The present study aimed at finding the least significant edges based on the target set selection. Selecting a target set
consists of a subset of influential and effector nodes in an active social subnet to maximize the influence on the entire nodes of a
network. The best heuristic algorithm only ensures that all nodes of a network can be influenced with a maximum of 63% of the target
set selection. The concepts of vertex cover were used to find the active and influential nodes. The edges between the active or effector
nodes were considered as significant edges while the other edges were considered as least significant. The experiment performed on
four laboratory data and a real data showed that the proposed algorithm was more optimized.
Sadegh Saeedi : MSc student of computer
engineering Department of Computer Engineering, Ahvaz
Branch, Islamic Azad University, Iran.
Dr. Mohammad Hossein Yektaei : Ph.D.
Assistant Professor, Department of Computer Engineering,
Abadan Branch, Islamic Azad University, Iran.
Social network, least significant edges, Dragonfly Algorithm, target set selection
Today networks are widespread everywhere Spread
of the networks in the world, It forces us to study
them, Their study is based on the method of creating
nodes and their relationship in the form of a model.
The purpose of this article is to find least-significant
edges.the least-significant edges will be obtained
from significant-edges.
[1] Mirjalili, S." Dragon fly algorithm: a new metaheuristic
optimization technique for solving singleobjective,
discrete,and multi-objective problems",
Neural computation &Application ,27:1053:1073
,2015.
[2] Cheng Wang, Lili Deng, Gengui Zhou, Meixian Jiang "
A global optimization algorithm for target set selection
problems", Information Sciences: An International
Journal: Volume 267, May, Elsevier Science Inc 2014
[3] Lapps T.,Terzi E.," Finding Effectors in social
Networks",ACM,25-28, ,2010.
[4] R. Axelrod, The dissemination of culture: "a model
with local convergence and global polarization", The
Journal of Conflict Resolution 41 (2) (1997) 203-226
[5] F. Buccafurri, V.D. Foti, G. Lax, A. Nocera, D. Ursino,
"Bridge analysis in a social internetworking scenario",
Information Sciences 224 (2013) 1-18.
[6] R. Cowan, J. Miller, "Technological standards with
local externalities and decentralized"
[7] P. Domingo's, M. Richardson, "Mining the network
value of customers", in: Proceedings of the seventh
ACM SIGKDD international conference on
Knowledge discovery and data mining, ACM, 502525,
2001, pp. 57-66.
[8] E. Gilbert," Random graphs ", The Annals of
Mathematical Statistics 30 (1959) 1141-1144.
[9] M. Granovetter , "Threshold models of collective
behavior", American Journal of Sociology 83 (6)
(1978) 1420-1443.
[10] D. Kempe , J. Kleinberg, E. Tardos, "Maximizing the
spread of influence through a social network",
Proceedings of the Ninth ACM SIGKDD International
Conference on Knowledge Discovery and Data
Mining, vol. 956769, ACM, 2003, pp. 137-146.
[11] D. Kempe, J. Kleinberg, E. Tardos, "Influential nodes
in a diffusion model for social networks", in: L. Caires,
G. Italiano, L. Monteiro, C. Palamidessi, M. Yung
(Eds.), Automata, Languages and Programming,
Lecture Notes in Computer Science, vol. 3580,
Springer, Berlin, 2005, pp. 1127-1138.
[12] J. Kleinberg, "Cascading behavior in networks:
algorithmic and economic issues ", in: N. Nisan, T.
Rough garden, E. Tardos, V.V. Vazirani (Eds.),
"Algorithmic Game Theory", Cambridge University
Press, New York, 2007, pp. 613-632.
[13] J. Leskovec, A. Krause, C. Guestrin, C. Faloutsos, J.
VanBriesen, N. Glance, "Cost-effective outbreak
detection in networks", Proceedings of the 13th ACM
SIGKDD International Conference on Knowledge
Discovery and Data Mining, vol. 1281239, ACM,
2007, pp. 420-429.
[14] R. Narayanam, Y. Narahari, "A shapley value-based
approach to discover influential nodes in social
networks", IEEE Transactions on Automation Science
and Engineering 8 (1) (2011) 130-147.
[15] E. Ravasz, A. Barabási, "Hierarchical organization in
complex networks", Physical Review E 67 (2) (2003)
026112.
[16] T. Schelling, "Micro motives and Macro behavior",
Norton, 1978.
[17] S. Strogatz, "Exploring complex networks", Nature
410 (8) (2001) 268-276.
[18] D. Watts, S. Strogatz, Collective dynamics of' 'smallworld''
networks, Nature 393 (4) (1998) 440-442.
[19] S.J. Yu, "The dynamic competitive recommendation
algorithm in social network services", Information
Sciences 187 (2012) 1-14.