Literature DB >> 35115582

Influential nodes identification using network local structural properties.

Bin Wang1, Junkai Zhang1, Jinying Dai1, Jinfang Sheng2.   

Abstract

With the rapid development of information technology, the scale of complex networks is increasing, which makes the spread of diseases and rumors harder to control. Identifying the influential nodes effectively and accurately is critical to predict and control the network system pertinently. Some existing influential nodes detection algorithms do not consider the impact of edges, resulting in the algorithm effect deviating from the expected. Some consider the global structure of the network, resulting in high computational complexity. To solve the above problems, based on the information entropy theory, we propose an influential nodes evaluation algorithm based on the entropy and the weight distribution of the edges connecting it to calculate the difference of edge weights and the influence of edge weights on neighbor nodes. We select eight real-world networks to verify the effectiveness and accuracy of the algorithm. We verify the infection size of each node and top-10 nodes according to the ranking results by the SIR model. Otherwise, the Kendall [Formula: see text] coefficient is used to examine the consistency of our algorithm with the SIR model. Based on the above experiments, the performance of the LENC algorithm is verified.
© 2022. The Author(s).

Entities:  

Mesh:

Year:  2022        PMID: 35115582      PMCID: PMC8814008          DOI: 10.1038/s41598-022-05564-6

Source DB:  PubMed          Journal:  Sci Rep        ISSN: 2045-2322            Impact factor:   4.379


Introduction

With the development of graph theory, the complex network has been applied in many fields[1-4]. Nodes and edges in different types of networks play diverse roles in network structure and function. These networks are heterogeneous at macro, mesoscale, and micro scales. At the macro level, we mainly focus on the statistical characteristics of networks, such as degree distribution, cluster distribution, and degree correlation. At the mesoscale level, the hierarchical and community structure of the network are the two most prominent characteristics. At the micro-level, the number of local neighbors nodes and the weight of edges is the focus of many scholars. Traditional methods of identifying influential nodes mainly consider the degree of nodes, such as Hindex[5], K-shell[6], and Semi-local centrality[7]. In addition, the methods based on the influence of edges do not consider the different roles of edges in the process of information transmission, and the time complexity is high, such as Closeness centrality[8] and Betweenness centrality[9]. Based on the mentioned above, many research works explore potential features in complex network from different perspective[10-13]. At present, many scholars have proposed methods to identify influential nodes[14-17]. For instance, to solve the limitation of the existing model in terms of research content is too single, Zhao et al.[18] proposed a new method. It takes into account the influence of the node itself and its neighbor nodes. Also, a model to quantify the global influence of nodes are proposed, which makes the ranking more intuitive. Xu et al.[19] designed two different influential nodes identification algorithms based on information entropy for four different types of networks. Consider the limited local information of the centrality method that may lead to incomplete identification of influential nodes, Maji et al.[20] presented an improvement method that identifies the influential nodes even when the complete network structures are unavailable. In recent years, many entropy-based centrality measures have been proposed. For instance, to design a more applicable centrality measure, Xu et al.[19] proposed two influential nodes identification algorithms based on node adjacency information entropy (AIE). By calculating and comparing the adjacency information entropy of nodes, the importance of nodes is ranked. The larger the entropy value is, the more influential the nodes are. The algorithms highlight the different characteristics of the different types of networks (directed network and weighted network). To design a more robust and practical algorithm, Guo et al.[21] proposed the EnRenew algorithm aimed to identify a set of influential nodes via information entropy (IE). Firstly, the information entropy of each node is calculated as the initial spreading ability. Then, select the node with the largest information entropy and renovate its l-length reachable nodes’ spreading ability by an attenuation factor, repeat this process until the specified number of influential nodes are selected. By taking the effect of the spreading rate on information entropy into account, Zhong et al.[22] proposed an improved information entropy (IIE) method. The IIE method takes the spreading rate and the number of the target node’s neighbors into account. The above entropy-based algorithms for identifying influential nodes have all proved their accuracy through experiments. In the time complexity analysis section, we will compare the computational complexity of these algorithms with our proposed algorithm. In this paper, considering the computational time of large-scale complex networks, we propose an algorithm that has low time complexity, can identify influential nodes with more accuracy. The algorithm can directly identify influential nodes without setting any parameters because some parameters are set to reasonable constants. The rest of the paper is organized as follows. "Preliminaries" section gives a brief introduction to the preliminaries. "Methods" section presents the LENC ranking algorithm we proposed, including the main idea, and the calculation process of our algorithm. "Experiments" section will point out the experimental verification. "Discussion" section is the conclusion.

Preliminaries

A network can be denoted by G, equated as , where V and E represent the set of nodes and edges, respectively.

Equilateral triangle

The edge between node and is expressed by . Assuming that the neighbor node sets of and are and , respectively, then the number of triangles that can form between the two nodes is the number of their common neighbors. It can be defined as

Edge weight

On the one hand, the more paths connected by the node, the greater the information load, and the greater the influence of corresponding edges. On the other hand, the more alternative paths are available, the influence of the edge will be reduced correspondingly[23]. Besides, the contribution of the edge to the information transmission is proportional to the information load of the node. Based on the above considerations, the influence of an edge depends on the information-carrying capacity of the connected nodes and the possibility of the edge is being replaced by other paths. The weight of edge between node and can be expressed aswhere represents the degree of node , represents the number of triangles formed by the edge , represents the weight of the edge between node m and n, and represents the contribution coefficient of the edge. For simplicity, we set . is abbreviated as in this paper. Since the contribution of edge to the influence of the two nodes it connects is different, the same edge reflects different influences to the two nodes, expressed as . The virtual node and other nodes in the network have a virtual edge , and the number of triangles constituted by the virtual edge is assumed to be 0 in the algorithm. The weight calculation method of the virtual edge is the same as that of other edges, and the weight of edge is expressed aswhere represents the information load (degree value) of the virtual node. Since the virtual node connected to all nodes in the network, here , and N is the number of nodes in the network. The influence of all edges around the node is added, the sum of the weights of the first order edges of the nodes can be expressed aswhere represents the sum of the weights of all edges connected to the node .

Information entropy

Claude Shannon[24] pointed out that information entropy is monotone, non-negative and additive. The only form of the uncertainty measurement function of a random variable that has proved to satisfy the three conditions is , which is suitable for constant C, in this case, we set . The entropy of the node based on the weight distribution of the edges connected to it of virtual node and neighbor node defined asThe sum of the information entropy of all first-order edges of a node is obtained by summing up the information entropy of all first-order edges of a node, which is similar to the method of calculating and evaluating the influence of nodes based on degree entropy[25]. In this algorithm, the entropy of the node based on the weight distribution of the edges connected to it is used to evaluate the influence of nodes, and the edge entropy weight of nodes is expressed as

Node influence

According to the topological structure of the network, nodes at the center of the network have a higher influence than nodes at the edge of the network. In the case of two nodes with the same entropy value, the node at the center is more important than the node at the edge. When calculating the local influence of nodes, the position influence coefficient k-core is introduced. The first-order entropy of the node based on the weight distribution of the edges connected to the node is the contribution of the first-order edge to the node influence, which is expressed asTo ensure the accuracy of the algorithm, the second-order edge entropy should be considered. The first-order edge is the entropy of the node based on the weight distribution of the edges connected to the node itself, and the second-order edge is the entropy of the node based on the weight distribution of the edges connected to the neighbor nodes, which is the contribution of the neighbor to the influence of the node[26]. The total influence of nodes in the network can be expressed aswhere, are the neighbor nodes of node .

Methods

Main idea

According to the properties of information entropy, information entropy can measure the uncertainty of the system. The more stable the system is, the higher the information entropy is. Otherwise, the information entropy is lower. Therefore, the entropy of the node based on the weight distribution of the edges connected to it can be used as an indicator to evaluate the local influence of nodes. The higher the entropy is, the higher the complexity of nodes is, and the more influential it is in the network. There are two extreme cases of ranking the influence of nodes by using information entropy: the entropy value of nodes with one edge is 0, and the entropy value of nodes with a similar structure is equal. As shown in Fig. 1, node a and node b in the network have the same number of neighbor nodes. It is assumed that the degree of the node j and k are not equal, the weights are different but the distribution is the same. If we calculate the information entropy by the difference distribution, the weighted entropy of both nodes are the same, and the value is . Hence the influence is indistinguishable. However, with the introduction of the virtual node , the weight and the connecting edge of the virtual node to the two nodes are the same, without changing the network attribute. The weight value of the virtual edge and real edge is different due to the difference of nodes, which breaks the original balanced distribution so that the influence of the two nodes can be well distinguished. The influence of nodes can be obtained by the entropy weight of multi-order edge information.
Figure 1

Virtual node action display diagram.

Virtual node action display diagram.

Information entropy model

Introducing virtual nodes to reconstruct the network, assigning edge weights to nodes, and calculating the entropy of the node based on the weight distribution of the edges connected to it, the contribution of edges to the influence of nodes is determined. On this basis, introduce the location of the nodes in the network parameters, ensure the rationality of the proposed algorithm. The calculation considers the two-layer edge of the node to ensure the accuracy and efficiency of the algorithm. We mainly introduce the construction process of the LENC algorithm model from three aspects: algorithm definition, algorithm flow, and time complexity analysis.

The algorithm flowchart

The idea of the LENC algorithm is as follows. Firstly, a virtual node is introduced to reconstruct the network, forming a new network . Node has a virtual edge with all nodes in the network, and the degree of node is the total number of nodes in the network. Secondly, according to the number of adjacent triangles and the effect of the nodes on the influence of adjacent triangles, the weights of adjacent nodes and neighbor nodes, and virtual nodes are calculated. Then, the entropy value of each edge is obtained according to the information entropy formula, and the entropy value of the first-order edge of the node to obtain the local influence of the node. Finally, the local influence attributes of the neighbor nodes are added to obtain the entropy weight of the first and second-order edges of the nodes, which can be an indicator of the influence ability of the nodes in the network. Figure 2 shows the calculation process of the model.
Figure 2

The flow chart of the LENC algorithm.

The flow chart of the LENC algorithm.

Time complexity

The time complexity of the LENC algorithm has three main components. In the first part, to calculate the weight of the edge, we need to consider the number of common nodes among the nodes and their neighbors. First, calculate the number of the triangle of the edge, then calculate the weight of the edge. The time complexity is O(N), where is the average degree of the network, and N is the number of nodes; The second part is to calculate the local influence of nodes, which requires the introduction of the location attribute k-core of nodes. According to the K-shell algorithm, this step requires the traversal of all edges in the network. The time complexity is O(|E|), where E is the number of edges. In the third part, to calculate the total influence of the node, it is necessary to accumulate the weighted entropy of the first and second-order edges of the node. To calculate the weighted entropy of the neighbor edges, it is necessary to continue to traverse two-layer neighbor nodes, with the time complexity of . Therefore, the time complexity of the LENC algorithm is . Table 1 lists the time complexity of several state-of-the-art algorithms and some popular entropy-based centrality measures. We can see the time complexity of LENC is low.
Table 1

Time complexity of different algorithms.

AlgorithmComplexity
CC\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$O(n^2logn+nm)$$\end{document}O(n2logn+nm)
EC\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$O(n^2)$$\end{document}O(n2)
HITSO(n)
HindexO(nlogn)
DIL\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$O(n<k>^2)$$\end{document}O(n<k>2)
LENC\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$O(n<k>^2)$$\end{document}O(n<k>2)
IIEO(n)
AIE\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$O(n^2)$$\end{document}O(n2)
IE\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$O(m+n+rlogn+\frac{rm^2}{n^2})$$\end{document}O(m+n+rlogn+rm2n2)

(n, m and r represent the number of nodes, edges and initial infected nodes, respectively.)

Time complexity of different algorithms. (n, m and r represent the number of nodes, edges and initial infected nodes, respectively.)

Computation process

To further explain the specific calculation process of the LENC algorithm, a simple network that contains 6 nodes and 7 edges is an example. Node is a virtual node introduced in the network. As shown in Fig. 3, take the influence of node in the network as an example. By calculating the entropy weight contribution of the first-order and second-order edges, the influence of the nodes was obtained. The specific calculation steps are as follows.
Figure 3

A toy network.

A toy network. Step 1: Calculate edge weight. Calculate the weight of the edge between node and virtual node ,Calculate the weight of the edge between node and neighbor node ,In the same way, the weights of the edge of the neighbor node , node , and node can be calculated as follows: 0.5714, 3.2, 1.3333. Step 2: Calculate total weight. Add the edge weights of node and all neighbors to obtain the first-order edge weights of node ,Step 3: Calculate the entropy value. The entropy weights of the edges of node and its neighbors and virtual nodes are calculated respectively. Take the information entropy of the edges of node and its neighbors as an example,Following this method, the entropy weights of the edges of node and all neighbor nodes are added (including the entropy values of the virtual node ), so that the sum of the entropy values of all first-order edges of the node isStep 4: Calculate the total influence. Combined with the location parameters of node, the local influence of nodes in the network is calculated, as shown in the following formula,According to the “three-degree separation” theory[27], edges outside the third-order have less impact on the influence of nodes and even have a negative effect. To ensure accuracy, the second-order edges were considered. In addition to its local influence, the ultimate influence of nodes in the network should be extended to other neighbor nodes. The total influence of node in the network is calculated as follows.In the same way, we can calculate the influence of all nodes in the network. The results are shown in Table 2.
Table 2

Comparison result of simple network node influence evaluation indexes.

Node432651
k-core222211
Result12.890211.891110.59538.44084.52124.4470
Comparison result of simple network node influence evaluation indexes. Next, we analyze the influence of nodes in the network according to the node deletion method. Firstly, nodes 3 and 4 are at the center of the network. The degree of node 4 is greater than that of node 3, and removing node 4 has a greater impact on the network structure. Therefore, the influence of node 4 is greater than that of node 3. Secondly, for node 2 and node 6, moving node 2 will cause the entire network to be disconnected, which has a greater impact on the network structure, so node 2 is more important than node 6. Finally, the influence of node 1 and node 5 at the edge of the network is similar. Therefore, according to the node deletion method, the ranking results of the influence of nodes are 4, 3, 2, 6, 5, 1. As shown in Table 2, the ranking results of our proposed algorithm are consistent with the analysis result. Therefore, the accuracy of LENC has been proved initially.

Experiments

Data sets

In this experiment, eight real-world networks with different properties are selected, the statistics of these networks are summarized as follows. The basic statistics are shown in Table 3, and these networks can be downloaded from KONECT (http://konect.uni-koblenz.de/networks/) and NETWORK (http://networkrepository.com/).
Table 3

The statistics of eight real-world complex networks: Node number |V|, edge number |E|, average degree , maximum degree , and clustering coefficient .

Data Sets|V||E|\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$<K>$$\end{document}<K>\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$K_{max}$$\end{document}Kmax\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$<CC>$$\end{document}<CC>
Zachary34784.5882170.5706
Arenas-email113354519.62710.2202
Moreno-blogs12241671527.3123510.3197
Web-spam47673737515.6814770.2859
Bio-dmela7393255696.916170.5706
Ca-astroph1877119805021.342360.677
Email-EU32430543973.35476230.1127
Opsahl-powergrid494165942.669190.0801
The statistics of eight real-world complex networks: Node number |V|, edge number |E|, average degree , maximum degree , and clustering coefficient .

Zachary

The Karate club network, a total of 34 nodes and 78 edges. The nodes represent the club members, and the edges represent the bond between two club members.

Arenas-email

This is the E-mail network of Rovira I Virgili University in Tarragona, southern Catalonia, Spain. It consists of 1133 nodes and 5451 edges. In the network, the nodes represent e-mail users, and the edges represent at least one e-mail message that has been sent between two users.

Moreno-blogs

The Blog network contains hyperlinks on the front pages of blogs in the context of the 2004 USA election. A node represents a blog, and an edge represents a reference relationship between two blogs. There are 1224 nodes and 16715 edges in the network.

Web-spam

The network is provided by the Purdue university network repository and contains 4767 nodes and 37375 edges.

Bio-dmela

In biological networks, the nodes are proteins, and the edges are interactions between proteins. The nodes are individual proteins with a total of 7393 nodes. The edges represent the interactions between proteins with a total of 25569 edges.

Ca-AstroPh

The network is a collaboration diagram of authors of selected scientific papers in astrophysics (Astro-ph). Nodes represent each paper author, and edges indicate that the authors quote each other or have a cooperative relationship with each other. It contains 18771 nodes and 198050 edges.

Email-EU

The Email-EU network, containing 32000 nodes and 54000 edges, nodes represent all kinds of e-mail, and edges represent the interconnections among e-mail.

Opsahl-powergrid

This undirected network contains information about the power grid of the Western States of the United States of America. An edge represents a power supply line. A node is either a generator, a transformer, or a substation. It consists of 4941 nodes and 6594 edges.

Comparison algorithm

Five comparison algorithms are selected in our experiment. They are described as follows.

CC (Closeness Centrality)

Closeness centrality is based on the global information of the network to determine the network influence of nodes. The smaller the relative distance between all the node pairs, the stronger the accessibility of node information, and the more important are the nodes. It has been widely used in research but the time complexity is high.

EC (Eigenvector Centrality)[28]

This method considers that the influence of nodes in the network depends on both the number of neighbor nodes and the influence of neighbor nodes themselves. Its essence is to increase the influence of the node itself by connecting other nodes of relative influence. However, when there are many nodes with a large degree in the network, the phenomenon of fractional convergence will occur[29].

HITS

HITS algorithm using different metrics to assess the influence of the nodes in the network. Give each node a hub value and an authority value to evaluate the influence of the node. Authority value measures the original creativity of nodes to information, and hub values reflect the role of nodes in information transmission. They interact and converge iteratively.

Hindex

This algorithm is mainly used to evaluate a scholar’s academic achievements. The higher Hindex value indicates the greater influence of the node.

DIL

DIL is a new algorithm[23]. The method considers the degree attribute of the node but also the edge attribute of the node.

Evaluation indicators

SIR model

Kermack and McKendrick proposed the SIR model in 1927[30]. The model includes S, I, and R states. S indicates susceptible, I state indicates infected, and it can infect other healthy nodes with a certain probability. The R indicates recovered and has immunity. The SIR model is defined as follows.where S(t), I(t) and R(t) represent the number of susceptible nodes, infected nodes, and recovered nodes at time t respectively. represents the probability of infection and represents the probability of recovery.

Kendall coefficient

Kendall coefficient[31] is used to explain the correlation of two sequences, the correlation coefficient can reflect the proximity of two sequences. Suppose two sequences are related and have the same number of elements, expressed as , . For the elements in both sequences, if , or , , then any pair of sequence tuples and , are considered to be concordant; If , or , , they are considered discordant; If or , they are considered neither consistent nor inconsistent. Kendall coefficient is defined aswhere n is total combinations in these sequences, and indicate the number of concordant and discordant pairs, respectively. It reflects the correlation and matching between two sequences. In general, , where indicates a positive correlation and illustrates negative correlation. That is, the higher the value is, the more accurate the ranking.

Experimental analysis

To verify the ability of the LENC algorithm to identify influential nodes, the SIR model and Kendall correlation coefficient are used as evaluation indicators and compare the accuracy and effectiveness of different algorithms.

Case test

First, take the karate network as an example. The topology of the karate network is shown in Fig. 4. Table 4 shows the top-10 nodes ranking results of different algorithms and the SIR model. It can be seen from Table 4 that the ranking results of CC, Hindex, and DIL algorithms are different from the SIR model, which indicates that the ranking results of these three algorithms in the Zachary network are not accurate enough. The ranking results of the LENC, EC, and HITS algorithms are consistent with the SIR model, which can identify the influential nodes in the network accurately. Therefore, the accuracy of the LENC algorithm is proved preliminarily.
Figure 4

The karate network.

Table 4

Comparison of ranking results of top-10 nodes in karate network.

RankCCECHITSHindexDILLENCSIRSIR Value
11343413434343.58
231131113.31
334331433333.00
432333333333332.94
59223432222.65
6149992992.34
73314142143242.31
82044242814142.30
9232323194322.24
104313142431312.05
The karate network. Comparison of ranking results of top-10 nodes in karate network.

Correlation analysis

In this experiment, the SIR model was used to evaluate the rationality and correctness of different algorithms. The infection probability[32] is set as , k represents the average degree of nodes in the network, and represents the second-order neighbor degree with recovery probability , running independently for 1000 times. Figure 5 shows how the number of infected nodes varies with the influence of nodes. The x-axis represents the influence of nodes in different algorithms, and the y-axis represents the average number of infected nodes corresponding to different infection probabilities. The more linear the curve is, the more accurate the ranking result is. To observation, the axis is scaled, as shown in Fig. 5. In the Arenas-email network, the linear growth trend of the LENC algorithm is obvious, which indicates that there is a positive correlation between the node influence and the SIR model. CC, EC, and Hindex algorithms perform well, but they can not accurately distinguish nodes with the same influence. In the HITS algorithm, the distribution of nodes is loose, and the influence of nodes in the same location is significantly different, which indicates that the algorithm is coarse-grained. In the Moreno-blogs network, the HITS algorithm performs worst. In Web-spam network, Bio-dmela, Opsahl-powergrid, and Email-EU network, the LENC algorithm is better than other algorithms because it has a significant positive correlation with the SIR model. Therefore, the LENC algorithm is suitable for different networks, and the ranking result of node influence is more accurate and reasonable. As the above result, the LENC algorithm has the best positive correlation with the SIR model. As the influence evaluation index increases gradually, the number of infected nodes in the SIR model increases steadily. Moreover, the number of nodes with the same influence is relatively concentrated, which indicates that this method can rank the influence of nodes more precisely.
Figure 5

Correlation between significance evaluation indicator of different algorithms and SIR model infection.

Correlation between significance evaluation indicator of different algorithms and SIR model infection.

Transmission capacity

In this experiment, the top-10 nodes detected by different algorithms are used as infected nodes, and the number of infected nodes in each time step is used to distinguish the influence of nodes. To verify the initial infection ability of each algorithm, we set the infection probability , and the recovery probability . T is the time step, and F(t) represents the number of infected nodes in the network in time step t, as shown in Fig. 6. In the Web-spam network, the infected nodes of the top-10 nodes of the LENC algorithm are greater than other algorithms, indicating that the LENC algorithm can more identify the influential nodes in the network accurately. In the Bio-dmela and Email-EU network, the infection effect of the LENC and DIL algorithms is the best. In Arenas-email, Moreno-blogs and Ca-astroph networks, the ranking result of CC, Hindex, HITS, and LENC algorithms are similar. It is worth noting that the infection curve of the LENC algorithm has better infection performance. Besides, the ranking results of influential nodes identified by the EC algorithm do not meet the expected results. In summary, the positive correlation between the number of nodes infected by the LENC algorithm and the SIR model is the most obvious and verified the accuracy of this method. In the Opsahl-powergrid network, it can be seen from Fig. 6 that the infected performance of the LENC algorithm is significantly better than other algorithms, and the infection size of the top-10 influential nodes of the CC algorithm is relatively smaller than that of other algorithms.
Figure 6

Transmission initial infection capacity of the top-10 nodes.

Transmission initial infection capacity of the top-10 nodes.

Consistency analysis

Kendall coefficient is used to express the similarity and consistency of two sequences[33]. In this experiment, the infection probability of the SIR model is set as [0.01, 0.1]. The infection sequence was obtained through 500 iterations. The higher the Kendall coefficient, the more consistent the algorithm is with the real ranking result, as shown in Fig. 7. In Arena-Email and Bio-dmela networks, the kendall correlation coefficient between the LENC algorithm and SIR model is higher significantly. When the infection probability is greater than 0.06, the effect of the proposed algorithm and SIR model is relatively consistent, which proves that the evaluation results of the LENC algorithm are accurate. In Moreno-blogs and Ca-astroph networks, The Kendall coefficient of the LENC algorithm is the maximum when , and then drops to the same value as other algorithms when , but it still has certain advantages, indicating that the algorithm can accurately identify influential nodes in the network. In the Bio-dmela and Email-EU networks, the Kendall coefficient of the LENC algorithm is the largest, indicating that the recognition accuracy of the LENC algorithm is high. In summary, the ranking results of the LENC algorithm are highly consistent with the results of the SIR model, which verifies the accuracy of the algorithm. In the Opsahl-powergrid network, the Kendall coefficient of the LENC and HITS algorithm has the highest value, which is significantly better than other algorithms.
Figure 7

Kendall coefficient comparison under different infection probability conditions.

Kendall coefficient comparison under different infection probability conditions.

Discussion

The paper mainly introduces the model construction process of identifying influential nodes based on the entropy of the node based on the weight distribution of the edges connected to it. Introduces the time complexity of the model and the node influence evaluation process, and selects eight real-world networks with different network structure attributes. The experimental verification is carried out in four aspects: case test, correlation analysis, transmission capacity, and consistency analysis. The experiment verifies that the proposed algorithm LENC has obvious advantages. However, when calculating the influence of nodes, to control the time complexity of calculation cost, only the influence of first-order and second-order edges of the nodes are considered, and the accuracy of node influence ranking still has a lot of room for improvement. We will further improve the algorithm in future work.
  10 in total

1.  The treatment of ties in ranking problems.

Authors:  M G KENDALL
Journal:  Biometrika       Date:  1945-11       Impact factor: 2.445

2.  Subgraph centrality in complex networks.

Authors:  Ernesto Estrada; Juan A Rodríguez-Velázquez
Journal:  Phys Rev E Stat Nonlin Soft Matter Phys       Date:  2005-05-06

3.  Localization and centrality in networks.

Authors:  Travis Martin; Xiao Zhang; M E J Newman
Journal:  Phys Rev E Stat Nonlin Soft Matter Phys       Date:  2014-11-12

4.  The centrality of a graph.

Authors:  G Sabidussi
Journal:  Psychometrika       Date:  1966-12       Impact factor: 2.500

Review 5.  Social contagion theory: examining dynamic social networks and human behavior.

Authors:  Nicholas A Christakis; James H Fowler
Journal:  Stat Med       Date:  2012-06-18       Impact factor: 2.373

6.  Centrality in Complex Networks with Overlapping Community Structure.

Authors:  Zakariya Ghalmane; Chantal Cherifi; Hocine Cherifi; Mohammed El Hassouni
Journal:  Sci Rep       Date:  2019-07-12       Impact factor: 4.379

7.  Characterizing the interactions between classical and community-aware centrality measures in complex networks.

Authors:  Stephany Rajeh; Marinette Savonnet; Eric Leclercq; Hocine Cherifi
Journal:  Sci Rep       Date:  2021-05-12       Impact factor: 4.379

8.  Consistency and differences between centrality measures across distinct classes of networks.

Authors:  Stuart Oldham; Ben Fulcher; Linden Parkes; Aurina Arnatkevic Iūtė; Chao Suo; Alex Fornito
Journal:  PLoS One       Date:  2019-07-26       Impact factor: 3.240

9.  Influential Nodes Identification in Complex Networks via Information Entropy.

Authors:  Chungu Guo; Liangwei Yang; Xiao Chen; Duanbing Chen; Hui Gao; Jing Ma
Journal:  Entropy (Basel)       Date:  2020-02-21       Impact factor: 2.524

10.  Identifying vital nodes in complex networks by adjacency information entropy.

Authors:  Xiang Xu; Cheng Zhu; Qingyong Wang; Xianqiang Zhu; Yun Zhou
Journal:  Sci Rep       Date:  2020-02-14       Impact factor: 4.379

  10 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.