Skip main navigation

Cookies Notification

We use cookies on this site to enhance your user experience. By continuing to browse the site, you consent to the use of our cookies. Learn More
×

System Upgrade on Tue, May 28th, 2024 at 2am (EDT)

Existing users will be able to log into the site and access content. However, E-commerce and registration of new users may not be available for up to 12 hours.
For online purchase, please visit us again. Contact us at customercare@wspc.com for any enquiries.

SEARCH GUIDE  Download Search Tip PDF File

  • articleNo Access

    MODELING THE DYNAMICS OF DISASTER SPREADING FROM KEY NODES IN COMPLEX NETWORKS

    In this paper, we present the dynamics of disaster spreading from key nodes in complex networks. The key nodes have maximum and minimum out-degree nodes, which show important in spreading disaster. This paper considers directed Erdös–Rényi, scale-free and small-world networks. Using the model considering the common characteristics of infrastructure and lifeline networks, i.e., self-healing function and disaster spreading mechanism, we carry out simulations for the effects of the recovery time parameter and the time delay on the recovery rate and the number of damaged nodes. Simulation results show some typical disaster spreading characteristics, e.g., a non-equilibrium phase transition in the parameter space, disturbance from the maximum out-degree nodes resulting in more damaged effect, etc.

  • articleNo Access

    Key nodes of misinformation source inference: A message-passing-based approach

    The misinformation spreading in social networks causes unpredictable damage to the networked system, thus inferring the misinformation source is an important research topic in the field of network science and security. Many source inference algorithms have been proposed to find the most likely propagation source through observable snapshot. However, under limited observable conditions, observing different nodes states markedly affects the algorithm’s effectiveness. Yet, we still lack relevant research on which nodes can more accurately assist us in completing source inference. Here, we propose the heuristic message-passing-based algorithm to find the key nodes that can maximize the accuracy of source inference, which uses the average rank of the source in the message-passing method as a measure and performs continuous annealing on this basis to update the set. As a comparison, we propose random selection algorithm as the basic, high-eigenvalue algorithm and high-degree algorithm focused on centrality, and basic message-passing-based algorithm from the perspective of energy entropy in message passing. Through extensive numerical simulation on artificial and real-world networks, compared with other four algorithms, our heuristic message-passing-based algorithm finds the optimal key node set that can more accurately complete source inference. Moreover, it has over 8% higher inference accuracy than other methods in low visibility situations especially.

  • articleNo Access

    Multi-attribute ranking method for identifying key nodes in complex networks based on GRA

    How to identify key nodes is a challenging and significant research issue in complex networks. Some existing evaluation indicators of node importance have the disadvantages of limited application scope and one-sided evaluation results. This paper takes advantage of multiple centrality measures comprehensively, by regarding the identification of key nodes as a multi-attribute decision making (MADM) problem. Firstly, a new local centrality (NLC) measure is put forward through considering multi-layer neighbor nodes and clustering coefficients. Secondly, combining the grey relational analysis (GRA) method and the susceptible-infectious-recovered (SIR) model, a modified dynamic weighted technique for order preference by similarity to ideal solution (TOPSIS) method is proposed. Finally, the effectiveness of the NLC is illustrated by applications to nine actual networks. Furthermore, the experimental results on four actual networks demonstrate that the proposed method can identify key nodes more accurately than the existing weighted TOPSIS method.