilattices. In: International conference on data mining. pp 907–911Google Scholar
 Hao F, Zhong S (2010) ECKDF: Extended conceptual knowledge discovery in folksonomy. In: International conference on computational problemsolving. pp 71–76Google Scholar
 Hao F, Zhong S (2009) Variable precision concepts and its applications for query expansion. In: Emerging intelligent computing technology and applications. With aspects of artificial intelligence. Proceedings international conference on intelligent computing, ICIC 2009, Ulsan, South Korea, 16–19 September. pp 154–165Google Scholar
 Zhang W, Du Y, Song W (2015) Followee recommendation based formal concept analysis in social network. Int J Innov Comput Inf Control IJICIC 11(4):1155–1164Google Scholar
 Mukkamala RR, Hussain A, Vatrapu R (2014) Fuzzyset based sentiment analysis of big social data. In: Enterprise distributed object computing conference. pp 71–80Google Scholar
 Jusoh S, Alfawareh HM (2013) Applying fuzzy sets for opinion mining. In: International conference on computer applications technology. pp 1–5Google Scholar
 CuencaJara J, TerrosoSaenz F, ValdesVela M, GonzalezVidal A, Skarmeta AF (2017) Human mobility analysis based on social media and fuzzy clustering. In: Global internet of things summit (GIoTS). IEEE, New York, pp 1–6Google Scholar
 Fei H, DooSoon P, Sang Yeon W, Se Dong M, Sewon P (2016) Treatment planning in smart medical: a sustainable strategy. J Inf Process Syst 12(4):711–723Google Scholar
 Hao F, Park DS, Min SD, Park S (2016) Modeling a big medical data cognitive system with NAry formal concept analysis. In: Advanced multimedia and ubiquitous engineering. Springer, Singapore, pp 721–716Google Scholar
 Hanneman RA, Riddle M (2005) Introduction to social network methods. Department of Sociology University of California Riverside, RiversideGoogle Scholar
 Huisman M, Duijn MAJV (2005) Software for social network analysis. Models Methods Soc Netw Anal 270:e316Google Scholar
 Loscalzo S, Yu L (2008) Social network analysis: tasks and tools. Springer, Boston, pp 151–159Google Scholar
 Xu K, Tang C, Tang R, Ali G, Zhu J (2010) A comparative study of six software packages for complex network research. In: International conference on communication software and networks. pp 350–354Google Scholar
 Neubig G, Dyer C, Goldberg Y, Matthews A, Ammar W, Anastasopoulos A, Ballesteros M, Chiang D, Clothiaux D, Cohn T (2017) Dynet: the dynamic neural network toolkitGoogle Scholar
 Adamcsek B, Palla G, Farkas IJ, Derenyi I, Vicsek T (2006) CFinder: locating cliques and overlapping modules in biological networks. Bioinformatics 22(8):1021–1023View ArticleGoogle Scholar
 Mrvar A, Batagelj V (2002) Pajek—analysis and visualization of large networks. Lect Notes Comput Sci 2265:77–103MATHGoogle Scholar
 Trier M (2006) Towards a social network intelligence tool for visual analysis of virtual communication networks. TUDpress Verlag, DresdenGoogle Scholar
 Smith MA, Shneiderman B, MilicFrayling N, Mendes Rodrigues E, Barash V (2010) Analyzing (social media) networks with NodeXL. pp 277–284Google Scholar
 White DR, Batagelj V, Mrvar A (2013) Kinship and marriage networks anthropology analyzing large kinship and marriage networks with Pgraph and Pajek. Soc Sci Comput Rev 17(3):245–274View ArticleGoogle Scholar
 Csardi G, Nepusz T (2006) The igraph software package for complex network research. Inter J Complex Syst 1695:1–9Google Scholar
 Nicholls J, Peters D, Slawinski A, Spoor T, Vicol S, Happa J, Goldsmith M, Creese S (2013) Netvis: a visualization tool enabling multiple perspectives of network traffic data. Eurographics AssociationGoogle Scholar
 Apostolato IA (2013) An overview of software applications for social network analysis. Int Rev Soc Res 3(3):71–77View ArticleGoogle Scholar
 Carley KM (2014) ORA: a toolkit for dynamic network analysis and visualization. Springer, New York, pp 1219–1228Google Scholar
 Yang R, Bai Y, Qin Z, Yu T (2014) EgoNet: identification of human disease egonetwork modules. BMC Genomics 15(1):314View ArticleGoogle Scholar
 http://www.maths.bris.ac.uk/R/web/packages/keyplayer/index.html
 Johnson JD (1987) UCINET: a software tool for network analysis. Commun Educ 36(1):92–94View ArticleGoogle Scholar
 Hagberg A, Schult D, Swart P (2005) Networkx: Python software for the analysis of networks. Mathematical Modeling and Analysis, Los Alamos National LaboratoryGoogle Scholar
 Huisman M, Van Duijn MA (2003) StOCNET: software for the statistical analysis of social networks. Connections 68(4):1457–1458Google Scholar
 http://freshmeat.sourceforge.net/projects/aisee
 Weiss M, Moroiu G, Zhao P (2006) Evolution of open source communities. Springer, Boston, pp 21–32Google Scholar
 Shannon P, Markiel A, Ozier O, Baliga NS, Wang JT, Ramage D, Amin N, Schwikowski B, Ideker T (2003) Cytoscape: a software environment for integrated models of biomolecular interaction networks. University of California Riverside, Riverside, pp 165–184Google Scholar
 Bastian M, Heymann S, Jacomy M (2009) Gephi: an open source software for exploring and manipulating networks. In: Third international AAAI conference on weblogs and social mediaGoogle Scholar
 Ellson J, Gansner E, Koutsofios L, North S, Woodhull G, Description S, Technologies L (2001) Graphvizopen source graph drawing tools. In: Lecture notes in computer science. Springer, Berlin, pp 483–484Google Scholar
 Krackhardt D, Lundberg M, O’Rourke L (2014) Krackplot: a picture’s worth a thousand words. Dermatol Times 72(2):200–222Google Scholar
 Valtchev P, Roume C (2003) Galicia: an open platform for lattices. In: Using conceptual structures: contributions to ICCS’03. pp 241–254Google Scholar
 Fei H, Park DS, Sim DS, Min JK, Jeong YS, Park JH, Seo HS (2017) An efficient approach to understanding social evolution of locationfocused online communities in locationbased services. Soft Comput. https://doi.org/10.1007/s0050001726272 Google Scholar