Finding the Least Significant Edges in the Active Subnets of a Social Network by Dragonfly Algorithm  
  Authors : Sadegh Saeedi; Mohammad Hussein Yektaei

 

The present study aimed at finding the least significant edges based on the target set selection. Selecting a target set consists of a subset of influential and effector nodes in an active social subnet to maximize the influence on the entire nodes of a network. The best heuristic algorithm only ensures that all nodes of a network can be influenced with a maximum of 63% of the target set selection. The concepts of vertex cover were used to find the active and influential nodes. The edges between the active or effector nodes were considered as significant edges while the other edges were considered as least significant. The experiment performed on four laboratory data and a real data showed that the proposed algorithm was more optimized.

 

Published In : IJCAT Journal Volume 6, Issue 1

Date of Publication : January 2019

Pages : 01-07

Figures :07

Tables :06

Publication Link :Finding the Least Significant Edges in the Active Subnets of a Social Network by Dragonfly Algorithm

 

 

 

Sadegh Saeedi : MSc student of computer engineering Department of Computer Engineering, Ahvaz Branch, Islamic Azad University, Iran.

Dr. Mohammad Hossein Yektaei : Ph.D. Assistant Professor, Department of Computer Engineering, Abadan Branch, Islamic Azad University, Iran.

 

 

 

 

 

 

 

Social network, least significant edges, Dragonfly Algorithm, target set selection

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Today networks are widespread everywhere Spread of the networks in the world, It forces us to study them, Their study is based on the method of creating nodes and their relationship in the form of a model. The purpose of this article is to find least-significant edges.the least-significant edges will be obtained from significant-edges.

 

 

 

 

 

 

 

 

 

[1] Mirjalili, S." Dragon fly algorithm: a new metaheuristic optimization technique for solving singleobjective, discrete,and multi-objective problems", Neural computation &Application ,27:1053:1073 ,2015. [2] Cheng Wang, Lili Deng, Gengui Zhou, Meixian Jiang " A global optimization algorithm for target set selection problems", Information Sciences: An International Journal: Volume 267, May, Elsevier Science Inc 2014 [3] Lapps T.,Terzi E.," Finding Effectors in social Networks",ACM,25-28, ,2010. [4] R. Axelrod, The dissemination of culture: "a model with local convergence and global polarization", The Journal of Conflict Resolution 41 (2) (1997) 203-226 [5] F. Buccafurri, V.D. Foti, G. Lax, A. Nocera, D. Ursino, "Bridge analysis in a social internetworking scenario", Information Sciences 224 (2013) 1-18. [6] R. Cowan, J. Miller, "Technological standards with local externalities and decentralized" [7] P. Domingo's, M. Richardson, "Mining the network value of customers", in: Proceedings of the seventh ACM SIGKDD international conference on Knowledge discovery and data mining, ACM, 502525, 2001, pp. 57-66. [8] E. Gilbert," Random graphs ", The Annals of Mathematical Statistics 30 (1959) 1141-1144. [9] M. Granovetter , "Threshold models of collective behavior", American Journal of Sociology 83 (6) (1978) 1420-1443. [10] D. Kempe , J. Kleinberg, E. Tardos, "Maximizing the spread of influence through a social network", Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, vol. 956769, ACM, 2003, pp. 137-146. [11] D. Kempe, J. Kleinberg, E. Tardos, "Influential nodes in a diffusion model for social networks", in: L. Caires, G. Italiano, L. Monteiro, C. Palamidessi, M. Yung (Eds.), Automata, Languages and Programming, Lecture Notes in Computer Science, vol. 3580, Springer, Berlin, 2005, pp. 1127-1138. [12] J. Kleinberg, "Cascading behavior in networks: algorithmic and economic issues ", in: N. Nisan, T. Rough garden, E. Tardos, V.V. Vazirani (Eds.), "Algorithmic Game Theory", Cambridge University Press, New York, 2007, pp. 613-632. [13] J. Leskovec, A. Krause, C. Guestrin, C. Faloutsos, J. VanBriesen, N. Glance, "Cost-effective outbreak detection in networks", Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, vol. 1281239, ACM, 2007, pp. 420-429. [14] R. Narayanam, Y. Narahari, "A shapley value-based approach to discover influential nodes in social networks", IEEE Transactions on Automation Science and Engineering 8 (1) (2011) 130-147. [15] E. Ravasz, A. Barabási, "Hierarchical organization in complex networks", Physical Review E 67 (2) (2003) 026112. [16] T. Schelling, "Micro motives and Macro behavior", Norton, 1978. [17] S. Strogatz, "Exploring complex networks", Nature 410 (8) (2001) 268-276. [18] D. Watts, S. Strogatz, Collective dynamics of' 'smallworld'' networks, Nature 393 (4) (1998) 440-442. [19] S.J. Yu, "The dynamic competitive recommendation algorithm in social network services", Information Sciences 187 (2012) 1-14.