40 research outputs found

    A hybrid influence method based on information entropy to identify the key nodes

    Get PDF
    Identifying the key nodes in complicated networks is an essential topic. A number of methods have been developed in recent years to solve this issue more effectively. Multi-attribute ranking is a widely used and efficient method to increase the accuracy of identifying the key nodes. Using k-shell iteration information and propagation threshold differences, we thoroughly analyze the node’s position attribute and the propagation attribute to offer a hybrid influence method based on information entropy. The two attributes will be weighted using the information entropy weighting method, and then the nodes’ influence ranking will be calculated. Correlation experiments in nine different networks were carried out based on the Susceptible–Infected–Recovered (SIR) model. Among these, we use the imprecision function, Kendall’s correlation coefficient, and the complementary cumulative distribution function to validate the suggested method. The experimental results demonstrate that our suggested method outperforms previous node ranking methods in terms of monotonicity, relevance, and accuracy and performs well to achieve a more accurate ranking of nodes in the network

    Machine Learning-based Malicious Application Detection of Android

    No full text
    In this paper, we propose a machine learning based approach to detect malicious mobile malware Android applications. Our work is able to capture instantaneous attacks that cannot be effectively detected in past work. Based on the proposed approach, we implemented a malicious app detection tool, named Androidetect. First, we analyze the relationship between system functions, sensitive permissions and sensitive APIs. The combination of system functions has been used to describe the application behaviors and construct eigenvectors. Subsequently, based on the eigenvectors, we compare the methodologies of naive Bayesian, J48 decision tree and application functions decision algorithm (AFDA) regarding effective detection of malicious Android applications. Androidetect is then applied to test sample programs and real world applications. The experimental results prove that Androidetect can better detect malicious applications of Android by using a combination of system functions compared with previous work.Peer reviewe

    Information Entropy Based on Propagation Feature of Node for Identifying the Influential Nodes

    No full text
    For understanding and controlling spreading in complex networks, identifying the most influential nodes, which can be applied to disease control, viral marketing, air traffic control, and many other fields, is of great importance. By taking the effect of the spreading rate on information entropy into account, we proposed an improved information entropy (IIE) method. Compared to the benchmark methods in the six different empirical networks, the IIE method has been found with a better performance on Kendall’s Tau and imprecision function under the Susceptible Infected Recovered (SIR) model. Especially in the Facebook network, Kendall’s Tau can grow by 120% as compared with the original IE method. And, there is also an equally good performance in the comparative analysis of imprecise functions. The imprecise functions’ value of the IIE method is smaller than the benchmark methods in six networks

    Combining Multilevel Features for Remote Sensing Image Scene Classification With Attention Model

    No full text

    Information Spreading on Activity-Driven Temporal Networks with Two-Step Memory

    No full text
    Information spreading dynamics on the temporal network is a hot topic in the field of network science. In this paper, we propose an information spreading model on an activity-driven temporal network, in which a node is accepting the information dependents on the cumulatively received pieces of information in its recent two steps. With a generalized Markovian approach, we analyzed the information spreading size, and revealed that network temporality might suppress or promote the information spreading, which is determined by the information transmission probability. Besides, the system exists a critical mass, below which the information cannot globally outbreak, and above which the information outbreak size does not change with the initial seed size. Our theory can qualitatively well predict the numerical simulations

    The Impact of Accessibility of Urban Central Parks on Housing Prices of Fuzhou

    No full text
    The paper analysed the impact of accessibility of urban parks within the third ring on housing prices of Fuzhou through network analysis and SPSS correlation analysis based on data of sources like remote-sensing image, web crawling and urban road network, discovering that: (1)The density of residence within the third ring of Fuzhou decreases from the centre to the edges; (2) The housing price, ranging between 18000 and 28000 RMB/ m2, peaks in the city centre; (3) For houses within the third ring of Fuzhou, Gulou District enjoys the greatest access to urban parks while Cangshan District is the poorest in this regard. (4) The residence within the third ring of Fuzhou could be rated as A or A- in terms of access to urban parks, with an overall excellence performance; (5) The walking distance to the parks is significantly correlated with the housing price. The shorter the distance, the higher the price. Regarding this, the paper proposed the following suggestions: (1) Revise the routes to Gaogai Mountain Park by increasing entrances and exists to improve its accessibility; (2) Improve the transportation network and increase footpaths to the park, thus shortening the distance between the park and the surrounding residences

    High-Performance Amorphous Zinc–Tin–Oxide Thin-Film Transistors With Low Tin Concentration

    No full text
    In this paper, we present thin-film transistors (TFTs) with a zinc–tin–oxide (ZTO) layer achieved through magnetron co-sputtering. Amorphous ZTO TFTs with an Sn concentration of 2.49%, 6.95%, 7.11%, 11.95%, and 16.47% were fabricated, to investigate the effect of low-doped Sn. With a doping of 2.49% Sn, the electrical characteristics of TFTs can be obviously improved. After annealing at 440 °C, the optimal TFTs displayed a field-effect mobility of 8.71 cm2/ Vâ‹…s\text{V}\cdot \text{s} , a high Ion/off\text{I}_{\mathrm{ on/off}} ratio of over 10810^{8} , a subthreshold swing of 0.17 V/decade, and a turn-on voltage of −0.4 V, even with an Sn concentration of only 11.95%. Meanwhile, the shift of turn-on voltage under negative gate bias stress was only −0.4 V
    corecore