Next Article in Journal
Sustaining Quasi De-Sitter Inflation with Bulk Viscosity
Previous Article in Journal
On Equation Manifolds, the Vinogradov Spectral Sequence, and Related Diffeological Structures
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

The Identification of Influential Nodes Based on Neighborhood Information in Asymmetric Networks

1
School of Transportation and Logistics, Southwest Jiaotong University, Chengdu 611756, China
2
Beijing National Railway Research & Design Institute of Signal & Communication Group Co., Ltd., Beijing 100070, China
3
College of Engineering, Zhejiang Normal University, Jinhua 321004, China
4
Lanxi Road and Traffic Supervision Center, Jinhua 321102, China
5
Key Laboratory of Urban Rail Transit Intelligent Operation and Maintenance Technology & Equipment of Zhejiang Province, Zhejiang Normal University, Jinhua 321004, China
*
Author to whom correspondence should be addressed.
Symmetry 2024, 16(2), 193; https://doi.org/10.3390/sym16020193
Submission received: 27 November 2023 / Revised: 18 January 2024 / Accepted: 22 January 2024 / Published: 6 February 2024

Abstract

:
Identifying influential nodes, with pivotal roles in practical domains like epidemic management, social information dissemination optimization, and transportation network security enhancement, is a critical research focus in complex network analysis. Researchers have long strived for rapid and precise identification approaches for these influential nodes that are significantly shaping network structures and functions. The recently developed SPON (sum of proportion of neighbors) method integrates information from the three-hop neighborhood of each node, proving more efficient and accurate in identifying influential nodes than traditional methods. However, SPON overlooks the heterogeneity of neighbor information, derived from the asymmetry properties of natural networks, leading to its lower accuracy in identifying essential nodes. To sustain the efficiency of the SPON method pertaining to the local method, as opposed to global approaches, we propose an improved local approach, called the SSPN (sum of the structural proportion of neighbors), adapted from the SPON method. The SSPN method classifies neighbors based on the h-index values of nodes, emphasizing the diversity of asymmetric neighbor structure information by considering the local clustering coefficient and addressing the accuracy limitations of the SPON method. To test the performance of the SSPN, we conducted simulation experiments on six real networks using the Susceptible–Infected–Removed (SIR) model. Our method demonstrates superior monotonicity, ranking accuracy, and robustness compared to seven benchmarks. These findings are valuable for developing effective methods to discover and safeguard influential nodes within complex networked systems.

1. Introduction

Network science, the employment of nodes to represent entities and edges to denote connections, serves as a fundamental tool for comprehending and modeling complex systems across various disciplines [1]. It effectively describes and elucidates dynamic relationships and behaviors within these systems. As we know, finding the critical nodes is often considered the first step when studying complex networks. For example, transportation networks are vulnerable to disruptions due to accidents, congestion, or unexpected events. Identifying and fortifying vital nodes helps improve the resilience of the overall network [2]. Similarly, the identification of key operatives within the Mafia network [3] has been proven to be an effective strategy, leading to the total disruption of the criminal network in the least number of steps. Hence, identifying critical nodes is often of paramount theoretical and practical importance when investigating complex network systems in the real world, making it a highly significant topic within network science.
Up to now, researchers have introduced diverse methods across disciplines for identifying influential spreaders in complex networks, broadly categorized into four subclassifications [4]. The first, structural centrality, identifies critical nodes based on the network’s topological structure, encompassing methods such as degree, betweenness, and coreness. The second, iterative refinement centralities, considers dynamic processes within a static topological framework, accounting for the mutual enhancement effect [5]. Notably, the PageRank [6], VoteRank [7], and variants like eigenvector centrality [8] and leader rank centrality [9], fall into this category. The third subtype quantifies nodal importance through node operation, with the CI method [10] as a classic example. The final category, dynamic–sensitive methods, examines how a node’s influence varies with dynamic processes under different parameters, including the time-aware method [11].
Nonetheless, no single method currently can dominate in identifying influential nodes in complex networks, making finding the most critical nodes a formidable challenge. This study is committed to comprehensively investigating approaches to quantifying key nodes using network structural features. Lü et al. [4] provide more methods for interested readers in this field. Many methods related to topological structures have been proposed for finding the most influential spreaders in networks. From the perspective of a structural scale, the existing methods can be classified into global, local, and semi-local structural methods [12]. The global-structure-feature-based methods, including closeness centrality [13], betweenness centrality [14], coreness [15] and HybridRank Centrality [7], rely on global information to characterize nodal importance.
In contrast, the local-information-based method, with its relatively low time complexity for calculating local structure features, is gaining attention in influential network node identification. Lü et al. [16] proposed an h-index, balancing coreness and degree, but it focuses on high-influence neighbors, overlooking low-influence nodes with small degree values. Improved extension methods include the local h-index [17], extended h-index centrality [18], and the weighted h-index [19]. Liu et al. [20] introduced a method based on local structural similarity, utilizing neighbor analysis. In addition, topology features like the clustering coefficient are integrated for accurate nodal influence quantification; for instance, Gao et al. [21], by introducing local structure centrality using a clustering coefficient, proposed a novel method called local centrality. Zhu et al. [22] superimposed node degree centrality with neighbor layer nodes, achieving more effective results than traditional centrality algorithms. Furthermore, semi-local structural methods, integrating local and global perspectives, include the entropy-based ranking measure (ERM) [23] and extended cumulative coefficient ranking method (ECRM) [24].
This study primarily focuses on methodologies for quantifying critical nodes, emphasizing network structural attributes, particularly leveraging local structural characteristics. Notably, a novel centrality method, SPON (sum of proportion of neighbors) [25], balances algorithmic efficiency and accuracy. Despite its lower time complexity for large-scale networks, SPON falls short of accuracy compared to the degree and h-index. To address this, we propose an improved approach, called the sum of the structural proportion of neighbors (SSPN), based on the SPON. The SSPN maintains the simplicity and efficiency of the original method while preserving its capability to identify highly influential nodes and enhancing its performance in identifying nodes critical for the propagation process. Our improvements incorporate the h-index and local clustering coefficients, resulting in a better alignment with the Susceptible–Infected–Removed (SIR) model, retaining monotonicity and robustness without added computational complexity.
The structure of this study is as follows: Firstly, we present our proposed method and benchmark methods in Section 2. Subsequently, Section 3 delineates our experimental setup and evaluation metrics. Section 4 presents the experimental results by calculating the monotonicity, accuracy, and robustness performance. Finally, Section 5 summarizes our primary findings and shortcomings and outlines potential directions for future work.

2. Methods

This section primarily elucidates the node centrality employed in this research. We express an asymmetric undirected network as a graph G = V , E , where V signifies the node set ( V is the number of nodes in the network) and E represents the edge set ( E presents the number of edges). The adjacency matrix A serves as the representation of the network’s topological structure, reflecting the connections between nodes. If a i j is equal to 1, it indicates a connection between nodes v i and v j , while a i j = 0 denotes the absence of a connection.

2.1. Benchmark Methods

2.1.1. Baseline Methods: Degree ( d ), K-Shell ( k s ), and H-Index ( h )

(1)
Degree ( d )
Degree ( d ) is the primary method used to characterize node importance [26]. For node v i , its degree defined as
d i = N i 1
where N i 1 denotes the set of neighbors of v i in the one-hop neighborhood.
(2)
K-shell ( k s )
Kitsak et al. [15] introduced the coreness ( k s ) method, which assigns nodes to specific layers, for identifying the node importance within a network. The k s value for each node is determined through a sequential pruning process, starting by removing nodes with a given degree value ( d i = 1 ) from the network. Subsequently, higher k-shell values are successively removed until no nodes remain in the network. Consequently, each node is associated with a k s index, and the network can be stratified into k-shell layers.
(3)
H-index ( h )
The h-index ( h ) was initially designed as a metric to assess individual researchers’ scholarly impact and productivity, primarily based on the citation counts of their publications [16]. Recently, its applicability has been extended to identify pivotal nodes. The h-index for node v i in a network with k i neighbors is defined as
h i = H d j 1 ,   d j 2 , ,   d j s , ,   d j k i , j N i 1
where the operator H determines the maximum integer h for which there exist at least h neighbors whose degrees are greater than or equal to h .

2.1.2. Extended Methods: Social Capital ( S c ), Local H-Index ( L h ), Neighborhood Coreness ( C n c + )

(1)
Social Capital ( S c )
Zhou et al. [27] introduced the concept of “Social Capital” as a concise method for characterizing local centrality and identifying fast influencers within intricate network structures. Their premise revolves around the notion that a node assumes a pivotal role in a network if it exhibits a high degree and shares connections with numerous high-degree neighboring nodes. The formal definition of social capital ( S c ) is articulated as
S i c = d i + j N i 1 d j .
(2)
Local h-index ( L h )
Liu et al. [17] overcome the weakness of the h-index model by putting forward a modified method named local h-index ( L h ) centrality. The method simultaneously accounts for both the intrinsic influence of the node itself and that of its neighbors. This composite metric comprises two distinct components: the initial component signifies the node’s h-index, which gauges its influence concerning the number of high-quality neighbors. The L h value of v i is defined as
L i h = h i + j N i 1 h j .
(3)
Neighborhood coreness ( C n c )
The influence of a node in a network is often associated with the number of neighbors it has, as this connectivity reflects its potential to affect or be affected by various processes within the network. Hence, Bae et al. [28] developed a ranking method that simultaneously considers the degree and coreness of a node, and defines the neighborhood coreness C n c of node v i as
C i n c = j N i 1 k j s ,
where k j s is the k -shell index of its neighbor v j .
Recursively, the extended neighborhood coreness C n c + of node v i is defined as
C i n c + = j N i 1 C j n c .

2.2. Proposed Methods

The recently proposed SPON method [25] concerning the sum of the proportion of neighbors only requires information within the three-hop neighborhood of the node. The SPON method involves a two-step calculation process. First, the neighbor proportion (i.e., P N ) is defined as
P N i = N i 2 N i 1 ,
where N i 1 is the set of the first-order neighbors and N i 2 is the set of the second-order neighbors.
Then, the summation of neighbor proportions, denoted as S P O N , for node v i is defined as
S P O N i = j N i 1 P N j .
A higher S P O N value of one node represents its more significant influence and its importance. As mentioned earlier, a higher P N value implies that the node can establish connections with a more significant number of second-order neighbors through a small number of first-order neighbors, indicating the potential ability of node v i through infecting its neighbor v j . The influence of v i on the network is necessarily high when it and its neighboring hub are impacted and could spread to the other part of the network. The sum of P N that is the S P O N can be considered the importance of v i .
Taking Figure 1 as an illustrative example, we focus on node v i , in whose vicinity are four pink nodes (i.e., v 1 , v 2 , v 3 , and v 4 ), denoted as N i 1 , and orange nodes, which are its second-order neighbors (i.e., N i 2 ). It is clear that N i 1 = 4 and N i 2 = 8 , respectively. The value of P N i is 2 according to Equation (7). If the second-order neighbors of v i are disregarded, v i is directly connected to its first-order neighbors, and there is no indirect connection between these neighbors. These first-order neighbors of node v i are entirely identical, while the connection structure between the first-order neighbors and the second-order neighbors of v i is entirely different. Based on the discussions of Liu et al. [29] and Yu et al. [30], once a disease originates from node v i and propagates through one path, v i will be the initial infected node. Subsequently, node v 1 is infected, and the contagion may extend to the second-order neighbor nodes via v 1 , to v 5 and v 6 . A similar scenario may also occur within v 2 and its neighbors in N i 2 . However, due to the entirely distinct structures between nodes v 10 , v 11 , v 12 , and v 2 , the propagation effect of v 1 and v 2 are completely different. Nevertheless, the P N neglects the difference, considering only the quantity of second-order neighbors.
To address this limitation, this study introduces an innovative and effective SSPN model by partitioning each second-order neighboring node into distinct regions and assigning weights to the regions based on their features. The proposed method relies on the h-index values of each node to subdivide the second-order neighbor set N i 2 into subregions and allocate weights accordingly.
As illustrated in Table 1, each node in the simple network exhibits its spreading ability based on the SIR model simulation. Notably, SPON only classifies the nodes into eight groups, aligning with our prior discussion. Upon examining the graph in Figure 1, we determine the epidemic threshold (i.e., β c ) to be 0.361, choosing a β value (0.37) slightly larger than β c for subsequent comparison. In the computation results, we observe τ S P O N = 0.733 and τ S S P N = 0.755 , clearly indicating an improvement in our method over SPON.
However, we find that SSPN also attributes nodes to distinct ranking positions, but these ranking results are different from the SIR model results, as shown in Table 1. We attribute this phenomenon to the inherent randomness of SIR infection in small networks, diminishing its advantage result. Nevertheless, as the network expands, the advantages of our method will become more apparent, as substantiated by subsequent accuracy validations.
Initially, we utilize information from first-order neighboring nodes as the foundation for accurately delineating the subregions of second-order neighboring nodes. The proportion P p i , delineated by the first-order neighbors, is defined as
P p i = N 1 , p i N 1 i , p = α 1 , α 2 ,
where N 1 i represents the number of first-order neighbors of node v i , N 1 , p i signifies the quantity of the subcategory p within the first-order neighbors, the subcategory α 1 comprises nodes with an h-index greater than or equal to the h-index of node v i , and the subcategory α 2 comprises nodes with an h-index less than that of node v i .
Subsequently, the values of P p i for two categories are mapped onto the set of second-order neighbors, with the quantity of the two sets being defined as
N 2 , p i = P p i × N 2 i p = α 1 N 2 i N 2 , α 1 i p = α 2 .
It is important to note that the computation of P p i may result in decimals. A floor function, denoted by the square bracket (“[]”), is adopted to calculate the N 2 , α i . In detail, the nodes belonging to the second-order neighbors N 2 i are ranked according to their h-index and then segmented by the set sizes from Equation (10). The nodes with higher h-index values are grouped into N 2 , α 1 i , and the remaining nodes are collected in N 2 , α 2 i .
After segmenting the second-order region, we evaluate the structural properties of different areas. This analysis is centered on measuring the structural features of various categorized regions, employing clustering coefficients for precision. The clustering coefficient is defined as
C l p i = 0 N 1 , p i = 1 2 E 2 , p i N 1 , p i N 1 , p i 1 N 1 , p i > 1 , p = α 1 , α 2 ,
where E 2 , p i denotes the number of edges between nodes within the node set N 2 , p i .
Building upon the earlier discussion, we introduce a novel approach for quantifying the significance of nodes. This is achieved by emphasizing the uniqueness of various regions by summating the h-index values within different categorized regions. In alignment with this concept, we redefine a method known as S P N , the definition of which is as follows:
S P N i = p α 1 , α 2 N 2 , p i j N 2 , p i h j N 1 i ( 1 + C l p i ) .
Lastly, neighborhood rules should effectively enhance the accuracy of identifying the most influential nodes. The influence of node v i extends beyond itself and encompasses the nodes in its vicinity. Along these lines, the S S P N model can be regarded as an evolution of the S P N model, defined through the aggregation of neighboring nodes, as
S S P N i = j N 1 i S P N j .
To explore the core algorithm of SSPN, we use node v i in Figure 1 as an illustrative example. Node v i is surrounded by four neighboring nodes, which are nodes v 1 , v 2 , v 3 , and v 4 , constituting the set N 1 i . It is evident that N 1 i = 4 , and similarly that N 2 i = 8 . Next, we calculate the values of P based on Equation (9), enabling us to categorize the neighborhood into two classes based on their h-index values. For instance, nodes with an h-index greater than or equal to v i are presented as v 2 , v 3 , and v 4 , and grouped as N ( 1 , α 1 ) i . Hence, we obtain N ( 1 , α 1 ) i = 3 , and similarly, N ( 1 , α 2 ) i = 1 . Subsequently, we determine that P α 1 i = 3 / 4 , and P α 2 i = 1 / 4 . The eight nodes in the second-order neighborhood of v i are divided into two categories according to their value of P . The six nodes with a higher h-index are grouped into N ( 2 , α 1 ) i , which includes nodes v 7 , v 8 , v 9 , v 10 , v 11 , and v 12 . The rest of the nodes, v 5 and v 6 , belong to the set N ( 2 , α 2 ) i . Afterwards, we must compute the clustering coefficients ( C l p i ) for the different categories. N 1 , α 2 i contains only one node, resulting in C l α 2 i = 0 . Since N 1 , α 1 i > 1, we can calculate that C l α 1 i = 2 × 4 3 × ( 3 1 ) = 4 3 , where 4 is the number of edges between nodes v 7 , v 8 , v 9 , v 10 , v 11 , and v 12 in set N ( 2 , α 1 ) i . Finally, based on the calculation above, we arrived at S P N i = 6 × 3 + 3 + 3 + 2 + 2 + 2 4 ( 1 + 4 3 ) + 2 × 1 + 1 4 ( 1 + 0 ) = 10.64 .
Observing the above algorithms, in comparison to SPON, our method has not introduced excessive complexity; rather, it simply involves an additional round of weighted classification. Specifically, the time complexity of SSPN is mainly divided into two stages. First, the calculation of the P p i values involve the second-order neighbors of each node. If the average degree is used to represent the number of neighbors, denoted as n ¯ , the time complexity of this stage is O n ¯ 2 . Then, the second stage, concerning the categorized P p i values of the immediate neighbors, has the time complexity of O n . Based on the two stages, the overall time complexity of SSPN is determined by the size of neighbors of each node, taking the value of O n ¯ 2 .

3. Evaluation Methods

3.1. Single Seed SIR Model

To objectively assess the SSPN method used in this study, we adopt the widely applied Susceptible–Infectious–Recovered (i.e., SIR) model for simulating the dynamics of infectious disease propagation. It stratifies the nodes into three distinct categories: susceptible (S), infected (I), and recovered (R). According to Moreno [31], only v i will be set as the I state at the beginning of the simulation, while other nodes are in S states. In each simulating round, the I -state node infect its S -state neighbors with probability β . The infected nodes are recovered as R -state with probability γ and cannot be infected in the subsequent rounds. This process continues until the number of infected nodes does not increase. The number of recovered nodes (N) in the whole network is the influence strength of the seed v i (i.e., the first infected node). The numerical simulation is performed T times, and the average over this period of simulation is analyzed. The infected probability β will be set slightly higher than the epidemic threshold β C established by Bae and Kim [28]. The dynamic equations governing the SIR model are defined as
d S / d ( t ) = β S I d I / d ( t ) = β S I γ I d R / d ( t ) = γ I ,
where the disease transmission rate is symbolized as β , characterizing the ease with which the disease spreads from one individual to another. In parallel, the recovery rate is γ , signifying the velocity at which infected individuals recover and remain immune to the disease.
The spreading influence of node v i is evaluated as
N a = n I + n R N i t ,
where N i t denotes the number of iterations, n I represents the number of infected nodes, and n R represents the number of nodes that have undergone recovery. It is pertinent to mention that we have established 1000 independent runs with 1000 iterations and γ = 1 , which can acquire suitable values for this calculation.
It is worth mentioning that the infection probability β is larger than the epidemic criticality β C in our simulation of the SIR model. An epidemic’s critical threshold [31] is defined as
β C = k λ k 2 ,   λ = 1.0 ,
where k denotes the average degree, 〈 k 2 〉 denotes the average of the square of the degree.
Inherent dynamics inform this deliberate choice of infectious disease. A higher β   ensures a more contagious pathogen, leading to rapid transmission and sustained prevalence. This prioritization acknowledges the need for proactive measures to effectively curb the impact of highly infectious diseases, emphasizing the importance of strategies that outpace the epidemic’s critical threshold.

3.2. Evaluation Indicators

A series of indicators, including monotonicity, accuracy, and robustness, are arranged to evaluate the proposed SSPN method compared to various benchmark methods. The results obtained from the SIR model are deemed the standard values.

3.2.1. Monotonicity ( M )

Centrality should be able to uniquely determine the node’s importance rather than roughly categorizing it. This study employs M [28] to measure the monotonicity of the node’s importance ranking, which is defined as
M μ R = 1 r i R n r i ( n r i 1 ) R R 1 2 ,
where R denotes the ranking list generated by the ranking method μ , and n r i represents the count of nodes at the rank r i in the ranking list. The M ranges from 0 to 1, where an M value closer to 1 indicates a higher monotonicity.

3.2.2. Complementary Cumulative Distribution Function ( C C D F )

The C C D F is employed to elucidate the ranking distribution of various measuring approaches [32]. It quantifies the probability of a random variable, denoted as x , exceeding a specified threshold and is defined as
C C D F x = P r o b X > x = 1 C D F x ,
where C D F x signifies the cumulative distribution function, denoting the probability that a random variable is less than or equal to x . Generally, a more significant number of nodes sharing the same rank leads to a steeper decrease in the C C D F plot. In brief, if a curve exhibits a rapid rate of decrease, the method employed to compute this curve might have many nodes that are challenging to distinguish effectively, indicating a lower quality of the measurement method.

3.2.3. Kendall Correlation Coefficient ( τ )

The Kendall correlation coefficient ( τ ) [33] is a quantitative measure for assessing the correlation between two ordinal ranking lists. It provides a numerical representation within the interval [ 1 ,   1 ] , with a higher τ score indicating a stronger resemblance between the two ranking lists (i.e., R 1 and R 2 ), while a lower score signifies a more significant dissimilarity. The coefficient ( τ ) is defined as
τ R 1 , R 2 = 2 n c n d R 1 R 1 1 ,
where n c represents the count of concordant pairs and n d represents the count of discordant pairs in R 1 and R 2 .

3.2.4. Robustness ( R )

The connectivity test represents a superior method for assessing the model’s ability to identify important nodes and edges. In this approach, nodes are systematically removed based on their ranking, and the size of the most significant connected component (MSCC) in the remaining network is recorded after each removal. A noticeable reduction in the MSCC size indicates rapid network structure degradation, demonstrating the method’s effectiveness in efficiently identifying influential nodes. The robustness metric R , a widely accepted measure of network connectivity [34], is consistently employed and is defined as follows:
R = 1 | N | v i N | N v i | | N | ,
where N represents the set of nodes in the network, and N v i denotes the MSCC after removing the node v i from N . The ratio | N v i | / | N | represents the robustness measure r i concerning node v i . The robustness metric R quantifies the sum of r values obtained during the node removal process. The normalization factor 1 / | N | ensures that R values can be compared across networks of different sizes.

4. Experimental Results

In this section, we assess the performance of eight identification methods, including the proposed SSPN method, three baseline methods ( d , k s , h ), three extended methods S c , L h , C n c + ), and the SPON method, by using empirical networks in different domains. They include Dolphins [35] (a network portraying the social interactions among 62 dolphins), Netsci [36] (a co-authorship network consisting of 379 scientists collaborating on publications related to network analysis), Fb-pages-foods [37] (Datasets of Facebook pages from November 2017, encompassing diverse categories represented by blue-verified page networks), Euroroad [38] (an extensive infrastructure network predominantly covering Europe), Facebook (A social network representing user interactions worldwide [39]), and power grid (an integral infrastructure network spanning the western United States, ensuring vital regional electricity distribution [40]). The networks mentioned above are extensively utilized in the literature for critical node identification, showcasing a level of representativeness in our network selection. For instance, the power grid network serves as a prominent example; influential articles on the identification of critical nodes in complex networks, such as those by Wu et al. [41] and Ai et al. [42], published in Physica A, have employed this network. Additionally, the diverse structural characteristics of these networks, as they are part of infrastructure networks, substantiate the generality of our approach. The details of these networks are summarized in Table 2.

4.1. Monotonicity

We first evaluate the monotonicity of SSPN and the other methods through the M R listed in Table 3. The monotonicity ( M ) of these networks varies with different methods. The k s exhibits the poorest performance among the six real networks examined. This is primarily attributable to the possibility of multiple nodes within the k s having identical d values, leading to a suboptimal monotonicity performance in most networks. The d and h share a similar characteristic in terms of M . The extended methods (i.e., L h , S c , and C n c + ) exhibit better performances than the baseline methods, effectively distinguishing differences in node importance. In addition, the SPON method displays a distinct advantage, demonstrating superior monotonicity in most networks. The proposed SSPN method outperforms the SPON method, surpassing other models or sharing the top position. The SSPN method maintains a stable performance across networks of various scales, achieving absolute or near-absolute uniqueness. Regarding uniqueness rankings, all methods exhibit an inferior performance in the Euroroad network. This performance discrepancy can be attributed to the structural attributes of the nodes within this network, as Euroroad exhibits the smallest values of k , k m a x , and c among all networks, indicating that many nodes in this network possess similar local structures. Consequently, models relying on nonidentical structural attributes across these nodes struggle to distinguish the significance of the nodes, resulting in lower uniqueness rankings. Additionally, compared to the other seven methods, our SSPN method attains the highest average monotonicity, approaching one and surpassing the second-ranked SPON method by 0.0089. Therefore, our proposed SSPN method is a high-resolution measurement approach, with a verified, significant performance across most networks and showcasing superior node influence discrimination capabilities compared to other methods.
To elucidate the ranking distribution of the different methods and the superiority of the SSPN method, in addition to the aforementioned monotonicity measurements, we have also employed C C D F to illustrate the comparison depicted in Figure 2. These C C D F plots showcase the performance of various methods across the six networks. According to C C D F principles, when multiple nodes occupy the same rank, the C C D F plot exhibits a rapid decline in slope. Conversely, the C C D F plot slope becomes gentler when nodes have varying ranks. A gentler slope to the C C D F plot implies a better performance in the ranking distribution and a more discernible rank allocation. Among the C C D F plots, the three baseline methods (i.e., d , k s , and   h ) exhibit relatively inferior performances. In contrast, the extended methods (i.e., S c , L h , C n c + ) yield a more diverse array of measurement outcomes, with their C C D F trends approaching zero, displaying similar slopes. Notably, in the contexts of Dolphins, Fb-pages-foods, and Facebook, the C C D F lines of the SSPN method consistently follow diagonal lines with slower slopes than other methods, signifying a more competitive performance. The performance of the SPON method is slightly inferior to that of the SSPN. Among the other seven methods, SPON achieved the second-best performance. Across these six real networks, the SSPN demonstrates superior performance in both monotonicity and distribution characteristics. Notably, for the Facebook dataset, the M S S P N R value of the SSPN method demonstrates near-absolute uniqueness ( M S S P N R = 0.9999 ). The SSPN demonstrates its outstanding ability to identify pivotal nodes within information propagation.

4.2. Accuracy

To illustrate the superiority of our proposed method’s accuracy, we compare the spreading capacity of nodes simulated by the SIR model with the ranking results calculated by different methods and assess their accuracy through the Kendall correlation coefficient τ . A higher τ indicates a more accurate ranking of influential nodes. As shown in Table 4, one can observe that the proposed SSPN method, which is highly correlated with the size of the infected population, outperforms the other methods. SSPN obtains the maximum value in all network cases, outperforming the baseline methods ( d , k s , and h ) , and extended methods ( S c , L h , C n c + ), as well as SPON. This demonstrates the advantage of our proposed method. The value of SSPN is 20% higher than that of S c in the Fb-pages-foods network, and we are even pleasantly surprised to discover that our SSPN method outperforms the comparison method of SPON for all τ values. Thus, it can be observed that the further consideration of network structure characteristics in the SSPN method based on SPON is effective in improving the accuracy of identifying the critical nodes. Furthermore, S c exhibits a stable performance since it produces the second-best τ in almost all networks. In contrast, our method exhibits a more stable performance and further advantages at the given β value.
We further vary the β in the SIR model with an extensive range to assess the stability of its accuracy performance. As shown in Figure 3, SSPN, marked by red diamonds, exhibits a higher accuracy compared to the other seven methods in most cases, especially when the β is larger than the epidemic threshold (i.e., β c ). In other words, the ranking list generated by SSPN is similar to the ranking list generated by the SIR model. SSPN consistently demonstrates a clear variation trend in its performance and maintains a prominent position across various parameters. In the Euroroad and Fb-pages-foods networks, the correlation values between S S P N   and the spreading ability measured by the SIR model are always at the top of all the curves, while in the other real-world networks, SSPN also performs better over a wide range of β . However, in specific instances, certain improved methods demonstrate similar trends and, in some cases, attain the highest accuracy within a localized range of β . For instance, the τ measured by S c is the largest when 0.25 < β < 0.30 in the Power grid network. However, it loses its advantage when β 0.30 , which is where SSPN performs very competitively. The baseline methods (i.e., d , k s , and h ) exhibit less reliability within the studied networks, particularly the h ; their curves consistently reside at the bottom of almost all the methods, such as in the Dolphins, Power grid, and Netsci networks, demonstrating the worst performances.
We further investigate the diversity of the eight methods by computing the Kendall correlation coefficient (Kendall’s Tau ( τ )) between the ranking lists obtained by proposed method and the others. From Figure 3, it is evident that SSPN, along with the extended methods ( S c , L h , C n c + ), typically ranks above other methods. Similar conclusions can be drawn from Figure 4. The τ values between SSPN and the extended methods exceed 0.7, and in some networks, even surpass 0.8. This indicates a strong similarity in the ranking of node centrality between SSPN and the extended methods. Because they count cumulative neighbor influences, these methods demonstrate improved accuracy. However, among all metrics, SPON exhibits a higher correlation with baseline methods ( d , k s , and h ) that have moderate identification accuracy. In contrast, the correlation value between SSPN and SPON is average across all indicators. It is evident that methods with more pronounced identification abilities demonstrate higher correlations.

4.3. Robustness

To evaluate the robustness of the proposed SSPN method, we conducted a comprehensive examination pertaining to a system or network’s capacity to maintain stability and functionality amidst disturbances, attacks, or variations. Our assessment involved monitoring changes in network robustness during the node removal process and evaluating the magnitude of the robustness metric, denoted as R . In the experiment, nodes within the empirical network were scored using the SSPN and other seven methods. Nodes were then ranked based on their scores (i.e., importance), with those possessing higher values occupying the top positions. Subsequently, nodes were removed in order, according to their ranks, and the network robustness was calculated based on the remaining nodes.
Figure 5 illustrates the robustness performance of the proposed SSPN approach across six real-life networks. It showcases the network collapse process within these networks as nodes are successively removed, employing both the SSPN method and conventional node identification methods. The graphical depiction vividly illustrates the consistent positioning of the robustness curve attributed to SSPN, which is consistently at lower levels across all six networks. Notably, the area bound by this curve and the axis exhibits the most constrained dimensions, underscoring the better efficacy of SSPN in fostering heightened network resilience. This evidence shows that after further modification, the SSPN still retains the advantage of SPON under network destruction and performs well on various networks, with the ability to find relatively important key nodes.

5. Conclusions

When modeling practical problems such as epidemic management, social information dissemination optimization, and transportation network security enhancement as complex networks, identifying and ranking critical nodes has emerged as one of the most crucial and challenging issues of network science.
In this study, we attribute the relatively lower accuracy of the newly developed SPON method for finding influential nodes to its neglecting of the structural differences of its neighboring nodes. This study introduces the sum of the structural proportion of neighbors (SSPN), aimed at bolstering the efficacy of node identification. We consider the structural characteristics of categorized regions by leveraging weighted neighborhood proportions and employing the h-index to categorize neighborhoods. The SSPN exhibits superior performance, including monotonicity, accuracy, and robustness, outperforming seven benchmark models across various performance evaluation methods and mimicking the identification results calibrated by the recognized SIR model.
Although our proposed method performs better in terms of identifying influential nodes, there is still room for improvement. The experimental results are only arranged with respect to the unweighted and undirected networks used in this study. The judgment and modification of weighted undirected networks will be one of the main directions for future research. Moreover, we will continue to study large networks to further improve the SSPN method. More testing networks with various structures and characteristics will help further validate the accuracy and robustness of the proposed method.

Author Contributions

Conceptualization, S.Y. and G.L.; methodology, Y.C. and H.C.; software, Y.C. and H.C.; validation, G.L. and S.Y.; formal analysis, W.W.; investigation, G.L.; resources, J.D.; data curation, Y.C.; writing—original draft preparation, G.L., Y.C., H.C. and W.W.; writing—review and editing, G.L. and S.Y.; visualization, Y.C.; supervision, S.Y.; project administration, S.Y.; funding acquisition, G.L. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Key R&D Program of China (grant number 2022YFB4300500 and 2022YFB4300603), and the Natural Science Foundation of Zhejiang Province (grant number ZCLQ24E0802), the Science and Technology Planning Project of Jinhua (grant number 2023-4-023), the Science and Technology Plan Project of Zhejiang Highway and Transportation Management Center (grant number 2020H07), and the National College Students Innovation and Entrepreneurship Training Program (grant number S202310345095 and X202310345011).

Data Availability Statement

The data that support the findings of this study are available on request from the corresponding author.

Acknowledgments

The authors thank the two anonymous reviewers for their kind suggestions and constructive criticisms.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Centola, D. The Spread of Behavior in an Online Social Network Experiment. Science 2010, 329, 1194–1197. [Google Scholar] [CrossRef] [PubMed]
  2. Hamedmoghadam, H.; Jalili, M.; Vu, H.L.; Stone, L. Percolation of heterogeneous flows uncovers the bottlenecks of infrastructure networks. Nat. Commun. 2021, 12, 1254. [Google Scholar] [CrossRef]
  3. Ficara, A.; Curreri, F.; Fiumara, G.; De Meo, P. Human and Social Capital Strategies for Mafia Network Disruption. IEEE Trans. Inf. Forensics Secur. 2023, 18, 1926–1936. [Google Scholar] [CrossRef]
  4. Lu, L.; Chen, D.; Ren, X.-L.; Zhang, Q.-M.; Zhang, Y.-C.; Zhou, T. Vital nodes identification in complex networks. Phys. Rep. 2016, 650, 1–63. [Google Scholar] [CrossRef]
  5. Wittenbaum, G.M.; Hubbell, A.P.; Zuckerman, C. Mutual enhancement: Toward an understanding of the collective preference for shared information. J. Personal. Soc. Psychol. 1999, 77, 967–978. [Google Scholar] [CrossRef]
  6. Brin, S.; Page, L. The anatomy of a large-scale hypertextual Web search engine. Comput. Netw. ISDN Syst. 1998, 30, 107–117. [Google Scholar] [CrossRef]
  7. Şirag, E.; Claudio, C.; Filippo, R. Systematic comparison between methods for the detection of influential spreaders in complex networks. Sci. Rep. 2019, 9, 15095. [Google Scholar]
  8. Bonacich, P. Factoring and weighting approaches to status scores and clique identification. J. Math. Sociol. 1972, 2, 113–120. [Google Scholar] [CrossRef]
  9. Lu, L.; Zhang, Y.-C.; Yeung, C.H.; Zhou, T. Leaders in social networks, the Delicious case. PLoS ONE 2011, 6, e21202. [Google Scholar]
  10. Morone, F.; Makse, H.A. Influence maximization in complex networks through optimal percolation. Nature 2015, 524, 65–68. [Google Scholar] [CrossRef]
  11. Kanhabua, N.; Nørvåg, K. A comparison of time-aware ranking methods. In Proceedings of the 34th International ACM SIGIR Conference on Research and Development in Information Retrieval, Beijing, China, 25–29 July 2011; pp. 1257–1258. [Google Scholar]
  12. Kirigin, T.B.; Babić, S.B.; Perak, B. Semi-Local Integration Measure of Node Importance. Mathematics 2022, 10, 405. [Google Scholar] [CrossRef]
  13. Sabidussi, G. The centrality index of a graph. Psychometrika 1966, 31, 581–603. [Google Scholar] [CrossRef]
  14. Freeman, L.C. A Set of Measures of Centrality Based on Betweenness. Sociometry 1977, 40, 35–41. [Google Scholar] [CrossRef]
  15. Kitsak, M.; Gallos, L.K.; Havlin, S.; Liljeros, F.; Muchnik, L.; Stanley, H.E.; Makse, H.A. Identification of influential spreaders in complex networks. Nat. Phys. 2010, 6, 888–893. [Google Scholar] [CrossRef]
  16. Lu, L.; Zhou, T.; Zhang, Q.-M.; Stanley, H.E. The H-index of a network node and its relation to degree and coreness. Nat. Commun. 2016, 7, 10168. [Google Scholar] [CrossRef] [PubMed]
  17. Liu, Q.; Zhu, Y.-X.; Jia, Y.; Deng, L.; Zhou, B.; Zhu, J.-X.; Zou, P. Leveraging local h-index to identify and rank influential spreaders in networks. Phys. A Stat. Mech. Appl. 2018, 512, 379–391. [Google Scholar] [CrossRef]
  18. Zareie, A.; Sheikhahmadi, A. EHC: Extended H-index Centrality measure for identification of users’ spreading influence in complex networks. Phys. A Stat. Mech. Appl. 2019, 514, 141–155. [Google Scholar] [CrossRef]
  19. Gao, L.; Yu, S.; Li, M.; Shen, Z.; Gao, Z. Weighted h-index for Identifying Influential Spreaders. Symmetry 2019, 11, 1263. [Google Scholar] [CrossRef]
  20. Liu, J.-G.; Wang, Z.-Y.; Guo, Q.; Guo, L.; Chen, Q.; Ni, Y.-Z. Identifying multiple influential spreaders via local structural similarity. EPL Europhys. Lett. 2017, 119, 18001. [Google Scholar] [CrossRef]
  21. Gao, S.; Ma, J.; Chen, Z.; Wang, G.; Xing, C. Ranking the spreading ability of nodes in complex networks based on local structure. Phys. A Stat. Mech. Appl. 2014, 403, 130–147. [Google Scholar] [CrossRef]
  22. Zhu, J.; Wang, L. Identifying Influential Nodes in Complex Networks Based on Node Itself and Neighbor Layer Information. Symmetry 2021, 13, 1570. [Google Scholar] [CrossRef]
  23. Zareie, A.; Sheikhahmadi, A.; Fatemi, A. Influential nodes ranking in complex networks: An entropy-based approach. Chaos Solitons Fractals 2017, 104, 485–494. [Google Scholar] [CrossRef]
  24. Zareie, A.; Sheikhahmadi, A.; Jalili, M.; Fasaei, M.S.K. Finding influential nodes in social networks based on neighborhood correlation coefficient. Knowl.-Based Syst. 2020, 194, 105580. [Google Scholar] [CrossRef]
  25. Zhao, N.; Wang, H.; Wen, J.-J.; Li, J.; Jing, M.; Wang, J. Identifying critical nodes in complex networks based on neighborhood information. New J. Phys. 2023, 25, 083020. [Google Scholar] [CrossRef]
  26. Freeman, L.C. Centrality in social networks conceptual clarification. Soc. Netw. 1978, 1, 215–239. [Google Scholar] [CrossRef]
  27. Zhou, F.; Lü, L.; Mariani, M.S. Fast influencers in complex networks. Commun. Nonlinear Sci. Numer. Simul. 2019, 74, 69–83. [Google Scholar] [CrossRef]
  28. Bae, J.; Kim, S. Identifying and ranking influential spreaders in complex networks by neighborhood coreness. Phys. A Stat. Mech. Appl. 2014, 395, 549–559. [Google Scholar] [CrossRef]
  29. Liu, Y.; Tang, M.; Do, Y.; Hui, P.M. Accurate ranking of influential spreaders in networks based on dynamically asymmetric link weights. Phys. Rev. E 2017, 96, 22323. [Google Scholar] [CrossRef]
  30. Yu, S.; Gao, L.; Xu, L.; Gao, Z.-Y. Identifying influential spreaders based on indirect spreading in neighborhood. Phys. A Stat. Mech. Appl. 2019, 523, 418–425. [Google Scholar] [CrossRef]
  31. Moreno, Y.; Pastor-Satorras, R.; Vespignani, A. Epidemic outbreaks in complex heterogeneous networks. Eur. Phys. J. B 2002, 26, 521–529. [Google Scholar] [CrossRef]
  32. Helton, J. Probability, conditional probability and complementary cumulative distribution functions in performance assessment for radioactive waste disposal. Reliab. Eng. Syst. Saf. 1996, 54, 145–163. [Google Scholar] [CrossRef]
  33. Kendall, M.G. A New Measure of Rank Correlation. Biometrika 1938, 30, 81–93. [Google Scholar] [CrossRef]
  34. Schneider, C.M.; Moreira, A.A.; Andrade, J.S.; Havlin, S.; Herrmann, H.J. Mitigation of malicious attacks on networks. Proc. Natl. Acad. Sci. USA 2011, 108, 3838–3841. [Google Scholar] [CrossRef] [PubMed]
  35. Lusseau, D.; Schneider, K.; Boisseau, O.J.; Haase, P.; Slooten, E.; Dawson, S.M. The bottlenose dolphin community of Doubtful Sound features a large proportion of long-lasting associations. Behav. Ecol. Sociobiol. 2003, 54, 396–405. [Google Scholar] [CrossRef]
  36. Newman, M.E.J. Finding community structure in networks using the eigenvectors of matrices. Phys. Rev. E 2006, 74 Pt 2, 36104. [Google Scholar] [CrossRef]
  37. Rossi, R.; Ahmed, N. The Network Data Repository with Interactive Graph Analytics and Visualization. Proc. AAAI Conf. Artif. Intell. 2015, 29, 9277. [Google Scholar] [CrossRef]
  38. Šubelj, L.; Bajec, M. Robust network community detection using balanced propagation. Eur. Phys. J. B 2011, 81, 353–362. [Google Scholar] [CrossRef]
  39. McAuley, J.; Leskovec, J. Learning to discover social circles in ego networks. In Proceedings of the 25th International Conference on Neural Information Processing Systems, Lake Tahoe, NV, USA, 3–6 December 2012; Curran Associates Inc.: Lake Tahoe, NV, USA, 2012; Volume 1, pp. 539–547. [Google Scholar]
  40. Watts, D.J.; Strogatz, S.H. Collective dynamics of ‘small-world’ networks. Nature 1998, 393, 440–442. [Google Scholar] [CrossRef]
  41. Wu, Y.; Dong, A.; Ren, Y.; Jiang, Q. Identify influential nodes in complex networks: A k-orders entropy-based method. Phys. A Stat. Mech. Appl. 2023, 632, 129302. [Google Scholar] [CrossRef]
  42. Ai, J.; He, T.; Su, Z. Identifying influential nodes in complex networks based on resource allocation similarity. Phys. A Stat. Mech. Appl. 2023, 627, 129101. [Google Scholar] [CrossRef]
Figure 1. An example network consisting of 13 nodes and 17 edges.
Figure 1. An example network consisting of 13 nodes and 17 edges.
Symmetry 16 00193 g001
Figure 2. The complementary cumulative distribution function ( C C D F ) plots for the ranking lists offered by eight different methods on six real-world networks.
Figure 2. The complementary cumulative distribution function ( C C D F ) plots for the ranking lists offered by eight different methods on six real-world networks.
Symmetry 16 00193 g002
Figure 3. The τ of the ranking lists derived via the SIR model and the ranking lists of eight methods across varying values of β . The dotted lines correspond to β c .
Figure 3. The τ of the ranking lists derived via the SIR model and the ranking lists of eight methods across varying values of β . The dotted lines correspond to β c .
Symmetry 16 00193 g003
Figure 4. Evaluation of correlations between various methods in the Dolphins, Netsci, Fb-pages-foods, Euroroad, Facebook, and Power grid networks by computing Kendall’s τ values.
Figure 4. Evaluation of correlations between various methods in the Dolphins, Netsci, Fb-pages-foods, Euroroad, Facebook, and Power grid networks by computing Kendall’s τ values.
Symmetry 16 00193 g004
Figure 5. The robustness performance of S C P N on the Dolphins, Netsci, Fb-pages-foods, Euroroad, Facebook, and Power grid networks. The curves of various colors represent distinct essential node identification methods.
Figure 5. The robustness performance of S C P N on the Dolphins, Netsci, Fb-pages-foods, Euroroad, Facebook, and Power grid networks. The curves of various colors represent distinct essential node identification methods.
Symmetry 16 00193 g005
Table 1. The ranking results of simple networks simulated using the SIR model and measured by SPON and SSPN.
Table 1. The ranking results of simple networks simulated using the SIR model and measured by SPON and SSPN.
RankSIRSPONSSPN
1i22
2333
3211
41I4
544i
6777
7105, 65, 6
868, 9, 10, 11, 1210, 11, 12
95 8, 9
1012
1111
129
138
Table 2. Topological characteristics of six real-world networks and their parameters including their total number of nodes ( N ), number of edges ( E ), epidemic threshold ( β c ), average degree (〈k〉), maximum degree ( k m a x ), mean shortest path length ( l ), maximum k -shell ( k s ,   m a x ), clustering coefficient ( c ), network diameter ( D ), and assortative matches ( A ).
Table 2. Topological characteristics of six real-world networks and their parameters including their total number of nodes ( N ), number of edges ( E ), epidemic threshold ( β c ), average degree (〈k〉), maximum degree ( k m a x ), mean shortest path length ( l ), maximum k -shell ( k s ,   m a x ), clustering coefficient ( c ), network diameter ( D ), and assortative matches ( A ).
Network N | E | β c k k m a x l k s , m a x cDA
Dolphins621590.14705.1290123.357060.25908−0.044
Netsci3799140.12474.8230346.0420220.7410170.0817
Fb-pages-foods62020910.05026.74501325.0890330.331017−0.032
Euroroad103913050.32402.51201018.39570.0190620.1267
Facebook4039882340.009443.69110453.69303740.606080.0636
Power grid494165940.25832.66901918.989200.0801460.0035
Table 3. The monotonicity M μ R measured by the μ method, including the proposed SSPN ( S S P N ), degree ( d ), k-shell ( k s ), h-index ( h ), social capital ( S c ), local h-index ( L h ), neighborhood coreness ( C n c + ), and SPON model ( S P O N ). The bold text denotes the best result, and the underlined text denotes the second-best result.
Table 3. The monotonicity M μ R measured by the μ method, including the proposed SSPN ( S S P N ), degree ( d ), k-shell ( k s ), h-index ( h ), social capital ( S c ), local h-index ( L h ), neighborhood coreness ( C n c + ), and SPON model ( S P O N ). The bold text denotes the best result, and the underlined text denotes the second-best result.
Network M d R M k s R M h R M S c R M L h R M C n c + R M S P O N R M S S P N R
Dolphins0.83120.55760.68410.96750.95920.94060.99680.9979
Netsci0.76420.70260.68250.96940.95130.97120.99430.9951
Fb-pages-foods0.81520.75870.76810.98650.97600.97890.99780.9989
Euroroad0.44420.33120.25340.86210.71650.80580.95040.9892
Facebook0.97390.97210.96650.99950.99900.99970.99990.9999
Power grid0.59270.37130.39300.90480.82620.82670.98660.9981
Average0.73690.61560.62460.94830.90470.92050.98760.9965
Table 4. The accuracy performance of various methods applied to real-world networks, including the degree ( d ), k-shell ( k s ), h-index ( h ), social capital ( S c ), local h-index ( L h ), neighborhood coreness ( C n c + ), SPON model ( S P O N ), and SSPN model ( S S P N ). β is the infection rate, β c is the epidemic threshold. The bold text denotes the best result, the underlined text denotes the second-best result.
Table 4. The accuracy performance of various methods applied to real-world networks, including the degree ( d ), k-shell ( k s ), h-index ( h ), social capital ( S c ), local h-index ( L h ), neighborhood coreness ( C n c + ), SPON model ( S P O N ), and SSPN model ( S S P N ). β is the infection rate, β c is the epidemic threshold. The bold text denotes the best result, the underlined text denotes the second-best result.
Network β c β d k s h S c L h C n c + S P O N S S P N
Dolphins0.1470.340.750.6620.8110.7760.8130.7180.7460.862
Netsci0.1250.240.4890.4580.4950.7160.5870.5810.5920.772
Fb-pages-foods0.05020.120.4970.5330.5350.6980.680.6630.6080.880
Euroroad0.3330.500.460.5090.5180.6170.5820.5770.5260.699
Facebook0.0090.020.6350.6810.6690.7770.7480.7280.4670.801
Power grid0.2580.360.4630.4050.4860.6450.5720.5660.5010.680
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Liu, G.; Chen, Y.; Chen, H.; Dai, J.; Wang, W.; Yu, S. The Identification of Influential Nodes Based on Neighborhood Information in Asymmetric Networks. Symmetry 2024, 16, 193. https://doi.org/10.3390/sym16020193

AMA Style

Liu G, Chen Y, Chen H, Dai J, Wang W, Yu S. The Identification of Influential Nodes Based on Neighborhood Information in Asymmetric Networks. Symmetry. 2024; 16(2):193. https://doi.org/10.3390/sym16020193

Chicago/Turabian Style

Liu, Gehui, Yuqi Chen, Haichen Chen, Jiehao Dai, Wenjie Wang, and Senbin Yu. 2024. "The Identification of Influential Nodes Based on Neighborhood Information in Asymmetric Networks" Symmetry 16, no. 2: 193. https://doi.org/10.3390/sym16020193

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop