0% Complete
فارسی
Home
/
سیزدهمین کنفرانس بین المللی فناوری اطلاعات و دانش
Optimal selection of seed nodes by reducing the influence of common nodes in the influence maximization problem
Authors :
Farzaneh Kazemzadeh
1
Ali Asghar Safaei
2
Mitra Mirzarezaee
3
1- دانشگاه آزاد واحد علوم تحقیقات تهران
2- دانشگاه تربیت مدرس
3- دانشگاه آزاد واحد علوم تحقیقات تهران
Keywords :
Common neighbors،Information diffusion،Influence maximization،Influence spread،Node score moderation
Abstract :
The Internet and social networks play an important role in today's world. Many large companies and organizations use the Internet to manage and implement their activities. Moreover, businesses in these organizations have been significantly expanded through social networks and the appropriate conditions provided by these networks for extensive advertising among a large number of users. Influence maximization (IM) can further spread news and advertisements in social networks by the optimal discovery of a set of k-member of users who have the most diffusion in the social network. Due to its importance, many researchers have investigated this problem and presented algorithms that cannot be used in the real world because they are not optimal and lack proper efficiency. Therefore, this paper reviews and studies the influence maximization problem (IMP) to provide an optimal solution to present an algorithm. The optimal solution is provided by the IBN algorithm at a suitable time. This algorithm prevents the diffusion to be limited among some nodes with common neighbors in a dense part of the network. This method solves the algorithm and selects a set of K members of influential nodes in two steps by scoring for each node and adjusting the scores according to the number of common neighbors between the nodes. The results obtained from this algorithm show that the proposed idea has an optimal solution for this problem, including very high accuracy in selecting the optimal nodes and suitable execution time compared to other algorithms.
Papers List
List of archived papers
Classification and Evaluation of Privacy Preserving Data Mining Methods
Negar Nasiri - Mohammadreza Keyvanpour
UltraLearn: Next-Generation CyberSecurity Learning Platform
Saeed Raisi - Saeid Ghasemshirazi - Ghazaleh Shirvani
A New Sentence Ordering Method Using BERT Pretrained Model
Melika Golestanipour - Seyedeh Zahra Razavi - Dr Heshaam Faili
An approach to model the optimal service provisioning in vehicular cloud networks
Farhoud Jafari Kaleibar - Maghsoud Abbaspour
Binary water stream algorithm: a new meta-heuristic optimization technique
Faezeh Rahimi Sebdani - Mehdi Nasri
Establishing security using cryptography and biometric authentication to counter cyber-attacks
Mohammed ADIL AKABR - Mehdi Hamidkhani - Mostafa Sadeghi
بررسی تأثیر استقرار استاندارد COBIT در افزایش بهره وری سازمانها (مطالعه موردی: شعب نمایندگیهای همراه اول، ایرانسل، رایتل)
دکتر محمد ابراهیم سمیع - ساره رحمانیان محمد ابراهیم سمیع - ساره رحمانیان -
Two Novel Designs of Efficient Single-Bit Comparators in QCA Technology with Ultra-Low Energy Dissipation
Shobeir Fayazi - Hatam Abdoli
مدل یادگیری عمیق با بازنمایی چند مقیاسی زمان برای پیشبینی آبشار اطلاعاتی در شبکههای اجتماعی
مبینا پناهی - مهدی عمادی
معماری مبتنی بر مدلهای زبانی بزرگ برای تخصیص وظایف پویا و خودکار در سامانه رباتیک ازدحامی چندالگوریتمی
حمید هوشمند - سینا میرخانی - محمد حسین وارث وزیریان
more
Samin Hamayesh - Version 42.5.2