Literature DB >> 34584343

Impact of second-order network motif on online social networks.

Sankhamita Sinha1, Subhayan Bhattacharya1, Sarbani Roy1.   

Abstract

The behaviour of individual users in an online social network is a major contributing factor in determining the outcome of multiple network phenomenon. Group formation, growth of the network, information propagation, and rumour blocking are some of the many network behavioural traits that are influenced by the interaction patterns of the users in the network. Network motifs capture one such interaction pattern between users in online social networks (OSNs). For this work, four second-order (two-edged) network motifs have been considered, namely, message receiving pattern, message broadcasting pattern, message passing pattern, and reciprocal message pattern, to analyse user behaviour in online social networks. This work provides and utilizes a node interaction pattern-finding algorithm to identify the frequency of aforementioned second-order network motifs in six real-life online social networks (Facebook, GPlus, GNU, Twitter, Enron Email, and Wiki-vote). The frequency of network motifs participated in by a node is considered for the relative ranking of all nodes in the online social networks. The highest-rated nodes are considered seeds for information propagation. The performance of using network motifs for ranking nodes as seeds for information propagation is validated using statistical metrics Z-score, concentration, and significance profile and compared with baseline ranking methods in-degree centrality, out-degree centrality, closeness centrality, and PageRank. The comparative study shows the performance of centrality measures to be similar or better than second-order network motifs as seed nodes in information diffusion. The experimental results on finding frequencies and importance of different interaction patterns provide insights on the significance and representation of each such interaction pattern and how it varies from network to network.
© The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021.

Entities:  

Keywords:  Centrality measures; Information diffusion; Network motifs; Online social network; Second-order motif

Year:  2021        PMID: 34584343      PMCID: PMC8461152          DOI: 10.1007/s11227-021-04079-7

Source DB:  PubMed          Journal:  J Supercomput        ISSN: 0920-8542            Impact factor:   2.557


Introduction

The OSNs such as Facebook, Twitter, YouTube, Instagram, WhatsApp, Snapchat, Google+, Quora, and LiveJournal are popular online communication platforms for the last few years, and their usages are increasing significantly [19]. Structurally, the OSNs are represented as a directed graph, where the users can be termed as nodes and the links are the different types of communications such as likes, replies to, and mentions established between nodes. Therefore, the OSN is an example of a complex network through which the users build social communication and interaction, passing message based on the Internet platform [12]. The pattern of interaction of the users implies the social relationships with other users in real-life connections. According to Rogers [31], communication is a process in which participants generate, transfer, and receive information with one another to reach a mutual understanding. Diffusion is also a kind of social change. It is defined as the process by which the structure and function of a social system are explained. To understand the behaviour of interaction patterns between the users in a network, a network motif plays an important role [27]. Many small sub-graphs of OSNs are significant in representing the fundamental topological communication patterns of the OSNs [24]. To uncover these structural interaction patterns, the network motif is an important tool. A network motif is a small sub-graph of a given input network that occurs in significantly higher frequencies than expected in random networks [25]. The two-edged motifs have been described in [40], where the authors have investigated how the two-edged motifs influence the synchrony in a neural network. The two-edged motifs can be used to distinguish the basic communication patterns of the users with immediate nodes. Some users act in OSNs only as listeners; some users participate to broadcast the messages. In OSNs, some users’ interest is on both message passing and receiving and some users are close to each other so after getting the messages they reply. Using communication pattern findings, the overall behaviour of the information diffusion process in the network can be recognized [24]. To identify the message spreading patterns, basic communication pattern mining of a user is necessary. It tells how the users are participating to receive, broadcast, pass, and reciprocate the messages most efficiently in the network. This paper focuses on the frequency computation of two-edged sub-graphs , i.e. the convergent, the divergent, the chain, and the reciprocal, where i is the index of the sub-graphs, which represent the basic communication patterns such as message receiving pattern, message broadcasting pattern, message passing pattern, and reciprocal message pattern between the users, respectively, in a social network G(V, E). This paper also investigates the two-edged motifs , where of a social network G(V, E) using the statistical measures of network motif—Z-score, concentration, and significance profile. Furthermore, based on frequencies of the communication patterns the influence nodes have been selected as seed nodes. Then the popular diffusion models—forest fire (FF) model, independent cascade (IC) model, susceptible-infected-recovered (SIR) model—have been used to evaluate the activated nodes. The results have been compared with different centrality measures.

Motivation

In modern day life, OSNs have evolved as the most frequent medium of communication. All kinds of information, something as global as a natural disaster like Tsunami to something as simple as the last meal one had, all information and opinions are shared on OSNs. The multitude of patterns and dependencies present in OSNs, and are mathematically represented as graphs, play an important role in regulating the information propagation in a network. The velocity, volume, and direction of information flowing through a network are dependent on the structure and orientation of structural patterns in the network. One such pattern is the network motif. Network motif is a statistically significant sub-graph or pattern of a large communication network or graph [26]. Large-scale networks like biological networks, OSNs, electrical circuit networks, and so on can be represented as a graph, which includes a wide variety of network motifs. There are four second-order connection motifs (two-edged motifs) of reciprocal, convergent, divergent, and chain connections and [40] investigates how these network structures can influence the tendency for a neuronal network to synchronize, albeit, independent of the dynamical model for each neuron. Different OSNs might have different dominating network motif, that is, the frequency of different network motifs might differ among different graphs. Based on the dominant network motif, the information propagation can be predicted for a network, or the flow of information can be regulated for beneficiary results. Rumours resulting in mass hysteria and panic can be stopped, whereas information of a natural disaster can be quickly propagated to benefit the masses.

Contribution

Identifying nodes of importance in a network is a research domain with multiple real-life applications. In that light, the contributions of this paper can be listed asThe identified seed nodes can be crucial in enhancing and manipulating the flow of information within a network. This can find many real-life applications such as directed marketing, spreading awareness on social reforms and healthcare issues through online networks, identifying potential flash mob initiators, and other such activities. A novel algorithm for generating random networks with similar degree distribution to a given network. Identify the second-order motifs in different real-life OSNs and compare their frequency using six real-life OSNs. Analyse the efficiency of such second-order motifs as seed nodes in information diffusion in OSNs using six real-life OSNs and four popular centrality measures. Compare the performance of second-order motifs with high centrality nodes as seed for information flow.

Organization

The rest of the paper is organized as follows. Section 2 reviews the literature based on network motifs to understand the patterns of complex networks, information diffusion, and random graph model. The required network properties—graph terminologies, measurement tools for network motif, degree centrality measures, information diffusion models, and communication pattern initialization based on second-order/two-edges sub-graphs—are defined in Sect. 3. In Sect. 4, the problem statement and proposed approach are discussed to identify the second-order motifs. Section 5 exhibits the experimental results, discussion, and analysis. In Sect. 6, relevant applications are discussed. Finally, Sect. 7 concludes the work with a discussion related to future scopes.

Related work

The concept of network motif as a simple building block of the complex network is introduced by Milo R et al. in [26]. They also define that the network motif is the patterns of interconnections occurring in complex networks at numbers that are significantly higher than those in randomized networks. Another paper by Milo et al. [25] present an approach for comparing network local structure, which is based on the SP of small sub-graphs in the network compared to randomized networks. Shen-Orr SS et al. [32] also define network motif as an interaction pattern that repeats in many different parts of a network at higher frequencies than those found in randomized networks. The network motifs with higher frequencies than expected at random networks suggest that they may have specific functions in the information processing performed by the network. In very recent work [13], authors define a new method to explain a network motif using the graph compression technique. They explain a sub-graph M considered as a network motif if the probability of M in G is greater than the probability of M in a null model of G. In [29] and [39], the authors review the different tools for finding network motifs in a network. Several papers like [38] and [33] propose clustering techniques using network motifs. In these papers, the authors discuss the topological network motifs where patterns are similar but not necessarily identical, and they propose a statistical model for the occurrence of such motifs in a biological network, from which they derive a scoring function for statistical significance in [10]. Based on this scoring function, they introduce a search algorithm for topological motifs which is called graph alignment. In [32], the authors also focus on the gene network motif. In [27], the authors identify interaction pattern motifs using the coloured motif in an email network and measure the importance of nodes by degree prestige and degree centrality. Youngsoo et al. [20] concentrate on the user’s communication pattern on a Mobile Social Network and explore the users’ collective behaviour like chat, message, and group message. In [36], the authors examine the records of user interactions to analyse interaction patterns across large user groups on Facebook. In [30], the authors explain the information diffusion process in the Twitter network based on the various measures of users’ activity, popularity, and influence. Another paper [23] focuses on the information diffusion model in OSN, and they categorize the models into explanatory models and predictive models. According to Milo et. al. [26] network motif theory, the real networks’ frequencies of sub-graphs have been compared to suitably randomized networks’ frequencies of sub-graphs and only select the patterns which appear in the real network at numbers significantly higher than in the randomized networks. Therefore, generating random networks is essential to determine the statistical significance of a sub-graph as a network motif. The undirected random network model with N nodes is proposed in [17] which creates every edge with probability independently of every other edge. Another very popular network model is the ‘Barabasi–Albert’(BA) [7] model. It is an algorithm for generating random scale-free networks using a ‘preferential attachment’ mechanism which follows the power-law distribution:Where p(k) is the fraction of nodes in the network with degree k, r is a parameter usually between 2 and 3. The authors propose a diffusion technique for tracking the rate with which information spread over underlying social interaction structure in the temporal domain and few social parameters in [21]. This work is motivated by the epidemic model and also proposes forward state transition and recoverable transition. This model supports predicting/forecasting of information diffusion in social media and infectious disease spreading in the community to find out the optimal value of the susceptible and infected number of people during the infection period. In [15], the authors investigate the information diffusion about the COVID-19 on several social media data sets. They have observed the spread of information using epidemic models and suggest that information spreading is driven by the interaction paradigm. This pattern is determined by the specific social media or/and by the specific interaction patterns of groups of users engaged with the topic. The authors establish the information diffusion model based on the FF model and shows that information spreading across online social networks depends upon user–followers relationships, the significance of the topic, and other features on Twitter network in [22]. In very recent work, [35] proposes the information diffusion model based on mean-field theory and compares it with the SIR model. They establish in their work that users’ mobility increases the connections among users which affects the spreading of information diffusion. In [34], the authors work in maximizing influence diffusion in large-scale networks using heuristics on independent cascade models. Unlike the existing methods above, this paper investigates the second-order motifs for each node using several statistical tools to find the communication patterns of the users. By considering the highest frequencies of the different second-order motifs of a node, the seed nodes have been selected to experiment with the information diffusion process using independent cascade, susceptible-infected-removed, and forest fire models. The result is also compared with the highest centrality nodes. This helps to understand the importance of basic communication patterns of the nodes in several OSNs. The key novelty of this work is that the findings of basic interaction patterns (second-order motifs) of the users are based on the generation of a random graph with similar in-degree and out-degree sequences of the input graph and determining their effects on information diffusion in OSNs.

Network properties

Graph terminologies

Directed graphs and sub-graphs

A complex network, which is represented as a directed graph G(V, E) composed by a finite non-empty set V of vertices or nodes connected by edges that belong to the set of edge E, has a direction associated with vertices. A directed sub-graph of a directed graph G(V, E) is a graph whose vertex set belongs to V, that is , and whose edge set is a subset of the edge set E, that is and the direction of edges in sub-graphs follow the same of G(V, E).

Sub-graph frequency

The frequency of sub-graph is denoted by , where , is the number of occurrences of patterns in graph G(V, E). A motif is a pattern that is considered significant according to a particular frequency-based comparison.

In-degree and out-degree

For a directed graph G(V, E) with edges E and vertices V, the out-degree of v2 refers to the number of edges incident from v2. That is, the number of edges directed away from the vertex v2. The in-degree of v1 refers to the number of edges incident to v1. That is, the number of edges directed towards the vertex v1.

Network motif

A network motif is a small sub-graph which appears recurrently in a complex network and satisfies the following conditions: where is a set of parameters and Milo [25] considers , which refers the number of similar random networks is 1000, a sub-graph is considered as a motif if the chance that it appears more often in a random network than in the original network is less than , the sub-graph is present at least 4 times in the original graph and the difference between its frequency in the original network and the average frequency in random networks is at least of that average frequency in random network. (This is used to check the higher frequency in original network rather than random network with same degrees) (It is used to check the minimum frequency occurrence in original network) (It checks the minimum deviation) Here, P is probability threshold, U is uniqueness threshold, D is proportional threshold, N is the number of random networks, is the frequency of sub-graph in random graph, and is the frequency of sub-graph in original graph. Table 1 refers to the calculated frequency of each second-order network motif in the original OSN graphs, and the mean frequency of the same in the random graphs. For the purpose of this work, the values of have been considered as . Based on these values, the network motifs that are expected to be not dominant in each of the real-life OSNs can be predicted. For the Facebook data set, the reciprocal motifs can be predicted to be non-dominant. Similarly, for Twitter, Email, GPlus, GNU data sets, the sets of non-dominant network motifs are (reciprocal), (receiving), (receiving, reciprocal), respectively. The Wiki-vote data set has no such apparently non-dominant network motif that can be predicted based on just the frequency. However, for the completeness of the comparative study, all the network motifs have been considered for all experiments hereinafter in this article.
Table 1

Values of the proposed network motif frequency of original graph and mean frequency of 100 random graphs with similar in-degree and out-degree sequences of original graph

DatasetInteraction patternOriginal_Motif_frequencyMean_Motif_Random_Frequency
FacebookReceiving2649368.02337039.16
Broadcasting3975462.01963597.76
Message passing26900192401185.64
Reciprocal0.0451.54
Twitter-scrappedReceiving105264.0245.28
Broadcasting4102.05.18
Message passing95225.6
Reciprocal180.0
EmailReceiving5483067.010792220.62
Broadcasting21123559.02428672.04
Message passing190003898892559.12
Reciprocal44620.03661.26
GplusReceiving40652.010799406.26
Broadcasting14563326.09060.05
Message passing19559248480.31
Reciprocal48.01.84
GNUReceiving153351.0175955.94
Broadcasting185113.0140042.62
Message passing180230.0176648.72
Reciprocal0.010.2
Wiki-voteReceiving4285079.03622650.18
Broadcasting7062816.0780579.74
Message passing45428051651593.4
Reciprocal2927.0451.72
Values of the proposed network motif frequency of original graph and mean frequency of 100 random graphs with similar in-degree and out-degree sequences of original graph

Measures for network motif

Concentration

Concentration is the measure of a particular k size of network motif [37]. It is the ratio of the frequency of a particular size of sub-graph and the total frequency of all possible sub-graphs with the same size. Lets consider a sub-graph , the concentration of is defined aswhere is the frequency of the specific sub-graph and i is the index of all possible sets of size k sub-graph. So, the denominator represents the total number of all frequencies of the sub-graph of size k. Here, the size of the graph refers to the cardinality of its edge set. The concentration of a network motif refers to how frequent it is in the network compared to other sub-graphs of the same size [14]. Table 4 shows the percentage of the proposed network motifs. In Facebook, Email, GPlus, GNU, and Wiki-vote, the concentration of broadcasting motif is a higher percentage value that means the interaction pattern broadcasting is statistically significant than other motifs/interaction patterns like receiving, message passing, and reciprocal motifs. In Twitter-scrapped, the concentration value of the receiving interaction pattern is more significant as a motif rather than broadcasting and message passing.
Table 4

Values of concentration and significance profile (SP) of sub-graphs

Data setInteraction patternConcentrationSP
FacebookReceiving28.44%0.1081
Broadcasting42.69%0.9813
Message passing28.88%0.1498
Reciprocal0.0%−0.0549
Twitter-scrappedReceiving95.40%0.9993
Broadcasting3.72%0.0382
Message passing0.86%0.0026
Reciprocal0.01%NaN
EmailReceiving12.01%−0.0709
Broadcasting46.27%0.9541
Message passing41.62%0.1337
Reciprocal0.097%0.2583
GPlusReceiving0.27%−0.0019
Broadcasting98.40%0.9999
Message passing1.32%8.7862e-05
Reciprocal0.000324%0.0002
GNUReceiving29.56%−0.3938
Broadcasting35.69%0.9073
Message passing34.75%0.1457
Reciprocal0.0%−0.0223
Wiki-voteReceiving26.96%0.0130
Broadcasting44.44%0.9971
Message passing28.58%0.0676
Reciprocal0.02%0.0326

Z-score

Z-score is another measurement tool of motif [37]. It is the ratio between the difference of the frequency of the sub-graph in the original network G(V, E) and the arithmetic mean frequency of in n number of random networks and the standard division of frequency of of n number of random networks. The random networks will be followed the degree distribution of G(V, E). The formulation of Z-score is defined as follows:where is the frequency of in original network, is the mean frequency of and is the standard division of frequency of in n random networks. The Z-score is high if the sub-graph is over-represented and negative if it is under-represented and close to zero otherwise [16]. Therefore, the larger value of means that is the more significant sub-graph as a network motif in graph G(V, E). Table 3 shows the Z-score values of the proposed network motifs. In Facebook and Wiki-vote, the Z-score value of receiving, broadcasting, message passing motifs are positive and high which means the interaction pattern-receiving, broadcasting, message passing motifs are over-represented, whereas the motif/interaction pattern like reciprocal motif is under-represented in the original networks. In Twitter-scrapped, the reciprocal motif is not considered as a motif.
Table 3

Values of mean and standard deviation of sub-graphs in random networks and z-score of corresponding sub-graphs in original network

DatasetInteraction patternMeanStandard deviationZ-score
FacebookReceiving2337039.167168.7143.57
Broadcasting1963597.765087.281395.47
Message passing2401185.644785.1360.36
Reciprocal451.5420.41−22.12
Twitter-scrappedReceiving245.282.3145354.41
Broadcasting5.182.361733.14
Message passing25.67.94116.68
Reciprocal0.00.0inf
EmailReceiving10792220.6224417.39−217.43
Broadcasting2428672.046386.592927.21
Message passing8892559.1224647.33410.09
Reciprocal3661.265 1.68792.56
GPlusReceiving10799406.2636317.56−296.24
Broadcasting9060.0592.70157008.54
Message passing48480.3110664.0713.80
Reciprocal1.841.2237.67
GNUReceiving175955.94348.24−64.91
Broadcasting140042.62301.37149.55
Message passing176648.72149.1224.01
Reciprocal10.22.77−3.68
Wiki-voteReceiving3622650.1813073.7950.67
Broadcasting780579.741621.523874.29
Message passing1651593.410999.78262.84
Reciprocal451.7219.57126.51

Significance profile

The significance profile [37] is defined as a vector of Z-scores of a particular set of sub-graphs, which is normalized to length of 1.where i is the index of all possible sets of sub-graphs with the same size. It highlights the relative significance of sub-graphs, rather than the absolute significance when the Z-score value is higher in a large-scale network. The significance profile of a network is negative values, especially those close to , are associated with under-represented sub-graphs, while positive ones, especially those close to 1, allow to recognize the motifs [16]. Table 4 shows the significance profile values of the proposed network motifs. In Facebook, Email, GPlus, GNU, and Wiki-vote, the significance profile value of the broadcasting motif is positive and close to 1 that means the interaction pattern broadcasting is statistically significant than other motifs/interaction patterns like receiving, message passing, and reciprocal motifs. In Twitter-scrapped, the significance profile value of the receiving interaction pattern is more significant as a motif rather than broadcasting and message passing.

Different centrality measures

In-degree centrality

The in-degree centrality of a node is the in-degree of a node [8] in a directed graph G(V,E). It indicates the number of edges directed to the node .

Outdegree centrality

The outdegree centrality of a node is the outdegree of a node [8] in a directed graph G(V,E). It indicates the number of edges directed to others from the node .

Closeness centrality

The closeness centrality [18] [7] of a node is the average of the shortest path length from the node to every other nodes in the network. It indicates the closeness of a node to all other nodes in the network.

PageRank centrality

PageRank centrality is a ranking of the nodes in the graph G(V,E) based on the structure of the incoming links. The PageRank of node u is defined as following [28]:where PageRank value for a node u is dependent on the PageRank values for each node v contained in the set (the set containing all nodes linking to node u), divided by the number L(v) of outbound links from node v.

Information propagation model

Independent cascade model

The independent cascade (IC) [23] model explains the process of information diffusion in a network. In this model, nodes participate in two states: active (A) and inactive (I). The node is in A state when it receives the information being circulated in the network. The I state node does not receive the information. In each time step, the A node attempts to influence its neighbours with a diffusion probability value.

Susceptible-infected-recovered model

Susceptible-infected-recovered (SIR) [23] model is a stochastic process model. In this model, nodes participate in three states: susceptible (S), infected (I), recovered (R). S is the number of susceptible nodes. These nodes are not infected but could become infected. I is the number of infected nodes. These nodes can transmit information to the suspected nodes. R is the number of removed nodes. These nodes cannot become infected and cannot transmit the information. In this process, at first, all nodes from network G are susceptible nodes except for a set of nodes that are initially infected. In each discrete time-step t, infected nodes try to infect their susceptible neighbours with probability p. These infected nodes can also be recovered with probability q. All recovered nodes cannot be infected again.

Forest fire model

Forest fire (FF) model is a mathematical model that has been utilized in information propagation as well [9, 22]. The model simulates the pattern in which a fire spreads in a forest. The fire starts from the seed nodes and is spread through neighbouring nodes with some probability. In the initial condition, all but the seed nodes (trees) can be considered to be not on fire. The neighbours of tree are burning if at least one neighbour tree is burning. The trees which are not adjacent to burning trees can catch fire with a probability p. An empty space is filled with trees with probability f. A burning tree at time instance t is not on fire and cannot catch fire starting at time instance . The propagation continues as long as at least one tree is burning.

Communication pattern initialization based on second-order/two-edges sub-graphs

The OSN is a communication network where the structure of the network represents the significant pattern of the interactions between the users. All these interaction patterns can be visualized by the four second-order (two-edged) sub-graphs. The network motif represents the pattern of connection. The basic network motif is represented by the single edge with a pair of nodes. Similarly, the second-order network motif is represented by two-edges connecting distinct pairs of nodes [1]. There are four types of two-edges motifs: convergent, divergent, chain motifs, and reciprocal. In OSNs, some users actively participate to receive the message, some users participate to broadcast the message, some users involve with both message receiving and pass, and some users communicate reciprocally with other users. All these interaction patterns can be represented by the four second-order sub-graphs which are described as follows. Message receiving pattern (convergent) Message receiving pattern is a triadic two edges sub-graph of graph G(V, E) if it consists of two directed edges (u, v) and (w, v) where , this means that the interaction originates from u to v and w to v, where . This means that node v receives the message from nodes u and w, which is shown Fig. 1a.
Fig. 1

a Convergent, b divergent, c chain motifs, d reciprocal [40]

Message broadcasting pattern (divergent) Message broadcasting pattern is a triadic two edges sub-graph of graph G(V, E) if it consists of two directed edges (v, u) and (v, w) where , this means that the interaction originates from v to u and w where . This means that node v broadcasts the message to nodes u and w, which is shown Fig. 1b. Message passing pattern (chain) Message passing pattern is a triadic two edges sub-graph of graph G(V, E) if it consists of two directed edges (u, v) and (v, w) where , this means that the message flow in the graph originates from node u, it is first transferred to v, and then from v to w where . This means that u passes the message to v and then v passes the message to w, which is shown Fig. 1c. Message reciprocal pattern (reciprocal) Message reciprocal pattern is a dyadic two edges sub-graph of graph G(V, E) if it consists of two directed edges (u, v) and (v, u) where , this means that the message is flowing from u to v and v to u where . This means that u and v are interacting as reciprocal manner, which is shown Fig. 1d. a Convergent, b divergent, c chain motifs, d reciprocal [40]

Problem statement and approach

Problem statement

Given a network G(V, E), a set of second-order/two-edged sub-graphs or network motifs, namely, message receiving pattern, message broadcasting pattern, message passing pattern and message reciprocal pattern, represented by , where and a set of centrality measures C, the problem is to rank the nodes based on C and GS, according to their suitability as sources for information propagation. The suitability is judged based on a set of metrics M and is verified using a set of information propagation methods IP. Each node has a score/value for each of the centrality measures and motif in . The nodes can be ranked on this score/value, and the nodes with higher scores can be considered as good seeds.

Proposed approach

The proposed approach can be broadly broken down in the following steps -The diffusion process is a special type of communication [31] among members of a network. Therefore, different communication patterns diffuse the information in a different way, and the aim of this study is to compare and contrast the difference in diffusion behaviour based on different communication patterns. Section 4.2.1 provides the algorithms utilized for counting the four different network motifs considered in this work. Section 4.2.2 provides the algorithms for generating random graphs with similar degree distribution as an input graph. The combination of all these algorithms provides the statistical metric-related empirical measures that allows relative ranking of nodes for suitability as seeds for information diffusion. Once the seed nodes have been identified, the top 1%, 2%, 3%, 4%, and 5% of the seed nodes are utilized to study the information diffusion in each of the real-life OSNs using three information propagation models, namely independent cascade, forest fire, and susceptible-infected-removed. Information diffusion is also studied by selection seed nodes based on centrality values, and the results are then compared. Count motif frequencies in original and random graphs Calculate statistical metrics for each motif for both the original as well as random graphs Use the statistical metrics as ranking mechanism for seed selection Use the seed nodes selected using network motif frequencies for information diffusion Compare the performance of these seed nodes with the seed nodes selected using popular centrality measures as ranking mechanism with respect to information diffusion.

Counting the frequencies of sub-graphs

The network motif detection technique is based on the contrasting of the occurrences of each sub-graphs between in the original network and in the randomized network which has the same nodes and degree sequences [26]. In this step, the frequencies of two-edged sub-graphs such as message receiving pattern, message broadcasting pattern, message passing pattern, and reciprocal message pattern between the users have been computed by the following algorithms: Algorithm 1 computes the frequency of message receiving sub-graphs for all nodes of the input graph G(V, E). The value is stored in the variable . The algorithm considers the in-degree of a vertex at step 6, and if the value is not zero, stores it in variable v1 at step 7. If the value of v1 is 2, then the number of receiving motif is considered as 1 and the value of variables is set to 1 and is increased by 1 accordingly at step 10 to step 12. If the value of v1 is not 2, the algorithm computes the number as receiving motif using the formula and updates the value of variables and accordingly at step 14 to step 16. The algorithm runs from step 5 to step 20 for all the vertex and returns the frequency of message receiving sub-graphs for each vertex and the total message receiving sub-graphs of the input graph. Algorithm 2 computes the frequency of message broadcasting sub-graphs for all nodes of the input graph G(V, E). The value is stored in the variable . The algorithm considers the out-degree of a vertex at step 6, and if the value is not zero, stores it in variable v2 at step 7. If the value of v2 is 2, then the number of broadcasting motif is considered as 1 and the value of variables is set to 1 and is increased by 1 accordingly at step 10 to step 12. If the value of v1 is not 2, the algorithm computes the number as receiving motif using the formula and updates the value of variables and accordingly at step 14 to step 16. The algorithm runs from step 5 to step 20 for all the vertex and returns the frequency of broadcasting sub-graphs for each vertex and the total message broadcasting sub-graphs of the input graph. Algorithm 3 computes the frequency of message reciprocal sub-graphs for all nodes of the input graph G(V, E). The value is stored in the variable . The algorithm considers the out-degree and in-degree of a vertex at step 5. If the values are not zero and if all successors of i get i as a successor, is increased by 1 at step 9. The value of variables is set to at step 10. is increased by accordingly at step 4 to step 14. At step 16 is divided by 2 to avoid the double-counting and returns the frequency of reciprocal sub-graphs for each vertex and the total message reciprocal sub-graphs of the input graph. Algorithm 4 computes the frequency of message passing sub-graphs for all nodes of the input graph G(V, E). The value is stored in the variable . The algorithm considers the out-degree and in-degree of a vertex at step 6, and the values are stored in v3 and v4. If the values are not zero, is computed by at step 9 and stored in . At step 13 is updated and returns the frequency of message passing sub-graphs for each vertex and the total message passing sub-graphs of the input graph.

Generating randomized networks

This section focuses on generating sufficiently large N number of randomized networks and counting frequencies of initialized sub-graphs. Algorithm 5 generates a random graph, which in-degree and out-degree sequences of nodes are similar with original graph and here, the input is the in-degree sequence and the out-degree sequence of the original graph G(V, E). The two random vertices v1 and v2 are selected by Algorithm 6 from and sequences and returns random vertices v1 and v2 at Algorithm 5. If v1 and v2 are different then adding an edge between v1 and v2, the values of and are deducted by 1 by step 11 and step 12 accordingly. If v1 or v2 are not in and then removing v1 and v2 by step 13 to step 18. Then this algorithm returns the random graph . Then, the frequencies , where of the sub-graphs for each randomized directed graph of input graph G(V, E) has been computed using Algorithm . Algorithm 6 selects the two random vertices from and sequences of the original graph and stores at v1 and v2 at step 3 and step 4 accordingly. Then it checks the value of v1 and v2 at step 5. If they are not equal, then v1 and v2 are returned to Algorithm 5.

Computation of mean and standard deviation of random networks’ sub-graphs

Standard deviation refers to the amount of variability of the sub-graphs within a data set. The mean is the average number of sub-graphs in the data set. The Z-score indicates the number of standard deviations of a given data point lies above or below the mean [37]. In this step, the mean and standard deviation of the frequency of sub-graph of each type which has been generated from random networks are computed. The value of mean and standard deviation has been used in the next step to compute the Z-score of each sub-graph. Here 100 random networks and the frequencies of four types of sub-graphs have been considered which are defined in Sect. 3.5.

Computation of concentration, Z-score, and significance profile (SP) & finding the significant interaction pattern

In this section, the value of concentration, Z-score, and SP of each sub-graphs has been calculated using the Eqs. (1), (2) and (3). The result has been shown in Tables 3 and 4. The high concentration, Z-score, and SP value refer to the significant interaction pattern (network motif) which are considered as a building block of an original network. After that, finding the frequencies of sub-graphs or network motifs—message receiving pattern, message broadcasting pattern, message passing pattern, and message reciprocal pattern for each node to identify their individual involvement in the interaction network. Then the traditional ranking mechanism that is the highest valued node gets the highest rank has been used to measure the influences of the nodes in the mentioned interaction patterns. Then, 1%, 2%, 3%, 4%, and 5% highest ranking nodes are selected sequentially as the initial activated or seed nodes to examine how information propagates throughout the network using three popular information propagation algorithms-independent cascade, susceptible-infected-removed, and forest fire models. For comparison study, the closeness centrality, in-degree centrality, out-degree centrality, PageRank centrality have been measured for each node and similar ranking methods have been applied to select the initial seed nodes to apply in mentioned information propagation algorithms.

Result and analysis

Data set description

For this paper, six online social network data sets have been considered. The source of the data sets is described in Table 2. Most data sets considered for the purpose of this work are open-source and free-to-use data sets. The non-open source data can be made available on request. The networks have been considered as directed unweighted graphs. The graphs are modelled as edge lists, and there are no self-loops or multiple parallel edges in any of the graphs.
Table 2

Data set description

Data set nameNo of nodesNo of edgesSource/references
Facebook403988234Open source [2]
Twitter-scrapped47165000Not open source
Email23326158726Open source [3]
GPlus2362839242Open source [4, 11]
GNU1087639994Open source [5]
Wiki-vote7115103689[6]

Experimental set-up

Section 4.2 provides the proposed approach, along with the algorithms used to generate random graphs and count the frequency of motifs, which are used for the purpose of this work. The stepwise breakdown of the experimental set-up is described as below -Since the information diffusion models considered are of probabilistic nature, and the same seed nodes in the same network can give varied results for the same diffusion model, all reported results are taken as an average of multiple runs. The experiments are conducted using on Anaconda Python 3.6 interpreter, with 8 GB RAM, Intel i5 8th Generation processor with frequency of 4 GHz. The experimental results are tabulated and represented as figures in the following section. Generating the random graph with similar in-degree and out-degree sequences of the original graph using Algorithm 5 and Algorithm 6. An original graph is constructed using the edge lists of each of the six real-life OSNs considered. Hundred random graphs are generated for each input original graph in-degree and out-degree distribution. Count the frequency of each of the proposed network motifs for each of the original graphs using Algorithm 1 through 4. Count the frequency of each of the proposed network motifs for the random graphs corresponding to each of the original graphs using Algorithm 1 through 4. The mean and standard division of these frequencies are then calculated. The network motifs are validated using the validation parameters discussed in Sect. 3.1.3. Concentration, Z-score, and significance profile for each of the proposed network motifs for each of the original graphs are calculated to measure of their statistical significance as network motifs for a particular graph/network. The nodes in the original graph are ranked in descending order of the frequencies of the proposed network motifs for each of the original graphs. The top 1%, 2%, 3%, 4%, and 5% of the ranked nodes are considered as seed nodes for information propagation in original graphs using independent cascade, susceptible-infected-removed, and forest fire models. The propagation results are compared with the propagation depth of some of the baseline models for seed selection, namely, closeness centrality, in-degree centrality, out-degree centrality, and PageRank.

Result

The proposed approach has been mentioned in the previous section and applied in several OSNs. The statistical measurements regarding network motifs are given in Tables 3 and 4. Here, six OSN data sets Table 2 have been examined. The mean and standard deviation of the frequencies of each sub-graphs of fifty random networks and Z-score of mentioned sub-graphs are represented in Table 3. Table 4 represents the values of concentration and SP of each type of sub-graphs. The result of information propagation based on forest-fire model, information cascading model, and SIR model is shown in Figs. 2, 3, 4, 5, 6, and 7. For each data set, the initial seed nodes have been selected based on highest rank values of the closeness centrality, in-degree centrality, out-degree centrality, PageRank centrality, message receiving pattern, message broadcasting pattern, message passing pattern and message reciprocal pattern which are mentioned in output. In the output, it is shown that 1%, 2%, 3%, 4%, and 5% of highest nodes have been chosen sequentially to examine and analyse the impact of how the information propagates using the basic communication patterns and centrality measurements.
Fig. 2

Information propagation on Facebook graph

Fig. 3

Information propagation on Twitter-scrapped graph

Fig. 4

Information propagation on Email graph

Fig. 5

Information propagation on GNU graph

Fig. 6

Information propagation on GPlus graph

Fig. 7

Information propagation on Wiki-vote graph

Information propagation on Facebook graph Information propagation on Twitter-scrapped graph Information propagation on Email graph Information propagation on GNU graph Information propagation on GPlus graph Information propagation on Wiki-vote graph Data set description Values of mean and standard deviation of sub-graphs in random networks and z-score of corresponding sub-graphs in original network Values of concentration and significance profile (SP) of sub-graphs

Analysis

It can be seen that the concentration and significance profile (SP) values are different for each of the online social networks from Table 4. Reciprocal pattern has both low concentration and SP for all the networks. Thus, it is safe to say that relatively very few nodes take part in reciprocal interaction in the network. Broadcasting pattern is dominant in Facebook, GPlus, and Wiki-vote networks. Receiving pattern is highly dominant in the Twitter-scrapped network. For the Enron Email network, both broadcasting and message passing patterns are prominent and for GNU network all but reciprocal patterns are equally represented. The high concentration and SP of an interaction pattern imply that a high number of nodes take part in that pattern in the network. High broadcasting pattern signifies that the participating nodes pass out information to other nodes in the network. Thus, the senders work as source of information and they actively participate in generating and propagating information. Similarly, the receiving pattern signifies that the participating nodes accumulate information from other nodes in the network. Thus the receivers work as sinks of information. They do not actively propagate information, but they participate in the flow. Message passing pattern signifies that the participating nodes neither act as source nor sink in the information flow, but work as facilitators, passing on received information. Reciprocal pattern signifies that the participating nodes act as both source and sink. From Table 3, the Z-scores can be seen along with the mean and standard deviations of each of the interaction patterns for each of the networks. The Z-score implies how many standard deviations away from the mean is a value. Thus a very high positive or negative Z-score implies outliers or values which are over-represented where a low to moderate Z-score, both positive and negative, implies a closer to average value. Combining the results from these two tables, it can be said that Facebook, GPlus, and Wiki-vote have nodes which can be used as seed nodes as they actively spread information. However, the reach of these broadcasting nodes might be limited as two-edge motifs have a reach of distance 1. For Twitter-scrapped network, most nodes play a passive role, where they receive information but do not propagate it forward. For GNU and Email network, all the interactions are evenly distributed. Figure 2 presents the extent of information propagation on Facebook user interaction graph using forest fire, susceptible-infected-removed, and independent cascade models. The X-axis represents the number of seed nodes selected, and the Y-axis represents the number of infected nodes at the end of propagation. Figures 3, 4, 5, 6, and 7 are an equivalent representation on Twitter interaction graph, Enron Email graph, GNU graph, GPlus interaction graph and Wiki-vote graph, respectively. In Figs. 2, 3, 4, 5, 6, and 7 it can be seen that the FF model is not spreading information more when low percentages like (1%, 2%, 3%) of seed nodes have been selected initially. The reciprocal pattern is also working significantly when (4%, 5%) of seed nodes have been selected through the reciprocal pattern has less Z-score value on Facebook. It can be also noticed that in the IC model and SIR model, the reciprocal motif is not propagating the information on Facebook and GNU networks. For each network, the total infected count is very high for the FF model. In Email and GPlus networks, the activated nodes are low for IC and SIR models. It can be observed that the FF model predicts very low spreaders count initially but later on, the count increases when the seed nodes’ percentage is increased. In FF model, centrality measures and network motif patterns are spreading the information almost similar count, but in the IC model and SIR model, the centrality measures are spreading more than the different network motif patterns.

Applications

The basic human–interaction pattern analysis is very important in OSNs to find the influential nodes and to analyse the human activity patterns and information propagation, customer management in e-commerce, etc.

Influential nodes identification

The influential node identification is a hot topic in the social network. In social media, different interaction patterns can be observed for different groups of users, so using this basic interaction motif patterns the particular group of users can be categorized or identified. Generally, the nodes which are more involved with the broadcasting pattern, those nodes can be targeted nodes to publish a new product or brand or services in e-marketing. Hence, these are the influential nodes.

Human activity patterns and information propagation analysis

The OSN is a crucial platform for information propagation and viral marketing to political purposes. From the information propagation point of view, few nodes act as the good receiver and few nodes are good information spreader which can be identified by this methodology. The good information spreader nodes can be criminal for rumour spreading. From interaction patterns, users behaviours or activity patterns can be analysed by their profiles, which can be used to improve business and resource management in OSN. Even for rumour controlling and opinion monitoring, these interaction patterns can be used to analyse how particular users are propagating information.

Customer management in E-commerce site

E-commerce is a platform through which customers can electronically buy and sell products on online services or the Internet. The customers’ activity can be analysed from the historical customer and product network. Using the interaction pattern analysis, the business organization can focus on the target nodes/customers for acquiring and retaining customers. This method can be applied to find profitable customers and popular product/services.

Conclusion

Earlier studies have mainly focused on network properties like degree distribution, clustering, density, shortest path, transitivity, and so on, and their effect on information propagation. Many studies have been conducted in evaluating the network behaviour as a whole from a structural perspective. In this approach, the focus is on the basic communication/ interaction patterns in OSN. The article focuses on finding the frequency of the second-order network motifs in real-life OSNs and random graphs with degree distribution similar to the real-life OSNs. The focus is also on comparing the performance of network motifs with some popular centrality measures with respect to information propagation, tested using three standard information propagation techniques: forest fire, independent cascade, and susceptible-infected-removed. The experimental results show that the performance of network motifs is comparable to, but not out-performing, that of popular centrality measures in seed selection for information propagation. The experimental results also highlight that different network motifs are dominant for different OSNs, as well as for different propagation methods in the same OSN. Future scope of research in related domains can include investigating the community detection in OSN based on these basic interaction patterns. Whether the nodes’ basic interactions are affected by other factors such as a social event, age, gender, hometown, and profession can also be analysed. A lot of open problems such as how the basic interaction patterns affect the human behaviours, how the basic interactions patterns affect the velocity of information propagation, and other complex interaction motifs analysis can be studied in future as well.
  12 in total

1.  Network motifs in the transcriptional regulation network of Escherichia coli.

Authors:  Shai S Shen-Orr; Ron Milo; Shmoolik Mangan; Uri Alon
Journal:  Nat Genet       Date:  2002-04-22       Impact factor: 38.330

2.  Network motifs: simple building blocks of complex networks.

Authors:  R Milo; S Shen-Orr; S Itzkovitz; N Kashtan; D Chklovskii; U Alon
Journal:  Science       Date:  2002-10-25       Impact factor: 47.728

3.  Superfamilies of evolved and designed networks.

Authors:  Ron Milo; Shalev Itzkovitz; Nadav Kashtan; Reuven Levitt; Shai Shen-Orr; Inbal Ayzenshtat; Michal Sheffer; Uri Alon
Journal:  Science       Date:  2004-03-05       Impact factor: 47.728

4.  Local graph alignment and motif search in biological networks.

Authors:  Johannes Berg; Michael Lässig
Journal:  Proc Natl Acad Sci U S A       Date:  2004-09-24       Impact factor: 11.205

5.  Biological network motif detection: principles and practice.

Authors:  Elisabeth Wong; Brittany Baur; Saad Quader; Chun-Hsi Huang
Journal:  Brief Bioinform       Date:  2011-06-20       Impact factor: 11.622

Review 6.  A review on models and algorithms for motif discovery in protein-protein interaction networks.

Authors:  Giovanni Ciriello; Concettina Guerra
Journal:  Brief Funct Genomic Proteomic       Date:  2008-04-28

7.  Synchronization from second order network connectivity statistics.

Authors:  Liqiong Zhao; Bryce Beverlin; Theoden Netoff; Duane Q Nykamp
Journal:  Front Comput Neurosci       Date:  2011-07-08       Impact factor: 2.380

8.  Information diffusion modeling and analysis for socially interacting networks.

Authors:  Pawan Kumar; Adwitiya Sinha
Journal:  Soc Netw Anal Min       Date:  2021-01-09

9.  The COVID-19 social media infodemic.

Authors:  Matteo Cinelli; Walter Quattrociocchi; Alessandro Galeazzi; Carlo Michele Valensise; Emanuele Brugnoli; Ana Lucia Schmidt; Paola Zola; Fabiana Zollo; Antonio Scala
Journal:  Sci Rep       Date:  2020-10-06       Impact factor: 4.379

Review 10.  Review of tools and algorithms for network motif discovery in biological networks.

Authors:  Sabyasachi Patra; Anjali Mohapatra
Journal:  IET Syst Biol       Date:  2020-08       Impact factor: 1.615

View more

北京卡尤迪生物科技股份有限公司 © 2022-2023.