influential node
Recently Published Documents


TOTAL DOCUMENTS

53
(FIVE YEARS 34)

H-INDEX

7
(FIVE YEARS 4)

Author(s):  
Feifei Wang ◽  
Zejun Sun ◽  
Quan Gan ◽  
Aiwan Fan ◽  
Hesheng Shi ◽  
...  

Author(s):  
Shi Dong ◽  
Wengang Zhou

Influential node identification plays an important role in optimizing network structure. Many measures and identification methods are proposed for this purpose. However, the current network system is more complex, the existing methods are difficult to deal with these networks. In this paper, several basic measures are introduced and discussed and we propose an improved influential nodes identification method that adopts the hybrid mechanism of information entropy and weighted degree of edge to improve the accuracy of identification (Hm-shell). Our proposed method is evaluated by comparing with nine algorithms in nine datasets. Theoretical analysis and experimental results on real datasets show that our method outperforms other methods on performance.


2021 ◽  
Author(s):  
Arman Ferdowsi ◽  
Alireza Khanteymoori ◽  
Maryam Dehghan Chenary

In this paper, we introduce a new approach for detecting community structures in networks. The approach is subject to modifying one of the connectivity-based community quality functions based on considering the impact that each community's most influential node has on the other vertices. Utilizing the proposed quality measure, we devise an algorithm that aims to detect high-quality communities of a given network based on two stages: finding a promising initial solution using greedy methods and then refining the solutions in a local search manner. The performance of our algorithm has been evaluated on some standard real-world networks as well as on some artificial networks. The experimental results of the algorithm are reported and compared with several state-of-the-art algorithms. The experiments show that our approach is competitive with the other well-known techniques in the literature and even outperforms them. This approach can be used as a new community detection method in network analysis.


2021 ◽  
Author(s):  
Nora Skjerdingstad ◽  
Miriam S. Johnson ◽  
Sverre Urnes Johnson ◽  
Asle Hoffart ◽  
Omid V. Ebrahimi

The prevalent co-occurrence between parental stress and depression has been previously established prior to and during the COVID-19 pandemic outbreak. However, no studies to date have identified the connections through which these symptom domains interact with each other to emerge into a complex and detrimental mental health state, along with the plausible mechanistic variables that may play key roles in maintaining parental stress and depression. The aim of this research is to uncover these interactions in a period where parents experience heighted demands and stress as a consequence of the strict social distancing protocols. Network analysis is utilized to examine parental stress and depressive symptoms during the COVID-19 pandemic in a large cross-sectional study (N = 2868) of parents. Two graphical Gaussian graphical network models were estimated, one in which only parental stress and depression symptoms were included, and another in which several mechanistic variables were added. Expected influence and bridge expected influence revealed that feeling worthless was the most influential node in the symptoms network and bridged the two psychological states. Among the mechanistic variables, worry and rumination was specifically relevant in the depressive cluster of symptoms, and self-criticism was connected to both constructs. The study display that the co-occurrence of parental stress and depression have specific pathways, were manifested through feelings of worthlessness, and have specific patterns of connection to important mechanisms of psychopathology. The results are of utility when aiming to avoid the constellation of co-occurring parental stress and depressive symptoms during the pandemic.


2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Aman Ullah ◽  
Bin Wang ◽  
JinFang Sheng ◽  
Jun Long ◽  
Nasrullah Khan ◽  
...  

AbstractIdentification of Influential nodes in complex networks is challenging due to the largely scaled data and network sizes, and frequently changing behaviors of the current topologies. Various application scenarios like disease transmission and immunization, software virus infection and disinfection, increased product exposure and rumor suppression, etc., are applicable domains in the corresponding networks where identification of influential nodes is crucial. Though a lot of approaches are proposed to address the challenges, most of the relevant research concentrates only on single and limited aspects of the problem. Therefore, we propose Global Structure Model (GSM) for influential nodes identification that considers self-influence as well as emphasizes on global influence of the node in the network. We applied GSM and utilized Susceptible Infected Recovered model to evaluate its efficiency. Moreover, various standard algorithms such as Betweenness Centrality, Profit Leader, H-Index, Closeness Centrality, Hyperlink Induced Topic Search, Improved K-shell Hybrid, Density Centrality, Extended Cluster Coefficient Ranking Measure, and Gravity Index Centrality are employed as baseline benchmarks to evaluate the performance of GSM. Similarly, we used seven real-world and two synthetic multi-typed complex networks along-with different well-known datasets for experiments. Results analysis indicates that GSM outperformed the baseline algorithms in identification of influential node(s).


2021 ◽  
Author(s):  
VIMAL KUMAR P. ◽  
Balasubramanian C.

Abstract With the epidemic growth of online social networks (OSNs), a large scale research on information dissemination in OSNs has been made an appearance in contemporary years. One of the essential researches is influence maximization (IM). Most research adopts community structure, greedy stage, and centrality measures, to identify the influence node set. However, the time consumed in analyzing the influence node set for edge server placement, service migration and service recommendation is ignored in terms of propagation delay. Considering the above analysis, we concentrate on the issue of time-sensitive influence maximization and maximize the targeted influence spread. To solve the problem, we propose a method called, Trilateral Spearman Katz Centrality-based Least Angle Regression (TSKC-LAR) for influential node tracing in social network is proposed. Besides, two algorithms are used in our work to find the influential node in social network with maximum influence spread and minimal time, namely Trilateral Statistical Node Extraction algorithm and Katz Centrality Least Angle Influence Node Tracing algorithm, respectively. Extensive experiments on The Telecom dataset demonstrate the efficiency and influence performance of the proposed algorithms on evaluation metrics, namely, sensitivity, specificity, accuracy, time and influence spread


2021 ◽  
Author(s):  
Zhihao Dong ◽  
Yuanzhu Chen ◽  
Terrence S. Tricco ◽  
Cheng Li ◽  
Ting Hu

Abstract Complex networks in the real world are often with heterogeneous degree distributions. The structure and function of nodes can vary significantly, with influential nodes playing a crucial role in information spread and other spreading phenomena. Identifying high-degree nodes enables change to the network’s structure and function. Previous work either redefines metrics used to measure the nodes’ importance or focus on developing algorithms to efficiently find influential nodes. These approaches typically rely on global knowledge of the network and assume that the structure of the network does not change over time, both of which are difficult to achieve in the real world. In this paper, we propose a decentralized strategy that can find influential nodes without global knowledge of the network. Our Joint Nomination (JN) strategy selects a random set of nodes along with a set of nodes connected to those nodes, and together they nominate the influential node set. Experiments are conducted on 12 network datasets, including both synthetic and real-world networks, both undirected and directed networks. Results show that average degree of the identified node set is about 3–8 times higher than that of the full node set, and the degree distribution skews toward higher-degree nodes. Removal of influential nodes increase the average shortest path length by 20–70% over the original network, or about 8–15% longer than the other decentralized strategies. Immunization based on JN is more efficient than other strategies, consuming around 12–40% less immunization resources to raise the epidemic threshold to 𝜏 ~ 0:1. Susceptible-Infected-Recovered (SIR) simulations on networks with 30% influential nodes removed using JN delays the arrival time of infection peak significantly and reduce the total infection scale to 15%.


2020 ◽  
Vol 14 (4) ◽  
pp. 521-533
Author(s):  
Victor A. E. Farias ◽  
Felipe T. Brito ◽  
Cheryl Flynn ◽  
Javam C. Machado ◽  
Subhabrata Majumdar ◽  
...  

Differential privacy is the state-of-the-art formal definition for data release under strong privacy guarantees. A variety of mechanisms have been proposed in the literature for releasing the noisy output of numeric queries (e.g., using the Laplace mechanism), based on the notions of global sensitivity and local sensitivity. However, although there has been some work on generic mechanisms for releasing the output of non-numeric queries using global sensitivity (e.g., the Exponential mechanism), the literature lacks generic mechanisms for releasing the output of non-numeric queries using local sensitivity to reduce the noise in the query output. In this work, we remedy this shortcoming and present the local dampening mechanism. We adapt the notion of local sensitivity for the non-numeric setting and leverage it to design a generic non-numeric mechanism. We illustrate the effectiveness of the local dampening mechanism by applying it to two diverse problems: (i) Influential node analysis. Given an influence metric, we release the top-k most influential nodes while preserving the privacy of the relationship between nodes in the network; (ii) Decision tree induction. We provide a private adaptation to the ID3 algorithm to build decision trees from a given tabular dataset. Experimental results show that we could reduce the use of privacy budget by 3 to 4 orders of magnitude for Influential node analysis and increase accuracy up to 12% for Decision tree induction when compared to global sensitivity based approaches.


Sign in / Sign up

Export Citation Format

Share Document