• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Vertex centrality of complex networks based on joint nonnegative matrix factorization and graph embedding

    2023-02-20 13:17:10PengliLu盧鵬麗andWeiChen陳瑋
    Chinese Physics B 2023年1期

    Pengli Lu(盧鵬麗) and Wei Chen(陳瑋)

    School of Computer and Communication,Lanzhou University of Technology,Lanzhou 730050,China

    Keywords: complex networks, centrality, joint nonnegative matrix factorization, graph embedding, smoothness strategy

    1. Introduction

    Complex systems from nature and society is modeled and represented by network composed of vertices,that denote entities, and edges, that correspond to the interactions between entity pairs,such as brain networks,[1]message networks,[2,3]human lives,[4]and social systems.[5]Scale-free characteristic of network demonstrates that the impact of different vertices on the function and structure may vary greatly and a few important vertices will affect the cascading effect[6,7]and propagation effect[8]of the network.Where the term“important vertices”means that certain vertices have a greater impact on the network structure and function to a greater extent than other vertices. Therefore,a key problem with important theoretical and practical significance is that of evaluation of vertex importance.

    Many experts have made great efforts to evaluate the crucial vertices from different angles and presented many centrality algorithms. From the perspective of topological structure of network, they can generally be divided into two categories in general, which are based on local or global structure to determine vertex’s significance. Indicators based on local topology,for example,degree centrality(DC)[9]takes the number of edges connected to neighboring vertices as a metric.Denget al.[10]proposed a method based on the inverse-square law, named I, which defined intensity of vertex by the sum of mutual attraction between each vertex and other vertices.Zareieet al.[11]incorporated the notions of Shannon entropy and Jensen–Shannon Divergence to determine vertex centrality. Extend cluster coefficient ranking measure (ECRM)[12]is an improved cluster rank approach combining local clustering coefficient and similarity of connections between neighboring vertices. Node local centrality(NLC)[13]employs network embedding method and network neighborhood topology information to obtain the spreading capability of vertex.

    The algorithms based on global structure tend to have relatively higher computational complexity than those based on local topology. For example, betweenness centrality(BC)[14]and closeness centrality(CC)[15]are based on the global path.K-shell(KS)[16]adopts the topological location of vertices and closeness to the graph core to sort them. In view of the shortcomings of KS,hierarchical K-shell(HKS)[17]introduces thepred,succ, andsiblsets to standardize the vertex’s topological position and estimates propagation capacity of vertex via its position and neighbors. Denget al.[18]proposed a novel method which takes into account the propagation characteristics of itself and all vertices. Besides,they provided a quantitative model(GIN)to measure the global importance of each vertex. Ullahet al.[19]have presented a global structure model(GSM) for influential vertices identification, which not only considers self-propagation characteristics,but also emphasizes vertex’s global influence in the network. In addition,the algorithms GLS and MCCD on the basis of the global and local structure of the network were proposed by Shenget al.[20]and Zhanget al.[21]

    When using vertex centrality indicators to predict which vertices are among the top influencers or super communicators, comparative analyses have demonstrated that no single centrality algorithm is consistent in performance across realistic case studies. At the core of the algorithms to solve this problem is the assessment of important vertices with combining different attributes of vertex. Usually, multiple attributes describing a vertex characteristics are represented by a vector data. That is, for the verticesvi(i=1,2,...,n) in network,Ui=(ui1,ui2,...,ui5) means that the vertexvican be characterized by vector data with five attributes (for instance, the degree of vertex,the Laplacian energy of vertex,the central location of vertex,the propagation characteristics of vertex,the diversity of neighbors). Whenkattributes are used to characterize the vertex, the vector dataUiisk-dimensional, and the matrixU ∈is the attribute of the network.For integrating more attributes of the vertex, many algorithms incorporate multiple attribute decision making into the criterion to evaluate the importance of vertices,however,there are some unsolved problems. For example, indexes with different attributes are subjectively adopted as vertex attributes in the algorithm,which render it difficult to fully characterize the network and ignore the selected attributes whether linearly related.In the next place,the attributes of vertex and structure of the network are heterogeneous. Directly integration attribute and structure cannot effectively deal with the heterogeneity,which hinders the full utilization of them. In addition,for the increasingly large network data, how to more effectively represent attributes and structure information of network are also one of the issues we need to consider.

    To overcome these problems,a new vertex centrality approach via joint nonnegative matrix factorization and graph embedding is proposed,referred to as VCJG centrality. VCJG is mainly composed of two major components: joint nonnegative matrix factorization obtains the attributes of vertex which fuse structure information, and the importance of vertices are evaluated applied attrubute and neighborhood rules.For automatically obtaining potential attributes, nonnegative matrix factorization(NMF)[22]is employed to decompose the weighted adjacency matrix. To capture the structure information of network, the global and local topology structure matrix generated by graph embedding are jointly decomposed via NMF. And we apply the smoothness strategy to integrate attributes,local and global structure information for overcoming the heterogeneity of them. Next, VCJG integrates the above steps to formulate an overall objective function,and generates an attribute matrix fused the structure information of network through optimizing the objective function. The above operation can ensure that each attribute obtained is linearly independent.Then we integrate the vertex attribute with neighborhood rules to evaluate vertex’s importance finally. To verify the effectiveness of the VCJG criterion, four traditional algorithms and five state-of-the-art centrality approaches are used as measures for comparison. And through extensive experiments on nine real-world networks, the results assert the proposed approach is superior to contrastive algorithms.

    The rest paper is structured as follows. Section 2 briefly reviews the related works. In Section 3,a new centrality algorithm is proposed. We analyze the complexity of the proposed algorithm in Section 4. After that,we describe the real-world network datasets and experimental results in Section 5. Finally,Section 6 is the conclusion.

    2. Related works

    LetG={V(G),E(G)}be an undirected and unweighted network, with vertex setV(G)={v1,v2,...,vn}and edge setE(G)={e1,e2,...,em}, where|V(G)|=nand|E(G)|=m.The adjacency matrix ofG,denoted byA(G)=A,is then×nmatrix whose(i,j)-entry is 1 if verticesviandvjare adjacent inGand 0 otherwise. Letdibe the degree of vertexvi, andD(G)=Dthe degree diagonal matrix with diagonal entriesd1,d2,...,dn. The set of all neighbors ofviis denoted byNi,where|Ni|=di. The length of shortest path between verticesviandvjis represented asdistij. The maximum value ofdistijin networkGis called the diameter ofG,which is represented byDist(G)=Dist.

    2.1. Presented approaches

    In order to assess the impact of vertex more comprehensively, many scholars have designed centrality algorithms based on multi-attribute decision making. Duet al.[23]considered several different approaches as the multiple attributes and employed TOPSIS to aggregate the multiple attributes for measuring the vertex’s importance. Yanget al.[24]proposed a centrality method that apples VIKOR to integrate multiple centrality criteria from different angles and obtain comprehensive and reasonable ranking results. Yanet al.[25]comprehensively considered the multiple attributes of vertex and adopted the entropy weight method to get the corresponding weight of each criterion for overcoming the influence of subjective factors.

    The above algorithms have been devoted to measure the importance of vertices from multiple attributes. However,these attributes are generated by multiple vertex centrality algorithms, resulting in correlations between them. For example,in view of the idea of the multi-attribute decision making,Yanget al.[26]regard DC, BC, and CC as vertex’s attributes,which have correlation because both BC and CC are based on global structure.In this paper,we will consider using the NMF algorithm to extract vertex attributes that are uncorrelated of each other.

    2.2. Network embedding

    It is not easy to take advantage of the structural information of the network(graph)because it is discrete by itself.As an example, individuals (vertex) cannot be added to each other, nor can an individual be subtracted from the relationship between individuals(edge). Quite a few researchers have begun to explore a kind of low-dimensional and dense vector representation method to represent high-dimensional network,namely network embedding.

    Node2vec[27]learns continuous attribute representations for vertices in networks, which is an algorithmic framework.It has a flexible concept of a vertex’s network neighborhood and a biased random walk procedure, which can effectively explore diverse neighborhoods. Therefore, the mapping of vertices to a low-dimensional attribute space can be obtained to preserve the network neighborhood of vertices as much as possible.

    2.3. Preliminaries

    Lemma 1[28]A walk of lengthlinG, from vertexvitovj,is a finite sequence of vertices ofG,

    such thatux-1anduxare adjacent for 1≤x ≤l,whereuxrepresents the(x+1)-th vertex in the walk. The number of walks of lengthl, fromvitovj, is the entry in position (i,j) of the matrixAl.

    2.3.1. NMF algorithm

    The ubiquity of high-dimensional data not only leads to an exponential amount of computation which makes it difficult to ensure real-time processing,but also makes it difficult to mine the intrinsic structure and relevance of the data. Dimensionality Reduction is a data processing method that mines the essential law of data and discovers the internal relationship. Dimensionality reduction is divided into attribute selection and attribute extraction. Attribute selection is a subset of attributes that is extracted directly from the original data,and attribute extraction is a series of mathematical transformations that synthesize new attributes in place of the original data set.In this paper,non-negative matrix factorization(NMF)is used to extract attributes from the original network.

    NMF is a method in matrix factorization algorithms that represents a matrix as the multiplication of simple and lowrank matrices. Since network can be expresses as adjacency(laplacian, signless laplacian) matrix, then a clear advantage for matrix decomposition in graph theory lies in the allowance of understanding the fundamental properties of graph and doing straight forward calculation.

    Given a nonnegative matrixT ∈, nonnegative matrix factorization (NMF) aims to find two nonnegative matricesB ∈andF ∈such that the product of them can approximate the matrixT,i.e.,

    Wherekis the rank of the matrix,usually(m+n)k <mn.[29]

    Usually,we can understand that the column vector of the original matrixTis the weighted sum of all column vectors of the matrixB, and the weight coefficient is the element of the corresponding column vector of the matrixF,as shown in the following equation.For exampleSupport non-negative matrixsT ∈,B ∈,andF ∈R2+×3satisfyF ≈BF,i.e.,

    where

    Therefore,it is called matrixBas the base matrix and matrixFas the attribute matrix.

    3. Measuring the vertex centrality

    VCJG is mainly composed of two major components:joint nonnegative matrix factorization obtains the attribute with linearly independent and fusing structure information,and the vertex’s importance are evaluated with attribute and neighborhood rules. In this section, they are described in detail.

    3.1. Constructing objective function

    The joint matrix factorization in VCJG involves three procedures,where nonnegative matrix factorization is adopted to generate the attribute of networks, the topological information is obtained by joint decomposing the topological matrix,the smoothness procedure connects the attribute and topology information of network. Therefore, the objective function of VCJG is composed of the costs of three programs.

    The adjacent matrixAof the network characterizes whether there is interaction between the vertices, but it is not enough to fully describe the strength of it. Then,the weighted adjacent matrixW(Ref.[30])of the network is defined as follows:

    Obviously it is a symmetric nonnegative matrix. The most widely used strategy for obtaining network attributes is matrix factorization,we intuitively choose to use NMF,i.e.,

    where theBis the basis matrix andFis the attribute matrix corresponding to matrixB, andkis the number of attributes.As can be seen from Section 2,Subsection 2.2.1,thekof factor matrix decomposed by NMF satisfies (m+n)k <mn. In this algorithm, the number of rows and columns of the original matrixWisn,then we have(n+n)k <n2?k <n/2.

    The preceding equation can be solved by minimizing the squared error,that is,thel2norm between two matrices,

    As is well known that social networks contain two different dimensions, where the structural dimension describes the interaction and composition dimension indicates vertex attributes. Therefore, only through Eq. (3) to obtain the attributes of the network is not enough to characterize the network. Considering that the topological structure is generally divided into global and local structures, we can obtain the topology information of the network through joint nonnegative matrix factorization.The adjacency matrix can only characterize the 1-order structure. Then for global structure,according to Lemma 1 we define the global topology matrixT gvia the matrixAlas follows:

    whereDistis the diameter ofGand parameterθ ∈[0.1,1]controls the relative weight of walks. (T g)i jis the weighted average of the number of walk from vertexvitovj. For local structure,since node2vec maps vertices to low-dimensional attribute spaces and maintains the network neighborhood of vertices as much as possible,we apply it to get the local structure matrixT lofG.

    Here, we also use the same strategy by joint decomposingT gandT lunder the same basis matrixBto obtain the structure information of the network. The function is written as

    where the matricesSgandSlare local and global topology information, respectively. The attributes and structure of the network are heterogeneous, so the strategy we adopted is to smooth the attribute matrixFusing the topology informationSgandSl,i.e.,whereα ∈[0,1]is a parameter.

    Considering that the decomposition process mentioned above is independent,we apply joint strategy to construct the objective function. By combining Eqs.(3),(5),(6),the objective function of VCJG is formulated as

    where parameterαcontrols the direction in which the attribute is smoothed to the topology structure.

    3.2. Optimal solution

    From Eq.(7),we can obtain the multiplicative update solutions ofthe matricesB ∈,Sl ∈,Sg ∈, andF ∈by

    where symbol⊙is Hadamard product.[31]It is worth noting that the matricesB,Sl,Sg, andFneed to be updated at the same time. According to the nature of NMF,the matrixFis a row non-singular matrix. Next,we give the proof of Eq.(8).

    ProofBefore that, we first give the relationship between the Euclidan norm and the trace of the matrixA,i.e.,‖A‖2=Tr(ATA).

    Return the above functionf, removing irrelevant items,equation(7)is reformulated as

    The alternative iteration based strategy is adopted to solve the above formula, where one variable is updated by fixing the others. We first solve the update rule of the matrixB. The matricesF,Sl,Sgare fixed,and irrelevant items are removed.The equation(9)can be rewritten as

    We use lagrangian multiplier method to deal with the nonnegative constraint of matrixB. Let beΦ=[φi j],the lagrange?of Eq.(10)is

    The partial derivative of matrixBis derived as follows:

    Respectively,according to the formulas

    we have

    Similarly,

    Next,according to the formula

    we have

    Finally,

    By setting??/?B=0, we obtain the updating rule for matrixBas follows in light of the Karush–Kuhn–Tucker(KKT)conditionφij(B)i j=0,i.e.,

    By fixing the matricesB,F,andSg,the update rule of the matrixSlcan be calculated. Let (λ)i jbe the lagrange multiplier for the constraints(Sl)ij,the lagrange?is

    According to the formulas

    the partial derivative ofSlis formulated as follow:

    finally

    By setting the derivative of?(Sl) with respect toSlas 0 and the KKT condition,we obtain the rule to update matrixSlas

    Analogously,the updating rule for matrixSgis as follows via fixingB,F,Sl

    By fixing the matricesB,Sl,andSg,the updating rule for matrixFis formulated as

    The above derivative formulas can be found in Ref.[32].

    3.3. Evaluation of vertex essentiality

    The previous parts mainly describes the construction of the objective function and the process of finding the optimal solution. By randomly giving the initial value of the matrices and iterating in light of the iterative formulas, we can get the attribute matrixFthat each attribute is linearly independent.However, our ultimate aim is to identify the most influential vertices in the network. The local structure considered in the objective function is the 2nd neighborhood of the vertex on the one hand, on the other hand, the application of neighborhood rules can improve the accuracy of determining the most influential vertices. Therefore,we apply the first-order neighborhood to evaluate vertex’s importance. Finally, the VCJG centrality is defined,as shown in Definition 1.

    Definition 1 (VCJG centrality)

    The matrixF ∈be the solution of Eq. (7), which is expressed the attributes of the network and each other is linearly independent. The VCJG (vertex centrality based on Joint nonnegative matrix factorization and graph embedding)centrality score of vertexviis defined as

    wherekis the number of attribute(usuallyk <n/2). The procedure of VCJG is illustrated in Algorithm 1.

    Algorithm 1 The VCJG centrality algorithm

    4. Algorithm analysis

    The time complexity of VCJG centrality calculation is mainly composed of two parts,namely joint matrix factorization and vertex influence calculation. We need to spendO(n)for obtaining the matrixW. The time complexity for matrixT gisO(log(n)), which is calculated via matrix fast power algorithm. The time complexity for the graph embedding isO(n2). The running time for joint factorization isO(n2kr),whereris the number of iterations andkis the number of attributes. Then the time complexity of the first part isO(n2kr).TimeO(n×Dist)is required to calculate the influence of vertex,which is the second part. Finally,the time complexity of VCJG isO(n2kr).

    5. Experimental analysis

    In this section,simulation strategy and the results of evaluation measures are described in detail.To assess the proposed approach,we compare its performance with four traditional algorithms and five state-of-the-art methods including:

    ·degree centrality(DC);

    ·betweenness centrality(BC);

    ·closeness centrality(CC);

    ·k-shell(KS);

    ·the centrality based on the inverse-square law(I);

    ·hierarchical k-shell centrality(HKS);

    ·global and local structure centrality(GLS);

    ·global importance of vertices centrality (GIN) where parameters a and b are set to 1;

    ·the centrality based on global structure model(GSM).

    These algorithms evaluate the influence of vertex from different attribute of vertex. DC algorithm takes the local topology attribute. BC and CC methods think about the global topology attribute. KS and HKS indexes consider the center location of the vertex. I algorithm considers the diversity of neighbors. GLS take into account both local and global topological attribute.GIN and GSM algorithms adopt the propagation characteristics.To illustrate the performance of JNMF,we use the four traditional methods and the five recent methods as baseline methods to build vertex centrality.

    5.1. Utilized datasets

    Nine different real-world networks, details about which can be found in Table 1,are used to validate the performance of the aforementioned algorithm.There are include karate club network (Karate),[33]the network of selling political books about the presidential election(Polbooks),[34]Jazz musicians network (Jazz),[35]usair network (USAir),[36]co-authorship network of scientists (Netscience),[37]Email network of the University Rovira i Virgili (Email),[38]protein–protein interaction network (Yeast).[39]The user network of the hamsterster.com website (Hamster)[40]and the network of the online social networking platform(Facebook).[41]The statistics characteristics of these datasets are summarized in Table 1,whereβthis the infection rate threshold andβis the optimal infection rate value.

    Table 1. Statistical characteristics of all datasets.

    5.2. Experiments for the parameters

    Recall that VCJG involves three parameters: parameterkdenotes the number of potential attributes,parameterθdetermines the weight of thel-order global topology, and parameterαgoverns the direction in which the vertex attributes are smoothed to the topological structure. All possible values of each parameter are considered and ranking lists under these combinations are calculated. The Kendall coefficientτis used to evaluate the correlation between the ranking and the ranking generated by the SIR model,and finally the value of each parameter is determined.

    Table 2. The value of parameter k over all networks.

    The number of attributes of the network is usually less than the number of vertex. Thus for simplicity,the sorted lists under differentkvalue are obtained via adjustingθ=0.5 andα= 0.5, wherek ∈{1,n/2}. Thekvalue is selected corresponding to the optimal Kendall coefficientτ. Table 2 is demonstrate the final selected value ofkon all networks.Next,we investigate how parameterαandθinfluence the performance of the proposed algorithm. By fixingk, the parameterαandθincrease from 0 and 0.1 to 1 with the gap 0.1,respectively. The variation in the accuracy of VCJG as parameterαandθincrease for four dataset is shown in Fig.1. As can be observed in the picture,the highest values ofτcan be obtained forθ=0.8 andα=0 over the Karate dataset,forθ=0.5 andα=0.1 over the Polblogs dataset, forθ=0.8 andα=0.3 over the Email dataset, and forθ=0.8 andα=0.2 over the Yeast dataset.

    Fig.1. Effect of variation of parameters θ and α on the accuracy of the proposed method based on Kendall’s τ correlation coefficient over the four dataset.

    In conclusion,asθ=0.8,VCJG reaches a good balance between thel-order global topology. In the wake of parameterαincreases from 0 to 1, the accuracy of VCJG increases from low to high,and then gradually decreases. The reason is that whenαis small, the attributes of vertex are excessively smoothed to global topology. Whenαis large, the attributes are dominated by local topology,thereby resulting in an undesirable performance.Based on the above results,the extraction of attributes and topology reaches a good balance forθ=0.8 andα=0.2. Thus,these values are considered for the parametersθandαfor remaining experiments.

    5.3. Correlation

    In order to evaluate the lists ranked by all the centrality indicators, the list ranked by the real diffusion process of the vertices requires obtaining.The standard susceptible-infectedrecovered(SIR)model[42]is adopted to simulate the spreading process on networks and record the diffusion efficiency for every vertex.Every vertex pertains to one of the susceptible state(S),the infected state(I)or the recovered state(R)in the SIR model. Initially, one vertex is set to infected state and other vertices are susceptible vertices. At each step, each infected vertex can infect its susceptible neighbors with probabilityβ,and then can be deleted with probabilityγ. This dynamic process will repeat until there is no infected vertices.

    In this paper, the SIR process is repeated 1000 times for each vertex to increase ranking accuracy and the average value of the vertex’s spreading capability is considered as it is importance. The infection probabilityβis set near the infection rate threshold andγ=2β. The infection rate range of each network is shown in the abscissa of Fig.2.

    For measure the performance of the centrality algorithms,the Kendall’s coefficientτ[43]is employ to evaluate the correlation between ranking list and the one generated by the SIR model. The Kendall’s correlation coefficientτis defined as

    whereτ ∈[-1,+1].zcandzddenote the number of concordant and discordant pairs respectively. The higher the value ofτ,the more accurate the ranking generated by the centrality measure.

    Fig.2. The influence of the change of infection rate on the accuracy of different methods in eight datasets.

    The Kendall’s coefficientτin eight real-world networks has been investigated. The calculations,to evaluate the effect of infection probabilityβ, are shown in Fig. 2. The value ofβthin this figure is indicated by dash-dot lines. In Polbooks,Jazz, Netscience, Email, Yeast and Facebook datasets, as the value ofβincreases,especially as it exceedsβth,theτof the proposed method is more highly, and outperforms the other measures. In Karate dataset,after the infection rate threshold,the VCJG’sτshows a downward trend. Although it is lower than the GIN algorithm atβ=0.16,it surpassed it afterwards.In Hamster dataset, afterβ=0.05, theτof VCJG is higher than that of the compared algorithms except HKS. It can be seen that VCJG has different level of “difficulty” in finding influential vertices on different networks. However in most networks, VCJG still shows better performance than current state-of-the-art algorithms.

    5.4. Monotonicity

    In addition to the above experiments,we also evaluate the monotonicity (M)[44]of ranking for each centrality method.TheMof the indexing method refers to the ability of uniquely identifying vertex from the network. The range ofMlies between[0,1]where 0 means all vertices in the network have the same rank and 1 means unique rank assign to each vertex in the network. Monotonicity is defined as follows:

    whereRis the ranking table generated by a centrality measure,Nis the number of levels in sequenceR,Nris the number of vertices with rankrin the ranking tableR.

    Table 3 describes the ranking monotonicity of all methods on nine real datasets. It can be seen that monotonicity of VCJG method is lower than most other indexing methods in Jazz dataset. On the other hand,the monotonicity of the proposed methods is the same as HKS,I,GIN,and GSM methods in Email dataset. In the other datasets, the monotonic value of the proposed method is better than all the contrasted algorithms, and is close to 1. The results show that the VCJG method has greater ability to really distinguish the vertices than in the other methods.

    Table 3. The M value of different methods in nine networks.

    5.5. Accuracy of top-10 vertices ranking

    High-ranking vertices in the ranking list are more important than low-ranking vertices,so we require evaluating the accuracy of different methods for identifying high-ranking vertices. Different centrality measures give different lists of the top-10 vertices,depending on how information in the network is considered. The number of same vertices for different measures can show the superiority of different approaches. In the experiment,the top-10 vertex ids are listed to compare the differences in the top-10 vertex results obtained by different measures. And the propagation based on the SIR model to show the superior infection ability of the vertices obtained by the centrality algorithms.

    We select indicators from the contrasted algorithms that are less different from the proposed method in the correlation and monotonic experiments for further comparison, such as HKS, GLS and GSM centrality. The top-10 vertices in four datasets are identified and the results are listed in Table 4. A vertex in red color indicates that it not exists in the top-10 lists obtained by the SIR model. For the Polbooks and Email datasets, the distinctness in the number of different vertices between four metrics and the SIR model is relatively small.The distinctness is relatively large in the Jazz dataset because only the top-10 vertices found by VCJG are the same as those generated by SIR. In USAir dataset, the vertices selected by each algorithm are amount to the same those generated by SIR.Therefore,we evaluate the performance of the algorithm from the perspective of vertex arrangement order. The vertices in blue color mean that the order of them are different from the top-10 generated by SIR. For HKS and GSM criteria, there are four vertices in a different order than SIR,while GLS and VCJG methods only have two vertices and the vertices order of VCJG are lower than that of GLS.

    Table 4. Vertices ranked by different centrality methods in four datasets.

    Fig.3. Number of infected vertices for different initial vertices(top-10 vertices)obtained by the ten methods in four networks.

    In order to further evaluate whether the vertices obtained by the proposed algorithm have superior infection ability,the SIR model is applied to measure the infection ability of top-10 selected initial vertices. The top-10 vertices obtained by different approaches are used as the initial infected vertices,and the remaining vertices are defined as susceptible vertices. We set the recovery rate in SIR as 0 in order to more easily and accurately count the number of infected vertices. The number of infected verticesF(t)at particular momenttis selected as the infection ability of the initial infected vertices. A higherF(t)indicates that the infection ability of the initial vertices is stronger and that the initial vertices are more importance.

    In the experiment, the infection probability of the SIR model on each network is given in column eight of Table 1.Each experiment was carried out independently,and repeated 1000 times under the condition of a specific infection rate.The results are the average of 100 experiments,as shown in Fig.3.Among the four networks, theF(t)of VCJG has little difference with the comparison algorithms in the early stage,but it was higher than other algorithms it keeps up with the growth of time. What we want to point out is that although the list of top 10 vertices obtained by HKS,GLS,and GSM methods in the four networks are slightly different from that for VCJG,the VCJG has a stronger ability for evaluating vertices than the comparison algorithms.

    6. Conclusion

    In this paper, based on joint nonnegative matrix factorization and graph embedding,we proposed the VCJG centrality to find pivotal vertices in complex networks. It overcomes the shortcomings of existing centrality measures that they cannot completely guarantee completely unrelated among multiple attributes and ignore the heterogeneity between network attributes and structure. This method has good stability and accuracy in different complex networks.

    However,VCJG centrality still has some inevitable problems. For instance, there is no better strategy to determine the value of parameterk. And the proposed approach has high time complexity and cannot be applied to large-scale networks.How to increase the speed of VCJG without sacrificing accuracy is a key issue. In future research,we will continue to improve.

    Acknowledgement

    Project supported by the National Natural Science Foundation of China(Grant Nos.62162040 and 11861045).

    亚洲成人av在线免费| 欧美激情在线99| 国产亚洲精品久久久com| 久久精品国产鲁丝片午夜精品| 国产伦理片在线播放av一区| 亚洲欧美精品专区久久| 亚洲美女视频黄频| 韩国av在线不卡| 我的女老师完整版在线观看| 国内揄拍国产精品人妻在线| 久久精品国产自在天天线| 亚洲真实伦在线观看| 日本与韩国留学比较| 哪个播放器可以免费观看大片| 日本与韩国留学比较| 日本色播在线视频| 国产女主播在线喷水免费视频网站 | 午夜精品国产一区二区电影 | 国产三级中文精品| 只有这里有精品99| 寂寞人妻少妇视频99o| 日韩人妻高清精品专区| 自拍偷自拍亚洲精品老妇| 亚洲美女视频黄频| 日韩欧美精品免费久久| 亚洲国产精品久久男人天堂| 国产精品乱码一区二三区的特点| 黄片wwwwww| 日本av手机在线免费观看| 午夜激情福利司机影院| 高清视频免费观看一区二区 | 亚洲自偷自拍三级| 国产老妇伦熟女老妇高清| 国产色爽女视频免费观看| 成人亚洲欧美一区二区av| 欧美日韩精品成人综合77777| 国产精品女同一区二区软件| 亚洲av不卡在线观看| 一个人看视频在线观看www免费| 免费看a级黄色片| 九九热线精品视视频播放| 国产精华一区二区三区| 久久久a久久爽久久v久久| 在线观看66精品国产| 免费播放大片免费观看视频在线观看 | 韩国av在线不卡| 午夜免费男女啪啪视频观看| 美女大奶头视频| 青青草视频在线视频观看| 久久人人爽人人片av| 亚洲av中文字字幕乱码综合| 亚洲成人精品中文字幕电影| 丝袜美腿在线中文| 中文在线观看免费www的网站| 精品国产一区二区三区久久久樱花 | 一级毛片我不卡| 久久精品国产鲁丝片午夜精品| 国产高清不卡午夜福利| 亚洲国产欧洲综合997久久,| 禁无遮挡网站| 国产高清三级在线| 又粗又爽又猛毛片免费看| 一级毛片电影观看 | 一级黄色大片毛片| 长腿黑丝高跟| 人妻系列 视频| 欧美日本视频| 色噜噜av男人的天堂激情| 久久6这里有精品| 午夜福利成人在线免费观看| 插逼视频在线观看| 国产一区二区亚洲精品在线观看| 啦啦啦啦在线视频资源| 特级一级黄色大片| 久久婷婷人人爽人人干人人爱| 国产黄片视频在线免费观看| 国产成人a∨麻豆精品| 免费黄色在线免费观看| 国产又色又爽无遮挡免| 亚洲欧美精品专区久久| 一区二区三区免费毛片| 国产69精品久久久久777片| 成人鲁丝片一二三区免费| 日日摸夜夜添夜夜爱| 美女cb高潮喷水在线观看| 国产精品久久久久久精品电影小说 | or卡值多少钱| 色综合站精品国产| 国产午夜精品久久久久久一区二区三区| 午夜福利在线观看免费完整高清在| 午夜福利在线观看免费完整高清在| 精品人妻视频免费看| 欧美精品国产亚洲| 亚洲欧美日韩卡通动漫| 欧美色视频一区免费| 又爽又黄无遮挡网站| 99热这里只有是精品50| 99热这里只有是精品50| 一个人看视频在线观看www免费| 亚洲av二区三区四区| 大话2 男鬼变身卡| 亚洲精品自拍成人| 中文欧美无线码| 日韩欧美精品v在线| 婷婷六月久久综合丁香| 中文字幕熟女人妻在线| 观看美女的网站| 视频中文字幕在线观看| 男人的好看免费观看在线视频| 干丝袜人妻中文字幕| 麻豆乱淫一区二区| 夜夜爽夜夜爽视频| 夜夜看夜夜爽夜夜摸| 国产午夜精品久久久久久一区二区三区| 亚洲国产欧美在线一区| 欧美成人一区二区免费高清观看| 特大巨黑吊av在线直播| 国产又色又爽无遮挡免| 伦理电影大哥的女人| 伦理电影大哥的女人| 22中文网久久字幕| 国产三级中文精品| 精品人妻视频免费看| 菩萨蛮人人尽说江南好唐韦庄 | 婷婷色综合大香蕉| 国产成人91sexporn| 69人妻影院| 日日摸夜夜添夜夜爱| 99热网站在线观看| 免费看美女性在线毛片视频| 亚洲va在线va天堂va国产| 国产精品女同一区二区软件| 国产黄色小视频在线观看| 两个人视频免费观看高清| 久久久久网色| 国产精品久久电影中文字幕| 丝袜喷水一区| 国产精品电影一区二区三区| 91精品一卡2卡3卡4卡| 老司机影院毛片| 波多野结衣高清无吗| 高清日韩中文字幕在线| 一级二级三级毛片免费看| 18禁在线无遮挡免费观看视频| 亚洲欧美中文字幕日韩二区| 99热6这里只有精品| 国产淫语在线视频| 一级黄色大片毛片| 国产成人福利小说| 久热久热在线精品观看| 我的老师免费观看完整版| 国产视频首页在线观看| 久久精品国产鲁丝片午夜精品| 1000部很黄的大片| 亚洲aⅴ乱码一区二区在线播放| 中文在线观看免费www的网站| 永久免费av网站大全| 欧美性感艳星| 久久久a久久爽久久v久久| 边亲边吃奶的免费视频| 国产精品国产三级国产av玫瑰| 国产真实伦视频高清在线观看| 成年女人看的毛片在线观看| 26uuu在线亚洲综合色| 97超视频在线观看视频| 日韩av在线大香蕉| 99久久精品国产国产毛片| 亚洲人成网站在线播| 欧美潮喷喷水| 夜夜爽夜夜爽视频| 女人久久www免费人成看片 | 日本与韩国留学比较| 又粗又硬又长又爽又黄的视频| 91久久精品国产一区二区三区| 久久韩国三级中文字幕| 欧美色视频一区免费| 欧美极品一区二区三区四区| 赤兔流量卡办理| 精品一区二区三区人妻视频| 免费观看在线日韩| 国产三级在线视频| 久久精品综合一区二区三区| 国产精品熟女久久久久浪| 国产又黄又爽又无遮挡在线| 小说图片视频综合网站| 婷婷色综合大香蕉| 欧美精品国产亚洲| 亚洲综合精品二区| av线在线观看网站| 精品酒店卫生间| 亚洲国产精品sss在线观看| 亚洲欧洲日产国产| 亚洲欧美清纯卡通| 日本黄色片子视频| 一级毛片aaaaaa免费看小| 精品不卡国产一区二区三区| 九草在线视频观看| 欧美一区二区精品小视频在线| 亚洲第一区二区三区不卡| 国产精品福利在线免费观看| 少妇被粗大猛烈的视频| 亚洲av一区综合| 亚洲四区av| 亚洲图色成人| 日本熟妇午夜| 国产精品综合久久久久久久免费| 国产成年人精品一区二区| 毛片一级片免费看久久久久| 老司机福利观看| 人妻制服诱惑在线中文字幕| 在线观看av片永久免费下载| av国产久精品久网站免费入址| 国产午夜精品一二区理论片| 黑人高潮一二区| 超碰97精品在线观看| 你懂的网址亚洲精品在线观看 | 亚洲,欧美,日韩| 爱豆传媒免费全集在线观看| 久久久久久久国产电影| 亚洲精品,欧美精品| 18禁裸乳无遮挡免费网站照片| 久久久欧美国产精品| 日本wwww免费看| 久久精品夜色国产| 国产免费一级a男人的天堂| 国产视频首页在线观看| 青春草视频在线免费观看| 精华霜和精华液先用哪个| 国产精品熟女久久久久浪| 亚洲最大成人中文| 一级二级三级毛片免费看| 久久久久久久亚洲中文字幕| av国产免费在线观看| 在现免费观看毛片| 国产高清不卡午夜福利| av视频在线观看入口| 麻豆一二三区av精品| 搡女人真爽免费视频火全软件| 熟女人妻精品中文字幕| av.在线天堂| 91在线精品国自产拍蜜月| 亚洲三级黄色毛片| 亚洲精品久久久久久婷婷小说 | 波多野结衣高清无吗| 九色成人免费人妻av| 国产老妇伦熟女老妇高清| 麻豆一二三区av精品| 久久精品久久久久久噜噜老黄 | 国产探花极品一区二区| 免费av毛片视频| 最近手机中文字幕大全| 国产免费又黄又爽又色| 夫妻性生交免费视频一级片| 丰满乱子伦码专区| 在线免费观看不下载黄p国产| 中国美白少妇内射xxxbb| 99久久中文字幕三级久久日本| 草草在线视频免费看| 亚洲av成人av| 在线免费观看的www视频| 大香蕉97超碰在线| 又爽又黄无遮挡网站| 日韩欧美在线乱码| 尾随美女入室| 日本黄大片高清| 少妇丰满av| 欧美性感艳星| 国产精品嫩草影院av在线观看| 国产片特级美女逼逼视频| 一级毛片aaaaaa免费看小| 人人妻人人澡欧美一区二区| 色综合站精品国产| 2021少妇久久久久久久久久久| av线在线观看网站| 1000部很黄的大片| 久久精品久久久久久噜噜老黄 | 亚洲国产日韩欧美精品在线观看| 婷婷色综合大香蕉| 久久99热这里只频精品6学生 | 亚洲成av人片在线播放无| 国产 一区精品| 国产成年人精品一区二区| 91久久精品国产一区二区三区| 精品久久久久久成人av| 三级国产精品欧美在线观看| 免费看美女性在线毛片视频| 日韩成人av中文字幕在线观看| 日本三级黄在线观看| 午夜视频国产福利| 亚洲精品乱码久久久久久按摩| 色综合亚洲欧美另类图片| 午夜福利视频1000在线观看| 免费av观看视频| 少妇人妻一区二区三区视频| 亚洲综合精品二区| 国产 一区 欧美 日韩| 又粗又爽又猛毛片免费看| 少妇裸体淫交视频免费看高清| 国产乱人偷精品视频| 小说图片视频综合网站| 久久久久久伊人网av| 成人性生交大片免费视频hd| 日韩成人伦理影院| 国产 一区精品| 亚洲国产色片| 久久鲁丝午夜福利片| 看非洲黑人一级黄片| 午夜老司机福利剧场| 亚洲国产日韩欧美精品在线观看| 国产私拍福利视频在线观看| 最近2019中文字幕mv第一页| 国产精品一区二区在线观看99 | 男女下面进入的视频免费午夜| 精品欧美国产一区二区三| 国产伦精品一区二区三区四那| 久久久成人免费电影| 99热这里只有是精品在线观看| 亚洲精品久久久久久婷婷小说 | 水蜜桃什么品种好| 黄色日韩在线| 高清午夜精品一区二区三区| 日本猛色少妇xxxxx猛交久久| 欧美另类亚洲清纯唯美| 波多野结衣高清无吗| 毛片女人毛片| 欧美激情国产日韩精品一区| 亚洲国产精品sss在线观看| av在线天堂中文字幕| 国产91av在线免费观看| 寂寞人妻少妇视频99o| 嫩草影院精品99| 久久久a久久爽久久v久久| 国产乱人视频| 99国产精品一区二区蜜桃av| 看黄色毛片网站| 免费电影在线观看免费观看| 特大巨黑吊av在线直播| 一区二区三区高清视频在线| 国产免费视频播放在线视频 | 成人一区二区视频在线观看| 色噜噜av男人的天堂激情| 免费黄色在线免费观看| 欧美激情久久久久久爽电影| 国产亚洲午夜精品一区二区久久 | 噜噜噜噜噜久久久久久91| 国产真实乱freesex| 免费无遮挡裸体视频| 日韩大片免费观看网站 | 中文字幕久久专区| 免费播放大片免费观看视频在线观看 | 深爱激情五月婷婷| 国产综合懂色| av播播在线观看一区| 观看美女的网站| 国产成人精品一,二区| 国产三级在线视频| 春色校园在线视频观看| 熟妇人妻久久中文字幕3abv| 免费播放大片免费观看视频在线观看 | 最近视频中文字幕2019在线8| 啦啦啦啦在线视频资源| 永久免费av网站大全| av国产久精品久网站免费入址| 国产伦在线观看视频一区| 精品午夜福利在线看| 国产v大片淫在线免费观看| 免费一级毛片在线播放高清视频| 欧美bdsm另类| 午夜激情福利司机影院| 欧美日韩综合久久久久久| 日本爱情动作片www.在线观看| 国产成人a区在线观看| 男人舔奶头视频| 欧美zozozo另类| 久久精品国产鲁丝片午夜精品| 日韩欧美 国产精品| 亚洲国产欧美在线一区| 麻豆精品久久久久久蜜桃| 小说图片视频综合网站| 久久久精品94久久精品| 久热久热在线精品观看| 欧美不卡视频在线免费观看| 成人特级av手机在线观看| 精品久久久久久成人av| 亚洲精品久久久久久婷婷小说 | 久久久久久久久久久丰满| 1000部很黄的大片| 两个人视频免费观看高清| 国产单亲对白刺激| 免费观看在线日韩| or卡值多少钱| 99久久成人亚洲精品观看| 两个人的视频大全免费| 99九九线精品视频在线观看视频| 又黄又爽又刺激的免费视频.| 国产精品av视频在线免费观看| 免费看日本二区| 2021天堂中文幕一二区在线观| 男人和女人高潮做爰伦理| 熟女电影av网| 午夜亚洲福利在线播放| 97超碰精品成人国产| 欧美性猛交黑人性爽| 夜夜爽夜夜爽视频| 丰满人妻一区二区三区视频av| 国产乱人偷精品视频| eeuss影院久久| 国产精品一二三区在线看| 久久久久久九九精品二区国产| 岛国在线免费视频观看| 亚洲欧美日韩东京热| 国产精品女同一区二区软件| 亚洲人成网站在线观看播放| 有码 亚洲区| 观看免费一级毛片| 亚洲av成人精品一二三区| 简卡轻食公司| 人妻夜夜爽99麻豆av| 日韩欧美精品免费久久| 欧美最新免费一区二区三区| 久久99热这里只频精品6学生 | 亚洲精品自拍成人| 亚洲欧美日韩高清专用| 一个人看视频在线观看www免费| 综合色av麻豆| 久久这里有精品视频免费| 国产一区二区在线观看日韩| 国语对白做爰xxxⅹ性视频网站| 欧美日本视频| 欧美性感艳星| 欧美高清成人免费视频www| АⅤ资源中文在线天堂| 国产精品伦人一区二区| 中文欧美无线码| 国产黄色视频一区二区在线观看 | 亚洲欧美一区二区三区国产| 边亲边吃奶的免费视频| 亚洲国产精品成人久久小说| 成年女人看的毛片在线观看| 春色校园在线视频观看| 午夜福利在线观看免费完整高清在| 免费搜索国产男女视频| 亚洲国产精品合色在线| 国产亚洲最大av| 成人综合一区亚洲| 高清日韩中文字幕在线| 久久精品国产鲁丝片午夜精品| 日韩中字成人| 欧美xxxx性猛交bbbb| 精品人妻偷拍中文字幕| 成人漫画全彩无遮挡| 我的老师免费观看完整版| 18禁在线无遮挡免费观看视频| 国产伦一二天堂av在线观看| 淫秽高清视频在线观看| 成人一区二区视频在线观看| 国产精品三级大全| 麻豆一二三区av精品| 变态另类丝袜制服| 老女人水多毛片| 久久精品夜夜夜夜夜久久蜜豆| 又爽又黄无遮挡网站| 久久精品人妻少妇| 久久久色成人| 色网站视频免费| 欧美成人a在线观看| 大香蕉久久网| 少妇猛男粗大的猛烈进出视频 | 我要搜黄色片| kizo精华| 欧美精品国产亚洲| 国产色爽女视频免费观看| 最新中文字幕久久久久| 亚洲成人久久爱视频| 国产精品综合久久久久久久免费| 在现免费观看毛片| 国产女主播在线喷水免费视频网站 | 亚洲伊人久久精品综合 | 亚洲精品aⅴ在线观看| 亚洲欧美清纯卡通| 国产老妇女一区| 成人午夜高清在线视频| 伦理电影大哥的女人| 毛片一级片免费看久久久久| 色综合色国产| 亚洲精品影视一区二区三区av| 成人亚洲欧美一区二区av| 一区二区三区乱码不卡18| 人体艺术视频欧美日本| 国产精华一区二区三区| 夜夜看夜夜爽夜夜摸| 一区二区三区免费毛片| 全区人妻精品视频| 欧美xxxx黑人xx丫x性爽| 欧美激情久久久久久爽电影| 成人特级av手机在线观看| 国产亚洲av片在线观看秒播厂 | 中文亚洲av片在线观看爽| 亚洲五月天丁香| 人妻制服诱惑在线中文字幕| 日本av手机在线免费观看| 麻豆成人av视频| 听说在线观看完整版免费高清| kizo精华| 嫩草影院精品99| 亚洲国产日韩欧美精品在线观看| 嫩草影院精品99| 亚洲精华国产精华液的使用体验| 男女国产视频网站| 亚洲精华国产精华液的使用体验| 国产国拍精品亚洲av在线观看| 欧美激情在线99| 精品少妇黑人巨大在线播放 | 最近2019中文字幕mv第一页| 亚洲精品日韩在线中文字幕| 欧美丝袜亚洲另类| 日本免费一区二区三区高清不卡| 亚洲国产色片| 欧美一区二区精品小视频在线| 国产美女午夜福利| 男人舔奶头视频| 久久草成人影院| 九九久久精品国产亚洲av麻豆| 国产色爽女视频免费观看| 日日撸夜夜添| 成人一区二区视频在线观看| av又黄又爽大尺度在线免费看 | av在线观看视频网站免费| 一卡2卡三卡四卡精品乱码亚洲| 色吧在线观看| 午夜精品一区二区三区免费看| 国产成人精品婷婷| 国产在线男女| 一级毛片久久久久久久久女| 亚洲经典国产精华液单| 亚洲精品国产av成人精品| 国产精品综合久久久久久久免费| 麻豆av噜噜一区二区三区| 国产 一区精品| 又爽又黄a免费视频| 男女边吃奶边做爰视频| 欧美日韩国产亚洲二区| 国产免费视频播放在线视频 | 亚洲精品久久久久久婷婷小说 | 免费观看在线日韩| 男人和女人高潮做爰伦理| 91午夜精品亚洲一区二区三区| 99热这里只有是精品在线观看| 97人妻精品一区二区三区麻豆| 色尼玛亚洲综合影院| 日韩三级伦理在线观看| 亚洲天堂国产精品一区在线| 国产精品日韩av在线免费观看| 不卡视频在线观看欧美| 一本久久精品| 国内少妇人妻偷人精品xxx网站| 青春草国产在线视频| 五月伊人婷婷丁香| 国产 一区 欧美 日韩| 精品久久国产蜜桃| 国产精品99久久久久久久久| 深爱激情五月婷婷| 黄色日韩在线| 午夜爱爱视频在线播放| 麻豆久久精品国产亚洲av| 久久久久性生活片| 久久精品国产自在天天线| 久久久a久久爽久久v久久| 男女国产视频网站| 人妻制服诱惑在线中文字幕| av视频在线观看入口| 亚洲成人av在线免费| 老司机影院成人| 日本五十路高清| 久热久热在线精品观看| 日韩欧美三级三区| 国产一区有黄有色的免费视频 | 97超视频在线观看视频| 免费观看精品视频网站| 久久综合国产亚洲精品| 国语自产精品视频在线第100页| 午夜精品在线福利| 只有这里有精品99| 日韩一区二区三区影片| 男女下面进入的视频免费午夜| 一级爰片在线观看| 国产视频首页在线观看| 黄色配什么色好看| 好男人视频免费观看在线| 成人毛片a级毛片在线播放| 51国产日韩欧美| 日韩欧美精品v在线| 亚洲国产精品国产精品| 国产精品国产三级国产av玫瑰| 亚洲人成网站在线观看播放| 日日摸夜夜添夜夜爱| av在线蜜桃| 桃色一区二区三区在线观看| 精品国产三级普通话版| 一级爰片在线观看| 最近视频中文字幕2019在线8| 黄色日韩在线| 精品人妻熟女av久视频| 国产一区二区三区av在线| 国产乱人偷精品视频| 长腿黑丝高跟| 国产探花极品一区二区| 欧美激情在线99| 国产一级毛片七仙女欲春2| 麻豆乱淫一区二区| 欧美bdsm另类| 国产高清三级在线| 狂野欧美激情性xxxx在线观看| 亚洲最大成人中文| 一区二区三区乱码不卡18|