ArticlePublisher preview available

Detecting the core of a network by the centralities of the nodes

IOP Publishing
Chinese Physics B
Authors:
To read the full-text of this research, you can request a copy directly from the authors.

Abstract

Many networks exhibit the core/periphery structure. Core/periphery structure is a type of meso-scale structure that consists of densely connected core nodes and sparsely connected peripheral nodes. Core nodes tend to be well-connected, both among themselves and to peripheral nodes, which tend not to be well-connected to other nodes. In this brief report, we propose a new method to detect the core of a network by the centrality of each node. It is discovered that such nodes with non-negative centralities often consist in the core of the networks. The simulation is carried out on different real networks. The results are checked by the objective function. The checked results may show the effectiveness of the simulation results by the centralities of the nodes on the real networks. Furthermore, we discuss the characters of networks with the single core/periphery structure and point out the scope of the application of our method at the end of this paper.
Chin. Phys. B 33, 088903 (2024)
Detecting the core of a network by the centralities of the nodes
Peijie Ma(), Xuezao Ren(), Junfang Zhu(), and Yanqun Jiang()
School of Mathematics and Science, Southwest University of Science and Technology, Mianyang 621010, China
(Received 23 January 2024; revised manuscript received 15 April 2024; accepted manuscript online 17 May 2024)
Many networks exhibit the core/periphery structure. Core/periphery structure is a type of meso-scale structure that
consists of densely connected core nodes and sparsely connected peripheral nodes. Core nodes tend to be well-connected,
both among themselves and to peripheral nodes, which tend not to be well-connected to other nodes. In this brief report, we
propose a new method to detect the core of a network by the centrality of each node. It is discovered that such nodes with
non-negative centralities often consist in the core of the networks. The simulation is carried out on different real networks.
The results are checked by the objective function. The checked results may show the effectiveness of the simulation results
by the centralities of the nodes on the real networks. Furthermore, we discuss the characters of networks with the single
core/periphery structure and point out the scope of the application of our method at the end of this paper.
Keywords: complex network, core/periphery structure, the objective function
PACS: 89.75.Hc DOI: 10.1088/1674-1056/ad4cd4
1. Introduction
Many networks exhibit the core/periphery structure,
which is important for scientists to understand the properties
and the dynamics of the networks.[1]The constitution of the
structure often refers to a simple two-class partition.[24]The
definition of core/periphery has been formalized in Ref. [2].
The notion of the core in the network is often used to describe
the connectivity between the nodes with large degree, and it
has been applied to profile meso-scale properties in networks
by examining the density of connections.[510]The core in the
network influences the functionality of itself. It is demon-
strated in the transmission of rumors or information in social
networks,[11,12]in the organization of the human connection
in neurodevelopment,[13,14]in the transportation networks of
airline flights,[15]and in the characterizing data patterns. [16]
The core of the network is often regarded to be comprised
of the densely inter-connected high-degree nodes, which im-
pact adaptability, flexibility, and controllability.[17,18]Lots of
profiling methods have been proposed based on optimizing a
suitable fitness function using the coreness value to define the
density of links inside the core,[2]referring to a quality index
with respect to the size of the expected core and the fuzziness
of the boundary,[19]or applying Markov chains to describe
random walks to index the coreness of individual nodes.[20]
These methods rely on subjective fine-tuning due to the pres-
ence of one or more free parameters, which could be obtained
arbitrarily or by techniques. Other examples include maxi-
mizing the closeness centrality within the core by an ensemble
of random networks to define a coefficient that characterizes
the core.[3]Recently, some scientists have proposed to use
an influence propagation process to detect the pairs of core-
periphery nodes.[21]Generally, these methods always tend to
be relatively complex in nature, and therefore scalability is-
sues are likely to be encountered when applied to the huge
networks.
Interestingly, the presence of a network with
core/periphery structure could be divided into two parts. How-
ever, there is, at present, no general method to define the core
nodes. Due to the importance of the core/periphery structure
in the networks, we present a method to profile such structure
in this brief report. First, we define the centrality of each node.
It could be considered that the core of a network consists of
the nodes with non-negative centralities. Second, the results
can be checked by the objective function. It is discovered that
the nodes with non-negative centralities may be included to
the core by detecting the core/periphery structure. Third, we
discuss the character of the network with single core/periphery
structure on the synthetic network. Furthermore, we describe
the scope of the application of our method.
2. Method
Consider an unweighted and undirected network. A com-
plex network can be described as a graph set G(V,E). The
node set is V, and the connection set is E. In this paper, it
is considered that these connections are undirected in the net-
work. Each element in the adjacency matrix Aof the network
is 0 or 1, when node iis connected with node j, the element
ai j =1, otherwise ai j =0. The degree of node iis ki=jai j .
Then, we can define the centrality C(i)of the node iin the net-
work. It is considered that the core node in the star network
may have the highest centrality, while the periphery nodes
have the lowest centrality. The centrality of node iis defined
Corresponding author. E-mail: rxz63@aliyun.com
Corresponding author. E-mail: zjfbird@mail.ustc.edu.cn
© 2024 Chinese Physical Society and IOP Publishing Ltd http://iopscience.iop.org/cpb http://cpb.iphy.ac.cn
088903-1
... The identification of vital nodes in complex networks is a long-standing problem in network science. [1][2][3][4][5] It is critical for controlling outbreaks, mitigating damage caused by attacks on transportation or telecommunications networks, and finding key genes for targeted receptor proteins and molecular biologics. [6,7] Although many simple and effective methods have been applied to these problems, they have their limitations due to the diversity of evaluation criteria. ...
Article
Full-text available
Identifying vital nodes is one of the core issues of network science, and is crucial for epidemic prevention and control, network security maintenance, and biomedical research and development. In this paper, a new vital nodes identification method, named degree and cycle ratio (DC), is proposed by integrating degree centrality (weight α) and cycle ratio (weight 1 − α). The results show that the dynamic observations and weight α are nonlinear and non-monotonicity (i.e., there exists an optimal value α* for α), and that DC performs better than a single index in most networks. According to the value of α*, networks are classified into degree-dominant networks (α* > 0.5) and cycle-dominant networks (α* < 0.5). Specifically, in most degree-dominant networks (such as Chengdu-BUS, Chongqing-BUS and Beijing-BUS), degree is dominant in the identification of vital nodes, but the identification effect can be improved by adding cycle structure information to the nodes. In most cycle-dominant networks (such as Email, Wiki and Hamsterster), the cycle ratio is dominant in the identification of vital nodes, but the effect can be notably enhanced by additional node degree information. Finally, interestingly, in Lancichinetti–Fortunato–Radicchi (LFR) synthesis networks, the cycle-dominant network is observed.
Article
Full-text available
Identifying influential nodes in complex networks and ranking their importance plays an important role in many fields such as public opinion analysis, marketing, epidemic prevention and control. To solve the issue of the existing node centrality measure only considers the specific statistical feature of a single dimension, a SLGC model is proposed that combines a node's self-influence, its local neighborhood influence, and global influence to identify influential nodes in the network. The exponential function of e is introduced to measure the node's self-influence; in the local neighborhood, the node's one-hop neighboring nodes and two-hop neighboring nodes are considered, while the information entropy is introduced to measure the node's local influence; the topological position of the node in the network and the shortest path between nodes are considered to measure the node's global influence. To demonstrate the effectiveness of the proposed model, extensive comparison experiments are conducted with eight existing node centrality measures on six real network data sets using node differentiation ability experiments, susceptible-infected-recovered (SIR) model and network efficiency as evaluation criteria. The experimental results show that the method can identify influential nodes in complex networks more accurately.
Article
Full-text available
Real-world networks exhibit complex topological interactions that pose a significant computational challenge to the analysis of such networks. Due to limited resources, there is an urgent need to develop dimensionality reduction techniques that can significantly reduce the structural complexity of initial large-scale networks. In this paper, we propose a subgraph extraction method based on the node centrality measure to reduce the size of the initial network topology. Specifically, nodes with smaller centrality value are removed from the initial network to obtain a subgraph with a smaller size. Our results demonstrate that various real-world networks, including power grids, technology, transportation, biology, social, and language networks, exhibit self-similarity behavior during the reduction process. The results of this paper reveal the self-similarity and scale invariance of real-world networks from a different perspective and also provide an effective guide for simplifying the topology of large-scale networks.
Article
Full-text available
People share their views and daily life experiences on social networks and form a network structure. The information shared on social networks can be unreliable, and detecting such kinds of information may reduce mass panic. Propaganda is a kind of biased or unreliable information that can mislead or intend to promote a political cause. The disseminators involved in spreading such information create a sophisticated network structure. Detecting such communities can lead to a safe and reliable network for the users. In this paper, a Boundary-based Community Detection Approach (BCDA) has been proposed to identify the core nodes in a propagandistic community that detects propagandistic communities from social networks with the help of interior and boundary nodes. The approach consists of two phases, one is to detect the community, and the other is to detect the core member. The approach mines nodes from the boundary as well as from the interior of the community structure. The leader Ranker algorithm is used for mining candidate nodes within the boundary, and the Constraint coefficient is used for mining nodes within the boundary. A novel dataset is generated from Twitter. About six propagandistic communities are detected. The core members of the propagandistic community are a combination of a few nodes. The experiments are conducted on a newly collected Twitter dataset consisting of 16 attributes. From the experimental results, it is clear that the proposed model outperformed other related approaches, including Greedy Approach, Improved Community-based 316 Robust Influence Maximization (ICRIM), Community Based Influence Maximization Approach (CBIMA), etc. It was also observed from the experiments that most of the propagandistic information is being shared during trending events around the globe, for example, at times of the COVID-19 pandemic.
Article
Full-text available
Detecting core-periphery structures is one of the outstanding issues in complex network analysis. Various algorithms can identify core nodes and periphery nodes. Recent advances found that many networks from real-world data can be better modeled with multiple pairs of core-periphery nodes. In this study, we propose to use an influence propagation process to detect multiple pairs of core-periphery nodes. In this framework, we assume each node can emit a certain amount of influence and propagate it through the network. Then we identify nodes with large influences as core nodes, and we utilize a maximum influence chain to construct a node-pairing network to determine core-periphery pairs. This approach can take node interactions into consideration and can reduce noises in finding pairs. Experiments on randomly generated networks and real-world networks confirm the efficiency and accuracy of our algorithm.
Article
Full-text available
Detecting the presence of mesoscale structures in complex networks is of primary importance. This is especially true for financial networks, whose structural organization deeply affects their resilience to events like default cascades, shocks propagation, etc. Several methods have been proposed, so far, to detect communities, i.e., groups of nodes whose internal connectivity is significantly large. Communities, however do not represent the only kind of mesoscale structures characterizing real-world networks: other examples are provided by bow-tie structures, core-periphery structures and bipartite structures. Here we propose a novel method to detect statistically significant bimodular structures, i.e., either bipartite or core-periphery ones. It is based on a modification of the surprise, recently proposed for detecting communities. Our variant allows for bimodular nodes partitions to be revealed, by letting links to be placed either 1) within the core part and between the core and the periphery parts or 2) between the layers of a bipartite network. From a technical point of view, this is achieved by employing a multinomial hypergeometric distribution instead of the traditional, binomial hypergeometric one; as in the latter case, this allows a p-value to be assigned to any given (bi)partition of the nodes. To illustrate the performance of our method, we report the results of its application to several real-world networks, including social, economic and financial ones.
Article
Full-text available
Articles you may be interested in 感应式脉冲推力器中等离子体加速数值研究 Numerical investigation on the plasma acceleration of the inductive pulsed plasma thruster 物理学报.2017, 66(7): 075204 http://dx.doi.org/10.7498/aps.66.075204 微型电子回旋共振离子推力器离子源结构优化实验研究 Experimental optimization in ion source configuration of a miniature electron cyclotron resonance ion thruster 物理学报.2015, 64(21): 215202 http://dx.doi.org/10.7498/aps.64.215202 脉冲等离子体推力器羽流沉积薄膜的结构与光学性质研究 Structural and optical characterization of film deposited by pulsed plasma thruster plume 物理学报.2013, 62(2): 025207 http://dx.doi.org/10.7498/aps.62.025207 霍尔效应推力器放电双稳态机理研究 Study on the mechanism of Hall effect thruster discharge with bistable state 物理学报.2012, 61(7): 075209 http://dx.doi.org/10.7498/aps.61.075209 霍尔漂移对阳极层霍尔等离子体加速器电离效率的影响 The influence of Hall drift to the ionization efficiency of anode layer Hall plasma accelerator 物理学报.2012, 61(7): 075210
Article
Full-text available
With a core-periphery structure of networks, core nodes are densely interconnected, peripheral nodes are connected to core nodes to different extents, and peripheral nodes are sparsely interconnected. Core-periphery structure composed of a single core and periphery has been identified for various networks. However, analogous to the observation that many empirical networks are composed of densely interconnected groups of nodes, i.e., communities, a network may be better regarded as a collection of multiple cores and peripheries. We propose a scalable algorithm to detect multiple non-overlapping groups of core-periphery structure in a network. We illustrate our algorithm using synthesised and empirical networks. For example, we find distinct core-periphery pairs with different political leanings in a network of political blogs and separation between international and domestic subnetworks of airports in some single countries in a world-wide airport network.
Article
We study core-periphery structure in networks using inference methods based on a flexible network model that allows for traditional onionlike cores within cores, but also for hierarchical treelike structures and more general non-nested types of structures. We propose an efficient Monte Carlo scheme for fitting the model to observed networks and report results for a selection of real-world data sets. Among other things, we observe an empirical distinction between networks showing traditional core-periphery structure with a dense core weakly connected to a sparse periphery, and an alternative structure in which the core is strongly connected both within itself and to the periphery. Networks vary in whether they are better represented by one type of structure or the other. We also observe structures that are a hybrid between core-periphery structure and community structure, in which networks have a set of nonoverlapping cores that roughly correspond to communities, surrounded by a single undifferentiated periphery. Computer code implementing our methods is available.
Article
Traditional classification techniques usually classify data samples according to the physical organization, such as similarity, distance, and distribution, of the data features, which lack a general and explicit mechanism to represent data classes with semantic data patterns. Therefore, the incorporation of data pattern formation in classification is still a challenge problem. Meanwhile, data classification techniques can only work well when data features present high level of similarity in the feature space within each class. Such a hypothesis is not always satisfied, since, in real-world applications, we frequently encounter the following situation: On one hand, the data samples of some classes (usually representing the normal cases) present well defined patterns; on the other hand, the data features of other classes (usually representing abnormal classes) present large variance, i.e., low similarity within each class. Such a situation makes data classification a difficult task. In this paper, we present a novel solution to deal with the above mentioned problems based on the mesostructure of a complex network, built from the original data set. Specifically, we construct a core–periphery network from the training data set in such way that the normal class is represented by the core sub-network and the abnormal class is characterized by the peripheral sub-network. The testing data sample is classified to the core class if it gets a high coreness value; otherwise, it is classified to the periphery class. The proposed method is tested on an artificial data set and then applied to classify x-ray images for COVID-19 diagnosis, which presents high classification precision. In this way, we introduce a novel method to describe data pattern of the data “without pattern” through a network approach, contributing to the general solution of classification.
Article
Finding core–periphery structures in networks is very useful in many disciplines such as biology and sociology. However, most of the previous works focus on the single core–periphery structure in the network. A few recent algorithms considering multiple core–periphery are usually not suitable for large networks. Inspired by the modularity maximization method for community detection, we propose a simple but effective approach to detect core–periphery structures in this work. Moreover, we propose a metric called core–periphery score to evaluate the performance of core–periphery structure detection algorithms. In the experiment, we find that the score is consistent with the normalized mutual information when ground-truth structures are given. Our approach also outperforms other core–periphery detection algorithms for randomly generated networks and real-world networks.