Results 21 to 30 of about 28,536 (223)

Identifying influential nodes using overlapping modularity vitality [PDF]

open access: yesProceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2021
Conference: ASONAM '21: International Conference on Advances in Social Networks Analysis and ...
Rajeh, Stephany   +3 more
openaire   +3 more sources

Interplay Between Hierarchy and Centrality in Complex Networks

open access: yesIEEE Access, 2020
Hierarchy and centrality are two popular notions used to characterize the importance of entities in complex systems. Indeed, many complex systems exhibit a natural hierarchical structure, and centrality is a fundamental characteristic allowing to ...
Stephany Rajeh   +3 more
doaj   +1 more source

The identification of influential nodes based on structure similarity

open access: yesConnection Science, 2021
The identification of influential nodes in complex networks is an open issue. To address it, many centrality measures have been proposed, among which the most representative iteration algorithm is the PageRank algorithm.
Jie Zhao   +3 more
doaj   +1 more source

Identifying influential nodes in complex networks [PDF]

open access: yesPhysica A: Statistical Mechanics and its Applications, 2012
Identifying influential nodes that lead to faster and wider spreading in complex networks is of theoretical and practical significance. The degree centrality method is very simple but of little relevance. Global metrics such as betweenness centrality and closeness centrality can better identify influential nodes, but are incapable to be applied in ...
Lü, Linyuan   +3 more
openaire   +2 more sources

Identifying the Top-k Influential Spreaders in Social Networks: a Survey and Experimental Evaluation

open access: yesIEEE Access, 2022
Identifying the influential and spreader nodes in complex networks solves many types of complex scientific problems. In social networks, identifying the influential individuals can be useful for structuring techniques that accelerate or hinder ...
Kamal Taha
doaj   +1 more source

Identifying Influential Nodes of Complex Networks Based on Trust-Value

open access: yesAlgorithms, 2020
The real world contains many kinds of complex network. Using influence nodes in complex networks can promote or inhibit the spread of information. Identifying influential nodes has become a hot topic around the world. Most of the existing algorithms used
Jinfang Sheng   +4 more
doaj   +1 more source

Ranking influential nodes in networks from aggregate local information

open access: yesPhysical Review Research, 2023
Many complex systems exhibit a natural hierarchy in which elements can be ranked according to a notion of “influence”. While the complete and accurate knowledge of the interactions between constituents is ordinarily required for the computation of nodes'
Silvia Bartolucci   +3 more
doaj   +1 more source

Exploring Trusted Relations among Virtual Interactions in Social Networks for Detecting Influence Diffusion

open access: yesISPRS International Journal of Geo-Information, 2019
Recently, social networks have shown huge potential in terms of collaborative web services and the study of peer influence as a result of the massive amount of data, datasets, and interrelations generated.
Heba M. Wagih   +2 more
doaj   +1 more source

A Machine Learning Based Framework for Identifying Influential Nodes in Complex Networks

open access: yesIEEE Access, 2020
In complex networks, identifying influential nodes is of great importance for its wide applications. Traditional centrality methods are usually directly based on topological structures of networks, and different centrality methods consider different ...
Gouheng Zhao   +4 more
doaj   +1 more source

Local-Forest Method for Superspreaders Identification in Online Social Networks

open access: yesEntropy, 2022
Identifying the most influential spreaders in online social networks plays a prominent role in affecting information dissemination and public opinions. Researchers propose many effective identification methods, such as k-shell. However, these methods are
Yajing Hao   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy