Computer Science ›› 2018, Vol. 45 ›› Issue (11A): 308-314.

• Network & Communication • Previous Articles     Next Articles

Study of Propagation Mechanism in Networks Based on Topological Path

ZHANG Lin-zi, JIA Chuan-liang   

  1. School of Management Science and Engineering,Central University of Finance and Economics,Beijing 100081,China
  • Online:2019-02-26 Published:2019-02-26

Abstract: The existing information dissemination model of social network mainly analyzes the ways of dissemination,and combines the process of communication with the degree of nodes.However,the media is often ignored.In real-world networks,the propagation source,a physical propagation medium,usually propagates from one node to another via a specific path.This paper was no longer limited to analyze the overall behavior of nodes,but considered each node separately,and used the continuous Markov chain to simulate the influence of propagation sources and paths on propagation.By introducing a mean field approximation,the computational complexity of the path-based pro-pagation is reduced from an exponential level to a polynomial level.This paper also defined a propagation characteristic matrix containing both routing and traffic information,and derived a key propagation threshold based on path propagation.When the effective transmission rate is below the threshold,the propagation will gradually die out,so we can use this critical propagation threshold to promote or suppress path-based propagation.Finally,in addition to the stochastic scale-free network,this paper introduced the real-world network traffic as a research case to compare the connection-based and path-based propagation behaviors.The conclusions show that the model’s propagation in social networks is highly persistent and extremely stable.

Key words: Information dissemination, Markov theory, Mean field theory, Routing paths, Social networks

CLC Number: 

  • TP393
[1]We Are Social.Digital in 2016 Report[R/OL].http://wearesocial.com/special-reports/digital-in-2016,2016-01-27.
[2]中国互联网信息中心(CNNIC).第39次中国互联网络发展状况统计报告[R/OL].http://www.cnnic.cn/,2017-01-22.
[3]新浪微博数据中心.2015微博用户发展报告[R/OL].http://data.weibo.com/report/reportDetail?id=333,2016-11-10.
[4]KEPHART J O,WHITE S R.Measuring and modeling compu-ter virus prevalence[C]∥1993 IEEE Computer Society Sympo-sium on Research in Security and Privacy,1993.Proceedings.IEEE,2002:2.
[5]NIKOLOSKI Z,DEO N,KUCERA L.Correlation Model of Worm Propagation on Scale-Free Networks[J].Complexus,2006,3(1-3):169-182.
[6]COLIZZA V,VESPIGNANI A.Epidemic modeling in metapo-pulation systems with heterogeneous coupling pattern: theory and simulations[J].Journal of Theoretical Biology,2008,251(3):450-467.
[7]ONNELA J P,CHRISTAKIS N A.Spreading paths in partially observed social networks[J].Phys. Rev. E,2012,85(3 Pt 2):036106.
[8]MELONI S,ARENAS A,MORENO Y.Traffic-driven epidemic spreading in finite-size scale-free networks[J].Proceedings of the National Academy of Sciences of the United States of Ame-rica,2009,106(40):16897-16902.
[9]YANG H X,WU Z X,WANG B H.Suppressing traffic-driven epidemic spreading by edge-removal strategies[J].Physical Review E Statistical Nonlinear & Soft Matter Physics,2013,87(6):064801.
[10]XIONG F,LIU Y,ZHANG Z J,et al.An information diffusion model based on retweeting mechanism for online social media[J].Physics Letters A,2012,376(30/31):2103-2108.
[11]ZHAO L,WANG Q,CHENG J,et al.Rumor spreading model with consideration of forgetting mechanism: A case of online blogging LiveJournal[J].Physica A Statistical Mechanics & Its Applications,2011,390(13):2619-2625.
[12]PANTAZOPOULOS P,KARALIOPOULOS M,STAVRAKAKIS I.Centrality-driven scalable service migration[C]∥International Teletraffic Congress.International Teletraffic Congress,2011:127-134.
[13]MIEGHEM P V.Performance Analysis of Communications Networks and Systems[M].Cambridge University Press,2006.
[14]Rocketfuel.An ISP Topology Mapping Engine[R/OL].http://research.cs.washington.edu/networking/rocketfuel.
[1] WEI Peng, MA Yu-liang, YUAN Ye, WU An-biao. Study on Temporal Influence Maximization Driven by User Behavior [J]. Computer Science, 2022, 49(6): 119-126.
[2] CHANG Ya-wen, YANG Bo, GAO Yue-lin, HUANG Jing-yun. Modeling and Analysis of WeChat Official Account Information Dissemination Based on SEIR [J]. Computer Science, 2022, 49(4): 56-66.
[3] GUO Lei, MA Ting-huai. Friend Closeness Based User Matching [J]. Computer Science, 2022, 49(3): 113-120.
[4] SHAO Yu, CHEN Ling, LIU Wei. Maximum Likelihood-based Method for Locating Source of Negative Influence Spreading Under Independent Cascade Model [J]. Computer Science, 2022, 49(2): 204-215.
[5] SANG Chun-yan, XU Wen, JIA Chao-long, WEN Jun-hao. Prediction of Evolution Trend of Online Public Opinion Events Based on Attention Mechanism in Social Networks [J]. Computer Science, 2021, 48(7): 118-123.
[6] ZHANG Shao-jie, LU Xu-dong, GUO Wei, WANG Shi-peng, HE Wei. Prevention of Dishonest Behavior in Supply-Demand Matching [J]. Computer Science, 2021, 48(4): 303-308.
[7] YUAN De-yu, CHEN Shi-cong, GAO Jian, WANG Xiao-juan. Intervention Algorithm for Distorted Information in Online Social Networks Based on Stackelberg Game [J]. Computer Science, 2021, 48(3): 313-319.
[8] MA Li-bo, QIN Xiao-lin. Topic-Location-Category Aware Point-of-interest Recommendation [J]. Computer Science, 2020, 47(9): 81-87.
[9] LIANG Jun-bin, ZHANG Min, JIANG Chan. Research Progress of Social Sensor Cloud Security [J]. Computer Science, 2020, 47(6): 276-283.
[10] BAO Jun-bo, YAN Guang-hui, LI Jun-cheng. SIR Propagation Model Combing Incomplete Information Game [J]. Computer Science, 2020, 47(6): 230-235.
[11] WU Lei,YUE Feng,WANG Han-ru,WANG Gang. Academic Paper Recommendation Method Combined with Researcher Tag [J]. Computer Science, 2020, 47(2): 51-57.
[12] GU Qiu-yang, JU Chun-hua, WU Gong-xing. Social Network Information Recommendation Model Combining Deep Autoencoder and Network Representation Learning [J]. Computer Science, 2020, 47(11): 101-112.
[13] ZHANG Zheng, WANG Hong-zhi, DING Xiao-ou, LI Jian-zhong, GAO Hong. Identification of Same User in Social Networks [J]. Computer Science, 2019, 46(9): 93-98.
[14] LV Zhi-quan, LI Hao, ZHANG Zong-fu, ZHANG Min. Topic-based Re-identification for Anonymous Users in Social Network [J]. Computer Science, 2019, 46(6): 143-147.
[15] YUAN De-yu, GAO Jian, YE Meng-xi, WANG Xiao-juan,. Malicious Information Source Locating Algorithm Based on Topological Extension in Online Social Network [J]. Computer Science, 2019, 46(5): 129-134.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!