Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (76)
  • Open Access

    ARTICLE

    A Positive Influence Maximization Algorithm in Signed Social Networks

    Wenlong Zhu1,2,*, Yang Huang1, Shuangshuang Yang3, Yu Miao1, Chongyuan Peng1

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1977-1994, 2023, DOI:10.32604/cmc.2023.040998

    Abstract The influence maximization (IM) problem aims to find a set of seed nodes that maximizes the spread of their influence in a social network. The positive influence maximization (PIM) problem is an extension of the IM problem, which consider the polar relation of nodes in signed social networks so that the positive influence of seeds can be the most widely spread. To solve the PIM problem, this paper proposes the polar and decay related independent cascade (IC-PD) model to simulate the influence propagation of nodes and the decay of information during the influence propagation in… More >

  • Open Access

    ARTICLE

    Effect of Online Social Networking on Emotional Status and Its Interaction with Offline Reality during the Early Stage of the COVID-19 Pandemic in China

    Xiaolin Lu1,*, Xiaolei Miao2

    International Journal of Mental Health Promotion, Vol.25, No.9, pp. 1041-1052, 2023, DOI:10.32604/ijmhp.2023.030232

    Abstract Background: During the early stages of the COVID-19 pandemic in China, social interactions shifted to online spaces due to lock-downs and social distancing measures. As a result, the impact of online social networking on users’ emotional status has become stronger than ever. This study examines the association between online social networking and Internet users’ emotional status and how offline reality affects this relationship. Methods: The study utilizes cross-sectional online survey data (n = 3004) and Baidu Migration big data from the first 3 months of the pandemic. Two dimensions of online networking are measured: social… More > Graphic Abstract

    Effect of Online Social Networking on Emotional Status and Its Interaction with Offline Reality during the Early Stage of the COVID-19 Pandemic in China

  • Open Access

    ARTICLE

    Deep Neural Network for Detecting Fake Profiles in Social Networks

    Daniyal Amankeldin1, Lyailya Kurmangaziyeva2, Ayman Mailybayeva2, Natalya Glazyrina1, Ainur Zhumadillayeva1,*, Nurzhamal Karasheva3

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 1091-1108, 2023, DOI:10.32604/csse.2023.039503

    Abstract This paper proposes a deep neural network (DNN) approach for detecting fake profiles in social networks. The DNN model is trained on a large dataset of real and fake profiles and is designed to learn complex features and patterns that distinguish between the two types of profiles. In addition, the present research aims to determine the minimum set of profile data required for recognizing fake profiles on Facebook and propose the deep convolutional neural network method for fake accounts detection on social networks, which has been developed using 16 features based on content-based and profile-based… More >

  • Open Access

    ARTICLE

    Web Intelligence with Enhanced Sunflower Optimization Algorithm for Sentiment Analysis

    Abeer D. Algarni*

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 1233-1247, 2023, DOI:10.32604/csse.2022.026915

    Abstract Exponential increase in the quantity of user generated content in websites and social networks have resulted in the emergence of web intelligence approaches. Several natural language processing (NLP) tools are commonly used to examine the large quantity of data generated online. Particularly, sentiment analysis (SA) is an effective way of classifying the data into different classes of user opinions or sentiments. The latest advances in machine learning (ML) and deep learning (DL) approaches offer an intelligent way of analyzing sentiments. In this view, this study introduces a web intelligence with enhanced sunflower optimization based deep… More >

  • Open Access

    ARTICLE

    Improved Ant Lion Optimizer with Deep Learning Driven Arabic Hate Speech Detection

    Abdelwahed Motwakel1,*, Badriyya B. Al-onazi2, Jaber S. Alzahrani3, Sana Alazwari4, Mahmoud Othman5, Abu Sarwar Zamani1, Ishfaq Yaseen1, Amgad Atta Abdelmageed1

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3321-3338, 2023, DOI:10.32604/csse.2023.033901

    Abstract Arabic is the world’s first language, categorized by its rich and complicated grammatical formats. Furthermore, the Arabic morphology can be perplexing because nearly 10,000 roots and 900 patterns were the basis for verbs and nouns. The Arabic language consists of distinct variations utilized in a community and particular situations. Social media sites are a medium for expressing opinions and social phenomena like racism, hatred, offensive language, and all kinds of verbal violence. Such conduct does not impact particular nations, communities, or groups only, extending beyond such areas into people’s everyday lives. This study introduces an… More >

  • Open Access

    ARTICLE

    An Influence Maximization Algorithm Based on Improved K-Shell in Temporal Social Networks

    Wenlong Zhu1,*, Yu Miao1, Shuangshuang Yang2, Zuozheng Lian1, Lianhe Cui1

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3111-3131, 2023, DOI:10.32604/cmc.2023.036159

    Abstract Influence maximization of temporal social networks (IMT) is a problem that aims to find the most influential set of nodes in the temporal network so that their information can be the most widely spread. To solve the IMT problem, we propose an influence maximization algorithm based on an improved K-shell method, namely improved K-shell in temporal social networks (KT). The algorithm takes into account the global and local structures of temporal social networks. First, to obtain the kernel value Ks of each node, in the global scope, it layers the network according to the temporal characteristic… More >

  • Open Access

    ARTICLE

    Generalized Jaccard Similarity Based Recurrent DNN for Virtualizing Social Network Communities

    R. Gnanakumari1,*, P. Vijayalakshmi2

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 2719-2730, 2023, DOI:10.32604/iasc.2023.034145

    Abstract In social data analytics, Virtual Community (VC) detection is a primary challenge in discovering user relationships and enhancing social recommendations. VC formation is used for personal interaction between communities. But the usual methods didn’t find the Suspicious Behaviour (SB) needed to make a VC. The Generalized Jaccard Suspicious Behavior Similarity-based Recurrent Deep Neural Network Classification and Ranking (GJSBS-RDNNCR) Model addresses these issues. The GJSBS-RDNNCR model comprises four layers for VC formation in Social Networks (SN). In the GJSBS-RDNNCR model, the SN is given as an input at the input layer. After that, the User’s Behaviors… More >

  • Open Access

    ARTICLE

    Emerging Trends in Social Networking Systems and Generation Gap with Neutrosophic Crisp Soft Mapping

    Muhammad Riaz1, Masooma Raza Hashmi1, Faruk Karaaslan2, Aslıhan Sezgin3, Mohammed M. Ali Al Shamiri4,5,*, Mohammed M. Khalaf6,7

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.2, pp. 1759-1783, 2023, DOI:10.32604/cmes.2023.023327

    Abstract This paper aims to introduce the novel concept of neutrosophic crisp soft set (NCSS), including various types of neutrosophic crisp soft sets (NCSSs) and their fundamental operations. We define NCS-mapping and its inverse NCS-mapping between two NCS-classes. We develop a robust mathematical modeling with the help of NCS-mapping to analyze the emerging trends in social networking systems (SNSs) for our various generations. We investigate the advantages, disadvantages, and natural aspects of SNSs for five generations. With the changing of the generations, it is analyzed that emerging trends and the benefits of SNSs are increasing day More > Graphic Abstract

    Emerging Trends in Social Networking Systems and Generation Gap with Neutrosophic Crisp Soft Mapping

  • Open Access

    ARTICLE

    Machine Learning Techniques for Detecting Phishing URL Attacks

    Diana T. Mosa1,2, Mahmoud Y. Shams3,*, Amr A. Abohany2, El-Sayed M. El-kenawy4, M. Thabet5

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1271-1290, 2023, DOI:10.32604/cmc.2023.036422

    Abstract Cyber Attacks are critical and destructive to all industry sectors. They affect social engineering by allowing unapproved access to a Personal Computer (PC) that breaks the corrupted system and threatens humans. The defense of security requires understanding the nature of Cyber Attacks, so prevention becomes easy and accurate by acquiring sufficient knowledge about various features of Cyber Attacks. Cyber-Security proposes appropriate actions that can handle and block attacks. A phishing attack is one of the cybercrimes in which users follow a link to illegal websites that will persuade them to divulge their private information. One… More >

  • Open Access

    ARTICLE

    Enhanced Clustering Based OSN Privacy Preservation to Ensure k-Anonymity, t-Closeness, l-Diversity, and Balanced Privacy Utility

    Rupali Gangarde1,2,*, Amit Sharma3, Ambika Pawar4

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 2171-2190, 2023, DOI:10.32604/cmc.2023.035559

    Abstract Online Social Networks (OSN) sites allow end-users to share a great deal of information, which may also contain sensitive information, that may be subject to commercial or non-commercial privacy attacks. As a result, guaranteeing various levels of privacy is critical while publishing data by OSNs. The clustering-based solutions proved an effective mechanism to achieve the privacy notions in OSNs. But fixed clustering limits the performance and scalability. Data utility degrades with increased privacy, so balancing the privacy utility trade-off is an open research issue. The research has proposed a novel privacy preservation model using the… More >

Displaying 11-20 on page 2 of 76. Per Page