Implementation of Computing Node Centrality with Bridge and Community Detection
DOI:
https://doi.org/10.47611/jsrhs.v11i3.2703Keywords:
Graph Theory, Nodes, Bridges, KatzAbstract
As our society grows, the potential of certain people affecting the masses has increased dramatically with the presence of media, virality, and celebrities. Therefore, it is essential to know which persons might be influencing, swaying, or manipulating the public the most in a social network. Similarly, finding the most important webpage can impact advertisement spending for corporations. I propose and determine a better method to find the most significant "influencer" and other real-world applications using graph theory in discrete mathematics. There are many methods of node centrality, and some have more advantages than others. As measuring this score becomes more complex, accuracy is guaranteed, but time complexity increases simultaneously. In particular, when the score is a case where the relationship between nodes is important, the time complexity shows an extreme increase. Graphs representing the real world have a lot of nodes and edges in many cases, and experiments have found that if applied as they are, the time efficiency will be extremely low. To compensate for this point, bridge detection and community detection, a method of dividing a large graph into several subgraphs at a low level, were applied to change the nested loop operation to a simple sum of operations in series. Furthermore, a model, which is the most appropriate combination, was proposed and experimentally proved in consideration of trade-offs. The reason for selecting the ratio of node and edge numbers to increase the experiment's credibility was also described.
Downloads
References or Bibliography
Zhao, X., Guo, S., & Wang, Y. (2017, July). The node influence analysis in social networks based on structural holes and degree centrality. In 2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC) (Vol. 1, pp. 708-711). IEEE.
Lv, L., Zhang, K., Zhang, T., Bardou, D., Zhang, J., & Cai, Y. (2019). PageRank centrality for temporal networks. Physics Letters A, 383(12), 1215–1222. https://doi.org/10.1016/j.physleta.2019.01.041
Cohen, E., Delling, D., Pajor, T., & Werneck, R. F. (2014). Computing classic closeness centrality, at scale. in Proceedings of the Second ACM Conference on Online Social Networks, ser. COSN '14. ACM, 37-50.
Freeman, L. C. (1977). A Set of Measures of Centrality Based on Betweenness. Sociometry, 40(1), 35. https://doi.org/10.2307/3033543
Gao, S., Ma, J., Chen, Z., Wang, G., & Xing, C. (2014). Ranking the spreading ability of nodes in complex networks based on local structure. Physica A: Statistical Mechanics and Its Applications, 403, 130–147. https://doi.org/10.1016/j.physa.2014.02.032
Sabidussi, G. (1966). The centrality index of a graph. Psychometrika, 31(4), 581–603. https://doi.org/10.1007/bf02289527
Freeman, L. C. (1978). Centrality in social networks conceptual clarification. Social Networks, 1(3), 215–239. https://doi.org/10.1016/0378-8733(78)90021-7
Corradini, E., Nocera, A., Ursino, D., & Virgili, L. (2020). Defining and detecting k-bridges in a social network: The Yelp case, and more. Knowledge-Based Systems, 195, 105721. https://doi.org/10.1016/j.knosys.2020.105721
Ghosh, S., Halappanavar, M., Tumeo, A., Kalyanaraman, A., Lu, H., Chavarria-Miranda, D., Khan, A., & Gebremedhin, A. (2018). Distributed Louvain Algorithm for Graph Community Detection. 2018 IEEE International Parallel and Distributed Processing Symposium (IPDPS). https://doi.org/10.1109/ipdps.2018.00098
Page, L., Brin, S., Motwani, R., & Winograd, T. (1999). The PageRank Citation Ranking: Bringing Order to the Web. - Stanford InfoLab Publication Server. Stanford.edu. https://doi.org/http://ilpubs.stanford.edu:8090/422/1/1999-66.pdf
Cadini, F., Zio, E., & Petrescu, C. A. (2008, October). Using centrality measures to rank the importance of the components of a complex network infrastructure. In International Workshop on Critical Information Infrastructures Security (pp. 155-167). Springer, Berlin, Heidelberg.
Published
How to Cite
Issue
Section
Copyright (c) 2022 Leonardo Chung; Kun Young Park
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Copyright holder(s) granted JSR a perpetual, non-exclusive license to distriute & display this article.