Search results for "Complex network"

showing 10 items of 131 documents

k-Truss Decomposition for Modular Centrality

2018

There is currently much interest in identifying influential spreaders in complex networks due to many applications concerned, such as controlling the outbreak of epidemics and conducting advertisements for commercial products, and so on. A plethora of centrality measures have been proposed over the years based on the topological properties of networks. However, most of these classical centrality measures fail to select the most influential nodes in networks with a modular structure despite that it is an omnipresent property in real-world networks. Few authors have introduced centrality measures tailored to networks with community structure. In a recent work, we have shown that, in this case…

Theoretical computer scienceComputer scienceProperty (programming)business.industryNode (networking)Community structureComplex networkModular design[INFO] Computer Science [cs]01 natural sciences010305 fluids & plasmasRankingComponent (UML)0103 physical sciences[INFO]Computer Science [cs]010306 general physicsbusinessCentralityComputingMilieux_MISCELLANEOUS
researchProduct

The heterogeneity of inter-domain Internet application flows: entropic analysis and flow graph modelling

2013

The growing popularity of the Internet has triggered the proliferation of various applications, which possess diverse communication patterns and user behaviour. In this paper, the heterogeneous characteristics of Internet applications and traffic are investigated from a complex network and entropic perspective. On the basis of real-life flow data collected from a public network provided by an Internet service provider, flow graphs are constructed for five types of applications as follows: Web, P2P Download, P2P Stream, Video Stream and Instant Messaging. Three types of entropy measures are introduced to the flow graphs, and the heterogeneity of applications within a 24-h period is analysed …

Theoretical computer scienceComputer sciencebusiness.industryInter-domainTraffic identificationComplex networkcomputer.software_genreDegree distributionInternet service providerEntropy (information theory)Control flow graphThe InternetData miningElectrical and Electronic EngineeringbusinesscomputerTransactions on Emerging Telecommunications Technologies
researchProduct

Correlation Analysis of Node and Edge Centrality Measures in Artificial Complex Networks

2021

The role of an actor in a social network is identified through a set of measures called centrality. Degree centrality, betweenness centrality, closeness centrality, and clustering coefficient are the most frequently used metrics to compute the node centrality. Their computational complexity in some cases makes unfeasible, when not practically impossible, their computations. For this reason, we focused on two alternative measures, WERW-Kpath and Game of Thieves, which are at the same time highly descriptive and computationally affordable. Our experiments show that a strong correlation exists between WERW-Kpath and Game of Thieves and the classical centrality measures. This may suggest the po…

Theoretical computer scienceSettore INF/01 - InformaticaComputational complexity theorySocial networkComputer sciencebusiness.industryNode (networking)Complex networksComplex networkSocial network analysisK-pathBetweenness centralityCentrality measuresCorrelation coefficientsCentralitybusinessSocial network analysisClustering coefficient
researchProduct

Game of Thieves and WERW-Kpath: Two Novel Measures of Node and Edge Centrality for Mafia Networks

2021

Real-world complex systems can be modeled as homogeneous or heterogeneous graphs composed by nodes connected by edges. The importance of nodes and edges is formally described by a set of measures called centralities which are typically studied for graphs of small size. The proliferation of digital collection of data has led to huge graphs with billions of nodes and edges. For this reason, we focus on two new algorithms, Game of Thieves and WERW-Kpath which are computationally-light alternatives to the canonical centrality measures such as degree, node and edge betweenness, closeness and clustering. We explore the correlation among these measures using the Spearman’s correlation coefficient …

Theoretical computer scienceSettore INF/01 - InformaticaDegree (graph theory)Computer scienceClosenessComplex networksMafia networksComplex networkCorrelationComputational complexityBetweenness centralityNode (computer science)CentralityRank (graph theory)Cluster analysisCentrality
researchProduct

Lévy flights in confining potentials.

2009

We analyze confining mechanisms for L\'{e}vy flights. When they evolve in suitable external potentials their variance may exist and show signatures of a superdiffusive transport. Two classes of stochastic jump - type processes are considered: those driven by Langevin equation with L\'{e}vy noise and those, named by us topological L\'{e}vy processes (occurring in systems with topological complexity like folded polymers or complex networks and generically in inhomogeneous media), whose Langevin representation is unknown and possibly nonexistent. Our major finding is that both above classes of processes stay in affinity and may share common stationary (eventually asymptotic) probability densit…

Topological complexityStochastic ProcessesStationary distributionStatistical Mechanics (cond-mat.stat-mech)Stochastic processProbability (math.PR)FOS: Physical sciencesMathematical Physics (math-ph)Complex networkModels TheoreticalLévy processLangevin equationDiffusionClassical mechanicsLévy flightFOS: MathematicsStatistical physicsCondensed Matter - Statistical MechanicsMathematical PhysicsMathematics - ProbabilityBrownian motionMathematicsPhysical review. E, Statistical, nonlinear, and soft matter physics
researchProduct

2021

In COVID-19 related infodemic, social media becomes a medium for wrongdoers to spread rumors, fake news, hoaxes, conspiracies, astroturf memes, clickbait, satire, smear campaigns, and other forms of deception. It puts a tremendous strain on society by damaging reputation, public trust, freedom of expression, journalism, justice, truth, and democracy. Therefore, it is of paramount importance to detect and contain unreliable information. Multiple techniques have been proposed to detect fake news propagation in tweets based on tweets content, propagation on the network of users, and the profile of the news generators. Generating human-like content allows deceiving content-based methods. Networ…

User profileBoosting (machine learning)Information retrievalGeneral Computer ScienceComputer sciencebusiness.industryDeep learningmedia_common.quotation_subjectNode (networking)Feature extractionGeneral EngineeringComplex networkBinary classificationGeneral Materials ScienceArtificial intelligenceElectrical and Electronic EngineeringbusinessReputationmedia_commonIEEE Access
researchProduct

The contribution of human migration to tourism: The VFR travel between the EU28 member states

2017

This study explores the correlation between human migration and that part of tourism due to people visiting friends and relatives in a foreign country. We first compared the network structure of migration stocks and tourism flows between the 28 member countries of the European Union over the period 2000–2012. Then, we performed several econometric analyses to study the main tourism determinants and the correlations between migration to tourism. The paper derives from the discussion of the results an estimate of the contribution to the overall tourism phenomenon due to visiting friends and relatives. Complex network analysis and gravity models were the investigation methods preferred.

Visiting friends and relativesGeography Planning and DevelopmentNetwork structureTransportationGRAVITY MODELHUMAN MIGRATIONSettore SECS-P/06 - Economia ApplicataSettore SECS-S/06 -Metodi Mat. dell'Economia e d. Scienze Attuariali e Finanz.0502 economics and businessmedia_common.cataloged_instanceEconomic geographyEuropean unionComplex network analysisVFR TRAVELNature and Landscape Conservationmedia_commonTOURISMHuman migrationbusiness.industryMember states05 social sciencescomplex network analysis gravity model human migration tourism VFR travelGeographyInvestigation methodsEconomyTourism Leisure and Hospitality Management050211 marketingbusiness050212 sport leisure & tourismTourismCOMPLEX NETWORK ANALYSIS
researchProduct

Publication Network Analysis of an Academic Family in Information Systems

2011

The study of scientific collaboration through network analysis can give interesting conclusions about the publication habits of a scientific community. Co-authorship networks represent scientific collaboration as a graph: nodes correspond to authors, edges between nodes mark joint publications (Newman 2001a,b). Scientific publishing is decentralized. Choices of co-authors and research topics are seldomly globally coordinated. Still, the structure of co-authorship networks is far from random. Co-authorship networks are governed by principles that are similar in other complex networks such as social networks (Wasserman and Faust 1994), networks of citations between scientific papers (Egghe an…

World Wide WebBetweenness centralityComputer-supported cooperative workInformation systemFAUSTGraph (abstract data type)Library scienceComplex networkCentralitycomputerEvolutionary computationcomputer.programming_language
researchProduct

An Image Segmentation Algorithm based on Community Detection

2016

International audience; With the recent advances in complex networks, image segmentation becomes one of the most appropriate application areas. In this context, we propose in this paper a new perspective of image segmentation by applying two efficient community detection algorithms. By considering regions as communities, these methods can give an over-segmented image that has many small regions. So, the proposed algorithms are improved to automatically merge those neighboring regions agglomerative to achieve the highest modularity/stability. To produce sizable regions and detect homogeneous communities, we use the combination of a feature based on the Histogram of Oriented Gradients of the …

[ INFO ] Computer Science [cs]Computer scienceComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONScale-space segmentation02 engineering and technology[INFO.INFO-AI]Computer Science [cs]/Artificial Intelligence [cs.AI]Minimum spanning tree-based segmentationImage texture0202 electrical engineering electronic engineering information engineeringcommunity detection[INFO.INFO-RB]Computer Science [cs]/Robotics [cs.RO]Segmentation[INFO]Computer Science [cs][ INFO.INFO-AI ] Computer Science [cs]/Artificial Intelligence [cs.AI]modularityImage segmentationSegmentation-based object categorizationbusiness.industry[ INFO.INFO-RB ] Computer Science [cs]/Robotics [cs.RO]Pattern recognitionImage segmentationcomplex networksHistogram of oriented gradientsRegion growing020201 artificial intelligence & image processingArtificial intelligencebusiness
researchProduct

User and group networks on YouTube: A comparative analysis

2015

International audience; YouTube is the largest video-sharing social network where users (aka channels) can create links to any other users. Moreover, initially, users were allowed to create and join special groups of interest. Therefore, two types of online social networks can be defined. First, a user network where the nodes represent the users and the edges represent the social ties (friendship) between users. Second, a group network where the nodes represent the groups and the edges represent the social ties between groups, due to shared users. As the group network can be apprehended as the ground-truth overlapping community graph (where the nodes are the discovered communities and the l…

[ INFO ] Computer Science [cs]Social networkbusiness.industryComputer scienceCommunity structureComplex networkElectronic mailWorld Wide WebInterpersonal tiesEvolving networksGraph (abstract data type)Weighted network[INFO]Computer Science [cs]business
researchProduct