1
|
Cui Q, Liu F. A new technique for influence maximization on social networks using a moth-flame optimization algorithm. Heliyon 2023; 9:e22191. [PMID: 38058635 PMCID: PMC10695977 DOI: 10.1016/j.heliyon.2023.e22191] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/03/2023] [Revised: 10/26/2023] [Accepted: 11/06/2023] [Indexed: 12/08/2023] Open
Abstract
In our modern digital era, social networks have seamlessly integrated into the fabric of our daily lives. These digital platforms serve as vital channels for communication, exchanging information, and cultivating valuable connections. The propagation of information within these social networks has emerged as a central focus for numerous sectors, including politics, marketing, research, education, and finance. Diverse models have been employed to depict the dynamics of information dissemination across these networks. Nevertheless, the notion of influence holds profound significance for both businesses and individuals. Influence maximization, particularly within the context of social networks, has garnered considerable attention owing to its potential to reach and impact a broad audience. This intricate challenge is commonly referred to as the "influence maximization problem," a problem well-known for its NP-hard complexity. This paper proposes a cutting-edge technique that leverages the Moth-Flame Optimization Algorithm to enhance influence maximization. Influence maximization is an important issue in network analysis, which widely occurs in social networks. Influence can be seen as a cascading effect, where the actions of a few trigger a chain reaction, ultimately reaching a large portion of the network. Identifying these "influencers" is crucial for efficient resource allocation and information dissemination. One of the important issues in finding the maximum influence is choosing the best vertex among all the vertices in the graph. This research presents a new method to find the maximum influence in social networks based on the Moth-Flame Algorithm (MFA). The proposed method aims to find the maximum influence in the social network graph that has a good fitness degree. The algorithm can identify potential influencers. Our simulations across multiple networks have unequivocally showcased the superiority of this algorithm as the preeminent and scalable solution to the influence maximization problem. The experimental outcomes clearly delineate that the employment of the MFA (Maximal First Activation) approach effectively diminishes the execution time required to approximate the maximum influence. The proposed technique improved the accuracy and excucation time by 3.140 % and 12.2 % compared to other methods.
Collapse
Affiliation(s)
- Qi Cui
- The College of Economics and Management, Shenyang Agricultural University, Shenyang, 111000, LiaoNing, China
| | - Feng Liu
- The College of Economics and Management, Shenyang Agricultural University, Shenyang, 111000, LiaoNing, China
| |
Collapse
|
2
|
Wang S, Tan X. Finding robust influential seeds from networked systems against structural failures using a niching memetic algorithm. Appl Soft Comput 2023. [DOI: 10.1016/j.asoc.2023.110134] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 02/25/2023]
|
3
|
Wang C, Zhao J, Li L, Jiao L, Liu J, Wu K. A Multi-Transformation Evolutionary Framework for Influence Maximization in Social Networks. IEEE COMPUT INTELL M 2023. [DOI: 10.1109/mci.2022.3222050] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 01/26/2023]
|
4
|
Ma X, Gong Z, Wei G, Herrera-Viedma E. A New Consensus Model Based on Trust Interactive Weights for Intuitionistic Group Decision Making in Social Networks. IEEE TRANSACTIONS ON CYBERNETICS 2022; 52:13106-13119. [PMID: 34415844 DOI: 10.1109/tcyb.2021.3100849] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/13/2023]
Abstract
A promising feature for group decision making (GDM) lies in the study of the interaction between individuals. In conventional GDM research, experts are independent. This is reflected in the setting of preferences and weights. Nevertheless, each expert's role is played through communication, collaboration, and cooperation with other individuals. The interaction from others may affect the power of an expert as well as his/her opinion. Furthermore, it is noted that a link path with the highest degree of trust is the most efficient information transmission channel. Inspired by these findings, an optimal trust-induced consensus process is designed with the usage of intuitionistic fuzzy preference relation. The comprehensive weight of each expert is decomposed into two portions, namely: 1) the individual weights and 2) interactive weights. Three optimization models are constructed to achieve weight parameters under different decision situations, where the weight parameters are represented through a 2-order additive fuzzy measure and the Shapley value. To reflect the interaction, the Choquet integral is employed for aggregating opinions, and a novel distance measure is adopted for accomplishing a consensus index. An illustrative example and comparison are put in practice to show the effectiveness and improvements of the proposed method.
Collapse
|
5
|
Liu Y, Liu J, Wu K. Cost-Effective Competition on Social Networks: A Multi-Objective Optimization Perspective. Inf Sci (N Y) 2022. [DOI: 10.1016/j.ins.2022.11.047] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/22/2022]
|
6
|
Wang S, Tan X. A Memetic Algorithm for Determining Robust and Influential Seeds against Structural Perturbances in Competitive Networks. Inf Sci (N Y) 2022. [DOI: 10.1016/j.ins.2022.11.080] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/27/2022]
|
7
|
Wan Y, Ma A, Zhang L, Zhong Y. Multiobjective Sine Cosine Algorithm for Remote Sensing Image Spatial-Spectral Clustering. IEEE TRANSACTIONS ON CYBERNETICS 2022; 52:11172-11186. [PMID: 33872167 DOI: 10.1109/tcyb.2021.3064552] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/12/2023]
Abstract
Remote sensing image data clustering is a tough task, which involves classifying the image without any prior information. Remote sensing image clustering, in essence, belongs to a complex optimization problem, due to the high dimensionality and complexity of remote sensing imagery. Therefore, it can be easily affected by the initial values and trapped in locally optimal solutions. Meanwhile, remote sensing images contain complex and diverse spatial-spectral information, which makes them difficult to model with only a single objective function. Although evolutionary multiobjective optimization methods have been presented for the clustering task, the tradeoff between the global and local search abilities is not well adjusted in the evolutionary process. In this article, in order to address these problems, a multiobjective sine cosine algorithm for remote sensing image data spatial-spectral clustering (MOSCA_SSC) is proposed. In the proposed method, the clustering task is converted into a multiobjective optimization problem, and the Xie-Beni (XB) index and Jeffries-Matusita (Jm) distance combined with the spatial information term (SI_Jm measure) are utilized as the objective functions. In addition, for the first time, the sine cosine algorithm (SCA), which can effectively adjust the local and global search capabilities, is introduced into the framework of multiobjective clustering for continuous optimization. Furthermore, the destination solution in the SCA is automatically selected and updated from the current Pareto front through employing the knee-point-based selection approach. The benefits of the proposed method were demonstrated by clustering experiments with ten UCI datasets and four real remote sensing image datasets.
Collapse
|
8
|
Lin W, Xu L, Fang H. Finding influential edges in multilayer networks: Perspective from multilayer diffusion model. CHAOS (WOODBURY, N.Y.) 2022; 32:103131. [PMID: 36319287 DOI: 10.1063/5.0111151] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 07/18/2022] [Accepted: 09/27/2022] [Indexed: 06/16/2023]
Abstract
With the popularization of social network analysis, information diffusion models have a wide range of applications, such as viral marketing, publishing predictions, and social recommendations. The emergence of multiplex social networks has greatly enriched our daily life; meanwhile, identifying influential edges remains a significant challenge. The key problem lies that the edges of the same nodes are heterogeneous at different layers of the network. To solve this problem, we first develop a general information diffusion model based on the adjacency tensor for the multiplex network and show that the n-mode singular value can control the level of information diffusion. Then, to explain the suppression of information diffusion through edge deletion, efficient edge eigenvector centrality is proposed to identify the influence of heterogeneous edges. The numerical results from synthetic networks and real-world multiplex networks show that the proposed strategy outperforms some existing edge centrality measures. We devise an experimental strategy to demonstrate that influential heterogeneous edges can be successfully identified by considering the network layer centrality, and the deletion of top edges can significantly reduce the diffusion range of information across multiplex networks.
Collapse
Affiliation(s)
- Wei Lin
- College of Computer and Cyber Security, Fujian Normal University, Fuzhou 350117, Fujian, China
| | - Li Xu
- College of Computer and Cyber Security, Fujian Normal University, Fuzhou 350117, Fujian, China
| | - He Fang
- School of Electronic and Information Engineering, Soochow University, Soochow 215301, Jiangsu, China
| |
Collapse
|
9
|
Lu Z, Zhou Y, Hao JK. A Hybrid Evolutionary Algorithm for the Clique Partitioning Problem. IEEE TRANSACTIONS ON CYBERNETICS 2022; 52:9391-9403. [PMID: 33635807 DOI: 10.1109/tcyb.2021.3051243] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/12/2023]
Abstract
The clique partitioning problem (CPP) of an edge-weighted complete graph is to partition the vertex set V into k disjoint subsets such that the sum of the edge weights within all cliques induced by the subsets is as large as possible. The problem has a number of practical applications in areas, such as data mining, engineering, and bioinformatics, and is, however, computationally challenging. To solve this NP-hard problem, we propose the first evolutionary algorithm that combines a dedicated merge-divide crossover operator to generate offspring solutions and an effective simulated annealing-based local optimization procedure to find high-quality local optima. The extensive experiments on three sets of 94 benchmark instances (including two sets of 63 classical benchmark instances and one new set of 31 large benchmark) show a remarkable performance of the proposed approach compared to the state-of-the-art methods. We analyze the key algorithmic ingredients to shed light on their impacts on the performance of the algorithm. The algorithm and its available source code can benefit people working on practical problems related to CPP.
Collapse
|
10
|
Wang S, Tan X. Solving the robust influence maximization problem on multi-layer networks via a Memetic algorithm. Appl Soft Comput 2022. [DOI: 10.1016/j.asoc.2022.108750] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/13/2022]
|
11
|
Wang S, Tan X. Determining seeds with robust influential ability from multi-layer networks: A multi-factorial evolutionary approach. Knowl Based Syst 2022. [DOI: 10.1016/j.knosys.2022.108697] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
|
12
|
Hong W, Qian C, Tang K. Efficient Minimum Cost Seed Selection With Theoretical Guarantees for Competitive Influence Maximization. IEEE TRANSACTIONS ON CYBERNETICS 2021; 51:6091-6104. [PMID: 32031962 DOI: 10.1109/tcyb.2020.2966593] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/10/2023]
Abstract
Minimum cost seed selection for competitive influence maximization, which selects a set of key users (called seed set) to spread its influence widely into the network at a minimum cost in a competitive social network, is a key algorithmic problem in social influence analysis. Due to its application potential in multiple fields, such as market expansion, election campaigns, and cultural competition, numerous studies have been emerging recently. Despite these efforts, this problem has not been satisfactorily solved since not only finding a (nearly) optimal solution for cost minimization but also evaluating a seed set is computationally complex. Existing works either trade approximation guarantees for practical efficiency using heuristics, or vice versa due to costly Monte Carlo simulations. In this article, a competitive reverse influence estimation-based greedy (CRIEG) algorithm, which provides bounded approximation guarantees, but offers significantly improved empirical efficiency under the competitive independent cascade model, is proposed. The core of the algorithm is a novel estimation method that improves the efficiency by constructing representative sketches to avoid heavy repeated simulations without compromising its performance guarantees. The experimental results on eight real-world networks with up to 1.13 million users show that compared with state-of-the-art algorithms, our algorithm is the most efficient while keeping the best performance, and can be orders of magnitude faster.
Collapse
|
13
|
Ma L, Li J, Lin Q, Gong M, Coello Coello CA, Ming Z. Cost-Aware Robust Control of Signed Networks by Using a Memetic Algorithm. IEEE TRANSACTIONS ON CYBERNETICS 2020; 50:4430-4443. [PMID: 31581105 DOI: 10.1109/tcyb.2019.2932996] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/10/2023]
Abstract
The robust controllability (RC) of a complex system tries to select a set of dominating entities for the functional control of this entire system without uncertain disturbances, and the research on RC will help to understand the system's underlying functions. In this article, we introduce the control cost in signed networks and present a cost-aware robust control (CRC) problem in this scenario. The aim of CRC is to minimize the cost to control a set of dominating nodes and transform a set of unbalanced links into balanced ones, such that the signed network can be robustly controlled without uncertain unbalanced factors (like nodes and links). To solve this problem, we first model CRC as a constrained combination optimization problem, and then present a memetic algorithm with some problem-specific knowledge (like the neighbors of nodes, the constraints of CRC, and the fast computation of the cost under each optimization) to solve this problem on signed networks. The extensive experiments on both real social and biological networks assess that our algorithm outperforms several state-of-the-art RC algorithms.
Collapse
|