Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

Multi-index evaluation algorithm based on principal component analysis for node importance in complex networks

Multi-index evaluation algorithm based on principal component analysis for node importance in complex networks

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Networks — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

The evaluation of vital nodes in complex networks has been an increasing widespread concern in recent years. Seeking and protecting vital nodes is important to ensure the security and stability of the whole network. Presently, most of the existing evaluation algorithms cannot completely reflect the circumstances of complex networks because these algorithms are proposed based on a certain characteristic of the network, and the single metric is incomplete and limited. With that said, the development of a new algorithm that evaluates node importance in complex networks is critical. First, a number of classic ranking measures for evaluating vital nodes have been demonstrated in the present study. Second, basic concepts of complex networks have been summarised further. Third, a new multi-index evaluation algorithm based on principal component analysis has been proposed. The algorithm can reveal the simple structure behind the complex data, and has no parameter restrictions to represent the features of the data. The algorithm presented in the current study synthesises the topological characteristics of the network, such as degree centrality, betweenness centrality, closeness centrality, eigenvector centrality, mutual-information and local clustering coefficient to reflect the relative node importance. Finally, to verify the validity of the algorithm, a simulation experiment was conducted. The results indicated that the algorithm is more rational, effective, complete and accurate than the algorithm of single metric evaluation.

References

    1. 1)
    2. 2)
    3. 3)
      • X.F. Wang , X. Li , G.R. Chen . (2006) The complex network theory and its application.
    4. 4)
    5. 5)
      • Zhang, Y., Liu, Y.H.: `Modeling of scale-free network based on PageRank algorithm', The 2010 Int. Conf. on Future Computer and Communication, May 2010, Wuhan, China, p. 778–782.
    6. 6)
    7. 7)
    8. 8)
      • Ozgonenel, O., Yalcin, T.: `Principal component analysis (PCA) based neural network for motor protection', 10thIET Int. Conf. on Developments in Power System Protection (DPSP 2010), Managing the Change, March 2010, Manchester, England, p. 1–5.
    9. 9)
    10. 10)
    11. 11)
      • B. Scholkopf , A. Smola . (2002) Learning with kernel: support vector machines, regularization, optimization and beyond.
    12. 12)
      • H. Nan , G. Wenyan , L. Deyi . Evaluate nodes importance in the network using data field. Theory Convergence Inf. Technol. , 1225 - 1234
    13. 13)
      • K. Zhang , G.X. Tan , K.C. Zhuang , R.S. Zhao . Research review on invulnerability measure of complex network. Comput. Era , 4 - 7
    14. 14)
      • R.S. Burt , M.J. Minor . (1983) Applied network analysis.
    15. 15)
    16. 16)
      • Y. Chen , A.Q. Hu , J. Hu . A method for finding the most vital node in communication networks. High Technol. Lett. , 573 - 575
    17. 17)
    18. 18)
    19. 19)
    20. 20)
    21. 21)
    22. 22)
    23. 23)
      • S. Narayanan . (2005) The betweenness centrality of biological networks.
    24. 24)
    25. 25)
      • D.B. West . (1996) Introduction to graph theory.
    26. 26)
      • Jun, H., Wang, B., Lee, D.: `Evaluating node importance with multi-criteria', Proc. IEEE/ACM Int. Conf. on Green Computing and Communications and IEEE/ACM Int. Conf. on Cyber, Physical and Social Computing, 2010, p. 792–797.
    27. 27)
      • Q. Wu , H.N. Cai , L.F. Huang . Feature-level fusion fault diagnosis based on PCA. Comput. Sci. , 268 - 270
    28. 28)
      • Y. Zhang , Y.H. Liu , K.H. Xu , Z.R. Luo . Evaluation method for node importance based on mutual information in complex networks. Comput. Sci. , 88 - 109
    29. 29)
    30. 30)
      • S. Wasserman , K. Faust . (1994) Social network analysis: methods and applications.
    31. 31)
    32. 32)
    33. 33)
    34. 34)
    35. 35)
      • J. Scott . (2000) Social network analysis: a handbook.
    36. 36)
      • http://en.wikipedia.org/wiki/Centrality, accessed August 2011.
    37. 37)
      • N. He , D.Y. Li , W.Y. Gan , X. Zhu . Mining vital nodes in complex networks. Comput. Sci. , 1 - 6
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-net.2011.0013
Loading

Related content

content/journals/10.1049/iet-net.2011.0013
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address