CN109728955A - Based on the network node sort method for improving k-shell - Google Patents

Based on the network node sort method for improving k-shell Download PDF

Info

Publication number
CN109728955A
CN109728955A CN201910007600.3A CN201910007600A CN109728955A CN 109728955 A CN109728955 A CN 109728955A CN 201910007600 A CN201910007600 A CN 201910007600A CN 109728955 A CN109728955 A CN 109728955A
Authority
CN
China
Prior art keywords
node
network
shell
entropy
degree
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910007600.3A
Other languages
Chinese (zh)
Inventor
李万春
王敏
许宸章
郭昱宁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Electronic Science and Technology of China
Original Assignee
University of Electronic Science and Technology of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Electronic Science and Technology of China filed Critical University of Electronic Science and Technology of China
Priority to CN201910007600.3A priority Critical patent/CN109728955A/en
Publication of CN109728955A publication Critical patent/CN109728955A/en
Pending legal-status Critical Current

Links

Abstract

The invention belongs to complex network technical fields, are related to a kind of based on the network node sort method for improving k-shell.In the case where given network adjacent matrix, the present invention is based on the key node recognition methods that k-shell and node entropy propose a kind of optimization.This method considers the propagation effect of the neighbor node of network, and identical two nodes of former k core value can also distinguish significance level.The higher core value the more important between different stratum nucleares, passes through the significance level for considering neighbor node to it between identical stratum nucleare, and the bigger node of node entropy is more important.This method computation complexity is identical as k-shell, therefore can be adapted for catenet.The experimental results showed that this method performance in the node importance evaluation to live network USAir (US Airways network) is more preferable than degree centrality (DC), betweenness center (BC), degree of approach centrality (CC), method of the invention can efficiently identify out key node, algorithm is simple, works well.

Description

Based on the network node sort method for improving k-shell
Technical field
The invention belongs to complex network technical fields, are related to a kind of based on the network node sort method for improving k-shell.
Background technique
In complex network key node identification be always an important subject, fight crime, information propagate etc. Aspect has important application, therefore we need to find a kind of sort method of key node.For the sequence of nodes Strategy, there are many methods at present.Based on local attribute's degree of having and degree centrality, had in betweenness and the degree of approach based on global property Disposition, the method based on network site attribute have k- core method, degree of mixing decomposition method, and the method based on random walk attribute has PageRank, LeaderRank, HITS method etc..The k- core (k-shell) that wherein Kitsak is proposed is a kind of simple and effective Method, this method peel off the node of outer layer layer by layer, the influence power with higher of the node in internal layer.Detailed process are as follows: If there is 1 degree of vertex in network, node and its even side removal these degree for 1, if still there is 1 degree of node in network, Again by these 1 degree of knot-removal, this process is repeated until not having 1 degree of node in network.At this point, all nodes being stripped are called 1-shell.Then the node that searching degree is 2, the knot removal for being 2 remaining node degree continue if there are also degree for 2 node It deletes, until there is no 2 degree of nodes in network.The node of this process removal is 2-shell.As procedure described above, continue to remove Node, obtains 3-shell, and 4-shell ... has the k-shell layer of oneself until nodes all in network.K-shell is decomposed Method computation complexity is low, however the method has many limitations:
(1) it can not be applied in many networks, such as binary tree, star network;
(2) node importance with identical nucleus number cannot be distinguished, because network node is divided into k layers by this method, often One node layer k nucleus number is identical.Since k-shell index is without providing enough node topographical location information, so it is assumed that institute There is the extended capability all having the same of the node with identical k-shell, research shows that this is inaccurate;
(3) this method thinks that key node is located at highest stratum nucleare, and actually outer node layer is it could also be possible that key node. Although such as in Fig. 2 interior joint 23 in 3-shell, it is the only way which must be passed towards other 10 nodes, using original K-shell method can only identify that the node 1,2,3,4 in 1-shell is key node, cannot select node 23.
It for above disadvantage, needs to improve former k-shell method, comprehensively considering position and neighbor node influences The factors such as power, the importance of different nodes can be assessed by finding a kind of improved k-shell method.
Summary of the invention
Present invention aims at the deficiency for improving existing k-shell sort method, provide it is a kind of decomposed using k-shell and The key node sort method of information of neighbor nodes, referred to as IKS method.It, can be than original k- by improved IKS method Shell decomposition method is more accurate and efficient.
Provided technical solution comprises the following steps the present invention to solve above-mentioned technical problem.
Assuming that figure G=(V, E) is a undirected and unweighted network, including n node and m side, V={ v1,v2,…… vnRepresent node set, E={ e1,e2,……emRepresent line set.According to whether having Bian Xianglian, the adjoining of network G between node Matrix A can indicate are as follows: A=[aij]n×n, wherein
Node viDegree be expressed as ki, it is defined as and node viThe number for the neighbor node being connected directly, is expressed mathematically as
In order to distinguish the importance of identical k core value node, the first concept of definition node entropy, by the sparse adjoining of network Matrix A obtains the degree k of each nodeiAnd relative Link Importance Ii, whereinN is the number of nodes of network.Then net The node entropy of network is defined asWherein j ∈ Γ (i) indicates node viNeighbor node collection.The calculating of above formula Having measured surroundings nodes from the angle of the unordered degree of network is to keep propagating and the energy time of investment with the information of node.
The step of IKS method, is as follows:
1, the degree k of each node is calculated by the sparse adjacency matrix A of networkiAnd relative Link Importance Ii
2, the node entropy of network is calculatedIt is what the node provided that node entropy, which characterizes neighbor node, Transmission capacity.
3, the decomposition level of each node of network is obtained according to k-shell method.
4, since top (highest shell), the maximum node of this level interior joint entropy is chosen as first Key node, then choose time high-rise maximum node of interior joint entropy as second key node ... and repeat this process until choosing To the maximum node of 1-shell level interior joint entropy.At this point, first round iteration terminates.
5, the second wheel iteration is successively chosen, according to the process of the 4th step until 1-shell level.If in a certain level It is available without node, then it skips.IKS method process terminates until nodes all in network have all selected.
Improved IKS method is on the basis of former k-shell, in conjunction with the concept of node entropy, takes node in each layer choosing The big point of entropy is as key node.Node entropy considers the influence of neighbor node, and the information relative to only consideration node itself is more Add sufficiently.The key node that IKS method is selected can make propagation information more dispersed, to assess calculation side than the Kitsak k proposed Method is more acurrate.This method is not only able to the importance of correct evaluation node in a network, can also be transmission of pathogen, community network Important node is found in equal networks.
Beneficial effects of the present invention:
In the case where given network adjacent matrix, the present invention is based on the passes that k-shell and node entropy propose a kind of optimization Key node recognition methods.This method considers the propagation effect of the neighbor node of network, identical two nodes of former k core value Significance level can be distinguished.The higher core value the more important between different stratum nucleares, by considering neighbor node pair between identical stratum nucleare Its significance level, the bigger node of node entropy are more important.This method computation complexity is identical as k-shell, therefore can be applicable in In catenet.The experimental results showed that this method is evaluated in the node importance to live network USAir (US Airways network) More preferably than degree centrality (DC), betweenness center (BC), degree of approach centrality (CC), method of the invention can be effective for middle performance Ground identifies key node, and algorithm is simple, works well.
Detailed description of the invention
Fig. 1 is flow chart of the invention;
Fig. 2 is that IKS method calculates schematic diagram;
Fig. 3 is two methods schematic illustration, and (a) is k-shell method, (b) is IKS method;
Fig. 4 is USAir network topology structure;
Fig. 5 is the SIR emulation of infection rate at any time on USAir network;
Fig. 6 is that infection rate is emulated with the SIR of primary infection node on USAir network.
Specific embodiment
The present invention will be described in detail with simulated example with reference to the accompanying drawing, so that those skilled in the art can be more Understand the present invention well.
The present invention is based on key node sort method IKS in the complex network of the optimization of k-shell and node entropy include with Lower step:
Input: the adjacency matrix A=[a of networkij]n×n, whereinAccording to The topological structure of Fig. 2 exemplary network obtains the adjacency matrix of the network are as follows:
Step 1: according to the definition of network moderateThe degree for obtaining node is
K=[5 844422411111131211111812 1];
Step 2: the degree as obtained in step 1 calculates the relative Link Importance I of each nodei, whereinN is net The number of nodes of network;
Step 3: calculating the node entropy of networkWherein j ∈ Γ (i) indicates node viNeighbor node Collection.
Calculated result is shown in Table 1;
Step 4: 1 degree of node gradually being removed by k-shell method, 2 degree of nodes obtain 3 stratum nucleares of Fig. 2 network, each Level has marked in Fig. 2;
Step 5: node selection strategy: it is maximum in the node entropy of 3-shell interior joint 2, therefore node 2 is chosen first, in 2- It is node 5 that it is maximum that node entropy is chosen in shell, node 23 is chosen in 1-shell, then first round iterative process terminates.
Table 1k core and node entropy calculated result
Step 6: according to step 5, successively iteration chooses remaining node.Second wheel iteration, chooses node 1 in 3-shell, Node 8 is chosen in 2-shell, and node 17 is chosen in 1-shell.Then the second wheel iteration terminates.This process is repeated, if should Stratum nucleare node has all been chosen, then skips the stratum nucleare.The key node ranking results that last Fig. 2 network obtains be 2,5,23, 1,8,17,4,6,11,3,7,12,16,18,19,20,21,22,15,25,9,10,26,13,14,24}。
From fig. 2 it can be seen that if all nodes only have 3 kinds of different weights in network with the method for original k-shell The property wanted, and this far from meets the requirements.After improving k-shell method, all nodes all have different weights The property wanted meets our requirement.In addition, can see from result, preceding 4 key nodes that IKS is obtained are 2,5,23,1 distributions Relatively disperse, avoid the overlapping of propagation effect, propagation effect can be made to maximize.
The ranking results and conventional method degree centrality (DC), degree of approach centrality (CC), betweenness that this patent method obtains The ranking results that centrality (BC), k-shell method obtain make comparisons and (take preceding 10 nodes), as a result as shown in the table.
The ranking results of 2 five kinds of methods of table
By comparing to network node top ten list ranking results in table 2, discovery ranking has little bit different, main cause It is every kind of Method And Principle difference.Improved k-shell method main purpose is to avoid the overlapping of propagation effect herein, expands shadow It rings, schematic diagram is as shown in Figure 3.Assuming that using first four node in Fig. 2 exemplary network as key node, grayed-out nodes in Fig. 3 It indicates key node (as the source of infection in SIR), propagation effect ability of the red circle as infection node, left figure k- Propagation effect of the shell method interior joint 1,2,3,4 as key node, right figure are 2,5,23,1 conduct of IKS method interior joint The propagation effect of key node, the node in red area are infected.It can be seen that the infection section that k-shell method is newly-increased Point is 5,6,7,8, and IKS newly-increased infection node is 3,4,6,16,17,18,19,20,22.Therefore IKS infection node is more, sense Dye source relative distribution can be to avoid the overlapping of transmission capacity.
In addition, verifying on live network USAir to the method for the present invention, and mould is carried out using SIR Epidemic Model Quasi- analysis.USAir network is US Airways network, and topological structure is shown in Fig. 4, shares 332 airports as network node, airport it Between 2461 flight routes as side, obtain corresponding adjacency matrix.Before being obtained using ranking results 2% node as infection Source draws infection rate versus time curve such as Fig. 5 on network.Change primary infection number of nodes, propagates sense when stablizing Dye rate is as shown in Figure 6 with the change curve of primary infection node.It can be seen that, methods herein is when each from the above figure It carves, finally the infection rate at stable moment is above other methods, it was demonstrated that effectiveness of the invention.

Claims (1)

1. based on the network node sort method for improving k-shell, definition figure G=(V, E) is a undirected and unweighted network, wherein Including n node and m side, V={ v1,v2,……vnRepresent node set, E={ e1,e2,……emRepresent line set;Root According to whether there is Bian Xianglian between node, the adjacency matrix A of network G is indicated are as follows: A=[aij]n×n, wherein
Node viDegree be expressed as ki, it is defined as and node viThe number for the neighbor node being connected directly, is expressed mathematically as
Definition node entropy is used to distinguish the importance of identical k core value node: obtaining each section by the sparse adjacency matrix A of network The degree k of pointiAnd relative Link Importance Ii, whereinN is the number of nodes of network, then the node entropy of network is defined asWherein j ∈ Γ (i) indicates node viNeighbor node collection;It is characterized in that, the sort method includes Following steps:
S1, the degree k that each node is calculated by the sparse adjacency matrix A of networkiAnd relative Link Importance Ii
S2, the node entropy for calculating networkIt is the propagation that the node provides that node entropy, which characterizes neighbor node, Ability;
S3, the decomposition level of each node of network is obtained according to k-shell method;
S4, node selection: it is maximum to choose this level interior joint entropy since top for the network layer obtained according to step S3 Node as first key node, then choose time the high-rise maximum node of interior joint entropy as second key node ... This process is repeated until choosing the maximum node of 1-shell level interior joint entropy;At this point, first round iteration terminates;
S5, the second wheel iteration is carried out according to the method for step S4, remaining node is successively chosen, until 1-shell level;If certain It is available without node in one level, then it skips;The step is repeated until all nodes have all selected in network.
CN201910007600.3A 2019-01-04 2019-01-04 Based on the network node sort method for improving k-shell Pending CN109728955A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910007600.3A CN109728955A (en) 2019-01-04 2019-01-04 Based on the network node sort method for improving k-shell

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910007600.3A CN109728955A (en) 2019-01-04 2019-01-04 Based on the network node sort method for improving k-shell

Publications (1)

Publication Number Publication Date
CN109728955A true CN109728955A (en) 2019-05-07

Family

ID=66298081

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910007600.3A Pending CN109728955A (en) 2019-01-04 2019-01-04 Based on the network node sort method for improving k-shell

Country Status (1)

Country Link
CN (1) CN109728955A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111428323A (en) * 2020-04-16 2020-07-17 太原理工大学 Method for identifying group of key nodes by using generalized discount degree and k-shell in complex network
CN111934915A (en) * 2020-07-17 2020-11-13 合肥本源量子计算科技有限责任公司 Network node sequencing display method and device
CN112087488A (en) * 2020-08-03 2020-12-15 济南浪潮高新科技投资发展有限公司 Method, device, equipment and medium for determining important cloud robot nodes
CN113780436A (en) * 2021-09-15 2021-12-10 中国民航大学 Complex network key node identification method based on integration degree
CN115643179A (en) * 2022-12-23 2023-01-24 上海蜜度信息技术有限公司 Block chain node propagation influence measuring method and system, storage medium and terminal

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
AHMAD ZAREIE 等: "Influential nodes ranking in complex networks: An entropy-based approach", 《CHAOS, SOLITONS & FRACTALS》 *
韩忠明 等: "社会网络节点影响力分析研究", 《软件学报》 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111428323A (en) * 2020-04-16 2020-07-17 太原理工大学 Method for identifying group of key nodes by using generalized discount degree and k-shell in complex network
CN111428323B (en) * 2020-04-16 2023-06-23 太原理工大学 Method for identifying a group of key nodes in complex network by using generalized discount degree and k-shell
CN111934915A (en) * 2020-07-17 2020-11-13 合肥本源量子计算科技有限责任公司 Network node sequencing display method and device
CN112087488A (en) * 2020-08-03 2020-12-15 济南浪潮高新科技投资发展有限公司 Method, device, equipment and medium for determining important cloud robot nodes
CN112087488B (en) * 2020-08-03 2023-08-25 山东浪潮科学研究院有限公司 Method, device, equipment and medium for determining important cloud robot nodes
CN113780436A (en) * 2021-09-15 2021-12-10 中国民航大学 Complex network key node identification method based on integration degree
CN113780436B (en) * 2021-09-15 2024-03-05 中国民航大学 Complex network key node identification method based on comprehensive degree
CN115643179A (en) * 2022-12-23 2023-01-24 上海蜜度信息技术有限公司 Block chain node propagation influence measuring method and system, storage medium and terminal

Similar Documents

Publication Publication Date Title
CN109728955A (en) Based on the network node sort method for improving k-shell
Cohen et al. Complex networks: structure, robustness and function
CN109921939B (en) Method and system for selecting key nodes in communication network
CN105653689B (en) A kind of determination method and apparatus of user's propagation effect power
CN106951524A (en) Overlapping community discovery method based on node influence power
CN103810260B (en) Complex network community based on topological property finds method
Shang Biased edge failure in scale-free networks based on natural connectivity
CN107066709A (en) Electric power transportation network Topology Structure Design method based on multi-Agent Genetic Algorithm
Miller et al. Tradeoffs between cost and information for rendezvous and treasure hunt
Criado et al. Structural vulnerability and robustness in complex networks: Different approaches and relationships between them
Sotoodeh et al. Relative Degree Structural Hole Centrality, C RD− SH: A New Centrality Measure in Complex Networks
Miller Equivalence of several generalized percolation models on networks
Ide et al. Diffusion centrality in interconnected networks
CN105045967A (en) Group degree based sorting method and model evolution method for important nodes on complex network
CN104869044A (en) Mapping method and mapping device for virtual network
Bi et al. Efficient multiway graph partitioning method for fault section estimation in large-scale power networks
Min et al. Searching for influencers in big-data complex networks
Wang et al. A novel measure for influence nodes across complex networks based on node attraction
Fan et al. Towards the cycle structures in complex network: A new perspective
Yeh et al. Analyzing network reliability with imperfect nodes using OBDD
CN109948001B (en) Minimum community discovery method for sub-linear time distributed computing girth
Guillaume et al. A realistic model for complex networks
Li et al. Key node discovery algorithm based on multiple relationships and multiple features in social networks
CN111818043B (en) Dual-network coupling topological structure design method based on memetic algorithm
Zhang et al. Structural vulnerability analysis in complex networks based on core theory

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190507