Please wait a minute...
New Technology of Library and Information Service  2012, Vol. 28 Issue (5): 65-69    DOI: 10.11925/infotech.1003-3513.2012.05.10
Current Issue | Archive | Adv Search |
Influential Spreaders in Co-author Network Based on K-shell
Zhang Jinzhu
National Science Library, Chinese Academy of Sciences, Beijing 100190, China; Graduate University of Chinese Academy of Sciences, Beijing 100049, China
Export: BibTeX | EndNote (RIS)      
Abstract  Based on the data comes from 12 journals between 2000-2009 which contains 7 389 different authors,this paper computes the degree, betweenness centrality and K-shell and makes a comparative analysis. The results show that K-shell does better in identification of influential spreaders in co-author network. This method can be also used in co-citation network and coupling network for identification of influential spreaders.
Key wordsInfluential spreaders      Co-author network      K-shell      Degree      Betweenness centrality     
Received: 10 May 2012      Published: 24 July 2012



Cite this article:

Zhang Jinzhu. Influential Spreaders in Co-author Network Based on K-shell. New Technology of Library and Information Service, 2012, 28(5): 65-69.

URL:     OR

[1] Albert R, Jeong H, Barabási A L. Error and Attack Tolerance of Complex Networks[J]. Nature, 2000, 406(6794): 378-382.

[2] Cohen R, Erez K,Avraham D B,et al. Breakdown of the Internet Under Intentional Attack[J]. Physical Review Letters, 2001, 86(16): 3682-3685.

[3] Freeman L C. Centrality in Social Networks Conceptual Clarification[J]. Social Networks, 1979, 1(3): 215-239.

[4] Kitsak M, Gallos L K, Havlin S,et al. Identification of Influential Spreaders in Complex Networks[J]. Nature Physics, 2010, 6(11): 888-893.

[5] White H D, McCain K W. Visualizing a Discipline: An Author Co-citation Analysis of Information Science, 1972-1995[J]. Journal of the American Society for Information Science, 1998, 49(4): 327-355.

[6] Zhao D Z, Strotmann A. Evolution of Research Activities and Intellectual Influences in Information Science 1996-2005: Introducing Author Bibliographic-Coupling Analysis[J]. Journal of the American Society for Information Science and Technology, 2008, 59(13): 2070-2086.

[7] Chen C M, Ibekwe-SanJuan F, Hou J H. The Structure and Dynamics of Cocitation Clusters: A Multiple-Perspective Cocitation Analysis[J]. Journal of the American Society for Information Science and Technology, 2010, 61(7): 1386-1409.

[8] 张金柱. 情报学的学科结构及其演化分析[J]. 情报资料工作 , 2011(3): 34-37.(Zhang Jinzhu.An Analysis of the Disciplinary Structure and Evolution of Information Science[J]. Information and Documentation Services,2011(3):34-37)

[9] Newman M E J. The Structure and Function of Complex Networks[J]. SIAM Review, 2003, 45(2): 167-256.

[10] Pastor-Satorras R, Vespignani A. Immunization of Complex Networks[J]. Physical Review E, 2002, 65(3): 036104.

[11] Lloyd A L, May R M. How Viruses Spread Among Computers and People[J]. Science, 2001, 292(5520): 1316.

[12] Pastor-Satorras R, Vespignani A. Epidemic Spreading in Scale-free Networks[J]. Physical Review Letters, 2001, 86(14): 3200-3203.

[13] Chen C. Searching for Intellectual Turning Points: Progressive Knowledge Domain Visualization[J]. Proceedings of the National Academy of Sciences of the United States of America, 2004, 101(S1): 5303.

[14] Chen C. Predictive Effects of Structural Variation on Citation Counts[J]. Journal of the American Society for Information Science and Technology, 2011,63(3): 431-449.

[15] Friedkin N E. Theoretical Foundations for Centrality Measures[J]. American Journal of Sociology, 1991,96(6):1478-1504.

[16] Daley D J, Gani J, Gani J M. Epidemic Modelling: an Introduction[M]. NY: Cambridge University Press, 2001.
[1] Su Qing,Chen Sizhao,Wu Weimin,Li Xiaomei,Huang Tiankuan. Personalized Recommendation Model Based on Collaborative Filtering Algorithm of Learning Situation[J]. 数据分析与知识发现, 2020, 4(5): 105-117.
[2] Yujie Cao,Jin Mao,Rongqing Pan,Zhichao Ba,Gang Li. Analyzing Characteristics of Interdisciplinary Research Evolutions: Case Study of Medical Informatics[J]. 数据分析与知识发现, 2019, 3(5): 107-116.
[3] Xiao Mansheng,Zhou Lijuan,Wen Zhicheng. A Fuzzy C-Means Algorithm Based on Huffman Tree[J]. 数据分析与知识发现, 2018, 2(7): 81-88.
[4] Ye Guanghui,Hu Jinglan,Xu Jian,Xia Lixin. Analyzing Growth Trends and Attachment Mode of Social Blog Tags[J]. 数据分析与知识发现, 2018, 2(6): 70-78.
[5] Xu Jianmin,Xu Caiyun. Computing Similarity of Sci-Tech Documents Based on Texts and Formulas[J]. 数据分析与知识发现, 2018, 2(10): 103-109.
[6] Shi Xiaohua,Lu Hongtao. Detecting Community in Scientific Collaboration Network with Bayesian Symmetric NMF[J]. 数据分析与知识发现, 2017, 1(9): 49-56.
[7] Li Baozhen,Wang Ya,Zhou Ke. Measuring Credibility of Social Media Contents Based on Bayesian Theory[J]. 数据分析与知识发现, 2017, 1(6): 83-92.
[8] Zhang Yanfeng,Li He,Peng Lihui,Hou Litie. Identifying Useful Online Reviews with Semantic Feature Extraction[J]. 数据分析与知识发现, 2017, 1(12): 74-83.
[9] Wu Huijuan,Jia Tina Du,Sun Hongfei,Jannatul Fardous. Identifying Core Users in Social Resource Recommendation System with K-shell Collapse Sequences[J]. 现代图书情报技术, 2016, 32(9): 58-64.
[10] Ren Ni, Zhou Jiannong. The Discovery and Evaluation of Research Team Under the Mode of Weighted Co-Author Network[J]. 现代图书情报技术, 2015, 31(9): 68-75.
[11] Tan Min, Xu Xin. The Empirical Study of h-Degree in Recommendation Network of Academic Blogs——Taking Blogs as an Example[J]. 现代图书情报技术, 2015, 31(7-8): 31-36.
[12] Hou Ting, Lv Xueqiang, Li Zhuo. Hierarchical Filtering Method for Patent Term Extraction[J]. 现代图书情报技术, 2015, 31(1): 24-30.
[13] Hu Jiming, Chen Guo. Study on Improvement of Text Classification Using HS-SVM[J]. 现代图书情报技术, 2014, 30(9): 74-80.
[14] Wang Qianqian, Yuan Qinjian. The Research of Conformity Model Between Sellers Description and Buyers Comments[J]. 现代图书情报技术, 2014, 30(5): 58-65.
[15] Li Gang, Ye Guanghui. Research on Information Fusion for Multiple-sensor Expert Features[J]. 现代图书情报技术, 2014, 30(4): 27-33.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938