Please use this identifier to cite or link to this item: http://cmuir.cmu.ac.th/jspui/handle/6653943832/68450
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKanokwan Malangen_US
dc.contributor.authorShuliang Wangen_US
dc.contributor.authorAniwat Phaphuangwittayakulen_US
dc.contributor.authorYuanyuan Lven_US
dc.contributor.authorHanning Yuanen_US
dc.contributor.authorXiuzhen Zhangen_US
dc.date.accessioned2020-04-02T15:27:37Z-
dc.date.available2020-04-02T15:27:37Z-
dc.date.issued2020-05-01en_US
dc.identifier.issn03784371en_US
dc.identifier.other2-s2.0-85077700485en_US
dc.identifier.other10.1016/j.physa.2019.123769en_US
dc.identifier.urihttps://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85077700485&origin=inwarden_US
dc.identifier.urihttp://cmuir.cmu.ac.th/jspui/handle/6653943832/68450-
dc.description.abstract© 2019 Elsevier B.V. The inherent structure and substantial information on global terrorism network are often understood by identifying influential nodes. Recently, novel node identification methods are developed from different perspectives. Each of them has trade-offs and strengths. However, the algorithms for exploring the key influential nodes have been adopted unevenly in light of network extraction research. A set of nodes that is more favorable to define the core network structure is unclear. In this paper, we, therefore, present a comparative study of node identification methods over the global terrorism network. The new insight each method contributes to identifying key influential nodes and core network structure is investigated. Six comparative methods are verified by the SIR model and monotonicity index. We further elaborate on experimental analysis by applying the critical nodes from each method to extract the skeleton network. All extracted skeletons are eventually compared with the original network in terms of node correlation and network structural-equivalence. Thus, the comparison and results not only used to reflect the potential of different methods to a particular network structure but also guide us to select a method that works best for extracting the skeleton network of real-world global terrorism.en_US
dc.subjectMathematicsen_US
dc.subjectPhysics and Astronomyen_US
dc.titleIdentifying influential nodes of global terrorism network: A comparison for skeleton network extractionen_US
dc.typeJournalen_US
article.title.sourcetitlePhysica A: Statistical Mechanics and its Applicationsen_US
article.volume545en_US
article.stream.affiliationsBeijing Institute of Technologyen_US
article.stream.affiliationsRMIT Universityen_US
article.stream.affiliationsChiang Mai Universityen_US
Appears in Collections:CMUL: Journal Articles

Files in This Item:
There are no files associated with this item.


Items in CMUIR are protected by copyright, with all rights reserved, unless otherwise indicated.