Specific implementation mode
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention
In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is
A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art
The every other embodiment obtained without making creative work, shall fall within the protection scope of the present invention.
Fig. 1 is the flow chart of key user's recognition methods one embodiment that microblogging provided by the invention is propagated, such as Fig. 1 institutes
Show, this method includes:
S101, microblogging propagate the network architecture in, determine the node number that each node is connected.
S102, in the network architecture, execute multiple delete operation according to connecting node number sequence from less to more, every time
Delete operation is by the identical node of connecting node number from deletion in the network architecture up to remaining connecting node in the network architecture
The identical at least one destination node of number.
S103, key user's node that destination node is determined as to microblogging propagation.
Wherein, the network architecture that microblogging is propagated usually is made of several nodes, and each node is considered as a microblogging and uses
Family.Therefore, the forwarding of any one microblogging is propagated, could set up a network architecture.Specifically, can determine first
The node of microblogging and its interactive relationship with other nodes are forwarded, further can connect forwarding microblogging according to interactive relationship
Node with constitute microblogging propagation the network architecture.
Fig. 2 provides a kind of network architecture schematic diagram that microblogging is propagated, and divides as shown in Fig. 2, being obtained in a certain hot spot microblogging
During enjoying, node(That is microblog users)Between interactive relationship form the network architecture of upper figure.In the prior art, usually
It can be more in view of the resource of node C emphatically(I.e. the node with interactive relationship is more), and in the network architecture of part
Node C is given to higher importance in Central Position.And it is only being in overall network structure from node A shown in Fig. 2
The node of core position(Key user's node that i.e. microblogging is propagated, the source that often microblogging is propagated).
In the present invention, it is contemplated that the node in core position is often the source of hot spot microblogging, this node users may not
It is leader user, that is, the interactive relationship possessed may not be very much, and the position in the whole network architecture is deep, but by several
After Es-region propagations, this often obtains several leader users in the process(Node)Forwarding so that the microblogging is widely recognized.Example
Such as:The interactive relationship of Fig. 2 interior joints C is most, but has the reception number that these nodes of interactive relationship are connected with node C
But very low, therefore, multiple delete operation can be executed according to the sequence of connecting node number from less to more, such as:Connecting node
The node number that the minimum node of number is connected is 1, then can first by connecting node number be 1 node from the network architecture
Middle deletion, after the secondary delete operation, the node that script connecting node number is 2 in the network architecture, connecting node number becomes
Be 1, then delete operation can delete this part of nodes from the network architecture next time, and so on, until being remained in the network architecture
The identical at least one destination node of remaining connecting node number, such as:Only remaining connecting node number is all 2 in the network architecture
These destination nodes are then determined as key user's node of microblogging propagation by one or more destination nodes.
In order to make to determine that the process of destination node is simpler, the node that connecting node number is 1 can be determined as the 1st
Node is spent, the node that connecting node number is 2 is determined as the 2nd degree of node, and so on, connecting node number is that the node of N is true
It is set to nth degree node, N is the integer more than 1.
Then correspondingly, delete operation can be executed according to the sequence from the 1st degree of node to nth degree node, behaviour is deleted every time
Work deletes the identical node of the number of degrees from network, until the identical at least one nth degree target of the residue number of degrees in the network architecture
Node.
It is specifically described by taking Fig. 2 as an example below:The calculating thinking of method is opened from the 1st degree of minimum node in this example
Begin only row delete operation, and after first time deletes, node C only connects a node A and a node D, therefore node becomes
2nd degree of node, similar, node E becomes the 1st degree of node by the 2nd degree of node, therefore is carried out second to the 1st degree of node again
Afterwards, node D becomes the 1st degree of node by the 2nd degree of node, then carries out third time deletion to the 1st degree of node, and node C is by the 2nd at this time
Degree node becomes the 1st degree of node, then carries out the 4th deletion to the 1st degree of node, then node C disappears from this network architecture,
And so on, until there is no the 1st degree of node in the network architecture after cycle progress aforesaid operations, final remaining only the 2nd degree 4
Node A, therefore 4 node A are destination node.
In the above process in the specific implementation, the node total number in the network architecture can be denoted as N, each node assigns one
ID, ID value are from 0 to N-1.
Shaping array cores is defined, array, array size N are initialized.Initial value, method are assigned for the element of cores arrays
It is:The index meaning of this array is the ID of node, and the number of degrees that element value is node, i.e., which above-mentioned degree node.It counts
This array element maximum value is denoted as M.
Shaping array bin is defined, array, array size M+1 are initialized.The index meaning of this array is angle value, is bin
The element of array assigns initial value, and calculation process is as follows:
for int i=0to N-1
bin[cores[i]]+=1
int j=0
for int i=0to M
int k=bin[i]
bin[i]=j
j+=k
Shaping array vert and pos are defined, two arrays, array size N are initialized.The index meaning of vert arrays is
For node by the sequence of degree, the index meaning of pos arrays is the ID of node, is that the element of vert and pos arrays assigns initial value, calculates stream
Journey is as follows:
for int i=0to N-1
pos[i]=bin[cores[i]]
vert[pos[i]]=i
bin[cores[i]]+=1
for int i=M to1
bin[i]=bin[i-1]
bin[0]=0
Above step four array cores, bin, vert, pos required to algorithm have carried out tax initial value.This step is retouched
The main calculation process of this method is stated, two layers of FOR loop is mainly passed through, it, can be to cores, bin, vert, pos number every time in cycle
Group element value is adjusted, and there are in cores arrays for last marking result.Calculation process is as follows:
for int i=0to N-1
int v=vert[i]
Interim shaping array neis is defined, all neighbor node ID and number S of the node of node ID=v are counted.It is adjacent
It is the node for having side to connect with the node of ID=v to occupy node.
for int j=0to S-1
int u=neis[j]
if(cores[u]>cores[v])
int du=cores[u]
int pw=bin[du]
w=vert[pw]
if(u!=w)
int pu=pos[u]
pos[u]=pw
pos[w]=pu
vert[pu]=w
vert[pw]=u
bin[du]+=1
cores[u]-=1
Key user's recognition methods that microblogging provided in this embodiment is propagated, in the network architecture that microblogging is propagated, according to
Connecting node number sequence from less to more executes multiple delete operation, and each delete operation is by the identical section of connecting node number
Point finally will from being deleted in the network architecture up to the identical at least one destination node of remaining connecting node number in the network architecture
Destination node is determined as key user's node of microblogging propagation.To improve the accurate of key user that determining microblogging is propagated
Degree.
Fig. 3 is the structural schematic diagram of key user's identification device one embodiment that microblogging provided by the invention is propagated, such as
Shown in Fig. 3, which includes:
Determining module 11, in the network architecture that microblogging is propagated, determining the node number that each node is connected;
Removing module 12, in the network architecture, repeatedly being deleted according to the sequence execution of connecting node number from less to more
Division operation, each delete operation is by the identical node of connecting node number from deletion in the network architecture up to remaining in the network architecture
The identical at least one destination node of connecting node number;
Determining module 11 is additionally operable to:Destination node is determined as to key user's node of microblogging propagation.
Optionally, determining module 11 can be also used for:It determines the node of forwarding microblogging and its is closed with the interaction of other nodes
System;The node of forwarding microblogging is connected to constitute the network architecture of microblogging propagation according to interactive relationship.
Optionally, determining module 11 can be also used for:The node that connecting node number is 1 is determined as the 1st degree of node, even
It connects the node that node number is N and is determined as nth degree node, N is the integer more than 1.
Optionally, determining module 11 can be specifically used for:It is deleted according to the sequence execution from the 1st degree of node to nth degree node
Division operation, each delete operation delete the identical node of the number of degrees from network, until the remaining number of degrees are identical in the network architecture
At least one nth degree destination node.
Key user's identification device that microblogging provided in this embodiment is propagated, the key propagated for microblogging provided by the invention
The executive device of user identification method, the detailed process for executing method can be found in the associated description in embodiment of the method, herein
It repeats no more.
Key user's identification device that microblogging provided in this embodiment is propagated, in the network architecture that microblogging is propagated, in net
In network framework, multiple delete operation is executed according to the sequence of connecting node number from less to more, each delete operation saves connection
The identical node of point number in the network architecture from deleting until residue connecting node number is identical at least one in the network architecture
Destination node is finally determined as key user's node of microblogging propagation by destination node.It is propagated to improve determining microblogging
The accuracy of key user.
It is apparent to those skilled in the art that for convenience and simplicity of description, only with above-mentioned each function
The division progress of module, can be as needed and by above-mentioned function distribution by different function moulds for example, in practical application
Block is completed, i.e., the internal structure of device is divided into different function modules, to complete all or part of work(described above
Energy.The specific work process of the system, apparatus, and unit of foregoing description can refer to corresponding in preceding method embodiment
Journey, details are not described herein.
In several embodiments provided herein, it should be understood that disclosed system, device and method can be with
It realizes by another way.For example, the apparatus embodiments described above are merely exemplary, for example, the module or
The division of unit, only a kind of division of logic function, formula that in actual implementation, there may be another division manner, such as multiple units
Or component can be combined or can be integrated into another system, or some features can be ignored or not executed.Another point, institute
Display or the mutual coupling, direct-coupling or communication connection discussed can be by some interfaces, device or unit
INDIRECT COUPLING or communication connection can be electrical, machinery or other forms.
The unit illustrated as separating component may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, you can be located at a place, or may be distributed over multiple
In network element.Some or all of unit therein can be selected according to the actual needs to realize the mesh of this embodiment scheme
's.
In addition, each functional unit in each embodiment of the application can be integrated in a processing unit, it can also
It is that each unit physically exists alone, it can also be during two or more units be integrated in one unit.Above-mentioned integrated list
The form that hardware had both may be used in member is realized, can also be realized in the form of SFU software functional unit.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product
When, it can be stored in a computer read/write memory medium.Based on this understanding, the technical solution of the application is substantially
The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words
It embodies, which is stored in a storage medium, including some instructions are used so that a computer
Equipment(Can be personal computer, server or the network equipment etc.)Or processor(processor)It is each to execute the application
The all or part of step of embodiment the method.And storage medium above-mentioned includes:USB flash disk, mobile hard disk, read-only memory
(ROM, Read-Only Memory), random access memory(RAM, Random Access Memory), magnetic disc or CD
Etc. the various media that can store program code.
The above, above example are only to illustrate the technical solution of the application, rather than its limitations;Although with reference to before
Embodiment is stated the application is described in detail, it will be understood by those of ordinary skill in the art that:It still can be to preceding
The technical solution recorded in each embodiment is stated to modify or equivalent replacement of some of the technical features;And these
Modification or replacement, the spirit and scope of each embodiment technical solution of the application that it does not separate the essence of the corresponding technical solution.