Showing 1 - 5 results of 5 for search '"node’s influence"', query time: 0.03s Refine Results
  1. 1

    Studying on the node’s influence and propagation path modes in microblogging by Hong YU, Xian YANG

    Published 2012-09-01
    “…In order to analyze microblogging information propagation path modes,the node's influence to reflect its importance was defined based on considering the characteristics of information propagation in microblogging.Firstly,the broadcast/comment data of a microblogging was collected and preprocessed.Then,the formal description of the transmission network was given,and the node’s influence was defined which reflects its significance in the local and global aspects.The results of comparative experiments show that the new definition is reasonable.Besides,some information propagation path modes were proposed,which combine the measurement of influence.Finally,the results by using visualization software-NodeXL show that the information propagation path modes are typical.…”
    Get full text
    Article
  2. 2

    Comprehensive influence evaluation algorithm of complex network nodes based on global-local attributes by Weijin JIANG, Ying YANG, Tiantian LUO, Wenying ZHOU, En LI, Xiaowei ZHANG

    Published 2022-09-01
    “…Mining key nodes in the network plays a great role in the evolution of information dissemination, virus marketing, and public opinion control, etc.The identification of key nodes can effectively help to control network attacks, detect financial risks, suppress the spread of viruses diseases and rumors, and prevent terrorist attacks.In order to break through the limitations of existing node influence assessment methods with high algorithmic complexity and low accuracy, as well as one-sided perspective of assessing the intrinsic action mechanism of evaluation metrics, a comprehensive influence (CI) assessment algorithm for identifying critical nodes was proposed, which simultaneously processes the local and global topology of the network to perform node importance.The global attributes in the algorithm consider the information entropy of neighboring nodes and the shortest distance nodes between nodes to represent the local attributes of nodes, and the weight ratio of global and local attributes was adjusted by a parameter.By using the SIR (susceptible infected recovered) model and Kendall correlation coefficient as evaluation criteria, experimental analysis on real-world networks of different scales shows that the proposed method is superior to some well-known heuristic algorithms such as betweenness centrality (BC), closeness centrality (CC), gravity index centrality(GIC), and global structure model (GSM), and has better ranking monotonicity, more stable metric results, more adaptable to network topologies, and is applicable to most of the real networks with different structure of real networks.…”
    Get full text
    Article
  3. 3

    Identifying vital spreaders in large-scale networks based on neighbor multilayer contributions by Weiwei Zhu, Xuchen Meng, Jiaye Sheng, Dayong Zhang

    Published 2025-01-01
    “…By integrating these two factors, our approach aims to offer a more precise measure of a node's influence within a network.ResultsExtensive experiments were conducted using Kendall’s rank correlation, monotonicity tests, and the Susceptible-Infected-Recovered (SIR) epidemic model on real-world networks. …”
    Get full text
    Article
  4. 4

    A Fluid Model for Mobile Data Offloading Based on Device-to-Device Communications with Time Constraints by Antonio Pinizzotto, Raffaele Bruno

    Published 2024-12-01
    “…Finally, we compare OORS—optimally tuned with respect to protocol parameters—to two state-of-the-art content offloading schemes, Push-and-track (PAT) and SNSNI, a seed node selection algorithm based on node influence. Our results show that OORS achieves similar offloading efficiency to the benchmarks while reducing the number of content copies by at least 50%.…”
    Get full text
    Article
  5. 5

    Vulnerability Analysis of China-Europe Railway Express Network Based on Improved Nonlinear Load-Capacity Model by Chao Zhu, Xiaoning Zhu

    Published 2024-01-01
    “…This approach enables a detailed investigation into how condition thresholds and different types of nodes influence network vulnerability. Firstly, a feature matrix is constructed for C-ER Express based on the topological measures, freight information, and external environment scores. …”
    Get full text
    Article