Influence node analysis based on neighborhood influence vote rank method in social network
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2023.14.4.69Keywords:
Social Networks, Vote ScoreDimensions Badge
Issue
Section
License
Copyright (c) 2023 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Social Networks are used for various purposes like advertising, product launches, sentiment analysis, opinion mining, and event detection etc. Terrorist targets social network users to spread the terrorism. Influence analysis is used in social networks to find the influence of users and the impact of the messages, mainly for advertising. In this research, the Neighborhood Influence – Vote Rank (NI-VR) method is proposed to analyze the terrorism and social network datasets temporally to find the influence node in Social networks. The Global Terrorism Dataset (GTD) was used to analyze the terrorism activity and temporal analysis on Social Network data to find the influence node. The Neighborhood node influence is measured and considered in the Social Network data to effectively find the influence node. The nodes’ vote score and vote ability were measured to rank the nodes based on influence. The neighborhood influence is measured to update the vote score and vote ability based on influence value. The neighborhood influence method is applied to rank the node has the advantage of analyzing the probability of affected nodes and recover nodes that help to effectively find the influence nodes. The outcomes illustrate that the proposed NI-VR achieved a maximum spread influence of 843 and the existing Greedy method has a higher spread influence of 840 in influence node analysis.Abstract
How to Cite
Downloads
Similar Articles
- Amanda Q. Okronipa, Jones Y. Nyame, Exploring the effect of perceived empathy and social presence on the intention to use AI in higher education , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- J. Helan Shali Margret, N. Amsaveni, Application of Lotka’s law in Indian cytokine publications: A scientometric study based on web of science during 1998 TO 2022 , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Pankaj Gupta, Niyati Chaudhary, Model Building with Antecedents and Consequences of Workplace Bullying: A SPAR-4-SLR approach using ADO-TCCM Framework with Bibliometric Analysis , The Scientific Temper: Vol. 17 No. 01 (2026): The Scientific Temper
- Annalakshmi D., C. Jayanthi, An asymmetric key encryption and decryption model incorporating optimization techniques for enhanced security and efficiency , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- S. Dhivya, S. Prakash, Power quality assessment in solar-connected smart grids via hybrid attention-residual network for power quality (HARN-PQ) , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- Santhanalakshmi M, Ms Lakshana K, Ms Shahitya G M, Enhanced AES-256 cipher round algorithm for IoT applications , The Scientific Temper: Vol. 14 No. 01 (2023): The Scientific Temper
- K. Arunkumar, K. R. Shanthy, S. Lakshmisridevi, K. Thilagam, FR-CNN: The optimal method for slicing fifth-generation networks through the application of deep learning , The Scientific Temper: Vol. 16 No. 04 (2025): The Scientific Temper
- Bayelign Abebe, Ayalew Ali, Linking globalization to commercial banks’ performance in Ethiopia , The Scientific Temper: Vol. 16 No. 03 (2025): The Scientific Temper
- Sadhana Gaikwad, Rajvardhan, Overview on biased news reporting of Indian television with legal aspect , The Scientific Temper: Vol. 16 No. 04 (2025): The Scientific Temper
- R. Sridevi, V. S. J. Prakash, Load aware active low energy adaptive clustering hierarchy for IoT-WSN , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
<< < 7 8 9 10 11 12 13 14 15 16 > >>
You may also start an advanced similarity search for this article.

