{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T06:39:56Z","timestamp":1777703996792,"version":"3.51.4"},"reference-count":27,"publisher":"SAGE Publications","issue":"2","license":[{"start":{"date-parts":[[2019,10,25]],"date-time":"2019-10-25T00:00:00Z","timestamp":1571961600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"published-print":{"date-parts":[[2020,2,6]]},"abstract":"<jats:p>As a communication tool, social networks have become an important part of people\u2019s daily lives. The proliferation of data in the big data era has spurred waves of research. Twitter is one of the most popular sites among all social network platforms. Twitter API allows researchers to easily study user behaviour and influence. In this paper, we use data obtained through the Twitter API to study the influence maximization problem based on the relationship graph of the social network and information dissemination model. In the current independent cascade propagation model, the influence weights between nodes are based largely on the fixed-value assumption and the randomized probability of acceptance; however, this does not conform to real life. The influence weight between users is closely related to the strength of relationships, content of communication, and so on. Focusing on user relation-ships, we introduce an improved weighted cascade mode combined with a heuristic algorithm to find an approximate solution to the problem of influence maximization. Example analysis indicates that the improved weighted cascade model can obtain a more significant and influential node set compared to conventional methods.<\/jats:p>","DOI":"10.3233\/jifs-179477","type":"journal-article","created":{"date-parts":[[2019,10,25]],"date-time":"2019-10-25T09:13:30Z","timestamp":1571994810000},"page":"1159-1171","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":1,"title":["Analysis of social network user behaviour and its influence"],"prefix":"10.1177","volume":"38","author":[{"given":"Yongshun","family":"Xu","sequence":"first","affiliation":[{"name":"School of Design, Jiangnan University, Wuxi, China"},{"name":"NanHang Jincheng College, Nanjing, China"}]},{"given":"Yuan","family":"Liu","sequence":"additional","affiliation":[{"name":"Jiangsu Key Laboratory of Media Design and Software Technology, Jiangnan University, Wuxi, China"}]},{"given":"Xiaoshuang","family":"Zhang","sequence":"additional","affiliation":[{"name":"Jiangsu Key Laboratory of Media Design and Software Technology, Jiangnan University, Wuxi, China"}]}],"member":"179","published-online":{"date-parts":[[2019,10,25]]},"reference":[{"key":"e_1_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127415400398"},{"key":"e_1_3_2_3_2","unstructured":"WuS. WangM. and ZouY. Research on internet information mining based on agent algorithm Future"},{"key":"e_1_3_2_4_2","doi-asserted-by":"crossref","unstructured":"KeQ. WuS. WangM. and ZouY. Evaluation of Developer Efficiency Based on Improved DEA Model Wireless Personal Communications 102(4)(2018).","DOI":"10.1007\/s11277-018-5415-0"},{"key":"e_1_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.5004\/dwt.2018.22362"},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cogsys.2018.07.035"},{"key":"e_1_3_2_7_2","doi-asserted-by":"crossref","unstructured":"WuS. WangM. JinM. et al. Uniform l1 Stability of the Inelastic Boltzmann Equation with Large External Force for Hard Potentials Discrete and Continuous Dynamical Systems Series S 12(4-5) (2019) 1005\u20131013.","DOI":"10.3934\/dcdss.2019068"},{"key":"e_1_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1063\/1.5085430"},{"key":"e_1_3_2_9_2","unstructured":"PageL. SergeyB. et al. The PageRank citation ranking: Bringing order to the web 1999."},{"key":"e_1_3_2_10_2","doi-asserted-by":"crossref","unstructured":"WestmanS. and FreundL. Information interaction in 140 characters or less:Genres on twitter[C] IIiX 2010-Proceedings of the 2010 Information Interaction in Context Symposium. New Brunswick USA: Association for Computing Machinery (2010) 323\u2013326.","DOI":"10.1145\/1840784.1840833"},{"key":"e_1_3_2_11_2","unstructured":"The Internet Engineering Task Force (IETF). The OAuth 2.0 Authorization Framework[EB|OL]. 2016-4-7. https:\/\/datatracker.ietf.org\/doc\/rfc6749\/writeup\/"},{"key":"e_1_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1287\/mksc.2013.0773"},{"key":"e_1_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011122126881"},{"key":"e_1_3_2_14_2","doi-asserted-by":"crossref","unstructured":"ChenW. WangY. and YangS. Efficient influence maximization in social networks[C] In Proceedings of the 15th ACMSIGKDD international conference on Knowledge discovery and data mining 2009:199\u2013208.","DOI":"10.1145\/1557019.1557047"},{"key":"e_1_3_2_15_2","doi-asserted-by":"crossref","unstructured":"KempeD. and KleinbergJ. Tardos #. Maximizing the spread of influence through a social network[C] ACM SIGKDD International Conference on Knowledge Discovery and Data Mining ACM 2003:137\u2013146.","DOI":"10.1145\/956750.956769"},{"key":"e_1_3_2_16_2","unstructured":"DiekmannA. and PeterM. eds. Stochastic modelling of social processes Academic Press (2014)."},{"key":"e_1_3_2_17_2","unstructured":"SamuelK. A first course in stochastic processes. Academic press 2014."},{"key":"e_1_3_2_18_2","doi-asserted-by":"crossref","unstructured":"ZhangY. ZhouJ. and ChengJ. Community-based Greedy Algorithm for Mining Top-K Influential Nodes in Mobile Social Networks 2011 IEEE 10th International Conference on Trust Security and Privacy in Computing and Communications 2011:1512\u20131518.","DOI":"10.1109\/TrustCom.2011.209"},{"key":"e_1_3_2_19_2","doi-asserted-by":"crossref","unstructured":"DomingosP. and RichardsonM. Mining the network value of customers[C]. ACM SIGKDD International Conference on Knowledge Discovery & Data Mining 2001:57\u201366.","DOI":"10.1145\/502512.502525"},{"key":"e_1_3_2_20_2","doi-asserted-by":"crossref","unstructured":"ChenW. WangY. and YangS. Efficient influence maximization in social networks[C]. ACM SIGKDD International Conference on Knowledge Discovery and Data Mining Paris France June 28 \u2013 July 2009:199\u2013208.","DOI":"10.1145\/1557019.1557047"},{"issue":"3","key":"e_1_3_2_21_2","first-page":"8","article-title":"Using Complex Systems Analysis to Advance Marketing Theory Development: Modeling Heterogeneity Effects on New Product Growth through Stochastic Cellular Automata, Academy of Marketing Science Review 9[J]","volume":"31","author":"Goldenberg J.","year":"2001","unstructured":"GoldenbergJ., LibaiB., GoldenbergJ., LibaiB. and MullerE., Using Complex Systems Analysis to Advance Marketing Theory Development: Modeling Heterogeneity Effects on New Product Growth through Stochastic Cellular Automata, Academy of Marketing Science Review 9[J], Monthly Labor Review 31(3) (2001), 8\u201311.","journal-title":"Monthly Labor Review"},{"key":"e_1_3_2_22_2","unstructured":"GigerenzerG. and PeterM. Todd and the ABC Research Group. Simple heuristics that make us smart. Oxford University Press 1999."},{"key":"e_1_3_2_23_2","doi-asserted-by":"publisher","unstructured":"DuttaA.K. ElhosenyM. DahiyaV. and ShankarK. An efficient hierarchical clustering protocol for multihop Internet of vehicles communication Transactions on Emerging Telecommunications Technologies (2019). In Press. DOI: 10.1002\/ett.3690","DOI":"10.1002\/ett.3690"},{"key":"e_1_3_2_24_2","doi-asserted-by":"publisher","unstructured":"ElhosenyM. ShankarK. and UthayakumarJ. Intelligent Diagnostic Prediction and Classification System for Chronic Kidney Disease Nature Scientific Reports July 2019. In Press. DOI: 10.1038\/s41598-019-46074-2.","DOI":"10.1038\/s41598-019-46074-2"},{"key":"e_1_3_2_25_2","doi-asserted-by":"publisher","unstructured":"ElhosenyM. and ShankarK. Reliable Data Transmission Model for Mobile Ad Hoc Network Using Signcryption Technique IEEE Transactions on Reliability (June 2019) 1\u201310. In Press. DOI: 10.1109\/TR.2019.2915800","DOI":"10.1109\/TR.2019.2915800"},{"key":"e_1_3_2_26_2","doi-asserted-by":"publisher","unstructured":"KrishnarajN. ElhosenyM. ThenmozhiM. SelimM.M. and ShankarK. \u201cDeep learning model for real-time image compression in Internet of Underwater Things (IoUT)\u201d Journal of Real-Time Image Processing (2019). In Press. DOI: 10.1007\/s11554-019-00879-6.","DOI":"10.1007\/s11554-019-00879-6"},{"key":"e_1_3_2_27_2","doi-asserted-by":"publisher","unstructured":"RagavanV.K.S. ElhosenyM. and ShankarK. \u201cAn Enhanced Whale Optimization Algorithm for Vehicular Communication Networks\u201d International Journal of Communication Systems April 2019. DOI: 10.1002\/dac.3953","DOI":"10.1002\/dac.3953"},{"key":"e_1_3_2_28_2","first-page":"1","article-title":"Energy Efficient Optimal Routing for Communication in VANETs via Clustering Model","volume":"242","author":"Elhoseny M.","year":"2019","unstructured":"ElhosenyM. and ShankarK., Energy Efficient Optimal Routing for Communication in VANETs via Clustering Model, Emerging Technologies for Connected Internet of Vehicles and Intelligent Transportation System Networks, Studies in Systems, Decision and Control, Vol. 242 ISBN: 978-3-030-22772-2, (2019), 1\u201314.","journal-title":"Emerging Technologies for Connected Internet of Vehicles and Intelligent Transportation System Networks, Studies in Systems, Decision and Control"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-179477","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/JIFS-179477","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-179477","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T09:40:10Z","timestamp":1777455610000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/JIFS-179477"}},"subtitle":[],"editor":[{"given":"Mohamed","family":"Elhoseny","sequence":"additional","affiliation":[]},{"given":"X.","family":"Yuan","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2019,10,25]]},"references-count":27,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,2,6]]}},"alternative-id":["10.3233\/JIFS-179477"],"URL":"https:\/\/doi.org\/10.3233\/jifs-179477","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,10,25]]}}}