Novel Influence Maximization Algorithm for Social Network Behavior Management
PDF

How to Cite

Sivaganesan, D. 2021. “Novel Influence Maximization Algorithm for Social Network Behavior Management”. Journal of ISMAC 3 (1): 60-68. https://doi.org/10.36548/jismac.2021.1.006.

Keywords

— Behavior attributes
— CPU architecture
— parallel algorithm
— influence analysis
— social networks analysis
Published: 10-04-2021

Abstract

The users largely contributing towards product adoption or information utilization in social networks are identified by the process of influence maximization. The exponential growth in social networks imposes several challenges in the analyses of these networks. Important has been given to modeling structural properties while the relationship between users and their social behavior has being ignored in the existing literature. With respect to the social behavior, the influence maximization task has been parallelized in this paper. In order to maximize the influence in social networks, an interest based algorithm with parallel social action has been proposed. This is algorithm enables identifying influential users in social network. The interactive behavior of the user is weighted dynamically as social actions along with the interests of the users. These two semantic metrics are used in the proposed algorithm. An optimal influential nodes set is computed by implementing the machines with CPU architecture with perfect parallelism through community structure. This helps in reducing the execution time and overcoming the real-word social network size challenges. When compared to the existing schemes, the proposed algorithm offers improved efficiency in the calculation speed on real world networks.

References

  1. Wilder, B., Yadav, A., Immorlica, N., Rice, E., & Tambe, M. (2017, May). Uncharted but not Uninfluenced: Influence Maximization with an Uncertain Network. In AAMAS (Vol. 17, pp. 1305-1313).
  2. Aral, S., & Dhillon, P. S. (2018). Social influence maximization under empirical influence models. Nature human behaviour, 2(6), 375-382.
  3. Banerjee, S., Jenamani, M., & Pratihar, D. K. (2020). A survey on influence maximization in a social network. Knowledge and Information Systems, 62(9), 3417-3455.
  4. ŞİMŞEK, A., & Resul, K. A. R. A. (2018). Using swarm intelligence algorithms to detect influential individuals for influence maximization in social networks. Expert Systems with Applications, 114, 224-236.
  5. Wilder, B., Immorlica, N., Rice, E., & Tambe, M. (2018, April). Maximizing influence in an unknown social network. In Proceedings of the AAAI Conference on Artificial Intelligence (Vol. 32, No. 1).
  6. Cui, L., Hu, H., Yu, S., Yan, Q., Ming, Z., Wen, Z., & Lu, N. (2018). DDSE: A novel evolutionary algorithm based on degree-descending search strategy for influence maximization in social networks. Journal of Network and Computer Applications, 103, 119-130.
  7. Khomami, M. M. D., Rezvanian, A., Bagherpour, N., & Meybodi, M. R. (2018). Minimum positive influence dominating set and its application in influence maximization: a learning automata approach. Applied Intelligence, 48(3), 570-593.
  8. Tang, J., Zhang, R., Wang, P., Zhao, Z., Fan, L., & Liu, X. (2020). A discrete shuffled frog-leaping algorithm to identify influential nodes for influence maximization in social networks. Knowledge-Based Systems, 187, 104833.
  9. Han, M., Han, Q., Li, L., Li, J., & Li, Y. (2018). Maximising influence in sensed heterogeneous social network with privacy preservation. International Journal of Sensor Networks, 28(2), 69-79.
  10. Caliò, A., Interdonato, R., Pulice, C., & Tagarelli, A. (2018). Topology-driven diversity for targeted influence maximization with application to user engagement in social networks. IEEE Transactions on Knowledge and Data Engineering, 30(12), 2421-2434.
  11. Duraipandian, M. (2020). Long Term Evolution-Self Organizing Network for Minimization of Sudden Call Termination in Mobile Radio Access Networks. Journal of trends in Computer Science and Smart technology (TCSST), 2(02), 89-97.
  12. Bashar, A. (2020). Sensor Cloud Based Architecture with Efficient Data Computation and Security Implantation for Internet of Things Application. Journal of ISMAC, 2(02), 96-105.
  13. Sathesh, A. (2019). Enhanced soft computing approaches for intrusion detection schemes in social media networks. Journal of Soft Computing Paradigm (JSCP), 1(02), 69-79.
  14. Haoxiang, W. (2020). Emotional Analysis of Bogus Statistics in Social Media. Journal of Ubiquitous Computing and Communication Technologies (UCCT), 2(03), 178-186.
  15. Manoharan, S. (2020). Geospatial and social media analytics for emotion analysis of theme park visitors using text mining and gis. Journal of Information Technology, 2(02), 100-107.