Next Article in Journal
Online Microfluidic Droplets Characterization Using Microscope Data Intelligent Analysis
Next Article in Special Issue
Recognizing Similar Musical Instruments with YOLO Models
Previous Article in Journal
Graph-Based Semi-Supervised Deep Learning for Indonesian Aspect-Based Sentiment Analysis
Previous Article in Special Issue
Yolov5 Series Algorithm for Road Marking Sign Identification
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Gradient Boosted Decision Tree-Based Influencer Prediction in Social Network Analysis

by
Neelakandan Subramani
1,
Sathishkumar Veerappampalayam Easwaramoorthy
2,*,
Prakash Mohan
3,
Malliga Subramanian
4 and
Velmurugan Sambath
5
1
Department of Computer Science and Engineering, R.M.K. Engineering College, Kavaraipettai 601206, India
2
Department of Industrial Engineering, Hanyang University, Seoul 04763, Republic of Korea
3
School of Computer Science and Engineering, Vellore Institute of Technology, Vellore 632014, India
4
Department of Computer Science and Engineering, Kongu Engineering College, Perundurai 638060, India
5
Department of Information Technology, R.M.D. Engineering College, Chennai 601206, India
*
Author to whom correspondence should be addressed.
Big Data Cogn. Comput. 2023, 7(1), 6; https://doi.org/10.3390/bdcc7010006
Submission received: 8 November 2022 / Revised: 23 December 2022 / Accepted: 29 December 2022 / Published: 5 January 2023
(This article belongs to the Special Issue Computational Collective Intelligence with Big Data–AI Society)

Abstract

:
Twitter, Instagram and Facebook are expanding rapidly, reporting on daily news, social activities and regional or international actual occurrences. Twitter and other platforms have gained popularity because they allow users to submit information, links, photos and videos with few restrictions on content. As a result of technology advances (“big” data) and an increasing trend toward institutionalizing ethics regulation, social network analysis (SNA) research is currently confronted with serious ethical challenges. A significant percentage of human interactions occur on social networks online. In this instance, content freshness is essential, as content popularity declines with time. Therefore, we investigate how influencer content (i.e., posts) generates interactions, as measured by the number of likes and reactions. The Gradient Boosted Decision Tree (GBDT) and the Chaotic Gradient-Based Optimizer are required for estimation (CGBO). Using earlier group interactions, we develop the Influencers Prediction issue in this study’s setting of SN-created groups. We also provide a GBDT-CGBO framework and an efficient method for identifying users with the ability to influence the future behaviour of others. Our contribution is based on logic, experimentation and analytic techniques. The goal of this paper is to find domain-based social influencers using a framework that uses semantic analysis and machine learning modules to measure and predict users’ credibility in different domains and at different times. To solve these problems, future research will have to focus on co-authorship networks and economic networks instead of online social networks. The results show that our GBDT-CGBO method is both useful and effective. Based on the test results, the GBDT-CGBO model can correctly classify unclear data, which speeds up processing and makes it more efficient.

1. Introduction

As the Internet continues to expand rapidly, more and more people are sharing their thoughts and ideas through comments and blog posts on various social media (SM) platforms, such as online forums, social networks and weblogs. It is estimated that everyday millions of new pages are added to the web. Because of this, the Internet has surpassed all other information sources in importance when it comes to decision-making [1]. On Twitter, more than 300 million users (active) daily share and post information via tweets with multimedia content. Twitter has 465 million user accounts, 250 million monthly visitors, an average of 100,000 micro-posts per minute, or 175 million per day and approximately 8 TB of data per day. Users of social media [2], on the other hand, are aware of this. A staggering 57% of social media users agree with the study’s authors that the great majority of news is questionable. As a result, it is critical to determine whether a piece of news on social media is trustworthy and to distinguish between trustworthy posts and those that frequently post false or unsubstantiated material.
The use of online social networks has increased tremendously in modern times. It has evolved into a forum for millions of people to communicate their views, beliefs and ideas with others. Sites are also used for advertising, blogging, collecting reviews and political awareness initiatives. Facebook, WhatsApp, Twitter, Flickr, Instagram and other online social networking websites and applications have become an indispensable part of our daily lives. Social networks are highly dynamic in nature as they keep on growing (or evolving) with time. Maximizing the number of connections is the main aim of a social network, as this not only helps in utilising the services offered by social networks effectively but also ensures fast propagation of information in the network. This is also evident from the missions of various popular social networking platforms, such as Facebook, which aims to “bring the world closer together”. Another well-known social networking platform, LinkedIn, aims to “connect the world’s professionals in order to make them more productive and successful”. The appearance of social relationships among users who share common interests, backgrounds, real life contacts and so on is signified by the establishment of new connections on social networks.
Researchers and businesses are driven to the study of influencers because of the broad adoption of OSNs and the amount of user-generated material. Several corporations, for example, rely on OSNs to maximize brand, service and product dissemination. This market method is typically put into practice by selecting a group of micro-influencers [3], or users who are important to a community and have the most sway on advertising. A novel metric that captures certain influence characteristics is frequently the focus of analysis of influence among OSN users. Numerous methods for calculating user influence are currently accessible in the scholarly literature [4]. Most of them evaluate the OSN’s influence on the world and believe it is easy to get a sizable sample of data from the OSN to calculate such a metric. Twitter has drawn a lot of attention as a platform of choice for assessing user impact because of its (relatively) open platform and users’ ability to use their following and retweet ideas. Obtaining a complete view of the users’ data (such as posts, photographs, comments, reactions, reposts, etc.) in numerous real OSNs, such as Facebook, proves to be incredibly challenging and unfeasible due to API restrictions and user privacy settings.
As a result, the majority of research in the field of social influence over the last decade has focused on developing methods for calculating the influence of Twitter users. Instead, studies on Facebook’s impact have focused on identifying important pages, influential individuals and influential user-generated content (such as posts or photographs). User communities (or social groups) are another noteworthy focus of the OSN model [5]. Indeed, communities are very common in today’s OSNs and the vast majority of OSN sites allow users to form groups to facilitate content sharing among group members. The flow of information generated by such organizations could have a significant impact on capturing the attention of their members. Using a temporal network to model group member interactions is ideal for capturing essential communication patterns and user behaviour within the system. As a result, we believe that predicting the most influential members within the context of communities will be critical in current OSNs. The Facebook Community Leadership Program is a worldwide effort that invests in administrators who assist groups in growing. If administrators successfully create and manage user communities, Facebook will pay them tens of millions of dollars. A runner from the United Arab Emirates named Manal Rostom started the Surviving Hijab Facebook group. This group has got 500,000 people to talk about how hard it is to wear a hijab and play sports.
Gradient-boosted decision trees are a popular technique for classifying and forecasting problems. The method improves the learning procedure by simplifying the goal and reducing the number of iterations required to reach a sufficiently optimal solution. Ahmadianfar et al.’s The Gradient Based Optimizer (GBO) was created in 2020 [6]. The Newtonian method had an effect on the GBO. The Gradient Search Rule (GSR) and the Local Escape Operator (LEO) are also included (GEO). GBO combines GB with population-based approaches. The shortcomings of previous methods are overcome by the robust and effective GBO algorithm. The GB method is used in a special optimization method called GBO, which ignores and skips through impractical regions in favor of useful ones. It also utilizes the benefits of population-based methodologies. The performance of the GBO was evaluated using six engineering challenges and 28 mathematical test functions. The exploitative, exploratory and local optimality avoiding behaviors of GBO were further studied utilizing unimodal, multimodal and compositional criteria. In an experiment, CGBO outperformed the sine-cosine algorithm (SCA), salp swarm algorithm (SSA), moth flame optimizer (MFO), particle swarm optimization (PSO) and five other metaheuristic algorithms. The results showed that, in comparison to other metaheuristic algorithms, CGBO was able to efficiently find and select the best feature subset, which improved classification performance and reduced the number of features selected. Data research reveals that, when compared to other popular optimizers, GBO routinely outperforms them. GBO also nearly never becomes trapped at a local optimum [7] or converges too quickly.
This paper introduces a methodology for calculating and forecasting users’ domain-based credibility in Social big data (SBD). There are few methods for measuring domain-based trust in the literature of social media trust. To better understand user behaviors in the OSNs, a fine-grained trustworthiness analysis in the context of SBD has been the subject of several reviews. Microblogging social networking platform Twitter allows users to publish and disseminate short text messages (tweets) about their thoughts, beliefs and areas of interest. According to the reviewed literature, the state-of-the-art methods only focus on Twitter users and employ a single machine learning technique to determine their credibility. No quantitative comparisons or analyses of the various machine learning methods used to gauge domain-based Twitter trustworthiness have been conducted to the best of our knowledge. It follows that such endeavors may pave the way to a more convincing machine learning strategy. To assess and foretell Twitter’s reliability, several machine learning algorithms were implemented and integrated within the proposed framework. Experiments using a variety of machine learning techniques validate the viability and efficacy of identifying influencer and non-influencer users in the specified domain, providing further evidence in support of the approach. Our method has been shown to accurately foresee key opinion leaders in each domain.
The goal of this study is to detail a framework for conceptualizing social networks. Its users and the tags they make are its top priorities. The connection that exists between these factors is represented quite accurately by this model. This model serves as the foundation for the proposed influence measures. They are a representation of the ability of user relationships to influence other people, the concern for user tags and the rate of tag propagation on the social network. The task of discovering the persons on social networks who have the most influence over businesses, goods and pieces of news may be readily achieved with the use of these measurements.
This work’s contributions are summarised as follows:
(a)
It is supported by a large experimental campaign, as well as a sound reasoning and established analytical methods.
(b)
To assess the projections’ accuracy, data are gathered on the interactions of around 800,000 people from 18 distinct Facebook groups.
(c)
The outcomes demonstrate the quality and viability of our GBDT-CGBO strategy.
The remainder of this article is organized as follows. Section 2 gives an overview of some relevant work on the suggested strategy. Section 3 illustrates and discusses the system architecture. Section 4 presents the results of the experiments. Section 5 presents our findings and recommendations for future research.

2. Literature Survey

Kumar et al. [8] suggested utilising a multimodal SA to score each tweet and determine the polarity of its emotions (such as typographic, textual and info-graphic or image). This model was employed as a technique to improve SM analysis and monitoring based on visual listening. The results were positive and helped to improve the sentimental analysis process as a whole. The model’s primary shortcoming was that it was not able to recognize text as effectively as it could have with a more advanced Computer Vision API.
Albi et al. [9] investigated recent advances in statistical modelling for opinion-based applications, also known as influence analysis. They discussed the most efficient way to manage the formation of opinions within the network as well as the effects of additional social factors using two characteristics, the level of confidence and the number of links in OSN. The topic of discussion was specifically the level of confidence.
Zainuddin et al. [10] presented a hybridized methodology framework for a Twitter aspect-centric SA to conduct more precise analytics. This study investigated the Association Rule Mining (ARM) technique in POS (parts-of-speech) patterns to identify distinct multi- or single-word characteristics. Its implementations, which included results from the expectation-centric sentiment classifier methodology, demonstrated that the hybridized sentiment classification (SC) technique outperformed the baseline SC techniques by 76.545%, 71.620% and 74.24%, respectively.
Ferreira et al. 2021 [11] examine the structure that arises due to the co-interactions between users and political profiles on IG during the 2018 European and Brazilian elections. We used a probabilistic model that takes the heart out of interaction networks to investigate how user communities emerge and expand. In the long run, politicians are more likely to amass devoted followers than the general public.
Nagarajan et al. [12] proposed a hybridized framework for categorizing SA, in which 600 million public tweets were gathered with a URL-centric security tool and SA was implemented via feature generation. When compared to other contemporary algorithms, the combination of PSO, DT and GA performed better. Combining this optimization strategy with the machine learning classifier resulted in a classification accuracy of more than 90% for tweets classified as “positive”, “negative”, or “neutral”.
Gabielkov et al. [13] carried out research to investigate and attempt to forecast clicks on tweets Clicks, in contrast to posts, arrive and leave at a wider variety of times, leaving behind a drawn-out tail as they go. Posts, on the other hand, have a more consistent time of arrival and departure. The authors, like humans, use preliminary interactions to foresee further clicks. They demonstrate that the Pearson correlation between clicks on tweets in the first hour and clicks at the end of the day is 0.83, indicating that a simple linear regression based on the number of clicks in the first hour may accurately predict clicks at the end of the day.
Thakur [14] presents a sentiment analysis of Tweets and the results indicate that, despite many discussions, debates, opinions, information and misinformation on Twitter about various topics related to monkeypox, such as monkeypox and the LGBTQI+ community, monkeypox and COVID-19, vaccines for monkeypox, etc., most Tweets were “neutral”. The subsequent sentiments were “negative” and “positive”, respectively. To support research and development in this field, the paper concludes with a list of 50 open research questions related to the outbreak that can be investigated using this dataset and Big Data, Data Mining, Natural Language Processing and Machine Learning.
Garcia K. et al. [15] investigated Twitter content in English and Portuguese, primarily from the United States and Brazil, in response to the COVID-19 pandemic between April and August 2020. In both languages, they identified ten main topics related to COVID-19, of which seven are equivalent. In almost every topic identified during the COVID-19 pandemic, negative emotions predominated. Most involve proliferative care, case reports and statistics. This pattern was observed in both English and Portuguese tweets. Given the global scope of this pandemic, these negative emotions are to be expected. Strategic public health communication by governments and authorities could counteract these attitudes.
Ren et al. [16] presented a technique for topic-ameliorated word embedding with a focus on Twitter SC. Latent Dirichlet Allocation (LDA)-based subject matter was initially generated. Then, by encoding subject information, a topic-improved recursive auto-encoder was constructed. The topic-ameliorated word embedding model was used with conventional models to improve performance. Experiments show that the model not only outperformed traditional models for the Twitter SC challenge but also outperformed alternative word representation models. However, topic-ameliorated word embeddings with opposing polarity may differ more emotionally.
Pandey et al. claim to have finished a hybrid cuckoo search technique for Twitter sentiment analysis [17]. In this paper, a brand-new metaheuristic methodology built on cuckoo search and K-means is presented. The suggested technique was applied to choose the most effective cluster heads from the emotive contents of the Twitter dataset. Particle swarm optimization, differential evolution, cuckoo search, improved cuckoo search, gauss-based cuckoo search and two n-grams techniques were compared to and evaluated against the suggested method on various twitter datasets. Experimental findings and statistical analysis demonstrate that the suggested method outperforms the existing ones. The suggested method has implications for future studies on media and social network data analysis, theoretically speaking. This approach has extensive practical ramifications for creating a system that can offer thorough analyses of any social topic.
Phan et al. [18] used the concept of word embedding to learn language patterns in the form of a language model. The language model was built only once (on the Reuters news dataset) and then generalized to be applicable to any number of datasets (Twitter and Enron in the work in question). The effectiveness of various classifiers, such as ANN, LibSVM, Decision Trees and Naive Bayes, was evaluated and compared. ANN significantly outperformed the competition, with test accuracy rates of 82.79% and 81.66%, respectively.

3. Proposed System

This section explains the proposed framework’s overall layout as well as the operations that form the influencer prediction process. Particularly, the process phases cover a wide range of prediction topics, such as data gathering, data modelling, data transformation, training and evaluation. Additionally, each of these stages can be further broken down into one or more tasks, each of which corresponds to a different method and tool for data analysis (such as machine learning and data mining approaches), which are discussed in more detail below. The workflow for influencer prediction is shown in Figure 1, along with the tasks that must be carried out at each stage. The suggested structure is not dependent on any particular data processing method, hence it is meant to be all-inclusive. As a result, we may choose and employ a number of data analysis techniques and tools in our framework based on the algorithmic approach used to identify the most important members.

3.1. Influence in Society

Since influence is such a broad concept, there is some disagreement over how to define it in both business and academia. Some people view user influence as a measure of their popularity, while others see it as a reflection of their OSN involvement. However, there are significant changes that must be recognized in order to devise a new method for determining who the dominant people in a community are.
The effect of group members can be measured in the context of OSN-defined social groups using a metric that makes use of group knowledge, such as member behaviors or information from their profiles [18]. In this article, we describe a member’s impact as her ability to draw others’ attention to herself as a result of her participation in a certain activity. User profiles are not taken into consideration in our study; instead, we simply pay attention to the behaviors of group members. The fact that the majority of profile information is private and inaccessible has an impact on this choice. The actions of a group can be categorized as either active or passive. Other group members cannot see passive actions because they solely consist in reading messages, browsing comments and answers, or clicking on a group link. They are not covered since they are outside the purview of this essay. Instead, we will focus on taking obvious action that is visible to everyone (such as publication of content, comments, replies, reactions, etc.).
Let the collection of interactions between G group members over the length of time T be denoted by ET. The influence measure IET (u) of a group member is defined by the function IET: G IR that gives u, G a numerical value. This metric shows how much a group member affects the other group members’ behaviors throughout the course of time T, resulting in a sizable number of interactions in ET. The most influential group members can be found by comparing their influence ratings after the impact measure for each group member has been determined.
Due to the intricacy of OSN, the influence measure is frequently computed by merging numerous variables. A measure of influence may consider both the structural qualities of the group as a whole and the local features of the group members (such as the types and volume of contacts they have with other members) (e.g., how important a member is to the group or how long it takes for information to spread because of a member).
Figure 1 depicts the planned GBDT-CGBO block diagram. The diagram clearly shows how social media data is collected as input and preprocessed for further optimization. Preprocessing is a practice in data mining that cleans and organizes raw data for subsequent usage. This process eliminates data anomalies or duplication that might otherwise reduce a model’s accuracy. Additionally, proper data preparation ensures that no missing or incorrect values exist as a result of human error or software flaws. For sentiment analysis, the tweet replies are taken into consideration.
Following this, the data is evaluated for social influence and categorized using the GBDT algorithm, as illustrated. Gradient-boosted decision trees are a machine learning technique for improving a model’s prediction value through repeated learning steps. The classified data is then further optimized with the CGBO optimizer and the finished data is tested to demonstrate its superior performance over the other methodologies.

3.2. Gradient Boosted Decision Tree Algorithm (GBDT)

Following this, we present our gradient boosting approach, which is based on a boosting tree. The following are the procedures:
Step 1: Initialize f 0 ( x ) = 0 .
Step 2: Perform the following to calculate the residual for each m = 1, 2, …, M:
r m i = y i f m 1 ( x ) , i = 1 , 2 , N
Step 3: Learn a regression tree by fitting r m i . The output is h m ( x ) .
Step 4: Update f m ( x ) , where f m ( x ) = f m 1 + h m ( x ) and obtain the gradient tree for the regression problem:
f M ( x ) = m = 1 M h m ( x )

GBDT Algorithm

Finally, we show our GBDT method in the following manner.
Step 1: Initialize a weak learner.
f 0 ( x ) = arg min c i = 1 N L ( y i , c )
Step 2: For each m = 1, 2, …, M:
Step 2(a): For each sample i = 1, 2, …, N, calculated the residual (i.e., negative gradient) as follows:
r r i m = L y i , f x i f x i  
where f x = f m 1 x
Step 2(b): Consider the residual, rim, as the new value and xi and rim as the training data for the following tree for each i = 1, 2, …, N. Assume that f m ( x ) is the new regression tree and that R j m represents the regions of its leaf nodes, where j = 1, 2, …, J. j stands for the number of leaves in the specified regression tree in this case.
Step 2(c): Calculate the corresponding optimal fitting value as follows for each j = 1, 2, …, J:
γ j m = arg min Y x i R j m L ( y i , f m 1 ( x i ) + γ )
Step 2(d): Create a model for increased learning as follows:
f m ( x ) = f m 1 ( x ) + j = 1 J γ j m I ( x R j m )
Step 3: The completed model should look like this:
f ( x ) = f M ( x ) = f 0 ( x ) + m = 1 M j = 1 J γ j m I ( x R j m )

3.3. Chaotic Gradient-Based Optimizer

The purpose of this chaotic method is to improve the quality of search for the global optimum by decreasing the likelihood of becoming locked in a “local optimum”. As a result, chaos theory is being used for a variety of optimization problems. Chaos can be used to determine the optimum answer if the FS problem is described as an optimization problem with a search space of 0 to 1.
A GBO [18] can identify optimal solutions to difficult optimization problems by combining population-based and gradient-based methodologies [18,19,20,21]. The GBO method navigates the issue space using Newton’s method and puts the search agent in the proper direction [22,23,24,25]. The gradient search rule and the locality escaping operator are crucial to the success of the GBO method [26,27,28,29].

3.3.1. Initialization Stage

As was previously stated, the GBO method [30,31,32] uses a uniform distribution of initial solutions, after which the positions of the agents are adjusted in the gradient’s favor [33,34,35,36,37]. A critical component is used to establish a balance between exhaustively investigating all feasible solutions and accepting substandard ones [38,39,40,41,42].
Y n = Y min + r a n d ( 0 , 1 ) × ( Y max Y min )
where Y is the decision variable, Y min and Y max are the bounds and rand(0,1) as in Equation (8) is a random number between 0 and 1.

3.3.2. Gradient Search Rule Stage

In exploration and exploitation activities can be balanced by modifying the parameter in line with the sine function.
ϑ 1 = 2 × r a n d × β × β
β = α × sin 3 π 2 + sin α × 3 π 2
α = α min + α max α min × 1 n N 3 2
While N is the total number of iterations and n is the current iteration number, α min and α max are constant values of 0.2 and 1.2, respectively. This option’s value changes between iterations [43,44,45,46,47]. To encourage population variance, it starts with a high value in the early optimization rounds. In order to hasten population convergence, the value is subsequently decreased over a number of repetitions [48,49,50]. The parameter value steadily rises within a predetermined range, expanding the variety of potential solutions and selecting the best that allows for further exploration. As a result, it is now feasible to stop local sub-regions [51,52,53]. There are several techniques to calculate GSR:
G S R = r a n d m × ϑ 1 × 2 Δ y × y m y w o r s t y b e s t + γ
Equation (13), which demonstrates how to calculate the random offset that exchanges the dissimilarity between the optimal solution ( y b e s t ) and a randomly picked solution ( y s 1 n ), is shown above in Equation (12). Based on equation, the variable’s Δ y meaning is modified in Equation (15). The following equation incorporates a second random integer during the exploration phase.
Δ y = r a n d 1 : M × s t e p
s t e p = y b e s t y s 1 n + ρ 2
ρ = 2 × r a n d × y s 1 n + y s 2 n + y s 3 n + y s 4 n 4 y m n
where a random vector with a range of (0,1) of M items is designated by the symbol rand (1:M). Two parameters, y b e s t and y s 1 n , are used to measure the phase scale and decide it “step-wise”. Four numbers ( s 1 s 2 s 3 s 4 m ) picked at random differ from one another.
When directional tonal movement (DM) is used, the y n space of solutions converges. The DM provides a realistic search direction that greatly affects GBO convergence by altering the current vector ( y n ) to point in the direction of the most viable ( x b e s t x n ) .
D M = r a n d × ϑ 2 × y b e s t y m
where ϑ 2 is a uniformly distributed random parameter that determines the length of each vector agent’s stride and rand is an integer with the same distribution. Important components of the GBO exploration process are taken into account by the ϑ 2 parameter. The following formula is used to compute the ϑ 2 parameter:
ϑ 2 = 2 × r a n d × β × β
The location of the current vector ( y m n ) is then modified using variables GSR and DM by applying Equations (18) and (19).
Y 1 m n = y m n G S R + D M
where Y 1 m n is the vector that has been changed as a result of modifying x m n . The Y 1 m n can be recast using Equations (11) and (12) as follows:
Y 1 m n = y 1 m n r a n d m × ϑ 2 × 2 Δ y × y m n x q m n y p m n + γ + r a n d m × ϑ 2 × x b e s t x m n
where the vectors y m and z m + 1 of the current solution are x q m n , y p m n and x m + Δ y and x m Δ y , x m , respectively, are equal to the average of the two vectors. This is calculated using the following formula:
z m + 1 = y m r a n d m × 2 Δ y × y m n y w o r s t y b e s t + γ
y w o r s t and y b e s t denote the worst and best solutions, whereas y m n and R represent both the current solution vector and a random solution vector of dimension n. The calculation above demonstrates how to replace the current solution vector, y m n , with the optimal solution vector, Y 2 m n :
Y 2 m n = y b e s t r a n d m × ϑ 1 × 2 Δ y × y m n x q m n y p m n + γ + r a n d m × ϑ 2 × x s 1 n x s 2 n
The following equations are used to enhance the GBO method’s exploration and exploitation stages. In this search method, the exploitation process is given precedence. Equation (20) serves local searches better, while Equation (21), serves worldwide searches better Equation (19). For the next iteration, the following response is preferable:
x m n + 1 = s a × s b × Y 1 m n + 1 s b × Y 2 m n + 1 s a × Y 3 m n
s a and s b are two random numbers, each falling between [0, 1]. y 3 n m is calculated as follows:
y 3 n m = Y m n + 1 ϑ 1 × Y m n Y 1 m n

3.3.3. Local Escaping Operator Stage

The Local Escaping operator would improve the proposed GBO algorithm’s ability to handle complex problems ( Y L E O n ), successfully updating the solution’s position by the Y L E O n . As a result, the convergence to a global optimum is sped up. The Y L E O n incorporates a variety of methodologies, including (the best position, the solutions randomly selected from population Y 1 m n , Y 1 m n and randomly generated solution Y 1 s 2 n , Y 1 s 2 n ). The method is applied in accordance with the following suggestions, effectively refreshing current solutions.
If rand < qs
Y L E O n = Y m n + 1 + g 1 ( v 1 y b e s t v 2 y k n )                     + g 2 ϑ 1 ( v 3 ( Y 2 m n Y 1 n m ) ) + v 2 ( y s 1 n y s 2 n ) / 2 Y m n + 1 + g 1 ( v 1 y b e s t v 2 y k n )                     + g 2 ϑ 1 ( v 3 ( Y 2 m n Y 1 n m ) ) + v 2 ( y s 1 n y s 2 n ) / 2
g 2 is a random number from a normal distribution with a mean of zero and a standard deviation of one, whereas g 1 is a uniform random number in the range [0, 1]. The definition of probability is pr. Three random numbers, v 1 , v 2 and v 3 , were produced as follows:
v 1 = 2 × r a n d     i f η 1 < 0.5 1                   o t h e r w i s e
v 2 = r a n d     i f η 1 < 0.5 1                   o t h e r w i s e
v 3 = r a n d     i f η 1 < 0.5 1                   o t h e r w i s e
If η 1 is a number in the range [0, 1], then rand is a random number from the range number ∈ [0, 1]. The previous v 1 , v 2 , v 3 equations can be simplified as follows:
v 1 = G 1 × 2 × r a n d + ( 1 G 1 )
v 2 = G 1 × r a n d + ( 1 G 1 )
v 3 = G 1 × r a n d + ( 1 G 1 )
where G 1 is a parameter with two possible values (0 and 1) and is 1 if η 1 is less than 0.5 and 0 otherwise. It is advised to follow the steps below to find the solution y k n :
y k n = y r a n d ,                       i f η 2 < 0.5 y q n                               o t h e r w i s e
y r a n d is a randomly generated solution in the formula:
y r a n d = Y min + r a n d ( 0 , 1 ) × ( X max X min )
In the [0, 1] range, η 2 is a chance number and the algorithm reflag provides a straightforward explanation of the GBO method’s pseudo-code.
An N-dimensional chaotic map has the following properties:
CGBO employs a variety of maps, including Chebyshev, circular, logistic, Guass/Mouse, piecewise, sine, singer, sinusoidal and tent maps. If these maps operate as anticipated, the GBO’s productivity and convergence rate could be greatly increased. To ensure that each iteration of the proposed algorithm performs as expected, the results must be evaluated at various stages throughout the process. The CGBO’s fitness function is broken down into its essential pieces below.
C j ( k + 1 ) = g ( C j k ) ,                   j = 1 , 2 , 3 , n                     C j ( 0 )             C j k
F i t n e s s       f u n c t i o n ( f o b j ) = β + α R C G
where Fitness > T; R stands for classification error rate, C for the total number of features in the dataset, α for relative importance of classification quality, and β for subset length, which is specified in the range [0, 1]; G represents the group column of the classifier; T stands for the circumstance in which each method is assessed using the fitness function. To maximize the solution, the objective function must be greater than T.

4. Results and Discussion

To conduct the online study of the social context in which the news is delivered, a survey asking real people to judge the trustworthiness of specific Twitter identities was created. Profiles of real persons or websites were displayed to users, with selection based on how much bogus or real news they shared throughout the dataset’s collection phase. At random, each user was assigned five extremely trustworthy profiles and five extremely untrustworthy profiles.
The experiment is carried out on a computer running the Windows 7 operating system and an I5 dual core while using the PyCharm integrated development environment. The Lastfm dataset and the CiaoDVD dataset are used to assess the trained models. 17,615 users, 16,121 films, 72,665 interactive user and film records and 40,133 user social records make up the movie dataset known as CiaoDVD. The ratings range from 1 to 5 and users tend to favor films with higher ratings. The users’ social connections serve as a proxy for their friendships. Even though there are many ratings, the movie dataset is still sparse—at about 0.0256%. In total, 1892 users, 17,632 songs, 12,717 social records for users, 92,834 music records of users and 11,946 tags make up the Lastfm music dataset. The music dataset is sparse to a degree of about 0.2783%.
The confusion matrix assists practitioners in judging whether the outputs are of good quality. Patients who had heart disease and were correctly diagnosed were labelled as true positives (TPs), while those who did not have the disease were labelled as true negatives (TNs), while those who did not have heart disease were labelled as false negatives (FNs) and those who did not have heart disease were labelled as false positives (FPs). In medicine, the most harmful forecasts are those that result in false negatives. The different performance metrics were created with the use of a confusion matrix. Accuracy was determined using instances that were correctly identified (Acc). The accuracy is calculated from the Equation (35)
A c c u r a c y = T P + T N T P + F N + F P + T N
Precision was defined as the positive prediction value by
P r e c i s i o n = T P T P + F P
The proportion of individuals with cardiac disease identified by recall
R e c a l l = T P T P + F N
The F1 score took into account a harmonic average of precision in Equation (36) and recall in Equation (37) defined by
F 1 S c o r e = 2   P r e c i s i o n R e c a l l P r e c i s i o n + R e c a l l
The Root Mean Squared Error statistic can be used to determine how far actual results differ from estimates (RMSE). Its value can be calculated using Equation (39).
R M S E = i = 1 n ( p r e d i c t e d i a c t u a l i ) 2 n

4.1. Precision Analysis

A comparison of the precision of the GBDT-CGBO approach with other existing approaches is shown in Figure 2 and Table 1. The graph demonstrates that the network technique has led to improved performance and accuracy. For instance, the GBDT-CGBO model has gained 92.25% for data, compared to NB, PCA, ANN and SVC with 64.32%, 70.72%, 74.94% and 80.23%. However, the GBDT-CGBO model has shown maximum performance with different data sizes. Similarly, under 300 data, GBDT-CGBO achieved 96.92% whereas NB, PCA, ANN and SVC models gained 69.83%, 73.84%, 77.84% and 89.65%, respectively.

4.2. Recall Analysis

Figure 3 and Table 2 demonstrate a recall comparison between the GBDT-CGBO strategy and other approaches in use. The graph demonstrates that the network technique led to improved performance with recall. For example, with data 100, the GBDT-CGBO model gained 90.45% recall, whereas the NB, PCA, ANN and SVC models obtained recall of 68.54%, 72.84%, 76.13% and 81.41%, respectively. However, the GBDT-CGBO model has shown maximum performance with different data set sizes. Similarly, under 300 data GBDT-CGBO achieved 94.54%, whereas NB, PCA, ANN and SVC models achieved 71.67%, 75.64%, 80.32% and 85.76%, respectively.

4.3. F-Score Analysis

Figure 4 and Table 3 present a comparison of the GBDT-CGBO strategy and other existing methodologies using F-score analysis. The graph demonstrates that the network strategy led to improved performance as measured by the F-score. For example, with data 100, the F-score value is 90.12% for GBDT-CGBO, whereas the NB, PCA, ANN and SVC models have obtained F-scores of 78.43%, 82.65%, 85.45% and 86.74%, respectively. However, the GBDT-CGBO model has shown maximum performance with different data size. Similarly, under 300 data, the F-score value of GBDT-CGBO is 93.67%, whereas NB, PCA, ANN and SVC models achieved 80.43%, 84.54%, 86.56% and 89.74%, respectively.

4.4. RMSE Analysis

Figure 5 and Table 4 demonstrate an RMSE comparison of the GBDT-CGBO approach against various available techniques. The graph demonstrates that the network strategy led to improved performance with a lower RMSE value. For example, with data 100, the RMSE value is 32.91% for GBDT-CGBO, whereas the NB, PCA, ANN and SVC models have slightly enhanced RMSE of 49.74%, 44.35%, 48.54% and 39.43%, respectively. However, the GBDT-CGBO model has shown maximum performance for different data sizes with low RMSE values. Similarly, under 300 data, the RMSE value of GBDT-CGBO is 30.21%, while it is 53.65%, 46.28%, 43.72% and 34.76% for NB, PCA, ANN and SVC models, respectively.

4.5. Execution Time

In Table 5, how the GBDT-CGBO technique’s execution time compares to that of existing techniques is detailed. The data clearly shows that the GBDT-CGBO method has outperformed the other techniques in all aspects. For example, with 100 data, the GBDT-CGBO method has taken only 3.327 s to execute, while the other existing techniques such as NB, PCA, ANN and SVC have an execution time of 9.321 s, 8.632 s, 7.123 s and 5.980 s, respectively. Similarly, for 300 data points, the GBDT-CGBO method has an execution time of 5.765 s while the other existing techniques such as NB, PCA, ANN and SVC have taken 9.652 s, 8.576 s, 8.132 s and 6.665 s of execution time, respectively as shown in Figure 6.

4.6. Accuracy Analysis

Figure 7 and Table 6 provide a comparison of the GBDT-CGBO approach’s accuracy with other existing approaches. The graph illustrates that the network technique resulted in improved performance and accuracy. For example, with data 100, the accuracy value is 94.65% for GBDT-CGBO, whereas the NB, PCA, ANN and SVC models have obtained an accuracy of 59.76%, 69.65%, 80.54% and 86.15%, respectively. However, the GBDT-CGBO model has shown maximum performance with different data set sizes. Similarly, under 300 data, the accuracy value of GBDT-CGBO is 98.76%, while it is 65.45%, 77.89%, 86.56% and 89.72% for NB, PCA, ANN and SVC models, respectively.

5. Conclusions

The study mentioned set out to look into the factors that can be used both automatically and manually to identify social network profiles that spread false information. We worked on two levels to accomplish this goal: first, we extracted and used criteria related to news content to classify it as authentic or false. After that, we worked on identifying elements like social, personal and interaction data with both content and other users to ascertain the news-sharing reliability of the observed users. The GBDT-CGBO framework was introduced in this review, along with a helpful mechanism for identifying users who may be able to influence the behaviour of others in the future based on prior interactions within the group. Our contribution is backed up by a sizable experimental effort, strong logic and tried-and-true analytical methods. It is supported by a large experimental campaign, sound reasoning and accepted analytical techniques. Data was collected on the interactions of approximately 800,000 people from 18 different Facebook groups to assess the accuracy of the projections. The results demonstrate how effective and practical our GBDT-CGBO strategy is. Under 300 data points, GBDT-precision CGBO’s value is 96.92%. With 100 pieces of data, the GBDT-CGBO method only took 3.327 s and with 100 pieces of data the recall value for GBDT-CGBO is 90.45%, the F-score value is 90.12%, the RMSE value is 32.91% and the accuracy value is 94.65% for GBDT-CGBO. The experimental evaluation results show that, with an average accuracy of 98.76%, the objective of differentiating false news from legitimate news has been achieved for content categorization. AUC is the most popular measure of novel proposed approaches. Future studies should measure novel methodologies unless other conditions can be met. Rapid growth, sparseness and network properties are link prediction problems. Much real-network data, like online social networks, is dynamic and sparse. Link prediction must avoid isolated node cold-start difficulties. Using tags and time to increase forecast accuracy is another difficulty. To address these issues, future research must shift its focus away from online social networks and toward link prediction in co-authorship networks and economic networks. The rise in scientific publications encourages co-authorship networks and strengthens author relationships.

Author Contributions

Conceptualization, N.S. and P.M.; methodology, V.S.; software, S.V.E.; validation, N.S., P.M. and M.S.; formal analysis, N.S.; investigation, V.S.; resources, M.S.; data curation, N.S.; writing—original draft preparation, V.S.; writing—review and editing, N.S. and P.M.; visualization, P.M.; supervision, N.S.; project administration, S.V.E.; funding acquisition, S.V.E. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data presented in this study are available on request from the corresponding author.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Zhang, Y.; Song, D.; Zhang, P.; Li, X.; Wang, P. A quantum-inspired sentiment representation model for twitter sentiment analysis. Appl. Intell. 2019, 49, 3093–3108. [Google Scholar] [CrossRef]
  2. Arora, M.; Kansal, V. Character level embedding with deep convolutional neural network for text normalization of unstructured data for Twitter sentiment analysis. Soc. Netw. Anal. Min. 2019, 9, 12. [Google Scholar] [CrossRef]
  3. Backaler, J. Business to consumer (B2C) influencer marketing landscape. In Digital Influence; Palgrave Macmillan: Cham, Switzerland, 2018; pp. 55–68. [Google Scholar]
  4. Riquelme, F.; González-Cantergiani, P. Measuring user influence on Twitter: A survey. Inf. Process. Manag. 2016, 52, 949–975. [Google Scholar] [CrossRef] [Green Version]
  5. Topirceanu, A.; Udrescu, M.; Marculescu, R. Weighted betweenness preferential attachment: A new mechanism explaining social network formation and evolution. Sci. Rep. 2018, 8, 10871. [Google Scholar] [CrossRef] [Green Version]
  6. Ahmadianfar, I.; Bozorg-Haddad, O.; Chu, X. Gradient-based optimizer: A new metaheuristic optimization algorithm. Inf. Sci. 2020, 540, 131–159. [Google Scholar] [CrossRef]
  7. Deb, S.; Abdelminaam, D.S.; Said, M.; Houssein, E.H. Recent methodology-based gradient-based optimizer for economic load dispatch problem. IEEE Access 2021, 9, 44322–44338. [Google Scholar] [CrossRef]
  8. Kumar, A.; Garg, G. Sentiment analysis of multimodal twitter data. Multimed. Tools Appl. 2019, 78, 24103–24119. [Google Scholar] [CrossRef]
  9. Albi, G.; Pareschi, L.; Toscani, G.; Zanella, M. Recent advances in opinion modeling: Control and social influence. Act. Part. 2017, 1, 49–98. [Google Scholar]
  10. Zainuddin, N.; Selamat, A.; Ibrahim, R. Hybrid sentiment classification on twitter aspect-based sentiment analysis. Appl. Intell. 2018, 48, 1218–1232. [Google Scholar] [CrossRef]
  11. Ferreira, C.H.; Murai, F.; Silva, A.P.; Almeida, J.M.; Trevisan, M.; Vassio, L.; Mellia, M.; Drago, I. On the dynamics of political discussions on Instagram: A network perspective. Online Soc. Netw. Media 2021, 25, 100155. [Google Scholar] [CrossRef]
  12. Nagarajan, S.M.; Gandhi, U.D. Classifying streaming of Twitter data based on sentiment analysis using hybridization. Neural Comput. Appl. 2019, 31, 1425–1433. [Google Scholar] [CrossRef]
  13. Gabielkov, M.; Ramachandran, A.; Chaintreau, A.; Legout, A. Social clicks: What and who gets read on Twitter. In Proceedings of the 2016 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Science, Antibes Juan-les-Pins, France, 14–18 June 2016; Association for Computing Machinery: New York, NY, USA, 2016; pp. 179–192. [Google Scholar]
  14. Thakur, N. MonkeyPox2022Tweets: A Large-Scale Twitter Dataset on the 2022 Monkeypox Outbreak, Findings from Analysis of Tweets, and Open Research Questions. Infect. Dis. Rep. 2022, 14, 855–883. [Google Scholar] [CrossRef] [PubMed]
  15. Garcia, K.; Berton, L. Topic detection and sentiment analysis in Twitter content related to COVID-19 from Brazil and the USA. Appl. Soft. Comput. 2021, 101, 107057. [Google Scholar] [CrossRef]
  16. Ren, Y.; Wang, R.; Ji, D. A topic-enhanced word embedding for Twitter sentiment classification. Inf. Sci. 2016, 369, 188–198. [Google Scholar] [CrossRef]
  17. Pandey, A.C.; Rajpoot, D.S.; Saraswat, M. Twitter sentiment analysis using hybrid cuckoo search method. Inf. Process. Manag. 2017, 53, 764–779. [Google Scholar] [CrossRef]
  18. Phan, T.D.; Zincir-Heywood, A.N. A language model for compromised user analysis. In Proceedings of the NOMS 2018–2018 IEEE/IFIP Network Operations and Management Symposium, Taipei, Taiwan, 23–27 April 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 1–4. [Google Scholar]
  19. Wu, S.Y.; Zhang, Q.; Xue, C.Y.; Liao, X.Y. Cold-start link prediction in multi-relational networks based on network dependence analysis. Phys. A Stat. Mech. Its Appl. 2019, 515, 558–565. [Google Scholar] [CrossRef]
  20. Thangavel, R. Resource selection in grid environment based on trust evaluation using feedback and performance. Am. J. Appl. Sci. 2013, 10, 924. [Google Scholar]
  21. Hardas, B.M.; Pokle, S.B. Optimization of peak to average power reduction in OFDM. J. Commun. Technol. Electron. 2017, 62, 1388–1395. [Google Scholar] [CrossRef]
  22. Satpathy, S.; Padthe, A.; Trivedi, M.C.; Goyal, V.; Bhattacharyya, B.K. Method for measuring supercapacitor’s fundamental inherent parameters using its own self-discharge behavior: A new steps towards sustainable energy. Sustain. Energy Technol. Assess. 2022, 53, 102760. [Google Scholar] [CrossRef]
  23. Aslan, S.; Kaya, M. Topic recommendation for authors as a link prediction problem. Future Gener. Comput. Syst. 2018, 89, 249–264. [Google Scholar] [CrossRef]
  24. Gowshika, U.; Ravichandran, T. A smart device integrated with an android for alerting a person’s health condition: Internet of Things. Indian J. Sci. Technol. 2016, 9, 1–6. [Google Scholar]
  25. Wang, J.; Zhang, Q.M.; Zhou, T. Tag-aware link prediction algorithm in complex networks. Phys. A Stat. Mech. Its Appl. 2019, 523, 105–111. [Google Scholar] [CrossRef]
  26. KavithaPriya, C.J. An analysis of types of protocol implemented in internet of things based on packet loss ratio. In Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies, Udaipur, India, 4–5 March 2016; Association for Computing Machinery: New York, NY, USA, 2016; pp. 1–6. [Google Scholar]
  27. Ai, J.; Su, Z.; Li, Y.; Wu, C. Link prediction based on a spatial distribution model with fuzzy link importance. Phys. A Stat. Mech. Its Appl. 2019, 527, 121155. [Google Scholar] [CrossRef]
  28. Aslan, S.; Kaya, B. Time-aware link prediction based on strengthened projection in bipartite networks. Inf. Sci. 2020, 506, 217–233. [Google Scholar] [CrossRef]
  29. Mahmoudi, A.; Yaakub, M.R.; Abu Bakar, A. A new real-time link prediction method based on user community changes in online social networks. Comput. J. 2020, 63, 448–459. [Google Scholar] [CrossRef]
  30. Kuppuraj, B.; Chellai, S. An enhanced security measure for multimedia images using hadoop cluster. Int. J. Oper. Res. Inf. Syst. 2021, 12, 1–7. [Google Scholar]
  31. Chiu, C.; Zhan, J. Deep learning for link prediction in dynamic networks using weak estimators. IEEE Access 2018, 6, 35937–35945. [Google Scholar] [CrossRef]
  32. Subramaniam, C.; Ravichandran, T. Resource discovery using brokering with dispute solving in grid environment. In Proceedings of the 13th International Conference on Advanced Communication Technology, Gangwon, Republic of Korea, 13–16 February 2011; pp. 511–516. [Google Scholar]
  33. Pokle, S.B. Analysis of OFDM system using DCT-PTS-SLM based approach for multimedia applications. Clust. Comput. 2019, 22, 4561–4569. [Google Scholar]
  34. Ravichandran, T. An efficient resource selection and binding model for job scheduling in grid. Eur. J. Sci. Res. 2012, 81, 450–458. [Google Scholar]
  35. Sayeed, R.F.; Princey, S.; Priyanka, S. Deployment of multicloud environment with avoidance of DDOS attack and secured data privacy. Int. J. Appl. Eng. Res. 2015, 10, 8121–8124. [Google Scholar]
  36. Satish Kumar, T.; Jothilakshmi, S.; James, B.C.; Arulkumar, N.; Rekha, C. HHO-based vector quantization technique for biomedical image compression in cloud computing. Int. J. Image Graph. 2021, 2240008. [Google Scholar] [CrossRef]
  37. Jaishankar, B.; Vishwakarma, S.; Aditya Kumar, S.P.; Ibrahim, P.; Arulkumar, N. Blockchain for securing healthcare data using squirrel search optimization algorithm. Intell. Autom. Soft. Comput. 2022, 32, 1815–1829. [Google Scholar] [CrossRef]
  38. Houssein, E.H.; Abdelminaam, D.S.; Hassan, H.N.; Al-Sayed, M.M.; Nabil, E. A hybrid barnacles mating optimizer algorithm with support vector machines for gene selection of microarray cancer classification. IEEE Access 2021, 9, 64895–64905. [Google Scholar] [CrossRef]
  39. Geetha, B.T.; Mary Rexcy Asha, S.; Michaelraj Kingston, R. Artificial humming bird with data science enabled stability prediction model for smart grids. Sustain. Comput. Inform. Syst. 2022, 36, 100821. [Google Scholar] [CrossRef]
  40. Subramani, N.; Subramanian, M.; Meckanzi, S. Handcrafted deep-feature-based brain tumor detection and classification using mri images. Electronics 2022, 11, 4178. [Google Scholar] [CrossRef]
  41. Rene Beulah, J.; Prathiba, L.; Murthy, G.L.N.; Fantin Irudaya Raj, E.; Arulkumar, N. Blockchain with deep learning-enabled secure healthcare data transmission and diagnostic model. Int. J. Model. Simul. Sci. Comput. 2022, 13, 2241006. [Google Scholar] [CrossRef]
  42. AI-Atroshi, C.; Rene Beulah, J.; Kranthi Kumar, S.; Pretty Diana Cyril, C.; Neelakandan, S.; Velmurugan, S. Automated speech based evaluation of mild cognitive impairment and Alzheimer’s disease detection using with deep belief network model. Int. J. Healthc. Manag. 2022. [Google Scholar] [CrossRef]
  43. Ravi Prakash, R.; Anuradha, D.; Javid, I.; Mohammad Gouse, G.; Ruby, S.; Neelakandan, S. A novel convolutional neural network with gated recurrent unit for automated speech emotion recognition and classification. J. Control. Decis. 2022. [Google Scholar] [CrossRef]
  44. Mayuri, A.V.R.; Neelakandan, S.; Murthy, G.L.N.; Arulkumar, N.; Nilesh, S. An efficient low complexity compression based optimal homomorphic encryption for secure fiber optic communication. Optik 2022, 252, 168545. [Google Scholar] [CrossRef]
  45. Sambath, V.; Ramanujam, R.; Sammeta, M. Deep learning enabled cross-lingual search with metaheuristic web-based query optimization model for multi-document summarization. Concurr. Comput. Pract. Exp. 2022, 35, e7476. [Google Scholar] [CrossRef]
  46. Prasanthi, B.; Neelakandan, S.; Alhassan Alolo, A.; Aditya Kumar Singh, P.; Ranjan, W. LSGDM with biogeography-based optimization (bbo) model for healthcare applications. J. Healthc. Eng. 2022, 2022, 2170839. [Google Scholar] [CrossRef]
  47. Jain, D.K.; Tyagi, S.K.S.; Neelakandan, S.; Natrayan, L. Metaheuristic optimization-based resource allocation technique for cybertwin-driven 6 g on ioe environment. IEEE Trans. Ind. Inform. 2022, 18, 4884–4892. [Google Scholar] [CrossRef]
  48. Shanmugavadivel, K.; Sathishkumar, V.E. Deep learning based sentiment analysis and offensive language identification on multilingual code-mixed data. Sci. Rep. 2022, 12, 21557. [Google Scholar] [CrossRef]
  49. Selvalakshmi, V.; Umadevi, A.; Eric Ofori, M. Artificial intelligence based customer churn prediction model for business markets. Comput. Intell. Neurosci. 2022, 2022, 1703696. [Google Scholar] [CrossRef]
  50. Ezhumalai, P.; Prakash, M. A deep learning modified neural network (dlmnn) based proficient sentiment analysis technique on twitter data. J. Exp. Theor. Artif. Intell. 2021. [Google Scholar] [CrossRef]
  51. Veeramani, T.; Surbhi, B.; Fida Hussain, M. Design of fuzzy logic-based energy management and traffic predictive model for cyber physical systems. Comput. Electr. Eng. 2022, 102, 108135. [Google Scholar] [CrossRef]
  52. Sridevi, M.; Saravanan, C.; Bheema, L. Deep learning approaches for cyberbullying detection and classification on social media. Comput. Intell. Neurosci. 2022, 2022, 2163458. [Google Scholar] [CrossRef]
  53. Ahmed, M.M.; Madhappan, S.; Satyanarayana Gupta, M. Metaheuristics with deep transfer learning enabled detection and classification model for industrial waste management. Chemosphere 2022, 308, 136046. [Google Scholar] [CrossRef]
Figure 1. Block diagram of the Proposed GBDT-CGBO method.
Figure 1. Block diagram of the Proposed GBDT-CGBO method.
Bdcc 07 00006 g001
Figure 2. Precision Analysis of GBDT-CGBO method with existing system.
Figure 2. Precision Analysis of GBDT-CGBO method with existing system.
Bdcc 07 00006 g002
Figure 3. Recall Analysis of GBDT-CGBO method with existing system.
Figure 3. Recall Analysis of GBDT-CGBO method with existing system.
Bdcc 07 00006 g003
Figure 4. F-Score Analysis of GBDT-CGBO method with existing system.
Figure 4. F-Score Analysis of GBDT-CGBO method with existing system.
Bdcc 07 00006 g004
Figure 5. RMSE Analysis of GBDT-CGBO method with existing system.
Figure 5. RMSE Analysis of GBDT-CGBO method with existing system.
Bdcc 07 00006 g005
Figure 6. Execution Time Analysis of GBDT-CGBO method with existing system.
Figure 6. Execution Time Analysis of GBDT-CGBO method with existing system.
Bdcc 07 00006 g006
Figure 7. Accuracy Analysis of GBDT-CGBO method with existing system.
Figure 7. Accuracy Analysis of GBDT-CGBO method with existing system.
Bdcc 07 00006 g007
Table 1. Precision Analysis of GBDT-CGBO method with existing system in percentage.
Table 1. Precision Analysis of GBDT-CGBO method with existing system in percentage.
No of Data from DatasetNaïve Bayes (NB)PCAANNSVCGBDT-CGBO
10064.3270.7274.9480.2392.25
15065.6771.8375.1283.4593.30
20066.8970.5474.9884.5394.62
25067.9872.7776.3286.7695.81
30069.8373.8477.8489.6596.92
Table 2. Recall Analysis of GBDT-CGBO method with existing system in percentage.
Table 2. Recall Analysis of GBDT-CGBO method with existing system in percentage.
No of Data from DatasetNaïve Bayes (NB)PCAANNSVCGBDT-CGBO
10068.5472.8476.1381.4190.45
15069.8272.1377.8484.6591.34
20069.3473.8678.9184.4192.87
25070.1274.4278.1283.5493.21
30071.6775.6480.3285.7694.54
Table 3. F-Score Analysis of GBDT-CGBO method with existing system in percentage.
Table 3. F-Score Analysis of GBDT-CGBO method with existing system in percentage.
No of Data from DatasetNaïve Bayes (NB)PCAANNSVCGBDT-CGBO
10078.4382.6585.4586.7490.12
15078.5783.1285.1286.9190.45
20078.1283.4585.3287.6591.32
25079.8084.1286.2388.1292.54
30080.4384.5486.5689.7493.67
Table 4. RMSE Analysis of GBDT-CGBO method with existing system in percentage.
Table 4. RMSE Analysis of GBDT-CGBO method with existing system in percentage.
No of Data from DatasetNaïve Bayes (NB)PCAANNSVCGBDT-CGBO
10049.7444.3548.5439.4332.91
15050.1245.2846.2338.7132.87
20052.4344.8345.6536.5332.80
25052.9145.9644.8135.4331.94
30053.6546.2843.7234.7630.21
Table 5. Execution Time Analysis of GBDT-CGBO method with existing system in seconds.
Table 5. Execution Time Analysis of GBDT-CGBO method with existing system in seconds.
No of Data from DatasetNaïve Bayes (NB)PCAANNSVCGBDT-CGBO
1009.3218.1327.1235.9803.327
1509.9328.7517.2315.6544.381
2009.4008.8217.8546.7323.723
2509.9328.9128.4326.8924.263
3009.6528.5768.1326.6655.765
Table 6. Accuracy Analysis of GBDT-CGBO method with existing system in percentage.
Table 6. Accuracy Analysis of GBDT-CGBO method with existing system in percentage.
No of Data from DatasetNaïve Bayes (NB)PCAANNSVCGBDT-CGBO
10059.7669.6580.5486.1594.65
15060.4572.8781.1287.4395.71
20061.5674.7882.8788.5296.43
25063.7676.2183.4389.1297.65
30065.4577.8984.1489.7298.76
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Subramani, N.; Veerappampalayam Easwaramoorthy, S.; Mohan, P.; Subramanian, M.; Sambath, V. A Gradient Boosted Decision Tree-Based Influencer Prediction in Social Network Analysis. Big Data Cogn. Comput. 2023, 7, 6. https://doi.org/10.3390/bdcc7010006

AMA Style

Subramani N, Veerappampalayam Easwaramoorthy S, Mohan P, Subramanian M, Sambath V. A Gradient Boosted Decision Tree-Based Influencer Prediction in Social Network Analysis. Big Data and Cognitive Computing. 2023; 7(1):6. https://doi.org/10.3390/bdcc7010006

Chicago/Turabian Style

Subramani, Neelakandan, Sathishkumar Veerappampalayam Easwaramoorthy, Prakash Mohan, Malliga Subramanian, and Velmurugan Sambath. 2023. "A Gradient Boosted Decision Tree-Based Influencer Prediction in Social Network Analysis" Big Data and Cognitive Computing 7, no. 1: 6. https://doi.org/10.3390/bdcc7010006

Article Metrics

Back to TopTop