13,316 research outputs found

    Locating influential nodes via dynamics-sensitive centrality

    Get PDF
    With great theoretical and practical significance, locating influential nodes of complex networks is a promising issues. In this paper, we propose a dynamics-sensitive (DS) centrality that integrates topological features and dynamical properties. The DS centrality can be directly applied in locating influential spreaders. According to the empirical results on four real networks for both susceptible-infected-recovered (SIR) and susceptible-infected (SI) spreading models, the DS centrality is much more accurate than degree, kk-shell index and eigenvector centrality.Comment: 6 pages, 1 table and 2 figure

    Degree correlation effect of bipartite network on personalized recommendation

    Get PDF
    In this paper, by introducing a new user similarity index base on the diffusion process, we propose a modified collaborative filtering (MCF) algorithm, which has remarkably higher accuracy than the standard collaborative filtering. In the proposed algorithm, the degree correlation between users and objects is taken into account and embedded into the similarity index by a tunable parameter. The numerical simulation on a benchmark data set shows that the algorithmic accuracy of the MCF, measured by the average ranking score, is further improved by 18.19% in the optimal case. In addition, two significant criteria of algorithmic performance, diversity and popularity, are also taken into account. Numerical results show that the presented algorithm can provide more diverse and less popular recommendations, for example, when the recommendation list contains 10 objects, the diversity, measured by the hamming distance, is improved by 21.90%.Comment: 9 pages, 3 figure

    Multiparty quantum secret splitting and quantum state sharing

    Full text link
    A protocol for multiparty quantum secret splitting is proposed with an ordered NN EPR pairs and Bell state measurements. It is secure and has the high intrinsic efficiency and source capacity as almost all the instances are useful and each EPR pair carries two bits of message securely. Moreover, we modify it for multiparty quantum state sharing of an arbitrary mm-particle entangled state based on quantum teleportation with only Bell state measurements and local unitary operations which make this protocol more convenient in a practical application than others.Comment: 7 pages, 1 figure. The revision of the manuscript appeared in PLA. Some procedures for detecting cheat have been added. Then the security loophole in the original manuscript has been eliminate
    • …
    corecore