Search results for "Complex network"
showing 10 items of 131 documents
k-Truss Decomposition for Modular Centrality
2018
There is currently much interest in identifying influential spreaders in complex networks due to many applications concerned, such as controlling the outbreak of epidemics and conducting advertisements for commercial products, and so on. A plethora of centrality measures have been proposed over the years based on the topological properties of networks. However, most of these classical centrality measures fail to select the most influential nodes in networks with a modular structure despite that it is an omnipresent property in real-world networks. Few authors have introduced centrality measures tailored to networks with community structure. In a recent work, we have shown that, in this case…
The heterogeneity of inter-domain Internet application flows: entropic analysis and flow graph modelling
2013
The growing popularity of the Internet has triggered the proliferation of various applications, which possess diverse communication patterns and user behaviour. In this paper, the heterogeneous characteristics of Internet applications and traffic are investigated from a complex network and entropic perspective. On the basis of real-life flow data collected from a public network provided by an Internet service provider, flow graphs are constructed for five types of applications as follows: Web, P2P Download, P2P Stream, Video Stream and Instant Messaging. Three types of entropy measures are introduced to the flow graphs, and the heterogeneity of applications within a 24-h period is analysed …
Correlation Analysis of Node and Edge Centrality Measures in Artificial Complex Networks
2021
The role of an actor in a social network is identified through a set of measures called centrality. Degree centrality, betweenness centrality, closeness centrality, and clustering coefficient are the most frequently used metrics to compute the node centrality. Their computational complexity in some cases makes unfeasible, when not practically impossible, their computations. For this reason, we focused on two alternative measures, WERW-Kpath and Game of Thieves, which are at the same time highly descriptive and computationally affordable. Our experiments show that a strong correlation exists between WERW-Kpath and Game of Thieves and the classical centrality measures. This may suggest the po…
Game of Thieves and WERW-Kpath: Two Novel Measures of Node and Edge Centrality for Mafia Networks
2021
Real-world complex systems can be modeled as homogeneous or heterogeneous graphs composed by nodes connected by edges. The importance of nodes and edges is formally described by a set of measures called centralities which are typically studied for graphs of small size. The proliferation of digital collection of data has led to huge graphs with billions of nodes and edges. For this reason, we focus on two new algorithms, Game of Thieves and WERW-Kpath which are computationally-light alternatives to the canonical centrality measures such as degree, node and edge betweenness, closeness and clustering. We explore the correlation among these measures using the Spearman’s correlation coefficient …
Lévy flights in confining potentials.
2009
We analyze confining mechanisms for L\'{e}vy flights. When they evolve in suitable external potentials their variance may exist and show signatures of a superdiffusive transport. Two classes of stochastic jump - type processes are considered: those driven by Langevin equation with L\'{e}vy noise and those, named by us topological L\'{e}vy processes (occurring in systems with topological complexity like folded polymers or complex networks and generically in inhomogeneous media), whose Langevin representation is unknown and possibly nonexistent. Our major finding is that both above classes of processes stay in affinity and may share common stationary (eventually asymptotic) probability densit…
2021
In COVID-19 related infodemic, social media becomes a medium for wrongdoers to spread rumors, fake news, hoaxes, conspiracies, astroturf memes, clickbait, satire, smear campaigns, and other forms of deception. It puts a tremendous strain on society by damaging reputation, public trust, freedom of expression, journalism, justice, truth, and democracy. Therefore, it is of paramount importance to detect and contain unreliable information. Multiple techniques have been proposed to detect fake news propagation in tweets based on tweets content, propagation on the network of users, and the profile of the news generators. Generating human-like content allows deceiving content-based methods. Networ…
The contribution of human migration to tourism: The VFR travel between the EU28 member states
2017
This study explores the correlation between human migration and that part of tourism due to people visiting friends and relatives in a foreign country. We first compared the network structure of migration stocks and tourism flows between the 28 member countries of the European Union over the period 2000–2012. Then, we performed several econometric analyses to study the main tourism determinants and the correlations between migration to tourism. The paper derives from the discussion of the results an estimate of the contribution to the overall tourism phenomenon due to visiting friends and relatives. Complex network analysis and gravity models were the investigation methods preferred.
Publication Network Analysis of an Academic Family in Information Systems
2011
The study of scientific collaboration through network analysis can give interesting conclusions about the publication habits of a scientific community. Co-authorship networks represent scientific collaboration as a graph: nodes correspond to authors, edges between nodes mark joint publications (Newman 2001a,b). Scientific publishing is decentralized. Choices of co-authors and research topics are seldomly globally coordinated. Still, the structure of co-authorship networks is far from random. Co-authorship networks are governed by principles that are similar in other complex networks such as social networks (Wasserman and Faust 1994), networks of citations between scientific papers (Egghe an…
An Image Segmentation Algorithm based on Community Detection
2016
International audience; With the recent advances in complex networks, image segmentation becomes one of the most appropriate application areas. In this context, we propose in this paper a new perspective of image segmentation by applying two efficient community detection algorithms. By considering regions as communities, these methods can give an over-segmented image that has many small regions. So, the proposed algorithms are improved to automatically merge those neighboring regions agglomerative to achieve the highest modularity/stability. To produce sizable regions and detect homogeneous communities, we use the combination of a feature based on the Histogram of Oriented Gradients of the …
User and group networks on YouTube: A comparative analysis
2015
International audience; YouTube is the largest video-sharing social network where users (aka channels) can create links to any other users. Moreover, initially, users were allowed to create and join special groups of interest. Therefore, two types of online social networks can be defined. First, a user network where the nodes represent the users and the edges represent the social ties (friendship) between users. Second, a group network where the nodes represent the groups and the edges represent the social ties between groups, due to shared users. As the group network can be apprehended as the ground-truth overlapping community graph (where the nodes are the discovered communities and the l…