<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.1 20151215//EN" "http://jats.nlm.nih.gov/publishing/1.1/JATS-journalpublishing1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" article-type="research-article" dtd-version="1.1">
<front>
<journal-meta>
<journal-id journal-id-type="pmc">IASC</journal-id>
<journal-id journal-id-type="nlm-ta">IASC</journal-id>
<journal-id journal-id-type="publisher-id">IASC</journal-id>
<journal-title-group>
<journal-title>Intelligent Automation &#x0026; Soft Computing</journal-title>
</journal-title-group>
<issn pub-type="epub">2326-005X</issn>
<issn pub-type="ppub">1079-8587</issn>
<publisher>
<publisher-name>Tech Science Press</publisher-name>
<publisher-loc>USA</publisher-loc>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">34019</article-id>
<article-id pub-id-type="doi">10.32604/iasc.2023.034019</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Article</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>Identifying Influential Communities Using IID for a Multilayer Networks</article-title><alt-title alt-title-type="left-running-head">Identifying Influential Communities Using IID for a Multilayer Networks</alt-title><alt-title alt-title-type="right-running-head">Identifying Influential Communities Using IID for a Multilayer Networks</alt-title>
</title-group>
<contrib-group content-type="authors">
<contrib id="author-1" contrib-type="author" corresp="yes">
<name name-style="western"><surname>Suganthini</surname><given-names>C.</given-names></name><email>chinna246@gmail.com</email>
</contrib>
<contrib id="author-2" contrib-type="author">
<name name-style="western"><surname>Baskaran</surname><given-names>R.</given-names></name>
</contrib>
<aff id="aff-1"><institution>Department of Computer Science and Engineering College of Engineering, Guindy, Anna University</institution>, <addr-line>Chennai, Tamilnadu</addr-line>, <country>India</country></aff>
</contrib-group><author-notes><corresp id="cor1"><label>&#x002A;</label>Corresponding Author: C. Suganthini. Email: <email>chinna246@gmail.com</email></corresp></author-notes>
<pub-date publication-format="print" date-type="pub" iso-8601-date="2022-12-17"><day>17</day><month>12</month><year>2022</year></pub-date>
<volume>36</volume>
<issue>2</issue>
<fpage>1715</fpage>
<lpage>1731</lpage>
<history>
<date date-type="received"><day>04</day><month>7</month><year>2022</year></date>
<date date-type="accepted"><day>19</day><month>8</month><year>2022</year></date>
</history>
<permissions>
<copyright-statement>&#x00A9; 2023 Suganthini and Baskaran</copyright-statement>
<copyright-year>2023</copyright-year>
<copyright-holder>Suganthini and Baskaran</copyright-holder>
<license xlink:href="https://creativecommons.org/licenses/by/4.0/">
<license-p>This work is licensed under a <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution 4.0 International License</ext-link>, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.</license-p>
</license>
</permissions>
<self-uri content-type="pdf" xlink:href="TSP_IASC_34019.pdf"></self-uri>
<abstract>
<p>In online social networks (OSN), they generate several specific user activities daily, corresponding to the billions of data points shared. However, although users exhibit significant interest in social media, they are uninterested in the content, discussions, or opinions available on certain sites. Therefore, this study aims to identify influential communities and understand user behavior across networks in the information diffusion process. Social media platforms, such as Facebook and Twitter, extract data to analyze the information diffusion process, based on which they cascade information among the individuals in the network. Therefore, this study proposes an influential information diffusion model that identifies influential communities across these two social media sites. Moreover, it addresses site migration by visualizing a set of overlapping communities using hyper-edge detection. Thus, the overlapping community structure is used to identify similar communities with identical user interests. Furthermore, the community structure helps in determining the node activation and user influence from the information cascade model. Finally, the Fraction of Intra/Inter-Layer (FIL) diffusion score is used to evaluate the efficiency of the influential information diffusion model by analyzing the trending influential communities in a multilayer network. However, from the experimental result, it observes that the FIL diffusion score for the proposed method achieves better results in terms of accuracy, precision, recall and efficiency of community detection than the existing methods.</p>
</abstract>
<kwd-group kwd-group-type="author">
<kwd>Influential information diffusion model</kwd>
<kwd>community detection</kwd>
<kwd>influential communities</kwd>
<kwd>social network</kwd>
</kwd-group>
</article-meta>
</front>
<body>
<sec id="s1">
<label>1</label>
<title>Introduction</title>
<p>Social media sites such as Facebook, Twitter, and Instagram generate a large amount of data that requires analysis to identify user activities, such as sharing the most popular content, in the social network information diffusion process. However, online user activities are difficult to identify or predict, as they are unstructured and change dynamically daily. Moreover, the big data analytics component of social network analysis (SNA) is in the progressive research phase.</p>
<p>Generally, SNA depends on the properties of the network undergoing analysis. For instance, the analysis of undirected networks requires metrics that use symmetric edges between nodes. In other words, the paths through which information passes within communities can be identified; however, these directional paths cannot be managed. Thus, the analysis of undirected networks uses symmetric relationships between the users, to identify sub-communities and users that are important to those communities. The major contributions of the proposed method are as follows:<list list-type="simple"><list-item>
<p>&#x25CF; Identifying the user activation in the information intervention phase and evaluating the social influence by assigning thresholds to determine the degree of social contagion.</p></list-item><list-item>
<p>&#x25CF; Identifying the influenced communities and their user behavior in the influential information diffusion model by predicting the interested communities in a multilayer network.</p></list-item></list></p>
<p>Section 1 provides a brief introduction to the benefits of analyzing online social networks (OSN) for complex multilayer networks. Section 2 deals with related work on information diffusion and community detection. Section 3 describes the proposed architecture in detail. Section 4 provides the experimental results and evaluation metrics of the proposed method. Finally, Section 5 concludes the studies and presents future research directions.</p>
</sec>
<sec id="s2">
<label>2</label>
<title>Related Work</title>
<p>Graph illustrates entities and the mutual relationships between these entities in social networks. For instance, a graph G (V, E) represents vertices and edges that connect in a network. The relationship between entities determines the values, such as the common node degree and the typical path range between nodes. Typically, studies in graph mining employ the conceptual information model instead of a mathematical entity [<xref ref-type="bibr" rid="ref-1">1</xref>]. Community structure modeling and its characteristics are also studied using graph mining concepts that focus on node and edge properties.</p>
<sec id="s2_1">
<label>2.1</label>
<title>Activity Analysis in Social Media</title>
<p>Community structure models can be used to quantitatively determine the possible extent to which social media users are influenced by the opinion or decision of other users within the network [<xref ref-type="bibr" rid="ref-2">2</xref>,<xref ref-type="bibr" rid="ref-3">3</xref>]. A previous study on the influence exerted by network users demonstrated that social interactions occur more frequently among similar individuals than among dissimilar individuals [<xref ref-type="bibr" rid="ref-4">4</xref>]. Another study established that individual participants have the greatest influence on others in social networks in comparison with other sources of influence [<xref ref-type="bibr" rid="ref-5">5</xref>]. In addition, social influence has been defined as the phenomenon that induces interactive behavior based on interactions between two nodes [<xref ref-type="bibr" rid="ref-6">6</xref>,<xref ref-type="bibr" rid="ref-7">7</xref>]. In other words, influential user&#x2019;s exhibit high competence in discriminating between highly cited and less cited articles [<xref ref-type="bibr" rid="ref-8">8</xref>]. Active learning method provide more efficient learning of supervised relation extraction models [<xref ref-type="bibr" rid="ref-9">9</xref>].</p>
</sec>
<sec id="s2_2">
<label>2.2</label>
<title>Information Diffusion</title>
<p>Information diffusion predicts user interest based on several aspects, such as information sharing, ideas, and their interests in different OSN [<xref ref-type="bibr" rid="ref-10">10</xref>,<xref ref-type="bibr" rid="ref-11">11</xref>]. In this context, two-phase diffusion proposes an effective algorithm for identifying the individuals in the diffusion model [<xref ref-type="bibr" rid="ref-12">12</xref>]. Strong interaction links show which users were influenced and who motivated their activities based on social interaction. The model determines the source of influence by identifying users with whom the subjects of the analysis have shared more information in a network [<xref ref-type="bibr" rid="ref-13">13</xref>]. Another method of determining interdisciplinary influence is measure based on user connections with neighbors [<xref ref-type="bibr" rid="ref-14">14</xref>].</p>
<p>In the Independent Cascade model, each edge is interconnected with an influence probability that specifies the probability with which the source node influences the target node [<xref ref-type="bibr" rid="ref-15">15</xref>,<xref ref-type="bibr" rid="ref-16">16</xref>]. If the source node successfully influences the neighbor nodes, then the newly activated nodes remain activated in the information diffusion process [<xref ref-type="bibr" rid="ref-17">17</xref>]. Immediately following activation at a particular time step, each node gets exactly one attempt to activate inactive neighbor nodes with a different probability for each neighbor node in the information diffusion process [<xref ref-type="bibr" rid="ref-18">18</xref>,<xref ref-type="bibr" rid="ref-19">19</xref>]. The model represents the interaction link that connects multiple users across the network. Betweenness measures a set of optimal targets for spreading content or information throughout the connected social network [<xref ref-type="bibr" rid="ref-20">20</xref>].</p>
</sec>
<sec id="s2_3">
<label>2.3</label>
<title>Community Detection</title>
<p>Community detection is crucial in analyzing the concept of entropy, measures network information and unknown information, such as efficient modules and topological structures in complex networks [<xref ref-type="bibr" rid="ref-21">21</xref>,<xref ref-type="bibr" rid="ref-22">22</xref>]. Furthermore, community detection can be used to identify clusters with closely connected nodes, to ensure that nodes with higher similarity are partitioned into the same group [<xref ref-type="bibr" rid="ref-23">23</xref>,<xref ref-type="bibr" rid="ref-24">24</xref>]. The dynamic principle involved in this type of detection is that a community often comprises several weak cliques instead of cliques in complex networks, especially those networks that lack a clear community structure [<xref ref-type="bibr" rid="ref-25">25</xref>,<xref ref-type="bibr" rid="ref-26">26</xref>]. In general, computation models formalize the individual properties, interaction, and communication between individuals in a dynamic network [<xref ref-type="bibr" rid="ref-27">27</xref>,<xref ref-type="bibr" rid="ref-28">28</xref>].</p>
<p>In OSN, focus must be placed on particular cases of information diffusion, such as portions of information or popular topics that diffuse the most, the prospective path of information diffusion, and the primary members of networks involved in spreading information [<xref ref-type="bibr" rid="ref-29">29</xref>,<xref ref-type="bibr" rid="ref-30">30</xref>]. However, the edges in the inter-community are denser than those in the intra-community edges. Thus, identifying community structures without prior knowledge about the number of communities is difficult [<xref ref-type="bibr" rid="ref-31">31</xref>]. Furthermore, quantifying the strength of social ties and identifying the strong relationships between features and neighbor nodes is even more challenging [<xref ref-type="bibr" rid="ref-32">32</xref>,<xref ref-type="bibr" rid="ref-33">33</xref>].</p>
<p>Most existing studies deal with the neighbor node interactive activities that participate in the information diffusion process. In this diffusion process, information-sharing among the neighbor nodes through node interaction stops as soon as activation ends. Therefore, influential user activities must be identified across the network in the influential information diffusion model. In the information diffusion process, users interact with each other by gaining knowledge and sharing information among themselves, thereby leading to the formation of a multilayer network. In addition, misinformation in the diffusion model and its propagation, which is a deciding factor in content popularity, must be studied. Thus, the influential heterogeneous community structure is identified for a multilayer network.</p>
</sec>
</sec>
<sec id="s3">
<label>3</label>
<title>Proposed System</title>
<p>The proposed model comprises four phases: in the first and second phases influential users and their corresponding community structures in Facebook and Twitter are identified. The third and fourth phases are the information intervention and information diffusion phase. Facebook and Twitter network construction includes node identification based on user activity and link creation based on the interactions between them. The hyper-edges that exist between inter-community and intra-community helps to identify influential users in the Facebook community structure by extracting multiple relationships between the users. In the third phase of the information cascade model, input is received from the Facebook community structure. Based on the input, the social contagion score and misinformation diffusivity in the extracted communities are determined, following which the communities are ranked.</p>
<p>The K-clan method identifies influential users in the Twitter community structure which is used as input to the information diffusion phase. In the fourth phase the output of social contagion helps to activate the influential users in the multilayer network and to construct a superimposition network. The influential information diffusion model is thus useful for determining the diffusion of innovation in a multilayer network and identifying the influential communities for a multilayer network. The architecture of the proposed system is shown in <xref ref-type="fig" rid="fig-1">Fig. 1</xref>.</p>
<fig id="fig-1">
<label>Figure 1</label>
<caption>
<title>Architecture of the proposed system</title></caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="IASC_34019-fig-1.png"/>
</fig>
<sec id="s3_1">
<label>3.1</label>
<title>Facebook Network Construction</title>
<p>Facebook data such as likes, shares, comments, and messages are extracted from Facebook in JSON format. Subsequently, the JSON file is converted to a CSV file. The user activity is built from the social graph where the nodes represent the users and the edges represent their activities [<xref ref-type="bibr" rid="ref-34">34</xref>]. Thus, a graph is constructed for the Facebook data and communities identified. The hyper-edge detected in the existing inter-communities and intra-communities is identified. The degree centrality of a user v is defined in terms of the number of incident edges it possesses.<disp-formula id="eqn-1"><label>(1)</label>
<mml:math id="mml-eqn-1" display="block"><mml:msub><mml:mrow><mml:mi mathvariant="normal">C</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="normal">D</mml:mi></mml:mrow></mml:msub><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi mathvariant="normal">v</mml:mi></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mrow><mml:mspace width="thickmathspace" /></mml:mrow><mml:mo>=</mml:mo><mml:mrow><mml:mspace width="thickmathspace" /><mml:mspace width="thickmathspace" /></mml:mrow><mml:msubsup><mml:mrow><mml:mo movablelimits="false">&#x2211;</mml:mo></mml:mrow><mml:mrow><mml:mrow><mml:mi mathvariant="normal">i</mml:mi></mml:mrow><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mi mathvariant="normal">n</mml:mi></mml:mrow></mml:msubsup><mml:mo>&#x2061;</mml:mo><mml:mrow><mml:mi mathvariant="normal">e</mml:mi><mml:mspace width="thickmathspace" /></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:msub><mml:mrow><mml:mi mathvariant="normal">u</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="normal">i</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:mspace width="thickmathspace" /><mml:msub><mml:mrow><mml:mi mathvariant="normal">v</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="normal">i</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:math>
</disp-formula>where e(u<sub>i</sub>, v<sub>i</sub>) &#x003D; 1, if the users u<sub>i</sub> and v<sub>i</sub> are connected, i.e., an edge exists between them</p>
<p>&#x2003;&#x2003;&#x2003;&#x2003; &#x2003; &#x003D; 0, otherwise</p>
<p>The degree centrality calculated for the Facebook network is based on the structural property from <xref ref-type="disp-formula" rid="eqn-1">Eq. (1)</xref>. Communities are identified on Facebook based on clusters. A group of users is identified using community detection extraction as shown in Algorithm 1.</p>
<fig id="fig-6">
<graphic mimetype="image" mime-subtype="png" xlink:href="IASC_34019-fig-6.png"/>
</fig>
<p>User influence is determined using modularity or community membership. Influential users are identified from the Facebook community structure. Generally, each of these communities mutually overlap depending on the user similarities evaluated, which are described in Section 3.3.</p>
</sec>
<sec id="s3_2">
<label>3.2</label>
<title>Twitter Network Construction</title>
<p>Twitter data pre-processing includes the user activities like tweets and re-tweets in JSON format. Subsequently, the JSON file converts into a CSV file. The influential nodes identify by determining the most commonly searched keywords by Facebook users. Finally, identifying the user activities to construct graphs and extract Twitter communities based on similar user activities within the network. However, the outcomes of social interaction depend on all the users [<xref ref-type="bibr" rid="ref-35">35</xref>]. In this context, the number of influential individuals helps to determine shared user interests based on the social interaction between users [<xref ref-type="bibr" rid="ref-36">36</xref>]. Thus, social interaction measures using degree centrality based on the structural property from <xref ref-type="disp-formula" rid="eqn-1">Eq. (1)</xref>.</p>
<p>The influential user interactions identify from the Twitter community structure [<xref ref-type="bibr" rid="ref-37">37</xref>]. Social cohesiveness represents the interaction between user activities. To determine social cohesiveness, the maximum number of interactions in the connected networks is extracted using the k-clan method, which is described in Section 3.4.</p>
</sec>
<sec id="s3_3">
<label>3.3</label>
<title>Information Intervention Phase</title>
<p>Identifying the most influential spreaders within a social network is a critical task for ensuring the efficient information diffusion process. The purpose of studying information diffusion in dynamic social networks is to present a global view of familiar or popular topics in the future. Thus, the study of these networks considers the activation of multiple layered networks in the process of information diffusion. The Facebook community structure output is taken as the input of the third, or information intervention phase. By determining the probability of social contagion score for inter-community and intra-community structures can be more easily extracted. Finally, the misinformation is extracted and community ranking is determined.</p>
<sec id="s3_3_1">
<label>3.3.1</label>
<title>Information Cascade Model</title>
<p>An OSN is assumed to be a closed world where the information spreads because of informational cascades, i.e., the path followed by a portion of information in the network (diffusion graph). In the information spreading process each node is designated as activated or inactivated. The process of propagation, which is observed as a continuous activation of nodes throughout the networks, is called the activation sequence.</p>
<p>Influence Probability <underline>p<sub>uv</sub></underline> denotes the probability with which an initial user u influences another user v. The diffusion begins at time step 0, in each time step the user is influenced by the previous time step while attempting to influence their neighbors and succeeds or fails based on the influence probabilities associated with the edges. Subsequently, the influenced neighbors successfully become recently activated users and stay activated for the rest of the diffusion. On activation at a particular time step, a user u has exactly one attempt to activate each of its inactive neighbors with a probability p<sub>uv</sub> for each neighbor v. The diffusion ends when no further users are activated.</p>
</sec>
<sec id="s3_3_2">
<label>3.3.2</label>
<title>Social Contagion</title>
<p>Social influence and user similarity are the features that represent the user&#x2019;s interest and can be used to predict user behavior in the future. Thus, identifying the contagion in the individual user attitudes that affects social attitudes toward the intervention, can help to identify the social influence [<xref ref-type="bibr" rid="ref-38">38</xref>]. Furthermore, the influencing node is assumed to be the node that can adopt the cascade, which spreads to inactive nodes and activates them. The contagions are those groups of nodes that are not activated and are also closer to the epidemic of the influential nodes [<xref ref-type="bibr" rid="ref-39">39</xref>].</p>
<p>In addition, social contagion identifies inactive users in the network who become activated by re-sharing information and spreads the information within the community structure. This increase in information sharing leads to stronger interaction within a larger group. In other words, social contagion is higher when similar interests are shared in the intra-communities, and lower when dissimilar interests are shared in the inter-communities. Let us assume a complex network with N nodes (users), where each node i represents the activity x<sub>i</sub>(t) following the rate equation as<disp-formula id="eqn-2"><label>(2)</label>
<mml:math id="mml-eqn-2" display="block"><mml:mstyle displaystyle="true" scriptlevel="0"><mml:mrow><mml:mfrac><mml:mrow><mml:mrow><mml:mi mathvariant="normal">d</mml:mi></mml:mrow><mml:msub><mml:mrow><mml:mi mathvariant="normal">x</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="normal">i</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mrow><mml:mrow><mml:mi mathvariant="normal">d</mml:mi><mml:mi mathvariant="normal">t</mml:mi></mml:mrow></mml:mrow></mml:mfrac></mml:mrow><mml:mrow><mml:mspace width="thickmathspace" /></mml:mrow><mml:mo>=</mml:mo><mml:mrow><mml:mspace width="thickmathspace" /><mml:mi mathvariant="normal">W</mml:mi></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:msub><mml:mrow><mml:mi mathvariant="normal">x</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="normal">i</mml:mi></mml:mrow></mml:msub><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi mathvariant="normal">t</mml:mi></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>+</mml:mo><mml:mrow><mml:mspace width="thickmathspace" /></mml:mrow><mml:msubsup><mml:mrow><mml:mo movablelimits="false">&#x2211;</mml:mo></mml:mrow><mml:mrow><mml:mrow><mml:mi mathvariant="normal">j</mml:mi></mml:mrow><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mi mathvariant="normal">N</mml:mi></mml:mrow></mml:msubsup><mml:mo>&#x2061;</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="normal">A</mml:mi></mml:mrow><mml:mrow><mml:mrow><mml:mi mathvariant="normal">i</mml:mi><mml:mi mathvariant="normal">j</mml:mi></mml:mrow></mml:mrow></mml:msub><mml:mrow><mml:mi mathvariant="normal">Q</mml:mi><mml:mspace width="thickmathspace" /></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:msub><mml:mrow><mml:mi mathvariant="normal">x</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="normal">i</mml:mi></mml:mrow></mml:msub><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi mathvariant="normal">t</mml:mi></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>,</mml:mo><mml:mspace width="thickmathspace" /><mml:mrow><mml:mspace width="thickmathspace" /></mml:mrow><mml:msub><mml:mrow><mml:mi mathvariant="normal">x</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="normal">j</mml:mi></mml:mrow></mml:msub><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi mathvariant="normal">t</mml:mi></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mspace width="thickmathspace" /></mml:mstyle></mml:math>
</disp-formula></p>
<p><xref ref-type="disp-formula" rid="eqn-2">Eq. (2)</xref> represents the dynamical model and gives a general deterministic description for pair-wise interactions. W(x<sub>i</sub>(t)) represents the node i self-dynamics. <inline-formula id="ieqn-1">
<mml:math id="mml-ieqn-1"><mml:msubsup><mml:mrow><mml:mo movablelimits="false">&#x2211;</mml:mo></mml:mrow><mml:mrow><mml:mrow><mml:mi mathvariant="normal">j</mml:mi></mml:mrow><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mi mathvariant="normal">N</mml:mi></mml:mrow></mml:msubsup><mml:mo>&#x2061;</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="normal">A</mml:mi></mml:mrow><mml:mrow><mml:mrow><mml:mi mathvariant="normal">i</mml:mi><mml:mi mathvariant="normal">j</mml:mi></mml:mrow></mml:mrow></mml:msub><mml:mrow><mml:mi mathvariant="normal">Q</mml:mi><mml:mspace width="thickmathspace" /></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:msub><mml:mrow><mml:mi mathvariant="normal">x</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="normal">i</mml:mi></mml:mrow></mml:msub><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi mathvariant="normal">t</mml:mi></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>,</mml:mo><mml:mspace width="thickmathspace" /><mml:mrow><mml:mspace width="thickmathspace" /></mml:mrow><mml:msub><mml:mrow><mml:mi mathvariant="normal">x</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="normal">j</mml:mi></mml:mrow></mml:msub><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi mathvariant="normal">t</mml:mi></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mspace width="thickmathspace" /></mml:math>
</inline-formula> is the interaction between node i along with its neighbor node. A<sub>ij</sub> is the adjacency matrix and Q (x<sub>i</sub>(t), x<sub>j</sub>(t)) represents the dynamic mechanism of the pair-wise interactions, when x<sub>i</sub> provides the corresponding actual meaning. In epidemic processes, x<sub>i</sub> represents the contagion probability.</p>
</sec>
<sec id="s3_3_3">
<label>3.3.3</label>
<title>Misinformation Diffusivity</title>
<p>In the case of misinformation diffusion, information does not spread properly across the network and results in the propagation of misinformation, which plays an important role in the diffusion process. Consequently, the absolute quantity of interactions with misinformation remains significant and may not fully capture the trending communities. Therefore, the least square method is used to fit the distribution of misinformation in the communities. It is a statistical procedure to determine the best fit for the set of users who belong to the intra-communities and inter-communities and predict user behavior depending on user activity [<xref ref-type="bibr" rid="ref-40">40</xref>]. To be precise, similar interests will fit in the intra-community, whereas dissimilar interests will fit in the inter-community.</p>
</sec>
<sec id="s3_3_4">
<label>3.3.4</label>
<title>Ranking Communities</title>
<p>The capability of nodes to spread information across the network is ranked based on the neighbor nodes that perform in the diffusion process [<xref ref-type="bibr" rid="ref-41">41</xref>]. The collected misinformation is used to rank them within the communities. Community ranking in the information cascade model is performed to identify the influential information spreader, which also helps to classify influential spreaders in the intervention process.</p>
</sec>
</sec>
<sec id="s3_4">
<label>3.4</label>
<title>Information Diffusion Phase</title>
<p>The community structure output of the second phase is taken as the input for the fourth, or information diffusion phase. The social contagion output helps to activate the node in a multilayer network. Subsequently, community ranking helps to identify the changes in user behavior in the influential information diffusion process.</p>
<sec id="s3_4_1">
<label>3.4.1</label>
<title>Activation of Multilayer Network</title>
<p>In multilayer networks, distinct entities are connected via different social interactions. Community detection identifies structurally similar pairs in multilayer networks by grouping them together. It is based on the interaction between distinct entities, which groups the Facebook and Twitter data using a multilayer network model that optimally captures the overlapping community structure in the network. Furthermore, considering that the users adopting information shared in the multilayer network play a significant role in activating the users in the network, the interactions and mutual impact of these unique connections must be faithfully captured. Finally, the Fraction of Intra/Inter-Layer diffusion score is used to evaluate the IID model for a multilayer network, which is discussed with the results in Section 4.3.1.</p>
</sec>
<sec id="s3_4_2">
<label>3.4.2</label>
<title>Construct Superimposition Network</title>
<p>Social influence is wielded by users through social interactions with other participants by sharing information, opinion, or decisions in the network [<xref ref-type="bibr" rid="ref-42">42</xref>]. The social distance value is less for a higher level of social influence and vice-versa. Accordingly, the social distance value will be lower in the intra-community structure, whereas it will be greater in the inter-community structure, which can be attributed to the presence of more influential users with less social distance value in the network. In this situation, a multilayer network is optimal for handling the dynamic network model.</p>
</sec>
<sec id="s3_4_3">
<label>3.4.3</label>
<title>Influential Information Diffusion Model (IID)</title>
<p>The similarity between the two networks is determined using the subgraph of overlapping community structures in Twitter and Facebook. Influential nodes are detected using fixed attributes that belong to user activities in the social network. The top-k influential node is typically the one that spreads the most information in each community [<xref ref-type="bibr" rid="ref-43">43</xref>]. Thus, the IID model visualizes the community structure for multiple networks. The proposed IID model spreads the influential information, which helps to identify the influential communities in a multilayer network. The diffusion degree centrality of a user v is defined as<disp-formula id="eqn-3"><label>(3)</label>
<mml:math id="mml-eqn-3" display="block"><mml:msub><mml:mrow><mml:mi mathvariant="normal">C</mml:mi></mml:mrow><mml:mrow><mml:mrow><mml:mi mathvariant="normal">D</mml:mi><mml:mi mathvariant="normal">D</mml:mi></mml:mrow></mml:mrow></mml:msub><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi mathvariant="normal">v</mml:mi></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:msub><mml:mrow><mml:mo movablelimits="false">&#x2211;</mml:mo></mml:mrow><mml:mrow><mml:mrow><mml:mi mathvariant="normal">u</mml:mi></mml:mrow><mml:mrow><mml:mrow><mml:mi mathvariant="normal">&#x03F5;</mml:mi></mml:mrow></mml:mrow><mml:mrow><mml:mi mathvariant="normal">&#x0393;</mml:mi></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi mathvariant="normal">v</mml:mi></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:mrow></mml:msub><mml:mo>&#x2061;</mml:mo><mml:mrow><mml:mo>{</mml:mo><mml:mrow><mml:mrow><mml:mspace width="thickmathspace" /></mml:mrow><mml:msub><mml:mrow><mml:mrow><mml:mi mathvariant="normal">&#x03BB;</mml:mi></mml:mrow></mml:mrow><mml:mrow><mml:mrow><mml:mi mathvariant="normal">u</mml:mi></mml:mrow><mml:mo>,</mml:mo><mml:mrow><mml:mi mathvariant="normal">v</mml:mi></mml:mrow></mml:mrow></mml:msub><mml:mo>+</mml:mo><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mrow><mml:mspace width="thickmathspace" /></mml:mrow><mml:msub><mml:mrow><mml:mrow><mml:mi mathvariant="normal">&#x03BB;</mml:mi></mml:mrow></mml:mrow><mml:mrow><mml:mrow><mml:mi mathvariant="normal">u</mml:mi></mml:mrow><mml:mo>,</mml:mo><mml:mrow><mml:mi mathvariant="normal">v</mml:mi></mml:mrow></mml:mrow></mml:msub><mml:mrow><mml:mi mathvariant="normal">x</mml:mi><mml:mspace width="thickmathspace" /></mml:mrow><mml:msub><mml:mrow><mml:mo movablelimits="false">&#x2211;</mml:mo></mml:mrow><mml:mrow><mml:mrow><mml:mi mathvariant="normal">i</mml:mi></mml:mrow><mml:mrow><mml:mrow><mml:mi mathvariant="normal">&#x03F5;</mml:mi></mml:mrow></mml:mrow><mml:mrow><mml:mi mathvariant="normal">&#x0393;</mml:mi></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi mathvariant="normal">v</mml:mi></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:mrow></mml:msub><mml:mo>&#x2061;</mml:mo><mml:msub><mml:mrow><mml:mrow><mml:mi mathvariant="normal">&#x03BB;</mml:mi></mml:mrow></mml:mrow><mml:mrow><mml:mrow><mml:mi mathvariant="normal">i</mml:mi></mml:mrow><mml:mo>,</mml:mo><mml:mrow><mml:mi mathvariant="normal">v</mml:mi></mml:mrow></mml:mrow></mml:msub><mml:mrow><mml:mspace width="thickmathspace" /></mml:mrow></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:mrow><mml:mo>}</mml:mo></mml:mrow></mml:math>
</disp-formula>where &#x0393;(v) denotes the neighbor set of <italic>v</italic> and &#x03BB;<sub>u,v</sub> denotes the propagation probability of user v influencing user u. <xref ref-type="disp-formula" rid="eqn-3">Eq. (3)</xref> incorporates the property of information diffusion along with structural information.</p>
</sec>
<sec id="s3_4_4">
<label>3.4.4</label>
<title>Diffusion of Innovation</title>
<p>The influence of social consensus information can change individual preferences with respect to mingling with minority group members, even beyond the intervention phase [<xref ref-type="bibr" rid="ref-44">44</xref>]. Furthermore, for an innovation to be adopted, it must have certain qualities [<xref ref-type="bibr" rid="ref-45">45</xref>]. Thus, social consensus information influences the individual&#x2019;s exact opinions through their attitudes [<xref ref-type="bibr" rid="ref-46">46</xref>].</p>
<p>The diffusion of innovation model identifies trending communities, thereby determining the changes in user interest across the networks. The rate depends on the performance of the spread of innovative information and affects the potential user spread that has not yet influenced the spreader. The rate at which the number of adopters changes with time in given in <xref ref-type="disp-formula" rid="eqn-4">Eq. (4)</xref><disp-formula id="eqn-4"><label>(4)</label>
<mml:math id="mml-eqn-4" display="block"><mml:mstyle displaystyle="true" scriptlevel="0"><mml:mrow><mml:mfrac><mml:mrow><mml:mrow><mml:mi mathvariant="normal">d</mml:mi><mml:mi mathvariant="normal">A</mml:mi></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi mathvariant="normal">t</mml:mi></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:mrow><mml:mrow><mml:mrow><mml:mi mathvariant="normal">d</mml:mi><mml:mi mathvariant="normal">t</mml:mi></mml:mrow></mml:mrow></mml:mfrac></mml:mrow><mml:mo>=</mml:mo><mml:mrow><mml:mi mathvariant="normal">i</mml:mi></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi mathvariant="normal">t</mml:mi></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mrow><mml:mo>[</mml:mo><mml:mrow><mml:mrow><mml:mi mathvariant="normal">P</mml:mi></mml:mrow><mml:mo>&#x2212;</mml:mo><mml:mrow><mml:mi mathvariant="normal">A</mml:mi></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi mathvariant="normal">t</mml:mi></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:mrow><mml:mo>]</mml:mo></mml:mrow></mml:mstyle></mml:math>
</disp-formula>where A(t) is the total number of users that adopted the innovation until time t, i(t) is the coefficient of diffusion innovativeness of information spread, and P denotes the number of potential users.</p>
<p>The challenge in visualizing multilayer graphs is that multiple edges between two nodes may be plotted atop each other, thereby making them impossible to be discerned [<xref ref-type="bibr" rid="ref-47">47</xref>,<xref ref-type="bibr" rid="ref-48">48</xref>]. Initially, a community detection graph is constructed for the two social media sites. Thus, multilayer network visualization can be achieved for both the Facebook and Twitter data. The influential users are used to characterize the behavior of information spread within the network. Furthermore, the influential trending communities are identified from the shared information of the influential users in the multilayer network.</p>
</sec>
</sec>
</sec>
<sec id="s4">
<label>4</label>
<title>Results</title>
<p>The experiment was performed using the proposed method over two real-world datasets, which was subsequently compared with six existing methods: Social Influence Model (SI), Susceptible View Forward Removed Model (SVFR), Susceptible/Infective/Recovered (SIR) model, Fully Adaptive Cross Entropy Method (FACE), Hydrodynamic information diffusion prediction (Hydro<bold>-</bold>IDP) and Unknown-View-Share-Removed (UVSR) model. The results show that the proposed method exhibited higher accuracy compared with the existing approaches.</p>
<sec id="s4_1">
<label>4.1</label>
<title>Experiment Setup</title>
<sec id="s4_1_1">
<label>4.1.1</label>
<title>Dataset Description</title>
<p>In this section, the proposed system is evaluated and experimental results for the popular social sites are discussed. Social media users typically interact with each other by sharing or exchanging information. Thus, data from Facebook and Twitter are using extracted using graph API Streams. Not only are these API streams valid as common data for pre-processing, they can also be effectively interpreted to achieve graph data. User influence in the social network is analyzed in terms of participation, content sharing, popularity, and activity. The statistical properties of datasets are summarized in <xref ref-type="table" rid="table-1">Table 1</xref>.</p>
<table-wrap id="table-1"><label>Table 1</label>
<caption>
<title>Features of datasets</title></caption>
<table><colgroup><col align="left"/><col align="left"/><col align="left"/>
</colgroup>
<thead>
<tr>
<th align="left">Property</th>
<th align="left">Facebook</th>
<th align="left">Twitter</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left">Nodes</td>
<td align="left">89527</td>
<td align="left">108493</td>
</tr>
<tr>
<td align="left">Edges</td>
<td align="left">145772</td>
<td align="left">1048576</td>
</tr>
<tr>
<td align="left">Degree centrality C<sub>D</sub>(v)</td>
<td align="left">10.958</td>
<td align="left">4.491</td>
</tr>
<tr>
<td align="left">Diffusion degree centrality C<sub>DD</sub>(v)</td>
<td align="left">254.779</td>
<td align="left">123.197</td>
</tr>
<tr>
<td align="left">Avg. clustering coefficient</td>
<td align="left">0.068</td>
<td align="left">0.787</td>
</tr>
<tr>
<td align="left">Modularity</td>
<td align="left">0.7535</td>
<td align="left">0.8639</td>
</tr>
<tr>
<td align="left">No. of communities</td>
<td align="left">38</td>
<td align="left">45</td>
</tr>
<tr>
<td align="left">Trending communities</td>
<td align="left">25</td>
<td align="left">36</td>
</tr>
<tr>
<td align="left">Information cascade</td>
<td align="left">0.678</td>
<td align="left">0.7438</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="s4_1_2">
<label>4.1.2</label>
<title>Comparison of Proposed Method with Existing Methods</title>
<p>The proposed IID model was compared with six existing methods: SI, SVFR, SIR, FACE, Hydro-IDP and UVSR. The descriptions of the implementation details of these methods are summarized below.</p>
<p><bold>IID:</bold> The influential communities across the network are identified based on the information spread among the communities. Information diffusion plays the major role in identifying the influential interaction. The fraction of intra/inter layer (FIL) helps in measuring the efficiency of the model.</p>
<p><bold>SI</bold> [<xref ref-type="bibr" rid="ref-6">6</xref>]<bold>:</bold> The interactive and non-interactive activities are identified using the top k-influence ranks based on node selection.</p>
<p><bold>SVFR</bold> [<xref ref-type="bibr" rid="ref-7">7</xref>]<bold>:</bold> The three types of user reactions to a message are view, ignore, or forward. The view or forward probability is determined based on the content. However, this method requires a reduction in the time delay in information diffusion.</p>
<p><bold>SIR</bold> [<xref ref-type="bibr" rid="ref-10">10</xref>]<bold>:</bold> An EM algorithm is used to predict the diffusion probabilities. However, this method requires an improvement of its propagation into the independent cascade model.</p>
<p><bold>FACE</bold> [<xref ref-type="bibr" rid="ref-17">17</xref>]<bold>:</bold> The golden selection search algorithm is applied under moderate temporal constraints. This method requires a reduced time taken to spread influence information.</p>
<p><bold>Hydro-IDP</bold> [<xref ref-type="bibr" rid="ref-26">26</xref>]<bold>:</bold> The characteristics of information diffusion are extracted to describe and predict the spreading process of information in OSN. However, the influence and diffusivity on social platforms should be improved.</p>
<p><bold>UVSR</bold> [<xref ref-type="bibr" rid="ref-48">48</xref>]<bold>:</bold> A continuous-time, stochastic model is used in this method to characterize the information diffusion process and understand the topological features and temporal dynamics of information diffusion. In this method, the delay probability of diffusion and speed in viewing and sharing must be improved.</p>
</sec>
</sec>
<sec id="s4_2">
<label>4.2</label>
<title>Experiment Results</title>
<p>This section presents the evaluation of the community detection, influence of information spread, and identification of the trending communities in the social network. The proposed method was applied to two real-world datasets to analyze its effectiveness from the aspects of influence information spread.</p>
<sec id="s4_2_1">
<label>4.2.1</label>
<title>Community Detection</title>
<p>In a social graph, nodes or vertices are described as users or actors and the association between nodes are represented by the activity links or edges between them. Initially, Facebook and Twitter communities are identified in the social graph, and the overlap between communities is determined to identify the influence of persons or groups of persons. The user interaction reveals a friendly relationship and forms an overlapping community structure between Facebook and Twitter data.</p>
<p>Modularity metrics are used to evaluate the community detection capabilities of multilayer networks. The value of modularity <italic>Q</italic> is defined as shown in <xref ref-type="disp-formula" rid="eqn-5">Eq. (5)</xref>.<disp-formula id="eqn-5"><label>(5)</label>
<mml:math id="mml-eqn-5" display="block"><mml:mrow><mml:mi mathvariant="normal">Q</mml:mi></mml:mrow><mml:mo>=</mml:mo><mml:mrow><mml:mspace width="thickmathspace" /></mml:mrow><mml:msubsup><mml:mrow><mml:mo movablelimits="false">&#x2211;</mml:mo></mml:mrow><mml:mrow><mml:mi mathvariant="normal">i</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="normal">k</mml:mi></mml:mrow></mml:msubsup><mml:mo>&#x2061;</mml:mo><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="normal">e</mml:mi></mml:mrow><mml:mrow><mml:mrow><mml:mi mathvariant="normal">i</mml:mi><mml:mi mathvariant="normal">i</mml:mi></mml:mrow></mml:mrow></mml:msub><mml:mrow><mml:mspace width="thickmathspace" /></mml:mrow><mml:mo>&#x2212;</mml:mo><mml:msup><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:msubsup><mml:mrow><mml:mo movablelimits="false">&#x2211;</mml:mo></mml:mrow><mml:mrow><mml:mi mathvariant="normal">i</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="normal">k</mml:mi></mml:mrow></mml:msubsup><mml:mo>&#x2061;</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="normal">e</mml:mi></mml:mrow><mml:mrow><mml:mrow><mml:mi mathvariant="normal">i</mml:mi><mml:mi mathvariant="normal">j</mml:mi></mml:mrow></mml:mrow></mml:msub></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mn>2</mml:mn></mml:msup><mml:mo>)</mml:mo></mml:mrow></mml:math>
</disp-formula>where k denotes the number of communities, <italic>e<sub>ii</sub></italic> is the ratio of the number of edges within the community <italic>i</italic> to the total number of edges in the entire network and <italic>e<sub>ij</sub></italic> is the ratio of the number of edges between communities <italic>i</italic> and <italic>j</italic> to the total number of edges in the entire network [<xref ref-type="bibr" rid="ref-49">49</xref>,<xref ref-type="bibr" rid="ref-50">50</xref>]. The different users identified are potential users, adopted users, and influential users in the information diffusion process for a multilayer network. The modularity <italic>Q</italic> value is calculated for a multilayer network based on the different users in the communities, which is shown in <xref ref-type="fig" rid="fig-2">Fig. 2</xref>.</p>
<fig id="fig-2">
<label>Figure 2</label>
<caption>
<title>Communities comparison based on different networks</title></caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="IASC_34019-fig-2.png"/>
</fig>
</sec>
<sec id="s4_2_2">
<label>4.2.2</label>
<title>Influence Information Spread</title>
<p>In the IID model, active nodes are considered as senders, and the nodes being activated are considered as receivers. On activation, each node has one attempt at activating each of its neighbor nodes in the social graph. A node u has a random threshold &#x03B8;<sub>u</sub> &#x223C; U [0, 1]. Each Neighbor node v influences node u according to a degree centrality C<sub>(D)</sub>u, v as given by <xref ref-type="disp-formula" rid="eqn-6">Eq. (6)</xref><disp-formula id="eqn-6"><label>(6)</label>
<mml:math id="mml-eqn-6" display="block"><mml:mrow><mml:mi mathvariant="normal">I</mml:mi><mml:mi mathvariant="normal">n</mml:mi><mml:mi mathvariant="normal">f</mml:mi><mml:mi mathvariant="normal">l</mml:mi><mml:mi mathvariant="normal">u</mml:mi><mml:mi mathvariant="normal">e</mml:mi><mml:mi mathvariant="normal">n</mml:mi><mml:mi mathvariant="normal">c</mml:mi><mml:mi mathvariant="normal">e</mml:mi><mml:mspace width="thickmathspace" /><mml:mi mathvariant="normal">n</mml:mi><mml:mi mathvariant="normal">o</mml:mi><mml:mi mathvariant="normal">d</mml:mi><mml:mi mathvariant="normal">e</mml:mi><mml:mspace width="thickmathspace" /></mml:mrow><mml:mo>=</mml:mo><mml:mrow><mml:mspace width="thickmathspace" /></mml:mrow><mml:msub><mml:mrow><mml:mo movablelimits="false">&#x2211;</mml:mo></mml:mrow><mml:mrow><mml:mrow><mml:mi mathvariant="normal">v</mml:mi><mml:mspace width="thickmathspace" /><mml:mi mathvariant="normal">n</mml:mi><mml:mi mathvariant="normal">e</mml:mi><mml:mi mathvariant="normal">i</mml:mi><mml:mi mathvariant="normal">g</mml:mi><mml:mi mathvariant="normal">h</mml:mi><mml:mi mathvariant="normal">b</mml:mi><mml:mi mathvariant="normal">o</mml:mi><mml:mi mathvariant="normal">r</mml:mi><mml:mspace width="thickmathspace" /><mml:mi mathvariant="normal">o</mml:mi><mml:mi mathvariant="normal">f</mml:mi><mml:mspace width="thickmathspace" /><mml:mi mathvariant="normal">u</mml:mi></mml:mrow></mml:mrow></mml:msub><mml:mo>&#x2061;</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="normal">C</mml:mi></mml:mrow><mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi mathvariant="normal">D</mml:mi></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:mrow></mml:msub><mml:mrow><mml:mi mathvariant="normal">u</mml:mi></mml:mrow><mml:mo>,</mml:mo><mml:mspace width="thickmathspace" /><mml:mrow><mml:mi mathvariant="normal">v</mml:mi></mml:mrow><mml:mo>&#x2264;</mml:mo><mml:mn>1</mml:mn></mml:math>
</disp-formula></p>
<p>A node u becomes active when the fraction of its active neighbors is at least &#x03B8;<sub>u</sub>, as given by <xref ref-type="disp-formula" rid="eqn-7">Eq. (7)</xref><disp-formula id="eqn-7"><label>(7)</label>
<mml:math id="mml-eqn-7" display="block"><mml:mrow><mml:mi mathvariant="normal">A</mml:mi><mml:mi mathvariant="normal">c</mml:mi><mml:mi mathvariant="normal">t</mml:mi><mml:mi mathvariant="normal">i</mml:mi><mml:mi mathvariant="normal">v</mml:mi><mml:mi mathvariant="normal">e</mml:mi><mml:mspace width="thickmathspace" /><mml:mi mathvariant="normal">n</mml:mi><mml:mi mathvariant="normal">o</mml:mi><mml:mi mathvariant="normal">d</mml:mi><mml:mi mathvariant="normal">e</mml:mi><mml:mspace width="thickmathspace" /></mml:mrow><mml:mo>=</mml:mo><mml:mrow><mml:mspace width="thickmathspace" /></mml:mrow><mml:msub><mml:mrow><mml:mo movablelimits="false">&#x2211;</mml:mo></mml:mrow><mml:mrow><mml:mrow><mml:mi mathvariant="normal">v</mml:mi><mml:mspace width="thickmathspace" /><mml:mi mathvariant="normal">a</mml:mi><mml:mi mathvariant="normal">c</mml:mi><mml:mi mathvariant="normal">t</mml:mi><mml:mi mathvariant="normal">i</mml:mi><mml:mi mathvariant="normal">v</mml:mi><mml:mi mathvariant="normal">e</mml:mi><mml:mspace width="thickmathspace" /><mml:mi mathvariant="normal">n</mml:mi><mml:mi mathvariant="normal">e</mml:mi><mml:mi mathvariant="normal">i</mml:mi><mml:mi mathvariant="normal">g</mml:mi><mml:mi mathvariant="normal">h</mml:mi><mml:mi mathvariant="normal">b</mml:mi><mml:mi mathvariant="normal">o</mml:mi><mml:mi mathvariant="normal">r</mml:mi><mml:mspace width="thickmathspace" /><mml:mi mathvariant="normal">o</mml:mi><mml:mi mathvariant="normal">f</mml:mi><mml:mspace width="thickmathspace" /><mml:mi mathvariant="normal">u</mml:mi></mml:mrow></mml:mrow></mml:msub><mml:mo>&#x2061;</mml:mo><mml:msub><mml:mrow><mml:mi mathvariant="normal">C</mml:mi></mml:mrow><mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi mathvariant="normal">D</mml:mi></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:mrow></mml:msub><mml:mrow><mml:mi mathvariant="normal">u</mml:mi></mml:mrow><mml:mo>,</mml:mo><mml:mspace width="thickmathspace" /><mml:mrow><mml:mi mathvariant="normal">v</mml:mi></mml:mrow><mml:mo>&#x2265;</mml:mo><mml:msub><mml:mrow><mml:mrow><mml:mi mathvariant="normal">&#x03B8;</mml:mi></mml:mrow></mml:mrow><mml:mrow><mml:mi mathvariant="normal">u</mml:mi></mml:mrow></mml:msub></mml:math>
</disp-formula></p>
<p>The spread of information begins with a collection of active nodes and continues until no further activation of nodes is possible. When a user u becomes activated at a particular time step, it has exactly one attempt to activate each of its inactive neighbors with the probability p<sub>uv</sub> for each neighbor v. The diffusion ends when there are no further users that can be activated. Depending on the number of nodes interacting in the network, the degree centrality and active nodes increase, as shown in <xref ref-type="table" rid="table-2">Table 2</xref>.</p>
<table-wrap id="table-2"><label>Table 2</label>
<caption>
<title>Spreading the influence information</title></caption>
<table><colgroup><col align="left"/><col align="left"/><col align="left"/><col align="left"/>
</colgroup>
<thead>
<tr>
<th align="left">No. of nodes</th>
<th align="left">Random threshold &#x03B8;<sub>u</sub></th>
<th align="left">Influenced node C<sub>(D)</sub>u, v</th>
<th align="left">Active node C<sub>(D)</sub>u, v</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left">100</td>
<td align="left">0.5743</td>
<td align="left">0.6503</td>
<td align="left">0.6235</td>
</tr>
<tr>
<td align="left">500</td>
<td align="left">0.6543</td>
<td align="left">0.7245</td>
<td align="left">0.7054</td>
</tr>
<tr>
<td align="left">700</td>
<td align="left">0.7245</td>
<td align="left">0.7525</td>
<td align="left">0.7451</td>
</tr>
<tr>
<td align="left">1000</td>
<td align="left">0.7769</td>
<td align="left">0.7914</td>
<td align="left">0.7854</td>
</tr>
<tr>
<td align="left">2500</td>
<td align="left">0.8214</td>
<td align="left">0.8547</td>
<td align="left">0.8375</td>
</tr>
<tr>
<td align="left">3000</td>
<td align="left">0.8545</td>
<td align="left">0.8853</td>
<td align="left">0.8742</td>
</tr>
<tr>
<td align="left">5000</td>
<td align="left">0.8651</td>
<td align="left">0.9176</td>
<td align="left">0.8963</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>In social networks, an active node denotes that the node was selected to spread the behavior, innovation, or decision. Based on the social influence effect, information can spread across the network through the principles of herd behavior and informational cascade [<xref ref-type="bibr" rid="ref-51">51</xref>,<xref ref-type="bibr" rid="ref-52">52</xref>]. Some topics can become quite popular, spread worldwide, and contribute to new trends.</p>
<p>Finally, the components of an information diffusion method practiced in an OSN can be similar to a discussion of information carried by messages that spread along the edges of the network according to a particular mechanism. The interaction based on specific properties depends on the edges and nodes in the social network [<xref ref-type="bibr" rid="ref-53">53</xref>]. For instance, the most relevant recent activity as well as the weaknesses, strengths, and improvements for each feature must be analyzed, as shown in <xref ref-type="table" rid="table-3">Table 3</xref>.</p>
<table-wrap id="table-3"><label>Table 3</label>
<caption>
<title>Summary of information diffusion w.r.t information used for feature modeling</title></caption>
<table><colgroup><col align="left"/><col align="left"/><col align="left"/><col align="left"/><col align="left"/><col align="left"/><col align="left"/><col align="left"/>
</colgroup>
<thead>
<tr>
<th align="left">Features</th>
<th align="left">Doo et al. [<xref ref-type="bibr" rid="ref-6">6</xref>]</th>
<th align="left">Liu et al. [<xref ref-type="bibr" rid="ref-7">7</xref>]</th>
<th align="left">Saito et al. [<xref ref-type="bibr" rid="ref-10">10</xref>]</th>
<th align="left">Dhamal et al. [<xref ref-type="bibr" rid="ref-17">17</xref>]</th>
<th align="left">Hu et al. [<xref ref-type="bibr" rid="ref-26">26</xref>]</th>
<th align="left">Liu et al. [<xref ref-type="bibr" rid="ref-48">48</xref>]</th>
<th align="left">Proposed</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left">Diffusion</td>
<td align="left">&#x221A;</td>
<td align="left">-</td>
<td align="left">&#x221A;</td>
<td align="left">-</td>
<td align="left">&#x221A;</td>
<td align="left">&#x221A;</td>
<td align="left">&#x221A;</td>
</tr>
<tr>
<td align="left">Network connection</td>
<td align="left">&#x221A;</td>
<td align="left">&#x221A;</td>
<td align="left">&#x221A;</td>
<td align="left">-</td>
<td align="left">&#x221A;</td>
<td align="left">&#x221A;</td>
<td align="left">&#x221A;</td>
</tr>
<tr>
<td align="left">User activities</td>
<td align="left">-</td>
<td align="left">&#x221A;</td>
<td align="left">-</td>
<td align="left">&#x221A;</td>
<td align="left">-</td>
<td align="left">&#x221A;</td>
<td align="left">&#x221A;</td>
</tr>
<tr>
<td align="left">Time delay</td>
<td align="left">-</td>
<td align="left">-</td>
<td align="left">-</td>
<td align="left">&#x221A;</td>
<td align="left">&#x221A;</td>
<td align="left">&#x221A;</td>
<td align="left">-</td>
</tr>
<tr>
<td align="left">Hashtags, URL&#x2019;s mentions</td>
<td align="left">&#x221A;</td>
<td align="left">-</td>
<td align="left">-</td>
<td align="left">-</td>
<td align="left">&#x221A;</td>
<td align="left">-</td>
<td align="left">&#x221A;</td>
</tr>
<tr>
<td align="left">Topic information</td>
<td align="left">&#x221A;</td>
<td align="left">&#x221A;</td>
<td align="left">&#x221A;</td>
<td align="left">-</td>
<td align="left">-</td>
<td align="left">-</td>
<td align="left">-</td>
</tr>
<tr>
<td align="left">Content based similarities</td>
<td align="left">&#x221A;</td>
<td align="left">-</td>
<td align="left">&#x221A;</td>
<td align="left">&#x221A;</td>
<td align="left">-</td>
<td align="left">&#x221A;</td>
<td align="left">&#x221A;</td>
</tr>
<tr>
<td align="left">Facebook dataset</td>
<td align="left">&#x221A;</td>
<td align="left">&#x221A;</td>
<td align="left">&#x221A;</td>
<td align="left">&#x221A;</td>
<td align="left">-</td>
<td align="left">&#x221A;</td>
<td align="left">&#x221A;</td>
</tr>
<tr>
<td align="left">Twitter dataset</td>
<td align="left">-</td>
<td align="left">&#x221A;</td>
<td align="left">-</td>
<td align="left">-</td>
<td align="left">&#x221A;</td>
<td align="left">-</td>
<td align="left">&#x221A;</td>
</tr>
<tr>
<td align="left">Output Type (P/C) (probabilistic/Classifications)</td>
<td align="left">C</td>
<td align="left">P</td>
<td align="left">P</td>
<td align="left">C</td>
<td align="left">C</td>
<td align="left">P</td>
<td align="left">P</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="s4_2_3">
<label>4.2.3</label>
<title>Trending Communities in Multilayer Networks</title>
<p>Identifying the numerous influential spreaders in a social network is critical for ensuring the efficient diffusion of information. For instance, a social media campaign can improve efficiency by targeting the influential individuals who can initiate huge information cascades that will result in more adoptions. The output of user interested communities or the trending communities are shown in <xref ref-type="table" rid="table-1">Table 1</xref>. The communities are ranked based on the extraction of misinformation in the communities, as shown in <xref ref-type="table" rid="table-4">Table 4</xref>.</p>
<table-wrap id="table-4"><label>Table 4</label>
<caption>
<title>Communities score based on the ranking</title></caption>
<table><colgroup><col align="left"/><col align="left"/><col align="left"/><col align="left"/><col align="left"/><col align="left"/><col align="left"/>
</colgroup>
<thead>
<tr>
<th align="left">Communities</th>
<th align="left">Category</th>
<th align="left">No. of users in community</th>
<th align="left">Avg. information cascade</th>
<th align="left">Avg. size</th>
<th align="left">Score</th>
<th align="left">Rank</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left">C12</td>
<td align="left">Environment</td>
<td align="left">1988</td>
<td align="left">0.854</td>
<td align="left">173.16</td>
<td align="left">9.457</td>
<td align="left">1</td>
</tr>
<tr>
<td align="left">C7</td>
<td align="left">News</td>
<td align="left">1875</td>
<td align="left">0.825</td>
<td align="left">117.62</td>
<td align="left">9.296</td>
<td align="left">2</td>
</tr>
<tr>
<td align="left">C5</td>
<td align="left">Sports</td>
<td align="left">1655</td>
<td align="left">0.793</td>
<td align="left">99.18</td>
<td align="left">8.547</td>
<td align="left">3</td>
</tr>
<tr>
<td align="left">C15</td>
<td align="left">Disease</td>
<td align="left">1548</td>
<td align="left">0.764</td>
<td align="left">91.59</td>
<td align="left">8.123</td>
<td align="left">4</td>
</tr>
<tr>
<td align="left">C1</td>
<td align="left">Education</td>
<td align="left">1384</td>
<td align="left">0.748</td>
<td align="left">79.34</td>
<td align="left">7.747</td>
<td align="left">5</td>
</tr>
<tr>
<td align="left">C3</td>
<td align="left">Politics</td>
<td align="left">1158</td>
<td align="left">0.721</td>
<td align="left">67.63</td>
<td align="left">7.475</td>
<td align="left">6</td>
</tr>
<tr>
<td align="left">C8</td>
<td align="left">Product</td>
<td align="left">1058</td>
<td align="left">0.714</td>
<td align="left">62.91</td>
<td align="left">7.245</td>
<td align="left">7</td>
</tr>
<tr>
<td align="left">C11</td>
<td align="left">Music</td>
<td align="left">984</td>
<td align="left">0.685</td>
<td align="left">54.97</td>
<td align="left">6.874</td>
<td align="left">8</td>
</tr>
<tr>
<td align="left">C13</td>
<td align="left">Movie</td>
<td align="left">824</td>
<td align="left">0.667</td>
<td align="left">51.81</td>
<td align="left">6.425</td>
<td align="left">9</td>
</tr>
<tr>
<td align="left">C2</td>
<td align="left">Entertainment</td>
<td align="left">753</td>
<td align="left">0.653</td>
<td align="left">46.83</td>
<td align="left">6.157</td>
<td align="left">10</td>
</tr>
<tr>
<td align="left">C9</td>
<td align="left">Food</td>
<td align="left">633</td>
<td align="left">0.648</td>
<td align="left">40.42</td>
<td align="left">5.925</td>
<td align="left">11</td>
</tr>
<tr>
<td align="left">C14</td>
<td align="left">Hotels</td>
<td align="left">599</td>
<td align="left">0.625</td>
<td align="left">35.03</td>
<td align="left">5.783</td>
<td align="left">12</td>
</tr>
<tr>
<td align="left">C6</td>
<td align="left">Game</td>
<td align="left">524</td>
<td align="left">0.591</td>
<td align="left">30.15</td>
<td align="left">5.642</td>
<td align="left">13</td>
</tr>
<tr>
<td align="left">C4</td>
<td align="left">Travel</td>
<td align="left">453</td>
<td align="left">0.573</td>
<td align="left">25.94</td>
<td align="left">5.124</td>
<td align="left">14</td>
</tr>
<tr>
<td align="left">C10</td>
<td align="left">Photography</td>
<td align="left">409</td>
<td align="left">0.543</td>
<td align="left">23.45</td>
<td align="left">4.784</td>
<td align="left">15</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>The top five ranked communities are C12, C7, C5, C15, and C1 and the categories they belong to are environment, news, sports, disease, and education respectively. These are the topics on which significant diffusion of information occurs. Based on the information cascade that occurs in each of these communities, the score is calculated and the communities are ranked.</p>
<p>The analysis of community interaction behavior shows that the users who join communities determine the factors that are shared among them. These new influential users form the larger group that was analyzed for influential community structure behavior. The trending communities for the multilayer networks of Facebook and Twitter are shown in <xref ref-type="fig" rid="fig-3">Fig. 3</xref>.</p>
<fig id="fig-3">
<label>Figure 3</label>
<caption>
<title>Trending communities for different networks</title></caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="IASC_34019-fig-3.png"/>
</fig>
</sec>
</sec>
<sec id="s4_3">
<label>4.3</label>
<title>Evaluation Metrics</title>
<p>In this section, the ground truth of two real-world datasets is used to evaluate the quality of influence information spread using the evaluation metrics which are discussed below.</p>
<sec id="s4_3_1">
<label>4.3.1</label>
<title>Fraction of Intra/Inter-Layer (FIL)</title>
<p>The FIL is used to measure the spreading of an information cascade within or between the layers of a multilayer network. The FIL score denotes the fraction of user interaction in the diffusion network and the average rate of information cascade over the different layers. Following this, the probability of information diffusion was applied to calculate the FIL diffusion score of information spread from one user to another in the multilayer network. Thus, the trending influential communities are identified using the IID model, and the FIL diffusion score is used to measure the efficiency of the IID model on a different social network. The precision, recall, accuracy, and F-measures evaluated based on the FIL diffusion score are shown in <xref ref-type="table" rid="table-5">Table 5</xref>.</p>
<table-wrap id="table-5"><label>Table 5</label>
<caption>
<title>Different possibilities for information spreading from one layer to another in a multilayer network</title></caption>
<table><colgroup><col align="left"/><col align="left"/><col align="left"/>
</colgroup>
<thead>
<tr>
<th align="left"/>
<th align="left">Same user</th>
<th align="left">Different user</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left">Same layer</td>
<td align="left">Information spreads to the same user on the same layer (<bold>SLSU</bold>)</td>
<td align="left">Information spreads to a different user on the same layer (<bold>SLDU</bold>)</td>
</tr>
<tr>
<td align="left">Different layer</td>
<td align="left">Information spreads to the same user on a different layer (<bold>DLSU</bold>)</td>
<td align="left">Information continues spreading to a different user on a different layer (<bold>DLDU</bold>)</td>
</tr>
</tbody>
</table>
<table-wrap-foot><fn>
<p>Note: SLSU &#x003D; Information spread in a similar layer with similar users leads to a correct positive prediction.</p>
</fn><fn>
<p>SLDU &#x003D; Information spread in a similar layer with dissimilar users leads to an incorrect negative prediction.</p>
</fn><fn>
<p>DLSU &#x003D; Information spread in different layers with similar users leads to an incorrect positive prediction.</p>
</fn><fn>
<p>DLDU &#x003D; Information spread in different layers with dissimilar users leads to a correct negative prediction.</p>
</fn>
</table-wrap-foot>
</table-wrap>
<p><bold><italic>Precision</italic>.</bold> The ratio of the number of similar users in the same layer to the total number of users. It is also called a positive predictive value. The precision value is calculated using <xref ref-type="disp-formula" rid="eqn-8">Eq. (8)</xref>.<disp-formula id="eqn-8"><label>(8)</label>
<mml:math id="mml-eqn-8" display="block"><mml:mrow><mml:mi mathvariant="normal">P</mml:mi><mml:mi mathvariant="normal">r</mml:mi><mml:mi mathvariant="normal">e</mml:mi><mml:mi mathvariant="normal">c</mml:mi><mml:mi mathvariant="normal">i</mml:mi><mml:mi mathvariant="normal">s</mml:mi><mml:mi mathvariant="normal">i</mml:mi><mml:mi mathvariant="normal">o</mml:mi><mml:mi mathvariant="normal">n</mml:mi><mml:mspace width="thickmathspace" /></mml:mrow><mml:mo>=</mml:mo><mml:mstyle displaystyle="true" scriptlevel="0"><mml:mrow><mml:mfrac><mml:mrow><mml:mrow><mml:mo>&#x2211;</mml:mo></mml:mrow><mml:mo>&#x2061;</mml:mo><mml:mi mathvariant="normal">S</mml:mi><mml:mi mathvariant="normal">L</mml:mi><mml:mi mathvariant="normal">S</mml:mi><mml:mi mathvariant="normal">U</mml:mi></mml:mrow><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mrow><mml:mo>&#x2211;</mml:mo></mml:mrow><mml:mo>&#x2061;</mml:mo><mml:mi mathvariant="normal">S</mml:mi><mml:mi mathvariant="normal">L</mml:mi><mml:mi mathvariant="normal">S</mml:mi><mml:mi mathvariant="normal">U</mml:mi><mml:mspace width="thickmathspace" /><mml:mo>+</mml:mo><mml:mrow><mml:mo>&#x2211;</mml:mo></mml:mrow><mml:mo>&#x2061;</mml:mo><mml:mi mathvariant="normal">S</mml:mi><mml:mi mathvariant="normal">L</mml:mi><mml:mi mathvariant="normal">D</mml:mi><mml:mi mathvariant="normal">U</mml:mi></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:mfrac></mml:mrow></mml:mstyle></mml:math>
</disp-formula></p>
<p><bold><italic>Recall</italic></bold>. The ratio of the number of similar users in the same layer to the total number of users in the different layers. It is also called a true positive rate. The recall value is calculated using <xref ref-type="disp-formula" rid="eqn-9">Eq. (9)</xref>.<disp-formula id="eqn-9"><label>(9)</label>
<mml:math id="mml-eqn-9" display="block"><mml:mrow><mml:mi mathvariant="normal">R</mml:mi><mml:mi mathvariant="normal">e</mml:mi><mml:mi mathvariant="normal">c</mml:mi><mml:mi mathvariant="normal">a</mml:mi><mml:mi mathvariant="normal">l</mml:mi><mml:mi mathvariant="normal">l</mml:mi><mml:mspace width="thickmathspace" /></mml:mrow><mml:mo>=</mml:mo><mml:mstyle displaystyle="true" scriptlevel="0"><mml:mrow><mml:mfrac><mml:mrow><mml:mrow><mml:mo>&#x2211;</mml:mo></mml:mrow><mml:mo>&#x2061;</mml:mo><mml:mi mathvariant="normal">S</mml:mi><mml:mi mathvariant="normal">L</mml:mi><mml:mi mathvariant="normal">S</mml:mi><mml:mi mathvariant="normal">U</mml:mi></mml:mrow><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mo>&#x2211;</mml:mo></mml:mrow><mml:mo>&#x2061;</mml:mo><mml:mi mathvariant="normal">S</mml:mi><mml:mi mathvariant="normal">L</mml:mi><mml:mi mathvariant="normal">S</mml:mi><mml:mi mathvariant="normal">U</mml:mi><mml:mspace width="thickmathspace" /><mml:mo>+</mml:mo><mml:mrow><mml:mo>&#x2211;</mml:mo></mml:mrow><mml:mo>&#x2061;</mml:mo><mml:mi mathvariant="normal">D</mml:mi><mml:mi mathvariant="normal">L</mml:mi><mml:mi mathvariant="normal">S</mml:mi><mml:mi mathvariant="normal">U</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:mfrac></mml:mrow></mml:mstyle></mml:math>
</disp-formula></p>
<p><bold><italic>Accuracy</italic>.</bold> The ratio of correctly predicted observations referred to as users in a similar layer to the total observation referred to as the total number of users in different layers. The accuracy value is calculated using <xref ref-type="disp-formula" rid="eqn-10">Eq. (10)</xref>.<disp-formula id="eqn-10"><label>(10)</label>
<mml:math id="mml-eqn-10" display="block"><mml:mrow><mml:mi mathvariant="normal">A</mml:mi><mml:mi mathvariant="normal">c</mml:mi><mml:mi mathvariant="normal">c</mml:mi><mml:mi mathvariant="normal">u</mml:mi><mml:mi mathvariant="normal">r</mml:mi><mml:mi mathvariant="normal">a</mml:mi><mml:mi mathvariant="normal">c</mml:mi><mml:mi mathvariant="normal">y</mml:mi><mml:mspace width="thickmathspace" /></mml:mrow><mml:mo>=</mml:mo><mml:mstyle displaystyle="true" scriptlevel="0"><mml:mrow><mml:mfrac><mml:mrow><mml:mrow><mml:mo>&#x2211;</mml:mo></mml:mrow><mml:mo>&#x2061;</mml:mo><mml:mi mathvariant="normal">S</mml:mi><mml:mi mathvariant="normal">L</mml:mi><mml:mi mathvariant="normal">S</mml:mi><mml:mi mathvariant="normal">U</mml:mi><mml:mo>+</mml:mo><mml:mrow><mml:mspace width="thickmathspace" /></mml:mrow><mml:mrow><mml:mo>&#x2211;</mml:mo></mml:mrow><mml:mo>&#x2061;</mml:mo><mml:mi mathvariant="normal">D</mml:mi><mml:mi mathvariant="normal">L</mml:mi><mml:mi mathvariant="normal">D</mml:mi><mml:mi mathvariant="normal">U</mml:mi></mml:mrow><mml:mrow><mml:mrow><mml:mrow><mml:mo>&#x2211;</mml:mo></mml:mrow><mml:mo>&#x2061;</mml:mo><mml:mi mathvariant="normal">S</mml:mi><mml:mi mathvariant="normal">L</mml:mi><mml:mi mathvariant="normal">S</mml:mi><mml:mi mathvariant="normal">U</mml:mi></mml:mrow><mml:mo>+</mml:mo><mml:mrow><mml:mspace width="thickmathspace" /></mml:mrow><mml:mrow><mml:mo>&#x2211;</mml:mo></mml:mrow><mml:mo>&#x2061;</mml:mo><mml:mi mathvariant="normal">S</mml:mi><mml:mi mathvariant="normal">L</mml:mi><mml:mi mathvariant="normal">D</mml:mi><mml:mi mathvariant="normal">U</mml:mi><mml:mo>+</mml:mo><mml:mrow><mml:mspace width="thickmathspace" /></mml:mrow><mml:mrow><mml:mo>&#x2211;</mml:mo></mml:mrow><mml:mo>&#x2061;</mml:mo><mml:mi mathvariant="normal">D</mml:mi><mml:mi mathvariant="normal">L</mml:mi><mml:mi mathvariant="normal">S</mml:mi><mml:mi mathvariant="normal">U</mml:mi><mml:mo>+</mml:mo><mml:mrow><mml:mspace width="thickmathspace" /></mml:mrow><mml:mrow><mml:mo>&#x2211;</mml:mo></mml:mrow><mml:mo>&#x2061;</mml:mo><mml:mi mathvariant="normal">D</mml:mi><mml:mi mathvariant="normal">L</mml:mi><mml:mi mathvariant="normal">D</mml:mi><mml:mi mathvariant="normal">U</mml:mi></mml:mrow></mml:mfrac></mml:mrow></mml:mstyle></mml:math>
</disp-formula></p>
<p><bold><italic>F measure.</italic></bold> The F1 score is used to consolidate precision and recall into one measure; the F1 measure is calculated using <xref ref-type="disp-formula" rid="eqn-11">Eq. (11)</xref>.<disp-formula id="eqn-11"><label>(11)</label>
<mml:math id="mml-eqn-11" display="block"><mml:mrow><mml:mi mathvariant="normal">F</mml:mi><mml:mi mathvariant="normal">m</mml:mi><mml:mi mathvariant="normal">e</mml:mi><mml:mi mathvariant="normal">a</mml:mi><mml:mi mathvariant="normal">s</mml:mi><mml:mi mathvariant="normal">u</mml:mi><mml:mi mathvariant="normal">r</mml:mi><mml:mi mathvariant="normal">e</mml:mi><mml:mo>=</mml:mo><mml:mn>2</mml:mn></mml:mrow><mml:mo>&#x00D7;</mml:mo><mml:mstyle displaystyle="true" scriptlevel="0"><mml:mrow><mml:mfrac><mml:mrow><mml:mrow><mml:mi mathvariant="normal">P</mml:mi><mml:mi mathvariant="normal">r</mml:mi><mml:mi mathvariant="normal">e</mml:mi><mml:mi mathvariant="normal">c</mml:mi><mml:mi mathvariant="normal">i</mml:mi><mml:mi mathvariant="normal">s</mml:mi><mml:mi mathvariant="normal">i</mml:mi><mml:mi mathvariant="normal">o</mml:mi><mml:mi mathvariant="normal">n</mml:mi><mml:mo>&#x2217;</mml:mo><mml:mspace width="thickmathspace" /><mml:mi mathvariant="normal">R</mml:mi><mml:mi mathvariant="normal">e</mml:mi><mml:mi mathvariant="normal">c</mml:mi><mml:mi mathvariant="normal">a</mml:mi><mml:mi mathvariant="normal">l</mml:mi><mml:mi mathvariant="normal">l</mml:mi></mml:mrow></mml:mrow><mml:mrow><mml:mrow><mml:mi mathvariant="normal">P</mml:mi><mml:mi mathvariant="normal">r</mml:mi><mml:mi mathvariant="normal">e</mml:mi><mml:mi mathvariant="normal">c</mml:mi><mml:mi mathvariant="normal">i</mml:mi><mml:mi mathvariant="normal">s</mml:mi><mml:mi mathvariant="normal">i</mml:mi><mml:mi mathvariant="normal">o</mml:mi><mml:mi mathvariant="normal">n</mml:mi><mml:mspace width="thickmathspace" /></mml:mrow><mml:mo>+</mml:mo><mml:mrow><mml:mspace width="thickmathspace" /><mml:mi mathvariant="normal">R</mml:mi><mml:mi mathvariant="normal">e</mml:mi><mml:mi mathvariant="normal">c</mml:mi><mml:mi mathvariant="normal">a</mml:mi><mml:mi mathvariant="normal">l</mml:mi><mml:mi mathvariant="normal">l</mml:mi></mml:mrow></mml:mrow></mml:mfrac></mml:mrow></mml:mstyle></mml:math>
</disp-formula></p>
<p>The fraction of Intra/Inter-Layer diffusion score is determined using <xref ref-type="disp-formula" rid="eqn-8">Eqs. (8)</xref>&#x2013;<xref ref-type="disp-formula" rid="eqn-11">(11)</xref> as shown in <xref ref-type="fig" rid="fig-4">Fig. 4</xref>.</p>
<fig id="fig-4">
<label>Figure 4</label>
<caption>
<title>FIL diffusion score for a multilayer network</title></caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="IASC_34019-fig-4.png"/>
</fig>
</sec>
<sec id="s4_3_2">
<label>4.3.2</label>
<title>Overall Performance Metrics</title>
<p>The overall performance in terms of precision, recall, and F-measure for the proposed method compared with the six existing methods was evaluated based on the FIL diffusion score, as shown in <xref ref-type="fig" rid="fig-5">Fig. 5</xref>.</p>
<fig id="fig-5">
<label>Figure 5</label>
<caption>
<title>FIL diffusion score for different methods</title></caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="IASC_34019-fig-5.png"/>
</fig>
</sec>
</sec>
</sec>
<sec id="s5">
<label>5</label>
<title>Conclusion</title>
<p>This paper proposes an influential information diffusion model that can be used to analyze the activities of social media users and their influence on the user&#x2019;s timeline across the network. Typically, social contagion induces the spread of information within the community structure, thereby resulting in strong interactions within social groups. An important step in the information diffusion process involves predicting user behavior by identifying influential communities across several networks. Experimental results show that the proposed method effectively identifies the influencing community structure extracted for real-world data. Thus, the FIL can efficiently evaluate the IID model from one layer to another in the social network. Consequently, the influential community structure across the network can be achieved in multilayer networks as well. From this perspective, dynamic OSN are an interesting field of study that can reveal the trends involved in user interactions, which change over a period. In future work, temporal graph analysis can be used to achieve more efficient graph mining techniques. Geo location and time factor consideration is important such as in the case of the temporal graph analysis in multilayer networks. Therefore, future studies should ideally aim to identify the heterogeneous community structure based on user interest and predict future user behavior with the time factor and geo location for dynamic social networks.</p>
</sec>
</body>
<back><fn-group>
<fn fn-type="other">
<p><bold>Funding Statement:</bold> This publication is an outcome of the R &#x0026; D work undertaken in the project under the Visvesvaraya Ph.D. Scheme of the Ministry of Electronics and Information Technology, Government of India, being implemented by Digital India Corporation (formerly Media Lab Asia).</p>
</fn>
<fn fn-type="conflict">
<p><bold>Conflicts of Interest:</bold> The authors declare that they have no conflicts of interest to report regarding the present study.</p>
</fn>
</fn-group>
<ref-list content-type="authoryear">
<title>References</title>
<ref id="ref-1"><label>[1]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>D. F.</given-names> <surname>Nettleton</surname></string-name></person-group>, &#x201C;<article-title>Data mining of social networks represented as graphs</article-title>,&#x201D; <source>Computer Science Review</source>, vol. <volume>7</volume>, no. <issue>1</issue>, pp. <fpage>1</fpage>&#x2013;<lpage>34</lpage>, <year>2013</year>.</mixed-citation></ref>
<ref id="ref-2"><label>[2]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A. T.</given-names> <surname>Stephen</surname></string-name> and <string-name><given-names>O.</given-names> <surname>Toubia</surname></string-name></person-group>, &#x201C;<article-title>Explaining the power-law degree distribution in a social commerce network</article-title>,&#x201D; <source>Social Networks</source>, vol. <volume>31</volume>, no. <issue>4</issue>, pp. <fpage>262</fpage>&#x2013;<lpage>270</lpage>, <year>2009</year>.</mixed-citation></ref>
<ref id="ref-3"><label>[3]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>W.</given-names> <surname>Yang</surname></string-name>, <string-name><given-names>G.</given-names> <surname>Wang</surname></string-name>, <string-name><given-names>M. Z. A.</given-names> <surname>Bhuiyan</surname></string-name> and <string-name><given-names>K. K. R.</given-names> <surname>Choo</surname></string-name></person-group>, &#x201C;<article-title>Hypergraph partitioning for social networks based on information entropy modularity</article-title>,&#x201D; <source>Journal of Network and Computer Applications</source>, vol. <volume>86</volume>, pp. <fpage>59</fpage>&#x2013;<lpage>71</lpage>, <year>2017</year>.</mixed-citation></ref>
<ref id="ref-4"><label>[4]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>T.</given-names> <surname>Pozzoli</surname></string-name> and <string-name><given-names>G.</given-names> <surname>Gini</surname></string-name></person-group>, &#x201C;<article-title>Friend similarity in attitudes toward bullying and sense of responsibility to intervene</article-title>,&#x201D; <source>Social Influence</source>, vol. <volume>8</volume>, no. <issue>2&#x2013;3</issue>, pp. <fpage>161</fpage>&#x2013;<lpage>176</lpage>, <year>2013</year>.</mixed-citation></ref>
<ref id="ref-5"><label>[5]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A.</given-names> <surname>Guille</surname></string-name>, <string-name><given-names>H.</given-names> <surname>Hacid</surname></string-name>, <string-name><given-names>C.</given-names> <surname>Favre</surname></string-name> and <string-name><given-names>D. A.</given-names> <surname>Zighed</surname></string-name></person-group>, &#x201C;<article-title>Information diffusion in online social networks</article-title>,&#x201D; <source>ACM SIGMOD Record</source>, vol. <volume>42</volume>, no. <issue>2</issue>, pp. <fpage>17</fpage>&#x2013;<lpage>28</lpage>, <year>2013</year>.</mixed-citation></ref>
<ref id="ref-6"><label>[6]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>M.</given-names> <surname>Doo</surname></string-name> and <string-name><given-names>L.</given-names> <surname>Liu</surname></string-name></person-group>, &#x201C;<article-title>Extracting top-k most influential nodes by activity analysis</article-title>,&#x201D; <conf-name>Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014)</conf-name>, vol. <volume>1</volume>, pp. <fpage>227</fpage>&#x2013;<lpage>236</lpage>, <year>2014</year>.</mixed-citation></ref>
<ref id="ref-7"><label>[7]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>L.</given-names> <surname>Liu</surname></string-name>, <string-name><given-names>B.</given-names> <surname>Qu</surname></string-name>, <string-name><given-names>B.</given-names> <surname>Chen</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Hanjalic</surname></string-name> and <string-name><given-names>H.</given-names> <surname>Wang</surname></string-name></person-group>, &#x201C;<article-title>Modelling of information diffusion on social networks with applications to WeChat</article-title>,&#x201D; <source>Physica A: Statistical Mechanics and Its Applications</source>, vol. <volume>496</volume>, pp. <fpage>318</fpage>&#x2013;<lpage>329</lpage>, <year>2018</year>.</mixed-citation></ref>
<ref id="ref-8"><label>[8]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S. -U.</given-names> <surname>Hassan</surname></string-name>, <string-name><given-names>T. D.</given-names> <surname>Bowman</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Shabbir</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Akhtar</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Imran</surname></string-name> <etal>et al.,</etal></person-group> &#x201C;<article-title>Influential tweeters in relation to highly cited articles in altmetric big data</article-title>,&#x201D; <source>Scientometrics</source>, vol. <volume>119</volume>, no. <issue>1</issue>, pp. <fpage>481</fpage>&#x2013;<lpage>493</lpage>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-9"><label>[9]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>H.</given-names> <surname>Sun</surname></string-name> and <string-name><given-names>R.</given-names> <surname>Grishman</surname></string-name></person-group>, &#x201C;<article-title>Employing lexicalized dependency paths for active learning of relation extraction</article-title>,&#x201D; <source>Intelligent Automation &#x0026; Soft Computing</source>, vol. <volume>34</volume>, no. <issue>3</issue>, pp. <fpage>1415</fpage>&#x2013;<lpage>1423</lpage>, <year>2022</year>.</mixed-citation></ref>
<ref id="ref-10"><label>[10]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>K.</given-names> <surname>Saito</surname></string-name>, <string-name><given-names>R.</given-names> <surname>Nakano</surname></string-name> and <string-name><given-names>M.</given-names> <surname>Kimura</surname></string-name></person-group>, &#x201C;<article-title>Prediction of information diffusion probabilities for independent cascade model</article-title>,&#x201D; <source>Knowledge-Based Intelligent Information and Engineering Systems, KES 2008, Lecture Notes in Computer Science</source>, vol. <volume>5179</volume>, pp. <fpage>67</fpage>&#x2013;<lpage>75</lpage>, <year>2008</year>.</mixed-citation></ref>
<ref id="ref-11"><label>[11]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>D.</given-names> <surname>Varshney</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Kumar</surname></string-name> and <string-name><given-names>V.</given-names> <surname>Gupta</surname></string-name></person-group>, &#x201C;<article-title>Predicting information diffusion probabilities in social networks: A Bayesian networks based approach</article-title>,&#x201D; <source>Knowledge-Based Systems</source>, vol. <volume>133</volume>, pp. <fpage>66</fpage>&#x2013;<lpage>76</lpage>, <year>2017</year>.</mixed-citation></ref>
<ref id="ref-12"><label>[12]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>S.</given-names> <surname>Mondal</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Dhamal</surname></string-name> and <string-name><given-names>Y.</given-names> <surname>Narahari</surname></string-name></person-group>, &#x201C;<article-title>Two-phase influence maximization in social networks with seed nodes and referral incentives</article-title>,&#x201D; <conf-name>Proceedings of the Eleventh International AAAI Conference on Web and Social Media (ICWSW, 2017)</conf-name>, vol. <volume>11</volume>, no. <issue>1</issue>, pp. <fpage>620</fpage>&#x2013;<lpage>623</lpage>, <year>2017</year>.</mixed-citation></ref>
<ref id="ref-13"><label>[13]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>E.</given-names> <surname>Ferrara</surname></string-name></person-group>, &#x201C;<article-title>A large-scale community structure analysis in facebook</article-title>,&#x201D; <source>EPJ Data Science</source>, vol. <volume>1</volume>, no. <issue>9</issue>, pp. <fpage>1</fpage>&#x2013;<lpage>30</lpage>, <year>2012</year>.</mixed-citation></ref>
<ref id="ref-14"><label>[14]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>X.</given-names> <surname>Wu</surname></string-name> and <string-name><given-names>C.</given-names> <surname>Zhang</surname></string-name></person-group>, &#x201C;<article-title>Finding high-impact interdisciplinary users based on friend discipline distribution in academic social networking sites</article-title>,&#x201D; <source>Scientometrics</source>, vol. <volume>119</volume>, no. <issue>2</issue>, pp. <fpage>1017</fpage>&#x2013;<lpage>1035</lpage>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-15"><label>[15]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>Y.</given-names> <surname>Lin</surname></string-name> and <string-name><given-names>J. C. S.</given-names> <surname>Lui</surname></string-name></person-group>, &#x201C;<article-title>Analyzing competitive influence maximization problems with partial information: An approximation algorithmic framework</article-title>,&#x201D; <source>Performance Evaluation</source>, vol. <volume>91</volume>, pp. <fpage>187</fpage>&#x2013;<lpage>204</lpage>, <year>2015</year>.</mixed-citation></ref>
<ref id="ref-16"><label>[16]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S.</given-names> <surname>Kundu</surname></string-name> and <string-name><given-names>S. K.</given-names> <surname>Pal</surname></string-name></person-group>, &#x201C;<article-title>Deprecation based greedy strategy for target set selection in large scale social networks</article-title>,&#x201D; <source>Information Sciences</source>, vol. <volume>316</volume>, pp. <fpage>107</fpage>&#x2013;<lpage>122</lpage>, <year>2015</year>.</mixed-citation></ref>
<ref id="ref-17"><label>[17]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S.</given-names> <surname>Dhamal</surname></string-name>, <string-name><given-names>K. J.</given-names> <surname>Prabuchandran</surname></string-name> and <string-name><given-names>Y.</given-names> <surname>Narahari</surname></string-name></person-group>, &#x201C;<article-title>Information diffusion in social networks in two phases</article-title>,&#x201D; <source>IEEE Transactions on Network Science and Engineering</source>, vol. <volume>3</volume>, no. <issue>4</issue>, pp. <fpage>197</fpage>&#x2013;<lpage>210</lpage>, <year>2016</year>.</mixed-citation></ref>
<ref id="ref-18"><label>[18]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>J.</given-names> <surname>Jankowski</surname></string-name>, <string-name><given-names>P.</given-names> <surname>Brodka</surname></string-name>, <string-name><given-names>P.</given-names> <surname>Kazienko</surname></string-name>, <string-name><given-names>B. K.</given-names> <surname>Szymanski</surname></string-name>, <string-name><given-names>R.</given-names> <surname>Michalski</surname></string-name> <etal>et al.,</etal></person-group> &#x201C;<article-title>Balancing speed and coverage by sequential seeding in complex networks</article-title>,&#x201D; <source>Scientific Reports</source>, vol. <volume>7</volume>, no. <issue>891</issue>, pp. <fpage>1</fpage>&#x2013;<lpage>13</lpage>, <year>2017</year>.</mixed-citation></ref>
<ref id="ref-19"><label>[19]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>G. D.</given-names> <surname>Angelo</surname></string-name>, <string-name><given-names>L.</given-names> <surname>Severini</surname></string-name> and <string-name><given-names>Y.</given-names> <surname>Velaj</surname></string-name></person-group>, &#x201C;<article-title>Selecting nodes and buying links to maximize the information diffusion in a network</article-title>,&#x201D; <conf-name>42nd International Symposium on Mathematical Foundations of Computer Science (MFCS 2017)</conf-name>, pp. <fpage>1</fpage>&#x2013;<lpage>14</lpage>, <year>2017</year>.</mixed-citation></ref>
<ref id="ref-20"><label>[20]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A. V.</given-names> <surname>Mantzaris</surname></string-name></person-group>, &#x201C;<article-title>Uncovering nodes that spread information between communities in social networks</article-title>,&#x201D; <source>EPJ Data Science</source>, vol. <volume>3</volume>, no. <issue>26</issue>, pp. <fpage>1</fpage>&#x2013;<lpage>17</lpage>, <year>2014</year>.</mixed-citation></ref>
<ref id="ref-21"><label>[21]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>Y.</given-names> <surname>Li</surname></string-name>, <string-name><given-names>G.</given-names> <surname>Zhang</surname></string-name>, <string-name><given-names>Y.</given-names> <surname>Feng</surname></string-name> and <string-name><given-names>C.</given-names> <surname>Wu</surname></string-name></person-group>, &#x201C;<article-title>An entropy-based social network community detecting method and its application to scientometrics</article-title>,&#x201D; <source>Scientometrics</source>, vol. <volume>102</volume>, no. <issue>1</issue>, pp. <fpage>1003</fpage>&#x2013;<lpage>1017</lpage>, <year>2015</year>.</mixed-citation></ref>
<ref id="ref-22"><label>[22]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>C.</given-names> <surname>Suganthini</surname></string-name> and <string-name><given-names>R.</given-names> <surname>Sridhar</surname></string-name></person-group>, &#x201C;<article-title>A survey on community detection in social network analysis</article-title>,&#x201D; <source>International Journal of Applied Engineering Research</source>, vol. <volume>10</volume>, no. <issue>75</issue>, pp. <fpage>1</fpage>&#x2013;<lpage>6</lpage>, <year>2015</year>.</mixed-citation></ref>
<ref id="ref-23"><label>[23]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>Y.</given-names> <surname>Gandica</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Decuyper</surname></string-name>, <string-name><given-names>C.</given-names> <surname>Cloquet</surname></string-name>, <string-name><given-names>I.</given-names> <surname>Thomas</surname></string-name> and <string-name><given-names>J. C.</given-names> <surname>Delvenne</surname></string-name></person-group>, &#x201C;<article-title>Measuring the effect of node aggregation on community detection</article-title>,&#x201D; <source>EPJ Data Science</source>, vol. <volume>9</volume>, no. <issue>6</issue>, pp. <fpage>1</fpage>&#x2013;<lpage>16</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-24"><label>[24]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>Y.</given-names> <surname>Li</surname></string-name>, <string-name><given-names>X.</given-names> <surname>Zhao</surname></string-name> and <string-name><given-names>Z.</given-names> <surname>Qu</surname></string-name></person-group>, &#x201C;<article-title>A dynamic programming framework for large-scale online clustering on graphs</article-title>,&#x201D; <source>Neural Processing Letters</source>, vol. <volume>52</volume>, no. <issue>4</issue>, pp. <fpage>1613</fpage>&#x2013;<lpage>1629</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-25"><label>[25]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>X.</given-names> <surname>Zhang</surname></string-name>, <string-name><given-names>C.</given-names> <surname>Wang</surname></string-name>, <string-name><given-names>Y.</given-names> <surname>Su</surname></string-name>, <string-name><given-names>L.</given-names> <surname>Pan</surname></string-name> and <string-name><given-names>H. -F.</given-names> <surname>Zhang</surname></string-name></person-group>, &#x201C;<article-title>A fast overlapping community detection algorithm based on weak cliques for large-scale networks</article-title>,&#x201D; <source>IEEE Transactions on Computational Social Systems</source>, vol. <volume>4</volume>, no. <issue>4</issue>, pp. <fpage>218</fpage>&#x2013;<lpage>230</lpage>, <year>2017</year>.</mixed-citation></ref>
<ref id="ref-26"><label>[26]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>Y.</given-names> <surname>Hu</surname></string-name>, <string-name><given-names>R. J.</given-names> <surname>Song</surname></string-name> and <string-name><given-names>M.</given-names> <surname>Chen</surname></string-name></person-group>, &#x201C;<article-title>Modeling for information diffusion in online social networks via hydrodynamic</article-title>,&#x201D; <source>Special Section on Socially Enabled Networking and Computing, IEEE Access</source>, vol. <volume>5</volume>, pp. <fpage>128</fpage>&#x2013;<lpage>135</lpage>, <year>2017</year>.</mixed-citation></ref>
<ref id="ref-27"><label>[27]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M.</given-names> <surname>Pellert</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Schweighofer</surname></string-name> and <string-name><given-names>D.</given-names> <surname>Garcia</surname></string-name></person-group>, &#x201C;<article-title>The individual dynamics of affective expression on social media</article-title>,&#x201D; <source>EPJ Data Science</source>, vol. <volume>9</volume>, no. <issue>1</issue>, pp. <fpage>1</fpage>&#x2013;<lpage>14</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-28"><label>[28]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A.</given-names> <surname>Said</surname></string-name>, <string-name><given-names>T. D.</given-names> <surname>Bowman</surname></string-name>, <string-name><given-names>R. A.</given-names> <surname>Abbasi</surname></string-name>, <string-name><given-names>N. R.</given-names> <surname>Aljohani</surname></string-name>, <string-name><given-names>S. -U.</given-names> <surname>Hassan</surname></string-name> <etal>et al.,</etal></person-group> &#x201C;<article-title>Mining network-level properties of twitter altmetrics data</article-title>,&#x201D; <source>Scientometrics</source>, vol. <volume>120</volume>, pp. <fpage>217</fpage>&#x2013;<lpage>235</lpage>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-29"><label>[29]</label><mixed-citation publication-type="other"><person-group person-group-type="author"><string-name><given-names>M.</given-names> <surname>Farajtabar</surname></string-name>, <string-name><given-names>Y.</given-names> <surname>Wang</surname></string-name>, <string-name><given-names>M. G.</given-names> <surname>Rodriguez</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Li</surname></string-name>, <string-name><given-names>H.</given-names> <surname>Zha</surname></string-name> <etal>et al.,</etal></person-group> &#x201C;<article-title>COEVOLVE: A joint point process model for information diffusion and network Co-evolution</article-title>,&#x201D; <source>Journal of Machine Learning Research</source>, vol. <volume>18</volume>, no. <issue>1</issue>, pp. <fpage>1305</fpage>&#x2013;<lpage>1353</lpage>, <year>2017</year>.</mixed-citation></ref>
<ref id="ref-30"><label>[30]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>A.</given-names> <surname>Vogelsang</surname></string-name> and <string-name><given-names>S.</given-names> <surname>Fuhrmann</surname></string-name></person-group>, &#x201C;<article-title>Why feature dependencies challenge the requirements engineering of automotive systems: An empirical study</article-title>,&#x201D; <conf-name>2013 21st IEEE International Requirements Engineering Conference (RE)</conf-name>, pp. <fpage>267</fpage>&#x2013;<lpage>272</lpage>, <year>2013</year>.</mixed-citation></ref>
<ref id="ref-31"><label>[31]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>H.</given-names> <surname>Lu</surname></string-name>, <string-name><given-names>Q.</given-names> <surname>Zhao</surname></string-name>, <string-name><given-names>X.</given-names> <surname>Sang</surname></string-name> and <string-name><given-names>J.</given-names> <surname>Lu</surname></string-name></person-group>, &#x201C;<article-title>Community detection in complex networks using nonnegative matrix factorization and density-based clustering algorithm</article-title>,&#x201D; <source>Neural Processing Letters</source>, vol. <volume>51</volume>, pp. <fpage>1731</fpage>&#x2013;<lpage>1748</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-32"><label>[32]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>J.</given-names> <surname>Urena-Carrion</surname></string-name>, <string-name><given-names>J.</given-names> <surname>Saramaki</surname></string-name> and <string-name><given-names>M.</given-names> <surname>Kivela</surname></string-name></person-group>, &#x201C;<article-title>Estimating tie strength in social networks using temporal communication data</article-title>,&#x201D; <source>EPJ Data Science</source>, vol. <volume>9</volume>, no. <issue>37</issue>, pp. <fpage>1</fpage>&#x2013;<lpage>20</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-33"><label>[33]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>H.</given-names> <surname>Feng</surname></string-name>, <string-name><given-names>J.</given-names> <surname>Tian</surname></string-name>, <string-name><given-names>H. J.</given-names> <surname>Wang</surname></string-name> and <string-name><given-names>M.</given-names> <surname>Li</surname></string-name></person-group>, &#x201C;<article-title>Personalized recommendations based on time-weighted overlapping community detection</article-title>,&#x201D; <source>Information and Management</source>, vol. <volume>52</volume>, no. <issue>7</issue>, pp. <fpage>789</fpage>&#x2013;<lpage>800</lpage>, <year>2015</year>.</mixed-citation></ref>
<ref id="ref-34"><label>[34]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>R.</given-names> <surname>Sridhar</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Kumar</surname></string-name>, <string-name><given-names>S. B.</given-names> <surname>Roshini</surname></string-name>, <string-name><given-names>R. K.</given-names> <surname>Sundaresan</surname></string-name> and <string-name><given-names>S.</given-names> <surname>Chinnasamy</surname></string-name></person-group>, &#x201C;<article-title>Feature based community detection by extracting facebook profile details</article-title>,&#x201D; <source>ICTACT Journal on Soft Computing</source>, vol. <volume>8</volume>, no. <issue>4</issue>, pp. <fpage>1706</fpage>&#x2013;<lpage>1713</lpage>, <year>2018</year>.</mixed-citation></ref>
<ref id="ref-35"><label>[35]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>N. J. V.</given-names> <surname>Doesum</surname></string-name>, <string-name><given-names>J. C.</given-names> <surname>Karremans</surname></string-name>, <string-name><given-names>R. C.</given-names> <surname>Fikke</surname></string-name>, <string-name><given-names>M. A.</given-names> <surname>de Lange</surname></string-name> and <string-name><given-names>P. A. M. V.</given-names> <surname>Lange</surname></string-name></person-group>, &#x201C;<article-title>Social mindfulness in the real world: The physical presence of others induces other-regarding motivation</article-title>,&#x201D; <source>Social Influence</source>, vol. <volume>13</volume>, no. <issue>4</issue>, pp. <fpage>209</fpage>&#x2013;<lpage>222</lpage>, <year>2018</year>.</mixed-citation></ref>
<ref id="ref-36"><label>[36]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M.</given-names> <surname>Huang</surname></string-name>, <string-name><given-names>G.</given-names> <surname>Zou</surname></string-name>, <string-name><given-names>B.</given-names> <surname>Zhang</surname></string-name>, <string-name><given-names>Y.</given-names> <surname>Gan</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Jiang</surname></string-name> <etal>et al.,</etal></person-group> &#x201C;<article-title>Identifying influential individuals in microblogging networks using graph partitioning</article-title>,&#x201D; <source>Expert Systems with Applications</source>, vol. <volume>102</volume>, pp. <fpage>70</fpage>&#x2013;<lpage>82</lpage>, <year>2018</year>.</mixed-citation></ref>
<ref id="ref-37"><label>[37]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>C.</given-names> <surname>Suganthini</surname></string-name> and <string-name><given-names>R.</given-names> <surname>Baskaran</surname></string-name></person-group>, &#x201C;<article-title>Identifying the influential user based on user interaction model for twitter data</article-title>,&#x201D; <conf-name>Advances in Signal Processing and Intelligent Recognition Systems, SIRS 2019, Communications in Computer and Information Science</conf-name>, <publisher-name>Springer</publisher-name>, vol. <volume>1209</volume>, pp. <fpage>48</fpage>&#x2013;<lpage>63</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-38"><label>[38]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>R. M.</given-names> <surname>Bond</surname></string-name></person-group>, &#x201C;<article-title>Contagion in social attitudes about prejudice</article-title>,&#x201D; <source>Social Influence</source>, vol. <volume>13</volume>, no. <issue>2</issue>, pp. <fpage>104</fpage>&#x2013;<lpage>116</lpage>, <year>2018</year>.</mixed-citation></ref>
<ref id="ref-39"><label>[39]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>G.</given-names> <surname>Berry</surname></string-name>, <string-name><given-names>C. J.</given-names> <surname>Cameron</surname></string-name>, <string-name><given-names>P.</given-names> <surname>Park</surname></string-name> and <string-name><given-names>M.</given-names> <surname>Macy</surname></string-name></person-group>, &#x201C;<article-title>The opacity problem in social contagion</article-title>,&#x201D; <source>Social Networks</source>, vol. <volume>56</volume>, pp. <fpage>93</fpage>&#x2013;<lpage>101</lpage>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-40"><label>[40]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A.</given-names> <surname>Zareie</surname></string-name> and <string-name><given-names>A.</given-names> <surname>Sheikhahmadi</surname></string-name></person-group>, &#x201C;<article-title>A hierarchical approach for influential node ranking in complex social networks</article-title>,&#x201D; <source>Expert Systems with Applications</source>, vol. <volume>93</volume>, pp. <fpage>200</fpage>&#x2013;<lpage>211</lpage>, <year>2018</year>.</mixed-citation></ref>
<ref id="ref-41"><label>[41]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>D.</given-names> <surname>Gowsikhaa</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Abirami</surname></string-name> and <string-name><given-names>R.</given-names> <surname>Baskaran</surname></string-name></person-group>, &#x201C;<article-title>Automated human behavior analysis from surveillance videos: A survey</article-title>,&#x201D; <source>Artificial Intelligence Review</source>, vol. <volume>42</volume>, no. <issue>4</issue>, pp. <fpage>747</fpage>&#x2013;<lpage>765</lpage>, <year>2014</year>.</mixed-citation></ref>
<ref id="ref-42"><label>[42]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>G.</given-names> <surname>Song</surname></string-name>, <string-name><given-names>Y.</given-names> <surname>Li</surname></string-name>, <string-name><given-names>X.</given-names> <surname>Chen</surname></string-name>, <string-name><given-names>X.</given-names> <surname>He</surname></string-name> and <string-name><given-names>J.</given-names> <surname>Tang</surname></string-name></person-group>, &#x201C;<article-title>Influential node tracking on dynamic social network: An interchange greedy approach</article-title>,&#x201D; <source>IEEE Transactions on Knowledge and Data Engineering</source>, vol. <volume>29</volume>, no. <issue>2</issue>, pp. <fpage>359</fpage>&#x2013;<lpage>372</lpage>, <year>2017</year>.</mixed-citation></ref>
<ref id="ref-43"><label>[43]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>P.</given-names> <surname>Kim</surname></string-name> and <string-name><given-names>S.</given-names> <surname>Kim</surname></string-name></person-group>, &#x201C;<article-title>Detecting community structure in complex networks using an interaction optimization process</article-title>,&#x201D; <source>Physica A: Statistical Mechanics and Its Applications</source>, vol. <volume>465</volume>, pp. <fpage>525</fpage>&#x2013;<lpage>542</lpage>, <year>2017</year>.</mixed-citation></ref>
<ref id="ref-44"><label>[44]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>F.</given-names> <surname>Jansson</surname></string-name> and <string-name><given-names>M.</given-names> <surname>Bursell</surname></string-name></person-group>, &#x201C;<article-title>Social consensus influences ethnic diversity preferences</article-title>,&#x201D; <source>Social Influence</source>, vol. <volume>13</volume>, no. <issue>4</issue>, pp. <fpage>192</fpage>&#x2013;<lpage>208</lpage>, <year>2018</year>.</mixed-citation></ref>
<ref id="ref-45"><label>[45]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>L.</given-names> <surname>Lorincz</surname></string-name>, <string-name><given-names>J.</given-names> <surname>Koltai</surname></string-name>, <string-name><given-names>A. F.</given-names> <surname>Gyor</surname></string-name> and <string-name><given-names>K.</given-names> <surname>Takacs</surname></string-name></person-group>, &#x201C;<article-title>Collapse of an online social network: Burning social capital to create it?</article-title>&#x201D; <source>Social Networks</source>, vol. <volume>57</volume>, pp. <fpage>43</fpage>&#x2013;<lpage>53</lpage>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-46"><label>[46]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>K.</given-names> <surname>Kobayashi</surname></string-name></person-group>, &#x201C;<article-title>Communicating highly divergent levels of scientific and social consensus: Its effects on people&#x2019;s scientific beliefs</article-title>,&#x201D; <source>Social Influence</source>, vol. <volume>14</volume>, no. <issue>1</issue>, pp. <fpage>1</fpage>&#x2013;<lpage>12</lpage>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-47"><label>[47]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>J. F.</given-names> <surname>Sanchez-Rada</surname></string-name> and <string-name><given-names>C. A.</given-names> <surname>Iglesias</surname></string-name></person-group>, &#x201C;<article-title>Social context in sentiment analysis: Formal definition, overview of current trends and framework for comparison</article-title>,&#x201D; <source>Information Fusion</source>, vol. <volume>25</volume>, pp. <fpage>344</fpage>&#x2013;<lpage>356</lpage>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-48"><label>[48]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>L.</given-names> <surname>Liu</surname></string-name>, <string-name><given-names>B.</given-names> <surname>Chen</surname></string-name>, <string-name><given-names>B.</given-names> <surname>Qu</surname></string-name>, <string-name><given-names>L.</given-names> <surname>He</surname></string-name> and <string-name><given-names>X.</given-names> <surname>Qiu</surname></string-name></person-group>, &#x201C;<article-title>Data driven modeling of continuous time information diffusion in social networks</article-title>,&#x201D; <conf-name>2017 IEEE Second International Conference on Data Science in Cyberspace (DSC)</conf-name>, vol. <volume>2</volume>, pp. <fpage>655</fpage>&#x2013;<lpage>660</lpage>, <year>2017</year>.</mixed-citation></ref>
<ref id="ref-49"><label>[49]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>P.</given-names> <surname>Chopade</surname></string-name> and <string-name><given-names>J.</given-names> <surname>Zhan</surname></string-name></person-group>, &#x201C;<article-title>Structural and functional analytics for community detection in large-scale complex networks</article-title>,&#x201D; <source>Journal of Big Data</source>, vol. <volume>2</volume>, no. <issue>11</issue>, pp. <fpage>1</fpage>&#x2013;<lpage>28</lpage>, <year>2015</year>.</mixed-citation></ref>
<ref id="ref-50"><label>[50]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S.</given-names> <surname>Fortunato</surname></string-name> and <string-name><given-names>D.</given-names> <surname>Hric</surname></string-name></person-group>, &#x201C;<article-title>Community detection in networks: A user guide</article-title>,&#x201D; <source>Physics Reports</source>, vol. <volume>659</volume>, pp. <fpage>1</fpage>&#x2013;<lpage>44</lpage>, <year>2016</year>.</mixed-citation></ref>
<ref id="ref-51"><label>[51]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>N.</given-names> <surname>Meghanathan</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Essien</surname></string-name> and <string-name><given-names>R.</given-names> <surname>Lawrence</surname></string-name></person-group>, &#x201C;<article-title>A two-hop neighbor preference-based random network graph model with high clustering coefficient for modeling real-world complex networks</article-title>,&#x201D; <source>Egyptian Informatics Journal</source>, vol. <volume>22</volume>, no. <issue>3</issue>, pp. <fpage>389</fpage>&#x2013;<lpage>400</lpage>, <year>2021</year>.</mixed-citation></ref>
<ref id="ref-52"><label>[52]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>F.</given-names> <surname>Altunbey</surname></string-name> and <string-name><given-names>B.</given-names> <surname>Alatas</surname></string-name></person-group>, &#x201C;<article-title>Overlapping community detection in social network using parliamentary optimization algorithm</article-title>,&#x201D; <source>International Journal of Computer Networks and Applications</source>, vol. <volume>2</volume>, no. <issue>1</issue>, pp. <fpage>12</fpage>&#x2013;<lpage>19</lpage>, <year>2015</year>.</mixed-citation></ref>
<ref id="ref-53"><label>[53]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>G. K.</given-names> <surname>Orman</surname></string-name>, <string-name><given-names>V.</given-names> <surname>Labatut</surname></string-name> and <string-name><given-names>H.</given-names> <surname>Cherifi</surname></string-name></person-group>, &#x201C;<article-title>Comparative evaluation of community detection algorithms: A topological approach</article-title>,&#x201D; <source>Journal of Statistical Mechanics: Theory and Experiment</source>, vol. <volume>8</volume>, pp. <fpage>1</fpage>&#x2013;<lpage>16</lpage>, <year>2012</year>.</mixed-citation></ref>
</ref-list>
</back>
</article>









