A Query-Based Greedy Approach for Authentic Influencer Discovery in SIoT

被引:2
作者
Batool, Farah [1 ]
Rehman, Abdul [2 ]
Kim, Dongsun [2 ]
Abbas, Assad [1 ]
Nawaz, Raheel [3 ]
Madni, Tahir Mustafa [1 ]
机构
[1] COMSATS Univ Islamabad, Islamabad, Pakistan
[2] Kyungpook Natl Univ, Sch Comp Sci & Engn, Daegu 41566, South Korea
[3] Manchester Metropolitan Univ, Dept Operat Technol Events & Hospitality Managemen, Manchester, England
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2023年 / 74卷 / 03期
基金
新加坡国家研究基金会;
关键词
Online social network; influencer search; query-based approach; greedy search; social internet of things (siot); SMALL WORLD; INTERNET;
D O I
10.32604/cmc.2023.033832
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The authors propose an informed search greedy approach that efficiently identifies the influencer nodes in the social Internet of Things with the ability to provide legitimate information. Primarily, the proposed approach minimizes the network size and eliminates undesirable connections. For that, the proposed approach ranks each of the nodes and prioritizes them to identify an authentic influencer. Therefore, the proposed approach discards the nodes having a rank (alpha) lesser than 0.5 to reduce the network complexity. alpha is the variable value represents the rank of each node that varies between 0 to 1. Node with the higher value of alpha gets the higher priority and vice versa. The threshold value alpha = 0.5 defined by the authors with respect to their network pruning requirements that can be vary with respect to other research problems. Finally, the algorithm in the proposed approach traverses the trimmed network to identify the authentic node to obtain the desired information. The performance of the proposed method is evaluated in terms of time complexity and accuracy by executing the algorithm on both the original and pruned networks. Experimental results show that the approach identifies authentic influencers on a resultant network in significantly less time than in the original network. Moreover, the accuracy of the proposed approach in identifying the influencer node is significantly higher than that of the original network. Furthermore, the comparison of the proposed approach with the existing approaches demonstrates its efficiency in terms of time consumption and network traversal through the minimum number of hops.
引用
收藏
页码:6535 / 6553
页数:19
相关论文
共 40 条
  • [1] Alamsyah Andry, 2017, Journal of Theoretical and Applied Information Technology, V95, P3749
  • [2] Alamsyah A., 2016, 2016 4 INT C INF COM, P1
  • [3] Alamsyah A, 2015, 2015 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICOICT), P327, DOI 10.1109/ICoICT.2015.7231445
  • [4] Identifying Information Superspreaders of COVID-19 from Arabic Tweets
    Alqurashi, Sarah
    Alashaikh, Abdulaziz
    Nabil, Mahmoud
    Alanazi, Eisa
    Sherif, Ahmed
    Alsmary, Waleed
    [J]. 2021 3RD IEEE MIDDLE EAST AND NORTH AFRICA COMMUNICATIONS CONFERENCE (MENACOMM), 2021, : 109 - 114
  • [5] [Anonymous], 2018, INTELLIGENT INTERACT
  • [6] [Anonymous], 2012, CSCW, DOI DOI 10.1145/2145204.2145360
  • [7] Bastian M., 2009, P 3 INT ICWSM C, P361, DOI DOI 10.1609/ICWSM.V3I1.13937
  • [8] FACTORING AND WEIGHTING APPROACHES TO STATUS SCORES AND CLIQUE IDENTIFICATION
    BONACICH, P
    [J]. JOURNAL OF MATHEMATICAL SOCIOLOGY, 1972, 2 (01) : 113 - 120
  • [9] The social capital of opinion leaders
    Burt, RS
    [J]. ANNALS OF THE AMERICAN ACADEMY OF POLITICAL AND SOCIAL SCIENCE, 1999, 566 : 37 - 54
  • [10] Canali Claudia, 2012, International Journal of Social Network Mining, V1, P27, DOI 10.1504/IJSNM.2012.045104