0% Complete
English
صفحه اصلی
/
دوازدهمین کنفرانس بین المللی فناوری اطلاعات و دانش
A Community-Based Method for Identifying Influential Nodes using Network Embedding
نویسندگان :
Nargess Vafaei
1
Mohammad Reza Keyvanpour
2
1- دانشگاه الزهرا(س)
2- دانشگاه الزهرا(س)
کلمات کلیدی :
Social network mining, Influence analysis, Influence maximization problem, Influential nodes
چکیده :
People's influence on their friends' personal opinions and decisions is an essential feature of social networks, which has led to many businesses using social media to convince a small number of users to increase awareness and ultimately maximize sales to the maximum number of users. This issue is typically expressed as the influence maximization problem. In this paper, we will identify the most influential nodes in the social network during two phases. In the first phase, we offer a community detection approach based on the Node2Vec method to detect the potential communities. In the second phase, by applying the size criterion, candidate communities are selected, and then the heuristic-based measurement approach is utilized to identify influential nodes within candidate communities. Evaluations of the proposed method on two real datasets show the superiority of this method over other compared methods.
لیست مقالات
لیست مقالات بایگانی شده
بهبود رهگیری در زنجیره تامین با استفاده از فناوری زنجیره بلوکی
سید عماد موسوی - مهرداد آشتیانی
Binary water stream algorithm: a new meta-heuristic optimization technique
Faezeh Rahimi Sebdani - Mehdi Nasri
پیشبینی حجم ترافیک شهری با استفاده از دادههای سرویس نشان مورد مطالعاتی: خیابان کمال اصفهان
مهسا لطیفی - جمشید مالکی
A Deep Neural Network-based Method for MmWave Time-varying Channel Estimation
Amirhossein Molazadeh - Zahra Maroufi - Mehrdad Ardebilipour
Design and Simulation of a New Multiplexer with Energy Analysis in Quantum Cellular Automata Technology
- - -
Violence detection using one-dimensional convolutional networks
Narges Honarjoo - Ali Abdari - Dr Azadeh Mansouri
AN EFFICIENT TASK SCHEDULING IN CLOUD COMPUTING BASED ON ACO ALGORITHM
Zahra Shafahi - Dr Alireza Yari
SDN-based Deep Anomaly Detection For Securing Cloud Gaming Servers
Mohammadreza Ghafari - Dr Seyed Mostafa Safavi Hemami
Mode Selection and Resource Allocation in D2D-Enabled MC-NOMA using Matching Theory
Alireza Gholamrezaee - Hamid Farrokhi - Javad Zeraatkar Moghaddam
طرحی برای تبدیل نمودارهای رفتاری BPMN به نمودار UML و تولید کد از آن
مهدیس صفری - احمد عبدالله زاده بارفروش
ثمین همایش، سامانه مدیریت کنفرانس ها و جشنواره ها - نگارش 40.3.1