scholarly journals Identifying Multiple Influential Spreaders in Complex Networks by Considering the Dispersion of Nodes

2022 ◽  
Vol 9 ◽  
Author(s):  
Li Tao ◽  
Mutong Liu ◽  
Zili Zhang ◽  
Liang Luo

Identifying multiple influential spreaders, which relates to finding k (k > 1) nodes with the most significant influence, is of great importance both in theoretical and practical applications. It is usually formulated as a node-ranking problem and addressed by sorting spreaders’ influence as measured based on the topological structure of interactions or propagation process of spreaders. However, ranking-based algorithms may not guarantee that the selected spreaders have the maximum influence, as these nodes may be adjacent, and thus play redundant roles in the propagation process. We propose three new algorithms to select multiple spreaders by taking into account the dispersion of nodes in the following ways: (1) improving a well-performed local index rank (LIR) algorithm by extending its key concept of the local index (an index measures how many of a node’s neighbors have a higher degree) from first-to second-order neighbors; (2) combining the LIR and independent set (IS) methods, which is a generalization of the coloring problem for complex networks and can ensure the selected nodes are non-adjacent if they have the same color; (3) combining the improved second-order LIR method and IS method so as to make the selected spreaders more disperse. We evaluate the proposed methods against six baseline methods on 10 synthetic networks and five real networks based on the classic susceptible-infected-recovered (SIR) model. The experimental results show that our proposed methods can identify nodes that are more influential. This suggests that taking into account the distances between nodes may aid in the identification of multiple influential spreaders.

Symmetry ◽  
2021 ◽  
Vol 13 (9) ◽  
pp. 1570 ◽  
Author(s):  
Jingcheng Zhu ◽  
Lunwen Wang

Identifying influential nodes in complex networks is of great significance for clearly understanding network structure and maintaining network stability. Researchers have proposed many classical methods to evaluate the propagation impact of nodes, but there is still some room for improvement in the identification accuracy. Degree centrality is widely used because of its simplicity and convenience, but it has certain limitations. We divide the nodes into neighbor layers according to the distance between the surrounding nodes and the measured node. Considering that the node’s neighbor layer information directly affects the identification result, we propose a new node influence identification method by combining degree centrality information about itself and neighbor layer nodes. This method first superimposes the degree centrality of the node itself with neighbor layer nodes to quantify the effect of neighbor nodes, and then takes the nearest neighborhood several times to characterize node influence. In order to evaluate the efficiency of the proposed method, the susceptible–infected–recovered (SIR) model was used to simulate the propagation process of nodes on multiple real networks. These networks are unweighted and undirected networks, and the adjacency matrix of these networks is symmetric. Comparing the calculation results of each method with the results obtained by SIR model, the experimental results show that the proposed method is more effective in determining the node influence than seven other identification methods.


2019 ◽  
Vol 9 (20) ◽  
pp. 4472 ◽  
Author(s):  
Xiang Li ◽  
Yangyang Liu ◽  
Chengli Zhao ◽  
Xue Zhang ◽  
Dongyun Yi

Simultaneous outbreaks of contagion are a great threat against human life, resulting in great panic in society. It is urgent for us to find an efficient multiple sources localization method with the aim of studying its pathogenic mechanism and minimizing its harm. However, our ability to locate multiple sources is strictly limited by incomplete information about nodes and the inescapable randomness of the propagation process. In this paper, we present a valid approach, namely the Potential Concentration Label method, which helps locate multiple sources of contagion faster and more accurately in complex networks under the SIR(Susceptible-Infected-Recovered) model. Through label assignment in each node, our aim is to find the nodes with maximal value after several iterations. The experiments demonstrate that the accuracy of our multiple sources localization method is high enough. With the number of sources increasing, the accuracy of our method declines gradually. However, the accuracy remains at a slight fluctuation when average degree and network scale make a change. Moreover, our method still keeps a high multiple sources localization accuracy with noise of various intensities, which shows its strong anti-noise ability. I believe that our method provides a new perspective for accurate and fast multi-sources localization in complex networks.


2005 ◽  
Vol 133 (8) ◽  
pp. 2310-2334 ◽  
Author(s):  
Anna Borovikov ◽  
Michele M. Rienecker ◽  
Christian L. Keppenne ◽  
Gregory C. Johnson

Abstract One of the most difficult aspects of ocean-state estimation is the prescription of the model forecast error covariances. The paucity of ocean observations limits our ability to estimate the covariance structures from model–observation differences. In most practical applications, simple covariances are usually prescribed. Rarely are cross covariances between different model variables used. Here a comparison is made between a univariate optimal interpolation (UOI) scheme and a multivariate OI algorithm (MvOI) in the assimilation of ocean temperature profiles. In the UOI case only temperature is updated using a Gaussian covariance function. In the MvOI, salinity, zonal, and meridional velocities as well as temperature are updated using an empirically estimated multivariate covariance matrix. Earlier studies have shown that a univariate OI has a detrimental effect on the salinity and velocity fields of the model. Apparently, in a sequential framework it is important to analyze temperature and salinity together. For the MvOI an estimate of the forecast error statistics is made by Monte Carlo techniques from an ensemble of model forecasts. An important advantage of using an ensemble of ocean states is that it provides a natural way to estimate cross covariances between the fields of different physical variables constituting the model-state vector, at the same time incorporating the model’s dynamical and thermodynamical constraints as well as the effects of physical boundaries. Only temperature observations from the Tropical Atmosphere–Ocean array have been assimilated in this study. To investigate the efficacy of the multivariate scheme, two data assimilation experiments are validated with a large independent set of recently published subsurface observations of salinity, zonal velocity, and temperature. For reference, a control run with no data assimilation is used to check how the data assimilation affects systematic model errors. While the performance of the UOI and MvOI is similar with respect to the temperature field, the salinity and velocity fields are greatly improved when the multivariate correction is used, as is evident from the analyses of the rms differences between these fields and independent observations. The MvOI assimilation is found to improve upon the control run in generating water masses with properties close to the observed, while the UOI fails to maintain the temperature and salinity structure.


2018 ◽  
Vol 18 (3) ◽  
pp. 339-348
Author(s):  
V. M. Deundyak ◽  
N. S. Mogilevskaya

Introduction. Polynomials in several variables over Galois fields provide the basis for the Reed-Muller coding theory, and are also used  in a number of cryptographic problems. The properties of such polynomials specified over the derived Galois fields of fuzzy cardinality are studied. For the results obtained,  two  real-world  applications  are  proposed: partitioning scheme and Reed-Muller code decoder.Materials and Methods. Using linear algebra, theory of Galois fields, and general theory of polynomials in several variables, we have obtained results related to the differentiation and integration  of polynomials  in  several  variables  over  Galois fields of fuzzy cardinality. An analog of the differentiation operator is constructed and studied for vectors.Research Results. On the basis of the obtained results on the differentiation and integration of polynomials, a new decoder for Reed-Muller codes of the second order is given, and a scheme for organizing the partitioned transfer of confidential data is proposed. This is a communication system in which the source data on the sender is divided into several parts and, independently of one  another,  transmitted  through  different communication channels, and then, on the receiver, the initial data is restored of the parts retrieved. The proposed scheme feature is that it enables to protect data, both from the nonlegitimate access, and from unintentional errors; herewith, one  and  the  same  mathematical  apparatus  is  used  in  both cases. The developed decoder for the second-order Reed-Muller codes prescribed over the derived odd Galois field may have a constraint to the recoverable error level; however, its use is advisable for a number of the communication channels.Discussion    and    Conclusions.    The    proposed    practical applications   of   the   results   obtained   are   useful   for   the organization of reliable communication systems. In future, it is planned  to  study  the  restoration  process  of  the  original polynomial by its derivatives, in case of their partial distortion, and the development of appropriate applications.


2018 ◽  
Vol 32 (06) ◽  
pp. 1850118 ◽  
Author(s):  
Mengtian Li ◽  
Ruisheng Zhang ◽  
Rongjing Hu ◽  
Fan Yang ◽  
Yabing Yao ◽  
...  

Identifying influential spreaders is a crucial problem that can help authorities to control the spreading process in complex networks. Based on the classical degree centrality (DC), several improved measures have been presented. However, these measures cannot rank spreaders accurately. In this paper, we first calculate the sum of the degrees of the nearest neighbors of a given node, and based on the calculated sum, a novel centrality named clustered local-degree (CLD) is proposed, which combines the sum and the clustering coefficients of nodes to rank spreaders. By assuming that the spreading process in networks follows the susceptible–infectious–recovered (SIR) model, we perform extensive simulations on a series of real networks to compare the performances between the CLD centrality and other six measures. The results show that the CLD centrality has a competitive performance in distinguishing the spreading ability of nodes, and exposes the best performance to identify influential spreaders accurately.


2019 ◽  
Vol 28 (04) ◽  
pp. 1950068 ◽  
Author(s):  
Tian-Bo Deng

This paper proposes a novel method for the design of a recursive second-order (biquadratic) all-pass phase compensator with controllable stability margin. The design idea stems from the generalized stability triangle (GST) derived by the author for the second-order biquadratic digital filter. Based on the GST, a parameter-transformation method is proposed on the transformations of the denominator coefficients of the transfer function of the biquadratic phase compensator. The transformations convert the original denominator coefficients to other new parameters, and any values of those new parameters can guarantee that the GST condition is always satisfied. Optimizing the new parameters yields a biquadratic phase compensator that definitely meets a prespecified stability margin. That is, a biquadratic all-pass phase compensator can be designed to have an arbitrarily specified stability margin. This in turn avoids the occurrence that a recursive phase compensator may become unstable in the practical applications. Thus, the resulting biquadratic phase compensator has robust stability, which is extremely important during the practical filtering operations. A design example is given to show the stability margin guarantee as well as the approximation accuracy.


2020 ◽  
Vol 30 (08) ◽  
pp. 2050123
Author(s):  
Zahra Faghani ◽  
Zhen Wang ◽  
Fatemeh Parastesh ◽  
Sajad Jafari ◽  
Matjaž Perc

Synchronization in complex networks is an evergreen subject with many practical applications across the natural and social sciences. The stability of synchronization is thereby crucial for determining whether the dynamical behavior is stable or not. The master stability function is commonly used to that effect. In this paper, we study whether there is a relation between the stability of synchronization and the proximity to certain bifurcation types. We consider four different nonlinear dynamical systems, and we determine their master stability functions in dependence on key bifurcation parameters. We also calculate the corresponding bifurcation diagrams. By means of systematic comparisons, we show that, although there are some variations in the master stability functions in dependence on bifurcation proximity and type, there is in fact no general relation between synchronization stability and bifurcation type. This has important implication for the restrained generalizability of findings concerning synchronization in complex networks for one type of node dynamics to others.


Algorithmica ◽  
2020 ◽  
Author(s):  
Stefano Leonardi ◽  
Gianpiero Monaco ◽  
Piotr Sankowski ◽  
Qiang Zhang

AbstractMotivated by many practical applications, in this paper we study budget feasible mechanisms with the goal of procuring an independent set of a matroid. More specifically, we are given a matroid $${\mathcal {M}}=(E,{\mathcal {I}})$$ M = ( E , I ) . Each element of the ground set E is controlled by a selfish agent and the cost of the element is private information of the agent itself. A budget limited buyer has additive valuations over the elements of E. The goal is to design an incentive compatible budget feasible mechanism which procures an independent set of the matroid of largest possible value. We also consider the more general case of the pair $${\mathcal {M}}=(E,{\mathcal {I}})$$ M = ( E , I ) satisfying only the hereditary property. This includes matroids as well as matroid intersection. We show that, given a polynomial time deterministic algorithm that returns an $$\alpha $$ α -approximation to the problem of finding a maximum-value independent set in $${\mathcal {M}}$$ M , there exists an individually rational, truthful and budget feasible mechanism which is $$(3\alpha +1)$$ ( 3 α + 1 ) -approximated and runs in polynomial time, thus yielding also a 4-approximation for the special case of matroids.


Sign in / Sign up

Export Citation Format

Share Document